Skip to content

validate access token#17613

Merged
saragluna merged 24 commits intoAzure:masterfrom
ZhuXiaoBing-cn:access_token_validate
Nov 30, 2020
Merged

validate access token#17613
saragluna merged 24 commits intoAzure:masterfrom
ZhuXiaoBing-cn:access_token_validate

Conversation

@ZhuXiaoBing-cn
Copy link
Contributor

  • Make changes according to checkstyle
  • add unit tests
  • pom file add resource-server dependencies
  • spring.factories file add autoconfiguration

* add unit tests
* pom file add resource-server dependencies
* spring.factories file add autoconfiguration
@ghost ghost added the azure-spring All azure-spring related issues label Nov 17, 2020
* update AADResourceServerAutoConfiguration
* update AADResourceServerAutoConfigurationTest
* issuer validator verify that the STS URI matches
* Verify the audience through AppIdUri
* update unit test
* Update JwkKeySetUri to get via ServiceEndpoints
@check-enforcer
Copy link

This pull request is protected by Check Enforcer.

What is Check Enforcer?

Check Enforcer helps ensure all pull requests are covered by at least one check-run (typically an Azure Pipeline). When all check-runs associated with this pull request pass then Check Enforcer itself will pass.

Why am I getting this message?

You are getting this message because Check Enforcer did not detect any check-runs being associated with this pull request within five minutes. This may indicate that your pull request is not covered by any pipelines and so Check Enforcer is correctly blocking the pull request being merged.

What should I do now?

If the check-enforcer check-run is not passing and all other check-runs associated with this PR are passing (excluding license-cla) then you could try telling Check Enforcer to evaluate your pull request again. You can do this by adding a comment to this pull request as follows:
/check-enforcer evaluate
Typically evaulation only takes a few seconds. If you know that your pull request is not covered by a pipeline and this is expected you can override Check Enforcer using the following command:
/check-enforcer override
Note that using the override command triggers alerts so that follow-up investigations can occur (PRs still need to be approved as normal).

What if I am onboarding a new service?

Often, new services do not have validation pipelines associated with them, in order to bootstrap pipelines for a new service, you can issue the following command as a pull request comment:
/azp run prepare-pipelines
This will run a pipeline that analyzes the source tree and creates the pipelines necessary to build and validate your pull request. Once the pipeline has been created you can trigger the pipeline using the following comment:
/azp run java - [service] - ci

try {
jwsObject = JWSObject.parse(accessToken.getTokenValue());
} catch (ParseException e) {
e.printStackTrace();
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

need any log info here?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should we throw this exception?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should have a log here.

import org.springframework.security.oauth2.jwt.JwtDecoder;
import org.springframework.security.oauth2.jwt.NimbusJwtDecoder;

public class AADResourceServerAutoConfigurationTest {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We need more test cases in this one

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

okay.

@saragluna
Copy link
Member

Please fix the spotbug error.

# Conflicts:
#	sdk/spring/azure-spring-boot/src/main/java/com/azure/spring/aad/implementation/AzureActiveDirectoryProperties.java
* For AzureOAuth2AuthenticatedPrincipal add multiple constructors, to implement change authoritiesClaimName, authorityPrefix.
* Changes the PreAuthenticatedAuthenticationToken to BearerTokenAuthentication in AzureJwtBearerTokenAuthenticationConverter.
* add unit test in AzureJwtBearerTokenAuthenticationConverterTest.
Copy link
Member

@saragluna saragluna left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Overall is great, we need to discuss the bearer token converter again, to see whether we use the correct abstraction here.

@saragluna
Copy link
Member

/azp run java - spring - tests

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

Copy link
Member

@saragluna saragluna left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

import org.springframework.util.Assert;

/**
* A {@link Converter} that takes a {@link Jwt} and converts it into a {@link PreAuthenticatedAuthenticationToken}.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Change this doc.

@saragluna saragluna merged commit 9165125 into Azure:master Nov 30, 2020
@ZhuXiaoBing-cn ZhuXiaoBing-cn deleted the access_token_validate branch November 30, 2020 03:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

azure-spring All azure-spring related issues

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants