| | |
| | | package org.keycloak.protocol.cas.endpoints; |
| | | |
| | | import jakarta.ws.rs.GET; |
| | | import jakarta.ws.rs.core.MultivaluedMap; |
| | | import jakarta.ws.rs.core.Response; |
| | | import org.jboss.logging.Logger; |
| | | import org.keycloak.events.Details; |
| | | import org.keycloak.events.Errors; |
| | | import org.keycloak.events.EventBuilder; |
| | | import org.keycloak.events.EventType; |
| | | import org.keycloak.models.ClientModel; |
| | | import org.keycloak.models.RealmModel; |
| | | import org.keycloak.models.KeycloakSession; |
| | | import org.keycloak.protocol.AuthorizationEndpointBase; |
| | | import org.keycloak.protocol.cas.CASLoginProtocol; |
| | | import org.keycloak.protocol.oidc.utils.RedirectUtils; |
| | |
| | | import org.keycloak.services.util.CacheControlUtil; |
| | | import org.keycloak.sessions.AuthenticationSessionModel; |
| | | |
| | | import javax.ws.rs.GET; |
| | | import javax.ws.rs.core.MultivaluedMap; |
| | | import javax.ws.rs.core.Response; |
| | | |
| | | public class AuthorizationEndpoint extends AuthorizationEndpointBase { |
| | | private static final Logger logger = Logger.getLogger(AuthorizationEndpoint.class); |
| | | |
| | |
| | | private AuthenticationSessionModel authenticationSession; |
| | | private String redirectUri; |
| | | |
| | | public AuthorizationEndpoint(RealmModel realm, EventBuilder event) { |
| | | super(realm, event); |
| | | public AuthorizationEndpoint(KeycloakSession session, EventBuilder event) { |
| | | super(session, event); |
| | | event.event(EventType.LOGIN); |
| | | } |
| | | |
| | |
| | | public Response build() { |
| | | MultivaluedMap<String, String> params = session.getContext().getUri().getQueryParameters(); |
| | | String service = params.getFirst(CASLoginProtocol.SERVICE_PARAM); |
| | | |
| | | boolean isSaml11Request = false; |
| | | if (service == null && params.containsKey(CASLoginProtocol.TARGET_PARAM)) { |
| | | // SAML 1.1 authorization uses the TARGET parameter instead of service |
| | | service = params.getFirst(CASLoginProtocol.TARGET_PARAM); |
| | | isSaml11Request = true; |
| | | } |
| | | boolean renew = params.containsKey(CASLoginProtocol.RENEW_PARAM); |
| | | boolean gateway = params.containsKey(CASLoginProtocol.GATEWAY_PARAM); |
| | | |
| | |
| | | updateAuthenticationSession(); |
| | | |
| | | // So back button doesn't work |
| | | CacheControlUtil.noBackButtonCacheControlHeader(); |
| | | CacheControlUtil.noBackButtonCacheControlHeader(session); |
| | | |
| | | if (renew) { |
| | | authenticationSession.setClientNote(CASLoginProtocol.RENEW_PARAM, "true"); |
| | | } |
| | | if (gateway) { |
| | | authenticationSession.setClientNote(CASLoginProtocol.GATEWAY_PARAM, "true"); |
| | | } |
| | | if (isSaml11Request) { |
| | | // Flag the session so we can return the ticket as "SAMLart" in the response |
| | | authenticationSession.setClientNote(CASLoginProtocol.TARGET_PARAM, "true"); |
| | | } |
| | | |
| | | this.event.event(EventType.LOGIN); |
| | |
| | | throw new ErrorPageException(session, Response.Status.BAD_REQUEST, Messages.MISSING_PARAMETER, CASLoginProtocol.SERVICE_PARAM); |
| | | } |
| | | |
| | | client = realm.getClients().stream() |
| | | event.detail(Details.REDIRECT_URI, service); |
| | | |
| | | client = realm.getClientsStream() |
| | | .filter(c -> CASLoginProtocol.LOGIN_PROTOCOL.equals(c.getProtocol())) |
| | | .filter(c -> RedirectUtils.verifyRedirectUri(session, service, c) != null) |
| | | .findFirst().orElse(null); |