Add an AuthoritiesExtractor strategy for UserInfoTokenServices

Default will extract an "authorities" key from the map coming from the
server. No existing servers I am aware of actually send that data, but
it might be helpful as a default nevertheless. User can override the
default by adding a bean of that type.

Fixes gh-3711
pull/4122/merge
Dave Syer 9 years ago
parent eadd20e9ca
commit 4768faaba7

@ -0,0 +1,31 @@
/*
* Copyright 2012-2015 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.springframework.boot.autoconfigure.security.oauth2.resource;
import java.util.List;
import java.util.Map;
import org.springframework.security.core.GrantedAuthority;
/**
* @author Dave Syer
*/
public interface AuthoritiesExtractor {
List<GrantedAuthority> extractAuthorities(Map<String, Object> map);
}

@ -0,0 +1,54 @@
/*
* Copyright 2012-2015 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.springframework.boot.autoconfigure.security.oauth2.resource;
import java.util.Collection;
import java.util.List;
import java.util.Map;
import org.springframework.security.core.GrantedAuthority;
import org.springframework.security.core.authority.AuthorityUtils;
import org.springframework.util.ObjectUtils;
import org.springframework.util.StringUtils;
/**
* @author Dave Syer
*/
public class FixedAuthoritiesExtractor implements AuthoritiesExtractor {
private static final String AUTHORITIES = "authorities";
@Override
public List<GrantedAuthority> extractAuthorities(Map<String, Object> map) {
String authorities = "ROLE_USER";
if (map.containsKey(AUTHORITIES)) {
Object object = map.get(AUTHORITIES);
if (object instanceof Collection) {
authorities = StringUtils
.collectionToCommaDelimitedString((Collection<?>) object);
}
else if (ObjectUtils.isArray(object)) {
authorities = StringUtils.arrayToCommaDelimitedString((Object[]) object);
}
else if (object != null) {
authorities = object.toString();
}
}
return AuthorityUtils.commaSeparatedStringToAuthorityList(authorities);
}
}

@ -171,6 +171,9 @@ public class ResourceServerTokenServicesConfiguration {
@Qualifier("userInfoRestTemplate") @Qualifier("userInfoRestTemplate")
private OAuth2RestOperations restTemplate; private OAuth2RestOperations restTemplate;
@Autowired(required = false)
private AuthoritiesExtractor authoritiesExtractor;
@Bean @Bean
@ConditionalOnBean(ConnectionFactoryLocator.class) @ConditionalOnBean(ConnectionFactoryLocator.class)
@ConditionalOnMissingBean(ResourceServerTokenServices.class) @ConditionalOnMissingBean(ResourceServerTokenServices.class)
@ -187,6 +190,9 @@ public class ResourceServerTokenServicesConfiguration {
this.sso.getUserInfoUri(), this.sso.getClientId()); this.sso.getUserInfoUri(), this.sso.getClientId());
services.setTokenType(this.sso.getTokenType()); services.setTokenType(this.sso.getTokenType());
services.setRestTemplate(this.restTemplate); services.setRestTemplate(this.restTemplate);
if (this.authoritiesExtractor != null) {
services.setAuthoritiesExtractor(this.authoritiesExtractor);
}
return services; return services;
} }
@ -204,6 +210,9 @@ public class ResourceServerTokenServicesConfiguration {
@Qualifier("userInfoRestTemplate") @Qualifier("userInfoRestTemplate")
private OAuth2RestOperations restTemplate; private OAuth2RestOperations restTemplate;
@Autowired(required = false)
private AuthoritiesExtractor authoritiesExtractor;
@Bean @Bean
@ConditionalOnMissingBean(ResourceServerTokenServices.class) @ConditionalOnMissingBean(ResourceServerTokenServices.class)
public UserInfoTokenServices userInfoTokenServices() { public UserInfoTokenServices userInfoTokenServices() {
@ -211,6 +220,9 @@ public class ResourceServerTokenServicesConfiguration {
this.sso.getUserInfoUri(), this.sso.getClientId()); this.sso.getUserInfoUri(), this.sso.getClientId());
services.setRestTemplate(this.restTemplate); services.setRestTemplate(this.restTemplate);
services.setTokenType(this.sso.getTokenType()); services.setTokenType(this.sso.getTokenType());
if (this.authoritiesExtractor != null) {
services.setAuthoritiesExtractor(this.authoritiesExtractor);
}
return services; return services;
} }

@ -25,7 +25,6 @@ import org.apache.commons.logging.LogFactory;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken; import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.AuthenticationException; import org.springframework.security.core.AuthenticationException;
import org.springframework.security.core.GrantedAuthority; import org.springframework.security.core.GrantedAuthority;
import org.springframework.security.core.authority.AuthorityUtils;
import org.springframework.security.oauth2.client.OAuth2RestOperations; import org.springframework.security.oauth2.client.OAuth2RestOperations;
import org.springframework.security.oauth2.client.OAuth2RestTemplate; import org.springframework.security.oauth2.client.OAuth2RestTemplate;
import org.springframework.security.oauth2.client.resource.BaseOAuth2ProtectedResourceDetails; import org.springframework.security.oauth2.client.resource.BaseOAuth2ProtectedResourceDetails;
@ -57,6 +56,8 @@ public class UserInfoTokenServices implements ResourceServerTokenServices {
private String tokenType = DefaultOAuth2AccessToken.BEARER_TYPE; private String tokenType = DefaultOAuth2AccessToken.BEARER_TYPE;
private AuthoritiesExtractor authoritiesExtractor = new FixedAuthoritiesExtractor();
public UserInfoTokenServices(String userInfoEndpointUrl, String clientId) { public UserInfoTokenServices(String userInfoEndpointUrl, String clientId) {
this.userInfoEndpointUrl = userInfoEndpointUrl; this.userInfoEndpointUrl = userInfoEndpointUrl;
this.clientId = clientId; this.clientId = clientId;
@ -70,6 +71,10 @@ public class UserInfoTokenServices implements ResourceServerTokenServices {
this.restTemplate = restTemplate; this.restTemplate = restTemplate;
} }
public void setAuthoritiesExtractor(AuthoritiesExtractor authoritiesExtractor) {
this.authoritiesExtractor = authoritiesExtractor;
}
@Override @Override
public OAuth2Authentication loadAuthentication(String accessToken) public OAuth2Authentication loadAuthentication(String accessToken)
throws AuthenticationException, InvalidTokenException { throws AuthenticationException, InvalidTokenException {
@ -83,8 +88,8 @@ public class UserInfoTokenServices implements ResourceServerTokenServices {
private OAuth2Authentication extractAuthentication(Map<String, Object> map) { private OAuth2Authentication extractAuthentication(Map<String, Object> map) {
Object principal = getPrincipal(map); Object principal = getPrincipal(map);
List<GrantedAuthority> authorities = AuthorityUtils List<GrantedAuthority> authorities = this.authoritiesExtractor
.commaSeparatedStringToAuthorityList("ROLE_USER"); .extractAuthorities(map);
OAuth2Request request = new OAuth2Request(null, this.clientId, null, true, null, OAuth2Request request = new OAuth2Request(null, this.clientId, null, true, null,
null, null, null, null); null, null, null, null);
UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken( UsernamePasswordAuthenticationToken token = new UsernamePasswordAuthenticationToken(

@ -0,0 +1,64 @@
/*
* Copyright 2012-2015 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.springframework.boot.autoconfigure.security.oauth2.resource;
import java.util.Arrays;
import java.util.LinkedHashMap;
import java.util.Map;
import org.junit.Test;
import static org.junit.Assert.assertEquals;
/**
* @author Dave Syer
*/
public class FixedAuthoritiesExtractorTests {
private FixedAuthoritiesExtractor extractor = new FixedAuthoritiesExtractor();
private Map<String, Object> map = new LinkedHashMap<String, Object>();
@Test
public void authorities() {
this.map.put("authorities", "ROLE_ADMIN");
assertEquals("[ROLE_ADMIN]",
this.extractor.extractAuthorities(this.map).toString());
}
@Test
public void authoritiesCommaSeparated() {
this.map.put("authorities", "ROLE_USER,ROLE_ADMIN");
assertEquals("[ROLE_USER, ROLE_ADMIN]",
this.extractor.extractAuthorities(this.map).toString());
}
@Test
public void authoritiesArray() {
this.map.put("authorities", new String[] { "ROLE_USER", "ROLE_ADMIN" });
assertEquals("[ROLE_USER, ROLE_ADMIN]",
this.extractor.extractAuthorities(this.map).toString());
}
@Test
public void authoritiesList() {
this.map.put("authorities", Arrays.asList("ROLE_USER", "ROLE_ADMIN"));
assertEquals("[ROLE_USER, ROLE_ADMIN]",
this.extractor.extractAuthorities(this.map).toString());
}
}

@ -16,6 +16,9 @@
package org.springframework.boot.autoconfigure.security.oauth2.resource; package org.springframework.boot.autoconfigure.security.oauth2.resource;
import java.util.List;
import java.util.Map;
import org.junit.After; import org.junit.After;
import org.junit.Test; import org.junit.Test;
import org.springframework.beans.factory.annotation.Autowired; import org.springframework.beans.factory.annotation.Autowired;
@ -37,9 +40,12 @@ import org.springframework.context.annotation.Configuration;
import org.springframework.context.annotation.Import; import org.springframework.context.annotation.Import;
import org.springframework.core.env.ConfigurableEnvironment; import org.springframework.core.env.ConfigurableEnvironment;
import org.springframework.core.env.StandardEnvironment; import org.springframework.core.env.StandardEnvironment;
import org.springframework.security.core.GrantedAuthority;
import org.springframework.security.core.authority.AuthorityUtils;
import org.springframework.security.oauth2.provider.token.DefaultTokenServices; import org.springframework.security.oauth2.provider.token.DefaultTokenServices;
import org.springframework.security.oauth2.provider.token.RemoteTokenServices; import org.springframework.security.oauth2.provider.token.RemoteTokenServices;
import org.springframework.social.connect.ConnectionFactoryLocator; import org.springframework.social.connect.ConnectionFactoryLocator;
import org.springframework.test.util.ReflectionTestUtils;
import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertNotNull; import static org.junit.Assert.assertNotNull;
@ -101,6 +107,19 @@ public class ResourceServerTokenServicesConfigurationTests {
assertNotNull(services); assertNotNull(services);
} }
@Test
public void userInfoWithAuthorities() {
EnvironmentTestUtils.addEnvironment(this.environment,
"security.oauth2.resource.userInfoUri:http://example.com");
this.context = new SpringApplicationBuilder(AuthoritiesConfiguration.class)
.environment(this.environment).web(false).run();
UserInfoTokenServices services = this.context
.getBean(UserInfoTokenServices.class);
assertNotNull(services);
assertEquals(this.context.getBean(AuthoritiesExtractor.class),
ReflectionTestUtils.getField(services, "authoritiesExtractor"));
}
@Test @Test
public void userInfoNoClient() { public void userInfoNoClient() {
EnvironmentTestUtils.addEnvironment(this.environment, EnvironmentTestUtils.addEnvironment(this.environment,
@ -172,6 +191,23 @@ public class ResourceServerTokenServicesConfigurationTests {
} }
@Configuration
protected static class AuthoritiesConfiguration extends ResourceConfiguration {
@Bean
AuthoritiesExtractor authoritiesExtractor() {
return new AuthoritiesExtractor() {
@Override
public List<GrantedAuthority> extractAuthorities(
Map<String, Object> map) {
return AuthorityUtils
.commaSeparatedStringToAuthorityList("ROLE_ADMIN");
}
};
}
}
@Import({ OAuth2RestOperationsConfiguration.class }) @Import({ OAuth2RestOperationsConfiguration.class })
protected static class ResourceNoClientConfiguration extends ResourceConfiguration { protected static class ResourceNoClientConfiguration extends ResourceConfiguration {

Loading…
Cancel
Save