Skip to content

Commit 4f04756

Browse files
committed
Merge pull request keycloak#2326 from stianst/KEYCLOAK-2592
Keycloak 2592
2 parents b709ca9 + 57b6ddb commit 4f04756

File tree

3 files changed

+12
-3
lines changed

3 files changed

+12
-3
lines changed

adapters/oidc/adapter-core/src/main/java/org/keycloak/adapters/OAuthRequestAuthenticator.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ public boolean challenge(HttpFacade exchange) {
206206
tokenStore.saveRequest();
207207
log.debug("Sending redirect to login page: " + redirect);
208208
exchange.getResponse().setStatus(302);
209-
exchange.getResponse().setCookie(deployment.getStateCookieName(), state, /* need to set path? */ null, null, -1, deployment.getSslRequired().isRequired(facade.getRequest().getRemoteAddr()), false);
209+
exchange.getResponse().setCookie(deployment.getStateCookieName(), state, /* need to set path? */ null, null, -1, deployment.getSslRequired().isRequired(facade.getRequest().getRemoteAddr()), true);
210210
exchange.getResponse().setHeader("Location", redirect);
211211
return true;
212212
}

core/src/main/java/org/keycloak/AbstractOAuthClient.java

100755100644
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,14 @@ public void setPublicClient(boolean publicClient) {
110110
this.publicClient = publicClient;
111111
}
112112

113+
public boolean isSecure() {
114+
return isSecure;
115+
}
116+
117+
public void setSecure(boolean secure) {
118+
isSecure = secure;
119+
}
120+
113121
public RelativeUrlsUsed getRelativeUrlsUsed() {
114122
return relativeUrlsUsed;
115123
}

services/src/main/java/org/keycloak/services/resources/AbstractSecuredLocalService.java

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -177,6 +177,8 @@ protected Response login(String path) {
177177

178178
oauth.setClientId(client.getClientId());
179179

180+
oauth.setSecure(realm.getSslRequired().isRequired(clientConnection));
181+
180182
UriBuilder uriBuilder = UriBuilder.fromUri(getBaseRedirectUri()).path("login-redirect");
181183

182184
if (path != null) {
@@ -247,8 +249,7 @@ public Response redirect(UriInfo uriInfo, String redirectUri) {
247249

248250
URI url = uriBuilder.build();
249251

250-
// todo httpOnly!
251-
NewCookie cookie = new NewCookie(getStateCookieName(), state, getStateCookiePath(uriInfo), null, null, -1, isSecure);
252+
NewCookie cookie = new NewCookie(getStateCookieName(), state, getStateCookiePath(uriInfo), null, null, -1, isSecure, true);
252253
logger.debug("NewCookie: " + cookie.toString());
253254
logger.debug("Oauth Redirect to: " + url);
254255
return Response.status(302)

0 commit comments

Comments
 (0)