keycloak-memoizeit

Details

ignored 1(+0 -1)

diff --git a/ignored b/ignored
index 403928b..dd94c15 100644
--- a/ignored
+++ b/ignored
@@ -1,4 +1,3 @@
-org.keycloak
 br.ufrgs.inf.prosoft.applicationtracer
 ant-contrib
 ant
diff --git a/services/src/main/java/org/keycloak/protocol/oidc/endpoints/LogoutEndpoint.java b/services/src/main/java/org/keycloak/protocol/oidc/endpoints/LogoutEndpoint.java
index 6ccbad3..ca21f6c 100755
--- a/services/src/main/java/org/keycloak/protocol/oidc/endpoints/LogoutEndpoint.java
+++ b/services/src/main/java/org/keycloak/protocol/oidc/endpoints/LogoutEndpoint.java
@@ -230,9 +230,9 @@ public class LogoutEndpoint {
     }
 
     private void checkSsl() {
-        if (!session.getContext().getUri().getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) {
-            throw new ErrorResponseException("invalid_request", "HTTPS required", Response.Status.FORBIDDEN);
-        }
+        // if (!session.getContext().getUri().getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) {
+        //     throw new ErrorResponseException("invalid_request", "HTTPS required", Response.Status.FORBIDDEN);
+        // }
     }
 
 }
diff --git a/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenEndpoint.java b/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenEndpoint.java
index 5279c4b..4841c16 100644
--- a/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenEndpoint.java
+++ b/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenEndpoint.java
@@ -214,9 +214,9 @@ public class TokenEndpoint {
     }
 
     private void checkSsl() {
-        if (!session.getContext().getUri().getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) {
-            throw new CorsErrorResponseException(cors.allowAllOrigins(), OAuthErrorException.INVALID_REQUEST, "HTTPS required", Response.Status.FORBIDDEN);
-        }
+        // if (!session.getContext().getUri().getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) {
+        //     throw new CorsErrorResponseException(cors.allowAllOrigins(), OAuthErrorException.INVALID_REQUEST, "HTTPS required", Response.Status.FORBIDDEN);
+        // }
     }
 
     private void checkRealm() {
diff --git a/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenIntrospectionEndpoint.java b/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenIntrospectionEndpoint.java
index 80d8ccd..c87b1bf 100755
--- a/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenIntrospectionEndpoint.java
+++ b/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenIntrospectionEndpoint.java
@@ -127,9 +127,9 @@ public class TokenIntrospectionEndpoint {
     }
 
     private void checkSsl() {
-        if (!session.getContext().getUri().getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) {
-            throw new ErrorResponseException("invalid_request", "HTTPS required", Status.FORBIDDEN);
-        }
+        // if (!session.getContext().getUri().getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) {
+        //     throw new ErrorResponseException("invalid_request", "HTTPS required", Status.FORBIDDEN);
+        // }
     }
 
     private void checkRealm() {
diff --git a/services/src/main/java/org/keycloak/services/clientregistration/ClientRegistrationService.java b/services/src/main/java/org/keycloak/services/clientregistration/ClientRegistrationService.java
index ed1a73b..cb91bfe 100644
--- a/services/src/main/java/org/keycloak/services/clientregistration/ClientRegistrationService.java
+++ b/services/src/main/java/org/keycloak/services/clientregistration/ClientRegistrationService.java
@@ -57,11 +57,11 @@ public class ClientRegistrationService {
     }
 
     private void checkSsl() {
-        if (!session.getContext().getUri().getBaseUri().getScheme().equals("https")) {
-            if (session.getContext().getRealm().getSslRequired().isRequired(session.getContext().getConnection())) {
-                throw new ErrorResponseException("invalid_request", "HTTPS required", Response.Status.FORBIDDEN);
-            }
-        }
+        // if (!session.getContext().getUri().getBaseUri().getScheme().equals("https")) {
+        //     if (session.getContext().getRealm().getSslRequired().isRequired(session.getContext().getConnection())) {
+        //         throw new ErrorResponseException("invalid_request", "HTTPS required", Response.Status.FORBIDDEN);
+        //     }
+        // }
     }
 
 }
diff --git a/services/src/main/java/org/keycloak/services/resources/ClientsManagementService.java b/services/src/main/java/org/keycloak/services/resources/ClientsManagementService.java
index 50402cc..efffe6a 100755
--- a/services/src/main/java/org/keycloak/services/resources/ClientsManagementService.java
+++ b/services/src/main/java/org/keycloak/services/resources/ClientsManagementService.java
@@ -103,9 +103,9 @@ public class ClientsManagementService {
     @POST
     @Produces(MediaType.APPLICATION_JSON)
     public Response registerNode(@HeaderParam(HttpHeaders.AUTHORIZATION) String authorizationHeader, final MultivaluedMap<String, String> formData) {
-        if (!checkSsl()) {
-            throw new ForbiddenException("HTTPS required");
-        }
+        // if (!checkSsl()) {
+        //     throw new ForbiddenException("HTTPS required");
+        // }
 
         event.event(EventType.REGISTER_NODE);
 
@@ -144,9 +144,9 @@ public class ClientsManagementService {
     @POST
     @Produces(MediaType.APPLICATION_JSON)
     public Response unregisterNode(@HeaderParam(HttpHeaders.AUTHORIZATION) String authorizationHeader, final MultivaluedMap<String, String> formData) {
-        if (!checkSsl()) {
-            throw new ForbiddenException("HTTPS required");
-        }
+        // if (!checkSsl()) {
+        //     throw new ForbiddenException("HTTPS required");
+        // }
 
         event.event(EventType.UNREGISTER_NODE);