Martin Bartoš
124591ce1a
Adapters can still use Java EE
...
- Provided all JavaEE dependencies for adapters
- Automatically build Undertow Jakarta EE for testsuite (missing SAML)
---
Quarkus3 branch sync no. 11 (24.3.2023)
Resolved conflicts:
keycloak/adapters/oidc/spring-security/pom.xml - Modified
---
Quarkus3 branch sync no. 7 (27.2.2023)
Resolved conflicts:
keycloak/pom.xml - Modified
---
Quarkus3 branch sync no. 5 (10.2.2023)
Resolved conflicts:
keycloak/testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/pom.xml - Modified
---
Quarkus3 branch sync no. 1 (18.1.2023)
Resolved conflicts:
keycloak/testsuite/integration-arquillian/tests/base/pom.xml - Modified
2023-04-27 13:36:54 +02:00
Martin Bartoš
7cff857238
Migrate packages from javax.* to jakarta.*
...
---
Quarkus3 branch sync no. 14 (24.4.2023)
Resolved conflicts:
keycloak/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/federation/storage/ComponentExportImportTest.java - Modified
keycloak/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/DeclarativeUserTest.java - Modified
keycloak/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/federation/storage/FederatedStorageExportImportTest.java - Modified
keycloak/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/authentication/FlowTest.java - Modified
keycloak/services/src/main/java/org/keycloak/services/resources/admin/UserResource.java - Modified
---
Quarkus3 branch sync no. 13 (11.4.2023)
Resolved conflicts:
keycloak/testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/pages/AccountTotpPage.java - Deleted
keycloak/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/federation/storage/BackwardsCompatibilityUserStorageTest.java - Modified
---
Quarkus3 branch sync no. 12 (31.3.2023)
Resolved conflicts:
keycloak/quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/services/resources/QuarkusWelcomeResource.java - Modified
keycloak/services/src/main/java/org/keycloak/protocol/saml/profile/util/Soap.java - Modified
keycloak/testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/util/UserInfoClientUtil.java - Modified
keycloak/services/src/main/java/org/keycloak/protocol/oidc/endpoints/UserInfoEndpoint.java - Modified
keycloak/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/sessionlimits/UserSessionLimitsTest.java - Modified
---
Quarkus3 branch sync no. 10 (17.3.2023)
Resolved conflicts:
keycloak/services/src/main/java/org/keycloak/protocol/saml/SamlProtocolUtils.java - Modified
---
Quarkus3 branch sync no. 9 (10.3.2023)
Resolved conflicts:
keycloak/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/federation/kerberos/AbstractKerberosSingleRealmTest.java - Modified
keycloak/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/LoginTest.java - Modified
---
Quarkus3 branch sync no. 8 (3.3.2023)
Resolved conflicts:
keycloak/testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/util/SamlClient.java Modified - Modified
keycloak/services/src/main/java/org/keycloak/protocol/saml/SamlProtocol.java - Modified
keycloak/examples/providers/authenticator/src/main/java/org/keycloak/examples/authenticator/SecretQuestionAuthenticator.java - Modified
---
Quarkus3 branch sync no. 6 (17.2.2023)
Resolved conflicts:
keycloak/integration/admin-client/src/main/java/org/keycloak/admin/client/resource/ComponentsResource.java - Modified
keycloak/testsuite/utils/src/main/java/org/keycloak/testsuite/KeycloakServer.java - Modified
keycloak/services/src/main/java/org/keycloak/protocol/saml/installation/SamlSPDescriptorClientInstallation.java - Modified
---
Quarkus3 branch sync no. 5 (10.2.2023)
Resolved conflicts:
/keycloak/services/src/main/java/org/keycloak/social/google/GoogleIdentityProvider.java Modified - Modified
keycloak/services/src/main/java/org/keycloak/social/twitter/TwitterIdentityProvider.java - Modified
---
Quarkus3 branch sync no. 4 (3.2.2023)
Resolved conflicts:
keycloak/quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/integration/jaxrs/QuarkusKeycloakApplication.java - Modified
---
Quarkus3 branch sync no. 1 (18.1.2023)
Resolved conflicts:
keycloak/testsuite/client/ClientPoliciesTest.java - Deleted
keycloak/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/client/ClientRegistrationTest.java - Modified
keycloak/model/map-jpa/src/main/java/org/keycloak/models/map/storage/jpa/JpaModelCriteriaBuilder.java - Modified
2023-04-27 13:36:54 +02:00
David Weber
6f86241f60
KEYCLOAK-17665 Use setQueryString
...
Co-authored-by: Michal Hajas <mhajas@redhat.com>
2021-04-22 12:18:09 -03:00
David Weber
5d3f80ab57
KEYCLOAK-17665 Add query parameter support for Spring
2021-04-22 12:18:09 -03:00
Pedro Igor
84d099e48f
[KEYCLOAK-11282] - Properly resolve config resolver
...
Co-authored-by: mhajas <mhajas@redhat.com>
2020-03-17 15:49:00 +01:00
Pedro Igor
e316e2a2f0
[KEYCLOAK-8616] - Process requests only if a deployment can be resolved
2019-12-20 13:33:12 +01:00
scranen
2d3f771b70
Cookie token store not working in Spring Security adapter
...
Co-authored-by: scranen <scranen@gmail.com>
Co-authored-by: rainerfrey <frey.rainer@gmail.com>
Co-authored-by: pedroigor <pigor.craveiro@gmail.com>
2019-11-13 16:54:45 +01:00
Leonid Rozenblyum
a4edb083c3
KEYCLOAK-6752, KEYCLOAK-6565
...
Fixed missing deployment after deserialization.
Other adapters already have logic for filling in deployment when it's
missing in the context, Spring Security adapter lacked that feature.
The solution is based on an attachment
https://issues.jboss.org/secure/attachment/12431091/FixKeycloakSecurityContextRequestFilter.java
from https://issues.jboss.org/browse/KEYCLOAK-6565
2019-11-08 11:51:27 -03:00
Peter Skopek
d0386dab85
KEYCLOAK-8785 remove k_version endpoint ( #6428 )
2019-11-05 11:35:55 +01:00
Leonid Rozenblyum
61561968ed
KEYCLOAK-10266 Allows proper handling of Single Sign Out events.
...
It was incorrectly relying on web application listeners on session
destruction.
While it's used as a Spring Bean (declared in
KeycloakWebSecurityConfigurerAdapter) so it has to use Spring-based
facility.
See also https://lists.jboss.org/pipermail/keycloak-user/2016-March/005479.html
2019-10-30 15:47:45 +01:00
Valeran86
b0d0d3e579
[KEYCLOAK-10849] - KeycloakRole equals only with itself
...
I use Keycloak Spring Adapter (KSA) to secure existing application. Today I realized that some functions didn't work anymore because of security checking like this:
```
GrantedAuthority adminRole = new MySpecialGrantedAuthority( "superadmin" );
for ( GrantedAuthority role : userRoles ) {
if ( role.equals( adminRole ) ) {
return true;
}
}
```
In this example, when I use KSA authorization fails.
I believe, that more preferable in `KeycloakRole` use this implementation of `equals` method.
2019-08-16 05:20:03 -03:00
Pedro Igor
9215957bd0
Revert "KeycloakRole equals only with itself"
...
This reverts commit 2899375614
.
2019-07-09 09:05:20 -03:00
Valeran86
2899375614
KeycloakRole equals only with itself
...
I use Keycloak Spring Adapter (KSA) to secure existing application. Today I realized that some functions didn't work anymore because of security checking like this:
```
GrantedAuthority adminRole = new MySpecialGrantedAuthority( "superadmin" );
for ( GrantedAuthority role : userRoles ) {
if ( role.equals( adminRole ) ) {
return true;
}
}
```
In this example, when I use KSA authorization fails.
I believe, that more preferable in `KeycloakRole` use this implementation of `equals` method.
2019-07-08 14:33:03 -03:00
Philipp Nowak
39828b2c94
[KEYCLOAK-9539] Race condition SecurityContextHolder.setAuthentication()
...
This is an issue with the Spring Security Keycloak Adapter relating to
the way the Authentication is stored in the SecurityContext, causing a
race condition in application code using that. It does not seem to
affect actual Spring Security operation.
We had a pretty strange race condition in our application. When many
requests were incoming at the same time, occasionally the old
unauthenticated Authentication provided to
KeycloakAuthenticationProvider for performing the actual authentication
would stay the current authentication, as returned by
SecurityContextHolder.getContext().getAuthentication(). That resulted
in authenticated users' JavaScript requests occasionally (~1/50 given a
large request volume) returning a 403 because the 'old' token was still
in the context, causing Spring Security to see them as unauthenticated.
This PR resolves this issue by replacing the whole context, as suggested
by a Spring Security contributor in jzheaux/spring-security-oauth2-resource-server#48 . By default,
SecurityContextHolder keeps the actual context object in a ThreadLocal,
which should be safe from race-conditions. The actual Authentication
object, however, is kept in a mere field, hence the reason for this PR.
JIRA issue: https://issues.jboss.org/browse/KEYCLOAK-9539
2019-02-27 14:58:10 -03:00
Pedro Igor
234b7a06a1
[KEYCLOAK-7798] - Spring security adapter does not renew expired tokens
2018-11-06 10:26:40 -02:00
Frank Schmager
6b59c2f44c
try to register node during authentication attempt in filter
...
* PreAuthActionsFilter registers deployment during authentication attempt to enable, well,
node registration if filter is used by itself (if no securityConstraints when using spring boot and spring security)
* deregistering node during clean shutdown
* added unit test
2018-10-09 10:30:37 -03:00
Pedro Igor
6fd4a02f95
[KEYCLOAK-8444] - Error when producing KeycloakSpringBootConfigResolver from spring security configuration
2018-10-08 09:29:59 -03:00
Frank Schmager
3e2e0ac91c
Renamed factory and java doc
2018-08-22 16:39:55 +02:00
Frank Schmager
dda365e002
initial exposing of BasicAuthRequestAuthenticator to make extensible
2018-08-22 16:39:55 +02:00
Pedro Igor
7c14a6a503
[KEYCLOAK-6547] - AuthenticatedActionsHandler should process responses after identity is established
2018-07-19 10:05:04 -03:00
Pedro Igor
55550f2023
[KEYCLOAK-6547] - AuthenticatedActionsHandler should process responses after identity is established
2018-07-11 11:33:31 -03:00
pedroigor
b249a48dcf
[KEYCLOAK-7147] - Support obtaining a buffered input stream in HttpFacade.Request
2018-04-25 10:16:41 -03:00
pedroigor
3559c5dc3c
[KEYCLOAK-6878] - Always refresh token option not working for invalid tokens
2018-03-21 10:01:02 -03:00
Pedro Igor
f48509c32c
Merge pull request #4741 from pedroigor/KEYCLOAK-2517
...
[KEYCLOAK-2517] - Doesn't work always refresh token
2017-11-28 20:58:56 -02:00
Thomas Kuestermann
bb900f9db8
KEYCLOAK-5753 fixed NPE thrown when using custom RequestMatcher
2017-11-27 09:55:32 +01:00
pedroigor
819a60932e
[KEYCLOAK-2517] - Doesn't work always refresh token
2017-11-24 23:40:29 -02:00
Thomas Recloux
04ad634986
Add configuration for KeycloakAuthenticatedActionsFilter
...
Fixes KEYCLOAK-5227
2017-11-10 10:44:12 +01:00
Bartłomiej Piech
d4b9c3c014
KEYCLOAK-5679
2017-11-10 10:42:26 +01:00
Gabriel Lavoie
e2f5ac60cf
KEYCLOAK-5499: Use authentication token type rather than token source detection to identify interactive and non-interactive authentications. ( #4488 )
...
- access_token URL parameter wasn't interpreted correctly as a non-interactive authentication.
2017-10-16 09:38:05 +02:00
Sjoerd Cranen
cb43e3d763
KEYCLOAK-5191 Prevent exception in KeycloakAuthenticationFailureHandler ( #4319 )
...
* KEYCLOAK-5191 Don't attempt to send 401 when response is already committed
* KEYCLOAK-5191 Defend against configuration errors by preventing 2xx response after authentication failure
2017-10-16 09:34:58 +02:00
sebastienblanc
aaac85e541
add new flag to determine if error response must be sent or not
2017-09-05 15:08:17 +02:00
Thomas Recloux
69fa9de4d8
Fix KEYCLOAK-3471 ClassCastException
2017-07-23 21:49:16 +02:00
Stian Thorgersen
8e36a52f1e
Merge pull request #4227 from sebastienblanc/KEYCLOAK-3492-rebased
...
KEYCLOAK-3492 : Changing request matcher to attempt auth on /sso/login or Auhtorizati…
2017-06-21 08:51:09 +02:00
Hendrik Ebbers
0ac92c4bfa
new line in doc
2017-06-15 13:01:05 +02:00
Hendrik Ebbers
98a5c57e65
Author added
2017-06-15 13:00:24 +02:00
emilienbondu
91585f8563
Changing request matcher to attempt auth on /sso/login or Auhtorization header
...
Add default login URL.
Throwing exception if login fails to enable auth entry point
Adding a test for invalid token and bearer-only
handle redirect correctly
2017-06-14 14:41:35 +02:00
Hendrik Ebbers
7d017b4edf
Easy Spring security annotation
2017-06-01 12:05:02 +02:00
emilienbondu
3580dea399
Fix https://issues.jboss.org/browse/KEYCLOAK-3492
2017-05-22 10:18:22 +02:00
Pedro Igor
13e92cdb35
[KEYCLOAK-3261] - Properly handle apps deployed at the ROOT context
2017-01-23 21:27:43 -02:00
Bill Burke
e3d0f8f6e5
Merge pull request #3548 from sebastienblanc/KEYCLOAK-3725
...
KEYCLOAK-3725: return Unauthorized when accessing bearer only in inte…
2016-12-03 13:46:52 -05:00
Stian Thorgersen
ba406d5747
Merge pull request #3332 from ebondu/master
...
fix bug https://issues.jboss.org/browse/KEYCLOAK-3474
2016-12-01 07:51:07 +01:00
sebastienblanc
df93244373
keep orignal API
2016-11-26 09:30:27 +01:00
sebastienblanc
0f447fadd4
KEYCLOAK-3725: return Unauthorized when accessing bearer only in interactive mode
2016-11-25 11:59:52 +01:00
Thomas Raehalme
e8ce9704c1
isBearerTokenRequest and isBasicAuthRequest is now case-insensitive.
2016-10-19 19:41:59 +03:00
emilienbondu
0d3a50411e
Move licence at the top of the file.
2016-10-19 09:57:07 +02:00
emilienbondu
3bed84d712
fix bug https://issues.jboss.org/browse/KEYCLOAK-3474
2016-10-17 14:42:46 +02:00
Bill Burke
8967ca4066
refactor mongo entities, optimize imports
2016-09-28 15:25:39 -04:00
didiez
df3079852e
Prevent clearing all registered sessions when invalidating some by sessionId
2016-09-08 09:19:30 +02:00
Stian Thorgersen
c7a8742a36
KEYCLOAK-1524
...
Source code headers
2016-02-03 11:20:22 +01:00
Bill Burke
fedf3d0e52
KEYCLOAK-2377
2016-01-22 17:00:51 -05:00