Skip to content

Commit eae87f4

Browse files
committed
Fix #32581: log id token and user info claims even if not using roles
1 parent 4a6ac66 commit eae87f4

1 file changed

Lines changed: 15 additions & 16 deletions

File tree

src/main/java/eu/openanalytics/containerproxy/auth/impl/OpenIDAuthenticationBackend.java

Lines changed: 15 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -158,12 +158,15 @@ public Set<GrantedAuthority> parseClaims(StandardClaimAccessor standardClaimAcce
158158
.collect(Collectors.joining(lineSep));
159159
log.debug(String.format("Available claims in %s (%d):%s%s", logInfo, standardClaimAccessor.getClaims().size(), lineSep, claims));
160160
}
161+
Set<GrantedAuthority> mappedAuthorities = new HashSet<>();
162+
if (rolesClaimName == null || rolesClaimName.isEmpty()) {
163+
return mappedAuthorities;
164+
}
161165

162166
Object claimValue = standardClaimAccessor
163167
.getClaims()
164168
.get(rolesClaimName);
165169

166-
Set<GrantedAuthority> mappedAuthorities = new HashSet<>();
167170
for (String role : parseRolesClaim(log, logInfo, rolesClaimName, claimValue)) {
168171
String mappedRole = role
169172
.toUpperCase()
@@ -285,22 +288,18 @@ public LogoutSuccessHandler getLogoutSuccessHandler() {
285288

286289
protected GrantedAuthoritiesMapper createAuthoritiesMapper() {
287290
String rolesClaimName = environment.getProperty("proxy.openid.roles-claim");
288-
if (rolesClaimName == null || rolesClaimName.isEmpty()) {
289-
return authorities -> authorities;
290-
} else {
291-
return authorities -> {
292-
Set<GrantedAuthority> mappedAuthorities = new HashSet<>();
293-
for (GrantedAuthority auth : authorities) {
294-
if (auth instanceof OidcUserAuthority) {
295-
OidcIdToken idToken = ((OidcUserAuthority) auth).getIdToken();
296-
mappedAuthorities.addAll(parseClaims(idToken, rolesClaimName));
297-
OidcUserInfo userInfo = ((OidcUserAuthority) auth).getUserInfo();
298-
mappedAuthorities.addAll(parseClaims(userInfo, rolesClaimName));
299-
}
291+
return authorities -> {
292+
Set<GrantedAuthority> mappedAuthorities = new HashSet<>();
293+
for (GrantedAuthority auth : authorities) {
294+
if (auth instanceof OidcUserAuthority) {
295+
OidcIdToken idToken = ((OidcUserAuthority) auth).getIdToken();
296+
mappedAuthorities.addAll(parseClaims(idToken, rolesClaimName));
297+
OidcUserInfo userInfo = ((OidcUserAuthority) auth).getUserInfo();
298+
mappedAuthorities.addAll(parseClaims(userInfo, rolesClaimName));
300299
}
301-
return mappedAuthorities;
302-
};
303-
}
300+
}
301+
return mappedAuthorities;
302+
};
304303
}
305304

306305
protected OidcUserService createOidcUserService() {

0 commit comments

Comments
 (0)