keycloak-memoizeit
Changes
ignored 1(+0 -1)
services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenIntrospectionEndpoint.java 6(+3 -3)
Details
ignored 1(+0 -1)
diff --git a/ignored b/ignored
index 403928b..dd94c15 100644
--- a/ignored
+++ b/ignored
@@ -1,4 +1,3 @@
-org.keycloak
br.ufrgs.inf.prosoft.applicationtracer
ant-contrib
ant
diff --git a/services/src/main/java/org/keycloak/protocol/oidc/endpoints/LogoutEndpoint.java b/services/src/main/java/org/keycloak/protocol/oidc/endpoints/LogoutEndpoint.java
index 6ccbad3..ca21f6c 100755
--- a/services/src/main/java/org/keycloak/protocol/oidc/endpoints/LogoutEndpoint.java
+++ b/services/src/main/java/org/keycloak/protocol/oidc/endpoints/LogoutEndpoint.java
@@ -230,9 +230,9 @@ public class LogoutEndpoint {
}
private void checkSsl() {
- if (!session.getContext().getUri().getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) {
- throw new ErrorResponseException("invalid_request", "HTTPS required", Response.Status.FORBIDDEN);
- }
+ // if (!session.getContext().getUri().getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) {
+ // throw new ErrorResponseException("invalid_request", "HTTPS required", Response.Status.FORBIDDEN);
+ // }
}
}
diff --git a/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenEndpoint.java b/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenEndpoint.java
index 5279c4b..4841c16 100644
--- a/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenEndpoint.java
+++ b/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenEndpoint.java
@@ -214,9 +214,9 @@ public class TokenEndpoint {
}
private void checkSsl() {
- if (!session.getContext().getUri().getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) {
- throw new CorsErrorResponseException(cors.allowAllOrigins(), OAuthErrorException.INVALID_REQUEST, "HTTPS required", Response.Status.FORBIDDEN);
- }
+ // if (!session.getContext().getUri().getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) {
+ // throw new CorsErrorResponseException(cors.allowAllOrigins(), OAuthErrorException.INVALID_REQUEST, "HTTPS required", Response.Status.FORBIDDEN);
+ // }
}
private void checkRealm() {
diff --git a/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenIntrospectionEndpoint.java b/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenIntrospectionEndpoint.java
index 80d8ccd..c87b1bf 100755
--- a/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenIntrospectionEndpoint.java
+++ b/services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenIntrospectionEndpoint.java
@@ -127,9 +127,9 @@ public class TokenIntrospectionEndpoint {
}
private void checkSsl() {
- if (!session.getContext().getUri().getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) {
- throw new ErrorResponseException("invalid_request", "HTTPS required", Status.FORBIDDEN);
- }
+ // if (!session.getContext().getUri().getBaseUri().getScheme().equals("https") && realm.getSslRequired().isRequired(clientConnection)) {
+ // throw new ErrorResponseException("invalid_request", "HTTPS required", Status.FORBIDDEN);
+ // }
}
private void checkRealm() {
diff --git a/services/src/main/java/org/keycloak/services/clientregistration/ClientRegistrationService.java b/services/src/main/java/org/keycloak/services/clientregistration/ClientRegistrationService.java
index ed1a73b..cb91bfe 100644
--- a/services/src/main/java/org/keycloak/services/clientregistration/ClientRegistrationService.java
+++ b/services/src/main/java/org/keycloak/services/clientregistration/ClientRegistrationService.java
@@ -57,11 +57,11 @@ public class ClientRegistrationService {
}
private void checkSsl() {
- if (!session.getContext().getUri().getBaseUri().getScheme().equals("https")) {
- if (session.getContext().getRealm().getSslRequired().isRequired(session.getContext().getConnection())) {
- throw new ErrorResponseException("invalid_request", "HTTPS required", Response.Status.FORBIDDEN);
- }
- }
+ // if (!session.getContext().getUri().getBaseUri().getScheme().equals("https")) {
+ // if (session.getContext().getRealm().getSslRequired().isRequired(session.getContext().getConnection())) {
+ // throw new ErrorResponseException("invalid_request", "HTTPS required", Response.Status.FORBIDDEN);
+ // }
+ // }
}
}
diff --git a/services/src/main/java/org/keycloak/services/resources/ClientsManagementService.java b/services/src/main/java/org/keycloak/services/resources/ClientsManagementService.java
index 50402cc..efffe6a 100755
--- a/services/src/main/java/org/keycloak/services/resources/ClientsManagementService.java
+++ b/services/src/main/java/org/keycloak/services/resources/ClientsManagementService.java
@@ -103,9 +103,9 @@ public class ClientsManagementService {
@POST
@Produces(MediaType.APPLICATION_JSON)
public Response registerNode(@HeaderParam(HttpHeaders.AUTHORIZATION) String authorizationHeader, final MultivaluedMap<String, String> formData) {
- if (!checkSsl()) {
- throw new ForbiddenException("HTTPS required");
- }
+ // if (!checkSsl()) {
+ // throw new ForbiddenException("HTTPS required");
+ // }
event.event(EventType.REGISTER_NODE);
@@ -144,9 +144,9 @@ public class ClientsManagementService {
@POST
@Produces(MediaType.APPLICATION_JSON)
public Response unregisterNode(@HeaderParam(HttpHeaders.AUTHORIZATION) String authorizationHeader, final MultivaluedMap<String, String> formData) {
- if (!checkSsl()) {
- throw new ForbiddenException("HTTPS required");
- }
+ // if (!checkSsl()) {
+ // throw new ForbiddenException("HTTPS required");
+ // }
event.event(EventType.UNREGISTER_NODE);