Skip to content

Commit 1fcd004

Browse files
committed
Polish gh-1680
1 parent 48115fa commit 1fcd004

File tree

3 files changed

+11
-17
lines changed

3 files changed

+11
-17
lines changed

oauth2-authorization-server/src/main/java/org/springframework/security/oauth2/server/authorization/authentication/CodeVerifierAuthenticator.java

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -137,15 +137,13 @@ private boolean authenticate(OAuth2ClientAuthenticationToken clientAuthenticatio
137137
}
138138

139139
private static boolean authorizationCodeGrant(Map<String, Object> parameters) {
140-
141-
if (!AuthorizationGrantType.AUTHORIZATION_CODE.getValue().equals(parameters.get(OAuth2ParameterNames.GRANT_TYPE))) {
140+
if (!AuthorizationGrantType.AUTHORIZATION_CODE.getValue()
141+
.equals(parameters.get(OAuth2ParameterNames.GRANT_TYPE))) {
142142
return false;
143143
}
144-
145144
if (!StringUtils.hasText((String) parameters.get(OAuth2ParameterNames.CODE))) {
146145
throwInvalidGrant(OAuth2ParameterNames.CODE);
147146
}
148-
149147
return true;
150148
}
151149

oauth2-authorization-server/src/test/java/org/springframework/security/oauth2/server/authorization/authentication/ClientSecretAuthenticationProviderTests.java

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,6 @@
4646
import static org.mockito.BDDMockito.given;
4747
import static org.mockito.Mockito.mock;
4848
import static org.mockito.Mockito.spy;
49-
import static org.mockito.Mockito.times;
5049
import static org.mockito.Mockito.verify;
5150

5251
/**

oauth2-authorization-server/src/test/java/org/springframework/security/oauth2/server/authorization/config/annotation/web/configurers/OAuth2AuthorizationCodeGrantTests.java

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,6 @@
2525
import java.time.temporal.ChronoUnit;
2626
import java.util.Arrays;
2727
import java.util.Base64;
28-
import java.util.Collections;
2928
import java.util.HashSet;
3029
import java.util.List;
3130
import java.util.Map;
@@ -72,7 +71,6 @@
7271
import org.springframework.security.crypto.password.NoOpPasswordEncoder;
7372
import org.springframework.security.crypto.password.PasswordEncoder;
7473
import org.springframework.security.oauth2.core.AuthorizationGrantType;
75-
import org.springframework.security.oauth2.core.ClientAuthenticationMethod;
7674
import org.springframework.security.oauth2.core.OAuth2RefreshToken;
7775
import org.springframework.security.oauth2.core.OAuth2Token;
7876
import org.springframework.security.oauth2.core.endpoint.OAuth2AccessTokenResponse;
@@ -100,7 +98,6 @@
10098
import org.springframework.security.oauth2.server.authorization.authentication.OAuth2AuthorizationConsentAuthenticationContext;
10199
import org.springframework.security.oauth2.server.authorization.authentication.OAuth2AuthorizationConsentAuthenticationProvider;
102100
import org.springframework.security.oauth2.server.authorization.authentication.OAuth2AuthorizationConsentAuthenticationToken;
103-
import org.springframework.security.oauth2.server.authorization.authentication.OAuth2ClientAuthenticationToken;
104101
import org.springframework.security.oauth2.server.authorization.client.JdbcRegisteredClientRepository;
105102
import org.springframework.security.oauth2.server.authorization.client.JdbcRegisteredClientRepository.RegisteredClientParametersMapper;
106103
import org.springframework.security.oauth2.server.authorization.client.RegisteredClient;
@@ -518,6 +515,7 @@ public void requestWhenPublicClientWithPkceAndCustomRefreshTokenGeneratorThenRet
518515
.isEqualTo(true);
519516
}
520517

518+
// gh-1680
521519
@Test
522520
public void requestWhenPublicClientWithPkceAndEmptyCodeThenBadRequest() throws Exception {
523521
this.spring.register(AuthorizationServerConfiguration.class).autowire();
@@ -526,18 +524,17 @@ public void requestWhenPublicClientWithPkceAndEmptyCodeThenBadRequest() throws E
526524
this.registeredClientRepository.save(registeredClient);
527525

528526
MultiValueMap<String, String> tokenRequestParameters = new LinkedMultiValueMap<>();
529-
tokenRequestParameters.set(OAuth2ParameterNames.GRANT_TYPE, AuthorizationGrantType.AUTHORIZATION_CODE.getValue());
527+
tokenRequestParameters.set(OAuth2ParameterNames.GRANT_TYPE,
528+
AuthorizationGrantType.AUTHORIZATION_CODE.getValue());
530529
tokenRequestParameters.set(OAuth2ParameterNames.CODE, "");
531-
tokenRequestParameters.set(OAuth2ParameterNames.REDIRECT_URI, registeredClient.getRedirectUris().iterator().next());
530+
tokenRequestParameters.set(OAuth2ParameterNames.REDIRECT_URI,
531+
registeredClient.getRedirectUris().iterator().next());
532532

533533
this.mvc
534-
.perform(post(DEFAULT_TOKEN_ENDPOINT_URI)
535-
.params(tokenRequestParameters)
536-
.param(OAuth2ParameterNames.CLIENT_ID, registeredClient.getClientId())
537-
.param(PkceParameterNames.CODE_VERIFIER, S256_CODE_VERIFIER))
538-
.andExpect(header().string(HttpHeaders.CACHE_CONTROL, containsString("no-store")))
539-
.andExpect(header().string(HttpHeaders.PRAGMA, containsString("no-cache")))
540-
.andExpect(status().isBadRequest());
534+
.perform(post(DEFAULT_TOKEN_ENDPOINT_URI).params(tokenRequestParameters)
535+
.param(OAuth2ParameterNames.CLIENT_ID, registeredClient.getClientId())
536+
.param(PkceParameterNames.CODE_VERIFIER, S256_CODE_VERIFIER))
537+
.andExpect(status().isBadRequest());
541538
}
542539

543540
@Test

0 commit comments

Comments
 (0)