relative uri tests and fixes
This commit is contained in:
parent
e5e43173bc
commit
7ff2c77a82
18 changed files with 419 additions and 63 deletions
|
@ -46,6 +46,7 @@ public class AdapterDeploymentContext {
|
||||||
public KeycloakDeployment resolveDeployment(HttpFacade facade) {
|
public KeycloakDeployment resolveDeployment(HttpFacade facade) {
|
||||||
KeycloakDeployment deployment = this.deployment;
|
KeycloakDeployment deployment = this.deployment;
|
||||||
if (deployment == null) return null;
|
if (deployment == null) return null;
|
||||||
|
if (deployment.getAuthServerBaseUrl() == null) return deployment;
|
||||||
if (deployment.relativeUrls) {
|
if (deployment.relativeUrls) {
|
||||||
deployment = new DeploymentDelegate(this.deployment);
|
deployment = new DeploymentDelegate(this.deployment);
|
||||||
deployment.setAuthServerBaseUrl(getBaseBuilder(facade, this.deployment.getAuthServerBaseUrl()).build().toString());
|
deployment.setAuthServerBaseUrl(getBaseBuilder(facade, this.deployment.getAuthServerBaseUrl()).build().toString());
|
||||||
|
@ -93,6 +94,11 @@ public class AdapterDeploymentContext {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This delegate is used to store temporary, per-request metadata like request resolved URLs.
|
||||||
|
* Ever method is delegated except URL get methods and isConfigured()
|
||||||
|
*
|
||||||
|
*/
|
||||||
protected static class DeploymentDelegate extends KeycloakDeployment {
|
protected static class DeploymentDelegate extends KeycloakDeployment {
|
||||||
protected KeycloakDeployment delegate;
|
protected KeycloakDeployment delegate;
|
||||||
|
|
||||||
|
@ -100,11 +106,6 @@ public class AdapterDeploymentContext {
|
||||||
this.delegate = delegate;
|
this.delegate = delegate;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public boolean isConfigured() {
|
|
||||||
return delegate.isConfigured();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public String getResourceName() {
|
public String getResourceName() {
|
||||||
return delegate.getResourceName();
|
return delegate.getResourceName();
|
||||||
|
|
|
@ -51,7 +51,7 @@ public class KeycloakDeployment {
|
||||||
}
|
}
|
||||||
|
|
||||||
public boolean isConfigured() {
|
public boolean isConfigured() {
|
||||||
return realm != null && realmKey != null && (bearerOnly || authServerBaseUrl != null);
|
return getRealm() != null && getRealmKey() != null && (isBearerOnly() || getAuthServerBaseUrl() != null);
|
||||||
}
|
}
|
||||||
|
|
||||||
public String getResourceName() {
|
public String getResourceName() {
|
||||||
|
|
|
@ -52,16 +52,18 @@ public class KeycloakDeploymentBuilder {
|
||||||
deployment.setCorsAllowedMethods(adapterConfig.getCorsAllowedMethods());
|
deployment.setCorsAllowedMethods(adapterConfig.getCorsAllowedMethods());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
deployment.setBearerOnly(adapterConfig.isBearerOnly());
|
||||||
|
|
||||||
|
if (adapterConfig.isBearerOnly()) {
|
||||||
|
}
|
||||||
|
|
||||||
if (realmKeyPem == null && adapterConfig.isBearerOnly() && adapterConfig.getAuthServerUrl() == null) {
|
if (realmKeyPem == null && adapterConfig.isBearerOnly() && adapterConfig.getAuthServerUrl() == null) {
|
||||||
throw new IllegalArgumentException("For bearer auth, you must set the realm-public-key or auth-server-url");
|
throw new IllegalArgumentException("For bearer auth, you must set the realm-public-key or auth-server-url");
|
||||||
}
|
}
|
||||||
if (adapterConfig.isBearerOnly()) {
|
if (realmKeyPem == null || !deployment.isBearerOnly()) {
|
||||||
deployment.setBearerOnly(true);
|
deployment.setClient(new HttpClientBuilder().build(adapterConfig));
|
||||||
return deployment;
|
|
||||||
}
|
}
|
||||||
|
if (adapterConfig.getAuthServerUrl() == null && (!deployment.isBearerOnly() || realmKeyPem == null)) {
|
||||||
deployment.setClient(new HttpClientBuilder().build(adapterConfig));
|
|
||||||
if (adapterConfig.getAuthServerUrl() == null) {
|
|
||||||
throw new RuntimeException("You must specify auth-url");
|
throw new RuntimeException("You must specify auth-url");
|
||||||
}
|
}
|
||||||
deployment.setAuthServerBaseUrl(adapterConfig.getAuthServerUrl());
|
deployment.setAuthServerBaseUrl(adapterConfig.getAuthServerUrl());
|
||||||
|
|
|
@ -25,32 +25,46 @@ public class PreAuthActionsHandler {
|
||||||
private static final Logger log = Logger.getLogger(PreAuthActionsHandler.class);
|
private static final Logger log = Logger.getLogger(PreAuthActionsHandler.class);
|
||||||
|
|
||||||
protected UserSessionManagement userSessionManagement;
|
protected UserSessionManagement userSessionManagement;
|
||||||
|
protected AdapterDeploymentContext deploymentContext;
|
||||||
protected KeycloakDeployment deployment;
|
protected KeycloakDeployment deployment;
|
||||||
protected HttpFacade facade;
|
protected HttpFacade facade;
|
||||||
|
|
||||||
public PreAuthActionsHandler(UserSessionManagement userSessionManagement, KeycloakDeployment deployment, HttpFacade facade) {
|
public PreAuthActionsHandler(UserSessionManagement userSessionManagement, AdapterDeploymentContext deploymentContext, HttpFacade facade) {
|
||||||
this.userSessionManagement = userSessionManagement;
|
this.userSessionManagement = userSessionManagement;
|
||||||
this.deployment = deployment;
|
this.deploymentContext = deploymentContext;
|
||||||
this.facade = facade;
|
this.facade = facade;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
protected boolean resolveDeployment() {
|
||||||
|
deployment = deploymentContext.resolveDeployment(facade);
|
||||||
|
if (!deployment.isConfigured()) {
|
||||||
|
log.warn("can't take request, adapter not configured");
|
||||||
|
facade.getResponse().sendError(403, "adapter not configured");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
public boolean handleRequest() {
|
public boolean handleRequest() {
|
||||||
if (!deployment.isConfigured()) return false;
|
|
||||||
String requestUri = facade.getRequest().getURI();
|
String requestUri = facade.getRequest().getURI();
|
||||||
log.debugv("adminRequest {0}", requestUri);
|
log.debugv("adminRequest {0}", requestUri);
|
||||||
if (preflightCors()) {
|
if (preflightCors()) {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
if (requestUri.endsWith(AdapterConstants.K_LOGOUT)) {
|
if (requestUri.endsWith(AdapterConstants.K_LOGOUT)) {
|
||||||
|
if (!resolveDeployment()) return true;
|
||||||
handleLogout();
|
handleLogout();
|
||||||
return true;
|
return true;
|
||||||
} else if (requestUri.endsWith(AdapterConstants.K_PUSH_NOT_BEFORE)) {
|
} else if (requestUri.endsWith(AdapterConstants.K_PUSH_NOT_BEFORE)) {
|
||||||
|
if (!resolveDeployment()) return true;
|
||||||
handlePushNotBefore();
|
handlePushNotBefore();
|
||||||
return true;
|
return true;
|
||||||
} else if (requestUri.endsWith(AdapterConstants.K_GET_SESSION_STATS)) {
|
} else if (requestUri.endsWith(AdapterConstants.K_GET_SESSION_STATS)) {
|
||||||
|
if (!resolveDeployment()) return true;
|
||||||
handleGetSessionStats();
|
handleGetSessionStats();
|
||||||
return true;
|
return true;
|
||||||
}else if (requestUri.endsWith(AdapterConstants.K_GET_USER_STATS)) {
|
}else if (requestUri.endsWith(AdapterConstants.K_GET_USER_STATS)) {
|
||||||
|
if (!resolveDeployment()) return true;
|
||||||
handleGetUserStats();
|
handleGetUserStats();
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
@ -58,6 +72,9 @@ public class PreAuthActionsHandler {
|
||||||
}
|
}
|
||||||
|
|
||||||
public boolean preflightCors() {
|
public boolean preflightCors() {
|
||||||
|
// don't need to resolve deployment on cors requests. Just need to know local cors config.
|
||||||
|
KeycloakDeployment deployment = deploymentContext.getDeployment();
|
||||||
|
if (!deployment.isCors()) return false;
|
||||||
log.debugv("checkCorsPreflight {0}", facade.getRequest().getURI());
|
log.debugv("checkCorsPreflight {0}", facade.getRequest().getURI());
|
||||||
if (!facade.getRequest().getMethod().equalsIgnoreCase("OPTIONS")) {
|
if (!facade.getRequest().getMethod().equalsIgnoreCase("OPTIONS")) {
|
||||||
return false;
|
return false;
|
||||||
|
@ -134,6 +151,11 @@ public class PreAuthActionsHandler {
|
||||||
}
|
}
|
||||||
|
|
||||||
protected JWSInput verifyAdminRequest() throws Exception {
|
protected JWSInput verifyAdminRequest() throws Exception {
|
||||||
|
if (deployment.isSslRequired() && !facade.getRequest().isSecure()) {
|
||||||
|
log.warn("SSL is required for adapter admin action");
|
||||||
|
facade.getResponse().sendError(403, "ssl required");
|
||||||
|
|
||||||
|
}
|
||||||
String token = StreamUtil.readString(facade.getRequest().getInputStream());
|
String token = StreamUtil.readString(facade.getRequest().getInputStream());
|
||||||
if (token == null) {
|
if (token == null) {
|
||||||
log.warn("admin request failed, no token");
|
log.warn("admin request failed, no token");
|
||||||
|
|
|
@ -107,12 +107,9 @@ public class KeycloakAuthenticatorValve extends FormAuthenticator implements Lif
|
||||||
public void invoke(Request request, Response response) throws IOException, ServletException {
|
public void invoke(Request request, Response response) throws IOException, ServletException {
|
||||||
try {
|
try {
|
||||||
CatalinaHttpFacade facade = new CatalinaHttpFacade(request, response);
|
CatalinaHttpFacade facade = new CatalinaHttpFacade(request, response);
|
||||||
KeycloakDeployment deployment = deploymentContext.resolveDeployment(facade);
|
PreAuthActionsHandler handler = new PreAuthActionsHandler(userSessionManagement, deploymentContext, facade);
|
||||||
if (deployment != null && deployment.isConfigured()) {
|
if (handler.handleRequest()) {
|
||||||
PreAuthActionsHandler handler = new PreAuthActionsHandler(userSessionManagement, deployment, facade);
|
return;
|
||||||
if (handler.handleRequest()) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
checkKeycloakSession(request, facade);
|
checkKeycloakSession(request, facade);
|
||||||
super.invoke(request, response);
|
super.invoke(request, response);
|
||||||
|
@ -153,7 +150,7 @@ public class KeycloakAuthenticatorValve extends FormAuthenticator implements Lif
|
||||||
RefreshableKeycloakSecurityContext session = (RefreshableKeycloakSecurityContext) request.getSessionInternal().getNote(KeycloakSecurityContext.class.getName());
|
RefreshableKeycloakSecurityContext session = (RefreshableKeycloakSecurityContext) request.getSessionInternal().getNote(KeycloakSecurityContext.class.getName());
|
||||||
if (session == null) return;
|
if (session == null) return;
|
||||||
// just in case session got serialized
|
// just in case session got serialized
|
||||||
session.setDeployment(deploymentContext.resolveDeployment(facade));
|
if (session.getDeployment() == null) session.setDeployment(deploymentContext.resolveDeployment(facade));
|
||||||
if (session.isActive()) return;
|
if (session.isActive()) return;
|
||||||
|
|
||||||
// FYI: A refresh requires same scope, so same roles will be set. Otherwise, refresh will fail and token will
|
// FYI: A refresh requires same scope, so same roles will be set. Otherwise, refresh will fail and token will
|
||||||
|
|
|
@ -47,13 +47,10 @@ public class ServletPreAuthActionsHandler implements HttpHandler {
|
||||||
@Override
|
@Override
|
||||||
public void handleRequest(HttpServerExchange exchange) throws Exception {
|
public void handleRequest(HttpServerExchange exchange) throws Exception {
|
||||||
UndertowHttpFacade facade = new UndertowHttpFacade(exchange);
|
UndertowHttpFacade facade = new UndertowHttpFacade(exchange);
|
||||||
KeycloakDeployment deployment = deploymentContext.resolveDeployment(facade);
|
final ServletRequestContext servletRequestContext = exchange.getAttachment(ServletRequestContext.ATTACHMENT_KEY);
|
||||||
if (deployment != null && deployment.isConfigured()) {
|
SessionManagementBridge bridge = new SessionManagementBridge(userSessionManagement, servletRequestContext.getDeployment().getSessionManager());
|
||||||
final ServletRequestContext servletRequestContext = exchange.getAttachment(ServletRequestContext.ATTACHMENT_KEY);
|
PreAuthActionsHandler handler = new PreAuthActionsHandler(bridge, deploymentContext, facade);
|
||||||
SessionManagementBridge bridge = new SessionManagementBridge(userSessionManagement, servletRequestContext.getDeployment().getSessionManager());
|
if (handler.handleRequest()) return;
|
||||||
PreAuthActionsHandler handler = new PreAuthActionsHandler(bridge, deployment, facade);
|
|
||||||
if (handler.handleRequest()) return;
|
|
||||||
}
|
|
||||||
next.handleRequest(exchange);
|
next.handleRequest(exchange);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -17,11 +17,12 @@ import org.keycloak.representations.adapters.action.SessionStatsAction;
|
||||||
import org.keycloak.representations.adapters.action.UserStats;
|
import org.keycloak.representations.adapters.action.UserStats;
|
||||||
import org.keycloak.representations.adapters.action.UserStatsAction;
|
import org.keycloak.representations.adapters.action.UserStatsAction;
|
||||||
import org.keycloak.services.util.HttpClientBuilder;
|
import org.keycloak.services.util.HttpClientBuilder;
|
||||||
|
import org.keycloak.services.util.ResolveRelative;
|
||||||
import org.keycloak.util.Time;
|
import org.keycloak.util.Time;
|
||||||
|
|
||||||
import javax.ws.rs.core.MediaType;
|
import javax.ws.rs.core.MediaType;
|
||||||
import javax.ws.rs.core.Response;
|
|
||||||
import javax.ws.rs.core.UriBuilder;
|
import javax.ws.rs.core.UriBuilder;
|
||||||
|
import java.net.URI;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
@ -33,11 +34,11 @@ import java.util.Map;
|
||||||
public class ResourceAdminManager {
|
public class ResourceAdminManager {
|
||||||
protected static Logger logger = Logger.getLogger(ResourceAdminManager.class);
|
protected static Logger logger = Logger.getLogger(ResourceAdminManager.class);
|
||||||
|
|
||||||
public SessionStats getSessionStats(RealmModel realm, ApplicationModel application, boolean users) {
|
public SessionStats getSessionStats(URI requestUri, RealmModel realm, ApplicationModel application, boolean users) {
|
||||||
ApacheHttpClient4Executor executor = createExecutor();
|
ApacheHttpClient4Executor executor = createExecutor();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
return getSessionStats(realm, application, users, executor);
|
return getSessionStats(requestUri, realm, application, users, executor);
|
||||||
} finally {
|
} finally {
|
||||||
executor.getHttpClient().getConnectionManager().shutdown();
|
executor.getHttpClient().getConnectionManager().shutdown();
|
||||||
}
|
}
|
||||||
|
@ -51,8 +52,8 @@ public class ResourceAdminManager {
|
||||||
return new ApacheHttpClient4Executor(client);
|
return new ApacheHttpClient4Executor(client);
|
||||||
}
|
}
|
||||||
|
|
||||||
public SessionStats getSessionStats(RealmModel realm, ApplicationModel application, boolean users, ApacheHttpClient4Executor client) {
|
public SessionStats getSessionStats(URI requestUri, RealmModel realm, ApplicationModel application, boolean users, ApacheHttpClient4Executor client) {
|
||||||
String managementUrl = application.getManagementUrl();
|
String managementUrl = getManagementUrl(requestUri, application);
|
||||||
if (managementUrl != null) {
|
if (managementUrl != null) {
|
||||||
SessionStatsAction adminAction = new SessionStatsAction(TokenIdGenerator.generateId(), Time.currentTime() + 30, application.getName());
|
SessionStatsAction adminAction = new SessionStatsAction(TokenIdGenerator.generateId(), Time.currentTime() + 30, application.getName());
|
||||||
adminAction.setListUsers(users);
|
adminAction.setListUsers(users);
|
||||||
|
@ -94,11 +95,19 @@ public class ResourceAdminManager {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public UserStats getUserStats(RealmModel realm, ApplicationModel application, UserModel user) {
|
protected String getManagementUrl(URI requestUri, ApplicationModel application) {
|
||||||
|
String mgmtUrl = application.getManagementUrl();
|
||||||
|
|
||||||
|
// this is to support relative admin urls when keycloak and applications are deployed on the same machine
|
||||||
|
return ResolveRelative.resolveRelativeUri(requestUri, mgmtUrl);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
public UserStats getUserStats(URI requestUri, RealmModel realm, ApplicationModel application, UserModel user) {
|
||||||
ApacheHttpClient4Executor executor = createExecutor();
|
ApacheHttpClient4Executor executor = createExecutor();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
return getUserStats(realm, application, user, executor);
|
return getUserStats(requestUri, realm, application, user, executor);
|
||||||
} finally {
|
} finally {
|
||||||
executor.getHttpClient().getConnectionManager().shutdown();
|
executor.getHttpClient().getConnectionManager().shutdown();
|
||||||
}
|
}
|
||||||
|
@ -106,8 +115,8 @@ public class ResourceAdminManager {
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
public UserStats getUserStats(RealmModel realm, ApplicationModel application, UserModel user, ApacheHttpClient4Executor client) {
|
public UserStats getUserStats(URI requestUri, RealmModel realm, ApplicationModel application, UserModel user, ApacheHttpClient4Executor client) {
|
||||||
String managementUrl = application.getManagementUrl();
|
String managementUrl = getManagementUrl(requestUri, application);
|
||||||
if (managementUrl != null) {
|
if (managementUrl != null) {
|
||||||
UserStatsAction adminAction = new UserStatsAction(TokenIdGenerator.generateId(), Time.currentTime() + 30, application.getName(), user.getId());
|
UserStatsAction adminAction = new UserStatsAction(TokenIdGenerator.generateId(), Time.currentTime() + 30, application.getName(), user.getId());
|
||||||
String token = new TokenManager().encodeToken(realm, adminAction);
|
String token = new TokenManager().encodeToken(realm, adminAction);
|
||||||
|
@ -137,7 +146,7 @@ public class ResourceAdminManager {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public void logoutUser(RealmModel realm, UserModel user) {
|
public void logoutUser(URI requestUri, RealmModel realm, UserModel user) {
|
||||||
ApacheHttpClient4Executor executor = createExecutor();
|
ApacheHttpClient4Executor executor = createExecutor();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
|
@ -145,13 +154,13 @@ public class ResourceAdminManager {
|
||||||
List<ApplicationModel> resources = realm.getApplications();
|
List<ApplicationModel> resources = realm.getApplications();
|
||||||
logger.debugv("logging out {0} resources ", resources.size());
|
logger.debugv("logging out {0} resources ", resources.size());
|
||||||
for (ApplicationModel resource : resources) {
|
for (ApplicationModel resource : resources) {
|
||||||
logoutApplication(realm, resource, user.getId(), executor, 0);
|
logoutApplication(requestUri, realm, resource, user.getId(), executor, 0);
|
||||||
}
|
}
|
||||||
} finally {
|
} finally {
|
||||||
executor.getHttpClient().getConnectionManager().shutdown();
|
executor.getHttpClient().getConnectionManager().shutdown();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
public void logoutAll(RealmModel realm) {
|
public void logoutAll(URI requestUri, RealmModel realm) {
|
||||||
ApacheHttpClient4Executor executor = createExecutor();
|
ApacheHttpClient4Executor executor = createExecutor();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
|
@ -159,19 +168,19 @@ public class ResourceAdminManager {
|
||||||
List<ApplicationModel> resources = realm.getApplications();
|
List<ApplicationModel> resources = realm.getApplications();
|
||||||
logger.debugv("logging out {0} resources ", resources.size());
|
logger.debugv("logging out {0} resources ", resources.size());
|
||||||
for (ApplicationModel resource : resources) {
|
for (ApplicationModel resource : resources) {
|
||||||
logoutApplication(realm, resource, null, executor, realm.getNotBefore());
|
logoutApplication(requestUri, realm, resource, null, executor, realm.getNotBefore());
|
||||||
}
|
}
|
||||||
} finally {
|
} finally {
|
||||||
executor.getHttpClient().getConnectionManager().shutdown();
|
executor.getHttpClient().getConnectionManager().shutdown();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public void logoutApplication(RealmModel realm, ApplicationModel resource, String user) {
|
public void logoutApplication(URI requestUri, RealmModel realm, ApplicationModel resource, String user) {
|
||||||
ApacheHttpClient4Executor executor = createExecutor();
|
ApacheHttpClient4Executor executor = createExecutor();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
resource.setNotBefore(Time.currentTime());
|
resource.setNotBefore(Time.currentTime());
|
||||||
logoutApplication(realm, resource, user, executor, resource.getNotBefore());
|
logoutApplication(requestUri, realm, resource, user, executor, resource.getNotBefore());
|
||||||
} finally {
|
} finally {
|
||||||
executor.getHttpClient().getConnectionManager().shutdown();
|
executor.getHttpClient().getConnectionManager().shutdown();
|
||||||
}
|
}
|
||||||
|
@ -179,8 +188,8 @@ public class ResourceAdminManager {
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
protected boolean logoutApplication(RealmModel realm, ApplicationModel resource, String user, ApacheHttpClient4Executor client, int notBefore) {
|
protected boolean logoutApplication(URI requestUri, RealmModel realm, ApplicationModel resource, String user, ApacheHttpClient4Executor client, int notBefore) {
|
||||||
String managementUrl = resource.getManagementUrl();
|
String managementUrl = getManagementUrl(requestUri, resource);
|
||||||
if (managementUrl != null) {
|
if (managementUrl != null) {
|
||||||
LogoutAction adminAction = new LogoutAction(TokenIdGenerator.generateId(), Time.currentTime() + 30, resource.getName(), user, notBefore);
|
LogoutAction adminAction = new LogoutAction(TokenIdGenerator.generateId(), Time.currentTime() + 30, resource.getName(), user, notBefore);
|
||||||
String token = new TokenManager().encodeToken(realm, adminAction);
|
String token = new TokenManager().encodeToken(realm, adminAction);
|
||||||
|
@ -205,32 +214,32 @@ public class ResourceAdminManager {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public void pushRealmRevocationPolicy(RealmModel realm) {
|
public void pushRealmRevocationPolicy(URI requestUri, RealmModel realm) {
|
||||||
ApacheHttpClient4Executor executor = createExecutor();
|
ApacheHttpClient4Executor executor = createExecutor();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
for (ApplicationModel application : realm.getApplications()) {
|
for (ApplicationModel application : realm.getApplications()) {
|
||||||
pushRevocationPolicy(realm, application, realm.getNotBefore(), executor);
|
pushRevocationPolicy(requestUri, realm, application, realm.getNotBefore(), executor);
|
||||||
}
|
}
|
||||||
} finally {
|
} finally {
|
||||||
executor.getHttpClient().getConnectionManager().shutdown();
|
executor.getHttpClient().getConnectionManager().shutdown();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public void pushApplicationRevocationPolicy(RealmModel realm, ApplicationModel application) {
|
public void pushApplicationRevocationPolicy(URI requestUri, RealmModel realm, ApplicationModel application) {
|
||||||
ApacheHttpClient4Executor executor = createExecutor();
|
ApacheHttpClient4Executor executor = createExecutor();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
pushRevocationPolicy(realm, application, application.getNotBefore(), executor);
|
pushRevocationPolicy(requestUri, realm, application, application.getNotBefore(), executor);
|
||||||
} finally {
|
} finally {
|
||||||
executor.getHttpClient().getConnectionManager().shutdown();
|
executor.getHttpClient().getConnectionManager().shutdown();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
protected boolean pushRevocationPolicy(RealmModel realm, ApplicationModel resource, int notBefore, ApacheHttpClient4Executor client) {
|
protected boolean pushRevocationPolicy(URI requestUri, RealmModel realm, ApplicationModel resource, int notBefore, ApacheHttpClient4Executor client) {
|
||||||
if (notBefore <= 0) return false;
|
if (notBefore <= 0) return false;
|
||||||
String managementUrl = resource.getManagementUrl();
|
String managementUrl = getManagementUrl(requestUri, resource);
|
||||||
if (managementUrl != null) {
|
if (managementUrl != null) {
|
||||||
PushNotBeforeAction adminAction = new PushNotBeforeAction(TokenIdGenerator.generateId(), Time.currentTime() + 30, resource.getName(), notBefore);
|
PushNotBeforeAction adminAction = new PushNotBeforeAction(TokenIdGenerator.generateId(), Time.currentTime() + 30, resource.getName(), notBefore);
|
||||||
String token = new TokenManager().encodeToken(realm, adminAction);
|
String token = new TokenManager().encodeToken(realm, adminAction);
|
||||||
|
|
|
@ -56,6 +56,7 @@ import org.keycloak.services.messages.Messages;
|
||||||
import org.keycloak.services.resources.flows.Flows;
|
import org.keycloak.services.resources.flows.Flows;
|
||||||
import org.keycloak.services.resources.flows.OAuthRedirect;
|
import org.keycloak.services.resources.flows.OAuthRedirect;
|
||||||
import org.keycloak.services.resources.flows.Urls;
|
import org.keycloak.services.resources.flows.Urls;
|
||||||
|
import org.keycloak.services.util.ResolveRelative;
|
||||||
import org.keycloak.services.validation.Validation;
|
import org.keycloak.services.validation.Validation;
|
||||||
import org.keycloak.social.SocialLoader;
|
import org.keycloak.social.SocialLoader;
|
||||||
import org.keycloak.social.SocialProvider;
|
import org.keycloak.social.SocialProvider;
|
||||||
|
@ -514,7 +515,7 @@ public class AccountService {
|
||||||
if (referrerUri != null) {
|
if (referrerUri != null) {
|
||||||
referrerUri = TokenService.verifyRedirectUri(uriInfo, referrerUri, application);
|
referrerUri = TokenService.verifyRedirectUri(uriInfo, referrerUri, application);
|
||||||
} else {
|
} else {
|
||||||
referrerUri = application.getBaseUrl();
|
referrerUri = ResolveRelative.resolveRelativeUri(uriInfo.getRequestUri(), application.getBaseUrl());
|
||||||
}
|
}
|
||||||
|
|
||||||
if (referrerUri != null) {
|
if (referrerUri != null) {
|
||||||
|
|
|
@ -723,7 +723,7 @@ public class TokenService {
|
||||||
logger.infov("Logging out: {0}", user.getLoginName());
|
logger.infov("Logging out: {0}", user.getLoginName());
|
||||||
authManager.expireIdentityCookie(realm, uriInfo);
|
authManager.expireIdentityCookie(realm, uriInfo);
|
||||||
authManager.expireRememberMeCookie(realm, uriInfo);
|
authManager.expireRememberMeCookie(realm, uriInfo);
|
||||||
resourceAdminManager.logoutUser(realm, user);
|
resourceAdminManager.logoutUser(uriInfo.getRequestUri(), realm, user);
|
||||||
|
|
||||||
audit.user(user).success();
|
audit.user(user).success();
|
||||||
} else {
|
} else {
|
||||||
|
|
|
@ -204,7 +204,7 @@ public class ApplicationResource {
|
||||||
@POST
|
@POST
|
||||||
public void pushRevocation() {
|
public void pushRevocation() {
|
||||||
auth.requireManage();
|
auth.requireManage();
|
||||||
new ResourceAdminManager().pushApplicationRevocationPolicy(realm, application);
|
new ResourceAdminManager().pushApplicationRevocationPolicy(uriInfo.getRequestUri(), realm, application);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Path("session-stats")
|
@Path("session-stats")
|
||||||
|
@ -220,7 +220,7 @@ public class ApplicationResource {
|
||||||
if (users) stats.setUsers(new HashMap<String, UserStats>());
|
if (users) stats.setUsers(new HashMap<String, UserStats>());
|
||||||
return stats;
|
return stats;
|
||||||
}
|
}
|
||||||
SessionStats stats = new ResourceAdminManager().getSessionStats(realm, application, users);
|
SessionStats stats = new ResourceAdminManager().getSessionStats(uriInfo.getRequestUri(), realm, application, users);
|
||||||
if (stats == null) {
|
if (stats == null) {
|
||||||
logger.info("app returned null stats");
|
logger.info("app returned null stats");
|
||||||
} else {
|
} else {
|
||||||
|
@ -234,7 +234,7 @@ public class ApplicationResource {
|
||||||
@POST
|
@POST
|
||||||
public void logoutAll() {
|
public void logoutAll() {
|
||||||
auth.requireManage();
|
auth.requireManage();
|
||||||
new ResourceAdminManager().logoutApplication(realm, application, null);
|
new ResourceAdminManager().logoutApplication(uriInfo.getRequestUri(), realm, application, null);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Path("logout-user/{username}")
|
@Path("logout-user/{username}")
|
||||||
|
@ -245,7 +245,7 @@ public class ApplicationResource {
|
||||||
if (user == null) {
|
if (user == null) {
|
||||||
throw new NotFoundException("User not found");
|
throw new NotFoundException("User not found");
|
||||||
}
|
}
|
||||||
new ResourceAdminManager().logoutApplication(realm, application, user.getId());
|
new ResourceAdminManager().logoutApplication(uriInfo.getRequestUri(), realm, application, user.getId());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -32,6 +32,7 @@ import javax.ws.rs.QueryParam;
|
||||||
import javax.ws.rs.core.Context;
|
import javax.ws.rs.core.Context;
|
||||||
import javax.ws.rs.core.MediaType;
|
import javax.ws.rs.core.MediaType;
|
||||||
import javax.ws.rs.core.Response;
|
import javax.ws.rs.core.Response;
|
||||||
|
import javax.ws.rs.core.UriInfo;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
@ -57,6 +58,9 @@ public class RealmAdminResource {
|
||||||
@Context
|
@Context
|
||||||
protected ProviderSession providers;
|
protected ProviderSession providers;
|
||||||
|
|
||||||
|
@Context
|
||||||
|
protected UriInfo uriInfo;
|
||||||
|
|
||||||
public RealmAdminResource(RealmAuth auth, RealmModel realm, TokenManager tokenManager) {
|
public RealmAdminResource(RealmAuth auth, RealmModel realm, TokenManager tokenManager) {
|
||||||
this.auth = auth;
|
this.auth = auth;
|
||||||
this.realm = realm;
|
this.realm = realm;
|
||||||
|
@ -145,14 +149,14 @@ public class RealmAdminResource {
|
||||||
@POST
|
@POST
|
||||||
public void pushRevocation() {
|
public void pushRevocation() {
|
||||||
auth.requireManage();
|
auth.requireManage();
|
||||||
new ResourceAdminManager().pushRealmRevocationPolicy(realm);
|
new ResourceAdminManager().pushRealmRevocationPolicy(uriInfo.getRequestUri(), realm);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Path("logout-all")
|
@Path("logout-all")
|
||||||
@POST
|
@POST
|
||||||
public void logoutAll() {
|
public void logoutAll() {
|
||||||
auth.requireManage();
|
auth.requireManage();
|
||||||
new ResourceAdminManager().logoutAll(realm);
|
new ResourceAdminManager().logoutAll(uriInfo.getRequestUri(), realm);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Path("session-stats")
|
@Path("session-stats")
|
||||||
|
@ -165,7 +169,7 @@ public class RealmAdminResource {
|
||||||
Map<String, SessionStats> stats = new HashMap<String, SessionStats>();
|
Map<String, SessionStats> stats = new HashMap<String, SessionStats>();
|
||||||
for (ApplicationModel applicationModel : realm.getApplications()) {
|
for (ApplicationModel applicationModel : realm.getApplications()) {
|
||||||
if (applicationModel.getManagementUrl() == null) continue;
|
if (applicationModel.getManagementUrl() == null) continue;
|
||||||
SessionStats appStats = new ResourceAdminManager().getSessionStats(realm, applicationModel, false);
|
SessionStats appStats = new ResourceAdminManager().getSessionStats(uriInfo.getRequestUri(), realm, applicationModel, false);
|
||||||
stats.put(applicationModel.getName(), appStats);
|
stats.put(applicationModel.getName(), appStats);
|
||||||
}
|
}
|
||||||
return stats;
|
return stats;
|
||||||
|
|
|
@ -172,7 +172,7 @@ public class UsersResource {
|
||||||
Map<String, UserStats> stats = new HashMap<String, UserStats>();
|
Map<String, UserStats> stats = new HashMap<String, UserStats>();
|
||||||
for (ApplicationModel applicationModel : realm.getApplications()) {
|
for (ApplicationModel applicationModel : realm.getApplications()) {
|
||||||
if (applicationModel.getManagementUrl() == null) continue;
|
if (applicationModel.getManagementUrl() == null) continue;
|
||||||
UserStats appStats = new ResourceAdminManager().getUserStats(realm, applicationModel, user);
|
UserStats appStats = new ResourceAdminManager().getUserStats(uriInfo.getRequestUri(), realm, applicationModel, user);
|
||||||
if (appStats == null) continue;
|
if (appStats == null) continue;
|
||||||
if (appStats.isLoggedIn()) stats.put(applicationModel.getName(), appStats);
|
if (appStats.isLoggedIn()) stats.put(applicationModel.getName(), appStats);
|
||||||
}
|
}
|
||||||
|
@ -189,7 +189,7 @@ public class UsersResource {
|
||||||
}
|
}
|
||||||
// set notBefore so that user will be forced to log in.
|
// set notBefore so that user will be forced to log in.
|
||||||
user.setNotBefore(Time.currentTime());
|
user.setNotBefore(Time.currentTime());
|
||||||
new ResourceAdminManager().logoutUser(realm, user);
|
new ResourceAdminManager().logoutUser(uriInfo.getRequestUri(), realm, user);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
20
services/src/main/java/org/keycloak/services/util/ResolveRelative.java
Executable file
20
services/src/main/java/org/keycloak/services/util/ResolveRelative.java
Executable file
|
@ -0,0 +1,20 @@
|
||||||
|
package org.keycloak.services.util;
|
||||||
|
|
||||||
|
import javax.ws.rs.core.UriBuilder;
|
||||||
|
import java.net.URI;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
||||||
|
* @version $Revision: 1 $
|
||||||
|
*/
|
||||||
|
public class ResolveRelative {
|
||||||
|
public static String resolveRelativeUri(URI requestUri, String url) {
|
||||||
|
if (url == null || !url.startsWith("/")) return url;
|
||||||
|
UriBuilder builder = UriBuilder.fromPath(url).host(requestUri.getHost());
|
||||||
|
builder.scheme(requestUri.getScheme());
|
||||||
|
if (requestUri.getPort() != -1) {
|
||||||
|
builder.port(requestUri.getPort());
|
||||||
|
}
|
||||||
|
return builder.build().toString();
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,156 @@
|
||||||
|
/*
|
||||||
|
* JBoss, Home of Professional Open Source.
|
||||||
|
* Copyright 2012, Red Hat, Inc., and individual contributors
|
||||||
|
* as indicated by the @author tags. See the copyright.txt file in the
|
||||||
|
* distribution for a full listing of individual contributors.
|
||||||
|
*
|
||||||
|
* This is free software; you can redistribute it and/or modify it
|
||||||
|
* under the terms of the GNU Lesser General Public License as
|
||||||
|
* published by the Free Software Foundation; either version 2.1 of
|
||||||
|
* the License, or (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This software is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||||
|
* Lesser General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU Lesser General Public
|
||||||
|
* License along with this software; if not, write to the Free
|
||||||
|
* Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
|
||||||
|
* 02110-1301 USA, or see the FSF site: http://www.fsf.org.
|
||||||
|
*/
|
||||||
|
package org.keycloak.testsuite.adapter;
|
||||||
|
|
||||||
|
import org.junit.Assert;
|
||||||
|
import org.junit.ClassRule;
|
||||||
|
import org.junit.Rule;
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.keycloak.OAuth2Constants;
|
||||||
|
import org.keycloak.models.ApplicationModel;
|
||||||
|
import org.keycloak.models.Constants;
|
||||||
|
import org.keycloak.models.RealmModel;
|
||||||
|
import org.keycloak.models.UserModel;
|
||||||
|
import org.keycloak.representations.AccessToken;
|
||||||
|
import org.keycloak.representations.adapters.action.SessionStats;
|
||||||
|
import org.keycloak.representations.idm.RealmRepresentation;
|
||||||
|
import org.keycloak.services.managers.RealmManager;
|
||||||
|
import org.keycloak.services.managers.TokenManager;
|
||||||
|
import org.keycloak.testsuite.OAuthClient;
|
||||||
|
import org.keycloak.testsuite.pages.LoginPage;
|
||||||
|
import org.keycloak.testsuite.rule.AbstractKeycloakRule;
|
||||||
|
import org.keycloak.testsuite.rule.WebResource;
|
||||||
|
import org.keycloak.testsuite.rule.WebRule;
|
||||||
|
import org.keycloak.testutils.KeycloakServer;
|
||||||
|
import org.openqa.selenium.WebDriver;
|
||||||
|
|
||||||
|
import javax.ws.rs.client.Client;
|
||||||
|
import javax.ws.rs.client.ClientBuilder;
|
||||||
|
import javax.ws.rs.client.WebTarget;
|
||||||
|
import javax.ws.rs.core.GenericType;
|
||||||
|
import javax.ws.rs.core.HttpHeaders;
|
||||||
|
import javax.ws.rs.core.UriBuilder;
|
||||||
|
import java.net.URL;
|
||||||
|
import java.security.PublicKey;
|
||||||
|
import java.util.Map;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Tests Undertow Adapter
|
||||||
|
*
|
||||||
|
* Also tests relative URIs in the adapter and valid redirect uris.
|
||||||
|
* Also tests adapters not configured with public key
|
||||||
|
*
|
||||||
|
* @author <a href="mailto:bburke@redhat.com">Bill Burke</a>
|
||||||
|
*/
|
||||||
|
public class RelativeUriAdapterTest {
|
||||||
|
|
||||||
|
public static final String LOGIN_URL = "http://localhost:8081/auth/rest/realms/demo/tokens/login";
|
||||||
|
public static PublicKey realmPublicKey;
|
||||||
|
@ClassRule
|
||||||
|
public static AbstractKeycloakRule keycloakRule = new AbstractKeycloakRule(){
|
||||||
|
@Override
|
||||||
|
protected void configure(RealmManager manager, RealmModel adminRealm) {
|
||||||
|
RealmRepresentation representation = KeycloakServer.loadJson(getClass().getResourceAsStream("/adapter-test/demorealm-relative.json"), RealmRepresentation.class);
|
||||||
|
RealmModel realm = manager.importRealm(representation);
|
||||||
|
|
||||||
|
realmPublicKey = realm.getPublicKey();
|
||||||
|
|
||||||
|
URL url = getClass().getResource("/adapter-test/cust-app-keycloak-relative.json");
|
||||||
|
deployApplication("customer-portal", "/customer-portal", CustomerServlet.class, url.getPath(), "user");
|
||||||
|
url = getClass().getResource("/adapter-test/customer-db-keycloak-relative.json");
|
||||||
|
deployApplication("customer-db", "/customer-db", CustomerDatabaseServlet.class, url.getPath(), "user");
|
||||||
|
url = getClass().getResource("/adapter-test/product-keycloak-relative.json");
|
||||||
|
deployApplication("product-portal", "/product-portal", ProductServlet.class, url.getPath(), "user");
|
||||||
|
ApplicationModel adminConsole = adminRealm.getApplicationByName(Constants.ADMIN_CONSOLE_APPLICATION);
|
||||||
|
TokenManager tm = new TokenManager();
|
||||||
|
UserModel admin = adminRealm.getUser("admin");
|
||||||
|
AccessToken token = tm.createClientAccessToken(null, adminRealm, adminConsole, admin);
|
||||||
|
adminToken = tm.encodeToken(adminRealm, token);
|
||||||
|
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
public static String adminToken;
|
||||||
|
|
||||||
|
@Rule
|
||||||
|
public WebRule webRule = new WebRule(this);
|
||||||
|
|
||||||
|
@WebResource
|
||||||
|
protected WebDriver driver;
|
||||||
|
|
||||||
|
@WebResource
|
||||||
|
protected OAuthClient oauth;
|
||||||
|
|
||||||
|
@WebResource
|
||||||
|
protected LoginPage loginPage;
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testLoginSSOAndLogout() throws Exception {
|
||||||
|
// test login to customer-portal which does a bearer request to customer-db
|
||||||
|
driver.navigate().to("http://localhost:8081/customer-portal");
|
||||||
|
System.out.println("Current url: " + driver.getCurrentUrl());
|
||||||
|
Assert.assertTrue(driver.getCurrentUrl().startsWith(LOGIN_URL));
|
||||||
|
loginPage.login("bburke@redhat.com", "password");
|
||||||
|
System.out.println("Current url: " + driver.getCurrentUrl());
|
||||||
|
Assert.assertEquals(driver.getCurrentUrl(), "http://localhost:8081/customer-portal");
|
||||||
|
String pageSource = driver.getPageSource();
|
||||||
|
System.out.println(pageSource);
|
||||||
|
Assert.assertTrue(pageSource.contains("Bill Burke") && pageSource.contains("Stian Thorgersen"));
|
||||||
|
|
||||||
|
// test SSO
|
||||||
|
driver.navigate().to("http://localhost:8081/product-portal");
|
||||||
|
Assert.assertEquals(driver.getCurrentUrl(), "http://localhost:8081/product-portal");
|
||||||
|
pageSource = driver.getPageSource();
|
||||||
|
System.out.println(pageSource);
|
||||||
|
Assert.assertTrue(pageSource.contains("iPhone") && pageSource.contains("iPad"));
|
||||||
|
|
||||||
|
// View stats
|
||||||
|
Client client = ClientBuilder.newClient();
|
||||||
|
WebTarget adminTarget = client.target("http://localhost:8081/auth/rest/admin/realms/demo");
|
||||||
|
Map<String, SessionStats> stats = adminTarget.path("session-stats").request()
|
||||||
|
.header(HttpHeaders.AUTHORIZATION, "Bearer " + adminToken)
|
||||||
|
.get(new GenericType<Map<String, SessionStats>>(){});
|
||||||
|
|
||||||
|
SessionStats custStats = stats.get("customer-portal");
|
||||||
|
Assert.assertNotNull(custStats);
|
||||||
|
Assert.assertEquals(1, custStats.getActiveSessions());
|
||||||
|
SessionStats prodStats = stats.get("product-portal");
|
||||||
|
Assert.assertNotNull(prodStats);
|
||||||
|
Assert.assertEquals(1, prodStats.getActiveSessions());
|
||||||
|
|
||||||
|
client.close();
|
||||||
|
|
||||||
|
|
||||||
|
// test logout
|
||||||
|
|
||||||
|
String logoutUri = UriBuilder.fromUri("http://localhost:8081/auth/rest/realms/demo/tokens/logout")
|
||||||
|
.queryParam(OAuth2Constants.REDIRECT_URI, "http://localhost:8081/customer-portal").build().toString();
|
||||||
|
driver.navigate().to(logoutUri);
|
||||||
|
Assert.assertTrue(driver.getCurrentUrl().startsWith(LOGIN_URL));
|
||||||
|
driver.navigate().to("http://localhost:8081/product-portal");
|
||||||
|
Assert.assertTrue(driver.getCurrentUrl().startsWith(LOGIN_URL));
|
||||||
|
driver.navigate().to("http://localhost:8081/customer-portal");
|
||||||
|
Assert.assertTrue(driver.getCurrentUrl().startsWith(LOGIN_URL));
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,9 @@
|
||||||
|
{
|
||||||
|
"realm": "demo",
|
||||||
|
"resource": "customer-portal",
|
||||||
|
"auth-server-url": "/auth",
|
||||||
|
"ssl-not-required": true,
|
||||||
|
"credentials": {
|
||||||
|
"secret": "password"
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,9 @@
|
||||||
|
{
|
||||||
|
"realm" : "demo",
|
||||||
|
"resource" : "customer-db",
|
||||||
|
"auth-server-url": "/auth",
|
||||||
|
"ssl-not-required": true,
|
||||||
|
"bearer-only" : true,
|
||||||
|
"enable-cors" : true
|
||||||
|
|
||||||
|
}
|
120
testsuite/integration/src/test/resources/adapter-test/demorealm-relative.json
Executable file
120
testsuite/integration/src/test/resources/adapter-test/demorealm-relative.json
Executable file
|
@ -0,0 +1,120 @@
|
||||||
|
{
|
||||||
|
"realm": "demo",
|
||||||
|
"enabled": true,
|
||||||
|
"accessTokenLifespan": 3000,
|
||||||
|
"accessCodeLifespan": 10,
|
||||||
|
"accessCodeLifespanUserAction": 6000,
|
||||||
|
"sslNotRequired": true,
|
||||||
|
"registrationAllowed": false,
|
||||||
|
"social": false,
|
||||||
|
"updateProfileOnInitialSocialLogin": false,
|
||||||
|
"privateKey": "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",
|
||||||
|
"publicKey": "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCrVrCuTtArbgaZzL1hvh0xtL5mc7o0NqPVnYXkLvgcwiC3BjLGw1tGEGoJaXDuSaRllobm53JBhjx33UNv+5z/UMG4kytBWxheNVKnL6GgqlNabMaFfPLPCF8kAgKnsi79NMo+n6KnSY8YeUmec/p2vjO2NjsSAVcWEQMVhJ31LwIDAQAB",
|
||||||
|
"requiredCredentials": [ "password" ],
|
||||||
|
"users" : [
|
||||||
|
{
|
||||||
|
"username" : "bburke@redhat.com",
|
||||||
|
"enabled": true,
|
||||||
|
"email" : "bburke@redhat.com",
|
||||||
|
"firstName": "Bill",
|
||||||
|
"lastName": "Burke",
|
||||||
|
"credentials" : [
|
||||||
|
{ "type" : "password",
|
||||||
|
"value" : "password" }
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"roles" : {
|
||||||
|
"realm" : [
|
||||||
|
{
|
||||||
|
"name": "user",
|
||||||
|
"description": "User privileges"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "admin",
|
||||||
|
"description": "Administrator privileges"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"roleMappings": [
|
||||||
|
{
|
||||||
|
"username": "bburke@redhat.com",
|
||||||
|
"roles": ["user"]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"scopeMappings": [
|
||||||
|
{
|
||||||
|
"client": "third-party",
|
||||||
|
"roles": ["user"]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"client": "customer-portal",
|
||||||
|
"roles": ["user"]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"client": "product-portal",
|
||||||
|
"roles": ["user"]
|
||||||
|
}
|
||||||
|
|
||||||
|
],
|
||||||
|
"applications": [
|
||||||
|
{
|
||||||
|
"name": "customer-portal",
|
||||||
|
"enabled": true,
|
||||||
|
"adminUrl": "/customer-portal",
|
||||||
|
"baseUrl": "/customer-portal",
|
||||||
|
"redirectUris": [
|
||||||
|
"/customer-portal/*"
|
||||||
|
],
|
||||||
|
"secret": "password"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "customer-portal-js",
|
||||||
|
"enabled": true,
|
||||||
|
"publicClient": true,
|
||||||
|
"baseUrl": "/customer-portal-js",
|
||||||
|
"redirectUris": [
|
||||||
|
"/customer-portal-js/*"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "customer-portal-cli",
|
||||||
|
"enabled": true,
|
||||||
|
"publicClient": true,
|
||||||
|
"redirectUris": [
|
||||||
|
"urn:ietf:wg:oauth:2.0:oob",
|
||||||
|
"http://localhost"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "product-portal",
|
||||||
|
"enabled": true,
|
||||||
|
"adminUrl": "/product-portal",
|
||||||
|
"baseUrl": "/product-portal",
|
||||||
|
"redirectUris": [
|
||||||
|
"/product-portal/*"
|
||||||
|
],
|
||||||
|
"secret": "password"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"oauthClients": [
|
||||||
|
{
|
||||||
|
"name": "third-party",
|
||||||
|
"enabled": true,
|
||||||
|
"redirectUris": [
|
||||||
|
"/oauth-client/*",
|
||||||
|
"/oauth-client-cdi/*"
|
||||||
|
],
|
||||||
|
"secret": "password"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"applicationRoleMappings": {
|
||||||
|
"account": [
|
||||||
|
{
|
||||||
|
"username": "bburke@redhat.com",
|
||||||
|
"roles": ["manage-account"]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,9 @@
|
||||||
|
{
|
||||||
|
"realm" : "demo",
|
||||||
|
"resource" : "product-portal",
|
||||||
|
"auth-server-url" : "/auth",
|
||||||
|
"ssl-not-required" : true,
|
||||||
|
"credentials" : {
|
||||||
|
"secret": "password"
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in a new issue