org.springframework.security.authentication.AccountExpiredException Java Examples
The following examples show how to use
org.springframework.security.authentication.AccountExpiredException.
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example. You may check out the related API usage on the sidebar.
Example #1
Source File: AbstractUserDetailsAuthenticationProvider.java From Taroco with Apache License 2.0 | 5 votes |
@Override public void check(UserDetails user) { if (!user.isAccountNonLocked()) { log.debug("User account is locked"); throw new LockedException(AbstractUserDetailsAuthenticationProvider.this.messages.getMessage("AbstractUserDetailsAuthenticationProvider.locked", "User account is locked")); } else if (!user.isEnabled()) { log.debug("User account is disabled"); throw new DisabledException(AbstractUserDetailsAuthenticationProvider.this.messages.getMessage("AbstractUserDetailsAuthenticationProvider.disabled", "User is disabled")); } else if (!user.isAccountNonExpired()) { log.debug("User account is expired"); throw new AccountExpiredException(AbstractUserDetailsAuthenticationProvider.this.messages.getMessage("AbstractUserDetailsAuthenticationProvider.expired", "User account has expired")); } }
Example #2
Source File: TokenProviderUtility.java From Insights with Apache License 2.0 | 5 votes |
/** * Used to verify received token with cached token * * @param token * @return * @throws AuthorizationServiceException * @throws AuthenticationCredentialsNotFoundException * @throws AccountExpiredException * @throws InsightsCustomException */ public boolean verifyToken(String token) throws AuthorizationServiceException, AuthenticationCredentialsNotFoundException, AccountExpiredException, InsightsCustomException { boolean isVerify = Boolean.FALSE; boolean isTokenExistsInCache = Boolean.FALSE; boolean validateTokenDate = Boolean.FALSE; //log.debug(" In verifyToken "); try { String authToken = ValidationUtils.cleanXSS(token); if (authToken == null || authToken.isEmpty()) { log.error("authToken is null or empty"); throw new InsightsCustomException("authToken is null or empty"); } // parse the JWS and verify its HMAC SignedJWT signedJWT = SignedJWT.parse(authToken); JWSVerifier verifier = new MACVerifier(signingKey); isVerify = signedJWT.verify(verifier); String id = signedJWT.getJWTClaimsSet().getJWTID(); String tokenValueFromCache = null; if (TokenProviderUtility.tokenCache != null) { tokenValueFromCache = TokenProviderUtility.tokenCache.get(id); } else { log.error("cache is not initilize properly"); } if (tokenValueFromCache == null) { log.debug("No token found in cache"); } else if (tokenValueFromCache.equalsIgnoreCase(authToken)) { //log.debug("Token value matched in cache === "); isTokenExistsInCache = Boolean.TRUE; } else { log.error("Token value not matched in cache=== "); } //log.debug("alice after " + signedJWT.getJWTClaimsSet().getSubject()); //log.debug("cognizant.com " + signedJWT.getJWTClaimsSet().getIssuer()); //log.debug("Exceperation Time after " + signedJWT.getJWTClaimsSet().getExpirationTime()); log.debug("Check date of token with current date {} ", new Date().before(signedJWT.getJWTClaimsSet().getExpirationTime()));//after validateTokenDate = new Date().before(signedJWT.getJWTClaimsSet().getExpirationTime());//after } catch (Exception e) { log.error(e); log.error(" Exception while validating token {} ", e.getMessage()); isVerify = Boolean.FALSE; throw new InsightsCustomException("Exception while varifing token ==== " + e.getMessage()); } if (!isVerify) { log.debug("Token signuture not match "); isVerify = Boolean.FALSE; throw new AuthorizationServiceException("Token signuture not match"); } else if (!isTokenExistsInCache) { log.error("Token Not matched "); isVerify = Boolean.FALSE; throw new AuthenticationCredentialsNotFoundException("Token not found in cache"); } else if (!validateTokenDate) { isVerify = Boolean.FALSE; throw new AccountExpiredException("Token Expire"); } else { log.debug("Token verified sucessfully ==== "); isVerify = Boolean.TRUE; } log.debug(" is Token Verify ==== {} ", isVerify); return isVerify; }
Example #3
Source File: OneOffSpringCommonFrameworkExceptionHandlerListenerTest.java From backstopper with Apache License 2.0 | 5 votes |
@DataProvider public static List<List<Throwable>> unauthorized401ExceptionsDataProvider() { return Stream.<Throwable>of( new BadCredentialsException("foo"), new InsufficientAuthenticationException("foo"), new AuthenticationCredentialsNotFoundException("foo"), new LockedException("foo"), new DisabledException("foo"), new CredentialsExpiredException("foo"), new AccountExpiredException("foo"), new UsernameNotFoundException("foo"), new RemoteAuthenticationException("foo") ).map(Collections::singletonList) .collect(Collectors.toList()); }
Example #4
Source File: GlobalExceptionHandler.java From RuoYi-Vue with MIT License | 4 votes |
@ExceptionHandler(AccountExpiredException.class) public AjaxResult handleAccountExpiredException(AccountExpiredException e) { log.error(e.getMessage(), e); return AjaxResult.error(e.getMessage()); }
Example #5
Source File: BExceptionHandler.java From pre with GNU General Public License v3.0 | 4 votes |
@ExceptionHandler(AccountExpiredException.class) public R handleAccountExpiredException(AccountExpiredException e) { log.error(e.getMessage(), e); return R.error(e.getMessage()); }
Example #6
Source File: GlobalExceptionHandler.java From DimpleBlog with Apache License 2.0 | 4 votes |
@ExceptionHandler(AccountExpiredException.class) public AjaxResult handleAccountExpiredException(AccountExpiredException e) { log.error(e.getMessage(), e); return AjaxResult.error(e.getMessage()); }