keycloak-aplcache

remove old code

6/30/2015 1:47:34 PM

Details

diff --git a/services/src/main/java/org/keycloak/services/resources/LoginActionsService.java b/services/src/main/java/org/keycloak/services/resources/LoginActionsService.java
index a9db3a0..79d20d5 100755
--- a/services/src/main/java/org/keycloak/services/resources/LoginActionsService.java
+++ b/services/src/main/java/org/keycloak/services/resources/LoginActionsService.java
@@ -385,130 +385,6 @@ public class LoginActionsService {
         return processRegistration(execution, clientSession);
     }
 
-    public Response oldRegistration(ClientSessionCode clientCode, ClientSessionModel clientSession) {
-        MultivaluedMap<String, String> formData = request.getDecodedFormParameters();
-        String username = formData.getFirst(Validation.FIELD_USERNAME);
-        String email = formData.getFirst(Validation.FIELD_EMAIL);
-        if (realm.isRegistrationEmailAsUsername()) {
-            username = email;
-            formData.putSingle(AuthenticationManager.FORM_USERNAME, username);
-        }
-        event.client(clientSession.getClient())
-                .detail(Details.REDIRECT_URI, clientSession.getRedirectUri())
-                .detail(Details.RESPONSE_TYPE, "code")
-                .detail(Details.USERNAME, username)
-                .detail(Details.EMAIL, email)
-                .detail(Details.REGISTER_METHOD, "form");
-
-        List<String> requiredCredentialTypes = new LinkedList<>();
-        boolean passwordRequired = isPasswordRequired();
-        if (passwordRequired) {
-            requiredCredentialTypes.add(CredentialRepresentation.PASSWORD);
-        }
-
-        // Validate here, so user is not created if password doesn't validate to passwordPolicy of current realm
-        List<FormMessage> errors = Validation.validateRegistrationForm(realm, formData, requiredCredentialTypes, realm.getPasswordPolicy());
-
-
-        if (errors != null && !errors.isEmpty()) {
-            event.error(Errors.INVALID_REGISTRATION);
-            return session.getProvider(LoginFormsProvider.class)
-                    .setErrors(errors)
-                    .setFormData(formData)
-                    .setClientSessionCode(clientCode.getCode())
-                    .setAttribute("passwordRequired", isPasswordRequired())
-                    .createRegistration();
-        }
-
-        // Validate that user with this username doesn't exist in realm or any federation provider
-        if (session.users().getUserByUsername(username, realm) != null) {
-            event.error(Errors.USERNAME_IN_USE);
-            return session.getProvider(LoginFormsProvider.class)
-                    .setError(Messages.USERNAME_EXISTS)
-                    .setFormData(formData)
-                    .setClientSessionCode(clientCode.getCode())
-                    .setAttribute("passwordRequired", isPasswordRequired())
-                    .createRegistration();
-        }
-
-        // Validate that user with this email doesn't exist in realm or any federation provider
-        if (email != null && session.users().getUserByEmail(email, realm) != null) {
-            event.error(Errors.EMAIL_IN_USE);
-            return session.getProvider(LoginFormsProvider.class)
-                    .setError(Messages.EMAIL_EXISTS)
-                    .setFormData(formData)
-                    .setClientSessionCode(clientCode.getCode())
-                    .setAttribute("passwordRequired", isPasswordRequired())
-                    .createRegistration();
-        }
-
-        UserModel user = session.users().addUser(realm, username);
-        user.setEnabled(true);
-        user.setFirstName(formData.getFirst("firstName"));
-        user.setLastName(formData.getFirst("lastName"));
-
-        user.setEmail(email);
-
-        if (passwordRequired) {
-            UserCredentialModel credentials = new UserCredentialModel();
-            credentials.setType(CredentialRepresentation.PASSWORD);
-            credentials.setValue(formData.getFirst("password"));
-
-            boolean passwordUpdateSuccessful;
-            String passwordUpdateError = null;
-            Object[] passwordUpdateErrorParameters = null;
-            try {
-                session.users().updateCredential(realm, user, UserCredentialModel.password(formData.getFirst("password")));
-                passwordUpdateSuccessful = true;
-            } catch (ModelException me) {
-                passwordUpdateSuccessful = false;
-                passwordUpdateError = me.getMessage();
-                passwordUpdateErrorParameters = me.getParameters();
-            } catch (Exception ape) {
-                passwordUpdateSuccessful = false;
-                passwordUpdateError = ape.getMessage();
-            }
-
-            // User already registered, but force him to update password
-            if (!passwordUpdateSuccessful) {
-                user.addRequiredAction(RequiredAction.UPDATE_PASSWORD);
-                return session.getProvider(LoginFormsProvider.class)
-                        .setError(passwordUpdateError, passwordUpdateErrorParameters)
-                        .setClientSessionCode(clientCode.getCode())
-                        .createResponse(RequiredAction.UPDATE_PASSWORD);
-            }
-        }
-        clientSession.setNote(OIDCLoginProtocol.LOGIN_HINT_PARAM, username);
-        AttributeFormDataProcessor.process(formData, realm, user);
-
-        event.user(user).success();
-        event = new EventBuilder(realm, session, clientConnection);
-        clientSession.setAuthenticatedUser(user);
-        AuthenticationFlowModel flow = realm.getFlowByAlias(DefaultAuthenticationFlows.BROWSER_FLOW);
-        AuthenticationProcessor processor = new AuthenticationProcessor();
-        processor.setClientSession(clientSession)
-                .setFlowId(flow.getId())
-                .setConnection(clientConnection)
-                .setEventBuilder(event)
-                .setProtector(authManager.getProtector())
-                .setRealm(realm)
-                .setAction(AbstractFormAuthenticator.REGISTRATION_FORM_ACTION)
-                .setSession(session)
-                .setUriInfo(uriInfo)
-                .setRequest(request);
-
-        try {
-            return processor.authenticate();
-        } catch (Exception e) {
-            return processor.handleBrowserException(e);
-        }
-    }
-
-    public boolean isPasswordRequired() {
-        AuthenticationFlowModel browserFlow = realm.getFlowByAlias(DefaultAuthenticationFlows.BROWSER_FLOW);
-        return AuthenticatorUtil.isRequired(realm, browserFlow.getId(), UsernamePasswordFormFactory.PROVIDER_ID);
-    }
-
     /**
      * OAuth grant page.  You should not invoked this directly!
      *