keycloak-memoizeit
Changes
distribution/feature-packs/server-feature-pack/src/main/resources/content/standalone/configuration/keycloak-server.json 10(+5 -5)
model/infinispan/src/main/java/org/keycloak/connections/infinispan/DefaultInfinispanConnectionProviderFactory.java 10(+10 -0)
model/infinispan/src/main/java/org/keycloak/connections/infinispan/InfinispanConnectionProvider.java 1(+1 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/DefaultCacheRealmProvider.java 396(+0 -396)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanCacheRealmProviderFactory.java 84(+7 -77)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanCacheUserProviderFactory.java 2(+1 -1)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanRealmCache.java 202(+0 -202)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanUserCache.java 2(+1 -1)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/locking/LockingCacheRealmProviderFactory.java 159(+0 -159)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/locking/LockingConnectionProviderFactory.java 54(+0 -54)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/locking/LockingRealmCache.java 300(+0 -300)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientListQuery.java 50(+50 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientQuery.java 14(+14 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientQueryPredicate.java 46(+46 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientTemplateQuery.java 13(+13 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientTemplateQueryPredicate.java 37(+37 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/AbstractRevisioned.java 31(+31 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/InClient.java 9(+9 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/InRealm.java 9(+9 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/Revisioned.java 3(+2 -1)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/RevisionedCachedClient.java 5(+2 -3)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/RevisionedCachedClientRole.java 5(+2 -3)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/RevisionedCachedClientTemplate.java 5(+2 -3)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/RevisionedCachedGroup.java 5(+2 -3)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/RevisionedCachedRealm.java 3(+1 -2)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/RevisionedCachedRealmRole.java 5(+2 -3)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/RevisionedCachedUser.java 5(+2 -3)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/GroupQuery.java 13(+13 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/GroupQueryPredicate.java 37(+37 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/HasRolePredicate.java 40(+40 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/InClientPredicate.java 34(+34 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/InRealmPredicate.java 33(+33 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RealmListQuery.java 29(+29 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RealmQuery.java 13(+13 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RealmQueryPredicate.java 37(+37 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RoleQuery.java 13(+13 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RoleQueryPredicate.java 37(+37 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/StreamCacheRealmProvider.java 326(+172 -154)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/StreamRealmCache.java 314(+314 -0)
model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/UpdateCounter.java 2(+1 -1)
model/infinispan/src/main/resources/META-INF/services/org.keycloak.connections.infinispan.InfinispanConnectionProviderFactory 1(+0 -1)
model/infinispan/src/main/resources/META-INF/services/org.keycloak.models.cache.CacheRealmProviderFactory 1(+0 -1)
model/infinispan/src/test/java/org/keycloak/models/sessions/infinispan/initializer/ClusteredCacheBehaviorTest.java 117(+117 -0)
Details
diff --git a/distribution/feature-packs/server-feature-pack/src/main/resources/content/standalone/configuration/keycloak-server.json b/distribution/feature-packs/server-feature-pack/src/main/resources/content/standalone/configuration/keycloak-server.json
index 407f0c0..c4139a1 100755
--- a/distribution/feature-packs/server-feature-pack/src/main/resources/content/standalone/configuration/keycloak-server.json
+++ b/distribution/feature-packs/server-feature-pack/src/main/resources/content/standalone/configuration/keycloak-server.json
@@ -23,7 +23,7 @@
},
"userCache": {
- "infinispan" : {
+ "default" : {
"enabled": true
}
},
@@ -61,15 +61,15 @@
},
"realmCache": {
- "provider": "infinispan-locking",
- "infinispan-locking" : {
+ "provider": "default",
+ "default" : {
"enabled": true
}
},
"connectionsInfinispan": {
- "provider": "locking",
- "locking": {
+ "provider": "default",
+ "default": {
"cacheContainer" : "java:comp/env/infinispan/Keycloak"
}
}
diff --git a/model/infinispan/src/main/java/org/keycloak/connections/infinispan/DefaultInfinispanConnectionProviderFactory.java b/model/infinispan/src/main/java/org/keycloak/connections/infinispan/DefaultInfinispanConnectionProviderFactory.java
index 01d229f..ded6c3c 100755
--- a/model/infinispan/src/main/java/org/keycloak/connections/infinispan/DefaultInfinispanConnectionProviderFactory.java
+++ b/model/infinispan/src/main/java/org/keycloak/connections/infinispan/DefaultInfinispanConnectionProviderFactory.java
@@ -24,6 +24,7 @@ import org.infinispan.configuration.global.GlobalConfigurationBuilder;
import org.infinispan.manager.DefaultCacheManager;
import org.infinispan.manager.EmbeddedCacheManager;
import org.infinispan.transaction.LockingMode;
+import org.infinispan.transaction.TransactionMode;
import org.infinispan.transaction.lookup.DummyTransactionManagerLookup;
import org.jboss.logging.Logger;
import org.keycloak.Config;
@@ -154,6 +155,15 @@ public class DefaultInfinispanConnectionProviderFactory implements InfinispanCon
}
Configuration replicationCacheConfiguration = replicationConfigBuilder.build();
cacheManager.defineConfiguration(InfinispanConnectionProvider.WORK_CACHE_NAME, replicationCacheConfiguration);
+
+ ConfigurationBuilder counterConfigBuilder = new ConfigurationBuilder();
+ counterConfigBuilder.invocationBatching().enable()
+ .transaction().transactionMode(TransactionMode.TRANSACTIONAL);
+ counterConfigBuilder.transaction().transactionManagerLookup(new DummyTransactionManagerLookup());
+ counterConfigBuilder.transaction().lockingMode(LockingMode.PESSIMISTIC);
+ Configuration counterCacheConfiguration = counterConfigBuilder.build();
+
+ cacheManager.defineConfiguration(InfinispanConnectionProvider.VERSION_CACHE_NAME, counterCacheConfiguration);
}
}
diff --git a/model/infinispan/src/main/java/org/keycloak/connections/infinispan/InfinispanConnectionProvider.java b/model/infinispan/src/main/java/org/keycloak/connections/infinispan/InfinispanConnectionProvider.java
old mode 100644
new mode 100755
index b37beb9..8a21def
--- a/model/infinispan/src/main/java/org/keycloak/connections/infinispan/InfinispanConnectionProvider.java
+++ b/model/infinispan/src/main/java/org/keycloak/connections/infinispan/InfinispanConnectionProvider.java
@@ -25,6 +25,7 @@ import org.keycloak.provider.Provider;
*/
public interface InfinispanConnectionProvider extends Provider {
+ public static final String VERSION_CACHE_NAME = "realmVersions";
static final String REALM_CACHE_NAME = "realms";
static final String USER_CACHE_NAME = "users";
static final String SESSION_CACHE_NAME = "sessions";
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/ClientAdapter.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/ClientAdapter.java
index a9145b2..cdaa2e7 100755
--- a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/ClientAdapter.java
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/ClientAdapter.java
@@ -45,7 +45,7 @@ public class ClientAdapter implements ClientModel {
private void getDelegateForUpdate() {
if (updated == null) {
- cacheSession.registerApplicationInvalidation(getId());
+ cacheSession.registerClientInvalidation(getId());
updated = cacheSession.getDelegate().getClientById(getId(), cachedRealm);
if (updated == null) throw new IllegalStateException("Not found in database");
}
@@ -377,7 +377,6 @@ public class ClientAdapter implements ClientModel {
public void setClientId(String clientId) {
getDelegateForUpdate();
updated.setClientId(clientId);
- cacheSession.registerRealmInvalidation(cachedRealm.getId());
}
@Override
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanCacheRealmProviderFactory.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanCacheRealmProviderFactory.java
index 34aa5ce..39bc493 100755
--- a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanCacheRealmProviderFactory.java
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanCacheRealmProviderFactory.java
@@ -36,6 +36,8 @@ import org.keycloak.models.cache.CacheRealmProvider;
import org.keycloak.models.cache.CacheRealmProviderFactory;
import org.keycloak.models.cache.entities.CachedClient;
import org.keycloak.models.cache.entities.CachedRealm;
+import org.keycloak.models.cache.infinispan.stream.StreamCacheRealmProvider;
+import org.keycloak.models.cache.infinispan.stream.StreamRealmCache;
import java.util.concurrent.ConcurrentHashMap;
@@ -47,14 +49,12 @@ public class InfinispanCacheRealmProviderFactory implements CacheRealmProviderFa
private static final Logger log = Logger.getLogger(InfinispanCacheRealmProviderFactory.class);
- protected volatile InfinispanRealmCache realmCache;
-
- protected final ConcurrentHashMap<String, String> realmLookup = new ConcurrentHashMap<>();
+ protected volatile StreamRealmCache realmCache;
@Override
public CacheRealmProvider create(KeycloakSession session) {
lazyInit(session);
- return new DefaultCacheRealmProvider(realmCache, session);
+ return new StreamCacheRealmProvider(realmCache, session);
}
private void lazyInit(KeycloakSession session) {
@@ -62,8 +62,8 @@ public class InfinispanCacheRealmProviderFactory implements CacheRealmProviderFa
synchronized (this) {
if (realmCache == null) {
Cache<String, Object> cache = session.getProvider(InfinispanConnectionProvider.class).getCache(InfinispanConnectionProvider.REALM_CACHE_NAME);
- cache.addListener(new CacheListener());
- realmCache = new InfinispanRealmCache(cache, realmLookup);
+ Cache<String, Long> revisions = session.getProvider(InfinispanConnectionProvider.class).getCache(InfinispanConnectionProvider.VERSION_CACHE_NAME);
+ realmCache = new StreamRealmCache(cache, revisions);
}
}
}
@@ -84,77 +84,7 @@ public class InfinispanCacheRealmProviderFactory implements CacheRealmProviderFa
@Override
public String getId() {
- return "infinispan";
+ return "default";
}
- @Listener
- public class CacheListener {
-
- @CacheEntryCreated
- public void created(CacheEntryCreatedEvent<String, Object> event) {
- if (!event.isPre()) {
- Object object = event.getValue();
- if (object != null) {
- if (object instanceof CachedRealm) {
- CachedRealm realm = (CachedRealm) object;
- realmLookup.put(realm.getName(), realm.getId());
- log.tracev("Realm added realm={0}", realm.getName());
- }
- }
- }
- }
-
- @CacheEntryRemoved
- public void removed(CacheEntryRemovedEvent<String, Object> event) {
- if (event.isPre()) {
- Object object = event.getValue();
- if (object != null) {
- remove(object);
- }
- }
- }
-
- @CacheEntryInvalidated
- public void removed(CacheEntryInvalidatedEvent<String, Object> event) {
- if (event.isPre()) {
- Object object = event.getValue();
- if (object != null) {
- remove(object);
- }
- }
- }
-
- @CacheEntriesEvicted
- public void userEvicted(CacheEntriesEvictedEvent<String, Object> event) {
- for (Object object : event.getEntries().values()) {
- remove(object);
- }
- }
-
- private void remove(Object object) {
- if (object instanceof CachedRealm) {
- CachedRealm realm = (CachedRealm) object;
-
- realmLookup.remove(realm.getName());
-
- for (String r : realm.getRealmRoles().values()) {
- realmCache.evictRoleById(r);
- }
-
- for (String c : realm.getClients()) {
- realmCache.evictClientById(c);
- }
-
- log.tracev("Realm removed realm={0}", realm.getName());
- } else if (object instanceof CachedClient) {
- CachedClient client = (CachedClient) object;
-
- for (String r : client.getRoles().values()) {
- realmCache.evictRoleById(r);
- }
-
- log.tracev("Client removed client={0}", client.getId());
- }
- }
- }
}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanCacheUserProviderFactory.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanCacheUserProviderFactory.java
index b5f62e2..b473d60 100755
--- a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanCacheUserProviderFactory.java
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanCacheUserProviderFactory.java
@@ -78,7 +78,7 @@ public class InfinispanCacheUserProviderFactory implements CacheUserProviderFact
@Override
public String getId() {
- return "infinispan";
+ return "default";
}
@Listener
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanUserCache.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanUserCache.java
index 52edabc..de83e6a 100755
--- a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanUserCache.java
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/InfinispanUserCache.java
@@ -27,7 +27,7 @@ import org.keycloak.models.cache.entities.CachedUser;
*/
public class InfinispanUserCache implements UserCache {
- protected static final Logger logger = Logger.getLogger(InfinispanRealmCache.class);
+ protected static final Logger logger = Logger.getLogger(InfinispanUserCache.class);
protected volatile boolean enabled = true;
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/RealmAdapter.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/RealmAdapter.java
index 2f3048a..39564ef 100755
--- a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/RealmAdapter.java
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/RealmAdapter.java
@@ -589,40 +589,23 @@ public class RealmAdapter implements RealmModel {
@Override
public List<ClientModel> getClients() {
- if (updated != null) return updated.getClients();
- List<ClientModel> apps = new LinkedList<>();
- for (String id : cached.getClients()) {
- ClientModel model = cacheSession.getClientById(id, this);
- if (model == null) {
- throw new IllegalStateException("Cached application not found: " + id);
- }
- apps.add(model);
- }
- return Collections.unmodifiableList(apps);
+ return cacheSession.getClients(this);
}
@Override
public ClientModel addClient(String name) {
- getDelegateForUpdate();
- ClientModel app = updated.addClient(name);
- cacheSession.registerApplicationInvalidation(app.getId());
- return app;
+ return cacheSession.addClient(this, name);
}
@Override
public ClientModel addClient(String id, String clientId) {
- getDelegateForUpdate();
- ClientModel app = updated.addClient(id, clientId);
- cacheSession.registerApplicationInvalidation(app.getId());
- return app;
+ return cacheSession.addClient(this, id, clientId);
}
@Override
public boolean removeClient(String id) {
- cacheSession.registerApplicationInvalidation(id);
- getDelegateForUpdate();
- return updated.removeClient(id);
+ return cacheSession.removeClient(id, this);
}
@Override
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/RoleAdapter.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/RoleAdapter.java
index 6458c1a..c7ebc44 100755
--- a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/RoleAdapter.java
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/RoleAdapter.java
@@ -125,7 +125,7 @@ public class RoleAdapter implements RoleModel {
for (String id : cached.getComposites()) {
RoleModel role = realm.getRoleById(id);
if (role == null) {
- throw new IllegalStateException("Could not find composite: " + id);
+ throw new IllegalStateException("Could not find composite in role " + getName() + ": " + id);
}
set.add(role);
}
@@ -138,7 +138,7 @@ public class RoleAdapter implements RoleModel {
return realm;
} else {
CachedClientRole appRole = (CachedClientRole)cached;
- return realm.getClientById(appRole.getIdClient());
+ return realm.getClientById(appRole.getClientId());
}
}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientListQuery.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientListQuery.java
new file mode 100755
index 0000000..1a7d5e2
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientListQuery.java
@@ -0,0 +1,50 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import org.keycloak.models.RealmModel;
+import org.keycloak.models.cache.infinispan.stream.entities.AbstractRevisioned;
+
+import java.util.HashSet;
+import java.util.Set;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public class ClientListQuery extends AbstractRevisioned implements ClientQuery {
+ private final Set<String> clients;
+ private final String realm;
+ private final String realmName;
+
+ public ClientListQuery(Long revisioned, String id, RealmModel realm, Set<String> clients) {
+ super(revisioned, id);
+ this.realm = realm.getId();
+ this.realmName = realm.getName();
+ this.clients = clients;
+ }
+
+ public ClientListQuery(Long revisioned, String id, RealmModel realm, String client) {
+ super(revisioned, id);
+ this.realm = realm.getId();
+ this.realmName = realm.getName();
+ this.clients = new HashSet<>();
+ this.clients.add(client);
+ }
+
+ @Override
+ public Set<String> getClients() {
+ return clients;
+ }
+
+ @Override
+ public String getRealm() {
+ return realm;
+ }
+
+ @Override
+ public String toString() {
+ return "ClientListQuery{" +
+ "id='" + getId() + "'" +
+ "realmName='" + realmName + '\'' +
+ '}';
+ }
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientQuery.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientQuery.java
new file mode 100755
index 0000000..399ec69
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientQuery.java
@@ -0,0 +1,14 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import org.keycloak.models.cache.infinispan.stream.entities.InRealm;
+
+import java.util.List;
+import java.util.Set;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public interface ClientQuery extends InRealm {
+ Set<String> getClients();
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientQueryPredicate.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientQueryPredicate.java
new file mode 100755
index 0000000..1e0c555
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientQueryPredicate.java
@@ -0,0 +1,46 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import org.jboss.logging.Logger;
+
+import java.io.Serializable;
+import java.util.Map;
+import java.util.function.Predicate;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public class ClientQueryPredicate implements Predicate<Map.Entry<String, Object>>, Serializable {
+ protected static final Logger logger = Logger.getLogger(ClientQueryPredicate.class);
+ private String client;
+ private String inRealm;
+
+ public static ClientQueryPredicate create() {
+ return new ClientQueryPredicate();
+ }
+
+ public ClientQueryPredicate client(String client) {
+ this.client = client;
+ return this;
+ }
+
+ public ClientQueryPredicate inRealm(String inRealm) {
+ this.inRealm = inRealm;
+ return this;
+ }
+
+
+
+
+
+ @Override
+ public boolean test(Map.Entry<String, Object> entry) {
+ Object value = entry.getValue();
+ if (value == null) return false;
+ if (!(value instanceof ClientQuery)) return false;
+ ClientQuery query = (ClientQuery)value;
+ if (client != null && !query.getClients().contains(client)) return false;
+ if (inRealm != null && !query.getRealm().equals(inRealm)) return false;
+ return true;
+ }
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientTemplateQuery.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientTemplateQuery.java
new file mode 100755
index 0000000..e63cb67
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientTemplateQuery.java
@@ -0,0 +1,13 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import org.keycloak.models.cache.infinispan.stream.entities.InRealm;
+
+import java.util.Set;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public interface ClientTemplateQuery extends InRealm {
+ Set<String> getTemplates();
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientTemplateQueryPredicate.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientTemplateQueryPredicate.java
new file mode 100755
index 0000000..ebf4b6c
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/ClientTemplateQueryPredicate.java
@@ -0,0 +1,37 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import java.io.Serializable;
+import java.util.Map;
+import java.util.function.Predicate;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public class ClientTemplateQueryPredicate implements Predicate<Map.Entry<String, Object>>, Serializable {
+ private String template;
+
+ public static ClientTemplateQueryPredicate create() {
+ return new ClientTemplateQueryPredicate();
+ }
+
+ public ClientTemplateQueryPredicate template(String template) {
+ this.template = template;
+ return this;
+ }
+
+
+
+
+
+ @Override
+ public boolean test(Map.Entry<String, Object> entry) {
+ Object value = entry.getValue();
+ if (value == null) return false;
+ if (!(value instanceof ClientTemplateQuery)) return false;
+ ClientTemplateQuery query = (ClientTemplateQuery)value;
+
+
+ return query.getTemplates().contains(template);
+ }
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/AbstractRevisioned.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/AbstractRevisioned.java
new file mode 100755
index 0000000..dfea429
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/AbstractRevisioned.java
@@ -0,0 +1,31 @@
+package org.keycloak.models.cache.infinispan.stream.entities;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public class AbstractRevisioned implements Revisioned {
+ private String id;
+ private Long revision;
+
+ public AbstractRevisioned(Long revision, String id) {
+ this.revision = revision;
+ this.id = id;
+ }
+
+ @Override
+ public String getId() {
+ return id;
+ }
+
+ @Override
+ public Long getRevision() {
+ return revision;
+ }
+
+ @Override
+ public void setRevision(Long revision) {
+ this.revision = revision;
+ }
+
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/InClient.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/InClient.java
new file mode 100755
index 0000000..3951c7f
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/InClient.java
@@ -0,0 +1,9 @@
+package org.keycloak.models.cache.infinispan.stream.entities;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public interface InClient extends InRealm {
+ String getClientId();
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/InRealm.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/InRealm.java
new file mode 100755
index 0000000..6b55091
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/entities/InRealm.java
@@ -0,0 +1,9 @@
+package org.keycloak.models.cache.infinispan.stream.entities;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public interface InRealm extends Revisioned {
+ String getRealm();
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/GroupQuery.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/GroupQuery.java
new file mode 100755
index 0000000..b3d86c0
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/GroupQuery.java
@@ -0,0 +1,13 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import org.keycloak.models.cache.infinispan.stream.entities.InRealm;
+
+import java.util.Set;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public interface GroupQuery extends InRealm {
+ Set<String> getGroups();
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/GroupQueryPredicate.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/GroupQueryPredicate.java
new file mode 100755
index 0000000..6e4a662
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/GroupQueryPredicate.java
@@ -0,0 +1,37 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import java.io.Serializable;
+import java.util.Map;
+import java.util.function.Predicate;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public class GroupQueryPredicate implements Predicate<Map.Entry<String, Object>>, Serializable {
+ private String group;
+
+ public static GroupQueryPredicate create() {
+ return new GroupQueryPredicate();
+ }
+
+ public GroupQueryPredicate group(String group) {
+ this.group = group;
+ return this;
+ }
+
+
+
+
+
+ @Override
+ public boolean test(Map.Entry<String, Object> entry) {
+ Object value = entry.getValue();
+ if (value == null) return false;
+ if (!(value instanceof GroupQuery)) return false;
+ GroupQuery query = (GroupQuery)value;
+
+
+ return query.getGroups().contains(group);
+ }
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/HasRolePredicate.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/HasRolePredicate.java
new file mode 100755
index 0000000..5946726
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/HasRolePredicate.java
@@ -0,0 +1,40 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import org.keycloak.models.cache.entities.CachedGroup;
+import org.keycloak.models.cache.entities.CachedRole;
+
+import java.io.Serializable;
+import java.util.Map;
+import java.util.function.Predicate;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public class HasRolePredicate implements Predicate<Map.Entry<String, Object>>, Serializable {
+ private String role;
+
+ public static HasRolePredicate create() {
+ return new HasRolePredicate();
+ }
+
+ public HasRolePredicate role(String role) {
+ this.role = role;
+ return this;
+ }
+
+ @Override
+ public boolean test(Map.Entry<String, Object> entry) {
+ Object value = entry.getValue();
+ if (value == null) return false;
+ if (value instanceof CachedRole) {
+ CachedRole cachedRole = (CachedRole)value;
+ if (cachedRole.getComposites().contains(role)) return true;
+ }
+ if (value instanceof CachedGroup) {
+ CachedGroup cachedRole = (CachedGroup)value;
+ if (cachedRole.getRoleMappings().contains(role)) return true;
+ }
+ return false;
+ }
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/InClientPredicate.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/InClientPredicate.java
new file mode 100755
index 0000000..ee5343f
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/InClientPredicate.java
@@ -0,0 +1,34 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import org.keycloak.models.cache.infinispan.stream.entities.InClient;
+import org.keycloak.models.cache.infinispan.stream.entities.InRealm;
+
+import java.io.Serializable;
+import java.util.Map;
+import java.util.function.Predicate;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public class InClientPredicate implements Predicate<Map.Entry<String, Object>>, Serializable {
+ private String clientId;
+
+ public static InClientPredicate create() {
+ return new InClientPredicate();
+ }
+
+ public InClientPredicate client(String id) {
+ clientId = id;
+ return this;
+ }
+
+ @Override
+ public boolean test(Map.Entry<String, Object> entry) {
+ Object value = entry.getValue();
+ if (value == null) return false;
+ if (!(value instanceof InClient)) return false;
+
+ return clientId.equals(((InClient)value).getClientId());
+ }
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/InRealmPredicate.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/InRealmPredicate.java
new file mode 100755
index 0000000..265e4d2
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/InRealmPredicate.java
@@ -0,0 +1,33 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import org.keycloak.models.cache.infinispan.stream.entities.InRealm;
+
+import java.io.Serializable;
+import java.util.Map;
+import java.util.function.Predicate;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public class InRealmPredicate implements Predicate<Map.Entry<String, Object>>, Serializable {
+ private String realm;
+
+ public static InRealmPredicate create() {
+ return new InRealmPredicate();
+ }
+
+ public InRealmPredicate realm(String id) {
+ realm = id;
+ return this;
+ }
+
+ @Override
+ public boolean test(Map.Entry<String, Object> entry) {
+ Object value = entry.getValue();
+ if (value == null) return false;
+ if (!(value instanceof InRealm)) return false;
+
+ return realm.equals(((InRealm)value).getRealm());
+ }
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RealmListQuery.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RealmListQuery.java
new file mode 100755
index 0000000..22a615c
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RealmListQuery.java
@@ -0,0 +1,29 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import org.keycloak.models.cache.infinispan.stream.entities.AbstractRevisioned;
+
+import java.util.HashSet;
+import java.util.Set;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public class RealmListQuery extends AbstractRevisioned implements RealmQuery {
+ private final Set<String> realms;
+
+ public RealmListQuery(Long revision, String id, String realm) {
+ super(revision, id);
+ realms = new HashSet<>();
+ realms.add(realm);
+ }
+ public RealmListQuery(Long revision, String id, Set<String> realms) {
+ super(revision, id);
+ this.realms = realms;
+ }
+
+ @Override
+ public Set<String> getRealms() {
+ return realms;
+ }
+}
\ No newline at end of file
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RealmQuery.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RealmQuery.java
new file mode 100755
index 0000000..210978f
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RealmQuery.java
@@ -0,0 +1,13 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import org.keycloak.models.cache.infinispan.stream.entities.InRealm;
+
+import java.util.Set;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public interface RealmQuery {
+ Set<String> getRealms();
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RealmQueryPredicate.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RealmQueryPredicate.java
new file mode 100755
index 0000000..179c7da
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RealmQueryPredicate.java
@@ -0,0 +1,37 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import java.io.Serializable;
+import java.util.Map;
+import java.util.function.Predicate;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public class RealmQueryPredicate implements Predicate<Map.Entry<String, Object>>, Serializable {
+ private String realm;
+
+ public static RealmQueryPredicate create() {
+ return new RealmQueryPredicate();
+ }
+
+ public RealmQueryPredicate realm(String realm) {
+ this.realm = realm;
+ return this;
+ }
+
+
+
+
+
+ @Override
+ public boolean test(Map.Entry<String, Object> entry) {
+ Object value = entry.getValue();
+ if (value == null) return false;
+ if (!(value instanceof RealmQuery)) return false;
+ RealmQuery query = (RealmQuery)value;
+
+
+ return query.getRealms().contains(realm);
+ }
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RoleQuery.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RoleQuery.java
new file mode 100755
index 0000000..0fcb78a
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RoleQuery.java
@@ -0,0 +1,13 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import org.keycloak.models.cache.infinispan.stream.entities.InRealm;
+
+import java.util.Set;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public interface RoleQuery extends InRealm {
+ Set<String> getRoles();
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RoleQueryPredicate.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RoleQueryPredicate.java
new file mode 100755
index 0000000..3320963
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/RoleQueryPredicate.java
@@ -0,0 +1,37 @@
+package org.keycloak.models.cache.infinispan.stream;
+
+import java.io.Serializable;
+import java.util.Map;
+import java.util.function.Predicate;
+
+/**
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+public class RoleQueryPredicate implements Predicate<Map.Entry<String, Object>>, Serializable {
+ private String role;
+
+ public static RoleQueryPredicate create() {
+ return new RoleQueryPredicate();
+ }
+
+ public RoleQueryPredicate role(String role) {
+ this.role = role;
+ return this;
+ }
+
+
+
+
+
+ @Override
+ public boolean test(Map.Entry<String, Object> entry) {
+ Object value = entry.getValue();
+ if (value == null) return false;
+ if (!(value instanceof RoleQuery)) return false;
+ RoleQuery query = (RoleQuery)value;
+
+
+ return query.getRoles().contains(role);
+ }
+}
diff --git a/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/StreamRealmCache.java b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/StreamRealmCache.java
new file mode 100755
index 0000000..9dd821b
--- /dev/null
+++ b/model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/stream/StreamRealmCache.java
@@ -0,0 +1,314 @@
+/*
+ * Copyright 2016 Red Hat, Inc. and/or its affiliates
+ * and other contributors as indicated by the @author tags.
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.keycloak.models.cache.infinispan.stream;
+
+import org.infinispan.Cache;
+import org.infinispan.notifications.Listener;
+import org.infinispan.notifications.cachelistener.annotation.CacheEntriesEvicted;
+import org.infinispan.notifications.cachelistener.annotation.CacheEntryInvalidated;
+import org.infinispan.notifications.cachelistener.event.CacheEntriesEvictedEvent;
+import org.infinispan.notifications.cachelistener.event.CacheEntryInvalidatedEvent;
+import org.jboss.logging.Logger;
+import org.keycloak.models.cache.entities.CachedClient;
+import org.keycloak.models.cache.entities.CachedClientTemplate;
+import org.keycloak.models.cache.entities.CachedGroup;
+import org.keycloak.models.cache.entities.CachedRealm;
+import org.keycloak.models.cache.entities.CachedRole;
+import org.keycloak.models.cache.infinispan.stream.entities.Revisioned;
+
+import java.util.HashSet;
+import java.util.Iterator;
+import java.util.Map;
+import java.util.Set;
+import java.util.function.Predicate;
+
+/**
+ * @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
+ */
+@Listener
+public class StreamRealmCache {
+
+ protected static final Logger logger = Logger.getLogger(StreamRealmCache.class);
+
+ protected final Cache<String, Long> revisions;
+ protected final Cache<String, Object> cache;
+
+ public StreamRealmCache(Cache<String, Object> cache, Cache<String, Long> revisions) {
+ this.cache = cache;
+ this.cache.addListener(this);
+ this.revisions = revisions;
+ }
+
+ public Cache<String, Object> getCache() {
+ return cache;
+ }
+
+ public Cache<String, Long> getRevisions() {
+ return revisions;
+ }
+
+ public Long getCurrentRevision(String id) {
+ Long revision = revisions.get(id);
+ if (revision == null) return UpdateCounter.current();
+ return revision;
+ }
+
+ public void endRevisionBatch() {
+ try {
+ revisions.endBatch(true);
+ } catch (Exception e) {
+ }
+
+ }
+
+ public <T> T get(String id, Class<T> type) {
+ Revisioned o = (Revisioned)cache.get(id);
+ if (o == null) {
+ return null;
+ }
+ Long rev = revisions.get(id);
+ if (rev == null) {
+ logger.tracev("get() missing rev");
+ return null;
+ }
+ long oRev = o.getRevision() == null ? -1L : o.getRevision().longValue();
+ if (rev > oRev) {
+ logger.tracev("get() rev: {0} o.rev: {1}", rev.longValue(), oRev);
+ return null;
+ }
+ return o != null && type.isInstance(o) ? type.cast(o) : null;
+ }
+
+ public Object invalidateObject(String id) {
+ Revisioned removed = (Revisioned)cache.remove(id);
+ long next = UpdateCounter.next();
+ Object rev = revisions.put(id, next);
+ return removed;
+ }
+
+ public void addRevisioned(Revisioned object) {
+ //startRevisionBatch();
+ String id = object.getId();
+ try {
+ //revisions.getAdvancedCache().lock(id);
+ Long rev = revisions.get(id);
+ if (rev == null) {
+ if (id.endsWith("realm.clients")) logger.trace("addRevisioned rev == null realm.clients");
+ rev = UpdateCounter.current();
+ revisions.put(id, rev);
+ }
+ revisions.startBatch();
+ if (!revisions.getAdvancedCache().lock(id)) {
+ logger.trace("Could not obtain version lock");
+ }
+ rev = revisions.get(id);
+ if (rev == null) {
+ if (id.endsWith("realm.clients")) logger.trace("addRevisioned rev2 == null realm.clients");
+ return;
+ }
+ if (rev.equals(object.getRevision())) {
+ if (id.endsWith("realm.clients")) logger.tracev("adding Object.revision {0} rev {1}", object.getRevision(), rev);
+ cache.putForExternalRead(id, object);
+ return;
+ }
+ if (rev > object.getRevision()) { // revision is ahead, don't cache
+ if (id.endsWith("realm.clients")) logger.trace("addRevisioned revision is ahead realm.clients");
+ return;
+ }
+ // revisions cache has a lower value than the object.revision, so update revision and add it to cache
+ if (id.endsWith("realm.clients")) logger.tracev("adding Object.revision {0} rev {1}", object.getRevision(), rev);
+ revisions.put(id, object.getRevision());
+ cache.putForExternalRead(id, object);
+ } finally {
+ endRevisionBatch();
+ }
+
+ }
+ public void clear() {
+ cache.clear();
+ }
+
+ public void realmInvalidation(String id, Set<String> invalidations) {
+ Predicate<Map.Entry<String, Object>> predicate = getRealmInvalidationPredicate(id);
+ addInvalidations(predicate, invalidations);
+ }
+
+ public Predicate<Map.Entry<String, Object>> getRealmInvalidationPredicate(String id) {
+ return RealmQueryPredicate.create().realm(id);
+ }
+
+ public void clientInvalidation(String id, Set<String> invalidations) {
+ addInvalidations(getClientInvalidationPredicate(id), invalidations);
+ }
+
+ public Predicate<Map.Entry<String, Object>> getClientInvalidationPredicate(String id) {
+ return ClientQueryPredicate.create().client(id);
+ }
+
+ public void roleInvalidation(String id, Set<String> invalidations) {
+ addInvalidations(getRoleInvalidationPredicate(id), invalidations);
+
+ }
+
+ public Predicate<Map.Entry<String, Object>> getRoleInvalidationPredicate(String id) {
+ return HasRolePredicate.create().role(id);
+ }
+
+ public void groupInvalidation(String id, Set<String> invalidations) {
+ addInvalidations(getGroupInvalidationPredicate(id), invalidations);
+
+ }
+
+ public Predicate<Map.Entry<String, Object>> getGroupInvalidationPredicate(String id) {
+ return GroupQueryPredicate.create().group(id);
+ }
+
+ public void clientTemplateInvalidation(String id, Set<String> invalidations) {
+ addInvalidations(getClientTemplateInvalidationPredicate(id), invalidations);
+
+ }
+
+ public Predicate<Map.Entry<String, Object>> getClientTemplateInvalidationPredicate(String id) {
+ return ClientTemplateQueryPredicate.create().template(id);
+ }
+
+ public void realmRemoval(String id, Set<String> invalidations) {
+ Predicate<Map.Entry<String, Object>> predicate = getRealmRemovalPredicate(id);
+ addInvalidations(predicate, invalidations);
+ }
+
+ public Predicate<Map.Entry<String, Object>> getRealmRemovalPredicate(String id) {
+ Predicate<Map.Entry<String, Object>> predicate = null;
+ predicate = RealmQueryPredicate.create().realm(id)
+ .or(InRealmPredicate.create().realm(id));
+ return predicate;
+ }
+
+ public void clientAdded(String realmId, String id, Set<String> invalidations) {
+ addInvalidations(getClientAddedPredicate(realmId), invalidations);
+ }
+
+ public Predicate<Map.Entry<String, Object>> getClientAddedPredicate(String realmId) {
+ return ClientQueryPredicate.create().inRealm(realmId);
+ }
+
+ public void clientRemoval(String realmId, String id, Set<String> invalidations) {
+ Predicate<Map.Entry<String, Object>> predicate = null;
+ predicate = getClientRemovalPredicate(realmId, id);
+ addInvalidations(predicate, invalidations);
+ }
+
+ public Predicate<Map.Entry<String, Object>> getClientRemovalPredicate(String realmId, String id) {
+ Predicate<Map.Entry<String, Object>> predicate;
+ predicate = ClientQueryPredicate.create().inRealm(realmId)
+ .or(ClientQueryPredicate.create().client(id))
+ .or(InClientPredicate.create().client(id));
+ return predicate;
+ }
+
+ public void roleRemoval(String id, Set<String> invalidations) {
+ addInvalidations(getRoleRemovalPredicate(id), invalidations);
+
+ }
+
+ public Predicate<Map.Entry<String, Object>> getRoleRemovalPredicate(String id) {
+ return getRoleInvalidationPredicate(id);
+ }
+
+ public void addInvalidations(Predicate<Map.Entry<String, Object>> predicate, Set<String> invalidations) {
+ Iterator<Map.Entry<String, Object>> it = getEntryIterator(predicate);
+ while (it.hasNext()) {
+ invalidations.add(it.next().getKey());
+ }
+ }
+
+ private Iterator<Map.Entry<String, Object>> getEntryIterator(Predicate<Map.Entry<String, Object>> predicate) {
+ return cache
+ .entrySet()
+ .stream()
+ .filter(predicate).iterator();
+ }
+
+ @CacheEntryInvalidated
+ public void cacheInvalidated(CacheEntryInvalidatedEvent<String, Object> event) {
+ if (event.isPre()) {
+ Object object = event.getValue();
+ if (object != null) {
+ Predicate<Map.Entry<String, Object>> predicate = getInvalidationPredicate(object);
+ if (predicate != null) runEvictions(predicate);
+ }
+ }
+ }
+
+ @CacheEntriesEvicted
+ public void cacheEvicted(CacheEntriesEvictedEvent<String, Object> event) {
+ for (Object object : event.getEntries().values()) {
+ Predicate<Map.Entry<String, Object>> predicate = getEvictionPredicate(object);
+ if (predicate != null) runEvictions(predicate);
+ }
+ }
+
+ public void runEvictions(Predicate<Map.Entry<String, Object>> current) {
+ Set<String> evictions = new HashSet<>();
+ addInvalidations(current, evictions);
+ for (String key : evictions) cache.evict(key);
+ }
+
+ protected Predicate<Map.Entry<String, Object>> getEvictionPredicate(Object object) {
+ if (object instanceof CachedRealm) {
+ CachedRealm cached = (CachedRealm)object;
+ return getRealmInvalidationPredicate(cached.getId());
+ } else if (object instanceof CachedClient) {
+ CachedClient cached = (CachedClient)object;
+ return getClientInvalidationPredicate(cached.getId());
+ } else if (object instanceof CachedRole) {
+ CachedRole cached = (CachedRole)object;
+ return getRoleInvalidationPredicate(cached.getId());
+ } else if (object instanceof CachedGroup) {
+ CachedGroup cached = (CachedGroup)object;
+ return getGroupInvalidationPredicate(cached.getId());
+ } else if (object instanceof CachedClientTemplate) {
+ CachedClientTemplate cached = (CachedClientTemplate)object;
+ return getClientTemplateInvalidationPredicate(cached.getId());
+ }
+ return null;
+ }
+ protected Predicate<Map.Entry<String, Object>> getInvalidationPredicate(Object object) {
+ if (object instanceof CachedRealm) {
+ CachedRealm cached = (CachedRealm)object;
+ return getRealmRemovalPredicate(cached.getId());
+ } else if (object instanceof CachedClient) {
+ CachedClient cached = (CachedClient)object;
+ Predicate<Map.Entry<String, Object>> predicate = getClientRemovalPredicate(cached.getRealm(), cached.getId());
+ for (String roleId : cached.getRoles().values()) {
+ predicate.or(getRoleRemovalPredicate(roleId));
+ }
+ return predicate;
+ } else if (object instanceof CachedRole) {
+ CachedRole cached = (CachedRole)object;
+ return getRoleRemovalPredicate(cached.getId());
+ } else if (object instanceof CachedGroup) {
+ CachedGroup cached = (CachedGroup)object;
+ return getGroupInvalidationPredicate(cached.getId());
+ } else if (object instanceof CachedClientTemplate) {
+ CachedClientTemplate cached = (CachedClientTemplate)object;
+ return getClientTemplateInvalidationPredicate(cached.getId());
+ }
+ return null;
+ }
+}
diff --git a/model/infinispan/src/main/resources/META-INF/services/org.keycloak.connections.infinispan.InfinispanConnectionProviderFactory b/model/infinispan/src/main/resources/META-INF/services/org.keycloak.connections.infinispan.InfinispanConnectionProviderFactory
index 299da00..1fe4945 100755
--- a/model/infinispan/src/main/resources/META-INF/services/org.keycloak.connections.infinispan.InfinispanConnectionProviderFactory
+++ b/model/infinispan/src/main/resources/META-INF/services/org.keycloak.connections.infinispan.InfinispanConnectionProviderFactory
@@ -16,4 +16,3 @@
#
org.keycloak.connections.infinispan.DefaultInfinispanConnectionProviderFactory
-org.keycloak.models.cache.infinispan.locking.LockingConnectionProviderFactory
\ No newline at end of file
diff --git a/model/infinispan/src/main/resources/META-INF/services/org.keycloak.models.cache.CacheRealmProviderFactory b/model/infinispan/src/main/resources/META-INF/services/org.keycloak.models.cache.CacheRealmProviderFactory
index 40ced18..a2b04e7 100755
--- a/model/infinispan/src/main/resources/META-INF/services/org.keycloak.models.cache.CacheRealmProviderFactory
+++ b/model/infinispan/src/main/resources/META-INF/services/org.keycloak.models.cache.CacheRealmProviderFactory
@@ -16,4 +16,3 @@
#
org.keycloak.models.cache.infinispan.InfinispanCacheRealmProviderFactory
-org.keycloak.models.cache.infinispan.locking.LockingCacheRealmProviderFactory
\ No newline at end of file
diff --git a/model/infinispan/src/test/java/org/keycloak/models/sessions/infinispan/initializer/ClusteredCacheBehaviorTest.java b/model/infinispan/src/test/java/org/keycloak/models/sessions/infinispan/initializer/ClusteredCacheBehaviorTest.java
new file mode 100755
index 0000000..e83a8b1
--- /dev/null
+++ b/model/infinispan/src/test/java/org/keycloak/models/sessions/infinispan/initializer/ClusteredCacheBehaviorTest.java
@@ -0,0 +1,117 @@
+package org.keycloak.models.sessions.infinispan.initializer;
+
+import org.infinispan.Cache;
+import org.infinispan.configuration.cache.CacheMode;
+import org.infinispan.configuration.cache.Configuration;
+import org.infinispan.configuration.cache.ConfigurationBuilder;
+import org.infinispan.configuration.global.GlobalConfigurationBuilder;
+import org.infinispan.manager.DefaultCacheManager;
+import org.infinispan.manager.EmbeddedCacheManager;
+import org.infinispan.notifications.Listener;
+import org.infinispan.notifications.cachelistener.annotation.CacheEntriesEvicted;
+import org.infinispan.notifications.cachelistener.annotation.CacheEntryInvalidated;
+import org.infinispan.notifications.cachelistener.annotation.CacheEntryRemoved;
+import org.infinispan.notifications.cachelistener.event.CacheEntriesEvictedEvent;
+import org.infinispan.notifications.cachelistener.event.CacheEntryInvalidatedEvent;
+import org.infinispan.notifications.cachelistener.event.CacheEntryRemovedEvent;
+import org.junit.Ignore;
+import org.junit.Test;
+import org.keycloak.connections.infinispan.InfinispanConnectionProvider;
+
+/**
+ * Just a simple test to see how distributed caches work
+ *
+ * @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
+ * @version $Revision: 1 $
+ */
+@Ignore
+public class ClusteredCacheBehaviorTest {
+ public EmbeddedCacheManager createManager() {
+ GlobalConfigurationBuilder gcb = new GlobalConfigurationBuilder();
+
+ boolean clustered = true;
+ boolean async = false;
+ boolean allowDuplicateJMXDomains = true;
+
+ if (clustered) {
+ gcb.transport().defaultTransport();
+ }
+ gcb.globalJmxStatistics().allowDuplicateDomains(allowDuplicateJMXDomains);
+
+ EmbeddedCacheManager cacheManager = new DefaultCacheManager(gcb.build());
+
+
+ ConfigurationBuilder invalidationConfigBuilder = new ConfigurationBuilder();
+ if (clustered) {
+ invalidationConfigBuilder.clustering().cacheMode(async ? CacheMode.INVALIDATION_ASYNC : CacheMode.INVALIDATION_SYNC);
+ }
+ Configuration invalidationCacheConfiguration = invalidationConfigBuilder.build();
+
+ cacheManager.defineConfiguration(InfinispanConnectionProvider.REALM_CACHE_NAME, invalidationCacheConfiguration);
+ return cacheManager;
+
+ }
+
+ @Listener
+ public static class CacheListener {
+ String name;
+
+ public CacheListener(String name) {
+ this.name = name;
+ }
+
+
+
+ @CacheEntryRemoved
+ public void removed(CacheEntryRemovedEvent<String, Object> event) {
+ if (event.isPre()) {
+ System.out.println("Listener '" + name + "' entry removed");
+ }
+ }
+
+ @CacheEntryInvalidated
+ public void removed(CacheEntryInvalidatedEvent<String, Object> event) {
+ if (event.isPre()) {
+ System.out.println("Listener '" + name + "' entry invalidated");
+
+ }
+ }
+
+ @CacheEntriesEvicted
+ public void evicted(CacheEntriesEvictedEvent<String, Object> event) {
+ System.out.println("Listener '" + name + "' entry evicted");
+
+ }
+
+ }
+
+ @Test
+ public void testListener() throws Exception {
+ EmbeddedCacheManager node1 = createManager();
+ EmbeddedCacheManager node2 = createManager();
+ Cache<String, Object> node1Cache = node1.getCache(InfinispanConnectionProvider.REALM_CACHE_NAME);
+ node1Cache.addListener(new CacheListener("node1"));
+ Cache<String, Object> node2Cache = node2.getCache(InfinispanConnectionProvider.REALM_CACHE_NAME);
+ node2Cache.addListener(new CacheListener("node2"));
+
+ System.out.println("node1 create entry");
+ node1Cache.put("key", "node1");
+ System.out.println("node2 create entry");
+ node2Cache.put("key", "node2");
+ System.out.println("node1 remove entry");
+ node1Cache.remove("key");
+ System.out.println("node2 remove entry");
+ node2Cache.remove("key");
+ System.out.println("node2 put entry");
+ node2Cache.put("key", "node2");
+ System.out.println("node2 evict entry");
+ node2Cache.evict("key");
+ System.out.println("node1/node2 putExternal entry");
+ node1Cache.putForExternalRead("key", "common");
+ node2Cache.putForExternalRead("key", "common");
+ System.out.println("node2 remove entry");
+ node2Cache.remove("key");
+
+
+ }
+}
diff --git a/model/jpa/src/main/java/org/keycloak/models/jpa/ClientAdapter.java b/model/jpa/src/main/java/org/keycloak/models/jpa/ClientAdapter.java
index 311540b..8affd11 100755
--- a/model/jpa/src/main/java/org/keycloak/models/jpa/ClientAdapter.java
+++ b/model/jpa/src/main/java/org/keycloak/models/jpa/ClientAdapter.java
@@ -612,12 +612,12 @@ public class ClientAdapter implements ClientModel {
@Override
public RoleModel getRole(String name) {
- TypedQuery<RoleEntity> query = em.createNamedQuery("getClientRoleByName", RoleEntity.class);
+ TypedQuery<String> query = em.createNamedQuery("getClientRoleIdByName", String.class);
query.setParameter("name", name);
- query.setParameter("client", entity);
- List<RoleEntity> roles = query.getResultList();
+ query.setParameter("client", entity.getId());
+ List<String> roles = query.getResultList();
if (roles.size() == 0) return null;
- return new RoleAdapter(realm, em, roles.get(0));
+ return session.realms().getRoleById(roles.get(0), realm);
}
@Override
@@ -636,7 +636,7 @@ public class ClientAdapter implements ClientModel {
entity.getRoles().add(roleEntity);
em.persist(roleEntity);
em.flush();
- return new RoleAdapter(realm, em, roleEntity);
+ return new RoleAdapter(session, realm, em, roleEntity);
}
@Override
@@ -667,19 +667,21 @@ public class ClientAdapter implements ClientModel {
@Override
public Set<RoleModel> getRoles() {
Set<RoleModel> list = new HashSet<RoleModel>();
- /*
- Collection<RoleEntity> roles = entity.getRoles();
- if (roles == null) return list;
- for (RoleEntity entity : roles) {
- list.add(new RoleAdapter(realm, em, entity));
- }
- */
TypedQuery<RoleEntity> query = em.createNamedQuery("getClientRoles", RoleEntity.class);
query.setParameter("client", entity);
List<RoleEntity> roles = query.getResultList();
for (RoleEntity roleEntity : roles) {
- list.add(new RoleAdapter(realm, em, roleEntity));
+ list.add(new RoleAdapter(session, realm, em, roleEntity));
}
+
+ /*
+ TypedQuery<String> query = em.createNamedQuery("getClientRoleIds", String.class);
+ query.setParameter("client", entity.getId());
+ List<String> roles = query.getResultList();
+ for (String id : roles) {
+ list.add(session.realms().getRoleById(id, realm));
+ }
+ */
return list;
}
diff --git a/model/jpa/src/main/java/org/keycloak/models/jpa/entities/ClientEntity.java b/model/jpa/src/main/java/org/keycloak/models/jpa/entities/ClientEntity.java
index 5466a77..fd4e0a5 100755
--- a/model/jpa/src/main/java/org/keycloak/models/jpa/entities/ClientEntity.java
+++ b/model/jpa/src/main/java/org/keycloak/models/jpa/entities/ClientEntity.java
@@ -50,6 +50,7 @@ import java.util.Set;
@Table(name="CLIENT", uniqueConstraints = {@UniqueConstraint(columnNames = {"REALM_ID", "CLIENT_ID"})})
@NamedQueries({
@NamedQuery(name="getClientsByRealm", query="select client from ClientEntity client where client.realm = :realm"),
+ @NamedQuery(name="getClientIdsByRealm", query="select client.id from ClientEntity client where client.realm.id = :realm"),
@NamedQuery(name="findClientIdByClientId", query="select client.id from ClientEntity client where client.clientId = :clientId and client.realm.id = :realm"),
@NamedQuery(name="findClientByClientId", query="select client from ClientEntity client where client.clientId = :clientId and client.realm.id = :realm"),
})
diff --git a/model/jpa/src/main/java/org/keycloak/models/jpa/entities/GroupEntity.java b/model/jpa/src/main/java/org/keycloak/models/jpa/entities/GroupEntity.java
index 9eadbc8..0b89c87 100755
--- a/model/jpa/src/main/java/org/keycloak/models/jpa/entities/GroupEntity.java
+++ b/model/jpa/src/main/java/org/keycloak/models/jpa/entities/GroupEntity.java
@@ -39,6 +39,7 @@ import java.util.Collection;
*/
@NamedQueries({
@NamedQuery(name="getAllGroupsByRealm", query="select u from GroupEntity u where u.realm = :realm order by u.name"),
+ @NamedQuery(name="getAllGroupIdsByRealm", query="select u.id from GroupEntity u where u.realm.id = :realm order by u.name"),
@NamedQuery(name="getGroupById", query="select u from GroupEntity u where u.id = :id and u.realm = :realm"),
@NamedQuery(name="getGroupIdsByParent", query="select u.id from GroupEntity u where u.parent = :parent"),
@NamedQuery(name="getGroupCount", query="select count(u) from GroupEntity u where u.realm = :realm"),
diff --git a/model/jpa/src/main/java/org/keycloak/models/jpa/entities/RealmEntity.java b/model/jpa/src/main/java/org/keycloak/models/jpa/entities/RealmEntity.java
index 684d102..f33aa21 100755
--- a/model/jpa/src/main/java/org/keycloak/models/jpa/entities/RealmEntity.java
+++ b/model/jpa/src/main/java/org/keycloak/models/jpa/entities/RealmEntity.java
@@ -49,8 +49,8 @@ import java.util.Set;
@Table(name="REALM")
@Entity
@NamedQueries({
- @NamedQuery(name="getAllRealms", query="select realm from RealmEntity realm"),
- @NamedQuery(name="getRealmByName", query="select realm from RealmEntity realm where realm.name = :name"),
+ @NamedQuery(name="getAllRealmIds", query="select realm.id from RealmEntity realm"),
+ @NamedQuery(name="getRealmIdByName", query="select realm.id from RealmEntity realm where realm.name = :name"),
})
public class RealmEntity {
@Id
@@ -147,9 +147,6 @@ public class RealmEntity {
@OneToMany(cascade ={CascadeType.REMOVE}, orphanRemoval = true, mappedBy = "realm")
Collection<UserFederationMapperEntity> userFederationMappers = new ArrayList<UserFederationMapperEntity>();
- @OneToMany(fetch = FetchType.LAZY, cascade ={CascadeType.REMOVE}, orphanRemoval = true, mappedBy="realm")
- Collection<ClientEntity> clients = new ArrayList<>();
-
@OneToMany(fetch = FetchType.LAZY, cascade ={CascadeType.REMOVE}, orphanRemoval = true, mappedBy = "realm")
Collection<ClientTemplateEntity> clientTemplates = new ArrayList<>();
@@ -421,14 +418,6 @@ public class RealmEntity {
public void setRequiredCredentials(Collection<RequiredCredentialEntity> requiredCredentials) {
this.requiredCredentials = requiredCredentials;
}
- public Collection<ClientEntity> getClients() {
- return clients;
- }
-
- public void setClients(Collection<ClientEntity> clients) {
- this.clients = clients;
- }
-
public Collection<RoleEntity> getRoles() {
return roles;
}
diff --git a/model/jpa/src/main/java/org/keycloak/models/jpa/entities/RoleEntity.java b/model/jpa/src/main/java/org/keycloak/models/jpa/entities/RoleEntity.java
index b94a743..5c02336 100755
--- a/model/jpa/src/main/java/org/keycloak/models/jpa/entities/RoleEntity.java
+++ b/model/jpa/src/main/java/org/keycloak/models/jpa/entities/RoleEntity.java
@@ -49,8 +49,11 @@ import java.util.Collection;
})
@NamedQueries({
@NamedQuery(name="getClientRoles", query="select role from RoleEntity role where role.client = :client"),
+ @NamedQuery(name="getClientRoleIds", query="select role.id from RoleEntity role where role.client.id = :client"),
@NamedQuery(name="getClientRoleByName", query="select role from RoleEntity role where role.name = :name and role.client = :client"),
- @NamedQuery(name="getRealmRoleByName", query="select role from RoleEntity role where role.clientRole = false and role.name = :name and role.realm = :realm")
+ @NamedQuery(name="getClientRoleIdByName", query="select role.id from RoleEntity role where role.name = :name and role.client.id = :client"),
+ @NamedQuery(name="getRealmRoleByName", query="select role from RoleEntity role where role.clientRole = false and role.name = :name and role.realm = :realm"),
+ @NamedQuery(name="getRealmRoleIdByName", query="select role.id from RoleEntity role where role.clientRole = false and role.name = :name and role.realm.id = :realm")
})
public class RoleEntity {
diff --git a/model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProvider.java b/model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProvider.java
index ce245de..6c2ae6b 100755
--- a/model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProvider.java
+++ b/model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProvider.java
@@ -36,6 +36,7 @@ import org.keycloak.models.utils.KeycloakModelUtils;
import javax.persistence.EntityManager;
import javax.persistence.TypedQuery;
import java.util.ArrayList;
+import java.util.Collections;
import java.util.LinkedList;
import java.util.List;
@@ -90,25 +91,27 @@ public class JpaRealmProvider implements RealmProvider {
@Override
public List<RealmModel> getRealms() {
- TypedQuery<RealmEntity> query = em.createNamedQuery("getAllRealms", RealmEntity.class);
- List<RealmEntity> entities = query.getResultList();
+ TypedQuery<String> query = em.createNamedQuery("getAllRealmIds", String.class);
+ List<String> entities = query.getResultList();
List<RealmModel> realms = new ArrayList<RealmModel>();
- for (RealmEntity entity : entities) {
- realms.add(new RealmAdapter(session, em, entity));
+ for (String id : entities) {
+ RealmModel realm = session.realms().getRealm(id);
+ if (realm != null) realms.add(realm);
+
}
return realms;
}
@Override
public RealmModel getRealmByName(String name) {
- TypedQuery<RealmEntity> query = em.createNamedQuery("getRealmByName", RealmEntity.class);
+ TypedQuery<String> query = em.createNamedQuery("getRealmIdByName", String.class);
query.setParameter("name", name);
- List<RealmEntity> entities = query.getResultList();
+ List<String> entities = query.getResultList();
if (entities.size() == 0) return null;
if (entities.size() > 1) throw new IllegalStateException("Should not be more than one realm with same name");
- RealmEntity realm = query.getResultList().get(0);
- if (realm == null) return null;
- return new RealmAdapter(session, em, realm);
+ String id = query.getResultList().get(0);
+
+ return session.realms().getRealm(id);
}
@Override
@@ -126,11 +129,11 @@ public class JpaRealmProvider implements RealmProvider {
num = em.createNamedQuery("deleteGroupsByRealm")
.setParameter("realm", realm).executeUpdate();
- TypedQuery<ClientEntity> query = em.createNamedQuery("getClientsByRealm", ClientEntity.class);
- query.setParameter("realm", realm);
- List<ClientEntity> clients = query.getResultList();
- for (ClientEntity a : clients) {
- adapter.removeClient(a.getId());
+ TypedQuery<String> query = em.createNamedQuery("getClientIdsByRealm", String.class);
+ query.setParameter("realm", realm.getId());
+ List<String> clients = query.getResultList();
+ for (String client : clients) {
+ session.realms().removeClient(client, adapter);
}
/*
for (ClientEntity a : new LinkedList<>(realm.getClients())) {
@@ -145,11 +148,6 @@ public class JpaRealmProvider implements RealmProvider {
em.flush();
em.clear();
- realm = em.find(RealmEntity.class, id);
- if (realm != null) {
- logger.error("WTF is the realm still there after a removal????????");
- }
-
return true;
}
@@ -162,7 +160,7 @@ public class JpaRealmProvider implements RealmProvider {
RoleEntity entity = em.find(RoleEntity.class, id);
if (entity == null) return null;
if (!realm.getId().equals(entity.getRealmId())) return null;
- return new RoleAdapter(realm, em, entity);
+ return new RoleAdapter(session, realm, em, entity);
}
@Override
@@ -174,6 +172,52 @@ public class JpaRealmProvider implements RealmProvider {
}
@Override
+ public ClientModel addClient(RealmModel realm, String clientId) {
+ return addClient(realm, KeycloakModelUtils.generateId(), clientId);
+ }
+
+ @Override
+ public ClientModel addClient(RealmModel realm, String id, String clientId) {
+ if (clientId == null) {
+ clientId = id;
+ }
+ ClientEntity entity = new ClientEntity();
+ entity.setId(id);
+ entity.setClientId(clientId);
+ entity.setEnabled(true);
+ entity.setStandardFlowEnabled(true);
+ RealmEntity realmRef = em.getReference(RealmEntity.class, realm.getId());
+ entity.setRealm(realmRef);
+ em.persist(entity);
+ em.flush();
+ final ClientModel resource = new ClientAdapter(realm, em, session, entity);
+ em.flush();
+ session.getKeycloakSessionFactory().publish(new RealmModel.ClientCreationEvent() {
+ @Override
+ public ClientModel getCreatedClient() {
+ return resource;
+ }
+ });
+ return resource;
+ }
+
+ @Override
+ public List<ClientModel> getClients(RealmModel realm) {
+ TypedQuery<String> query = em.createNamedQuery("getClientIdsByRealm", String.class);
+ query.setParameter("realm", realm.getId());
+ List<String> clients = query.getResultList();
+ if (clients.isEmpty()) return Collections.EMPTY_LIST;
+ List<ClientModel> list = new LinkedList<>();
+ for (String id : clients) {
+ ClientModel client = session.realms().getClientById(id, realm);
+ if (client != null) list.add(client);
+ }
+ return Collections.unmodifiableList(list);
+
+ }
+
+
+ @Override
public ClientModel getClientById(String id, RealmModel realm) {
ClientEntity app = em.find(ClientEntity.class, id);
@@ -184,13 +228,13 @@ public class JpaRealmProvider implements RealmProvider {
@Override
public ClientModel getClientByClientId(String clientId, RealmModel realm) {
- TypedQuery<ClientEntity> query = em.createNamedQuery("findClientByClientId", ClientEntity.class);
+ TypedQuery<String> query = em.createNamedQuery("findClientIdByClientId", String.class);
query.setParameter("clientId", clientId);
query.setParameter("realm", realm.getId());
- List<ClientEntity> results = query.getResultList();
+ List<String> results = query.getResultList();
if (results.isEmpty()) return null;
- ClientEntity entity = results.get(0);
- return new ClientAdapter(realm, em, session, entity);
+ String id = results.get(0);
+ return session.realms().getClientById(id, realm);
}
@Override
diff --git a/model/jpa/src/main/java/org/keycloak/models/jpa/RealmAdapter.java b/model/jpa/src/main/java/org/keycloak/models/jpa/RealmAdapter.java
index 65d3b1b..ad2024b 100755
--- a/model/jpa/src/main/java/org/keycloak/models/jpa/RealmAdapter.java
+++ b/model/jpa/src/main/java/org/keycloak/models/jpa/RealmAdapter.java
@@ -723,45 +723,17 @@ public class RealmAdapter implements RealmModel {
@Override
public List<ClientModel> getClients() {
- TypedQuery<ClientEntity> query = em.createNamedQuery("getClientsByRealm", ClientEntity.class);
- query.setParameter("realm", realm);
- List<ClientEntity> clients = query.getResultList();
- if (clients.isEmpty()) return Collections.EMPTY_LIST;
- List<ClientModel> list = new LinkedList<>();
- for (ClientEntity entity : clients) {
- list.add(new ClientAdapter(this, em, session, entity));
- }
- return Collections.unmodifiableList(list);
+ return session.realms().getClients(this);
}
@Override
public ClientModel addClient(String name) {
- return this.addClient(KeycloakModelUtils.generateId(), name);
+ return session.realms().addClient(this, name);
}
@Override
public ClientModel addClient(String id, String clientId) {
- if (clientId == null) {
- clientId = id;
- }
- ClientEntity entity = new ClientEntity();
- entity.setId(id);
- entity.setClientId(clientId);
- entity.setEnabled(true);
- entity.setStandardFlowEnabled(true);
- entity.setRealm(realm);
- realm.getClients().add(entity);
- em.persist(entity);
- em.flush();
- final ClientModel resource = new ClientAdapter(this, em, session, entity);
- em.flush();
- session.getKeycloakSessionFactory().publish(new ClientCreationEvent() {
- @Override
- public ClientModel getCreatedClient() {
- return resource;
- }
- });
- return resource;
+ return session.realms().addClient(this, id, clientId);
}
@Override
@@ -956,7 +928,7 @@ public class RealmAdapter implements RealmModel {
em.remove(entity);
}
- List<UserFederationProviderModel> add = new LinkedList<UserFederationProviderModel>();
+ List<UserFederationProviderModel> add = new LinkedList<>();
for (UserFederationProviderModel model : providers) {
boolean found = false;
for (UserFederationProviderEntity entity : realm.getUserFederationProviders()) {
@@ -1008,12 +980,12 @@ public class RealmAdapter implements RealmModel {
@Override
public RoleModel getRole(String name) {
- TypedQuery<RoleEntity> query = em.createNamedQuery("getRealmRoleByName", RoleEntity.class);
+ TypedQuery<String> query = em.createNamedQuery("getRealmRoleIdByName", String.class);
query.setParameter("name", name);
- query.setParameter("realm", realm);
- List<RoleEntity> roles = query.getResultList();
+ query.setParameter("realm", realm.getId());
+ List<String> roles = query.getResultList();
if (roles.size() == 0) return null;
- return new RoleAdapter(this, em, roles.get(0));
+ return session.realms().getRoleById(roles.get(0), this);
}
@Override
@@ -1031,7 +1003,7 @@ public class RealmAdapter implements RealmModel {
realm.getRoles().add(entity);
em.persist(entity);
em.flush();
- return new RoleAdapter(this, em, entity);
+ return new RoleAdapter(session, this, em, entity);
}
@Override
@@ -1063,7 +1035,9 @@ public class RealmAdapter implements RealmModel {
if (roles == null) return Collections.EMPTY_SET;
Set<RoleModel> list = new HashSet<RoleModel>();
for (RoleEntity entity : roles) {
- list.add(new RoleAdapter(this, em, entity));
+ list.add(new RoleAdapter(session, this, em, entity));
+ // can't get it from cache cuz of stack overflow
+ // list.add(session.realms().getRoleById(entity.getId(), this));
}
return Collections.unmodifiableSet(list);
}
@@ -1259,9 +1233,14 @@ public class RealmAdapter implements RealmModel {
if (masterAdminClient == null) {
return null;
}
-
- RealmAdapter masterRealm = new RealmAdapter(session, em, masterAdminClient.getRealm());
- return new ClientAdapter(masterRealm, em, session, masterAdminClient);
+ RealmModel masterRealm = null;
+ String masterAdminClientRealmId = masterAdminClient.getRealm().getId();
+ if (masterAdminClientRealmId.equals(getId())) {
+ masterRealm = this;
+ } else {
+ masterRealm = session.realms().getRealm(masterAdminClientRealmId);
+ }
+ return session.realms().getClientById(masterAdminClient.getId(), masterRealm);
}
@Override
@@ -2052,11 +2031,12 @@ public class RealmAdapter implements RealmModel {
@Override
public List<GroupModel> getGroups() {
- List<GroupEntity> groups = em.createNamedQuery("getAllGroupsByRealm").setParameter("realm", realm).getResultList();
+ List<String> groups = em.createNamedQuery("getAllGroupIdsByRealm", String.class)
+ .setParameter("realm", realm.getId()).getResultList();
if (groups == null) return Collections.EMPTY_LIST;
List<GroupModel> list = new LinkedList<>();
- for (GroupEntity entity : groups) {
- list.add(new GroupAdapter(this, em, entity));
+ for (String id : groups) {
+ list.add(session.realms().getGroupById(id, this));
}
return Collections.unmodifiableList(list);
}
@@ -2128,7 +2108,7 @@ public class RealmAdapter implements RealmModel {
if (entities == null || entities.isEmpty()) return Collections.EMPTY_LIST;
List<ClientTemplateModel> list = new LinkedList<>();
for (ClientTemplateEntity entity : entities) {
- list.add(new ClientTemplateAdapter(this, em, session, entity));
+ list.add(session.realms().getClientTemplateById(entity.getId(), this));
}
return Collections.unmodifiableList(list);
}
diff --git a/model/jpa/src/main/java/org/keycloak/models/jpa/RoleAdapter.java b/model/jpa/src/main/java/org/keycloak/models/jpa/RoleAdapter.java
index 21103d7..0ac1be9 100755
--- a/model/jpa/src/main/java/org/keycloak/models/jpa/RoleAdapter.java
+++ b/model/jpa/src/main/java/org/keycloak/models/jpa/RoleAdapter.java
@@ -17,6 +17,7 @@
package org.keycloak.models.jpa;
+import org.keycloak.models.KeycloakSession;
import org.keycloak.models.RealmModel;
import org.keycloak.models.RoleContainerModel;
import org.keycloak.models.RoleModel;
@@ -36,11 +37,13 @@ public class RoleAdapter implements RoleModel {
protected RoleEntity role;
protected EntityManager em;
protected RealmModel realm;
+ protected KeycloakSession session;
- public RoleAdapter(RealmModel realm, EntityManager em, RoleEntity role) {
+ public RoleAdapter(KeycloakSession session, RealmModel realm, EntityManager em, RoleEntity role) {
this.em = em;
this.realm = realm;
this.role = role;
+ this.session = session;
}
public RoleEntity getRole() {
@@ -115,7 +118,10 @@ public class RoleAdapter implements RoleModel {
Set<RoleModel> set = new HashSet<RoleModel>();
for (RoleEntity composite : getRole().getCompositeRoles()) {
- set.add(new RoleAdapter(realm, em, composite));
+ set.add(new RoleAdapter(session, realm, em, composite));
+
+ // todo I want to do this, but can't as you get stack overflow
+ // set.add(session.realms().getRoleById(composite.getId(), realm));
}
return set;
}
diff --git a/model/mongo/src/main/java/org/keycloak/models/mongo/keycloak/adapters/MongoRealmProvider.java b/model/mongo/src/main/java/org/keycloak/models/mongo/keycloak/adapters/MongoRealmProvider.java
index c5d70fb..1c4036b 100755
--- a/model/mongo/src/main/java/org/keycloak/models/mongo/keycloak/adapters/MongoRealmProvider.java
+++ b/model/mongo/src/main/java/org/keycloak/models/mongo/keycloak/adapters/MongoRealmProvider.java
@@ -39,6 +39,7 @@ import org.keycloak.models.mongo.keycloak.entities.MongoRoleEntity;
import org.keycloak.models.utils.KeycloakModelUtils;
import java.util.ArrayList;
+import java.util.Collections;
import java.util.List;
/**
@@ -105,7 +106,8 @@ public class MongoRealmProvider implements RealmProvider {
List<RealmModel> results = new ArrayList<RealmModel>();
for (MongoRealmEntity realmEntity : realms) {
- results.add(new RealmAdapter(session, realmEntity, invocationContext));
+ RealmModel realm = session.realms().getRealm(realmEntity.getId());
+ if (realm != null) results.add(realm);
}
return results;
}
@@ -118,7 +120,7 @@ public class MongoRealmProvider implements RealmProvider {
MongoRealmEntity realm = getMongoStore().loadSingleEntity(MongoRealmEntity.class, query, invocationContext);
if (realm == null) return null;
- return new RealmAdapter(session, realm, invocationContext);
+ return session.realms().getRealm(realm.getId());
}
@Override
@@ -163,6 +165,51 @@ public class MongoRealmProvider implements RealmProvider {
}
@Override
+ public ClientModel addClient(RealmModel realm, String clientId) {
+ return addClient(realm, KeycloakModelUtils.generateId(), clientId);
+ }
+
+ @Override
+ public ClientModel addClient(RealmModel realm, String id, String clientId) {
+ MongoClientEntity clientEntity = new MongoClientEntity();
+ clientEntity.setId(id);
+ clientEntity.setClientId(clientId);
+ clientEntity.setRealmId(realm.getId());
+ clientEntity.setEnabled(true);
+ clientEntity.setStandardFlowEnabled(true);
+ getMongoStore().insertEntity(clientEntity, invocationContext);
+
+ if (clientId == null) {
+ clientEntity.setClientId(clientEntity.getId());
+ getMongoStore().updateEntity(clientEntity, invocationContext);
+ }
+
+ final ClientModel model = new ClientAdapter(session, realm, clientEntity, invocationContext);
+ session.getKeycloakSessionFactory().publish(new RealmModel.ClientCreationEvent() {
+ @Override
+ public ClientModel getCreatedClient() {
+ return model;
+ }
+ });
+ return model;
+ }
+
+ @Override
+ public List<ClientModel> getClients(RealmModel realm) {
+ DBObject query = new QueryBuilder()
+ .and("realmId").is(realm.getId())
+ .get();
+ List<MongoClientEntity> clientEntities = getMongoStore().loadEntities(MongoClientEntity.class, query, invocationContext);
+
+ if (clientEntities.isEmpty()) return Collections.EMPTY_LIST;
+ List<ClientModel> result = new ArrayList<ClientModel>();
+ for (MongoClientEntity clientEntity : clientEntities) {
+ result.add(session.realms().getClientById(clientEntity.getId(), realm));
+ }
+ return Collections.unmodifiableList(result);
+ }
+
+ @Override
public boolean removeClient(String id, RealmModel realm) {
if (id == null) return false;
ClientModel client = getClientById(id, realm);
@@ -180,7 +227,8 @@ public class MongoRealmProvider implements RealmProvider {
.and("clientId").is(clientId)
.get();
MongoClientEntity appEntity = getMongoStore().loadSingleEntity(MongoClientEntity.class, query, invocationContext);
- return appEntity == null ? null : new ClientAdapter(session, realm, appEntity, invocationContext);
+ if (appEntity == null) return null;
+ return session.realms().getClientById(appEntity.getId(), realm);
}
diff --git a/model/mongo/src/main/java/org/keycloak/models/mongo/keycloak/adapters/RealmAdapter.java b/model/mongo/src/main/java/org/keycloak/models/mongo/keycloak/adapters/RealmAdapter.java
index 48978ff..edb57d2 100755
--- a/model/mongo/src/main/java/org/keycloak/models/mongo/keycloak/adapters/RealmAdapter.java
+++ b/model/mongo/src/main/java/org/keycloak/models/mongo/keycloak/adapters/RealmAdapter.java
@@ -815,47 +815,18 @@ public class RealmAdapter extends AbstractMongoAdapter<MongoRealmEntity> impleme
@Override
public List<ClientModel> getClients() {
- DBObject query = new QueryBuilder()
- .and("realmId").is(getId())
- .get();
- List<MongoClientEntity> clientEntities = getMongoStore().loadEntities(MongoClientEntity.class, query, invocationContext);
-
- if (clientEntities.isEmpty()) return Collections.EMPTY_LIST;
- List<ClientModel> result = new ArrayList<ClientModel>();
- for (MongoClientEntity clientEntity : clientEntities) {
- result.add(new ClientAdapter(session, this, clientEntity, invocationContext));
- }
- return Collections.unmodifiableList(result);
+ return session.realms().getClients(this);
}
@Override
public ClientModel addClient(String name) {
- return this.addClient(null, name);
+ return session.realms().addClient(this, name);
}
@Override
public ClientModel addClient(String id, String clientId) {
- MongoClientEntity clientEntity = new MongoClientEntity();
- clientEntity.setId(id);
- clientEntity.setClientId(clientId);
- clientEntity.setRealmId(getId());
- clientEntity.setEnabled(true);
- clientEntity.setStandardFlowEnabled(true);
- getMongoStore().insertEntity(clientEntity, invocationContext);
-
- if (clientId == null) {
- clientEntity.setClientId(clientEntity.getId());
- getMongoStore().updateEntity(clientEntity, invocationContext);
- }
+ return session.realms().addClient(this, id, clientId);
- final ClientModel model = new ClientAdapter(session, this, clientEntity, invocationContext);
- session.getKeycloakSessionFactory().publish(new ClientCreationEvent() {
- @Override
- public ClientModel getCreatedClient() {
- return model;
- }
- });
- return model;
}
@Override
diff --git a/server-spi/src/main/java/org/keycloak/models/cache/CacheRealmProvider.java b/server-spi/src/main/java/org/keycloak/models/cache/CacheRealmProvider.java
index 0f90b1d..7bc1299 100755
--- a/server-spi/src/main/java/org/keycloak/models/cache/CacheRealmProvider.java
+++ b/server-spi/src/main/java/org/keycloak/models/cache/CacheRealmProvider.java
@@ -29,7 +29,7 @@ public interface CacheRealmProvider extends RealmProvider {
void registerRealmInvalidation(String id);
- void registerApplicationInvalidation(String id);
+ void registerClientInvalidation(String id);
void registerClientTemplateInvalidation(String id);
void registerRoleInvalidation(String id);
diff --git a/server-spi/src/main/java/org/keycloak/models/cache/entities/CachedClientRole.java b/server-spi/src/main/java/org/keycloak/models/cache/entities/CachedClientRole.java
index 0109d6a..3cbfa30 100755
--- a/server-spi/src/main/java/org/keycloak/models/cache/entities/CachedClientRole.java
+++ b/server-spi/src/main/java/org/keycloak/models/cache/entities/CachedClientRole.java
@@ -26,15 +26,15 @@ import org.keycloak.models.RoleModel;
*/
public class CachedClientRole extends CachedRole {
- private final String idClient;
+ private final String clientId;
- public CachedClientRole(String idClient, RoleModel model, RealmModel realm) {
+ public CachedClientRole(String clientId, RoleModel model, RealmModel realm) {
super(model, realm);
- this.idClient = idClient;
+ this.clientId = clientId;
}
- public String getIdClient() {
- return idClient;
+ public String getClientId() {
+ return clientId;
}
}
diff --git a/server-spi/src/main/java/org/keycloak/models/RealmProvider.java b/server-spi/src/main/java/org/keycloak/models/RealmProvider.java
index 2b3f5fa..a101ce4 100755
--- a/server-spi/src/main/java/org/keycloak/models/RealmProvider.java
+++ b/server-spi/src/main/java/org/keycloak/models/RealmProvider.java
@@ -35,6 +35,12 @@ public interface RealmProvider extends Provider {
RealmModel getRealm(String id);
RealmModel getRealmByName(String name);
+ ClientModel addClient(RealmModel realm, String clientId);
+
+ ClientModel addClient(RealmModel realm, String id, String clientId);
+
+ List<ClientModel> getClients(RealmModel realm);
+
ClientModel getClientById(String id, RealmModel realm);
ClientModel getClientByClientId(String clientId, RealmModel realm);
diff --git a/testsuite/integration/src/test/java/org/keycloak/testsuite/admin/ConcurrencyTest.java b/testsuite/integration/src/test/java/org/keycloak/testsuite/admin/ConcurrencyTest.java
index 7984fae..9adebd3 100755
--- a/testsuite/integration/src/test/java/org/keycloak/testsuite/admin/ConcurrencyTest.java
+++ b/testsuite/integration/src/test/java/org/keycloak/testsuite/admin/ConcurrencyTest.java
@@ -27,6 +27,7 @@ import org.keycloak.admin.client.resource.RealmResource;
import org.keycloak.representations.idm.ClientRepresentation;
import org.keycloak.representations.idm.RoleRepresentation;
+import javax.ws.rs.NotFoundException;
import javax.ws.rs.core.Response;
import java.util.LinkedList;
import java.util.List;
@@ -90,6 +91,7 @@ public class ConcurrencyTest extends AbstractClientTest {
@Test
public void createClient() throws Throwable {
+ System.out.println("***************************");
long start = System.currentTimeMillis();
run(new KeycloakRunnable() {
@Override
@@ -101,7 +103,8 @@ public class ConcurrencyTest extends AbstractClientTest {
String id = ApiUtil.getCreatedId(response);
response.close();
- assertNotNull(realm.clients().get(id));
+ c = realm.clients().get(id).toRepresentation();
+ assertNotNull(c);
boolean found = false;
for (ClientRepresentation r : realm.clients().findAll()) {
if (r.getClientId().equals(name)) {
@@ -120,6 +123,58 @@ public class ConcurrencyTest extends AbstractClientTest {
}
@Test
+ @Ignore
+ public void createRemoveClient() throws Throwable {
+ // FYI< this will fail as HSQL seems to be trying to perform table locks.
+ System.out.println("***************************");
+ long start = System.currentTimeMillis();
+ run(new KeycloakRunnable() {
+ @Override
+ public void run(Keycloak keycloak, RealmResource realm, int threadNum, int iterationNum) {
+ String name = "c-" + threadNum + "-" + iterationNum;
+ ClientRepresentation c = new ClientRepresentation();
+ c.setClientId(name);
+ Response response = realm.clients().create(c);
+ String id = ApiUtil.getCreatedId(response);
+ response.close();
+
+ c = realm.clients().get(id).toRepresentation();
+ assertNotNull(c);
+ boolean found = false;
+ for (ClientRepresentation r : realm.clients().findAll()) {
+ if (r.getClientId().equals(name)) {
+ found = true;
+ break;
+ }
+ }
+ if (!found) {
+ fail("Client " + name + " not found in client list");
+ }
+ realm.clients().get(id).remove();
+ try {
+ c = realm.clients().get(id).toRepresentation();
+ fail("Client " + name + " should not be found. Should throw a 404");
+ } catch (NotFoundException e) {
+
+ }
+ found = false;
+ for (ClientRepresentation r : realm.clients().findAll()) {
+ if (r.getClientId().equals(name)) {
+ found = true;
+ break;
+ }
+ }
+ Assert.assertFalse("Client " + name + " should not be in client list", found);
+
+ }
+ });
+ long end = System.currentTimeMillis() - start;
+ System.out.println("createClient took " + end);
+
+ }
+
+
+ @Test
public void createRole() throws Throwable {
long start = System.currentTimeMillis();
run(new KeycloakRunnable() {
diff --git a/testsuite/integration/src/test/resources/log4j.properties b/testsuite/integration/src/test/resources/log4j.properties
index 91c9646..a199a41 100755
--- a/testsuite/integration/src/test/resources/log4j.properties
+++ b/testsuite/integration/src/test/resources/log4j.properties
@@ -19,7 +19,7 @@ log4j.rootLogger=info, stdout
log4j.appender.stdout=org.apache.log4j.ConsoleAppender
log4j.appender.stdout.layout=org.apache.log4j.PatternLayout
-log4j.appender.stdout.layout.ConversionPattern=%d{HH:mm:ss,SSS} %-5p [%c] %m%n
+log4j.appender.stdout.layout.ConversionPattern=%d{HH:mm:ss,SSS} %-5p %t [%c] %m%n
log4j.logger.org.keycloak=info
diff --git a/testsuite/integration/src/test/resources/META-INF/keycloak-server.json b/testsuite/integration/src/test/resources/META-INF/keycloak-server.json
index 9329cde..950fd22 100755
--- a/testsuite/integration/src/test/resources/META-INF/keycloak-server.json
+++ b/testsuite/integration/src/test/resources/META-INF/keycloak-server.json
@@ -27,7 +27,7 @@
},
"userCache": {
- "infinispan" : {
+ "default" : {
"enabled": true
}
},
@@ -78,15 +78,13 @@
},
"realmCache": {
- "provider": "infinispan-locking",
- "infinispan-locking" : {
+ "default" : {
"enabled": true
}
},
"connectionsInfinispan": {
- "provider": "locking",
- "locking": {
+ "default": {
"clustered": "${keycloak.connectionsInfinispan.clustered:false}",
"async": "${keycloak.connectionsInfinispan.async:true}",
"sessionsOwners": "${keycloak.connectionsInfinispan.sessionsOwners:2}"
diff --git a/testsuite/integration-arquillian/tests/base/src/test/resources/META-INF/keycloak-server.json b/testsuite/integration-arquillian/tests/base/src/test/resources/META-INF/keycloak-server.json
index e26f610..ae0f5f9 100755
--- a/testsuite/integration-arquillian/tests/base/src/test/resources/META-INF/keycloak-server.json
+++ b/testsuite/integration-arquillian/tests/base/src/test/resources/META-INF/keycloak-server.json
@@ -27,7 +27,10 @@
},
"userCache": {
- "provider": "${keycloak.user.cache.provider:infinispan}",
+ "provider": "${keycloak.user.cache.provider:default}",
+ "default" : {
+ "enabled": true
+ },
"mem": {
"maxSize": 20000
}
@@ -95,15 +98,14 @@
},
"realmCache": {
- "provider": "infinispan-locking",
- "infinispan-locking" : {
+ "provider": "${keycloak.realm.cache.provider:default}",
+ "default" : {
"enabled": true
}
},
"connectionsInfinispan": {
- "provider": "locking",
- "locking": {
+ "default": {
"clustered": "${keycloak.connectionsInfinispan.clustered:false}",
"async": "${keycloak.connectionsInfinispan.async:true}",
"sessionsOwners": "${keycloak.connectionsInfinispan.sessionsOwners:2}"