Skip to content

Commit 7d1f974

Browse files
committed
Merge branch '3.5.x'
Closes gh-46648
2 parents 0d03712 + 5fc0f55 commit 7d1f974

File tree

7 files changed

+30
-0
lines changed

7 files changed

+30
-0
lines changed

module/spring-boot-security-oauth2-authorization-server/src/main/java/org/springframework/boot/security/oauth2/server/authorization/autoconfigure/servlet/OAuth2AuthorizationServerProperties.java

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@
3232
* OAuth 2.0 Authorization Server properties.
3333
*
3434
* @author Steve Riesenberg
35+
* @author Florian Lemaire
3536
* @since 4.0.0
3637
*/
3738
@ConfigurationProperties("spring.security.oauth2.authorizationserver")
@@ -144,6 +145,11 @@ public static class Endpoint {
144145
*/
145146
private String tokenIntrospectionUri = "/oauth2/introspect";
146147

148+
/**
149+
* Authorization Server's OAuth 2.0 Pushed Authorization Request Endpoint.
150+
*/
151+
private String pushedAuthorizationRequestUri = "/oauth2/par";
152+
147153
/**
148154
* OpenID Connect 1.0 endpoints.
149155
*/
@@ -206,6 +212,14 @@ public void setTokenIntrospectionUri(String tokenIntrospectionUri) {
206212
this.tokenIntrospectionUri = tokenIntrospectionUri;
207213
}
208214

215+
public String getPushedAuthorizationRequestUri() {
216+
return this.pushedAuthorizationRequestUri;
217+
}
218+
219+
public void setPushedAuthorizationRequestUri(String pushedAuthorizationRequestUri) {
220+
this.pushedAuthorizationRequestUri = pushedAuthorizationRequestUri;
221+
}
222+
209223
public OidcEndpoint getOidc() {
210224
return this.oidc;
211225
}

module/spring-boot-security-oauth2-authorization-server/src/main/java/org/springframework/boot/security/oauth2/server/authorization/autoconfigure/servlet/OAuth2AuthorizationServerPropertiesMapper.java

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@
3838
* Maps {@link OAuth2AuthorizationServerProperties} to Authorization Server types.
3939
*
4040
* @author Steve Riesenberg
41+
* @author Florian Lemaire
4142
*/
4243
final class OAuth2AuthorizationServerPropertiesMapper {
4344

@@ -61,6 +62,7 @@ AuthorizationServerSettings asAuthorizationServerSettings() {
6162
map.from(endpoint::getJwkSetUri).to(builder::jwkSetEndpoint);
6263
map.from(endpoint::getTokenRevocationUri).to(builder::tokenRevocationEndpoint);
6364
map.from(endpoint::getTokenIntrospectionUri).to(builder::tokenIntrospectionEndpoint);
65+
map.from(endpoint::getPushedAuthorizationRequestUri).to(builder::pushedAuthorizationRequestEndpoint);
6466
map.from(oidc::getLogoutUri).to(builder::oidcLogoutEndpoint);
6567
map.from(oidc::getClientRegistrationUri).to(builder::oidcClientRegistrationEndpoint);
6668
map.from(oidc::getUserInfoUri).to(builder::oidcUserInfoEndpoint);

module/spring-boot-security-oauth2-authorization-server/src/test/java/org/springframework/boot/security/oauth2/server/authorization/autoconfigure/servlet/OAuth2AuthorizationServerAutoConfigurationTests.java

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@
4141
*
4242
* @author Steve Riesenberg
4343
* @author Madhura Bhave
44+
* @author Florian Lemaire
4445
*/
4546
class OAuth2AuthorizationServerAutoConfigurationTests {
4647

@@ -133,6 +134,7 @@ void authorizationServerSettingsBeanShouldBeCreatedWhenPropertiesPresent() {
133134
PROPERTIES_PREFIX + ".endpoint.token-uri=/token", PROPERTIES_PREFIX + ".endpoint.jwk-set-uri=/jwks",
134135
PROPERTIES_PREFIX + ".endpoint.token-revocation-uri=/revoke",
135136
PROPERTIES_PREFIX + ".endpoint.token-introspection-uri=/introspect",
137+
PROPERTIES_PREFIX + ".endpoint.pushed-authorization-request-uri=/par",
136138
PROPERTIES_PREFIX + ".endpoint.oidc.logout-uri=/logout",
137139
PROPERTIES_PREFIX + ".endpoint.oidc.client-registration-uri=/register",
138140
PROPERTIES_PREFIX + ".endpoint.oidc.user-info-uri=/user")
@@ -146,6 +148,7 @@ void authorizationServerSettingsBeanShouldBeCreatedWhenPropertiesPresent() {
146148
assertThat(settings.getJwkSetEndpoint()).isEqualTo("/jwks");
147149
assertThat(settings.getTokenRevocationEndpoint()).isEqualTo("/revoke");
148150
assertThat(settings.getTokenIntrospectionEndpoint()).isEqualTo("/introspect");
151+
assertThat(settings.getPushedAuthorizationRequestEndpoint()).isEqualTo("/par");
149152
assertThat(settings.getOidcLogoutEndpoint()).isEqualTo("/logout");
150153
assertThat(settings.getOidcClientRegistrationEndpoint()).isEqualTo("/register");
151154
assertThat(settings.getOidcUserInfoEndpoint()).isEqualTo("/user");

module/spring-boot-security-oauth2-authorization-server/src/test/java/org/springframework/boot/security/oauth2/server/authorization/autoconfigure/servlet/OAuth2AuthorizationServerPropertiesMapperTests.java

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@
3434
* Tests for {@link OAuth2AuthorizationServerPropertiesMapper}.
3535
*
3636
* @author Steve Riesenberg
37+
* @author Florian Lemaire
3738
*/
3839
class OAuth2AuthorizationServerPropertiesMapperTests {
3940

@@ -107,6 +108,7 @@ void getAuthorizationServerSettingsWhenValidParametersShouldAdapt() {
107108
endpoints.setJwkSetUri("/jwks");
108109
endpoints.setTokenRevocationUri("/revoke");
109110
endpoints.setTokenIntrospectionUri("/introspect");
111+
endpoints.setPushedAuthorizationRequestUri("/par");
110112
OAuth2AuthorizationServerProperties.OidcEndpoint oidc = endpoints.getOidc();
111113
oidc.setLogoutUri("/logout");
112114
oidc.setClientRegistrationUri("/register");
@@ -121,6 +123,7 @@ void getAuthorizationServerSettingsWhenValidParametersShouldAdapt() {
121123
assertThat(settings.getJwkSetEndpoint()).isEqualTo("/jwks");
122124
assertThat(settings.getTokenRevocationEndpoint()).isEqualTo("/revoke");
123125
assertThat(settings.getTokenIntrospectionEndpoint()).isEqualTo("/introspect");
126+
assertThat(settings.getPushedAuthorizationRequestEndpoint()).isEqualTo("/par");
124127
assertThat(settings.getOidcLogoutEndpoint()).isEqualTo("/logout");
125128
assertThat(settings.getOidcClientRegistrationEndpoint()).isEqualTo("/register");
126129
assertThat(settings.getOidcUserInfoEndpoint()).isEqualTo("/user");
@@ -137,6 +140,7 @@ void getAuthorizationServerSettingsWhenMultipleIssuersAllowedShouldAdapt() {
137140
endpoints.setJwkSetUri("/jwks");
138141
endpoints.setTokenRevocationUri("/revoke");
139142
endpoints.setTokenIntrospectionUri("/introspect");
143+
endpoints.setPushedAuthorizationRequestUri("/par");
140144
OAuth2AuthorizationServerProperties.OidcEndpoint oidc = endpoints.getOidc();
141145
oidc.setLogoutUri("/logout");
142146
oidc.setClientRegistrationUri("/register");
@@ -151,6 +155,7 @@ void getAuthorizationServerSettingsWhenMultipleIssuersAllowedShouldAdapt() {
151155
assertThat(settings.getJwkSetEndpoint()).isEqualTo("/jwks");
152156
assertThat(settings.getTokenRevocationEndpoint()).isEqualTo("/revoke");
153157
assertThat(settings.getTokenIntrospectionEndpoint()).isEqualTo("/introspect");
158+
assertThat(settings.getPushedAuthorizationRequestEndpoint()).isEqualTo("/par");
154159
assertThat(settings.getOidcLogoutEndpoint()).isEqualTo("/logout");
155160
assertThat(settings.getOidcClientRegistrationEndpoint()).isEqualTo("/register");
156161
assertThat(settings.getOidcUserInfoEndpoint()).isEqualTo("/user");

module/spring-boot-security-oauth2-authorization-server/src/test/java/org/springframework/boot/security/oauth2/server/authorization/autoconfigure/servlet/OAuth2AuthorizationServerPropertiesTests.java

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@
2929
* Tests for {@link OAuth2AuthorizationServerProperties}.
3030
*
3131
* @author Steve Riesenberg
32+
* @author Florian Lemaire
3233
*/
3334
class OAuth2AuthorizationServerPropertiesTests {
3435

@@ -85,6 +86,8 @@ void defaultEndpointPropertiesMatchBuilderDefaults() {
8586
assertThat(properties.getJwkSetUri()).isEqualTo(defaults.getJwkSetEndpoint());
8687
assertThat(properties.getTokenRevocationUri()).isEqualTo(defaults.getTokenRevocationEndpoint());
8788
assertThat(properties.getTokenIntrospectionUri()).isEqualTo(defaults.getTokenIntrospectionEndpoint());
89+
assertThat(properties.getPushedAuthorizationRequestUri())
90+
.isEqualTo(defaults.getPushedAuthorizationRequestEndpoint());
8891
OAuth2AuthorizationServerProperties.OidcEndpoint oidc = properties.getOidc();
8992
assertThat(oidc.getLogoutUri()).isEqualTo(defaults.getOidcLogoutEndpoint());
9093
assertThat(oidc.getClientRegistrationUri()).isEqualTo(defaults.getOidcClientRegistrationEndpoint());

smoke-test/spring-boot-smoke-test-oauth2-authorization-server/src/main/resources/application.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ spring:
99
jwk-set-uri: /jwks
1010
token-revocation-uri: /revoke
1111
token-introspection-uri: /introspect
12+
pushed-authorization-request-uri: /par
1213
oidc:
1314
logout-uri: /logout
1415
client-registration-uri: /register

smoke-test/spring-boot-smoke-test-oauth2-authorization-server/src/test/java/smoketest/oauth2/server/SampleOAuth2AuthorizationServerApplicationTests.java

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,7 @@ void openidConfigurationShouldAllowAccess() {
7070
assertThat(config.getTokenRevocationEndpoint()).hasToString("https://provider.com/revoke");
7171
assertThat(config.getEndSessionEndpoint()).hasToString("https://provider.com/logout");
7272
assertThat(config.getTokenIntrospectionEndpoint()).hasToString("https://provider.com/introspect");
73+
assertThat(config.getPushedAuthorizationRequestEndpoint()).hasToString("https://provider.com/par");
7374
assertThat(config.getUserInfoEndpoint()).hasToString("https://provider.com/user");
7475
// OIDC Client Registration is disabled by default
7576
assertThat(config.getClientRegistrationEndpoint()).isNull();
@@ -88,6 +89,7 @@ void authServerMetadataShouldAllowAccess() {
8889
assertThat(config.getJwkSetUrl()).hasToString("https://provider.com/jwks");
8990
assertThat(config.getTokenRevocationEndpoint()).hasToString("https://provider.com/revoke");
9091
assertThat(config.getTokenIntrospectionEndpoint()).hasToString("https://provider.com/introspect");
92+
assertThat(config.getPushedAuthorizationRequestEndpoint()).hasToString("https://provider.com/par");
9193
// OIDC Client Registration is disabled by default
9294
assertThat(config.getClientRegistrationEndpoint()).isNull();
9395
}

0 commit comments

Comments
 (0)