KEYCLOAK-5342 (#4431)
This commit is contained in:
parent
794c508b10
commit
8cc1d02d46
12 changed files with 170 additions and 124 deletions
|
@ -36,5 +36,7 @@
|
|||
<module name="org.apache.httpcomponents"/>
|
||||
<module name="org.jboss.resteasy.resteasy-jaxrs"/>
|
||||
<module name="javax.transaction.api"/>
|
||||
<module name="com.fasterxml.jackson.core.jackson-databind"/>
|
||||
<module name="com.fasterxml.jackson.core.jackson-core"/>
|
||||
</dependencies>
|
||||
</module>
|
||||
|
|
|
@ -17,16 +17,25 @@
|
|||
|
||||
package org.keycloak.broker.provider.util;
|
||||
|
||||
import org.apache.http.*;
|
||||
import com.fasterxml.jackson.core.type.TypeReference;
|
||||
import com.fasterxml.jackson.databind.JsonNode;
|
||||
import com.fasterxml.jackson.databind.ObjectMapper;
|
||||
import org.apache.http.Header;
|
||||
import org.apache.http.HeaderIterator;
|
||||
import org.apache.http.HttpEntity;
|
||||
import org.apache.http.HttpResponse;
|
||||
import org.apache.http.NameValuePair;
|
||||
import org.apache.http.client.HttpClient;
|
||||
import org.apache.http.client.entity.UrlEncodedFormEntity;
|
||||
import org.apache.http.client.methods.HttpGet;
|
||||
import org.apache.http.client.methods.HttpPost;
|
||||
import org.apache.http.client.methods.HttpRequestBase;
|
||||
import org.apache.http.client.utils.URIBuilder;
|
||||
import org.apache.http.entity.StringEntity;
|
||||
import org.apache.http.message.BasicNameValuePair;
|
||||
import org.keycloak.connections.httpclient.HttpClientProvider;
|
||||
import org.keycloak.models.KeycloakSession;
|
||||
import org.keycloak.util.JsonSerialization;
|
||||
|
||||
import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
|
@ -47,25 +56,36 @@ import java.util.zip.GZIPInputStream;
|
|||
*/
|
||||
public class SimpleHttp {
|
||||
|
||||
private KeycloakSession session;
|
||||
private static final ObjectMapper mapper = new ObjectMapper();
|
||||
|
||||
private HttpClient client;
|
||||
|
||||
private String url;
|
||||
private String method;
|
||||
private Map<String, String> headers;
|
||||
private Map<String, String> params;
|
||||
private Object entity;
|
||||
|
||||
protected SimpleHttp(String url, String method, KeycloakSession session) {
|
||||
this.session = session;
|
||||
protected SimpleHttp(String url, String method, HttpClient client) {
|
||||
this.client = client;
|
||||
this.url = url;
|
||||
this.method = method;
|
||||
}
|
||||
|
||||
public static SimpleHttp doGet(String url, KeycloakSession session) {
|
||||
return new SimpleHttp(url, "GET", session);
|
||||
return doGet(url, session.getProvider(HttpClientProvider.class).getHttpClient());
|
||||
}
|
||||
|
||||
public static SimpleHttp doGet(String url, HttpClient client) {
|
||||
return new SimpleHttp(url, "GET", client);
|
||||
}
|
||||
|
||||
public static SimpleHttp doPost(String url, KeycloakSession session) {
|
||||
return new SimpleHttp(url, "POST", session);
|
||||
return doPost(url, session.getProvider(HttpClientProvider.class).getHttpClient());
|
||||
}
|
||||
|
||||
public static SimpleHttp doPost(String url, HttpClient client) {
|
||||
return new SimpleHttp(url, "POST", client);
|
||||
}
|
||||
|
||||
public SimpleHttp header(String name, String value) {
|
||||
|
@ -76,6 +96,11 @@ public class SimpleHttp {
|
|||
return this;
|
||||
}
|
||||
|
||||
public SimpleHttp json(Object entity) {
|
||||
this.entity = entity;
|
||||
return this;
|
||||
}
|
||||
|
||||
public SimpleHttp param(String name, String value) {
|
||||
if (params == null) {
|
||||
params = new HashMap<String, String>();
|
||||
|
@ -84,43 +109,52 @@ public class SimpleHttp {
|
|||
return this;
|
||||
}
|
||||
|
||||
public String asString() throws IOException {
|
||||
HttpClient httpClient = session.getProvider(HttpClientProvider.class).getHttpClient();
|
||||
public SimpleHttp auth(String token) {
|
||||
header("Authorization", "Bearer " + token);
|
||||
return this;
|
||||
}
|
||||
|
||||
HttpResponse response = makeRequest(httpClient);
|
||||
|
||||
InputStream is;
|
||||
HttpEntity entity = response.getEntity();
|
||||
if (entity != null) {
|
||||
is = entity.getContent();
|
||||
try {
|
||||
HeaderIterator it = response.headerIterator();
|
||||
while (it.hasNext()) {
|
||||
Header header = it.nextHeader();
|
||||
if (header.getName().equals("Content-Encoding") && header.getValue().equals("gzip")) {
|
||||
is = new GZIPInputStream(is);
|
||||
}
|
||||
}
|
||||
|
||||
return toString(is);
|
||||
} finally {
|
||||
if (is != null) {
|
||||
is.close();
|
||||
}
|
||||
}
|
||||
public SimpleHttp acceptJson() {
|
||||
if (headers == null || !headers.containsKey("Accept")) {
|
||||
header("Accept", "application/json");
|
||||
}
|
||||
return null;
|
||||
return this;
|
||||
}
|
||||
|
||||
public JsonNode asJson() throws IOException {
|
||||
if (headers == null || !headers.containsKey("Accept")) {
|
||||
header("Accept", "application/json");
|
||||
}
|
||||
return mapper.readTree(asString());
|
||||
}
|
||||
|
||||
public <T> T asJson(Class<T> type) throws IOException {
|
||||
if (headers == null || !headers.containsKey("Accept")) {
|
||||
header("Accept", "application/json");
|
||||
}
|
||||
return JsonSerialization.readValue(asString(), type);
|
||||
}
|
||||
|
||||
public <T> T asJson(TypeReference<T> type) throws IOException {
|
||||
if (headers == null || !headers.containsKey("Accept")) {
|
||||
header("Accept", "application/json");
|
||||
}
|
||||
return JsonSerialization.readValue(asString(), type);
|
||||
}
|
||||
|
||||
public String asString() throws IOException {
|
||||
return asResponse().asString();
|
||||
}
|
||||
|
||||
public int asStatus() throws IOException {
|
||||
HttpClient httpClient = session.getProvider(HttpClientProvider.class).getHttpClient();
|
||||
|
||||
HttpResponse response = makeRequest(httpClient);
|
||||
|
||||
return response.getStatusLine().getStatusCode();
|
||||
return asResponse().getStatus();
|
||||
}
|
||||
|
||||
private HttpResponse makeRequest(HttpClient httpClient) throws IOException {
|
||||
public Response asResponse() throws IOException {
|
||||
return makeRequest();
|
||||
}
|
||||
|
||||
private Response makeRequest() throws IOException {
|
||||
boolean get = method.equals("GET");
|
||||
boolean post = method.equals("POST");
|
||||
|
||||
|
@ -130,7 +164,16 @@ public class SimpleHttp {
|
|||
}
|
||||
|
||||
if (post) {
|
||||
((HttpPost) httpRequest).setEntity(getFormEntityFromParameter());
|
||||
if (params != null) {
|
||||
((HttpPost) httpRequest).setEntity(getFormEntityFromParameter());
|
||||
} else if (entity != null) {
|
||||
if (headers == null || !headers.containsKey("Content-Type")) {
|
||||
header("Content-Type", "application/json");
|
||||
}
|
||||
((HttpPost) httpRequest).setEntity(getJsonEntity());
|
||||
} else {
|
||||
throw new IllegalStateException("No content set");
|
||||
}
|
||||
}
|
||||
|
||||
if (headers != null) {
|
||||
|
@ -139,7 +182,7 @@ public class SimpleHttp {
|
|||
}
|
||||
}
|
||||
|
||||
return httpClient.execute(httpRequest);
|
||||
return new Response(client.execute(httpRequest));
|
||||
}
|
||||
|
||||
private URI appendParameterToUrl(String url) throws IOException {
|
||||
|
@ -161,28 +204,93 @@ public class SimpleHttp {
|
|||
return uri;
|
||||
}
|
||||
|
||||
private StringEntity getJsonEntity() throws IOException {
|
||||
return new StringEntity(JsonSerialization.writeValueAsString(entity));
|
||||
}
|
||||
|
||||
private UrlEncodedFormEntity getFormEntityFromParameter() throws IOException{
|
||||
List<NameValuePair> urlParameters = new ArrayList<>();
|
||||
|
||||
if (params != null) {
|
||||
for (Map.Entry<String, String> p : params.entrySet()) {
|
||||
urlParameters.add(new BasicNameValuePair(p.getKey(), p.getValue()));
|
||||
urlParameters. add(new BasicNameValuePair(p.getKey(), p.getValue()));
|
||||
}
|
||||
}
|
||||
|
||||
return new UrlEncodedFormEntity(urlParameters);
|
||||
}
|
||||
|
||||
private String toString(InputStream is) throws IOException {
|
||||
InputStreamReader reader = new InputStreamReader(is);
|
||||
public static class Response {
|
||||
|
||||
StringWriter writer = new StringWriter();
|
||||
private HttpResponse response;
|
||||
private int statusCode = -1;
|
||||
private String responseString;
|
||||
|
||||
char[] buffer = new char[1024 * 4];
|
||||
for (int n = reader.read(buffer); n != -1; n = reader.read(buffer)) {
|
||||
writer.write(buffer, 0, n);
|
||||
public Response(HttpResponse response) {
|
||||
this.response = response;
|
||||
}
|
||||
|
||||
return writer.toString();
|
||||
private void readResponse() throws IOException {
|
||||
if (statusCode == -1) {
|
||||
statusCode = response.getStatusLine().getStatusCode();
|
||||
|
||||
InputStream is;
|
||||
HttpEntity entity = response.getEntity();
|
||||
if (entity != null) {
|
||||
is = entity.getContent();
|
||||
try {
|
||||
HeaderIterator it = response.headerIterator();
|
||||
while (it.hasNext()) {
|
||||
Header header = it.nextHeader();
|
||||
if (header.getName().equals("Content-Encoding") && header.getValue().equals("gzip")) {
|
||||
is = new GZIPInputStream(is);
|
||||
}
|
||||
}
|
||||
|
||||
InputStreamReader reader = new InputStreamReader(is);
|
||||
|
||||
StringWriter writer = new StringWriter();
|
||||
|
||||
char[] buffer = new char[1024 * 4];
|
||||
for (int n = reader.read(buffer); n != -1; n = reader.read(buffer)) {
|
||||
writer.write(buffer, 0, n);
|
||||
}
|
||||
|
||||
responseString = writer.toString();
|
||||
} finally {
|
||||
if (is != null) {
|
||||
is.close();
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
public int getStatus() throws IOException {
|
||||
readResponse();
|
||||
return response.getStatusLine().getStatusCode();
|
||||
}
|
||||
|
||||
public JsonNode asJson() throws IOException {
|
||||
return mapper.readTree(asString());
|
||||
}
|
||||
|
||||
public <T> T asJson(Class<T> type) throws IOException {
|
||||
return JsonSerialization.readValue(asString(), type);
|
||||
}
|
||||
|
||||
public <T> T asJson(TypeReference<T> type) throws IOException {
|
||||
return JsonSerialization.readValue(asString(), type);
|
||||
}
|
||||
|
||||
public String asString() throws IOException {
|
||||
readResponse();
|
||||
return responseString;
|
||||
}
|
||||
|
||||
public void close() throws IOException {
|
||||
readResponse();
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -20,7 +20,6 @@ import com.fasterxml.jackson.databind.JsonNode;
|
|||
import org.jboss.logging.Logger;
|
||||
import org.keycloak.OAuth2Constants;
|
||||
import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
|
||||
import org.keycloak.broker.oidc.util.JsonSimpleHttp;
|
||||
import org.keycloak.broker.provider.AuthenticationRequest;
|
||||
import org.keycloak.broker.provider.BrokeredIdentityContext;
|
||||
import org.keycloak.broker.provider.IdentityBrokerException;
|
||||
|
@ -137,7 +136,7 @@ public class OIDCIdentityProvider extends AbstractOAuth2IdentityProvider<OIDCIde
|
|||
logoutUri.queryParam("id_token_hint", idToken);
|
||||
String url = logoutUri.build().toString();
|
||||
try {
|
||||
int status = JsonSimpleHttp.doGet(url, session).asStatus();
|
||||
int status = SimpleHttp.doGet(url, session).asStatus();
|
||||
boolean success = status >=200 && status < 400;
|
||||
if (!success) {
|
||||
logger.warn("Failed backchannel broker logout to: " + url);
|
||||
|
@ -368,9 +367,8 @@ public class OIDCIdentityProvider extends AbstractOAuth2IdentityProvider<OIDCIde
|
|||
if (!getConfig().isDisableUserInfoService()) {
|
||||
String userInfoUrl = getUserInfoUrl();
|
||||
if (userInfoUrl != null && !userInfoUrl.isEmpty() && (id == null || name == null || preferredUsername == null || email == null)) {
|
||||
SimpleHttp request = JsonSimpleHttp.doGet(userInfoUrl, session)
|
||||
.header("Authorization", "Bearer " + accessToken);
|
||||
JsonNode userInfo = JsonSimpleHttp.asJson(request);
|
||||
JsonNode userInfo = SimpleHttp.doGet(userInfoUrl, session)
|
||||
.header("Authorization", "Bearer " + accessToken).asJson();
|
||||
|
||||
id = getJsonProperty(userInfo, "sub");
|
||||
name = getJsonProperty(userInfo, "name");
|
||||
|
|
|
@ -1,50 +0,0 @@
|
|||
/*
|
||||
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||
* and other contributors as indicated by the @author tags.
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package org.keycloak.broker.oidc.util;
|
||||
|
||||
import com.fasterxml.jackson.databind.JsonNode;
|
||||
import com.fasterxml.jackson.databind.ObjectMapper;
|
||||
import org.keycloak.broker.provider.util.SimpleHttp;
|
||||
import org.keycloak.models.KeycloakSession;
|
||||
|
||||
import java.io.IOException;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
||||
* @version $Revision: 1 $
|
||||
*/
|
||||
public class JsonSimpleHttp extends SimpleHttp {
|
||||
public JsonSimpleHttp(String url, String method, KeycloakSession session) {
|
||||
super(url, method, session);
|
||||
}
|
||||
|
||||
public static JsonSimpleHttp doGet(String url, KeycloakSession session) {
|
||||
return new JsonSimpleHttp(url, "GET", session);
|
||||
}
|
||||
|
||||
public static JsonSimpleHttp doPost(String url, KeycloakSession session) {
|
||||
return new JsonSimpleHttp(url, "POST", session);
|
||||
}
|
||||
|
||||
private static ObjectMapper mapper = new ObjectMapper();
|
||||
|
||||
public static JsonNode asJson(SimpleHttp request) throws IOException {
|
||||
return mapper.readTree(request.asString());
|
||||
}
|
||||
|
||||
}
|
|
@ -21,7 +21,6 @@ import com.fasterxml.jackson.databind.JsonNode;
|
|||
import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
|
||||
import org.keycloak.broker.oidc.OAuth2IdentityProviderConfig;
|
||||
import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
|
||||
import org.keycloak.broker.oidc.util.JsonSimpleHttp;
|
||||
import org.keycloak.broker.provider.BrokeredIdentityContext;
|
||||
import org.keycloak.broker.provider.IdentityBrokerException;
|
||||
import org.keycloak.broker.provider.util.SimpleHttp;
|
||||
|
@ -54,7 +53,7 @@ public class BitbucketIdentityProvider extends AbstractOAuth2IdentityProvider im
|
|||
@Override
|
||||
protected BrokeredIdentityContext doGetFederatedIdentity(String accessToken) {
|
||||
try {
|
||||
JsonNode profile = JsonSimpleHttp.asJson(SimpleHttp.doGet(USER_URL, session).header("Authorization", "Bearer " + accessToken));
|
||||
JsonNode profile = SimpleHttp.doGet(USER_URL, session).header("Authorization", "Bearer " + accessToken).asJson();
|
||||
|
||||
String type = getJsonProperty(profile, "type");
|
||||
if (type == null) {
|
||||
|
|
|
@ -21,7 +21,6 @@ import com.fasterxml.jackson.databind.JsonNode;
|
|||
import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
|
||||
import org.keycloak.broker.oidc.OAuth2IdentityProviderConfig;
|
||||
import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
|
||||
import org.keycloak.broker.oidc.util.JsonSimpleHttp;
|
||||
import org.keycloak.broker.provider.BrokeredIdentityContext;
|
||||
import org.keycloak.broker.provider.IdentityBrokerException;
|
||||
import org.keycloak.broker.provider.util.SimpleHttp;
|
||||
|
@ -47,7 +46,7 @@ public class FacebookIdentityProvider extends AbstractOAuth2IdentityProvider imp
|
|||
|
||||
protected BrokeredIdentityContext doGetFederatedIdentity(String accessToken) {
|
||||
try {
|
||||
JsonNode profile = JsonSimpleHttp.asJson(SimpleHttp.doGet(PROFILE_URL, session).header("Authorization", "Bearer " + accessToken));
|
||||
JsonNode profile = SimpleHttp.doGet(PROFILE_URL, session).header("Authorization", "Bearer " + accessToken).asJson();
|
||||
|
||||
String id = getJsonProperty(profile, "id");
|
||||
|
||||
|
|
|
@ -21,7 +21,6 @@ import com.fasterxml.jackson.databind.JsonNode;
|
|||
import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
|
||||
import org.keycloak.broker.oidc.OAuth2IdentityProviderConfig;
|
||||
import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
|
||||
import org.keycloak.broker.oidc.util.JsonSimpleHttp;
|
||||
import org.keycloak.broker.provider.BrokeredIdentityContext;
|
||||
import org.keycloak.broker.provider.IdentityBrokerException;
|
||||
import org.keycloak.broker.provider.util.SimpleHttp;
|
||||
|
@ -48,7 +47,7 @@ public class GitHubIdentityProvider extends AbstractOAuth2IdentityProvider imple
|
|||
@Override
|
||||
protected BrokeredIdentityContext doGetFederatedIdentity(String accessToken) {
|
||||
try {
|
||||
JsonNode profile = JsonSimpleHttp.asJson(SimpleHttp.doGet(PROFILE_URL, session).header("Authorization", "Bearer " + accessToken));
|
||||
JsonNode profile = SimpleHttp.doGet(PROFILE_URL, session).header("Authorization", "Bearer " + accessToken).asJson();
|
||||
|
||||
BrokeredIdentityContext user = new BrokeredIdentityContext(getJsonProperty(profile, "id"));
|
||||
|
||||
|
|
|
@ -18,14 +18,10 @@
|
|||
package org.keycloak.social.gitlab;
|
||||
|
||||
import com.fasterxml.jackson.databind.JsonNode;
|
||||
import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
|
||||
import org.keycloak.broker.oidc.OAuth2IdentityProviderConfig;
|
||||
import org.keycloak.broker.oidc.OIDCIdentityProvider;
|
||||
import org.keycloak.broker.oidc.OIDCIdentityProviderConfig;
|
||||
import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
|
||||
import org.keycloak.broker.oidc.util.JsonSimpleHttp;
|
||||
import org.keycloak.broker.provider.BrokeredIdentityContext;
|
||||
import org.keycloak.broker.provider.IdentityBrokerException;
|
||||
import org.keycloak.broker.provider.util.SimpleHttp;
|
||||
import org.keycloak.broker.social.SocialIdentityProvider;
|
||||
import org.keycloak.models.KeycloakSession;
|
||||
|
@ -68,9 +64,8 @@ public class GitLabIdentityProvider extends OIDCIdentityProvider implements Soc
|
|||
if (getConfig().getDefaultScope().contains(API_SCOPE)) {
|
||||
String userInfoUrl = getUserInfoUrl();
|
||||
if (userInfoUrl != null && !userInfoUrl.isEmpty() && (id == null || name == null || preferredUsername == null || email == null)) {
|
||||
SimpleHttp request = JsonSimpleHttp.doGet(userInfoUrl, session)
|
||||
.header("Authorization", "Bearer " + accessToken);
|
||||
JsonNode userInfo = JsonSimpleHttp.asJson(request);
|
||||
JsonNode userInfo = SimpleHttp.doGet(userInfoUrl, session)
|
||||
.header("Authorization", "Bearer " + accessToken).asJson();
|
||||
|
||||
name = getJsonProperty(userInfo, "name");
|
||||
preferredUsername = getJsonProperty(userInfo, "username");
|
||||
|
|
|
@ -21,7 +21,6 @@ import org.jboss.logging.Logger;
|
|||
import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
|
||||
import org.keycloak.broker.oidc.OAuth2IdentityProviderConfig;
|
||||
import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
|
||||
import org.keycloak.broker.oidc.util.JsonSimpleHttp;
|
||||
import org.keycloak.broker.provider.BrokeredIdentityContext;
|
||||
import org.keycloak.broker.provider.IdentityBrokerException;
|
||||
import org.keycloak.broker.provider.util.SimpleHttp;
|
||||
|
@ -57,7 +56,7 @@ public class LinkedInIdentityProvider extends AbstractOAuth2IdentityProvider imp
|
|||
protected BrokeredIdentityContext doGetFederatedIdentity(String accessToken) {
|
||||
log.debug("doGetFederatedIdentity()");
|
||||
try {
|
||||
JsonNode profile = JsonSimpleHttp.asJson(SimpleHttp.doGet(PROFILE_URL, session).header("Authorization", "Bearer " + accessToken));
|
||||
JsonNode profile = SimpleHttp.doGet(PROFILE_URL, session).header("Authorization", "Bearer " + accessToken).asJson();
|
||||
|
||||
BrokeredIdentityContext user = new BrokeredIdentityContext(getJsonProperty(profile, "id"));
|
||||
|
||||
|
|
|
@ -22,13 +22,11 @@ import org.jboss.logging.Logger;
|
|||
import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
|
||||
import org.keycloak.broker.oidc.OAuth2IdentityProviderConfig;
|
||||
import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
|
||||
import org.keycloak.broker.oidc.util.JsonSimpleHttp;
|
||||
import org.keycloak.broker.provider.BrokeredIdentityContext;
|
||||
import org.keycloak.broker.provider.IdentityBrokerException;
|
||||
import org.keycloak.broker.provider.util.SimpleHttp;
|
||||
import org.keycloak.broker.social.SocialIdentityProvider;
|
||||
|
||||
import com.fasterxml.jackson.databind.JsonNode;
|
||||
import org.keycloak.models.KeycloakSession;
|
||||
|
||||
import java.net.URLEncoder;
|
||||
|
@ -62,7 +60,7 @@ public class MicrosoftIdentityProvider extends AbstractOAuth2IdentityProvider im
|
|||
if (log.isDebugEnabled()) {
|
||||
log.debug("Microsoft Live user profile request to: " + URL);
|
||||
}
|
||||
JsonNode profile = JsonSimpleHttp.asJson(SimpleHttp.doGet(URL, session));
|
||||
JsonNode profile = SimpleHttp.doGet(URL, session).asJson();
|
||||
|
||||
String id = getJsonProperty(profile, "id");
|
||||
|
||||
|
|
|
@ -3,7 +3,6 @@ package org.keycloak.social.openshift;
|
|||
import com.fasterxml.jackson.databind.JsonNode;
|
||||
import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
|
||||
import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
|
||||
import org.keycloak.broker.oidc.util.JsonSimpleHttp;
|
||||
import org.keycloak.broker.provider.BrokeredIdentityContext;
|
||||
import org.keycloak.broker.provider.IdentityBrokerException;
|
||||
import org.keycloak.broker.provider.util.SimpleHttp;
|
||||
|
@ -59,8 +58,9 @@ public class OpenshiftV3IdentityProvider extends AbstractOAuth2IdentityProvider<
|
|||
}
|
||||
|
||||
private JsonNode fetchProfile(String accessToken) throws IOException {
|
||||
return JsonSimpleHttp.asJson(SimpleHttp.doGet(getConfig().getUserInfoUrl(), this.session)
|
||||
.header("Authorization", "Bearer " + accessToken));
|
||||
return SimpleHttp.doGet(getConfig().getUserInfoUrl(), this.session)
|
||||
.header("Authorization", "Bearer " + accessToken)
|
||||
.asJson();
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -20,7 +20,6 @@ import com.fasterxml.jackson.databind.JsonNode;
|
|||
import org.jboss.logging.Logger;
|
||||
import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
|
||||
import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
|
||||
import org.keycloak.broker.oidc.util.JsonSimpleHttp;
|
||||
import org.keycloak.broker.provider.BrokeredIdentityContext;
|
||||
import org.keycloak.broker.provider.IdentityBrokerException;
|
||||
import org.keycloak.broker.provider.util.SimpleHttp;
|
||||
|
@ -63,7 +62,7 @@ public class StackoverflowIdentityProvider extends AbstractOAuth2IdentityProvide
|
|||
if (log.isDebugEnabled()) {
|
||||
log.debug("StackOverflow profile request to: " + URL);
|
||||
}
|
||||
JsonNode profile = JsonSimpleHttp.asJson(SimpleHttp.doGet(URL, session)).get("items").get(0);
|
||||
JsonNode profile = SimpleHttp.doGet(URL, session).asJson().get("items").get(0);
|
||||
|
||||
BrokeredIdentityContext user = new BrokeredIdentityContext(getJsonProperty(profile, "user_id"));
|
||||
|
||||
|
|
Loading…
Reference in a new issue