Improvements to #7434
This commit is contained in:
parent
6e33b09205
commit
0873b9e158
@ -42,7 +42,6 @@ import org.thingsboard.server.common.data.exception.ThingsboardErrorCode;
|
|||||||
import org.thingsboard.server.common.data.exception.ThingsboardException;
|
import org.thingsboard.server.common.data.exception.ThingsboardException;
|
||||||
import org.thingsboard.server.common.data.id.TenantId;
|
import org.thingsboard.server.common.data.id.TenantId;
|
||||||
import org.thingsboard.server.common.data.security.UserCredentials;
|
import org.thingsboard.server.common.data.security.UserCredentials;
|
||||||
import org.thingsboard.server.common.data.security.event.UserAuthDataChangedEvent;
|
|
||||||
import org.thingsboard.server.common.data.security.event.UserCredentialsInvalidationEvent;
|
import org.thingsboard.server.common.data.security.event.UserCredentialsInvalidationEvent;
|
||||||
import org.thingsboard.server.common.data.security.event.UserSessionInvalidationEvent;
|
import org.thingsboard.server.common.data.security.event.UserSessionInvalidationEvent;
|
||||||
import org.thingsboard.server.common.data.security.model.SecuritySettings;
|
import org.thingsboard.server.common.data.security.model.SecuritySettings;
|
||||||
|
|||||||
@ -43,7 +43,6 @@ import org.thingsboard.server.common.data.page.PageData;
|
|||||||
import org.thingsboard.server.common.data.page.PageLink;
|
import org.thingsboard.server.common.data.page.PageLink;
|
||||||
import org.thingsboard.server.common.data.security.Authority;
|
import org.thingsboard.server.common.data.security.Authority;
|
||||||
import org.thingsboard.server.common.data.security.UserCredentials;
|
import org.thingsboard.server.common.data.security.UserCredentials;
|
||||||
import org.thingsboard.server.common.data.security.event.UserAuthDataChangedEvent;
|
|
||||||
import org.thingsboard.server.common.data.security.event.UserCredentialsInvalidationEvent;
|
import org.thingsboard.server.common.data.security.event.UserCredentialsInvalidationEvent;
|
||||||
import org.thingsboard.server.queue.util.TbCoreComponent;
|
import org.thingsboard.server.queue.util.TbCoreComponent;
|
||||||
import org.thingsboard.server.service.entitiy.user.TbUserService;
|
import org.thingsboard.server.service.entitiy.user.TbUserService;
|
||||||
|
|||||||
@ -17,6 +17,7 @@ package org.thingsboard.server.service.security.auth;
|
|||||||
|
|
||||||
import io.jsonwebtoken.Claims;
|
import io.jsonwebtoken.Claims;
|
||||||
import lombok.RequiredArgsConstructor;
|
import lombok.RequiredArgsConstructor;
|
||||||
|
import org.springframework.beans.factory.annotation.Qualifier;
|
||||||
import org.springframework.context.event.EventListener;
|
import org.springframework.context.event.EventListener;
|
||||||
import org.springframework.stereotype.Service;
|
import org.springframework.stereotype.Service;
|
||||||
import org.thingsboard.server.cache.TbTransactionalCache;
|
import org.thingsboard.server.cache.TbTransactionalCache;
|
||||||
@ -31,11 +32,16 @@ import java.util.Optional;
|
|||||||
import static java.util.concurrent.TimeUnit.MILLISECONDS;
|
import static java.util.concurrent.TimeUnit.MILLISECONDS;
|
||||||
|
|
||||||
@Service
|
@Service
|
||||||
@RequiredArgsConstructor
|
|
||||||
public class DefaultTokenOutdatingService implements TokenOutdatingService {
|
public class DefaultTokenOutdatingService implements TokenOutdatingService {
|
||||||
|
|
||||||
private final TbTransactionalCache<String, Long> cache;
|
private final TbTransactionalCache<String, Long> cache;
|
||||||
private final JwtTokenFactory tokenFactory;
|
private final JwtTokenFactory tokenFactory;
|
||||||
|
|
||||||
|
public DefaultTokenOutdatingService(@Qualifier("UsersSessionInvalidation") TbTransactionalCache<String, Long> cache, JwtTokenFactory tokenFactory) {
|
||||||
|
this.cache = cache;
|
||||||
|
this.tokenFactory = tokenFactory;
|
||||||
|
}
|
||||||
|
|
||||||
@EventListener(classes = UserAuthDataChangedEvent.class)
|
@EventListener(classes = UserAuthDataChangedEvent.class)
|
||||||
public void onUserAuthDataChanged(UserAuthDataChangedEvent event) {
|
public void onUserAuthDataChanged(UserAuthDataChangedEvent event) {
|
||||||
if (StringUtils.hasText(event.getId())) {
|
if (StringUtils.hasText(event.getId())) {
|
||||||
@ -48,10 +54,10 @@ public class DefaultTokenOutdatingService implements TokenOutdatingService {
|
|||||||
Claims claims = tokenFactory.parseTokenClaims(token).getBody();
|
Claims claims = tokenFactory.parseTokenClaims(token).getBody();
|
||||||
long issueTime = claims.getIssuedAt().getTime();
|
long issueTime = claims.getIssuedAt().getTime();
|
||||||
String sessionId = claims.get("sessionId", String.class);
|
String sessionId = claims.get("sessionId", String.class);
|
||||||
if (sessionId == null) {
|
if (isTokenOutdated(issueTime, userId.toString())){
|
||||||
return isTokenOutdated(issueTime, userId.toString());
|
return true;
|
||||||
} else {
|
} else {
|
||||||
return isTokenOutdated(issueTime, userId.toString()) || isTokenOutdated(issueTime, sessionId);
|
return sessionId != null && isTokenOutdated(issueTime, sessionId);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -16,11 +16,10 @@
|
|||||||
package org.thingsboard.server.service.security.auth;
|
package org.thingsboard.server.service.security.auth;
|
||||||
|
|
||||||
import org.thingsboard.server.common.data.id.UserId;
|
import org.thingsboard.server.common.data.id.UserId;
|
||||||
import org.thingsboard.server.common.data.security.event.UserAuthDataChangedEvent;
|
|
||||||
import org.thingsboard.server.common.data.security.model.JwtToken;
|
import org.thingsboard.server.common.data.security.model.JwtToken;
|
||||||
|
|
||||||
public interface TokenOutdatingService {
|
public interface TokenOutdatingService {
|
||||||
void onUserAuthDataChanged(UserAuthDataChangedEvent event);
|
|
||||||
|
|
||||||
boolean isOutdated(JwtToken token, UserId userId);
|
boolean isOutdated(JwtToken token, UserId userId);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -109,7 +109,7 @@ security:
|
|||||||
# JWT Token parameters
|
# JWT Token parameters
|
||||||
jwt:
|
jwt:
|
||||||
tokenExpirationTime: "${JWT_TOKEN_EXPIRATION_TIME:9000}" # Number of seconds (2.5 hours)
|
tokenExpirationTime: "${JWT_TOKEN_EXPIRATION_TIME:9000}" # Number of seconds (2.5 hours)
|
||||||
refreshTokenExpTime: "${JWT_REFRESH_TOKEN_EXPIRATION_TIME:604800}" # Number of seconds (1 week)
|
refreshTokenExpTime: "${JWT_REFRESH_TOKEN_EXPIRATION_TIME:604800}" # Number of seconds (1 week).
|
||||||
tokenIssuer: "${JWT_TOKEN_ISSUER:thingsboard.io}"
|
tokenIssuer: "${JWT_TOKEN_ISSUER:thingsboard.io}"
|
||||||
tokenSigningKey: "${JWT_TOKEN_SIGNING_KEY:thingsboardDefaultSigningKey}"
|
tokenSigningKey: "${JWT_TOKEN_SIGNING_KEY:thingsboardDefaultSigningKey}"
|
||||||
# Enable/disable access to Tenant Administrators JWT token by System Administrator or Customer Users JWT token by Tenant Administrator
|
# Enable/disable access to Tenant Administrators JWT token by System Administrator or Customer Users JWT token by Tenant Administrator
|
||||||
@ -420,9 +420,9 @@ cache:
|
|||||||
attributes:
|
attributes:
|
||||||
timeToLiveInMinutes: "${CACHE_SPECS_ATTRIBUTES_TTL:1440}"
|
timeToLiveInMinutes: "${CACHE_SPECS_ATTRIBUTES_TTL:1440}"
|
||||||
maxSize: "${CACHE_SPECS_ATTRIBUTES_MAX_SIZE:100000}"
|
maxSize: "${CACHE_SPECS_ATTRIBUTES_MAX_SIZE:100000}"
|
||||||
usersUpdateTime:
|
userSessionsInvalidation:
|
||||||
# MUST be the same as jwt refresh token expiration time, the value here represents 604800 seconds in minutes
|
# The value of this TTL is ignored and replaced by JWT refresh token expiration time
|
||||||
timeToLiveInMinutes: "${CACHE_SPECS_USERS_UPDATE_TIME_TTL:10080}"
|
timeToLiveInMinutes: "0"
|
||||||
maxSize: "${CACHE_SPECS_USERS_UPDATE_TIME_MAX_SIZE:10000}"
|
maxSize: "${CACHE_SPECS_USERS_UPDATE_TIME_MAX_SIZE:10000}"
|
||||||
otaPackages:
|
otaPackages:
|
||||||
timeToLiveInMinutes: "${CACHE_SPECS_OTA_PACKAGES_TTL:60}"
|
timeToLiveInMinutes: "${CACHE_SPECS_OTA_PACKAGES_TTL:60}"
|
||||||
|
|||||||
@ -21,6 +21,7 @@ import org.junit.runner.RunWith;
|
|||||||
import org.springframework.beans.factory.annotation.Autowired;
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
import org.springframework.boot.test.context.SpringBootContextLoader;
|
import org.springframework.boot.test.context.SpringBootContextLoader;
|
||||||
import org.springframework.boot.test.context.SpringBootTest;
|
import org.springframework.boot.test.context.SpringBootTest;
|
||||||
|
import org.springframework.context.ApplicationEventPublisher;
|
||||||
import org.springframework.context.annotation.ComponentScan;
|
import org.springframework.context.annotation.ComponentScan;
|
||||||
import org.springframework.security.authentication.CredentialsExpiredException;
|
import org.springframework.security.authentication.CredentialsExpiredException;
|
||||||
import org.springframework.test.annotation.DirtiesContext;
|
import org.springframework.test.annotation.DirtiesContext;
|
||||||
@ -69,8 +70,9 @@ import static org.mockito.Mockito.when;
|
|||||||
"security.jwt.tokenIssuer=test.io",
|
"security.jwt.tokenIssuer=test.io",
|
||||||
"security.jwt.tokenSigningKey=secret",
|
"security.jwt.tokenSigningKey=secret",
|
||||||
"security.jwt.tokenExpirationTime=600",
|
"security.jwt.tokenExpirationTime=600",
|
||||||
"security.jwt.refreshTokenExpTime=60",
|
"security.jwt.refreshTokenExpTime=15",
|
||||||
"cache.specs.usersUpdateTime.timeToLiveInMinutes=1"
|
// explicitly set the wrong value to check that it is NOT used.
|
||||||
|
"cache.specs.userSessionsInvalidation.timeToLiveInMinutes=2"
|
||||||
})
|
})
|
||||||
public class TokenOutdatingTest {
|
public class TokenOutdatingTest {
|
||||||
private JwtAuthenticationProvider accessTokenAuthenticationProvider;
|
private JwtAuthenticationProvider accessTokenAuthenticationProvider;
|
||||||
@ -79,6 +81,8 @@ public class TokenOutdatingTest {
|
|||||||
@Autowired
|
@Autowired
|
||||||
private TokenOutdatingService tokenOutdatingService;
|
private TokenOutdatingService tokenOutdatingService;
|
||||||
@Autowired
|
@Autowired
|
||||||
|
private ApplicationEventPublisher eventPublisher;
|
||||||
|
@Autowired
|
||||||
private JwtTokenFactory tokenFactory;
|
private JwtTokenFactory tokenFactory;
|
||||||
private SecurityUser securityUser;
|
private SecurityUser securityUser;
|
||||||
|
|
||||||
@ -107,8 +111,9 @@ public class TokenOutdatingTest {
|
|||||||
public void testOutdateOldUserTokens() throws Exception {
|
public void testOutdateOldUserTokens() throws Exception {
|
||||||
JwtToken jwtToken = tokenFactory.createAccessJwtToken(securityUser);
|
JwtToken jwtToken = tokenFactory.createAccessJwtToken(securityUser);
|
||||||
|
|
||||||
SECONDS.sleep(1); // need to wait before outdating so that outdatage time is strictly after token issue time
|
// Token outdatage time is rounded to 1 sec. Need to wait before outdating so that outdatage time is strictly after token issue time
|
||||||
tokenOutdatingService.onUserAuthDataChanged(new UserCredentialsInvalidationEvent(securityUser.getId()));
|
SECONDS.sleep(1);
|
||||||
|
eventPublisher.publishEvent(new UserCredentialsInvalidationEvent(securityUser.getId()));
|
||||||
assertTrue(tokenOutdatingService.isOutdated(jwtToken, securityUser.getId()));
|
assertTrue(tokenOutdatingService.isOutdated(jwtToken, securityUser.getId()));
|
||||||
|
|
||||||
SECONDS.sleep(1);
|
SECONDS.sleep(1);
|
||||||
@ -126,7 +131,7 @@ public class TokenOutdatingTest {
|
|||||||
});
|
});
|
||||||
|
|
||||||
SECONDS.sleep(1);
|
SECONDS.sleep(1);
|
||||||
tokenOutdatingService.onUserAuthDataChanged(new UserCredentialsInvalidationEvent(securityUser.getId()));
|
eventPublisher.publishEvent(new UserCredentialsInvalidationEvent(securityUser.getId()));
|
||||||
|
|
||||||
assertThrows(JwtExpiredTokenException.class, () -> {
|
assertThrows(JwtExpiredTokenException.class, () -> {
|
||||||
accessTokenAuthenticationProvider.authenticate(new JwtAuthenticationToken(accessJwtToken));
|
accessTokenAuthenticationProvider.authenticate(new JwtAuthenticationToken(accessJwtToken));
|
||||||
@ -142,28 +147,33 @@ public class TokenOutdatingTest {
|
|||||||
});
|
});
|
||||||
|
|
||||||
SECONDS.sleep(1);
|
SECONDS.sleep(1);
|
||||||
tokenOutdatingService.onUserAuthDataChanged(new UserCredentialsInvalidationEvent(securityUser.getId()));
|
eventPublisher.publishEvent(new UserCredentialsInvalidationEvent(securityUser.getId()));
|
||||||
|
|
||||||
assertThrows(CredentialsExpiredException.class, () -> {
|
assertThrows(CredentialsExpiredException.class, () -> {
|
||||||
refreshTokenAuthenticationProvider.authenticate(new RefreshAuthenticationToken(refreshJwtToken));
|
refreshTokenAuthenticationProvider.authenticate(new RefreshAuthenticationToken(refreshJwtToken));
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
// This test takes too long to run and is basically testing the cache logic
|
||||||
public void testTokensOutdatageTimeRemovalFromCache() throws Exception {
|
// @Test
|
||||||
JwtToken jwtToken = tokenFactory.createAccessJwtToken(securityUser);
|
// public void testTokensOutdatageTimeRemovalFromCache() throws Exception {
|
||||||
|
// JwtToken jwtToken = tokenFactory.createAccessJwtToken(securityUser);
|
||||||
SECONDS.sleep(1);
|
//
|
||||||
tokenOutdatingService.onUserAuthDataChanged(new UserCredentialsInvalidationEvent(securityUser.getId()));
|
// SECONDS.sleep(1);
|
||||||
|
// eventPublisher.publishEvent(new UserCredentialsInvalidationEvent(securityUser.getId()));
|
||||||
SECONDS.sleep(1);
|
//
|
||||||
|
// SECONDS.sleep(1);
|
||||||
assertTrue(tokenOutdatingService.isOutdated(jwtToken, securityUser.getId()));
|
//
|
||||||
|
// assertTrue(tokenOutdatingService.isOutdated(jwtToken, securityUser.getId()));
|
||||||
SECONDS.sleep(60);
|
//
|
||||||
|
// SECONDS.sleep(30); // refreshTokenExpTime/2
|
||||||
assertFalse(tokenOutdatingService.isOutdated(jwtToken, securityUser.getId()));
|
//
|
||||||
}
|
// assertTrue(tokenOutdatingService.isOutdated(jwtToken, securityUser.getId()));
|
||||||
|
//
|
||||||
|
// SECONDS.sleep(30 + 1); // refreshTokenExpTime/2 + 1
|
||||||
|
//
|
||||||
|
// assertFalse(tokenOutdatingService.isOutdated(jwtToken, securityUser.getId()));
|
||||||
|
// }
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testOnlyOneTokenExpired() throws InterruptedException {
|
public void testOnlyOneTokenExpired() throws InterruptedException {
|
||||||
@ -178,7 +188,7 @@ public class TokenOutdatingTest {
|
|||||||
|
|
||||||
SECONDS.sleep(1);
|
SECONDS.sleep(1);
|
||||||
|
|
||||||
tokenOutdatingService.onUserAuthDataChanged(new UserSessionInvalidationEvent(securityUser.getSessionId()));
|
eventPublisher.publishEvent(new UserSessionInvalidationEvent(securityUser.getSessionId()));
|
||||||
|
|
||||||
assertThrows(JwtExpiredTokenException.class, () -> {
|
assertThrows(JwtExpiredTokenException.class, () -> {
|
||||||
accessTokenAuthenticationProvider.authenticate(new JwtAuthenticationToken(getRawJwtToken(jwtToken)));
|
accessTokenAuthenticationProvider.authenticate(new JwtAuthenticationToken(getRawJwtToken(jwtToken)));
|
||||||
@ -206,14 +216,14 @@ public class TokenOutdatingTest {
|
|||||||
|
|
||||||
SECONDS.sleep(1);
|
SECONDS.sleep(1);
|
||||||
|
|
||||||
tokenOutdatingService.onUserAuthDataChanged(new UserCredentialsInvalidationEvent(securityUser.getId()));
|
eventPublisher.publishEvent(new UserCredentialsInvalidationEvent(securityUser.getId()));
|
||||||
|
|
||||||
assertThrows(JwtExpiredTokenException.class, () -> {
|
assertThrows(JwtExpiredTokenException.class, () -> {
|
||||||
accessTokenAuthenticationProvider.authenticate(new JwtAuthenticationToken(getRawJwtToken(jwtToken)));
|
accessTokenAuthenticationProvider.authenticate(new JwtAuthenticationToken(getRawJwtToken(jwtToken)));
|
||||||
});
|
});
|
||||||
|
|
||||||
assertThrows(JwtExpiredTokenException.class, () -> {
|
assertThrows(JwtExpiredTokenException.class, () -> {
|
||||||
accessTokenAuthenticationProvider.authenticate(new JwtAuthenticationToken(getRawJwtToken(anotherJwtToken)));
|
accessTokenAuthenticationProvider.authenticate(new JwtAuthenticationToken(getRawJwtToken(anotherJwtToken)));
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -17,9 +17,12 @@ package org.thingsboard.server.cache;
|
|||||||
|
|
||||||
import lombok.Data;
|
import lombok.Data;
|
||||||
import lombok.Getter;
|
import lombok.Getter;
|
||||||
|
import org.springframework.beans.factory.annotation.Value;
|
||||||
import org.springframework.boot.context.properties.ConfigurationProperties;
|
import org.springframework.boot.context.properties.ConfigurationProperties;
|
||||||
import org.springframework.context.annotation.Configuration;
|
import org.springframework.context.annotation.Configuration;
|
||||||
|
import org.thingsboard.server.common.data.CacheConstants;
|
||||||
|
|
||||||
|
import javax.annotation.PostConstruct;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
|
||||||
@Configuration
|
@Configuration
|
||||||
@ -27,7 +30,18 @@ import java.util.Map;
|
|||||||
@Data
|
@Data
|
||||||
public class CacheSpecsMap {
|
public class CacheSpecsMap {
|
||||||
|
|
||||||
|
@Value("${security.jwt.refreshTokenExpTime}")
|
||||||
|
private int refreshTokenExpTime;
|
||||||
|
|
||||||
@Getter
|
@Getter
|
||||||
private Map<String, CacheSpecs> specs;
|
private Map<String, CacheSpecs> specs;
|
||||||
|
|
||||||
|
@PostConstruct
|
||||||
|
public void replaceTheJWTTokenRefreshExpTime() {
|
||||||
|
var cacheSpecs = specs.get(CacheConstants.USERS_SESSION_INVALIDATION_CACHE);
|
||||||
|
if (cacheSpecs != null) {
|
||||||
|
cacheSpecs.setTimeToLiveInMinutes((refreshTokenExpTime / 60) + 1);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -20,6 +20,7 @@ import com.github.benmanes.caffeine.cache.RemovalCause;
|
|||||||
import com.github.benmanes.caffeine.cache.Ticker;
|
import com.github.benmanes.caffeine.cache.Ticker;
|
||||||
import com.github.benmanes.caffeine.cache.Weigher;
|
import com.github.benmanes.caffeine.cache.Weigher;
|
||||||
import lombok.extern.slf4j.Slf4j;
|
import lombok.extern.slf4j.Slf4j;
|
||||||
|
import org.springframework.beans.factory.annotation.Value;
|
||||||
import org.springframework.boot.autoconfigure.condition.ConditionalOnProperty;
|
import org.springframework.boot.autoconfigure.condition.ConditionalOnProperty;
|
||||||
import org.springframework.cache.CacheManager;
|
import org.springframework.cache.CacheManager;
|
||||||
import org.springframework.cache.annotation.EnableCaching;
|
import org.springframework.cache.annotation.EnableCaching;
|
||||||
@ -71,6 +72,7 @@ public class TbCaffeineCacheConfiguration {
|
|||||||
}
|
}
|
||||||
|
|
||||||
private CaffeineCache buildCache(String name, CacheSpecs cacheSpec) {
|
private CaffeineCache buildCache(String name, CacheSpecs cacheSpec) {
|
||||||
|
|
||||||
final Caffeine<Object, Object> caffeineBuilder
|
final Caffeine<Object, Object> caffeineBuilder
|
||||||
= Caffeine.newBuilder()
|
= Caffeine.newBuilder()
|
||||||
.weigher(collectionSafeWeigher())
|
.weigher(collectionSafeWeigher())
|
||||||
|
|||||||
@ -32,7 +32,7 @@ public class CacheConstants {
|
|||||||
|
|
||||||
public static final String ASSET_PROFILE_CACHE = "assetProfiles";
|
public static final String ASSET_PROFILE_CACHE = "assetProfiles";
|
||||||
public static final String ATTRIBUTES_CACHE = "attributes";
|
public static final String ATTRIBUTES_CACHE = "attributes";
|
||||||
public static final String USERS_SESSION_INVALIDATION_CACHE = "usersUpdateTime";
|
public static final String USERS_SESSION_INVALIDATION_CACHE = "userSessionsInvalidation";
|
||||||
public static final String OTA_PACKAGE_CACHE = "otaPackages";
|
public static final String OTA_PACKAGE_CACHE = "otaPackages";
|
||||||
public static final String OTA_PACKAGE_DATA_CACHE = "otaPackagesData";
|
public static final String OTA_PACKAGE_DATA_CACHE = "otaPackagesData";
|
||||||
public static final String REPOSITORY_SETTINGS_CACHE = "repositorySettings";
|
public static final String REPOSITORY_SETTINGS_CACHE = "repositorySettings";
|
||||||
|
|||||||
@ -37,7 +37,6 @@ import org.thingsboard.server.common.data.id.UserId;
|
|||||||
import org.thingsboard.server.common.data.page.PageData;
|
import org.thingsboard.server.common.data.page.PageData;
|
||||||
import org.thingsboard.server.common.data.page.PageLink;
|
import org.thingsboard.server.common.data.page.PageLink;
|
||||||
import org.thingsboard.server.common.data.security.UserCredentials;
|
import org.thingsboard.server.common.data.security.UserCredentials;
|
||||||
import org.thingsboard.server.common.data.security.event.UserAuthDataChangedEvent;
|
|
||||||
import org.thingsboard.server.common.data.security.event.UserCredentialsInvalidationEvent;
|
import org.thingsboard.server.common.data.security.event.UserCredentialsInvalidationEvent;
|
||||||
import org.thingsboard.server.dao.entity.AbstractEntityService;
|
import org.thingsboard.server.dao.entity.AbstractEntityService;
|
||||||
import org.thingsboard.server.dao.exception.IncorrectParameterException;
|
import org.thingsboard.server.dao.exception.IncorrectParameterException;
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user