From 70e8357ec2d648deb69aa79484c7f9d47957eb59 Mon Sep 17 00:00:00 2001
From: 克 刘 <4345453@qq.com>
Date: Thu, 18 Jun 2020 15:49:38 +0800
Subject: [PATCH] 增强token,实现账号异地登录删除之前token,重新生成新的token

---
 kidgrow-uaa/kidgrow-uaa-server/src/main/java/com/kidgrow/oauth2/handler/SingleTokenServices.java      |  308 ++++++++++++++++++++++++++++++++++++++
 kidgrow-uaa/kidgrow-uaa-server/src/main/java/com/kidgrow/oauth2/config/AuthorizationServerConfig.java |   55 ++++++
 kidgrow-uaa/kidgrow-uaa-server/src/main/java/com/kidgrow/oauth2/handler/KidgrowTokenServices.java     |  115 ++++++++++++++
 3 files changed, 477 insertions(+), 1 deletions(-)

diff --git a/kidgrow-uaa/kidgrow-uaa-server/src/main/java/com/kidgrow/oauth2/config/AuthorizationServerConfig.java b/kidgrow-uaa/kidgrow-uaa-server/src/main/java/com/kidgrow/oauth2/config/AuthorizationServerConfig.java
index 5672172..aca478e 100644
--- a/kidgrow-uaa/kidgrow-uaa-server/src/main/java/com/kidgrow/oauth2/config/AuthorizationServerConfig.java
+++ b/kidgrow-uaa/kidgrow-uaa-server/src/main/java/com/kidgrow/oauth2/config/AuthorizationServerConfig.java
@@ -1,10 +1,15 @@
 package com.kidgrow.oauth2.config;
 
+import com.kidgrow.oauth2.handler.SingleTokenServices;
 import com.kidgrow.oauth2.service.impl.RedisClientDetailsService;
 import org.springframework.beans.factory.annotation.Autowired;
 import org.springframework.boot.autoconfigure.AutoConfigureAfter;
+import org.springframework.context.annotation.Bean;
 import org.springframework.context.annotation.Configuration;
+import org.springframework.context.annotation.Primary;
 import org.springframework.security.authentication.AuthenticationManager;
+import org.springframework.security.authentication.ProviderManager;
+import org.springframework.security.core.userdetails.UserDetailsByNameServiceWrapper;
 import org.springframework.security.core.userdetails.UserDetailsService;
 import org.springframework.security.oauth2.config.annotation.configurers.ClientDetailsServiceConfigurer;
 import org.springframework.security.oauth2.config.annotation.web.configuration.AuthorizationServerConfigurerAdapter;
@@ -17,6 +22,7 @@
 import org.springframework.security.oauth2.provider.token.TokenEnhancerChain;
 import org.springframework.security.oauth2.provider.token.TokenStore;
 import org.springframework.security.oauth2.provider.token.store.JwtAccessTokenConverter;
+import org.springframework.security.web.authentication.preauth.PreAuthenticatedAuthenticationProvider;
 
 import javax.annotation.Resource;
 import java.util.Arrays;
@@ -45,6 +51,9 @@
 
     @Autowired
     private TokenStore tokenStore;
+
+//    @Autowired
+//    private CustomRedisTokenStore tokenStore;
 
     @Autowired(required = false)
     private JwtAccessTokenConverter jwtAccessTokenConverter;
@@ -77,13 +86,57 @@
                 endpoints.accessTokenConverter(jwtAccessTokenConverter);
             }
         }
-        endpoints.tokenStore(tokenStore)
+        endpoints
+                //扩展tokenServices
+//                .tokenServices(tokenServices(endpoints))
+                .tokenServices(KidgrowTokenServices())
                 .authenticationManager(authenticationManager)
                 .userDetailsService(userDetailsService)
+//                .tokenStore(tokenStore)
                 .authorizationCodeServices(authorizationCodeServices)
                 .exceptionTranslator(webResponseExceptionTranslator);
     }
 
+
+    @Bean
+    @Primary
+    public SingleTokenServices KidgrowTokenServices(){
+        SingleTokenServices tokenServices = new SingleTokenServices();
+        tokenServices.setTokenStore(tokenStore);
+        tokenServices.setSupportRefreshToken(true);//支持刷新token
+        tokenServices.setReuseRefreshToken(true);
+        addUserDetailsService(tokenServices, this.userDetailsService);
+        return tokenServices;
+    }
+
+//    private SingleTokenServices tokenServices(AuthorizationServerEndpointsConfigurer endpoints) {
+//        SingleTokenServices tokenServices = new SingleTokenServices();
+//        tokenServices.setTokenStore(tokenStore);
+//        tokenServices.setSupportRefreshToken(true);//支持刷新token
+//        tokenServices.setReuseRefreshToken(true);
+//        tokenServices.setClientDetailsService(endpoints.getClientDetailsService());
+//        tokenServices.setTokenEnhancer(endpoints.getTokenEnhancer());
+//        addUserDetailsService(tokenServices, this.userDetailsService);
+//        return tokenServices;
+//    }
+//    private void addUserDetailsService(SingleTokenServices tokenServices, UserDetailsService userDetailsService) {
+//        if (userDetailsService != null) {
+//            PreAuthenticatedAuthenticationProvider provider = new PreAuthenticatedAuthenticationProvider();
+//            provider.setPreAuthenticatedUserDetailsService(new UserDetailsByNameServiceWrapper<>(
+//                    userDetailsService));
+//            tokenServices.setAuthenticationManager(new ProviderManager(Arrays.asList(provider)));
+//        }
+//    }
+
+    private void addUserDetailsService(SingleTokenServices tokenServices, UserDetailsService userDetailsService) {
+        if (userDetailsService != null) {
+            PreAuthenticatedAuthenticationProvider provider = new PreAuthenticatedAuthenticationProvider();
+            provider.setPreAuthenticatedUserDetailsService(new UserDetailsByNameServiceWrapper<>(
+                    userDetailsService));
+            tokenServices.setAuthenticationManager(new ProviderManager(Arrays.asList(provider)));
+        }
+    }
+
     /**
      * 配置应用名称 应用id
      * 配置OAuth2的客户端相关信息
diff --git a/kidgrow-uaa/kidgrow-uaa-server/src/main/java/com/kidgrow/oauth2/handler/KidgrowTokenServices.java b/kidgrow-uaa/kidgrow-uaa-server/src/main/java/com/kidgrow/oauth2/handler/KidgrowTokenServices.java
new file mode 100644
index 0000000..3627bec
--- /dev/null
+++ b/kidgrow-uaa/kidgrow-uaa-server/src/main/java/com/kidgrow/oauth2/handler/KidgrowTokenServices.java
@@ -0,0 +1,115 @@
+package com.kidgrow.oauth2.handler;
+
+import org.springframework.beans.factory.annotation.Autowired;
+import org.springframework.security.authentication.AuthenticationManager;
+import org.springframework.security.core.AuthenticationException;
+import org.springframework.security.oauth2.common.*;
+import org.springframework.security.oauth2.provider.ClientDetailsService;
+import org.springframework.security.oauth2.provider.OAuth2Authentication;
+import org.springframework.security.oauth2.provider.token.DefaultTokenServices;
+import org.springframework.security.oauth2.provider.token.TokenEnhancer;
+import org.springframework.security.oauth2.provider.token.TokenStore;
+
+import java.util.Date;
+import java.util.UUID;
+
+/**
+ * 石家庄喜高科技有限责任公司 版权所有 © Copyright 2020<br>
+ *
+ * @Description: <br>
+ * @Project: <br>
+ * @CreateDate: Created in 2020/6/18 12:41 <br>
+ * @Author: <a href="4345453@kidgrow.com">liuke</a>
+ */
+public class KidgrowTokenServices extends DefaultTokenServices {
+
+    private int refreshTokenValiditySeconds = 2592000;
+    private int accessTokenValiditySeconds = 43200;
+    private boolean supportRefreshToken = false;
+    private boolean reuseRefreshToken = true;
+    private ClientDetailsService clientDetailsService;
+    private TokenEnhancer accessTokenEnhancer;
+    private AuthenticationManager authenticationManager;
+
+    @Autowired
+    private TokenStore tokenStore;
+
+
+
+    @Override
+    public OAuth2AccessToken createAccessToken(OAuth2Authentication authentication) throws AuthenticationException {
+        OAuth2AccessToken existingAccessToken = super.getAccessToken(authentication);
+        OAuth2RefreshToken refreshToken = null;
+        if (existingAccessToken != null) {
+//            if (!existingAccessToken.isExpired()) {
+//                this.tokenStore.storeAccessToken(existingAccessToken, authentication);
+//                return existingAccessToken;
+//            }
+            existingAccessToken.getRefreshToken();
+            if (existingAccessToken.getRefreshToken() != null) {
+                refreshToken = existingAccessToken.getRefreshToken();
+                this.tokenStore.removeRefreshToken(refreshToken);
+            }
+
+            this.tokenStore.removeAccessToken(existingAccessToken);
+        }
+
+
+        if (refreshToken == null) {
+            refreshToken = this.createRefreshToken(authentication);
+        } else if (refreshToken instanceof ExpiringOAuth2RefreshToken) {
+            ExpiringOAuth2RefreshToken expiring = (ExpiringOAuth2RefreshToken)refreshToken;
+            if (System.currentTimeMillis() > expiring.getExpiration().getTime()) {
+                refreshToken = this.createRefreshToken(authentication);
+            }
+        }
+
+        OAuth2AccessToken accessToken = this.createAccessToken(authentication, refreshToken);
+        this.tokenStore.storeAccessToken(accessToken, authentication);
+        refreshToken = accessToken.getRefreshToken();
+        if (refreshToken != null) {
+            this.tokenStore.storeRefreshToken(refreshToken, authentication);
+        }
+
+        return accessToken;
+    }
+
+//    @Override
+//    public void setTokenStore(TokenStore tokenStore) {
+//        this.tokenStore = tokenStore;
+//    }
+
+
+
+    @Override
+    public void setSupportRefreshToken(boolean supportRefreshToken) {
+        this.supportRefreshToken = supportRefreshToken;
+    }
+
+    @Override
+    public void setReuseRefreshToken(boolean reuseRefreshToken) {
+        this.reuseRefreshToken = reuseRefreshToken;
+    }
+
+    private OAuth2AccessToken createAccessToken(OAuth2Authentication authentication, OAuth2RefreshToken refreshToken) {
+        DefaultOAuth2AccessToken token = new DefaultOAuth2AccessToken(UUID.randomUUID().toString());
+        int validitySeconds = this.getAccessTokenValiditySeconds(authentication.getOAuth2Request());
+        if (validitySeconds > 0) {
+            token.setExpiration(new Date(System.currentTimeMillis() + (long)validitySeconds * 1000L));
+        }
+
+        token.setRefreshToken(refreshToken);
+        token.setScope(authentication.getOAuth2Request().getScope());
+        return (OAuth2AccessToken)(this.accessTokenEnhancer != null ? this.accessTokenEnhancer.enhance(token, authentication) : token);
+    }
+
+    private OAuth2RefreshToken createRefreshToken(OAuth2Authentication authentication) {
+        if (!this.isSupportRefreshToken(authentication.getOAuth2Request())) {
+            return null;
+        } else {
+            int validitySeconds = this.getRefreshTokenValiditySeconds(authentication.getOAuth2Request());
+            String value = UUID.randomUUID().toString();
+            return (OAuth2RefreshToken)(validitySeconds > 0 ? new DefaultExpiringOAuth2RefreshToken(value, new Date(System.currentTimeMillis() + (long)validitySeconds * 1000L)) : new DefaultOAuth2RefreshToken(value));
+        }
+    }
+}
diff --git a/kidgrow-uaa/kidgrow-uaa-server/src/main/java/com/kidgrow/oauth2/handler/SingleTokenServices.java b/kidgrow-uaa/kidgrow-uaa-server/src/main/java/com/kidgrow/oauth2/handler/SingleTokenServices.java
new file mode 100644
index 0000000..93a2a16
--- /dev/null
+++ b/kidgrow-uaa/kidgrow-uaa-server/src/main/java/com/kidgrow/oauth2/handler/SingleTokenServices.java
@@ -0,0 +1,308 @@
+package com.kidgrow.oauth2.handler;
+/**
+ * 石家庄喜高科技有限责任公司 版权所有 © Copyright 2020<br>
+ *
+ * @Description: <br>
+ * @Project: <br>
+ * @CreateDate: Created in 2020/6/18 09:17 <br>
+ * @Author: <a href="4345453@kidgrow.com">liuke</a>
+ */
+
+import org.springframework.beans.factory.InitializingBean;
+import org.springframework.security.authentication.AuthenticationManager;
+import org.springframework.security.core.Authentication;
+import org.springframework.security.core.AuthenticationException;
+import org.springframework.security.oauth2.common.*;
+import org.springframework.security.oauth2.common.exceptions.InvalidGrantException;
+import org.springframework.security.oauth2.common.exceptions.InvalidScopeException;
+import org.springframework.security.oauth2.common.exceptions.InvalidTokenException;
+import org.springframework.security.oauth2.provider.*;
+import org.springframework.security.oauth2.provider.token.*;
+import org.springframework.security.web.authentication.preauth.PreAuthenticatedAuthenticationToken;
+import org.springframework.transaction.annotation.Transactional;
+import org.springframework.util.Assert;
+
+import java.util.Date;
+import java.util.Set;
+import java.util.UUID;
+
+/** @deprecated */
+@Deprecated
+public class SingleTokenServices implements AuthorizationServerTokenServices, ResourceServerTokenServices, ConsumerTokenServices, InitializingBean {
+    private int refreshTokenValiditySeconds = 2592000;
+    private int accessTokenValiditySeconds = 43200;
+    private boolean supportRefreshToken = false;
+    private boolean reuseRefreshToken = true;
+    private TokenStore tokenStore;
+    private ClientDetailsService clientDetailsService;
+    private TokenEnhancer accessTokenEnhancer;
+    private AuthenticationManager authenticationManager;
+
+    public SingleTokenServices() {
+    }
+
+    public void afterPropertiesSet() throws Exception {
+        Assert.notNull(this.tokenStore, "tokenStore must be set");
+    }
+
+    @Transactional
+    public OAuth2AccessToken createAccessToken(OAuth2Authentication authentication) throws AuthenticationException {
+        OAuth2AccessToken existingAccessToken = this.tokenStore.getAccessToken(authentication);
+        OAuth2RefreshToken refreshToken = null;
+        if (existingAccessToken != null) {
+//            if (!existingAccessToken.isExpired()) {
+//                this.tokenStore.storeAccessToken(existingAccessToken, authentication);
+//                return existingAccessToken;
+//            }
+
+            if (existingAccessToken.getRefreshToken() != null) {
+                refreshToken = existingAccessToken.getRefreshToken();
+                this.tokenStore.removeRefreshToken(refreshToken);
+            }
+
+            this.tokenStore.removeAccessToken(existingAccessToken);
+        }
+
+        if (refreshToken == null) {
+            refreshToken = this.createRefreshToken(authentication);
+        } else if (refreshToken instanceof ExpiringOAuth2RefreshToken) {
+            ExpiringOAuth2RefreshToken expiring = (ExpiringOAuth2RefreshToken)refreshToken;
+            if (System.currentTimeMillis() > expiring.getExpiration().getTime()) {
+                refreshToken = this.createRefreshToken(authentication);
+            }
+        }
+
+        OAuth2AccessToken accessToken = this.createAccessToken(authentication, refreshToken);
+        this.tokenStore.storeAccessToken(accessToken, authentication);
+        refreshToken = accessToken.getRefreshToken();
+        if (refreshToken != null) {
+            this.tokenStore.storeRefreshToken(refreshToken, authentication);
+        }
+
+        return accessToken;
+    }
+
+    @Transactional(
+            noRollbackFor = {InvalidTokenException.class, InvalidGrantException.class}
+    )
+    public OAuth2AccessToken refreshAccessToken(String refreshTokenValue, TokenRequest tokenRequest) throws AuthenticationException {
+        if (!this.supportRefreshToken) {
+            throw new InvalidGrantException("Invalid refresh token: " + refreshTokenValue);
+        } else {
+            OAuth2RefreshToken refreshToken = this.tokenStore.readRefreshToken(refreshTokenValue);
+            if (refreshToken == null) {
+                throw new InvalidGrantException("Invalid refresh token: " + refreshTokenValue);
+            } else {
+                OAuth2Authentication authentication = this.tokenStore.readAuthenticationForRefreshToken(refreshToken);
+                if (this.authenticationManager != null && !authentication.isClientOnly()) {
+                    Authentication user = new PreAuthenticatedAuthenticationToken(authentication.getUserAuthentication(), "", authentication.getAuthorities());
+                    user = this.authenticationManager.authenticate(user);
+                    Object details = authentication.getDetails();
+                    authentication = new OAuth2Authentication(authentication.getOAuth2Request(), user);
+                    authentication.setDetails(details);
+                }
+
+                String clientId = authentication.getOAuth2Request().getClientId();
+                if (clientId != null && clientId.equals(tokenRequest.getClientId())) {
+                    this.tokenStore.removeAccessTokenUsingRefreshToken(refreshToken);
+                    if (this.isExpired(refreshToken)) {
+                        this.tokenStore.removeRefreshToken(refreshToken);
+                        throw new InvalidTokenException("Invalid refresh token (expired): " + refreshToken);
+                    } else {
+                        authentication = this.createRefreshedAuthentication(authentication, tokenRequest);
+                        if (!this.reuseRefreshToken) {
+                            this.tokenStore.removeRefreshToken(refreshToken);
+                            refreshToken = this.createRefreshToken(authentication);
+                        }
+
+                        OAuth2AccessToken accessToken = this.createAccessToken(authentication, refreshToken);
+                        this.tokenStore.storeAccessToken(accessToken, authentication);
+                        if (!this.reuseRefreshToken) {
+                            this.tokenStore.storeRefreshToken(accessToken.getRefreshToken(), authentication);
+                        }
+
+                        return accessToken;
+                    }
+                } else {
+                    throw new InvalidGrantException("Wrong client for this refresh token: " + refreshTokenValue);
+                }
+            }
+        }
+    }
+
+    public OAuth2AccessToken getAccessToken(OAuth2Authentication authentication) {
+        return this.tokenStore.getAccessToken(authentication);
+    }
+
+    private OAuth2Authentication createRefreshedAuthentication(OAuth2Authentication authentication, TokenRequest request) {
+        Set<String> scope = request.getScope();
+        OAuth2Request clientAuth = authentication.getOAuth2Request().refresh(request);
+        if (scope != null && !scope.isEmpty()) {
+            Set<String> originalScope = clientAuth.getScope();
+            if (originalScope == null || !originalScope.containsAll(scope)) {
+                throw new InvalidScopeException("Unable to narrow the scope of the client authentication to " + scope + ".", originalScope);
+            }
+
+            clientAuth = clientAuth.narrowScope(scope);
+        }
+
+        OAuth2Authentication narrowed = new OAuth2Authentication(clientAuth, authentication.getUserAuthentication());
+        return narrowed;
+    }
+
+    protected boolean isExpired(OAuth2RefreshToken refreshToken) {
+        if (!(refreshToken instanceof ExpiringOAuth2RefreshToken)) {
+            return false;
+        } else {
+            ExpiringOAuth2RefreshToken expiringToken = (ExpiringOAuth2RefreshToken)refreshToken;
+            return expiringToken.getExpiration() == null || System.currentTimeMillis() > expiringToken.getExpiration().getTime();
+        }
+    }
+
+    public OAuth2AccessToken readAccessToken(String accessToken) {
+        return this.tokenStore.readAccessToken(accessToken);
+    }
+
+    public OAuth2Authentication loadAuthentication(String accessTokenValue) throws AuthenticationException, InvalidTokenException {
+        OAuth2AccessToken accessToken = this.tokenStore.readAccessToken(accessTokenValue);
+        if (accessToken == null) {
+            throw new InvalidTokenException("Invalid access token: " + accessTokenValue);
+        } else if (accessToken.isExpired()) {
+            this.tokenStore.removeAccessToken(accessToken);
+            throw new InvalidTokenException("Access token expired: " + accessTokenValue);
+        } else {
+            OAuth2Authentication result = this.tokenStore.readAuthentication(accessToken);
+            if (result == null) {
+                throw new InvalidTokenException("Invalid access token: " + accessTokenValue);
+            } else {
+                if (this.clientDetailsService != null) {
+                    String clientId = result.getOAuth2Request().getClientId();
+
+                    try {
+                        this.clientDetailsService.loadClientByClientId(clientId);
+                    } catch (ClientRegistrationException var6) {
+                        throw new InvalidTokenException("Client not valid: " + clientId, var6);
+                    }
+                }
+
+                return result;
+            }
+        }
+    }
+
+    public String getClientId(String tokenValue) {
+        OAuth2Authentication authentication = this.tokenStore.readAuthentication(tokenValue);
+        if (authentication == null) {
+            throw new InvalidTokenException("Invalid access token: " + tokenValue);
+        } else {
+            OAuth2Request clientAuth = authentication.getOAuth2Request();
+            if (clientAuth == null) {
+                throw new InvalidTokenException("Invalid access token (no client id): " + tokenValue);
+            } else {
+                return clientAuth.getClientId();
+            }
+        }
+    }
+
+    public boolean revokeToken(String tokenValue) {
+        OAuth2AccessToken accessToken = this.tokenStore.readAccessToken(tokenValue);
+        if (accessToken == null) {
+            return false;
+        } else {
+            if (accessToken.getRefreshToken() != null) {
+                this.tokenStore.removeRefreshToken(accessToken.getRefreshToken());
+            }
+
+            this.tokenStore.removeAccessToken(accessToken);
+            return true;
+        }
+    }
+
+    private OAuth2RefreshToken createRefreshToken(OAuth2Authentication authentication) {
+        if (!this.isSupportRefreshToken(authentication.getOAuth2Request())) {
+            return null;
+        } else {
+            int validitySeconds = this.getRefreshTokenValiditySeconds(authentication.getOAuth2Request());
+            String value = UUID.randomUUID().toString();
+            return (OAuth2RefreshToken)(validitySeconds > 0 ? new DefaultExpiringOAuth2RefreshToken(value, new Date(System.currentTimeMillis() + (long)validitySeconds * 1000L)) : new DefaultOAuth2RefreshToken(value));
+        }
+    }
+
+    private OAuth2AccessToken createAccessToken(OAuth2Authentication authentication, OAuth2RefreshToken refreshToken) {
+        DefaultOAuth2AccessToken token = new DefaultOAuth2AccessToken(UUID.randomUUID().toString());
+        int validitySeconds = this.getAccessTokenValiditySeconds(authentication.getOAuth2Request());
+        if (validitySeconds > 0) {
+            token.setExpiration(new Date(System.currentTimeMillis() + (long)validitySeconds * 1000L));
+        }
+
+        token.setRefreshToken(refreshToken);
+        token.setScope(authentication.getOAuth2Request().getScope());
+        return (OAuth2AccessToken)(this.accessTokenEnhancer != null ? this.accessTokenEnhancer.enhance(token, authentication) : token);
+    }
+
+    protected int getAccessTokenValiditySeconds(OAuth2Request clientAuth) {
+        if (this.clientDetailsService != null) {
+            ClientDetails client = this.clientDetailsService.loadClientByClientId(clientAuth.getClientId());
+            Integer validity = client.getAccessTokenValiditySeconds();
+            if (validity != null) {
+                return validity;
+            }
+        }
+
+        return this.accessTokenValiditySeconds;
+    }
+
+    protected int getRefreshTokenValiditySeconds(OAuth2Request clientAuth) {
+        if (this.clientDetailsService != null) {
+            ClientDetails client = this.clientDetailsService.loadClientByClientId(clientAuth.getClientId());
+            Integer validity = client.getRefreshTokenValiditySeconds();
+            if (validity != null) {
+                return validity;
+            }
+        }
+
+        return this.refreshTokenValiditySeconds;
+    }
+
+    protected boolean isSupportRefreshToken(OAuth2Request clientAuth) {
+        if (this.clientDetailsService != null) {
+            ClientDetails client = this.clientDetailsService.loadClientByClientId(clientAuth.getClientId());
+            return client.getAuthorizedGrantTypes().contains("refresh_token");
+        } else {
+            return this.supportRefreshToken;
+        }
+    }
+
+    public void setTokenEnhancer(TokenEnhancer accessTokenEnhancer) {
+        this.accessTokenEnhancer = accessTokenEnhancer;
+    }
+
+    public void setRefreshTokenValiditySeconds(int refreshTokenValiditySeconds) {
+        this.refreshTokenValiditySeconds = refreshTokenValiditySeconds;
+    }
+
+    public void setAccessTokenValiditySeconds(int accessTokenValiditySeconds) {
+        this.accessTokenValiditySeconds = accessTokenValiditySeconds;
+    }
+
+    public void setSupportRefreshToken(boolean supportRefreshToken) {
+        this.supportRefreshToken = supportRefreshToken;
+    }
+
+    public void setReuseRefreshToken(boolean reuseRefreshToken) {
+        this.reuseRefreshToken = reuseRefreshToken;
+    }
+
+    public void setTokenStore(TokenStore tokenStore) {
+        this.tokenStore = tokenStore;
+    }
+
+    public void setAuthenticationManager(AuthenticationManager authenticationManager) {
+        this.authenticationManager = authenticationManager;
+    }
+
+    public void setClientDetailsService(ClientDetailsService clientDetailsService) {
+        this.clientDetailsService = clientDetailsService;
+    }
+}
+

--
Gitblit v1.8.0