update for KEYCLOAK-7967 Remove injection of UriInfo
| | |
| | | private EventBuilder event; |
| | | |
| | | @Context |
| | | private UriInfo uriInfo; |
| | | |
| | | @Context |
| | | private KeycloakSession session; |
| | | |
| | | @Context |
| | |
| | | |
| | | @GET |
| | | public Response build() { |
| | | MultivaluedMap<String, String> params = uriInfo.getQueryParameters(); |
| | | MultivaluedMap<String, String> params = session.getContext().getUri().getQueryParameters(); |
| | | String service = params.getFirst(CASLoginProtocol.SERVICE_PARAM); |
| | | boolean renew = params.containsKey(CASLoginProtocol.RENEW_PARAM); |
| | | boolean gateway = params.containsKey(CASLoginProtocol.GATEWAY_PARAM); |
| | |
| | | } |
| | | |
| | | this.event.event(EventType.LOGIN); |
| | | return handleBrowserAuthenticationRequest(authenticationSession, new CASLoginProtocol(session, realm, uriInfo, headers, event), gateway, false); |
| | | return handleBrowserAuthenticationRequest(authenticationSession, new CASLoginProtocol(session, realm, session.getContext().getUri(), headers, event), gateway, false); |
| | | } |
| | | |
| | | private void checkClient(String service) { |
| | |
| | | |
| | | client = realm.getClients().stream() |
| | | .filter(c -> CASLoginProtocol.LOGIN_PROTOCOL.equals(c.getProtocol())) |
| | | .filter(c -> RedirectUtils.verifyRedirectUri(uriInfo, service, realm, c) != null) |
| | | .filter(c -> RedirectUtils.verifyRedirectUri(session.getContext().getUri(), service, realm, c) != null) |
| | | .findFirst().orElse(null); |
| | | if (client == null) { |
| | | event.error(Errors.CLIENT_NOT_FOUND); |
| | |
| | | throw new ErrorPageException(session, Response.Status.BAD_REQUEST, Messages.CLIENT_DISABLED); |
| | | } |
| | | |
| | | redirectUri = RedirectUtils.verifyRedirectUri(uriInfo, service, realm, client); |
| | | redirectUri = RedirectUtils.verifyRedirectUri(session.getContext().getUri(), service, realm, client); |
| | | |
| | | event.client(client.getClientId()); |
| | | event.detail(Details.REDIRECT_URI, redirectUri); |
| | |
| | | import javax.ws.rs.core.Context; |
| | | import javax.ws.rs.core.HttpHeaders; |
| | | import javax.ws.rs.core.Response; |
| | | import javax.ws.rs.core.UriInfo; |
| | | |
| | | public class LogoutEndpoint { |
| | | private static final Logger logger = Logger.getLogger(LogoutEndpoint.class); |
| | |
| | | |
| | | @Context |
| | | private HttpHeaders headers; |
| | | |
| | | @Context |
| | | private UriInfo uriInfo; |
| | | |
| | | private RealmModel realm; |
| | | private EventBuilder event; |
| | |
| | | if (redirectUri != null) userSession.setNote(CASLoginProtocol.LOGOUT_REDIRECT_URI, redirectUri); |
| | | |
| | | logger.debug("Initiating CAS browser logout"); |
| | | Response response = AuthenticationManager.browserLogout(session, realm, authResult.getSession(), uriInfo, clientConnection, headers); |
| | | Response response = AuthenticationManager.browserLogout(session, realm, authResult.getSession(), session.getContext().getUri(), clientConnection, headers); |
| | | logger.debug("finishing CAS browser logout"); |
| | | return response; |
| | | } |
| | |
| | | |
| | | client = realm.getClients().stream() |
| | | .filter(c -> CASLoginProtocol.LOGIN_PROTOCOL.equals(c.getProtocol())) |
| | | .filter(c -> RedirectUtils.verifyRedirectUri(uriInfo, service, realm, c) != null) |
| | | .filter(c -> RedirectUtils.verifyRedirectUri(session.getContext().getUri(), service, realm, c) != null) |
| | | .findFirst().orElse(null); |
| | | if (client != null) { |
| | | redirectUri = RedirectUtils.verifyRedirectUri(uriInfo, service, realm, client); |
| | | redirectUri = RedirectUtils.verifyRedirectUri(session.getContext().getUri(), service, realm, client); |
| | | |
| | | session.getContext().setClient(client); |
| | | } |
| | |
| | | } |
| | | |
| | | private Response prepare(Response.Status status, CASServiceResponse serviceResponse) { |
| | | MediaType responseMediaType = new ContentTypeHelper(request, restRequest, uriInfo).selectResponseType(); |
| | | MediaType responseMediaType = new ContentTypeHelper(request, restRequest, session.getContext().getUri()).selectResponseType(); |
| | | return ServiceResponseHelper.createResponse(status, responseMediaType, serviceResponse); |
| | | } |
| | | } |
| | |
| | | @Context |
| | | protected HttpHeaders headers; |
| | | |
| | | @Context |
| | | protected UriInfo uriInfo; |
| | | |
| | | protected RealmModel realm; |
| | | protected EventBuilder event; |
| | | protected ClientModel client; |
| | |
| | | @GET |
| | | @NoCache |
| | | public Response build() { |
| | | MultivaluedMap<String, String> params = uriInfo.getQueryParameters(); |
| | | MultivaluedMap<String, String> params = session.getContext().getUri().getQueryParameters(); |
| | | String service = params.getFirst(CASLoginProtocol.SERVICE_PARAM); |
| | | String ticket = params.getFirst(CASLoginProtocol.TICKET_PARAM); |
| | | boolean renew = params.containsKey(CASLoginProtocol.RENEW_PARAM); |
| | |
| | | } |
| | | |
| | | private void checkSsl() { |
| | | if (!uriInfo.getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) { |
| | | if (!session.getContext().getUri().getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) { |
| | | throw new CASValidationException(CASErrorCode.INVALID_REQUEST, "HTTPS required", Response.Status.FORBIDDEN); |
| | | } |
| | | } |
| | |
| | | |
| | | client = realm.getClients().stream() |
| | | .filter(c -> CASLoginProtocol.LOGIN_PROTOCOL.equals(c.getProtocol())) |
| | | .filter(c -> RedirectUtils.verifyRedirectUri(uriInfo, service, realm, c) != null) |
| | | .filter(c -> RedirectUtils.verifyRedirectUri(session.getContext().getUri(), service, realm, c) != null) |
| | | .findFirst().orElse(null); |
| | | if (client == null) { |
| | | event.error(Errors.CLIENT_NOT_FOUND); |