parent
e9714c78a6
commit
0f86427dd0
26 changed files with 259 additions and 560 deletions
|
@ -98,7 +98,6 @@ import org.keycloak.models.map.storage.hotRod.user.HotRodUserEntityDelegate;
|
||||||
import org.keycloak.models.map.storage.hotRod.user.HotRodUserFederatedIdentityEntityDelegate;
|
import org.keycloak.models.map.storage.hotRod.user.HotRodUserFederatedIdentityEntityDelegate;
|
||||||
import org.keycloak.models.map.storage.hotRod.userSession.HotRodAuthenticatedClientSessionEntityDelegate;
|
import org.keycloak.models.map.storage.hotRod.userSession.HotRodAuthenticatedClientSessionEntityDelegate;
|
||||||
import org.keycloak.models.map.storage.hotRod.userSession.HotRodUserSessionEntityDelegate;
|
import org.keycloak.models.map.storage.hotRod.userSession.HotRodUserSessionEntityDelegate;
|
||||||
import org.keycloak.models.map.storage.hotRod.userSession.HotRodUserSessionMapStorage;
|
|
||||||
import org.keycloak.models.map.user.MapUserConsentEntity;
|
import org.keycloak.models.map.user.MapUserConsentEntity;
|
||||||
import org.keycloak.models.map.user.MapUserCredentialEntity;
|
import org.keycloak.models.map.user.MapUserCredentialEntity;
|
||||||
import org.keycloak.models.map.user.MapUserEntity;
|
import org.keycloak.models.map.user.MapUserEntity;
|
||||||
|
@ -113,7 +112,6 @@ import java.util.concurrent.ConcurrentHashMap;
|
||||||
public class HotRodMapStorageProviderFactory implements AmphibianProviderFactory<MapStorageProvider>, MapStorageProviderFactory, EnvironmentDependentProviderFactory {
|
public class HotRodMapStorageProviderFactory implements AmphibianProviderFactory<MapStorageProvider>, MapStorageProviderFactory, EnvironmentDependentProviderFactory {
|
||||||
|
|
||||||
public static final String PROVIDER_ID = "hotrod";
|
public static final String PROVIDER_ID = "hotrod";
|
||||||
private static final Logger LOG = Logger.getLogger(HotRodMapStorageProviderFactory.class);
|
|
||||||
private final Map<Class<?>, HotRodMapStorage> storages = new ConcurrentHashMap<>();
|
private final Map<Class<?>, HotRodMapStorage> storages = new ConcurrentHashMap<>();
|
||||||
|
|
||||||
|
|
||||||
|
@ -176,7 +174,6 @@ public class HotRodMapStorageProviderFactory implements AmphibianProviderFactory
|
||||||
}
|
}
|
||||||
|
|
||||||
public <E extends AbstractHotRodEntity, V extends HotRodEntityDelegate<E> & AbstractEntity, M> HotRodMapStorage<String, E, V, M> getHotRodStorage(KeycloakSession session, Class<M> modelType, MapStorageProviderFactory.Flag... flags) {
|
public <E extends AbstractHotRodEntity, V extends HotRodEntityDelegate<E> & AbstractEntity, M> HotRodMapStorage<String, E, V, M> getHotRodStorage(KeycloakSession session, Class<M> modelType, MapStorageProviderFactory.Flag... flags) {
|
||||||
if (modelType == UserSessionModel.class) getHotRodStorage(session, AuthenticatedClientSessionModel.class, flags);
|
|
||||||
return storages.computeIfAbsent(modelType, c -> createHotRodStorage(session, modelType, flags));
|
return storages.computeIfAbsent(modelType, c -> createHotRodStorage(session, modelType, flags));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -184,11 +181,7 @@ public class HotRodMapStorageProviderFactory implements AmphibianProviderFactory
|
||||||
HotRodConnectionProvider connectionProvider = session.getProvider(HotRodConnectionProvider.class);
|
HotRodConnectionProvider connectionProvider = session.getProvider(HotRodConnectionProvider.class);
|
||||||
HotRodEntityDescriptor<E, V> entityDescriptor = (HotRodEntityDescriptor<E, V>) getEntityDescriptor(modelType);
|
HotRodEntityDescriptor<E, V> entityDescriptor = (HotRodEntityDescriptor<E, V>) getEntityDescriptor(modelType);
|
||||||
|
|
||||||
if (modelType == UserSessionModel.class) {
|
if (modelType == ActionTokenValueModel.class) {
|
||||||
HotRodMapStorage clientSessionStore = getHotRodStorage(session, AuthenticatedClientSessionModel.class);
|
|
||||||
return new HotRodUserSessionMapStorage(clientSessionStore, connectionProvider.getRemoteCache(entityDescriptor.getCacheName()), StringKeyConverter.StringKey.INSTANCE, entityDescriptor, CLONER);
|
|
||||||
|
|
||||||
} else if (modelType == ActionTokenValueModel.class) {
|
|
||||||
return new SingleUseObjectHotRodMapStorage(connectionProvider.getRemoteCache(entityDescriptor.getCacheName()), StringKeyConverter.StringKey.INSTANCE, entityDescriptor, CLONER);
|
return new SingleUseObjectHotRodMapStorage(connectionProvider.getRemoteCache(entityDescriptor.getCacheName()), StringKeyConverter.StringKey.INSTANCE, entityDescriptor, CLONER);
|
||||||
}
|
}
|
||||||
return new HotRodMapStorage<>(connectionProvider.getRemoteCache(entityDescriptor.getCacheName()), StringKeyConverter.StringKey.INSTANCE, entityDescriptor, CLONER);
|
return new HotRodMapStorage<>(connectionProvider.getRemoteCache(entityDescriptor.getCacheName()), StringKeyConverter.StringKey.INSTANCE, entityDescriptor, CLONER);
|
||||||
|
|
|
@ -80,8 +80,7 @@ public class IckleQueryMapModelCriteriaBuilder<E extends AbstractHotRodEntity, M
|
||||||
INFINISPAN_NAME_OVERRIDES.put(RealmModel.SearchableFields.COMPONENT_PROVIDER_TYPE, "components.providerType");
|
INFINISPAN_NAME_OVERRIDES.put(RealmModel.SearchableFields.COMPONENT_PROVIDER_TYPE, "components.providerType");
|
||||||
|
|
||||||
INFINISPAN_NAME_OVERRIDES.put(UserSessionModel.SearchableFields.IS_OFFLINE, "offline");
|
INFINISPAN_NAME_OVERRIDES.put(UserSessionModel.SearchableFields.IS_OFFLINE, "offline");
|
||||||
INFINISPAN_NAME_OVERRIDES.put(UserSessionModel.SearchableFields.CLIENT_ID, "authenticatedClientSessions.key");
|
INFINISPAN_NAME_OVERRIDES.put(UserSessionModel.SearchableFields.CLIENT_ID, "authenticatedClientSessions.clientId");
|
||||||
INFINISPAN_NAME_OVERRIDES.put(AuthenticatedClientSessionModel.SearchableFields.IS_OFFLINE, "offline");
|
|
||||||
|
|
||||||
INFINISPAN_NAME_OVERRIDES.put(Resource.SearchableFields.SCOPE_ID, "scopeIds");
|
INFINISPAN_NAME_OVERRIDES.put(Resource.SearchableFields.SCOPE_ID, "scopeIds");
|
||||||
|
|
||||||
|
|
|
@ -32,94 +32,48 @@ import org.keycloak.models.map.userSession.MapAuthenticatedClientSessionEntity;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
|
||||||
@GenerateHotRodEntityImplementation(
|
@GenerateHotRodEntityImplementation(
|
||||||
implementInterface = "org.keycloak.models.map.userSession.MapAuthenticatedClientSessionEntity",
|
implementInterface = "org.keycloak.models.map.userSession.MapAuthenticatedClientSessionEntity"
|
||||||
inherits = "org.keycloak.models.map.storage.hotRod.userSession.HotRodAuthenticatedClientSessionEntity.AbstractHotRodAuthenticatedClientSessionEntityDelegate",
|
|
||||||
topLevelEntity = true,
|
|
||||||
modelClass = "org.keycloak.models.AuthenticatedClientSessionModel"
|
|
||||||
)
|
)
|
||||||
@ProtoDoc("@Indexed")
|
@ProtoDoc("@Indexed")
|
||||||
@ProtoDoc("schema-version: " + HotRodAuthenticatedClientSessionEntity.VERSION)
|
|
||||||
public class HotRodAuthenticatedClientSessionEntity extends AbstractHotRodEntity {
|
public class HotRodAuthenticatedClientSessionEntity extends AbstractHotRodEntity {
|
||||||
|
|
||||||
@IgnoreForEntityImplementationGenerator
|
|
||||||
public static final int VERSION = 1;
|
|
||||||
|
|
||||||
@AutoProtoSchemaBuilder(
|
|
||||||
includeClasses = {
|
|
||||||
HotRodAuthenticatedClientSessionEntity.class
|
|
||||||
},
|
|
||||||
schemaFilePath = "proto/",
|
|
||||||
schemaPackageName = CommonPrimitivesProtoSchemaInitializer.HOT_ROD_ENTITY_PACKAGE,
|
|
||||||
dependsOn = {CommonPrimitivesProtoSchemaInitializer.class}
|
|
||||||
)
|
|
||||||
public interface HotRodAuthenticatedClientSessionEntitySchema extends GeneratedSchema {
|
|
||||||
HotRodAuthenticatedClientSessionEntitySchema INSTANCE = new HotRodAuthenticatedClientSessionEntitySchemaImpl();
|
|
||||||
}
|
|
||||||
|
|
||||||
@ProtoDoc("@Field(index = Index.YES, store = Store.YES)")
|
|
||||||
@ProtoField(number = 1)
|
@ProtoField(number = 1)
|
||||||
public Integer entityVersion = VERSION;
|
|
||||||
|
|
||||||
@ProtoDoc("@Field(index = Index.YES, store = Store.YES)")
|
|
||||||
@ProtoField(number = 2)
|
|
||||||
public String id;
|
public String id;
|
||||||
|
|
||||||
@ProtoDoc("@Field(index = Index.YES, store = Store.YES)")
|
@ProtoField(number = 2)
|
||||||
@ProtoField(number = 3)
|
|
||||||
public String userSessionId;
|
|
||||||
|
|
||||||
@ProtoDoc("@Field(index = Index.YES, store = Store.YES)")
|
|
||||||
@ProtoField(number = 4)
|
|
||||||
public String realmId;
|
public String realmId;
|
||||||
|
|
||||||
@ProtoDoc("@Field(index = Index.YES, store = Store.YES)")
|
@ProtoDoc("@Field(index = Index.YES, store = Store.YES)")
|
||||||
@ProtoField(number = 5)
|
@ProtoField(number = 3)
|
||||||
public String clientId;
|
public String clientId;
|
||||||
|
|
||||||
@ProtoField(number = 6)
|
@ProtoField(number = 4)
|
||||||
public String authMethod;
|
public String authMethod;
|
||||||
|
|
||||||
@ProtoField(number = 7)
|
@ProtoField(number = 5)
|
||||||
public String redirectUri;
|
public String redirectUri;
|
||||||
|
|
||||||
@ProtoField(number = 8)
|
@ProtoField(number = 6)
|
||||||
public Long timestamp;
|
public Long timestamp;
|
||||||
|
|
||||||
@ProtoField(number = 9)
|
@ProtoField(number = 7)
|
||||||
public Long expiration;
|
public Long expiration;
|
||||||
|
|
||||||
@ProtoField(number = 10)
|
@ProtoField(number = 8)
|
||||||
public String action;
|
public String action;
|
||||||
|
|
||||||
@ProtoField(number = 11)
|
@ProtoField(number = 9)
|
||||||
public Set<HotRodPair<String, String>> notes;
|
public Set<HotRodPair<String, String>> notes;
|
||||||
|
|
||||||
@ProtoField(number = 12)
|
@ProtoField(number = 10)
|
||||||
public String currentRefreshToken;
|
public String currentRefreshToken;
|
||||||
|
|
||||||
@ProtoField(number = 13)
|
@ProtoField(number = 11)
|
||||||
public Integer currentRefreshTokenUseCount;
|
public Integer currentRefreshTokenUseCount;
|
||||||
|
|
||||||
@ProtoDoc("@Field(index = Index.YES, store = Store.YES)")
|
@ProtoField(number = 12)
|
||||||
@ProtoField(number = 14)
|
|
||||||
public Boolean offline;
|
public Boolean offline;
|
||||||
|
|
||||||
public static abstract class AbstractHotRodAuthenticatedClientSessionEntityDelegate extends UpdatableHotRodEntityDelegateImpl<HotRodAuthenticatedClientSessionEntity> implements MapAuthenticatedClientSessionEntity {
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public String getId() {
|
|
||||||
return getHotRodEntity().id;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void setId(String id) {
|
|
||||||
HotRodAuthenticatedClientSessionEntity entity = getHotRodEntity();
|
|
||||||
if (entity.id != null) throw new IllegalStateException("Id cannot be changed");
|
|
||||||
entity.id = id;
|
|
||||||
entity.updated |= id != null;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean equals(Object o) {
|
public boolean equals(Object o) {
|
||||||
return HotRodAuthenticatedClientSessionEntityDelegate.entityEquals(this, o);
|
return HotRodAuthenticatedClientSessionEntityDelegate.entityEquals(this, o);
|
||||||
|
|
|
@ -25,12 +25,17 @@ import org.keycloak.models.UserSessionModel;
|
||||||
import org.keycloak.models.map.annotations.GenerateHotRodEntityImplementation;
|
import org.keycloak.models.map.annotations.GenerateHotRodEntityImplementation;
|
||||||
import org.keycloak.models.map.annotations.IgnoreForEntityImplementationGenerator;
|
import org.keycloak.models.map.annotations.IgnoreForEntityImplementationGenerator;
|
||||||
import org.keycloak.models.map.storage.hotRod.authorization.HotRodResourceServerEntity;
|
import org.keycloak.models.map.storage.hotRod.authorization.HotRodResourceServerEntity;
|
||||||
|
import org.keycloak.models.map.common.UpdatableEntity;
|
||||||
import org.keycloak.models.map.storage.hotRod.common.AbstractHotRodEntity;
|
import org.keycloak.models.map.storage.hotRod.common.AbstractHotRodEntity;
|
||||||
import org.keycloak.models.map.storage.hotRod.common.CommonPrimitivesProtoSchemaInitializer;
|
import org.keycloak.models.map.storage.hotRod.common.CommonPrimitivesProtoSchemaInitializer;
|
||||||
import org.keycloak.models.map.storage.hotRod.common.HotRodStringPair;
|
import org.keycloak.models.map.storage.hotRod.common.HotRodStringPair;
|
||||||
import org.keycloak.models.map.storage.hotRod.common.UpdatableHotRodEntityDelegateImpl;
|
import org.keycloak.models.map.storage.hotRod.common.UpdatableHotRodEntityDelegateImpl;
|
||||||
|
import org.keycloak.models.map.userSession.MapAuthenticatedClientSessionEntity;
|
||||||
import org.keycloak.models.map.userSession.MapUserSessionEntity;
|
import org.keycloak.models.map.userSession.MapUserSessionEntity;
|
||||||
|
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.Objects;
|
||||||
|
import java.util.Optional;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
|
||||||
@GenerateHotRodEntityImplementation(
|
@GenerateHotRodEntityImplementation(
|
||||||
|
@ -48,7 +53,8 @@ public class HotRodUserSessionEntity extends AbstractHotRodEntity {
|
||||||
|
|
||||||
@AutoProtoSchemaBuilder(
|
@AutoProtoSchemaBuilder(
|
||||||
includeClasses = {
|
includeClasses = {
|
||||||
HotRodUserSessionEntity.class
|
HotRodUserSessionEntity.class,
|
||||||
|
HotRodAuthenticatedClientSessionEntity.class,
|
||||||
},
|
},
|
||||||
schemaFilePath = "proto/",
|
schemaFilePath = "proto/",
|
||||||
schemaPackageName = CommonPrimitivesProtoSchemaInitializer.HOT_ROD_ENTITY_PACKAGE,
|
schemaPackageName = CommonPrimitivesProtoSchemaInitializer.HOT_ROD_ENTITY_PACKAGE,
|
||||||
|
@ -113,7 +119,7 @@ public class HotRodUserSessionEntity extends AbstractHotRodEntity {
|
||||||
|
|
||||||
@ProtoDoc("@Field(index = Index.YES, store = Store.YES)")
|
@ProtoDoc("@Field(index = Index.YES, store = Store.YES)")
|
||||||
@ProtoField(number = 16)
|
@ProtoField(number = 16)
|
||||||
public Set<HotRodStringPair> authenticatedClientSessions;
|
public Set<HotRodAuthenticatedClientSessionEntity> authenticatedClientSessions;
|
||||||
|
|
||||||
@ProtoDoc("@Field(index = Index.YES, store = Store.YES)")
|
@ProtoDoc("@Field(index = Index.YES, store = Store.YES)")
|
||||||
@ProtoField(number = 17)
|
@ProtoField(number = 17)
|
||||||
|
@ -145,6 +151,41 @@ public class HotRodUserSessionEntity extends AbstractHotRodEntity {
|
||||||
throw new IllegalArgumentException("Transient session should not be stored in the HotRod.");
|
throw new IllegalArgumentException("Transient session should not be stored in the HotRod.");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean isUpdated() {
|
||||||
|
return getHotRodEntity().updated
|
||||||
|
|| Optional.ofNullable(getAuthenticatedClientSessions()).orElseGet(Collections::emptySet).stream().anyMatch(UpdatableEntity::isUpdated);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void clearUpdatedFlag() {
|
||||||
|
getHotRodEntity().updated = false;
|
||||||
|
Optional.ofNullable(getAuthenticatedClientSessions()).orElseGet(Collections::emptySet).forEach(UpdatableEntity::clearUpdatedFlag);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Optional<MapAuthenticatedClientSessionEntity> getAuthenticatedClientSession(String clientUUID) {
|
||||||
|
Set<HotRodAuthenticatedClientSessionEntity> acss = getHotRodEntity().authenticatedClientSessions;
|
||||||
|
if (acss == null || acss.isEmpty()) return Optional.empty();
|
||||||
|
|
||||||
|
return acss.stream().filter(acs -> Objects.equals(acs.clientId, clientUUID)).findFirst().map(HotRodAuthenticatedClientSessionEntityDelegate::new);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Boolean removeAuthenticatedClientSession(String clientUUID) {
|
||||||
|
Set<HotRodAuthenticatedClientSessionEntity> acss = getHotRodEntity().authenticatedClientSessions;
|
||||||
|
boolean removed = acss != null && acss.removeIf(uc -> Objects.equals(uc.clientId, clientUUID));
|
||||||
|
getHotRodEntity().updated |= removed;
|
||||||
|
return removed;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void clearAuthenticatedClientSessions() {
|
||||||
|
HotRodUserSessionEntity entity = getHotRodEntity();
|
||||||
|
entity.updated = entity.authenticatedClientSessions != null;
|
||||||
|
entity.authenticatedClientSessions = null;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -1,62 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright 2022 Red Hat, Inc. and/or its affiliates
|
|
||||||
* and other contributors as indicated by the @author tags.
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.keycloak.models.map.storage.hotRod.userSession;
|
|
||||||
|
|
||||||
import org.infinispan.client.hotrod.RemoteCache;
|
|
||||||
import org.keycloak.models.AuthenticatedClientSessionModel;
|
|
||||||
import org.keycloak.models.KeycloakSession;
|
|
||||||
import org.keycloak.models.UserSessionModel;
|
|
||||||
import org.keycloak.models.map.common.DeepCloner;
|
|
||||||
import org.keycloak.models.map.common.StringKeyConverter;
|
|
||||||
import org.keycloak.models.map.storage.MapKeycloakTransaction;
|
|
||||||
import org.keycloak.models.map.storage.chm.MapFieldPredicates;
|
|
||||||
import org.keycloak.models.map.storage.chm.MapModelCriteriaBuilder;
|
|
||||||
import org.keycloak.models.map.storage.chm.UserSessionCascadeRemovalTransaction;
|
|
||||||
import org.keycloak.models.map.storage.hotRod.HotRodMapStorage;
|
|
||||||
import org.keycloak.models.map.storage.hotRod.common.HotRodEntityDescriptor;
|
|
||||||
import org.keycloak.storage.SearchableModelField;
|
|
||||||
|
|
||||||
import java.util.Map;
|
|
||||||
|
|
||||||
public class HotRodUserSessionMapStorage<K> extends HotRodMapStorage<K, HotRodUserSessionEntity, HotRodUserSessionEntityDelegate, UserSessionModel> {
|
|
||||||
|
|
||||||
private final HotRodMapStorage<K, HotRodAuthenticatedClientSessionEntity, HotRodAuthenticatedClientSessionEntityDelegate, AuthenticatedClientSessionModel> hotRodClientSessionStore;
|
|
||||||
|
|
||||||
public HotRodUserSessionMapStorage(HotRodMapStorage<K, HotRodAuthenticatedClientSessionEntity, HotRodAuthenticatedClientSessionEntityDelegate, AuthenticatedClientSessionModel> hotRodClientSessionStore,
|
|
||||||
RemoteCache<K, HotRodUserSessionEntity> remoteCache,
|
|
||||||
StringKeyConverter<K> keyConverter,
|
|
||||||
HotRodEntityDescriptor<HotRodUserSessionEntity, HotRodUserSessionEntityDelegate> storedEntityDescriptor,
|
|
||||||
DeepCloner cloner
|
|
||||||
) {
|
|
||||||
super(remoteCache, keyConverter, storedEntityDescriptor, cloner);
|
|
||||||
this.hotRodClientSessionStore = hotRodClientSessionStore;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public MapKeycloakTransaction<HotRodUserSessionEntityDelegate, UserSessionModel> createTransaction(KeycloakSession session) {
|
|
||||||
MapKeycloakTransaction<HotRodUserSessionEntityDelegate, UserSessionModel> sessionTransaction = session.getAttribute("map-transaction-" + hashCode(), MapKeycloakTransaction.class);
|
|
||||||
|
|
||||||
if (sessionTransaction == null) {
|
|
||||||
Map<SearchableModelField<? super UserSessionModel>, MapModelCriteriaBuilder.UpdatePredicatesFunc<K, HotRodUserSessionEntityDelegate, UserSessionModel>> fieldPredicates = MapFieldPredicates.getPredicates((Class<UserSessionModel>) storedEntityDescriptor.getModelTypeClass());
|
|
||||||
sessionTransaction = new UserSessionCascadeRemovalTransaction<>(this, hotRodClientSessionStore.createTransaction(session), keyConverter, cloner, fieldPredicates);
|
|
||||||
session.setAttribute("map-transaction-" + hashCode(), sessionTransaction);
|
|
||||||
}
|
|
||||||
|
|
||||||
return sessionTransaction;
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -75,15 +75,8 @@
|
||||||
<indexing>
|
<indexing>
|
||||||
<indexed-entities>
|
<indexed-entities>
|
||||||
<indexed-entity>kc.HotRodUserSessionEntity</indexed-entity>
|
<indexed-entity>kc.HotRodUserSessionEntity</indexed-entity>
|
||||||
<indexed-entity>kc.HotRodStringPair</indexed-entity>
|
|
||||||
</indexed-entities>
|
|
||||||
</indexing>
|
|
||||||
<encoding media-type="application/x-protostream"/>
|
|
||||||
</distributed-cache>
|
|
||||||
<distributed-cache name="client-sessions" mode="SYNC">
|
|
||||||
<indexing>
|
|
||||||
<indexed-entities>
|
|
||||||
<indexed-entity>kc.HotRodAuthenticatedClientSessionEntity</indexed-entity>
|
<indexed-entity>kc.HotRodAuthenticatedClientSessionEntity</indexed-entity>
|
||||||
|
<indexed-entity>kc.HotRodStringPair</indexed-entity>
|
||||||
</indexed-entities>
|
</indexed-entities>
|
||||||
</indexing>
|
</indexing>
|
||||||
<encoding media-type="application/x-protostream"/>
|
<encoding media-type="application/x-protostream"/>
|
||||||
|
|
|
@ -77,15 +77,8 @@
|
||||||
<indexing>
|
<indexing>
|
||||||
<indexed-entities>
|
<indexed-entities>
|
||||||
<indexed-entity>kc.HotRodUserSessionEntity</indexed-entity>
|
<indexed-entity>kc.HotRodUserSessionEntity</indexed-entity>
|
||||||
<indexed-entity>kc.HotRodStringPair</indexed-entity>
|
|
||||||
</indexed-entities>
|
|
||||||
</indexing>
|
|
||||||
<encoding media-type="application/x-protostream"/>
|
|
||||||
</distributed-cache>
|
|
||||||
<distributed-cache name="client-sessions" mode="SYNC">
|
|
||||||
<indexing>
|
|
||||||
<indexed-entities>
|
|
||||||
<indexed-entity>kc.HotRodAuthenticatedClientSessionEntity</indexed-entity>
|
<indexed-entity>kc.HotRodAuthenticatedClientSessionEntity</indexed-entity>
|
||||||
|
<indexed-entity>kc.HotRodStringPair</indexed-entity>
|
||||||
</indexed-entities>
|
</indexed-entities>
|
||||||
</indexing>
|
</indexing>
|
||||||
<encoding media-type="application/x-protostream"/>
|
<encoding media-type="application/x-protostream"/>
|
||||||
|
|
|
@ -240,15 +240,7 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide
|
||||||
LOG.debugf("Initializing new map storage: %s", mapName);
|
LOG.debugf("Initializing new map storage: %s", mapName);
|
||||||
|
|
||||||
ConcurrentHashMapStorage<K, V, M> store;
|
ConcurrentHashMapStorage<K, V, M> store;
|
||||||
if (modelType == UserSessionModel.class) {
|
if(modelType == ActionTokenValueModel.class) {
|
||||||
ConcurrentHashMapStorage clientSessionStore = getStorage(AuthenticatedClientSessionModel.class);
|
|
||||||
store = new UserSessionConcurrentHashMapStorage(clientSessionStore, kc, CLONER) {
|
|
||||||
@Override
|
|
||||||
public String toString() {
|
|
||||||
return "ConcurrentHashMapStorage(" + mapName + suffix + ")";
|
|
||||||
}
|
|
||||||
};
|
|
||||||
} else if(modelType == ActionTokenValueModel.class) {
|
|
||||||
store = new SingleUseObjectConcurrentHashMapStorage(kc, CLONER) {
|
store = new SingleUseObjectConcurrentHashMapStorage(kc, CLONER) {
|
||||||
@Override
|
@Override
|
||||||
public String toString() {
|
public String toString() {
|
||||||
|
@ -299,14 +291,7 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide
|
||||||
/* From ConcurrentHashMapStorage.computeIfAbsent javadoc:
|
/* From ConcurrentHashMapStorage.computeIfAbsent javadoc:
|
||||||
*
|
*
|
||||||
* "... the computation [...] must not attempt to update any other mappings of this map."
|
* "... the computation [...] must not attempt to update any other mappings of this map."
|
||||||
*
|
|
||||||
* For UserSessionModel, there is a separate clientSessionStore in this CHM implementation. Thus
|
|
||||||
* we cannot guarantee that this won't be the case e.g. for user and client sessions. Hence we need
|
|
||||||
* to prepare clientSessionStore outside computeIfAbsent, otherwise deadlock occurs.
|
|
||||||
*/
|
*/
|
||||||
if (modelType == UserSessionModel.class) {
|
|
||||||
getStorage(AuthenticatedClientSessionModel.class, flags);
|
|
||||||
}
|
|
||||||
return (ConcurrentHashMapStorage<K, V, M>) storages.computeIfAbsent(name, n -> loadMap(name, modelType, f));
|
return (ConcurrentHashMapStorage<K, V, M>) storages.computeIfAbsent(name, n -> loadMap(name, modelType, f));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -83,7 +83,6 @@ import static org.keycloak.models.UserSessionModel.CORRESPONDING_SESSION_ID;
|
||||||
*/
|
*/
|
||||||
public class MapFieldPredicates {
|
public class MapFieldPredicates {
|
||||||
|
|
||||||
public static final Map<SearchableModelField<AuthenticatedClientSessionModel>, UpdatePredicatesFunc<Object, MapAuthenticatedClientSessionEntity, AuthenticatedClientSessionModel>> CLIENT_SESSION_PREDICATES = basePredicates(AuthenticatedClientSessionModel.SearchableFields.ID);
|
|
||||||
public static final Map<SearchableModelField<ClientModel>, UpdatePredicatesFunc<Object, MapClientEntity, ClientModel>> CLIENT_PREDICATES = basePredicates(ClientModel.SearchableFields.ID);
|
public static final Map<SearchableModelField<ClientModel>, UpdatePredicatesFunc<Object, MapClientEntity, ClientModel>> CLIENT_PREDICATES = basePredicates(ClientModel.SearchableFields.ID);
|
||||||
public static final Map<SearchableModelField<ClientScopeModel>, UpdatePredicatesFunc<Object, MapClientScopeEntity, ClientScopeModel>> CLIENT_SCOPE_PREDICATES = basePredicates(ClientScopeModel.SearchableFields.ID);
|
public static final Map<SearchableModelField<ClientScopeModel>, UpdatePredicatesFunc<Object, MapClientScopeEntity, ClientScopeModel>> CLIENT_SCOPE_PREDICATES = basePredicates(ClientScopeModel.SearchableFields.ID);
|
||||||
public static final Map<SearchableModelField<GroupModel>, UpdatePredicatesFunc<Object, MapGroupEntity, GroupModel>> GROUP_PREDICATES = basePredicates(GroupModel.SearchableFields.ID);
|
public static final Map<SearchableModelField<GroupModel>, UpdatePredicatesFunc<Object, MapGroupEntity, GroupModel>> GROUP_PREDICATES = basePredicates(GroupModel.SearchableFields.ID);
|
||||||
|
@ -201,12 +200,6 @@ public class MapFieldPredicates {
|
||||||
put(USER_SESSION_PREDICATES, UserSessionModel.SearchableFields.IS_OFFLINE, MapUserSessionEntity::isOffline);
|
put(USER_SESSION_PREDICATES, UserSessionModel.SearchableFields.IS_OFFLINE, MapUserSessionEntity::isOffline);
|
||||||
put(USER_SESSION_PREDICATES, UserSessionModel.SearchableFields.LAST_SESSION_REFRESH, MapUserSessionEntity::getLastSessionRefresh);
|
put(USER_SESSION_PREDICATES, UserSessionModel.SearchableFields.LAST_SESSION_REFRESH, MapUserSessionEntity::getLastSessionRefresh);
|
||||||
|
|
||||||
put(CLIENT_SESSION_PREDICATES, AuthenticatedClientSessionModel.SearchableFields.REALM_ID, MapAuthenticatedClientSessionEntity::getRealmId);
|
|
||||||
put(CLIENT_SESSION_PREDICATES, AuthenticatedClientSessionModel.SearchableFields.CLIENT_ID, MapAuthenticatedClientSessionEntity::getClientId);
|
|
||||||
put(CLIENT_SESSION_PREDICATES, AuthenticatedClientSessionModel.SearchableFields.USER_SESSION_ID, MapAuthenticatedClientSessionEntity::getUserSessionId);
|
|
||||||
put(CLIENT_SESSION_PREDICATES, AuthenticatedClientSessionModel.SearchableFields.IS_OFFLINE, MapAuthenticatedClientSessionEntity::isOffline);
|
|
||||||
put(CLIENT_SESSION_PREDICATES, AuthenticatedClientSessionModel.SearchableFields.TIMESTAMP, MapAuthenticatedClientSessionEntity::getTimestamp);
|
|
||||||
|
|
||||||
put(USER_LOGIN_FAILURE_PREDICATES, UserLoginFailureModel.SearchableFields.REALM_ID, MapUserLoginFailureEntity::getRealmId);
|
put(USER_LOGIN_FAILURE_PREDICATES, UserLoginFailureModel.SearchableFields.REALM_ID, MapUserLoginFailureEntity::getRealmId);
|
||||||
put(USER_LOGIN_FAILURE_PREDICATES, UserLoginFailureModel.SearchableFields.USER_ID, MapUserLoginFailureEntity::getUserId);
|
put(USER_LOGIN_FAILURE_PREDICATES, UserLoginFailureModel.SearchableFields.USER_ID, MapUserLoginFailureEntity::getUserId);
|
||||||
|
|
||||||
|
@ -247,7 +240,6 @@ public class MapFieldPredicates {
|
||||||
PREDICATES.put(PermissionTicket.class, AUTHZ_PERMISSION_TICKET_PREDICATES);
|
PREDICATES.put(PermissionTicket.class, AUTHZ_PERMISSION_TICKET_PREDICATES);
|
||||||
PREDICATES.put(Policy.class, AUTHZ_POLICY_PREDICATES);
|
PREDICATES.put(Policy.class, AUTHZ_POLICY_PREDICATES);
|
||||||
PREDICATES.put(UserSessionModel.class, USER_SESSION_PREDICATES);
|
PREDICATES.put(UserSessionModel.class, USER_SESSION_PREDICATES);
|
||||||
PREDICATES.put(AuthenticatedClientSessionModel.class, CLIENT_SESSION_PREDICATES);
|
|
||||||
PREDICATES.put(UserLoginFailureModel.class, USER_LOGIN_FAILURE_PREDICATES);
|
PREDICATES.put(UserLoginFailureModel.class, USER_LOGIN_FAILURE_PREDICATES);
|
||||||
PREDICATES.put(Event.class, AUTH_EVENTS_PREDICATES);
|
PREDICATES.put(Event.class, AUTH_EVENTS_PREDICATES);
|
||||||
PREDICATES.put(AdminEvent.class, ADMIN_EVENTS_PREDICATES);
|
PREDICATES.put(AdminEvent.class, ADMIN_EVENTS_PREDICATES);
|
||||||
|
@ -539,7 +531,7 @@ public class MapFieldPredicates {
|
||||||
|
|
||||||
private static MapModelCriteriaBuilder<Object, MapUserSessionEntity, UserSessionModel> checkUserSessionContainsAuthenticatedClientSession(MapModelCriteriaBuilder<Object, MapUserSessionEntity, UserSessionModel> mcb, Operator op, Object[] values) {
|
private static MapModelCriteriaBuilder<Object, MapUserSessionEntity, UserSessionModel> checkUserSessionContainsAuthenticatedClientSession(MapModelCriteriaBuilder<Object, MapUserSessionEntity, UserSessionModel> mcb, Operator op, Object[] values) {
|
||||||
String clientId = ensureEqSingleValue(UserSessionModel.SearchableFields.CLIENT_ID, "client_id", op, values);
|
String clientId = ensureEqSingleValue(UserSessionModel.SearchableFields.CLIENT_ID, "client_id", op, values);
|
||||||
Function<MapUserSessionEntity, ?> getter = use -> (use.getAuthenticatedClientSession(clientId) != null);
|
Function<MapUserSessionEntity, ?> getter = use -> (use.getAuthenticatedClientSession(clientId).isPresent());
|
||||||
return mcb.fieldCompare(Boolean.TRUE::equals, getter);
|
return mcb.fieldCompare(Boolean.TRUE::equals, getter);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -1,72 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright 2022 Red Hat, Inc. and/or its affiliates
|
|
||||||
* and other contributors as indicated by the @author tags.
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.keycloak.models.map.storage.chm;
|
|
||||||
|
|
||||||
import org.keycloak.models.AuthenticatedClientSessionModel;
|
|
||||||
import org.keycloak.models.UserSessionModel;
|
|
||||||
import org.keycloak.models.map.common.AbstractEntity;
|
|
||||||
import org.keycloak.models.map.common.DeepCloner;
|
|
||||||
import org.keycloak.models.map.common.StringKeyConverter;
|
|
||||||
import org.keycloak.models.map.storage.MapKeycloakTransaction;
|
|
||||||
import org.keycloak.models.map.storage.ModelCriteriaBuilder;
|
|
||||||
import org.keycloak.models.map.storage.QueryParameters;
|
|
||||||
import org.keycloak.models.map.storage.criteria.DefaultModelCriteria;
|
|
||||||
import org.keycloak.models.map.userSession.MapAuthenticatedClientSessionEntity;
|
|
||||||
import org.keycloak.models.map.userSession.MapUserSessionEntity;
|
|
||||||
import org.keycloak.storage.SearchableModelField;
|
|
||||||
|
|
||||||
import java.util.Map;
|
|
||||||
import java.util.Set;
|
|
||||||
import java.util.stream.Collectors;
|
|
||||||
|
|
||||||
import static org.keycloak.models.map.storage.QueryParameters.withCriteria;
|
|
||||||
|
|
||||||
public class UserSessionCascadeRemovalTransaction<K, V extends MapUserSessionEntity> extends ConcurrentHashMapKeycloakTransaction<K, V, UserSessionModel> {
|
|
||||||
|
|
||||||
private final MapKeycloakTransaction<? extends MapAuthenticatedClientSessionEntity, AuthenticatedClientSessionModel> clientSessionTr;
|
|
||||||
|
|
||||||
public UserSessionCascadeRemovalTransaction(ConcurrentHashMapCrudOperations<V, UserSessionModel> userSessionConcurrentHashMapStorage,
|
|
||||||
MapKeycloakTransaction<? extends MapAuthenticatedClientSessionEntity, AuthenticatedClientSessionModel> clientSessionTr,
|
|
||||||
StringKeyConverter<K> keyConverter,
|
|
||||||
DeepCloner cloner,
|
|
||||||
Map<SearchableModelField<? super UserSessionModel>,
|
|
||||||
MapModelCriteriaBuilder.UpdatePredicatesFunc<K,
|
|
||||||
V,
|
|
||||||
UserSessionModel>> fieldPredicates) {
|
|
||||||
super(userSessionConcurrentHashMapStorage, keyConverter, cloner, fieldPredicates);
|
|
||||||
this.clientSessionTr = clientSessionTr;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public long delete(QueryParameters<UserSessionModel> queryParameters) {
|
|
||||||
Set<String> ids = read(queryParameters).map(AbstractEntity::getId).collect(Collectors.toSet());
|
|
||||||
DefaultModelCriteria<AuthenticatedClientSessionModel> csMcb = DefaultModelCriteria.<AuthenticatedClientSessionModel>criteria()
|
|
||||||
.compare(AuthenticatedClientSessionModel.SearchableFields.USER_SESSION_ID, ModelCriteriaBuilder.Operator.IN, ids);
|
|
||||||
clientSessionTr.delete(withCriteria(csMcb));
|
|
||||||
return super.delete(queryParameters);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public boolean delete(String key) {
|
|
||||||
DefaultModelCriteria<AuthenticatedClientSessionModel> csMcb = DefaultModelCriteria.<AuthenticatedClientSessionModel>criteria()
|
|
||||||
.compare(AuthenticatedClientSessionModel.SearchableFields.USER_SESSION_ID, ModelCriteriaBuilder.Operator.EQ, key);
|
|
||||||
clientSessionTr.delete(withCriteria(csMcb));
|
|
||||||
return super.delete(key);
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
|
@ -1,56 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright 2020 Red Hat, Inc. and/or its affiliates
|
|
||||||
* and other contributors as indicated by the @author tags.
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
package org.keycloak.models.map.storage.chm;
|
|
||||||
|
|
||||||
import org.keycloak.models.map.common.StringKeyConverter;
|
|
||||||
import org.keycloak.models.AuthenticatedClientSessionModel;
|
|
||||||
import org.keycloak.models.KeycloakSession;
|
|
||||||
import org.keycloak.models.UserSessionModel;
|
|
||||||
import org.keycloak.models.map.common.DeepCloner;
|
|
||||||
import org.keycloak.models.map.storage.MapKeycloakTransaction;
|
|
||||||
import org.keycloak.models.map.userSession.MapAuthenticatedClientSessionEntity;
|
|
||||||
import org.keycloak.models.map.userSession.MapUserSessionEntity;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* User session storage with a naive implementation of referential integrity in client to user session relation, restricted to
|
|
||||||
* ON DELETE CASCADE functionality.
|
|
||||||
*
|
|
||||||
* @author hmlnarik
|
|
||||||
*/
|
|
||||||
public class UserSessionConcurrentHashMapStorage<K> extends ConcurrentHashMapStorage<K, MapUserSessionEntity, UserSessionModel> {
|
|
||||||
|
|
||||||
private final ConcurrentHashMapStorage<K, MapAuthenticatedClientSessionEntity, AuthenticatedClientSessionModel> clientSessionStore;
|
|
||||||
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
public UserSessionConcurrentHashMapStorage(ConcurrentHashMapStorage<K, MapAuthenticatedClientSessionEntity, AuthenticatedClientSessionModel> clientSessionStore,
|
|
||||||
StringKeyConverter<K> keyConverter, DeepCloner cloner) {
|
|
||||||
super(UserSessionModel.class, keyConverter, cloner);
|
|
||||||
this.clientSessionStore = clientSessionStore;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
public MapKeycloakTransaction<MapUserSessionEntity, UserSessionModel> createTransaction(KeycloakSession session) {
|
|
||||||
MapKeycloakTransaction<MapUserSessionEntity, UserSessionModel> sessionTransaction = session.getAttribute("map-transaction-" + hashCode(), MapKeycloakTransaction.class);
|
|
||||||
|
|
||||||
if (sessionTransaction == null) {
|
|
||||||
sessionTransaction = new UserSessionCascadeRemovalTransaction<>(this, clientSessionStore.createTransaction(session), clientSessionStore.getKeyConverter(), cloner, fieldPredicates);
|
|
||||||
session.setAttribute("map-transaction-" + hashCode(), sessionTransaction);
|
|
||||||
}
|
|
||||||
return sessionTransaction;
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -35,16 +35,14 @@ public abstract class AbstractAuthenticatedClientSessionModel implements Authent
|
||||||
protected UserSessionModel userSession;
|
protected UserSessionModel userSession;
|
||||||
protected final MapAuthenticatedClientSessionEntity entity;
|
protected final MapAuthenticatedClientSessionEntity entity;
|
||||||
|
|
||||||
public AbstractAuthenticatedClientSessionModel(KeycloakSession session, RealmModel realm, ClientModel client,
|
public AbstractAuthenticatedClientSessionModel(KeycloakSession session, RealmModel realm,
|
||||||
UserSessionModel userSession, MapAuthenticatedClientSessionEntity entity) {
|
UserSessionModel userSession, MapAuthenticatedClientSessionEntity entity) {
|
||||||
Objects.requireNonNull(entity, "entity");
|
Objects.requireNonNull(entity, "entity");
|
||||||
Objects.requireNonNull(realm, "realm");
|
Objects.requireNonNull(realm, "realm");
|
||||||
Objects.requireNonNull(client, "client");
|
|
||||||
Objects.requireNonNull(userSession, "userSession");
|
Objects.requireNonNull(userSession, "userSession");
|
||||||
|
|
||||||
this.session = session;
|
this.session = session;
|
||||||
this.realm = realm;
|
this.realm = realm;
|
||||||
this.client = client;
|
|
||||||
this.userSession = userSession;
|
this.userSession = userSession;
|
||||||
this.entity = entity;
|
this.entity = entity;
|
||||||
}
|
}
|
||||||
|
|
|
@ -25,14 +25,16 @@ import org.keycloak.models.map.common.TimeAdapter;
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
|
||||||
|
import static org.keycloak.models.map.userSession.SessionExpiration.setClientSessionExpiration;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:mkanis@redhat.com">Martin Kanis</a>
|
* @author <a href="mailto:mkanis@redhat.com">Martin Kanis</a>
|
||||||
*/
|
*/
|
||||||
public abstract class MapAuthenticatedClientSessionAdapter extends AbstractAuthenticatedClientSessionModel {
|
public abstract class MapAuthenticatedClientSessionAdapter extends AbstractAuthenticatedClientSessionModel {
|
||||||
|
|
||||||
public MapAuthenticatedClientSessionAdapter(KeycloakSession session, RealmModel realm, ClientModel client,
|
public MapAuthenticatedClientSessionAdapter(KeycloakSession session, RealmModel realm,
|
||||||
UserSessionModel userSession, MapAuthenticatedClientSessionEntity entity) {
|
UserSessionModel userSession, MapAuthenticatedClientSessionEntity entity) {
|
||||||
super(session, realm, client, userSession, entity);
|
super(session, realm, userSession, entity);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -49,6 +51,9 @@ public abstract class MapAuthenticatedClientSessionAdapter extends AbstractAuthe
|
||||||
@Override
|
@Override
|
||||||
public void setTimestamp(int timestamp) {
|
public void setTimestamp(int timestamp) {
|
||||||
entity.setTimestamp(TimeAdapter.fromSecondsToMilliseconds(timestamp));
|
entity.setTimestamp(TimeAdapter.fromSecondsToMilliseconds(timestamp));
|
||||||
|
|
||||||
|
// whenever the timestamp is changed recompute the expiration time
|
||||||
|
setClientSessionExpiration(entity, realm, getClient());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -123,7 +128,7 @@ public abstract class MapAuthenticatedClientSessionAdapter extends AbstractAuthe
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public ClientModel getClient() {
|
public ClientModel getClient() {
|
||||||
return client;
|
return realm.getClientById(entity.getClientId());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -69,9 +69,6 @@ public interface MapAuthenticatedClientSessionEntity extends AbstractEntity, Upd
|
||||||
String getClientId();
|
String getClientId();
|
||||||
void setClientId(String clientId);
|
void setClientId(String clientId);
|
||||||
|
|
||||||
String getUserSessionId();
|
|
||||||
void setUserSessionId(String userSessionId);
|
|
||||||
|
|
||||||
String getAuthMethod();
|
String getAuthMethod();
|
||||||
void setAuthMethod(String authMethod);
|
void setAuthMethod(String authMethod);
|
||||||
|
|
||||||
|
|
|
@ -26,18 +26,21 @@ import org.keycloak.models.UserModel;
|
||||||
import org.keycloak.models.UserSessionModel;
|
import org.keycloak.models.UserSessionModel;
|
||||||
import org.keycloak.models.map.common.TimeAdapter;
|
import org.keycloak.models.map.common.TimeAdapter;
|
||||||
|
|
||||||
|
import java.util.Collection;
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
import java.util.HashMap;
|
|
||||||
import java.util.LinkedList;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.Objects;
|
import java.util.Objects;
|
||||||
|
import java.util.Set;
|
||||||
import java.util.concurrent.ConcurrentHashMap;
|
import java.util.concurrent.ConcurrentHashMap;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
|
import static org.keycloak.models.map.common.ExpirationUtils.isExpired;
|
||||||
|
import static org.keycloak.models.map.userSession.SessionExpiration.setUserSessionExpiration;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:mkanis@redhat.com">Martin Kanis</a>
|
* @author <a href="mailto:mkanis@redhat.com">Martin Kanis</a>
|
||||||
*/
|
*/
|
||||||
public abstract class MapUserSessionAdapter extends AbstractUserSessionModel {
|
public class MapUserSessionAdapter extends AbstractUserSessionModel {
|
||||||
|
|
||||||
public MapUserSessionAdapter(KeycloakSession session, RealmModel realm, MapUserSessionEntity entity) {
|
public MapUserSessionAdapter(KeycloakSession session, RealmModel realm, MapUserSessionEntity entity) {
|
||||||
super(session, realm, entity);
|
super(session, realm, entity);
|
||||||
|
@ -104,6 +107,9 @@ public abstract class MapUserSessionAdapter extends AbstractUserSessionModel {
|
||||||
@Override
|
@Override
|
||||||
public void setLastSessionRefresh(int seconds) {
|
public void setLastSessionRefresh(int seconds) {
|
||||||
entity.setLastSessionRefresh(TimeAdapter.fromSecondsToMilliseconds(seconds));
|
entity.setLastSessionRefresh(TimeAdapter.fromSecondsToMilliseconds(seconds));
|
||||||
|
|
||||||
|
// whenever the lastSessionRefresh is changed recompute the expiration time
|
||||||
|
setUserSessionExpiration(entity, realm);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -114,55 +120,74 @@ public abstract class MapUserSessionAdapter extends AbstractUserSessionModel {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public Map<String, AuthenticatedClientSessionModel> getAuthenticatedClientSessions() {
|
public Map<String, AuthenticatedClientSessionModel> getAuthenticatedClientSessions() {
|
||||||
Map<String, AuthenticatedClientSessionModel> result = new HashMap<>();
|
Set<MapAuthenticatedClientSessionEntity> authenticatedClientSessions = entity.getAuthenticatedClientSessions();
|
||||||
List<String> removedClientUUIDS = new LinkedList<>();
|
|
||||||
|
|
||||||
Map<String, String> authenticatedClientSessions = entity.getAuthenticatedClientSessions();
|
|
||||||
if (authenticatedClientSessions == null) {
|
if (authenticatedClientSessions == null) {
|
||||||
return Collections.emptyMap();
|
return Collections.emptyMap();
|
||||||
} else {
|
|
||||||
// to avoid concurrentModificationException
|
|
||||||
authenticatedClientSessions = new HashMap<>(authenticatedClientSessions);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
authenticatedClientSessions.forEach((clientUUID, clientSessionId) -> {
|
return authenticatedClientSessions
|
||||||
ClientModel client = realm.getClientById(clientUUID);
|
.stream()
|
||||||
|
.filter(this::filterAndRemoveExpiredClientSessions)
|
||||||
|
.filter(this::matchingOfflineFlag)
|
||||||
|
.filter(this::filterAndRemoveClientSessionWithoutClient)
|
||||||
|
.collect(Collectors.toMap(MapAuthenticatedClientSessionEntity::getClientId, this::clientEntityToModel));
|
||||||
|
}
|
||||||
|
|
||||||
if (client != null) {
|
private AuthenticatedClientSessionModel clientEntityToModel(MapAuthenticatedClientSessionEntity clientSessionEntity) {
|
||||||
AuthenticatedClientSessionModel clientSession = session.sessions()
|
return new MapAuthenticatedClientSessionAdapter(session, realm, this, clientSessionEntity) {
|
||||||
.getClientSession(this, client, clientSessionId, isOffline());
|
@Override
|
||||||
if (clientSession != null) {
|
public void detachFromUserSession() {
|
||||||
result.put(clientUUID, clientSession);
|
MapUserSessionAdapter.this.entity.removeAuthenticatedClientSession(entity.getClientId());
|
||||||
}
|
this.userSession = null;
|
||||||
} else {
|
|
||||||
removedClientUUIDS.add(clientUUID);
|
|
||||||
}
|
}
|
||||||
});
|
};
|
||||||
|
}
|
||||||
|
|
||||||
removeAuthenticatedClientSessions(removedClientUUIDS);
|
public boolean filterAndRemoveExpiredClientSessions(MapAuthenticatedClientSessionEntity clientSession) {
|
||||||
|
if (isExpired(clientSession, false)) {
|
||||||
|
entity.removeAuthenticatedClientSession(clientSession.getClientId());
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
return Collections.unmodifiableMap(result);
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
public boolean filterAndRemoveClientSessionWithoutClient(MapAuthenticatedClientSessionEntity clientSession) {
|
||||||
|
ClientModel client = realm.getClientById(clientSession.getClientId());
|
||||||
|
|
||||||
|
if (client == null) {
|
||||||
|
entity.removeAuthenticatedClientSession(clientSession.getId());
|
||||||
|
|
||||||
|
// Filter out entities that doesn't have client
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// client session has client so we do not filter it out
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
public boolean matchingOfflineFlag(MapAuthenticatedClientSessionEntity clientSession) {
|
||||||
|
Boolean isClientSessionOffline = clientSession.isOffline();
|
||||||
|
|
||||||
|
// If client session doesn't have offline flag default to false
|
||||||
|
if (isClientSessionOffline == null) return !isOffline();
|
||||||
|
|
||||||
|
return isOffline() == isClientSessionOffline;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public AuthenticatedClientSessionModel getAuthenticatedClientSessionByClient(String clientUUID) {
|
public AuthenticatedClientSessionModel getAuthenticatedClientSessionByClient(String clientUUID) {
|
||||||
String clientSessionId = entity.getAuthenticatedClientSession(clientUUID);
|
return entity.getAuthenticatedClientSession(clientUUID)
|
||||||
|
.filter(this::filterAndRemoveExpiredClientSessions)
|
||||||
if (clientSessionId == null) {
|
.filter(this::matchingOfflineFlag)
|
||||||
return null;
|
.filter(this::filterAndRemoveClientSessionWithoutClient)
|
||||||
}
|
.map(this::clientEntityToModel)
|
||||||
|
.orElse(null);
|
||||||
ClientModel client = realm.getClientById(clientUUID);
|
}
|
||||||
|
@Override
|
||||||
if (client != null) {
|
public void removeAuthenticatedClientSessions(Collection<String> removedClientUKS) {
|
||||||
return session.sessions().getClientSession(this, client, clientSessionId, isOffline());
|
removedClientUKS.forEach(entity::removeAuthenticatedClientSession);
|
||||||
}
|
|
||||||
|
|
||||||
removeAuthenticatedClientSessions(Collections.singleton(clientUUID));
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public String getNote(String name) {
|
public String getNote(String name) {
|
||||||
|
@ -226,7 +251,7 @@ public abstract class MapUserSessionAdapter extends AbstractUserSessionModel {
|
||||||
if (correspondingSessionId != null)
|
if (correspondingSessionId != null)
|
||||||
entity.setNote(CORRESPONDING_SESSION_ID, correspondingSessionId);
|
entity.setNote(CORRESPONDING_SESSION_ID, correspondingSessionId);
|
||||||
|
|
||||||
entity.setAuthenticatedClientSessions(null);
|
entity.clearAuthenticatedClientSessions();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -18,12 +18,19 @@ package org.keycloak.models.map.userSession;
|
||||||
|
|
||||||
import org.keycloak.models.UserSessionModel;
|
import org.keycloak.models.UserSessionModel;
|
||||||
import org.keycloak.models.map.annotations.GenerateEntityImplementations;
|
import org.keycloak.models.map.annotations.GenerateEntityImplementations;
|
||||||
|
import org.keycloak.models.map.annotations.IgnoreForEntityImplementationGenerator;
|
||||||
|
import org.keycloak.models.map.client.MapProtocolMapperEntity;
|
||||||
import org.keycloak.models.map.common.AbstractEntity;
|
import org.keycloak.models.map.common.AbstractEntity;
|
||||||
import org.keycloak.models.map.common.DeepCloner;
|
import org.keycloak.models.map.common.DeepCloner;
|
||||||
import org.keycloak.models.map.common.ExpirableEntity;
|
import org.keycloak.models.map.common.ExpirableEntity;
|
||||||
import org.keycloak.models.map.common.UpdatableEntity;
|
import org.keycloak.models.map.common.UpdatableEntity;
|
||||||
|
|
||||||
|
import java.util.Collections;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
import java.util.Objects;
|
||||||
|
import java.util.Optional;
|
||||||
|
import java.util.Set;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:mkanis@redhat.com">Martin Kanis</a>
|
* @author <a href="mailto:mkanis@redhat.com">Martin Kanis</a>
|
||||||
|
@ -49,6 +56,44 @@ public interface MapUserSessionEntity extends AbstractEntity, UpdatableEntity, E
|
||||||
this.id = id;
|
this.id = id;
|
||||||
this.updated |= id != null;
|
this.updated |= id != null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean isUpdated() {
|
||||||
|
return this.updated
|
||||||
|
|| Optional.ofNullable(getAuthenticatedClientSessions()).orElseGet(Collections::emptySet).stream().anyMatch(UpdatableEntity::isUpdated);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void clearUpdatedFlag() {
|
||||||
|
this.updated = false;
|
||||||
|
Optional.ofNullable(getAuthenticatedClientSessions()).orElseGet(Collections::emptySet).forEach(UpdatableEntity::clearUpdatedFlag);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Optional<MapAuthenticatedClientSessionEntity> getAuthenticatedClientSession(String clientUUID) {
|
||||||
|
Set<MapAuthenticatedClientSessionEntity> acss = getAuthenticatedClientSessions();
|
||||||
|
if (acss == null || acss.isEmpty()) return Optional.empty();
|
||||||
|
|
||||||
|
return acss.stream().filter(acs -> Objects.equals(acs.getClientId(), clientUUID)).findFirst();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Boolean removeAuthenticatedClientSession(String clientUUID) {
|
||||||
|
Set<MapAuthenticatedClientSessionEntity> acss = getAuthenticatedClientSessions();
|
||||||
|
boolean removed = acss != null && acss.removeIf(uc -> Objects.equals(uc.getClientId(), clientUUID));
|
||||||
|
this.updated |= removed;
|
||||||
|
return removed;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void clearAuthenticatedClientSessions() {
|
||||||
|
Set<MapAuthenticatedClientSessionEntity> acss = getAuthenticatedClientSessions();
|
||||||
|
if (acss != null) {
|
||||||
|
acss.stream().map(MapAuthenticatedClientSessionEntity::getClientId)
|
||||||
|
.collect(Collectors.toSet())
|
||||||
|
.forEach(this::removeAuthenticatedClientSession);
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
String getRealmId();
|
String getRealmId();
|
||||||
|
@ -110,11 +155,12 @@ public interface MapUserSessionEntity extends AbstractEntity, UpdatableEntity, E
|
||||||
UserSessionModel.State getState();
|
UserSessionModel.State getState();
|
||||||
void setState(UserSessionModel.State state);
|
void setState(UserSessionModel.State state);
|
||||||
|
|
||||||
Map<String, String> getAuthenticatedClientSessions();
|
Set<MapAuthenticatedClientSessionEntity> getAuthenticatedClientSessions();
|
||||||
void setAuthenticatedClientSessions(Map<String, String> authenticatedClientSessions);
|
Optional<MapAuthenticatedClientSessionEntity> getAuthenticatedClientSession(String clientUUID);
|
||||||
String getAuthenticatedClientSession(String clientUUID);
|
void addAuthenticatedClientSession(MapAuthenticatedClientSessionEntity clientSession);
|
||||||
void setAuthenticatedClientSession(String clientUUID, String clientSessionId);
|
|
||||||
Boolean removeAuthenticatedClientSession(String clientUUID);
|
Boolean removeAuthenticatedClientSession(String clientUUID);
|
||||||
|
@IgnoreForEntityImplementationGenerator
|
||||||
|
void clearAuthenticatedClientSessions();
|
||||||
|
|
||||||
Boolean isOffline();
|
Boolean isOffline();
|
||||||
void setOffline(Boolean offline);
|
void setOffline(Boolean offline);
|
||||||
|
|
|
@ -32,6 +32,7 @@ import org.keycloak.models.map.storage.MapKeycloakTransaction;
|
||||||
import org.keycloak.models.map.storage.MapStorage;
|
import org.keycloak.models.map.storage.MapStorage;
|
||||||
import org.keycloak.models.map.storage.ModelCriteriaBuilder.Operator;
|
import org.keycloak.models.map.storage.ModelCriteriaBuilder.Operator;
|
||||||
import org.keycloak.models.map.storage.criteria.DefaultModelCriteria;
|
import org.keycloak.models.map.storage.criteria.DefaultModelCriteria;
|
||||||
|
import org.keycloak.models.utils.KeycloakModelUtils;
|
||||||
|
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
|
@ -63,25 +64,17 @@ public class MapUserSessionProvider implements UserSessionProvider {
|
||||||
private static final Logger LOG = Logger.getLogger(MapUserSessionProvider.class);
|
private static final Logger LOG = Logger.getLogger(MapUserSessionProvider.class);
|
||||||
private final KeycloakSession session;
|
private final KeycloakSession session;
|
||||||
protected final MapKeycloakTransaction<MapUserSessionEntity, UserSessionModel> userSessionTx;
|
protected final MapKeycloakTransaction<MapUserSessionEntity, UserSessionModel> userSessionTx;
|
||||||
protected final MapKeycloakTransaction<MapAuthenticatedClientSessionEntity, AuthenticatedClientSessionModel> clientSessionTx;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Storage for transient user sessions which lifespan is limited to one request.
|
* Storage for transient user sessions which lifespan is limited to one request.
|
||||||
*/
|
*/
|
||||||
private final Map<String, MapUserSessionEntity> transientUserSessions = new HashMap<>();
|
private final Map<String, MapUserSessionEntity> transientUserSessions = new HashMap<>();
|
||||||
/**
|
|
||||||
* Storage for client sessions where parent is transient user session. Lifespan is limited to one request.
|
|
||||||
*/
|
|
||||||
private final Map<String, MapAuthenticatedClientSessionEntity> transientClientSessions = new HashMap<>();
|
|
||||||
|
|
||||||
public MapUserSessionProvider(KeycloakSession session, MapStorage<MapUserSessionEntity, UserSessionModel> userSessionStore,
|
public MapUserSessionProvider(KeycloakSession session, MapStorage<MapUserSessionEntity, UserSessionModel> userSessionStore) {
|
||||||
MapStorage<MapAuthenticatedClientSessionEntity, AuthenticatedClientSessionModel> clientSessionStore) {
|
|
||||||
this.session = session;
|
this.session = session;
|
||||||
userSessionTx = userSessionStore.createTransaction(session);
|
userSessionTx = userSessionStore.createTransaction(session);
|
||||||
clientSessionTx = clientSessionStore.createTransaction(session);
|
|
||||||
|
|
||||||
session.getTransactionManager().enlistAfterCompletion(userSessionTx);
|
session.getTransactionManager().enlistAfterCompletion(userSessionTx);
|
||||||
session.getTransactionManager().enlistAfterCompletion(clientSessionTx);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private Function<MapUserSessionEntity, UserSessionModel> userEntityToAdapterFunc(RealmModel realm) {
|
private Function<MapUserSessionEntity, UserSessionModel> userEntityToAdapterFunc(RealmModel realm) {
|
||||||
|
@ -96,55 +89,7 @@ public class MapUserSessionProvider implements UserSessionProvider {
|
||||||
}
|
}
|
||||||
return null;
|
return null;
|
||||||
} else {
|
} else {
|
||||||
return new MapUserSessionAdapter(session, realm, origEntity) {
|
return new MapUserSessionAdapter(session, realm, origEntity);
|
||||||
@Override
|
|
||||||
public void removeAuthenticatedClientSessions(Collection<String> removedClientUKS) {
|
|
||||||
removedClientUKS.forEach(entity::removeAuthenticatedClientSession);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void setLastSessionRefresh(int lastSessionRefresh) {
|
|
||||||
entity.setLastSessionRefresh(TimeAdapter.fromSecondsToMilliseconds(lastSessionRefresh));
|
|
||||||
// whenever the lastSessionRefresh is changed recompute the expiration time
|
|
||||||
setUserSessionExpiration(entity, realm);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
private Function<MapAuthenticatedClientSessionEntity, AuthenticatedClientSessionModel> clientEntityToAdapterFunc(RealmModel realm,
|
|
||||||
ClientModel client,
|
|
||||||
UserSessionModel userSession) {
|
|
||||||
// Clone entity before returning back, to avoid giving away a reference to the live object to the caller
|
|
||||||
return origEntity -> {
|
|
||||||
if (origEntity == null) return null;
|
|
||||||
if (isExpired(origEntity, false)) {
|
|
||||||
userSession.removeAuthenticatedClientSessions(Arrays.asList(origEntity.getClientId()));
|
|
||||||
// if a client session is found among transient ones we can skip call to store
|
|
||||||
if (transientClientSessions.remove(origEntity.getId()) == null) {
|
|
||||||
clientSessionTx.delete(origEntity.getId());
|
|
||||||
}
|
|
||||||
return null;
|
|
||||||
} else {
|
|
||||||
return new MapAuthenticatedClientSessionAdapter(session, realm, client, userSession, origEntity) {
|
|
||||||
@Override
|
|
||||||
public void detachFromUserSession() {
|
|
||||||
this.userSession = null;
|
|
||||||
|
|
||||||
// if a client session is found among transient ones we can skip call to store
|
|
||||||
if (transientClientSessions.remove(entity.getId()) == null) {
|
|
||||||
clientSessionTx.delete(entity.getId());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void setTimestamp(int timestamp) {
|
|
||||||
entity.setTimestamp(TimeAdapter.fromSecondsToMilliseconds(timestamp));
|
|
||||||
// whenever the timestamp is changed recompute the expiration time
|
|
||||||
setClientSessionExpiration(entity, realm, client);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -164,24 +109,22 @@ public class MapUserSessionProvider implements UserSessionProvider {
|
||||||
throw new IllegalStateException("User session entity does not exist: " + userSession.getId());
|
throw new IllegalStateException("User session entity does not exist: " + userSession.getId());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (userSessionEntity.getAuthenticatedClientSession(client.getId()).isPresent()) {
|
||||||
|
userSessionEntity.removeAuthenticatedClientSession(client.getId());
|
||||||
|
}
|
||||||
|
|
||||||
MapAuthenticatedClientSessionEntity entity = createAuthenticatedClientSessionEntityInstance(null, userSession.getId(),
|
MapAuthenticatedClientSessionEntity entity = createAuthenticatedClientSessionEntityInstance(null, userSession.getId(),
|
||||||
realm.getId(), client.getId(), false);
|
realm.getId(), client.getId(), false);
|
||||||
String started = entity.getTimestamp() != null ? String.valueOf(TimeAdapter.fromMilliSecondsToSeconds(entity.getTimestamp())) : String.valueOf(0);
|
String started = entity.getTimestamp() != null ? String.valueOf(TimeAdapter.fromMilliSecondsToSeconds(entity.getTimestamp())) : String.valueOf(0);
|
||||||
entity.setNote(AuthenticatedClientSessionModel.STARTED_AT_NOTE, started);
|
entity.setNote(AuthenticatedClientSessionModel.STARTED_AT_NOTE, started);
|
||||||
setClientSessionExpiration(entity, realm, client);
|
setClientSessionExpiration(entity, realm, client);
|
||||||
|
|
||||||
if (TRANSIENT == userSessionEntity.getPersistenceState()) {
|
userSessionEntity.addAuthenticatedClientSession(entity);
|
||||||
if (entity.getId() == null) {
|
|
||||||
entity.setId(UUID.randomUUID().toString());
|
|
||||||
}
|
|
||||||
transientClientSessions.put(entity.getId(), entity);
|
|
||||||
} else {
|
|
||||||
entity = clientSessionTx.create(entity);
|
|
||||||
}
|
|
||||||
|
|
||||||
userSessionEntity.setAuthenticatedClientSession(client.getId(), entity.getId());
|
// We need to load the clientSession through userModel so we return an entity that is included within the
|
||||||
|
// transaction and also, so we not avoid all the checks present in the adapter, for example expiration
|
||||||
return clientEntityToAdapterFunc(realm, client, userSession).apply(entity);
|
UserSessionModel userSessionModel = userEntityToAdapterFunc(realm).apply(userSessionEntity);
|
||||||
|
return userSessionModel == null ? null : userSessionModel.getAuthenticatedClientSessionByClient(client.getId());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -190,29 +133,7 @@ public class MapUserSessionProvider implements UserSessionProvider {
|
||||||
LOG.tracef("getClientSession(%s, %s, %s, %s)%s", userSession, client,
|
LOG.tracef("getClientSession(%s, %s, %s, %s)%s", userSession, client,
|
||||||
clientSessionId, offline, getShortStackTrace());
|
clientSessionId, offline, getShortStackTrace());
|
||||||
|
|
||||||
Objects.requireNonNull(userSession, "The provided user session cannot be null!");
|
return userSession.getAuthenticatedClientSessionByClient(client.getId());
|
||||||
Objects.requireNonNull(client, "The provided client cannot be null!");
|
|
||||||
if (clientSessionId == null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
MapAuthenticatedClientSessionEntity entity = transientClientSessions.get(clientSessionId);
|
|
||||||
|
|
||||||
if (entity != null) {
|
|
||||||
return clientEntityToAdapterFunc(client.getRealm(), client, userSession).apply(entity);
|
|
||||||
}
|
|
||||||
|
|
||||||
DefaultModelCriteria<AuthenticatedClientSessionModel> mcb = criteria();
|
|
||||||
mcb = mcb.compare(AuthenticatedClientSessionModel.SearchableFields.ID, Operator.EQ, clientSessionId)
|
|
||||||
.compare(AuthenticatedClientSessionModel.SearchableFields.USER_SESSION_ID, Operator.EQ, userSession.getId())
|
|
||||||
.compare(AuthenticatedClientSessionModel.SearchableFields.REALM_ID, Operator.EQ, userSession.getRealm().getId())
|
|
||||||
.compare(AuthenticatedClientSessionModel.SearchableFields.CLIENT_ID, Operator.EQ, client.getId())
|
|
||||||
.compare(AuthenticatedClientSessionModel.SearchableFields.IS_OFFLINE, Operator.EQ, offline);
|
|
||||||
|
|
||||||
return clientSessionTx.read(withCriteria(mcb))
|
|
||||||
.findFirst()
|
|
||||||
.map(clientEntityToAdapterFunc(client.getRealm(), client, userSession))
|
|
||||||
.orElse(null);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -492,16 +413,24 @@ public class MapUserSessionProvider implements UserSessionProvider {
|
||||||
int currentTime = Time.currentTime();
|
int currentTime = Time.currentTime();
|
||||||
clientSessionEntity.setNote(AuthenticatedClientSessionModel.STARTED_AT_NOTE, String.valueOf(currentTime));
|
clientSessionEntity.setNote(AuthenticatedClientSessionModel.STARTED_AT_NOTE, String.valueOf(currentTime));
|
||||||
clientSessionEntity.setTimestamp(Time.currentTimeMillis());
|
clientSessionEntity.setTimestamp(Time.currentTimeMillis());
|
||||||
setClientSessionExpiration(clientSessionEntity, clientSession.getRealm(), clientSession.getClient());
|
RealmModel realm = clientSession.getRealm();
|
||||||
clientSessionEntity = clientSessionTx.create(clientSessionEntity);
|
setClientSessionExpiration(clientSessionEntity, realm, clientSession.getClient());
|
||||||
|
|
||||||
Optional<MapUserSessionEntity> userSessionEntity = getOfflineUserSessionEntityStream(clientSession.getRealm(), offlineUserSession.getId()).findFirst();
|
Optional<MapUserSessionEntity> userSessionEntity = getOfflineUserSessionEntityStream(realm, offlineUserSession.getId()).findFirst();
|
||||||
if (userSessionEntity.isPresent()) {
|
if (userSessionEntity.isPresent()) {
|
||||||
userSessionEntity.get().setAuthenticatedClientSession(clientSession.getClient().getId(), clientSessionEntity.getId());
|
MapUserSessionEntity userSession = userSessionEntity.get();
|
||||||
|
String clientId = clientSession.getClient().getId();
|
||||||
|
if (userSession.getAuthenticatedClientSession(clientId).isPresent()) {
|
||||||
|
userSession.removeAuthenticatedClientSession(clientId);
|
||||||
|
}
|
||||||
|
|
||||||
|
userSession.addAuthenticatedClientSession(clientSessionEntity);
|
||||||
|
|
||||||
|
UserSessionModel userSessionModel = userEntityToAdapterFunc(realm).apply(userSession);
|
||||||
|
return userSessionModel == null ? null : userSessionModel.getAuthenticatedClientSessionByClient(clientId);
|
||||||
}
|
}
|
||||||
|
|
||||||
return clientEntityToAdapterFunc(clientSession.getRealm(),
|
return null;
|
||||||
clientSession.getClient(), offlineUserSession).apply(clientSessionEntity);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -582,14 +511,12 @@ public class MapUserSessionProvider implements UserSessionProvider {
|
||||||
|
|
||||||
// Update timestamp to same value as userSession. LastSessionRefresh of userSession from DB will have correct value
|
// Update timestamp to same value as userSession. LastSessionRefresh of userSession from DB will have correct value
|
||||||
clientSession.setTimestamp(userSessionEntity.getLastSessionRefresh());
|
clientSession.setTimestamp(userSessionEntity.getLastSessionRefresh());
|
||||||
|
userSessionEntity.addAuthenticatedClientSession(clientSession);
|
||||||
clientSession = clientSessionTx.create(clientSession);
|
|
||||||
userSessionEntity.setAuthenticatedClientSession(entry.getKey(), clientSession.getId());
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return userSessionEntity;
|
return userSessionEntity;
|
||||||
})
|
})
|
||||||
.forEach(use -> userSessionTx.create(use));
|
.forEach(userSessionTx::create);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -698,8 +625,7 @@ public class MapUserSessionProvider implements UserSessionProvider {
|
||||||
private MapAuthenticatedClientSessionEntity createAuthenticatedClientSessionEntityInstance(String id, String userSessionId, String realmId,
|
private MapAuthenticatedClientSessionEntity createAuthenticatedClientSessionEntityInstance(String id, String userSessionId, String realmId,
|
||||||
String clientId, boolean offline) {
|
String clientId, boolean offline) {
|
||||||
MapAuthenticatedClientSessionEntityImpl clientSessionEntity = new MapAuthenticatedClientSessionEntityImpl();
|
MapAuthenticatedClientSessionEntityImpl clientSessionEntity = new MapAuthenticatedClientSessionEntityImpl();
|
||||||
clientSessionEntity.setId(id);
|
clientSessionEntity.setId(id == null ? KeycloakModelUtils.generateId() : id);
|
||||||
clientSessionEntity.setUserSessionId(userSessionId);
|
|
||||||
clientSessionEntity.setRealmId(realmId);
|
clientSessionEntity.setRealmId(realmId);
|
||||||
clientSessionEntity.setClientId(clientId);
|
clientSessionEntity.setClientId(clientId);
|
||||||
clientSessionEntity.setOffline(offline);
|
clientSessionEntity.setOffline(offline);
|
||||||
|
|
|
@ -20,6 +20,7 @@ import org.keycloak.Config.Scope;
|
||||||
import org.keycloak.common.Profile;
|
import org.keycloak.common.Profile;
|
||||||
import org.keycloak.component.AmphibianProviderFactory;
|
import org.keycloak.component.AmphibianProviderFactory;
|
||||||
import org.keycloak.models.AuthenticatedClientSessionModel;
|
import org.keycloak.models.AuthenticatedClientSessionModel;
|
||||||
|
import org.keycloak.models.ClientModel;
|
||||||
import org.keycloak.models.KeycloakSession;
|
import org.keycloak.models.KeycloakSession;
|
||||||
import org.keycloak.models.KeycloakSessionFactory;
|
import org.keycloak.models.KeycloakSessionFactory;
|
||||||
import org.keycloak.models.RealmModel;
|
import org.keycloak.models.RealmModel;
|
||||||
|
@ -27,6 +28,7 @@ import org.keycloak.models.UserModel;
|
||||||
import org.keycloak.models.UserSessionModel;
|
import org.keycloak.models.UserSessionModel;
|
||||||
import org.keycloak.models.UserSessionProvider;
|
import org.keycloak.models.UserSessionProvider;
|
||||||
import org.keycloak.models.UserSessionProviderFactory;
|
import org.keycloak.models.UserSessionProviderFactory;
|
||||||
|
import org.keycloak.models.map.client.MapClientProvider;
|
||||||
import org.keycloak.models.map.common.AbstractMapProviderFactory;
|
import org.keycloak.models.map.common.AbstractMapProviderFactory;
|
||||||
import org.keycloak.models.map.storage.MapStorage;
|
import org.keycloak.models.map.storage.MapStorage;
|
||||||
import org.keycloak.models.map.storage.MapStorageProvider;
|
import org.keycloak.models.map.storage.MapStorageProvider;
|
||||||
|
@ -42,61 +44,15 @@ import static org.keycloak.models.utils.KeycloakModelUtils.getComponentFactory;
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:mkanis@redhat.com">Martin Kanis</a>
|
* @author <a href="mailto:mkanis@redhat.com">Martin Kanis</a>
|
||||||
*/
|
*/
|
||||||
public class MapUserSessionProviderFactory<UK, CK> implements AmphibianProviderFactory<UserSessionProvider>, UserSessionProviderFactory, EnvironmentDependentProviderFactory, InvalidationHandler {
|
public class MapUserSessionProviderFactory extends AbstractMapProviderFactory<MapUserSessionProvider, MapUserSessionEntity, UserSessionModel> implements UserSessionProviderFactory<MapUserSessionProvider>, InvalidationHandler {
|
||||||
|
|
||||||
public static final String CONFIG_STORAGE_USER_SESSIONS = "storage-user-sessions";
|
public MapUserSessionProviderFactory() {
|
||||||
public static final String CONFIG_STORAGE_CLIENT_SESSIONS = "storage-client-sessions";
|
super(UserSessionModel.class, MapUserSessionProvider.class);
|
||||||
public static final String PROVIDER_ID = AbstractMapProviderFactory.PROVIDER_ID;
|
|
||||||
|
|
||||||
private final String uniqueKey = getClass().getName() + uniqueCounter.incrementAndGet();
|
|
||||||
|
|
||||||
private Scope storageConfigScopeUserSessions;
|
|
||||||
private Scope storageConfigScopeClientSessions;
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public String getId() {
|
|
||||||
return PROVIDER_ID;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void init(Scope config) {
|
public MapUserSessionProvider createNew(KeycloakSession session) {
|
||||||
storageConfigScopeUserSessions = config.scope(AbstractMapProviderFactory.CONFIG_STORAGE + "-user-sessions");
|
return new MapUserSessionProvider(session, getStorage(session));
|
||||||
storageConfigScopeClientSessions = config.scope(AbstractMapProviderFactory.CONFIG_STORAGE + "-client-sessions");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void postInit(KeycloakSessionFactory factory) {
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void close() {
|
|
||||||
AmphibianProviderFactory.super.close();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void loadPersistentSessions(KeycloakSessionFactory sessionFactory, int maxErrors, int sessionsPerSegment) {
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
@SuppressWarnings("unchecked")
|
|
||||||
public MapUserSessionProvider create(KeycloakSession session) {
|
|
||||||
MapUserSessionProvider provider = session.getAttribute(uniqueKey, MapUserSessionProvider.class);
|
|
||||||
|
|
||||||
if (provider != null) return provider;
|
|
||||||
|
|
||||||
MapStorageProviderFactory storageProviderFactoryUs = (MapStorageProviderFactory) getComponentFactory(session.getKeycloakSessionFactory(),
|
|
||||||
MapStorageProvider.class, storageConfigScopeUserSessions, MapStorageSpi.NAME);
|
|
||||||
final MapStorageProvider factoryUs = storageProviderFactoryUs.create(session);
|
|
||||||
MapStorage userSessionStore = factoryUs.getStorage(UserSessionModel.class);
|
|
||||||
|
|
||||||
MapStorageProviderFactory storageProviderFactoryCs = (MapStorageProviderFactory) getComponentFactory(session.getKeycloakSessionFactory(),
|
|
||||||
MapStorageProvider.class, storageConfigScopeClientSessions, MapStorageSpi.NAME);
|
|
||||||
final MapStorageProvider factoryCs = storageProviderFactoryCs.create(session);
|
|
||||||
MapStorage clientSessionStore = factoryCs.getStorage(AuthenticatedClientSessionModel.class);
|
|
||||||
|
|
||||||
provider = new MapUserSessionProvider(session, userSessionStore, clientSessionStore);
|
|
||||||
session.setAttribute(uniqueKey, provider);
|
|
||||||
return provider;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -112,7 +68,7 @@ public class MapUserSessionProviderFactory<UK, CK> implements AmphibianProviderF
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean isSupported() {
|
public void loadPersistentSessions(KeycloakSessionFactory sessionFactory, int maxErrors, int sessionsPerSegment) {
|
||||||
return Profile.isFeatureEnabled(Profile.Feature.MAP_STORAGE);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -23,7 +23,7 @@ import org.keycloak.provider.ProviderFactory;
|
||||||
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
||||||
* @version $Revision: 1 $
|
* @version $Revision: 1 $
|
||||||
*/
|
*/
|
||||||
public interface UserSessionProviderFactory extends ProviderFactory<UserSessionProvider> {
|
public interface UserSessionProviderFactory<T extends UserSessionProvider> extends ProviderFactory<T> {
|
||||||
|
|
||||||
// This is supposed to prefill all userSessions and clientSessions from userSessionPersister to the userSession infinispan/memory storage
|
// This is supposed to prefill all userSessions and clientSessions from userSessionPersister to the userSession infinispan/memory storage
|
||||||
void loadPersistentSessions(KeycloakSessionFactory sessionFactory, final int maxErrors, final int sessionsPerSegment);
|
void loadPersistentSessions(KeycloakSessionFactory sessionFactory, final int maxErrors, final int sessionsPerSegment);
|
||||||
|
|
|
@ -28,15 +28,6 @@ import org.keycloak.storage.SearchableModelField;
|
||||||
*/
|
*/
|
||||||
public interface AuthenticatedClientSessionModel extends CommonClientSessionModel {
|
public interface AuthenticatedClientSessionModel extends CommonClientSessionModel {
|
||||||
|
|
||||||
class SearchableFields {
|
|
||||||
public static final SearchableModelField<AuthenticatedClientSessionModel> ID = new SearchableModelField<>("id", String.class);
|
|
||||||
public static final SearchableModelField<AuthenticatedClientSessionModel> REALM_ID = new SearchableModelField<>("realmId", String.class);
|
|
||||||
public static final SearchableModelField<AuthenticatedClientSessionModel> CLIENT_ID = new SearchableModelField<>("clientId", String.class);
|
|
||||||
public static final SearchableModelField<AuthenticatedClientSessionModel> USER_SESSION_ID = new SearchableModelField<>("userSessionId", String.class);
|
|
||||||
public static final SearchableModelField<AuthenticatedClientSessionModel> IS_OFFLINE = new SearchableModelField<>("isOffline", Boolean.class);
|
|
||||||
public static final SearchableModelField<AuthenticatedClientSessionModel> TIMESTAMP = new SearchableModelField<>("timestamp", Long.class);
|
|
||||||
}
|
|
||||||
|
|
||||||
String STARTED_AT_NOTE = "startedAt";
|
String STARTED_AT_NOTE = "startedAt";
|
||||||
|
|
||||||
String getId();
|
String getId();
|
||||||
|
|
|
@ -124,10 +124,7 @@
|
||||||
"userSessions": {
|
"userSessions": {
|
||||||
"provider": "${keycloak.userSession.provider:infinispan}",
|
"provider": "${keycloak.userSession.provider:infinispan}",
|
||||||
"map": {
|
"map": {
|
||||||
"storage-user-sessions": {
|
"storage": {
|
||||||
"provider": "${keycloak.userSession.map.storage.provider:concurrenthashmap}"
|
|
||||||
},
|
|
||||||
"storage-client-sessions": {
|
|
||||||
"provider": "${keycloak.userSession.map.storage.provider:concurrenthashmap}"
|
"provider": "${keycloak.userSession.map.storage.provider:concurrenthashmap}"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -73,15 +73,8 @@
|
||||||
<indexing>
|
<indexing>
|
||||||
<indexed-entities>
|
<indexed-entities>
|
||||||
<indexed-entity>kc.HotRodUserSessionEntity</indexed-entity>
|
<indexed-entity>kc.HotRodUserSessionEntity</indexed-entity>
|
||||||
<indexed-entity>kc.HotRodStringPair</indexed-entity>
|
|
||||||
</indexed-entities>
|
|
||||||
</indexing>
|
|
||||||
<encoding media-type="application/x-protostream"/>
|
|
||||||
</distributed-cache>
|
|
||||||
<distributed-cache name="client-sessions" mode="SYNC">
|
|
||||||
<indexing>
|
|
||||||
<indexed-entities>
|
|
||||||
<indexed-entity>kc.HotRodAuthenticatedClientSessionEntity</indexed-entity>
|
<indexed-entity>kc.HotRodAuthenticatedClientSessionEntity</indexed-entity>
|
||||||
|
<indexed-entity>kc.HotRodStringPair</indexed-entity>
|
||||||
</indexed-entities>
|
</indexed-entities>
|
||||||
</indexing>
|
</indexing>
|
||||||
<encoding media-type="application/x-protostream"/>
|
<encoding media-type="application/x-protostream"/>
|
||||||
|
|
|
@ -88,8 +88,7 @@ public class HotRodMapStorage extends KeycloakModelParameters {
|
||||||
.spi(DeploymentStateSpi.NAME).provider(MapDeploymentStateProviderFactory.PROVIDER_ID).config(STORAGE_CONFIG, ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
.spi(DeploymentStateSpi.NAME).provider(MapDeploymentStateProviderFactory.PROVIDER_ID).config(STORAGE_CONFIG, ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi(StoreFactorySpi.NAME).provider(MapAuthorizationStoreFactory.PROVIDER_ID).config(STORAGE_CONFIG, HotRodMapStorageProviderFactory.PROVIDER_ID)
|
.spi(StoreFactorySpi.NAME).provider(MapAuthorizationStoreFactory.PROVIDER_ID).config(STORAGE_CONFIG, HotRodMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi("user").provider(MapUserProviderFactory.PROVIDER_ID).config(STORAGE_CONFIG, HotRodMapStorageProviderFactory.PROVIDER_ID)
|
.spi("user").provider(MapUserProviderFactory.PROVIDER_ID).config(STORAGE_CONFIG, HotRodMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi(UserSessionSpi.NAME).provider(MapUserSessionProviderFactory.PROVIDER_ID).config("storage-user-sessions.provider", HotRodMapStorageProviderFactory.PROVIDER_ID)
|
.spi(UserSessionSpi.NAME).provider(MapUserSessionProviderFactory.PROVIDER_ID).config(STORAGE_CONFIG, HotRodMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.config("storage-client-sessions.provider", HotRodMapStorageProviderFactory.PROVIDER_ID)
|
|
||||||
.spi(UserLoginFailureSpi.NAME).provider(MapUserLoginFailureProviderFactory.PROVIDER_ID).config(STORAGE_CONFIG, HotRodMapStorageProviderFactory.PROVIDER_ID)
|
.spi(UserLoginFailureSpi.NAME).provider(MapUserLoginFailureProviderFactory.PROVIDER_ID).config(STORAGE_CONFIG, HotRodMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi("dblock").provider(NoLockingDBLockProviderFactory.PROVIDER_ID).config(STORAGE_CONFIG, ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
.spi("dblock").provider(NoLockingDBLockProviderFactory.PROVIDER_ID).config(STORAGE_CONFIG, ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi(EventStoreSpi.NAME).provider(MapUserSessionProviderFactory.PROVIDER_ID).config("storage-admin-events.provider", HotRodMapStorageProviderFactory.PROVIDER_ID)
|
.spi(EventStoreSpi.NAME).provider(MapUserSessionProviderFactory.PROVIDER_ID).config("storage-admin-events.provider", HotRodMapStorageProviderFactory.PROVIDER_ID)
|
||||||
|
|
|
@ -101,8 +101,7 @@ public class JpaMapStorage extends KeycloakModelParameters {
|
||||||
.spi(ActionTokenStoreSpi.NAME).provider(MapSingleUseObjectProviderFactory.PROVIDER_ID) .config(STORAGE_CONFIG, JpaMapStorageProviderFactory.PROVIDER_ID)
|
.spi(ActionTokenStoreSpi.NAME).provider(MapSingleUseObjectProviderFactory.PROVIDER_ID) .config(STORAGE_CONFIG, JpaMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi(SingleUseObjectSpi.NAME).provider(MapSingleUseObjectProviderFactory.PROVIDER_ID) .config(STORAGE_CONFIG, JpaMapStorageProviderFactory.PROVIDER_ID)
|
.spi(SingleUseObjectSpi.NAME).provider(MapSingleUseObjectProviderFactory.PROVIDER_ID) .config(STORAGE_CONFIG, JpaMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi("publicKeyStorage").provider(MapPublicKeyStorageProviderFactory.PROVIDER_ID) .config(STORAGE_CONFIG, ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
.spi("publicKeyStorage").provider(MapPublicKeyStorageProviderFactory.PROVIDER_ID) .config(STORAGE_CONFIG, ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi(UserSessionSpi.NAME).provider(MapUserSessionProviderFactory.PROVIDER_ID) .config("storage-user-sessions.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
.spi(UserSessionSpi.NAME).provider(MapUserSessionProviderFactory.PROVIDER_ID) .config(STORAGE_CONFIG, ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.config("storage-client-sessions.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
|
||||||
.spi(EventStoreSpi.NAME).provider(MapUserSessionProviderFactory.PROVIDER_ID) .config("storage-admin-events.provider", JpaMapStorageProviderFactory.PROVIDER_ID)
|
.spi(EventStoreSpi.NAME).provider(MapUserSessionProviderFactory.PROVIDER_ID) .config("storage-admin-events.provider", JpaMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.config("storage-auth-events.provider", JpaMapStorageProviderFactory.PROVIDER_ID);
|
.config("storage-auth-events.provider", JpaMapStorageProviderFactory.PROVIDER_ID);
|
||||||
}
|
}
|
||||||
|
|
|
@ -97,8 +97,7 @@ public class LdapMapStorage extends KeycloakModelParameters {
|
||||||
.spi(DeploymentStateSpi.NAME).config("map.storage.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
.spi(DeploymentStateSpi.NAME).config("map.storage.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi(StoreFactorySpi.NAME).config("map.storage.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
.spi(StoreFactorySpi.NAME).config("map.storage.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi("user").config("map.storage.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
.spi("user").config("map.storage.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi(UserSessionSpi.NAME).config("map.storage-user-sessions.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
.spi(UserSessionSpi.NAME).config("map.storage.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi(UserSessionSpi.NAME).config("map.storage-client-sessions.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
|
||||||
.spi(UserLoginFailureSpi.NAME).config("map.storage.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
.spi(UserLoginFailureSpi.NAME).config("map.storage.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi("authorizationPersister").config("map.storage.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
.spi("authorizationPersister").config("map.storage.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
||||||
.spi("authenticationSessions").config("map.storage.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
.spi("authenticationSessions").config("map.storage.provider", ConcurrentHashMapStorageProviderFactory.PROVIDER_ID)
|
||||||
|
|
|
@ -32,7 +32,9 @@ import org.keycloak.models.UserSessionModel;
|
||||||
import org.keycloak.models.UserSessionProvider;
|
import org.keycloak.models.UserSessionProvider;
|
||||||
import org.keycloak.models.map.userSession.MapUserSessionProvider;
|
import org.keycloak.models.map.userSession.MapUserSessionProvider;
|
||||||
import org.keycloak.models.session.UserSessionPersisterProvider;
|
import org.keycloak.models.session.UserSessionPersisterProvider;
|
||||||
|
import org.keycloak.models.sessions.infinispan.InfinispanUserSessionProviderFactory;
|
||||||
import org.keycloak.models.sessions.infinispan.changes.sessions.PersisterLastSessionRefreshStoreFactory;
|
import org.keycloak.models.sessions.infinispan.changes.sessions.PersisterLastSessionRefreshStoreFactory;
|
||||||
|
import org.keycloak.models.utils.KeycloakModelUtils;
|
||||||
import org.keycloak.models.utils.ResetTimeOffsetEvent;
|
import org.keycloak.models.utils.ResetTimeOffsetEvent;
|
||||||
import org.keycloak.testsuite.model.KeycloakModelTest;
|
import org.keycloak.testsuite.model.KeycloakModelTest;
|
||||||
import org.keycloak.testsuite.model.RequireProvider;
|
import org.keycloak.testsuite.model.RequireProvider;
|
||||||
|
@ -208,30 +210,37 @@ public class UserSessionProviderModelTest extends KeycloakModelTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testCascadeRemovalOfClientSessionOnUserSessionRemoval() {
|
public void testTransientUserSessionIsNotPersisted() {
|
||||||
UserSessionModel[] origSessions = inComittedTransaction(session -> { return createSessions(session, realmId); });
|
String id = inComittedTransaction(session -> {
|
||||||
|
|
||||||
String testAppClientSessionId = withRealm(realmId, (session, realm) -> {
|
|
||||||
ClientModel testApp = realm.getClientByClientId("test-app");
|
|
||||||
UserSessionModel userSessionToBeRemoved = session.sessions().getUserSession(realm, origSessions[0].getId());
|
|
||||||
String returnValue = userSessionToBeRemoved.getAuthenticatedClientSessions().get(testApp.getId()).getId();
|
|
||||||
|
|
||||||
session.sessions().removeUserSession(realm, userSessionToBeRemoved);
|
|
||||||
return returnValue;
|
|
||||||
});
|
|
||||||
|
|
||||||
assertThat(withRealm(realmId, (session, realm) -> session.sessions().getClientSession(origSessions[0], realm.getClientByClientId("test-app"), testAppClientSessionId, false)), nullValue());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void testClientSessionIsNotPersistedForTransientUserSession() {
|
|
||||||
Object[] transientUserSessionWithClientSessionId = inComittedTransaction(session -> {
|
|
||||||
RealmModel realm = session.realms().getRealm(realmId);
|
RealmModel realm = session.realms().getRealm(realmId);
|
||||||
UserSessionModel userSession = session.sessions().createUserSession(null, realm, session.users().getUserByUsername(realm, "user1"), "user1", "127.0.0.1", "form", false, null, null, UserSessionModel.SessionPersistenceState.TRANSIENT);
|
UserSessionModel userSession = session.sessions().createUserSession(KeycloakModelUtils.generateId(), realm, session.users().getUserByUsername(realm, "user1"), "user1", "127.0.0.1", "form", false, null, null, UserSessionModel.SessionPersistenceState.TRANSIENT);
|
||||||
|
|
||||||
ClientModel testApp = realm.getClientByClientId("test-app");
|
ClientModel testApp = realm.getClientByClientId("test-app");
|
||||||
AuthenticatedClientSessionModel clientSession = session.sessions().createClientSession(realm, testApp, userSession);
|
AuthenticatedClientSessionModel clientSession = session.sessions().createClientSession(realm, testApp, userSession);
|
||||||
|
|
||||||
|
// assert the client sessions are present
|
||||||
|
assertThat(session.sessions().getClientSession(userSession, testApp, clientSession.getId(), false), notNullValue());
|
||||||
|
return userSession.getId();
|
||||||
|
});
|
||||||
|
|
||||||
|
inComittedTransaction(session -> {
|
||||||
|
RealmModel realm = session.realms().getRealm(realmId);
|
||||||
|
UserSessionModel userSession = session.sessions().getUserSession(realm, id);
|
||||||
|
|
||||||
|
// in new transaction transient session should not be present
|
||||||
|
assertThat(userSession, nullValue());
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
@RequireProvider(value = UserSessionProvider.class, only = InfinispanUserSessionProviderFactory.PROVIDER_ID)
|
||||||
|
public void testClientSessionIsNotPersistedForTransientUserSession() {
|
||||||
|
Object[] transientUserSessionWithClientSessionId = inComittedTransaction(session -> {
|
||||||
|
RealmModel realm = session.realms().getRealm(realmId);
|
||||||
|
UserSessionModel userSession = session.sessions().createUserSession(null, realm, session.users().getUserByUsername(realm, "user1"), "user1", "127.0.0.1", "form", false, null, null, UserSessionModel.SessionPersistenceState.TRANSIENT);
|
||||||
|
ClientModel testApp = realm.getClientByClientId("test-app");
|
||||||
|
AuthenticatedClientSessionModel clientSession = session.sessions().createClientSession(realm, testApp, userSession);
|
||||||
|
|
||||||
// assert the client sessions are present
|
// assert the client sessions are present
|
||||||
assertThat(session.sessions().getClientSession(userSession, testApp, clientSession.getId(), false), notNullValue());
|
assertThat(session.sessions().getClientSession(userSession, testApp, clientSession.getId(), false), notNullValue());
|
||||||
Object[] result = new Object[2];
|
Object[] result = new Object[2];
|
||||||
|
@ -239,7 +248,6 @@ public class UserSessionProviderModelTest extends KeycloakModelTest {
|
||||||
result[1] = clientSession.getId();
|
result[1] = clientSession.getId();
|
||||||
return result;
|
return result;
|
||||||
});
|
});
|
||||||
|
|
||||||
inComittedTransaction(session -> {
|
inComittedTransaction(session -> {
|
||||||
RealmModel realm = session.realms().getRealm(realmId);
|
RealmModel realm = session.realms().getRealm(realmId);
|
||||||
ClientModel testApp = realm.getClientByClientId("test-app");
|
ClientModel testApp = realm.getClientByClientId("test-app");
|
||||||
|
|
Loading…
Reference in a new issue