/** * The date/time that the token was created. */ public Date getCreationTime() { return new Date(token.getCreationTime()); }
/** * The number of days until the token expires, rounded down to an integer. */ public int getDaysTillExpiration() { long millisTillExpiration = (token.getCreationTime() + token.getTimeToLive()) - System.currentTimeMillis(); if (millisTillExpiration < 0) { millisTillExpiration = 0; } return (int) (millisTillExpiration / (1000 * 60 * 60 * 24)); } }
/** * The date/time at which the token will expire. */ public Date getExpirationTime() { return new Date(token.getCreationTime() + token.getTimeToLive()); }
public static Matcher<? super ServiceProviderToken> equalTo(ServiceProviderToken token) { // Hamcrest's is/equalTo matcher uses Object.equals so Consumer and Session properties // need to be explicitly checked Consumer consumer = token.getConsumer(); Matcher<?> consumerMatcher = consumer == null ? nullValue() : samePropertyValuesAs(consumer); ServiceProviderToken.Session session = token.getSession(); Matcher<?> sessionMatcher = session == null ? nullValue() : samePropertyValuesAs(session); return allOf(hasProperty("consumer", consumerMatcher), hasProperty("session", sessionMatcher), hasProperty("authorization", is(token.getAuthorization())), hasProperty("callback", is(token.getCallback())), hasProperty("creationTime", is(token.getCreationTime())), hasProperty("timeToLive", is(token.getTimeToLive())), hasProperty("user", is(token.getUser())), hasProperty("verifier", is(token.getVerifier())), hasProperty("version", is(token.getVersion())), hasProperty("properties", is(token.getProperties())), hasProperty("token", is(token.getToken())), hasProperty("tokenSecret", is(token.getTokenSecret()))); }
LOG.debug(String.format("3-Legged-OAuth token rejected. Token has expired. Token creation time [%d] time to live [%d] clock (contains logging delay) [%d]", token.getCreationTime(), token.getTimeToLive(), clock.timeInMilliseconds()));
private static void setTokenData(OAuthAccessor accessor, ServiceProviderToken token) { Tokens.setCommonTokenData(accessor, token); if (token.isRequestToken()) { if (token.getAuthorization() == Authorization.AUTHORIZED) { accessor.setProperty(Tokens.AccessorProperty.USER, token.getUser()); accessor.setProperty(Tokens.AccessorProperty.AUTHORIZED, true); } else if (token.getAuthorization() == Authorization.DENIED) { accessor.setProperty(Tokens.AccessorProperty.USER, token.getUser()); accessor.setProperty(Tokens.AccessorProperty.AUTHORIZED, false); } } else { accessor.accessToken = token.getToken(); accessor.setProperty(Tokens.AccessorProperty.USER, token.getUser()); accessor.setProperty(Tokens.AccessorProperty.AUTHORIZED, true); } accessor.tokenSecret = token.getTokenSecret(); accessor.setProperty(Tokens.AccessorProperty.CREATION_TIME, token.getCreationTime()); } }