KEYCLOAK-5278 (#4606)
This commit is contained in:
parent
74f5c1c160
commit
375e01a074
4 changed files with 5 additions and 5 deletions
|
@ -672,10 +672,10 @@ public class AuthenticationProcessor {
|
|||
ServicesLogger.LOGGER.failedClientAuthentication(e);
|
||||
if (e.getError() == AuthenticationFlowError.CLIENT_NOT_FOUND) {
|
||||
event.error(Errors.CLIENT_NOT_FOUND);
|
||||
return ClientAuthUtil.errorResponse(Response.Status.BAD_REQUEST.getStatusCode(), "invalid_client", "Could not find client");
|
||||
return ClientAuthUtil.errorResponse(Response.Status.BAD_REQUEST.getStatusCode(), "unauthorized_client", "Invalid client credentials");
|
||||
} else if (e.getError() == AuthenticationFlowError.CLIENT_DISABLED) {
|
||||
event.error(Errors.CLIENT_DISABLED);
|
||||
return ClientAuthUtil.errorResponse(Response.Status.BAD_REQUEST.getStatusCode(), "invalid_client", "Client is not enabled");
|
||||
return ClientAuthUtil.errorResponse(Response.Status.BAD_REQUEST.getStatusCode(), "unauthorized_client", "Invalid client credentials");
|
||||
} else if (e.getError() == AuthenticationFlowError.CLIENT_CREDENTIALS_SETUP_REQUIRED) {
|
||||
event.error(Errors.INVALID_CLIENT_CREDENTIALS);
|
||||
return ClientAuthUtil.errorResponse(Response.Status.BAD_REQUEST.getStatusCode(), "unauthorized_client", e.getMessage());
|
||||
|
|
|
@ -98,7 +98,7 @@ public class ClientAuthenticationFlow implements AuthenticationFlow {
|
|||
processor.getEvent().error(Errors.INVALID_CLIENT);
|
||||
return alternativeChallenge;
|
||||
}
|
||||
throw new AuthenticationFlowException("Client was not identified by any client authenticator", AuthenticationFlowError.UNKNOWN_CLIENT);
|
||||
throw new AuthenticationFlowException("Invalid client credentials", AuthenticationFlowError.INVALID_CREDENTIALS);
|
||||
}
|
||||
|
||||
protected List<AuthenticationExecutionModel> findExecutionsToRun() {
|
||||
|
|
|
@ -536,7 +536,7 @@ public class ClientAuthSignedJWTTest extends AbstractKeycloakTest {
|
|||
CloseableHttpResponse resp = sendRequest(oauth.getServiceAccountUrl(), parameters);
|
||||
OAuthClient.AccessTokenResponse response = new OAuthClient.AccessTokenResponse(resp);
|
||||
|
||||
assertError(response, "client1", "invalid_client", Errors.CLIENT_DISABLED);
|
||||
assertError(response, "client1", "unauthorized_client", Errors.CLIENT_DISABLED);
|
||||
|
||||
ClientManager.realm(adminClient.realm("test")).clientId("client1").enabled(true);
|
||||
}
|
||||
|
|
|
@ -482,7 +482,7 @@ public class RefreshTokenTest extends AbstractKeycloakTest {
|
|||
response = oauth.doRefreshTokenRequest(refreshTokenString, "password");
|
||||
|
||||
assertEquals(400, response.getStatusCode());
|
||||
assertEquals("invalid_client", response.getError());
|
||||
assertEquals("unauthorized_client", response.getError());
|
||||
|
||||
events.expectRefresh(refreshToken.getId(), sessionId).user((String) null).session((String) null).clearDetails().error(Errors.CLIENT_DISABLED).assertEvent();
|
||||
} finally {
|
||||
|
|
Loading…
Reference in a new issue