-
Notifications
You must be signed in to change notification settings - Fork 10
Implement access token context encoding framework #8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: feature-token-context-baseline
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -64,6 +64,8 @@ | |
| import org.keycloak.organization.protocol.mappers.oidc.OrganizationScope; | ||
| import org.keycloak.protocol.ProtocolMapper; | ||
| import org.keycloak.protocol.ProtocolMapperUtils; | ||
| import org.keycloak.protocol.oidc.encode.AccessTokenContext; | ||
| import org.keycloak.protocol.oidc.encode.TokenContextEncoderProvider; | ||
| import org.keycloak.protocol.oidc.mappers.TokenIntrospectionTokenMapper; | ||
| import org.keycloak.protocol.oidc.mappers.OIDCAccessTokenMapper; | ||
| import org.keycloak.protocol.oidc.mappers.OIDCAccessTokenResponseMapper; | ||
|
|
@@ -243,6 +245,7 @@ public TokenValidation validateToken(KeycloakSession session, UriInfo uriInfo, C | |
| if (oldToken.getNonce() != null) { | ||
| clientSessionCtx.setAttribute(OIDCLoginProtocol.NONCE_PARAM, oldToken.getNonce()); | ||
| } | ||
| clientSessionCtx.setAttribute(Constants.GRANT_TYPE, OAuth2Constants.REFRESH_TOKEN); | ||
|
|
||
| // recreate token. | ||
| AccessToken newToken = createClientAccessToken(session, realm, client, user, userSession, clientSessionCtx); | ||
|
|
@@ -861,9 +864,9 @@ protected AccessToken applyMapper(AccessToken token, Map.Entry<ProtocolMapperMod | |
| return ((OIDCAccessTokenMapper) mapper.getValue()).transformAccessToken(token, mapper.getKey(), session, userSession, clientSessionCtx); | ||
| } | ||
| }); | ||
| final ClientModel[] requestedAucienceClients = clientSessionCtx.getAttribute(Constants.REQUESTED_AUDIENCE_CLIENTS, ClientModel[].class); | ||
| if (requestedAucienceClients != null) { | ||
| restrictRequestedAudience(accessToken, Arrays.stream(requestedAucienceClients) | ||
| final ClientModel[] requestedAudienceClients = clientSessionCtx.getAttribute(Constants.REQUESTED_AUDIENCE_CLIENTS, ClientModel[].class); | ||
| if (requestedAudienceClients != null) { | ||
| restrictRequestedAudience(accessToken, Arrays.stream(requestedAudienceClients) | ||
| .map(ClientModel::getClientId) | ||
| .collect(Collectors.toSet())); | ||
| } | ||
|
|
@@ -1045,7 +1048,11 @@ protected IDToken applyMapper(IDToken token, Map.Entry<ProtocolMapperModel, Prot | |
| protected AccessToken initToken(KeycloakSession session, RealmModel realm, ClientModel client, UserModel user, UserSessionModel userSession, | ||
| ClientSessionContext clientSessionCtx, UriInfo uriInfo) { | ||
| AccessToken token = new AccessToken(); | ||
| token.id(KeycloakModelUtils.generateId()); | ||
|
|
||
| TokenContextEncoderProvider encoder = session.getProvider(TokenContextEncoderProvider.class); | ||
| AccessTokenContext tokenCtx = encoder.getTokenContextFromClientSessionContext(clientSessionCtx, KeycloakModelUtils.generateId()); | ||
| token.id(encoder.encodeTokenId(tokenCtx)); | ||
|
Comment on lines
+1052
to
+1054
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. logic: No null check for encoder provider - could cause NPE if provider not registered |
||
|
|
||
| token.type(formatTokenType(client, token)); | ||
| if (UserSessionModel.SessionPersistenceState.TRANSIENT.equals(userSession.getPersistenceState())) { | ||
| token.subject(user.getId()); | ||
|
|
||
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
| @@ -0,0 +1,95 @@ | ||||||
| /* | ||||||
| * Copyright 2025 Red Hat, Inc. and/or its affiliates | ||||||
| * and other contributors as indicated by the @author tags. | ||||||
| * | ||||||
| * Licensed under the Apache License, Version 2.0 (the "License"); | ||||||
| * you may not use this file except in compliance with the License. | ||||||
| * You may obtain a copy of the License at | ||||||
| * | ||||||
| * http://www.apache.org/licenses/LICENSE-2.0 | ||||||
| * | ||||||
| * Unless required by applicable law or agreed to in writing, software | ||||||
| * distributed under the License is distributed on an "AS IS" BASIS, | ||||||
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||||||
| * | ||||||
| * See the License for the specific language governing permissions and | ||||||
| * limitations under the License. | ||||||
| * | ||||||
| */ | ||||||
|
|
||||||
| package org.keycloak.protocol.oidc.encode; | ||||||
|
|
||||||
| import java.util.Objects; | ||||||
|
|
||||||
| /** | ||||||
| * Some context info about the token | ||||||
| * | ||||||
| * @author <a href="mailto:[email protected]">Marek Posolda</a> | ||||||
| */ | ||||||
| public class AccessTokenContext { | ||||||
|
|
||||||
| private final SessionType sessionType; | ||||||
| private final TokenType tokenType; | ||||||
| private final String grantType; | ||||||
| private final String rawTokenId; | ||||||
|
|
||||||
| public enum SessionType { | ||||||
| ONLINE("on"), | ||||||
| OFFLINE("of"), | ||||||
| TRANSIENT("tr"), | ||||||
| UNKNOWN("un"); | ||||||
|
|
||||||
| private final String shortcut; | ||||||
|
|
||||||
| SessionType(String shortcut) { | ||||||
| this.shortcut = shortcut; | ||||||
| } | ||||||
|
|
||||||
| public String getShortcut() { | ||||||
| return shortcut; | ||||||
| } | ||||||
| } | ||||||
|
|
||||||
| public enum TokenType { | ||||||
| REGULAR("rt"), | ||||||
| LIGHTWEIGHT("lt"), | ||||||
| UNKNOWN("un"); | ||||||
|
|
||||||
| private final String shortcut; | ||||||
|
|
||||||
| TokenType(String shortcut) { | ||||||
| this.shortcut = shortcut; | ||||||
| } | ||||||
|
|
||||||
| public String getShortcut() { | ||||||
| return shortcut; | ||||||
| } | ||||||
| } | ||||||
|
|
||||||
| public AccessTokenContext(SessionType sessionType, TokenType tokenType, String grantType, String rawTokenId) { | ||||||
| Objects.requireNonNull(sessionType, "Null sessionType not allowed"); | ||||||
| Objects.requireNonNull(tokenType, "Null tokenType not allowed"); | ||||||
| Objects.requireNonNull(grantType, "Null grantType not allowed"); | ||||||
| Objects.requireNonNull(grantType, "Null rawTokenId not allowed"); | ||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. syntax: Wrong parameter validated - should be
Suggested change
|
||||||
| this.sessionType = sessionType; | ||||||
| this.tokenType = tokenType; | ||||||
| this.grantType = grantType; | ||||||
| this.rawTokenId = rawTokenId; | ||||||
| } | ||||||
|
|
||||||
| public SessionType getSessionType() { | ||||||
| return sessionType; | ||||||
| } | ||||||
|
|
||||||
| public TokenType getTokenType() { | ||||||
| return tokenType; | ||||||
| } | ||||||
|
|
||||||
| public String getGrantType() { | ||||||
| return grantType; | ||||||
| } | ||||||
|
|
||||||
| public String getRawTokenId() { | ||||||
| return rawTokenId; | ||||||
| } | ||||||
| } | ||||||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,124 @@ | ||
| /* | ||
| * Copyright 2025 Red Hat, Inc. and/or its affiliates | ||
| * and other contributors as indicated by the @author tags. | ||
| * | ||
| * Licensed under the Apache License, Version 2.0 (the "License"); | ||
| * you may not use this file except in compliance with the License. | ||
| * You may obtain a copy of the License at | ||
| * | ||
| * http://www.apache.org/licenses/LICENSE-2.0 | ||
| * | ||
| * Unless required by applicable law or agreed to in writing, software | ||
| * distributed under the License is distributed on an "AS IS" BASIS, | ||
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
| * | ||
| * See the License for the specific language governing permissions and | ||
| * limitations under the License. | ||
| * | ||
| */ | ||
|
|
||
| package org.keycloak.protocol.oidc.encode; | ||
|
|
||
| import org.keycloak.models.ClientSessionContext; | ||
| import org.keycloak.models.Constants; | ||
| import org.keycloak.models.KeycloakSession; | ||
| import org.keycloak.models.UserSessionModel; | ||
| import org.keycloak.protocol.oidc.mappers.AbstractOIDCProtocolMapper; | ||
|
|
||
| /** | ||
| * @author <a href="mailto:[email protected]">Marek Posolda</a> | ||
| */ | ||
| public class DefaultTokenContextEncoderProvider implements TokenContextEncoderProvider { | ||
|
|
||
| public static final String UNKNOWN = "na"; | ||
|
|
||
| private final KeycloakSession session; | ||
| private final DefaultTokenContextEncoderProviderFactory factory; | ||
|
|
||
| public DefaultTokenContextEncoderProvider(KeycloakSession session, | ||
| DefaultTokenContextEncoderProviderFactory factory) { | ||
| this.session = session; | ||
| this.factory = factory; | ||
| } | ||
|
|
||
| @Override | ||
| public AccessTokenContext getTokenContextFromClientSessionContext(ClientSessionContext clientSessionContext, String rawTokenId) { | ||
| AccessTokenContext.SessionType sessionType; | ||
| UserSessionModel userSession = clientSessionContext.getClientSession().getUserSession(); | ||
| if (userSession.getPersistenceState() == UserSessionModel.SessionPersistenceState.TRANSIENT) { | ||
| sessionType = AccessTokenContext.SessionType.TRANSIENT; | ||
| } else { | ||
| sessionType = userSession.isOffline() ? AccessTokenContext.SessionType.OFFLINE : AccessTokenContext.SessionType.ONLINE; | ||
| } | ||
|
|
||
| boolean useLightweightToken = AbstractOIDCProtocolMapper.getShouldUseLightweightToken(session); | ||
| AccessTokenContext.TokenType tokenType = useLightweightToken ? AccessTokenContext.TokenType.LIGHTWEIGHT : AccessTokenContext.TokenType.REGULAR; | ||
|
|
||
| String grantType = clientSessionContext.getAttribute(Constants.GRANT_TYPE, String.class); | ||
| if (grantType == null) { | ||
| grantType = UNKNOWN; | ||
| } | ||
|
|
||
| return new AccessTokenContext(sessionType, tokenType, grantType, rawTokenId); | ||
| } | ||
|
|
||
| @Override | ||
| public AccessTokenContext getTokenContextFromTokenId(String encodedTokenId) { | ||
| int indexOf = encodedTokenId.indexOf(':'); | ||
| if (indexOf == -1) { | ||
| return new AccessTokenContext(AccessTokenContext.SessionType.UNKNOWN, AccessTokenContext.TokenType.UNKNOWN, UNKNOWN, encodedTokenId); | ||
| } else { | ||
| String encodedContext = encodedTokenId.substring(0, indexOf); | ||
| String rawId = encodedTokenId.substring(indexOf + 1); | ||
|
|
||
| if (encodedContext.length() != 6) { | ||
| throw new IllegalArgumentException("Incorrect token id: '" + encodedTokenId + "'. Expected length of 6."); | ||
| } | ||
|
|
||
| // First 2 chars are "sessionType", next 2 chars "tokenType", last 2 chars "grantType" | ||
| String stShortcut = encodedContext.substring(0, 2); | ||
| String ttShortcut = encodedContext.substring(2, 4); | ||
| String gtShortcut = encodedContext.substring(4, 6); | ||
|
|
||
| AccessTokenContext.SessionType st = factory.getSessionTypeByShortcut(stShortcut); | ||
| if (st == null) { | ||
| throw new IllegalArgumentException("Incorrect token id: " + encodedTokenId + ". Unknown value '" + stShortcut + "' for session type"); | ||
| } | ||
| AccessTokenContext.TokenType tt = factory.getTokenTypeByShortcut(ttShortcut); | ||
| if (tt == null) { | ||
| throw new IllegalArgumentException("Incorrect token id: " + encodedTokenId + ". Unknown value '" + ttShortcut + "' for token type"); | ||
| } | ||
| String gt = factory.getGrantTypeByShortcut(gtShortcut); | ||
| if (gt == null) { | ||
| throw new IllegalArgumentException("Incorrect token id: " + encodedTokenId + ". Unknown value '" + gtShortcut + "' for grant type"); | ||
| } | ||
|
|
||
| return new AccessTokenContext(st, tt, gt, rawId); | ||
| } | ||
| } | ||
|
|
||
| @Override | ||
| public String encodeTokenId(AccessTokenContext tokenContext) { | ||
| if (tokenContext.getSessionType() == AccessTokenContext.SessionType.UNKNOWN) { | ||
| throw new IllegalStateException("Cannot encode token with unknown sessionType"); | ||
| } | ||
| if (tokenContext.getTokenType() == AccessTokenContext.TokenType.UNKNOWN) { | ||
| throw new IllegalStateException("Cannot encode token with unknown tokenType"); | ||
| } | ||
|
|
||
| String grantShort = factory.getShortcutByGrantType(tokenContext.getGrantType()); | ||
| if (grantShort == null) { | ||
| throw new IllegalStateException("Cannot encode token with unknown grantType: " + tokenContext.getGrantType()); | ||
| } | ||
|
|
||
| return tokenContext.getSessionType().getShortcut() + | ||
| tokenContext.getTokenType().getShortcut() + | ||
| grantShort + | ||
| ':' + tokenContext.getRawTokenId(); | ||
| } | ||
|
|
||
| @Override | ||
| public void close() { | ||
|
|
||
| } | ||
| } |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
style: Javadoc mentions "usually like 3-letters shortcut" but some implementations use 2-letter shortcuts ("ac", "cc", "rt", "te", "pc", "ci", "ro"). Consider updating documentation to reflect actual usage pattern.