keycloak-uncached

KEYCLOAK-5342 (#4431)

8/28/2017 9:35:58 AM

Details

diff --git a/distribution/feature-packs/server-feature-pack/src/main/resources/modules/system/layers/keycloak/org/keycloak/keycloak-server-spi-private/main/module.xml b/distribution/feature-packs/server-feature-pack/src/main/resources/modules/system/layers/keycloak/org/keycloak/keycloak-server-spi-private/main/module.xml
index 0f136fd..be103dd 100755
--- a/distribution/feature-packs/server-feature-pack/src/main/resources/modules/system/layers/keycloak/org/keycloak/keycloak-server-spi-private/main/module.xml
+++ b/distribution/feature-packs/server-feature-pack/src/main/resources/modules/system/layers/keycloak/org/keycloak/keycloak-server-spi-private/main/module.xml
@@ -36,5 +36,7 @@
         <module name="org.apache.httpcomponents"/>
         <module name="org.jboss.resteasy.resteasy-jaxrs"/>
         <module name="javax.transaction.api"/>
+        <module name="com.fasterxml.jackson.core.jackson-databind"/>
+        <module name="com.fasterxml.jackson.core.jackson-core"/>
     </dependencies>
 </module>
diff --git a/server-spi-private/src/main/java/org/keycloak/broker/provider/util/SimpleHttp.java b/server-spi-private/src/main/java/org/keycloak/broker/provider/util/SimpleHttp.java
index 024d78f..005d647 100755
--- a/server-spi-private/src/main/java/org/keycloak/broker/provider/util/SimpleHttp.java
+++ b/server-spi-private/src/main/java/org/keycloak/broker/provider/util/SimpleHttp.java
@@ -17,16 +17,25 @@
 
 package org.keycloak.broker.provider.util;
 
-import org.apache.http.*;
+import com.fasterxml.jackson.core.type.TypeReference;
+import com.fasterxml.jackson.databind.JsonNode;
+import com.fasterxml.jackson.databind.ObjectMapper;
+import org.apache.http.Header;
+import org.apache.http.HeaderIterator;
+import org.apache.http.HttpEntity;
+import org.apache.http.HttpResponse;
+import org.apache.http.NameValuePair;
 import org.apache.http.client.HttpClient;
 import org.apache.http.client.entity.UrlEncodedFormEntity;
 import org.apache.http.client.methods.HttpGet;
 import org.apache.http.client.methods.HttpPost;
 import org.apache.http.client.methods.HttpRequestBase;
 import org.apache.http.client.utils.URIBuilder;
+import org.apache.http.entity.StringEntity;
 import org.apache.http.message.BasicNameValuePair;
 import org.keycloak.connections.httpclient.HttpClientProvider;
 import org.keycloak.models.KeycloakSession;
+import org.keycloak.util.JsonSerialization;
 
 import java.io.IOException;
 import java.io.InputStream;
@@ -47,25 +56,36 @@ import java.util.zip.GZIPInputStream;
  */
 public class SimpleHttp {
 
-    private KeycloakSession session;
+    private static final ObjectMapper mapper = new ObjectMapper();
+
+    private HttpClient client;
 
     private String url;
     private String method;
     private Map<String, String> headers;
     private Map<String, String> params;
+    private Object entity;
 
-    protected SimpleHttp(String url, String method, KeycloakSession session) {
-        this.session = session;
+    protected SimpleHttp(String url, String method, HttpClient client) {
+        this.client = client;
         this.url = url;
         this.method = method;
     }
 
     public static SimpleHttp doGet(String url, KeycloakSession session) {
-        return new SimpleHttp(url, "GET", session);
+        return doGet(url, session.getProvider(HttpClientProvider.class).getHttpClient());
+    }
+
+    public static SimpleHttp doGet(String url, HttpClient client) {
+        return new SimpleHttp(url, "GET", client);
     }
 
     public static SimpleHttp doPost(String url, KeycloakSession session) {
-        return new SimpleHttp(url, "POST", session);
+        return doPost(url, session.getProvider(HttpClientProvider.class).getHttpClient());
+    }
+
+    public static SimpleHttp doPost(String url, HttpClient client) {
+        return new SimpleHttp(url, "POST", client);
     }
 
     public SimpleHttp header(String name, String value) {
@@ -76,6 +96,11 @@ public class SimpleHttp {
         return this;
     }
 
+    public SimpleHttp json(Object entity) {
+        this.entity = entity;
+        return this;
+    }
+
     public SimpleHttp param(String name, String value) {
         if (params == null) {
             params = new HashMap<String, String>();
@@ -84,43 +109,52 @@ public class SimpleHttp {
         return this;
     }
 
-    public String asString() throws IOException {
-        HttpClient httpClient = session.getProvider(HttpClientProvider.class).getHttpClient();
-
-        HttpResponse response = makeRequest(httpClient);
-
-        InputStream is;
-        HttpEntity entity = response.getEntity();
-        if (entity != null) {
-            is = entity.getContent();
-            try {
-                HeaderIterator it = response.headerIterator();
-                while (it.hasNext()) {
-                    Header header = it.nextHeader();
-                    if (header.getName().equals("Content-Encoding") && header.getValue().equals("gzip")) {
-                        is = new GZIPInputStream(is);
-                    }
-                }
+    public SimpleHttp auth(String token) {
+        header("Authorization", "Bearer " + token);
+        return this;
+    }
 
-                return toString(is);
-            } finally {
-                if (is != null) {
-                    is.close();
-                }
-            }
+    public SimpleHttp acceptJson() {
+        if (headers == null || !headers.containsKey("Accept")) {
+            header("Accept", "application/json");
         }
-        return null;
+        return this;
     }
 
-    public int asStatus() throws IOException {
-        HttpClient httpClient = session.getProvider(HttpClientProvider.class).getHttpClient();
+    public JsonNode asJson() throws IOException {
+        if (headers == null || !headers.containsKey("Accept")) {
+            header("Accept", "application/json");
+        }
+        return mapper.readTree(asString());
+    }
+
+    public <T> T asJson(Class<T> type) throws IOException {
+        if (headers == null || !headers.containsKey("Accept")) {
+            header("Accept", "application/json");
+        }
+        return JsonSerialization.readValue(asString(), type);
+    }
+
+    public <T> T asJson(TypeReference<T> type) throws IOException {
+        if (headers == null || !headers.containsKey("Accept")) {
+            header("Accept", "application/json");
+        }
+        return JsonSerialization.readValue(asString(), type);
+    }
+
+    public String asString() throws IOException {
+        return asResponse().asString();
+    }
 
-        HttpResponse response = makeRequest(httpClient);
+    public int asStatus() throws IOException {
+        return asResponse().getStatus();
+    }
 
-        return response.getStatusLine().getStatusCode();
+    public Response asResponse() throws IOException {
+        return makeRequest();
     }
 
-    private HttpResponse makeRequest(HttpClient httpClient) throws IOException {
+    private Response makeRequest() throws IOException {
         boolean get = method.equals("GET");
         boolean post = method.equals("POST");
 
@@ -130,7 +164,16 @@ public class SimpleHttp {
         }
 
         if (post) {
-            ((HttpPost) httpRequest).setEntity(getFormEntityFromParameter());
+            if (params != null) {
+                ((HttpPost) httpRequest).setEntity(getFormEntityFromParameter());
+            } else if (entity != null) {
+                if (headers == null || !headers.containsKey("Content-Type")) {
+                    header("Content-Type", "application/json");
+                }
+                ((HttpPost) httpRequest).setEntity(getJsonEntity());
+            } else {
+                throw new IllegalStateException("No content set");
+            }
         }
 
         if (headers != null) {
@@ -139,7 +182,7 @@ public class SimpleHttp {
             }
         }
 
-        return httpClient.execute(httpRequest);
+        return new Response(client.execute(httpRequest));
     }
 
     private URI appendParameterToUrl(String url) throws IOException {
@@ -161,28 +204,93 @@ public class SimpleHttp {
         return uri;
     }
 
+    private StringEntity getJsonEntity() throws IOException {
+        return new StringEntity(JsonSerialization.writeValueAsString(entity));
+    }
+
     private UrlEncodedFormEntity getFormEntityFromParameter() throws IOException{
         List<NameValuePair> urlParameters = new ArrayList<>();
 
         if (params != null) {
             for (Map.Entry<String, String> p : params.entrySet()) {
-                urlParameters.add(new BasicNameValuePair(p.getKey(), p.getValue()));
+                urlParameters. add(new BasicNameValuePair(p.getKey(), p.getValue()));
             }
         }
 
         return new UrlEncodedFormEntity(urlParameters);
     }
 
-    private String toString(InputStream is) throws IOException {
-        InputStreamReader reader = new InputStreamReader(is);
+    public static class Response {
+
+        private HttpResponse response;
+        private int statusCode = -1;
+        private String responseString;
+
+        public Response(HttpResponse response) {
+            this.response = response;
+        }
+
+        private void readResponse() throws IOException {
+            if (statusCode == -1) {
+                statusCode = response.getStatusLine().getStatusCode();
+
+                InputStream is;
+                HttpEntity entity = response.getEntity();
+                if (entity != null) {
+                    is = entity.getContent();
+                    try {
+                        HeaderIterator it = response.headerIterator();
+                        while (it.hasNext()) {
+                            Header header = it.nextHeader();
+                            if (header.getName().equals("Content-Encoding") && header.getValue().equals("gzip")) {
+                                is = new GZIPInputStream(is);
+                            }
+                        }
+
+                        InputStreamReader reader = new InputStreamReader(is);
+
+                        StringWriter writer = new StringWriter();
+
+                        char[] buffer = new char[1024 * 4];
+                        for (int n = reader.read(buffer); n != -1; n = reader.read(buffer)) {
+                            writer.write(buffer, 0, n);
+                        }
+
+                        responseString = writer.toString();
+                    } finally {
+                        if (is != null) {
+                            is.close();
+                        }
+                    }
+                }
+            }
+        }
 
-        StringWriter writer = new StringWriter();
+        public int getStatus() throws IOException {
+            readResponse();
+            return response.getStatusLine().getStatusCode();
+        }
+
+        public JsonNode asJson() throws IOException {
+            return mapper.readTree(asString());
+        }
 
-        char[] buffer = new char[1024 * 4];
-        for (int n = reader.read(buffer); n != -1; n = reader.read(buffer)) {
-            writer.write(buffer, 0, n);
+        public <T> T asJson(Class<T> type) throws IOException {
+            return JsonSerialization.readValue(asString(), type);
         }
 
-        return writer.toString();
+        public <T> T asJson(TypeReference<T> type) throws IOException {
+            return JsonSerialization.readValue(asString(), type);
+        }
+
+        public String asString() throws IOException {
+            readResponse();
+            return responseString;
+        }
+
+        public void close() throws IOException {
+            readResponse();
+        }
     }
+
 }
diff --git a/services/src/main/java/org/keycloak/broker/oidc/OIDCIdentityProvider.java b/services/src/main/java/org/keycloak/broker/oidc/OIDCIdentityProvider.java
index 9daeb14..316d493 100755
--- a/services/src/main/java/org/keycloak/broker/oidc/OIDCIdentityProvider.java
+++ b/services/src/main/java/org/keycloak/broker/oidc/OIDCIdentityProvider.java
@@ -20,7 +20,6 @@ import com.fasterxml.jackson.databind.JsonNode;
 import org.jboss.logging.Logger;
 import org.keycloak.OAuth2Constants;
 import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
-import org.keycloak.broker.oidc.util.JsonSimpleHttp;
 import org.keycloak.broker.provider.AuthenticationRequest;
 import org.keycloak.broker.provider.BrokeredIdentityContext;
 import org.keycloak.broker.provider.IdentityBrokerException;
@@ -137,7 +136,7 @@ public class OIDCIdentityProvider extends AbstractOAuth2IdentityProvider<OIDCIde
         logoutUri.queryParam("id_token_hint", idToken);
         String url = logoutUri.build().toString();
         try {
-            int status = JsonSimpleHttp.doGet(url, session).asStatus();
+            int status = SimpleHttp.doGet(url, session).asStatus();
             boolean success = status >=200 && status < 400;
             if (!success) {
                 logger.warn("Failed backchannel broker logout to: " + url);
@@ -368,9 +367,8 @@ public class OIDCIdentityProvider extends AbstractOAuth2IdentityProvider<OIDCIde
         if (!getConfig().isDisableUserInfoService()) {
             String userInfoUrl = getUserInfoUrl();
             if (userInfoUrl != null && !userInfoUrl.isEmpty() && (id == null || name == null || preferredUsername == null || email == null)) {
-                SimpleHttp request = JsonSimpleHttp.doGet(userInfoUrl, session)
-                        .header("Authorization", "Bearer " + accessToken);
-                JsonNode userInfo = JsonSimpleHttp.asJson(request);
+                JsonNode userInfo = SimpleHttp.doGet(userInfoUrl, session)
+                        .header("Authorization", "Bearer " + accessToken).asJson();
 
                 id = getJsonProperty(userInfo, "sub");
                 name = getJsonProperty(userInfo, "name");
diff --git a/services/src/main/java/org/keycloak/social/bitbucket/BitbucketIdentityProvider.java b/services/src/main/java/org/keycloak/social/bitbucket/BitbucketIdentityProvider.java
index c7583b7..bb7aa64 100755
--- a/services/src/main/java/org/keycloak/social/bitbucket/BitbucketIdentityProvider.java
+++ b/services/src/main/java/org/keycloak/social/bitbucket/BitbucketIdentityProvider.java
@@ -21,7 +21,6 @@ import com.fasterxml.jackson.databind.JsonNode;
 import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
 import org.keycloak.broker.oidc.OAuth2IdentityProviderConfig;
 import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
-import org.keycloak.broker.oidc.util.JsonSimpleHttp;
 import org.keycloak.broker.provider.BrokeredIdentityContext;
 import org.keycloak.broker.provider.IdentityBrokerException;
 import org.keycloak.broker.provider.util.SimpleHttp;
@@ -54,7 +53,7 @@ public class BitbucketIdentityProvider extends AbstractOAuth2IdentityProvider im
 	@Override
 	protected BrokeredIdentityContext doGetFederatedIdentity(String accessToken) {
 		try {
-			JsonNode profile = JsonSimpleHttp.asJson(SimpleHttp.doGet(USER_URL, session).header("Authorization", "Bearer " + accessToken));
+			JsonNode profile = SimpleHttp.doGet(USER_URL, session).header("Authorization", "Bearer " + accessToken).asJson();
 
 			String type = getJsonProperty(profile, "type");
 			if (type == null) {
diff --git a/services/src/main/java/org/keycloak/social/facebook/FacebookIdentityProvider.java b/services/src/main/java/org/keycloak/social/facebook/FacebookIdentityProvider.java
index bd6ca54..54be72c 100755
--- a/services/src/main/java/org/keycloak/social/facebook/FacebookIdentityProvider.java
+++ b/services/src/main/java/org/keycloak/social/facebook/FacebookIdentityProvider.java
@@ -21,7 +21,6 @@ import com.fasterxml.jackson.databind.JsonNode;
 import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
 import org.keycloak.broker.oidc.OAuth2IdentityProviderConfig;
 import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
-import org.keycloak.broker.oidc.util.JsonSimpleHttp;
 import org.keycloak.broker.provider.BrokeredIdentityContext;
 import org.keycloak.broker.provider.IdentityBrokerException;
 import org.keycloak.broker.provider.util.SimpleHttp;
@@ -47,7 +46,7 @@ public class FacebookIdentityProvider extends AbstractOAuth2IdentityProvider imp
 
 	protected BrokeredIdentityContext doGetFederatedIdentity(String accessToken) {
 		try {
-			JsonNode profile = JsonSimpleHttp.asJson(SimpleHttp.doGet(PROFILE_URL, session).header("Authorization", "Bearer " + accessToken));
+			JsonNode profile = SimpleHttp.doGet(PROFILE_URL, session).header("Authorization", "Bearer " + accessToken).asJson();
 
 			String id = getJsonProperty(profile, "id");
 
diff --git a/services/src/main/java/org/keycloak/social/github/GitHubIdentityProvider.java b/services/src/main/java/org/keycloak/social/github/GitHubIdentityProvider.java
index 7169293..4120e43 100755
--- a/services/src/main/java/org/keycloak/social/github/GitHubIdentityProvider.java
+++ b/services/src/main/java/org/keycloak/social/github/GitHubIdentityProvider.java
@@ -21,7 +21,6 @@ import com.fasterxml.jackson.databind.JsonNode;
 import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
 import org.keycloak.broker.oidc.OAuth2IdentityProviderConfig;
 import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
-import org.keycloak.broker.oidc.util.JsonSimpleHttp;
 import org.keycloak.broker.provider.BrokeredIdentityContext;
 import org.keycloak.broker.provider.IdentityBrokerException;
 import org.keycloak.broker.provider.util.SimpleHttp;
@@ -48,7 +47,7 @@ public class GitHubIdentityProvider extends AbstractOAuth2IdentityProvider imple
 	@Override
 	protected BrokeredIdentityContext doGetFederatedIdentity(String accessToken) {
 		try {
-			JsonNode profile = JsonSimpleHttp.asJson(SimpleHttp.doGet(PROFILE_URL, session).header("Authorization", "Bearer " + accessToken));
+			JsonNode profile = SimpleHttp.doGet(PROFILE_URL, session).header("Authorization", "Bearer " + accessToken).asJson();
 
 			BrokeredIdentityContext user = new BrokeredIdentityContext(getJsonProperty(profile, "id"));
 
diff --git a/services/src/main/java/org/keycloak/social/gitlab/GitLabIdentityProvider.java b/services/src/main/java/org/keycloak/social/gitlab/GitLabIdentityProvider.java
index a57704f..a35b4a3 100755
--- a/services/src/main/java/org/keycloak/social/gitlab/GitLabIdentityProvider.java
+++ b/services/src/main/java/org/keycloak/social/gitlab/GitLabIdentityProvider.java
@@ -18,14 +18,10 @@
 package org.keycloak.social.gitlab;
 
 import com.fasterxml.jackson.databind.JsonNode;
-import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
-import org.keycloak.broker.oidc.OAuth2IdentityProviderConfig;
 import org.keycloak.broker.oidc.OIDCIdentityProvider;
 import org.keycloak.broker.oidc.OIDCIdentityProviderConfig;
 import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
-import org.keycloak.broker.oidc.util.JsonSimpleHttp;
 import org.keycloak.broker.provider.BrokeredIdentityContext;
-import org.keycloak.broker.provider.IdentityBrokerException;
 import org.keycloak.broker.provider.util.SimpleHttp;
 import org.keycloak.broker.social.SocialIdentityProvider;
 import org.keycloak.models.KeycloakSession;
@@ -68,9 +64,8 @@ public class GitLabIdentityProvider extends OIDCIdentityProvider  implements Soc
 		if (getConfig().getDefaultScope().contains(API_SCOPE)) {
 			String userInfoUrl = getUserInfoUrl();
 			if (userInfoUrl != null && !userInfoUrl.isEmpty() && (id == null || name == null || preferredUsername == null || email == null)) {
-				SimpleHttp request = JsonSimpleHttp.doGet(userInfoUrl, session)
-						.header("Authorization", "Bearer " + accessToken);
-				JsonNode userInfo = JsonSimpleHttp.asJson(request);
+				JsonNode userInfo = SimpleHttp.doGet(userInfoUrl, session)
+						.header("Authorization", "Bearer " + accessToken).asJson();
 
 				name = getJsonProperty(userInfo, "name");
 				preferredUsername = getJsonProperty(userInfo, "username");
diff --git a/services/src/main/java/org/keycloak/social/linkedin/LinkedInIdentityProvider.java b/services/src/main/java/org/keycloak/social/linkedin/LinkedInIdentityProvider.java
index d3befd7..e25bcfa 100755
--- a/services/src/main/java/org/keycloak/social/linkedin/LinkedInIdentityProvider.java
+++ b/services/src/main/java/org/keycloak/social/linkedin/LinkedInIdentityProvider.java
@@ -21,7 +21,6 @@ import org.jboss.logging.Logger;
 import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
 import org.keycloak.broker.oidc.OAuth2IdentityProviderConfig;
 import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
-import org.keycloak.broker.oidc.util.JsonSimpleHttp;
 import org.keycloak.broker.provider.BrokeredIdentityContext;
 import org.keycloak.broker.provider.IdentityBrokerException;
 import org.keycloak.broker.provider.util.SimpleHttp;
@@ -57,7 +56,7 @@ public class LinkedInIdentityProvider extends AbstractOAuth2IdentityProvider imp
 	protected BrokeredIdentityContext doGetFederatedIdentity(String accessToken) {
 		log.debug("doGetFederatedIdentity()");
 		try {
-			JsonNode profile = JsonSimpleHttp.asJson(SimpleHttp.doGet(PROFILE_URL, session).header("Authorization", "Bearer " + accessToken));
+			JsonNode profile = SimpleHttp.doGet(PROFILE_URL, session).header("Authorization", "Bearer " + accessToken).asJson();
 
 			BrokeredIdentityContext user = new BrokeredIdentityContext(getJsonProperty(profile, "id"));
 
diff --git a/services/src/main/java/org/keycloak/social/microsoft/MicrosoftIdentityProvider.java b/services/src/main/java/org/keycloak/social/microsoft/MicrosoftIdentityProvider.java
index 224733b..17dde5e 100755
--- a/services/src/main/java/org/keycloak/social/microsoft/MicrosoftIdentityProvider.java
+++ b/services/src/main/java/org/keycloak/social/microsoft/MicrosoftIdentityProvider.java
@@ -22,13 +22,11 @@ import org.jboss.logging.Logger;
 import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
 import org.keycloak.broker.oidc.OAuth2IdentityProviderConfig;
 import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
-import org.keycloak.broker.oidc.util.JsonSimpleHttp;
 import org.keycloak.broker.provider.BrokeredIdentityContext;
 import org.keycloak.broker.provider.IdentityBrokerException;
 import org.keycloak.broker.provider.util.SimpleHttp;
 import org.keycloak.broker.social.SocialIdentityProvider;
 
-import com.fasterxml.jackson.databind.JsonNode;
 import org.keycloak.models.KeycloakSession;
 
 import java.net.URLEncoder;
@@ -62,7 +60,7 @@ public class MicrosoftIdentityProvider extends AbstractOAuth2IdentityProvider im
             if (log.isDebugEnabled()) {
                 log.debug("Microsoft Live user profile request to: " + URL);
             }
-            JsonNode profile = JsonSimpleHttp.asJson(SimpleHttp.doGet(URL, session));
+            JsonNode profile = SimpleHttp.doGet(URL, session).asJson();
 
             String id = getJsonProperty(profile, "id");
 
diff --git a/services/src/main/java/org/keycloak/social/openshift/OpenshiftV3IdentityProvider.java b/services/src/main/java/org/keycloak/social/openshift/OpenshiftV3IdentityProvider.java
index bc83af1..fafa425 100644
--- a/services/src/main/java/org/keycloak/social/openshift/OpenshiftV3IdentityProvider.java
+++ b/services/src/main/java/org/keycloak/social/openshift/OpenshiftV3IdentityProvider.java
@@ -3,7 +3,6 @@ package org.keycloak.social.openshift;
 import com.fasterxml.jackson.databind.JsonNode;
 import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
 import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
-import org.keycloak.broker.oidc.util.JsonSimpleHttp;
 import org.keycloak.broker.provider.BrokeredIdentityContext;
 import org.keycloak.broker.provider.IdentityBrokerException;
 import org.keycloak.broker.provider.util.SimpleHttp;
@@ -59,8 +58,9 @@ public class OpenshiftV3IdentityProvider extends AbstractOAuth2IdentityProvider<
     }
 
     private JsonNode fetchProfile(String accessToken) throws IOException {
-        return JsonSimpleHttp.asJson(SimpleHttp.doGet(getConfig().getUserInfoUrl(), this.session)
-                             .header("Authorization", "Bearer " + accessToken));
+        return SimpleHttp.doGet(getConfig().getUserInfoUrl(), this.session)
+                             .header("Authorization", "Bearer " + accessToken)
+                             .asJson();
     }
 
 }
diff --git a/services/src/main/java/org/keycloak/social/stackoverflow/StackoverflowIdentityProvider.java b/services/src/main/java/org/keycloak/social/stackoverflow/StackoverflowIdentityProvider.java
index 43ccc6c..9a0992a 100755
--- a/services/src/main/java/org/keycloak/social/stackoverflow/StackoverflowIdentityProvider.java
+++ b/services/src/main/java/org/keycloak/social/stackoverflow/StackoverflowIdentityProvider.java
@@ -20,7 +20,6 @@ import com.fasterxml.jackson.databind.JsonNode;
 import org.jboss.logging.Logger;
 import org.keycloak.broker.oidc.AbstractOAuth2IdentityProvider;
 import org.keycloak.broker.oidc.mappers.AbstractJsonUserAttributeMapper;
-import org.keycloak.broker.oidc.util.JsonSimpleHttp;
 import org.keycloak.broker.provider.BrokeredIdentityContext;
 import org.keycloak.broker.provider.IdentityBrokerException;
 import org.keycloak.broker.provider.util.SimpleHttp;
@@ -63,7 +62,7 @@ public class StackoverflowIdentityProvider extends AbstractOAuth2IdentityProvide
 			if (log.isDebugEnabled()) {
 				log.debug("StackOverflow profile request to: " + URL);
 			}
-			JsonNode profile = JsonSimpleHttp.asJson(SimpleHttp.doGet(URL, session)).get("items").get(0);
+			JsonNode profile = SimpleHttp.doGet(URL, session).asJson().get("items").get(0);
 
 			BrokeredIdentityContext user = new BrokeredIdentityContext(getJsonProperty(profile, "user_id"));