Skip to content

Commit 83acc44

Browse files
committed
Updates for referer redirect
1 parent ab697a0 commit 83acc44

3 files changed

Lines changed: 8 additions & 10 deletions

File tree

app/src/Home.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ class Home extends Component {
3535
if (port === ':3000') {
3636
port = ':8080';
3737
}
38-
window.location.href = '//' + window.location.hostname + port + '/login';
38+
window.location.href = '//' + window.location.hostname + port + '/private';
3939
}
4040

4141
logout() {

src/main/java/com/okta/developer/jugtours/config/SecurityConfiguration.java

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -84,17 +84,12 @@ public SavedRequest getRequest(HttpServletRequest request, HttpServletResponse r
8484

8585
@Override
8686
public HttpServletRequest getMatchingRequest(HttpServletRequest request, HttpServletResponse response) {
87-
DefaultSavedRequest saved = (DefaultSavedRequest) getRequest(request, response);
87+
SavedRequest saved = getRequest(request, response);
8888

8989
if (saved == null) {
9090
return null;
9191
}
9292

93-
if (!saved.doesRequestMatch(request, portResolver)) {
94-
log.debug("saved request doesn't match");
95-
return null;
96-
}
97-
9893
removeRequest(request, response);
9994

10095
return new SavedRequestAwareWrapper(saved, request);

src/main/java/com/okta/developer/jugtours/web/UserController.java

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,11 @@
44
import org.springframework.http.HttpStatus;
55
import org.springframework.http.ResponseEntity;
66
import org.springframework.security.core.annotation.AuthenticationPrincipal;
7+
import org.springframework.security.oauth2.client.authentication.OAuth2AuthenticationToken;
78
import org.springframework.security.oauth2.client.authentication.OAuth2LoginAuthenticationToken;
89
import org.springframework.security.oauth2.core.oidc.OidcIdToken;
910
import org.springframework.security.oauth2.core.oidc.user.OidcUser;
11+
import org.springframework.security.oauth2.core.user.OAuth2User;
1012
import org.springframework.web.bind.annotation.GetMapping;
1113
import org.springframework.web.bind.annotation.PostMapping;
1214
import org.springframework.web.bind.annotation.RestController;
@@ -27,9 +29,9 @@ public ResponseEntity<?> getUser(Principal principal) {
2729
if (principal == null) {
2830
return new ResponseEntity<>("", HttpStatus.OK);
2931
}
30-
if (principal instanceof OAuth2LoginAuthenticationToken) {
31-
OidcUser authentication = (OidcUser) principal;
32-
Map<String, Object> details = authentication.getUserInfo().getClaims();
32+
if (principal instanceof OAuth2AuthenticationToken) {
33+
OAuth2User authentication = ((OAuth2AuthenticationToken) principal).getPrincipal();
34+
Map<String, Object> details = authentication.getAttributes();
3335
return ResponseEntity.ok().body(details);
3436
} else {
3537
return ResponseEntity.ok().body(principal.getName());
@@ -40,6 +42,7 @@ public ResponseEntity<?> getUser(Principal principal) {
4042
public ResponseEntity<?> logout(HttpServletRequest request,
4143
@AuthenticationPrincipal(expression = "idToken") OidcIdToken idToken) {
4244
// send logout URL to client so they can initiate logout - doesn't work from the server side
45+
// Make it easier: https://github.com/spring-projects/spring-security/issues/5540
4346
String logoutUrl = issuerUri + "/v1/logout";
4447

4548
Map<String, String> logoutDetails = new HashMap<>();

0 commit comments

Comments
 (0)