KEYCLOAK-2995 Revert changes from KEYCLOAK-2989 in JWTClientCredentialsProvider
This commit is contained in:
parent
74ff101de4
commit
e6f0da99e6
2 changed files with 3 additions and 5 deletions
|
@ -54,10 +54,6 @@ public class JWTClientCredentialsProvider implements ClientCredentialsProvider {
|
||||||
this.tokenTimeout = tokenTimeout;
|
this.tokenTimeout = tokenTimeout;
|
||||||
}
|
}
|
||||||
|
|
||||||
public int getTokenTimeout() {
|
|
||||||
return tokenTimeout;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void init(KeycloakDeployment deployment, Object config) {
|
public void init(KeycloakDeployment deployment, Object config) {
|
||||||
if (config == null || !(config instanceof Map)) {
|
if (config == null || !(config instanceof Map)) {
|
||||||
|
|
|
@ -845,7 +845,9 @@ public class ClientAuthSignedJWTTest extends AbstractKeycloakTest {
|
||||||
|
|
||||||
int now = Time.currentTime();
|
int now = Time.currentTime();
|
||||||
if (isClaimEnabled("issuedAt")) reqToken.issuedAt(now);
|
if (isClaimEnabled("issuedAt")) reqToken.issuedAt(now);
|
||||||
if (isClaimEnabled("expiration")) reqToken.expiration(now + getTokenTimeout());
|
// For the time being there's no getter for tokenTimeout in JWTClientCredentialsProvider
|
||||||
|
// This is fine because KC doesn't care when exp claim is missing (see KEYCLOAK-2986)
|
||||||
|
/*if (isClaimEnabled("expiration")) reqToken.expiration(now + getTokenTimeout());*/
|
||||||
if (isClaimEnabled("notBefore")) reqToken.notBefore(now);
|
if (isClaimEnabled("notBefore")) reqToken.notBefore(now);
|
||||||
|
|
||||||
return reqToken;
|
return reqToken;
|
||||||
|
|
Loading…
Reference in a new issue