This repository has been archived by the owner on Oct 5, 2021. It is now read-only.
/
SSOAgentSessionManager.java
94 lines (83 loc) · 3.45 KB
/
SSOAgentSessionManager.java
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
/*
* Copyright (c) 2012, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
*
* WSO2 Inc. licenses this file to you under the Apache License,
* Version 2.0 (the "License"); you may not use this file except
* in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*
*/
package org.wso2.carbon.identity.sso.agent.session.management;
import org.wso2.carbon.identity.sso.agent.util.SSOAgentConstants;
import org.wso2.carbon.identity.sso.agent.bean.LoggedInSessionBean;
import javax.servlet.http.HttpSession;
import java.util.HashMap;
import java.util.HashSet;
import java.util.Map;
import java.util.Set;
public class SSOAgentSessionManager {
/*
* Session Index at the IdP is mapped to the session at the SP so that a single logout request
* can be handled by invalidating the SP session mapped to IdP Session Index.
*/
private static Map<String, Set<HttpSession>> ssoSessionsMap =
new HashMap<String, Set<HttpSession>>();
private SSOAgentSessionManager() {
}
public static void invalidateSession(HttpSession session) {
LoggedInSessionBean sessionBean = (LoggedInSessionBean) session.getAttribute(
SSOAgentConstants.SESSION_BEAN_NAME);
if (sessionBean != null && sessionBean.getSAML2SSO() != null) {
String sessionIndex = sessionBean.getSAML2SSO().getSessionIndex();
if (sessionIndex != null) {
Set<HttpSession> sessions = ssoSessionsMap.get(sessionIndex);
if (sessions != null) {
sessions.remove(session);
}
}
}
}
public static Set<HttpSession> invalidateAllSessions(HttpSession session) {
LoggedInSessionBean sessionBean = (LoggedInSessionBean) session.getAttribute(
SSOAgentConstants.SESSION_BEAN_NAME);
Set<HttpSession> sessions = new HashSet<HttpSession>();
if (sessionBean != null && sessionBean.getSAML2SSO() != null) {
String sessionIndex = sessionBean.getSAML2SSO().getSessionIndex();
if (sessionIndex != null) {
sessions = ssoSessionsMap.remove(sessionIndex);
}
}
if (sessions == null) {
sessions = new HashSet<HttpSession>();
}
return sessions;
}
public static Set<HttpSession> invalidateAllSessions(String sessionIndex) {
Set<HttpSession> sessions = ssoSessionsMap.remove(sessionIndex);
if (sessions == null) {
sessions = new HashSet<HttpSession>();
}
return sessions;
}
public static void addAuthenticatedSession(HttpSession session) {
String sessionIndex = ((LoggedInSessionBean) session.getAttribute(
SSOAgentConstants.SESSION_BEAN_NAME)).getSAML2SSO().getSessionIndex();
if (ssoSessionsMap.get(sessionIndex) != null) {
ssoSessionsMap.get(sessionIndex).add(session);
} else {
Set<HttpSession> sessions = new HashSet<HttpSession>();
sessions.add(session);
ssoSessionsMap.put(sessionIndex, sessions);
}
}
}