| | |
| | | public Response build() { |
| | | MultivaluedMap<String, String> params = session.getContext().getUri().getQueryParameters(); |
| | | String service = params.getFirst(CASLoginProtocol.SERVICE_PARAM); |
| | | |
| | | boolean isSaml11Request = false; |
| | | if (service == null && params.containsKey(CASLoginProtocol.TARGET_PARAM)) { |
| | | // SAML 1.1 authorization uses the TARGET parameter instead of service |
| | | service = params.getFirst(CASLoginProtocol.TARGET_PARAM); |
| | | isSaml11Request = true; |
| | | } |
| | | boolean renew = params.containsKey(CASLoginProtocol.RENEW_PARAM); |
| | | boolean gateway = params.containsKey(CASLoginProtocol.GATEWAY_PARAM); |
| | | |
| | |
| | | if (gateway) { |
| | | authenticationSession.setClientNote(CASLoginProtocol.GATEWAY_PARAM, "true"); |
| | | } |
| | | if (isSaml11Request) { |
| | | // Flag the session so we can return the ticket as "SAMLart" in the response |
| | | authenticationSession.setClientNote(CASLoginProtocol.TARGET_PARAM, "true"); |
| | | } |
| | | |
| | | this.event.event(EventType.LOGIN); |
| | | return handleBrowserAuthenticationRequest(authenticationSession, new CASLoginProtocol(session, realm, session.getContext().getUri(), headers, event), gateway, false); |
| | |
| | | throw new ErrorPageException(session, Response.Status.BAD_REQUEST, Messages.MISSING_PARAMETER, CASLoginProtocol.SERVICE_PARAM); |
| | | } |
| | | |
| | | client = realm.getClients().stream() |
| | | client = realm.getClientsStream() |
| | | .filter(c -> CASLoginProtocol.LOGIN_PROTOCOL.equals(c.getProtocol())) |
| | | .filter(c -> RedirectUtils.verifyRedirectUri(session, service, c) != null) |
| | | .findFirst().orElse(null); |