-
Notifications
You must be signed in to change notification settings - Fork 5.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Simplify retrieving Introspection-specific attributes #6489
Comments
Hi @jzheaux, I would like to work on this issue, could you please provide more details? |
@qavid - I took a look at your commit, and I like where you seem to be headed with it. Can you clarify where you'd like additional detail? |
@qavid are you still thinking about submitting a PR for this issue? |
@jzheaux I would really like to, but i don't have much time. I'll try this weekend and I will let you know. |
Hi @jzheaux, I have submitted PR, but I have one question. I wasn't sure if DefaultOAuth2AuthenticatedPrincipal should be removed so I have removed it in a separate commit. |
Removed some duplication by delegating to DefaultOAuth2AuthenticatedPrincipal Changed order of listed interfaces to satisfy compiler issue. When listed with OAuth2AuthenticatedPrincipal first, then OAuth2ResourceServerBeanDefinitionParserTests would fail to import OpaqueTokenBeanDefinitionParser. Switching OAuth2AuthenticatedPrincipal with OAuth2IntrospectionClaimAccessor resolved the compilation issue. Issue gh-6489
In order to simplify retrieving of OAuth 2.0 Introspection specific attributes, OAuth2IntrospectionClaimAccessor interface was introduced and also new OAuth2AuthenticatedPrincipal implementing this new interface (OAuth2IntrospectionAuthenticatedPrincipal). Also DefaultOAuth2AuthenticatedPrincipal was replaced by OAuth2IntrospectionAuthenticatedPrincipal in cases where OAuth 2.0 Introspection is performed (NimbusOpaqueTokenIntrospector, NimbusReactiveOpaqueTokenIntrospector). DefaultOAuth2AuthenticatedPrincipal can be still used by applications that introspected the token without OAuth 2.0 Introspection. OAuth2IntrospectionAuthenticatedPrincipal will also be used as a default principal in tests where request is post-processed/mutated by OpaqueTokenRequestPostProcessor/OpaqueTokenMutator. Closes gh-6489
Removed some duplication by delegating to DefaultOAuth2AuthenticatedPrincipal. Issue gh-6489
Related to #5200 and #6352 (comment)
One way to simplify would be by creating an
IntrospectionClaimAccessor
similar toJwtClaimAccessor
.The text was updated successfully, but these errors were encountered: