/* * Copyright 2016 Red Hat, Inc. and/or its affiliates * and other contributors as indicated by the @author tags. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.keycloak.protocol.cas.mappers; import org.keycloak.models.ProtocolMapperModel; import java.util.Map; import java.util.Set; import java.util.stream.Collectors; /** * Base class for mapping of user role mappings to an ID and Access Token claim. * * @author Thomas Darimont */ abstract class AbstractUserRoleMappingMapper extends AbstractCASProtocolMapper { /** * Retrieves all roles of the current user based on direct roles set to the user, its groups and their parent groups. * Then it recursively expands all composite roles, and restricts according to the given predicate {@code restriction}. * If the current client sessions is restricted (i.e. no client found in active user session has full scope allowed), * the final list of roles is also restricted by the client scope. Finally, the list is mapped to the token into * a claim. */ protected void setAttribute(Map attributes, ProtocolMapperModel mappingModel, Set rolesToAdd, String prefix) { Set realmRoleNames; if (prefix != null && !prefix.isEmpty()) { realmRoleNames = rolesToAdd.stream() .map(roleName -> prefix + roleName) .collect(Collectors.toSet()); } else { realmRoleNames = rolesToAdd; } setPlainAttribute(attributes, mappingModel, realmRoleNames); } }