diff --git a/services/src/main/java/org/keycloak/services/resources/LoginActionsService.java b/services/src/main/java/org/keycloak/services/resources/LoginActionsService.java
index a9db3a0..79d20d5 100755
--- a/services/src/main/java/org/keycloak/services/resources/LoginActionsService.java
+++ b/services/src/main/java/org/keycloak/services/resources/LoginActionsService.java
@@ -385,130 +385,6 @@ public class LoginActionsService {
return processRegistration(execution, clientSession);
}
- public Response oldRegistration(ClientSessionCode clientCode, ClientSessionModel clientSession) {
- MultivaluedMap<String, String> formData = request.getDecodedFormParameters();
- String username = formData.getFirst(Validation.FIELD_USERNAME);
- String email = formData.getFirst(Validation.FIELD_EMAIL);
- if (realm.isRegistrationEmailAsUsername()) {
- username = email;
- formData.putSingle(AuthenticationManager.FORM_USERNAME, username);
- }
- event.client(clientSession.getClient())
- .detail(Details.REDIRECT_URI, clientSession.getRedirectUri())
- .detail(Details.RESPONSE_TYPE, "code")
- .detail(Details.USERNAME, username)
- .detail(Details.EMAIL, email)
- .detail(Details.REGISTER_METHOD, "form");
-
- List<String> requiredCredentialTypes = new LinkedList<>();
- boolean passwordRequired = isPasswordRequired();
- if (passwordRequired) {
- requiredCredentialTypes.add(CredentialRepresentation.PASSWORD);
- }
-
- // Validate here, so user is not created if password doesn't validate to passwordPolicy of current realm
- List<FormMessage> errors = Validation.validateRegistrationForm(realm, formData, requiredCredentialTypes, realm.getPasswordPolicy());
-
-
- if (errors != null && !errors.isEmpty()) {
- event.error(Errors.INVALID_REGISTRATION);
- return session.getProvider(LoginFormsProvider.class)
- .setErrors(errors)
- .setFormData(formData)
- .setClientSessionCode(clientCode.getCode())
- .setAttribute("passwordRequired", isPasswordRequired())
- .createRegistration();
- }
-
- // Validate that user with this username doesn't exist in realm or any federation provider
- if (session.users().getUserByUsername(username, realm) != null) {
- event.error(Errors.USERNAME_IN_USE);
- return session.getProvider(LoginFormsProvider.class)
- .setError(Messages.USERNAME_EXISTS)
- .setFormData(formData)
- .setClientSessionCode(clientCode.getCode())
- .setAttribute("passwordRequired", isPasswordRequired())
- .createRegistration();
- }
-
- // Validate that user with this email doesn't exist in realm or any federation provider
- if (email != null && session.users().getUserByEmail(email, realm) != null) {
- event.error(Errors.EMAIL_IN_USE);
- return session.getProvider(LoginFormsProvider.class)
- .setError(Messages.EMAIL_EXISTS)
- .setFormData(formData)
- .setClientSessionCode(clientCode.getCode())
- .setAttribute("passwordRequired", isPasswordRequired())
- .createRegistration();
- }
-
- UserModel user = session.users().addUser(realm, username);
- user.setEnabled(true);
- user.setFirstName(formData.getFirst("firstName"));
- user.setLastName(formData.getFirst("lastName"));
-
- user.setEmail(email);
-
- if (passwordRequired) {
- UserCredentialModel credentials = new UserCredentialModel();
- credentials.setType(CredentialRepresentation.PASSWORD);
- credentials.setValue(formData.getFirst("password"));
-
- boolean passwordUpdateSuccessful;
- String passwordUpdateError = null;
- Object[] passwordUpdateErrorParameters = null;
- try {
- session.users().updateCredential(realm, user, UserCredentialModel.password(formData.getFirst("password")));
- passwordUpdateSuccessful = true;
- } catch (ModelException me) {
- passwordUpdateSuccessful = false;
- passwordUpdateError = me.getMessage();
- passwordUpdateErrorParameters = me.getParameters();
- } catch (Exception ape) {
- passwordUpdateSuccessful = false;
- passwordUpdateError = ape.getMessage();
- }
-
- // User already registered, but force him to update password
- if (!passwordUpdateSuccessful) {
- user.addRequiredAction(RequiredAction.UPDATE_PASSWORD);
- return session.getProvider(LoginFormsProvider.class)
- .setError(passwordUpdateError, passwordUpdateErrorParameters)
- .setClientSessionCode(clientCode.getCode())
- .createResponse(RequiredAction.UPDATE_PASSWORD);
- }
- }
- clientSession.setNote(OIDCLoginProtocol.LOGIN_HINT_PARAM, username);
- AttributeFormDataProcessor.process(formData, realm, user);
-
- event.user(user).success();
- event = new EventBuilder(realm, session, clientConnection);
- clientSession.setAuthenticatedUser(user);
- AuthenticationFlowModel flow = realm.getFlowByAlias(DefaultAuthenticationFlows.BROWSER_FLOW);
- AuthenticationProcessor processor = new AuthenticationProcessor();
- processor.setClientSession(clientSession)
- .setFlowId(flow.getId())
- .setConnection(clientConnection)
- .setEventBuilder(event)
- .setProtector(authManager.getProtector())
- .setRealm(realm)
- .setAction(AbstractFormAuthenticator.REGISTRATION_FORM_ACTION)
- .setSession(session)
- .setUriInfo(uriInfo)
- .setRequest(request);
-
- try {
- return processor.authenticate();
- } catch (Exception e) {
- return processor.handleBrowserException(e);
- }
- }
-
- public boolean isPasswordRequired() {
- AuthenticationFlowModel browserFlow = realm.getFlowByAlias(DefaultAuthenticationFlows.BROWSER_FLOW);
- return AuthenticatorUtil.isRequired(realm, browserFlow.getId(), UsernamePasswordFormFactory.PROVIDER_ID);
- }
-
/**
* OAuth grant page. You should not invoked this directly!
*