Hynek Mlnarik
25c07f78bc
KEYCLOAK-9578 Fix typo in SAML attribute name format
2019-03-19 11:45:38 +01:00
Hynek Mlnarik
1c906c834b
KEYCLOAK-3373 Remove SAML IdP descriptor from client installation and publicize it in realm endpoint instead
2019-03-19 11:37:15 +01:00
fisache
a868b8b22a
[KEYCLOAK-9772] Permissions are duplicated
...
- when resource server is current user
2019-03-18 16:37:54 -03:00
vramik
5808ad2de0
KEYCLOAK-9708 Enable SmallRye Health and Metrics extensions
2019-03-18 10:57:28 +01:00
stianst
8d42c9193b
KEYCLOAK-9838 Trim username in admin welcome page
2019-03-18 09:20:38 +01:00
vramik
3cc405b1c5
KEYCLOAK-8542 Remove resteasy workaround - KeycloakStringEntityFilter
2019-03-16 13:53:54 +01:00
mposolda
a48698caa3
KEYCLOAK-6056 Map user by Subject Alternative Name (otherName) when authenticating user with X509
2019-03-15 23:11:47 +01:00
vramik
cf35a4648b
KEYCLOAK-9780 Replace XSLT transformations by ant/CLI scripts
2019-03-15 22:18:09 +01:00
vramik
d7313d91e5
KEYCLOAK-9709 Upgrade to Wildfly 16
2019-03-15 22:18:09 +01:00
Grzegorz Grzybek
79c4d797db
KEYCLOAK-9646 Fix itests for Fuse 7.3
...
Co-Authored-By: Hynek Mlnarik <hmlnarik@redhat.com>
2019-03-15 12:58:17 +01:00
mposolda
c5073e14f1
KEYCLOAK-8380 KEYCLOAK-8382 Cleanup some unneeded/obsolete/duplicated classes
2019-03-15 11:13:23 +01:00
Yaser Abouelenein
404ac1d050
KEYCLOAK-8701 changes needed to include x5c property in jwks
2019-03-15 06:01:15 +01:00
Axel Messinese
e18fb56389
KEYCLOAK-4978 Add endpoint to get groups by role
2019-03-15 06:00:17 +01:00
Martin Bartos RH
a3c175a21e
KEYCLOAK-9348 UserStorageConsentTest fails with some databases
2019-03-15 05:58:59 +01:00
Martin Bartos RH
d0b7700c04
KEYCLOAK-8379 Migrate ModelClass: AuthenticationSessionProviderTest
2019-03-15 05:58:19 +01:00
Pedro Igor
93965512c5
[KEYCLOAK-8522] - Migrate broker tests from old to new testsuite
2019-03-15 05:57:24 +01:00
rmartinc
2602c222cd
KEYCLOAK-4640: LDAP memberships are being replaced instead of being added or deleted
2019-03-14 18:40:15 +01:00
Sebastian Laskawiec
996389d61b
KEYCLOAK-9512 Run x509 tests by default
2019-03-14 15:38:14 +01:00
Grzegorz Grzybek
e01562d7cf
[KEYCLOAK-9646] Increase import range for javax.servlet API to cover EAP 7.2, servlet-api 4.0
...
[KEYCLOAK-9646] Update HOW-TO-RUN.md for Fuse 7.1+ instructions
2019-03-12 15:14:34 +01:00
Denis
e271542fcc
KEYCLOAK-9777 - Missing api-docs in PNC builds
2019-03-11 08:21:22 +01:00
Corey McGregor
be77fd9459
KEYCLOAK-2339 Adding impersonator details to user session notes and supporting built-in protocol mappers.
2019-03-08 09:14:42 +01:00
rmartinc
231db059b2
KEYCLOAK-8996: Provide a way to set a responder certificate in OCSP/X509 Authenticator
2019-03-07 07:57:20 +01:00
keycloak-bot
e843d84f6e
Set version to 6.0.0-SNAPSHOT
2019-03-06 15:54:08 +01:00
stianst
7ad02e7318
Fixes for releasing
2019-03-06 11:38:09 +01:00
mhajas
8a750c7fca
KEYCLOAK-6750 Adapt Tomcat adapter tests to new structure
2019-03-06 08:57:46 +01:00
Denis
4cde8d8534
KEYCLOAK-9686 - Compilation error in PNC for Keycloak 5.x
2019-03-06 08:36:33 +01:00
sebastienblanc
c2d5bbc662
KEYCLOAK-6979 : adding springboot tests app to parent pom
2019-03-06 08:11:46 +01:00
Sebastian Laskawiec
406097a508
KEYCLOAK-6749 Jetty App Server
2019-03-05 15:21:48 +01:00
vramik
2e7eb92f43
KEYCLOAK-8699 replace hostnames with nip.io ones to include cors tests by default
2019-03-05 12:00:01 +01:00
stianst
15478c83e4
Added release script
2019-03-05 11:45:08 +01:00
Martin Bartos RH
bec5d676e7
[KEYCLOAK-7907] Migrate model package from old testsuite
2019-03-05 09:39:17 +01:00
vramik
845275ef0f
KEYCLOAK-9624 support for legacy driver for migration tests
2019-03-05 09:30:31 +01:00
Michael Parker
7bd1f32eb1
KEYCLOAK-9077 Adds support for SAML SessionNotOnOrAfter attribute in response xml serialization
2019-03-05 09:05:41 +01:00
stianst
653a08885d
Added get-version script
2019-03-05 08:42:14 +01:00
stianst
c52c4fec23
KEYCLOAK-9720 Move bower/npm packaging from keycloak/keycloak-js-bower repository
2019-03-05 08:15:05 +01:00
mposolda
89d0c51e13
KEYCLOAK-3159 Migrate federation package from old testsuite
2019-03-04 13:37:12 +01:00
Gilles
f295a2e303
[KEYCLOAK-3723] Fixed updated of protocol mappers within client updates in clients-registrations resource
2019-03-04 11:57:59 +01:00
mposolda
d5b28013d1
KEYCLOAK-8523 Remove jaxrs package from old testsuite and deprecate jaxrs filter
2019-03-04 10:25:01 +01:00
Pedro Igor
6aa9096361
[KEYCLOAK-9451] - Policy evaluation fails when not evaluated against a particual resource
2019-02-28 10:38:09 -03:00
vramik
fab52ebc51
KEYCLOAK-9611 Add support to the testsuite for migration from 4.8.3.Final
2019-02-28 13:53:30 +01:00
Pedro Igor
75d9847672
[KEYCLOAK-9478] - Support multiple CIP providers in the policy enforcer configuration
2019-02-27 19:08:57 -03:00
Pedro Igor
bacc1b538f
[KEYCLOAK-8855] - Tests
2019-02-27 15:39:32 -03:00
sakanaou
007c364027
Store rewritten redirect URL in adapter-core
2019-02-27 15:39:32 -03:00
Philipp Nowak
39828b2c94
[KEYCLOAK-9539] Race condition SecurityContextHolder.setAuthentication()
...
This is an issue with the Spring Security Keycloak Adapter relating to
the way the Authentication is stored in the SecurityContext, causing a
race condition in application code using that. It does not seem to
affect actual Spring Security operation.
We had a pretty strange race condition in our application. When many
requests were incoming at the same time, occasionally the old
unauthenticated Authentication provided to
KeycloakAuthenticationProvider for performing the actual authentication
would stay the current authentication, as returned by
SecurityContextHolder.getContext().getAuthentication(). That resulted
in authenticated users' JavaScript requests occasionally (~1/50 given a
large request volume) returning a 403 because the 'old' token was still
in the context, causing Spring Security to see them as unauthenticated.
This PR resolves this issue by replacing the whole context, as suggested
by a Spring Security contributor in jzheaux/spring-security-oauth2-resource-server#48 . By default,
SecurityContextHolder keeps the actual context object in a ThreadLocal,
which should be safe from race-conditions. The actual Authentication
object, however, is kept in a mere field, hence the reason for this PR.
JIRA issue: https://issues.jboss.org/browse/KEYCLOAK-9539
2019-02-27 14:58:10 -03:00
Stefan Guilhen
9c34cc7365
[KEYCLOAK-9371] Fix premature termination of sessions when remember-me is in use
2019-02-27 15:08:50 +01:00
vramik
5d205d16e8
KEYCLOAK-9167 Using kcadm to update an identity-provider instance via a json file does not work without an "internalId" present in the json
2019-02-27 14:56:36 +01:00
Tomas Kyjovsky
49a86865cf
KEYCLOAK-8869 JStat monitoring for performance tests
2019-02-27 11:17:39 +01:00
mposolda
362faf3adb
KEYCLOAK-6627 Closing admin clients and testing clients in testsuite
2019-02-27 08:57:42 +01:00
Tomas Kyjovsky
195aeaca68
KEYCLOAK-9000 Update stress-testing script
2019-02-26 16:38:40 +01:00
Lars Wilhelmsen
9b1ab0f992
KEYCLOAK-9116: Fixes JWK serialization of ECDSA public key coordinates.
...
Signed-off-by: Lars Wilhelmsen <lars@sral.org>
2019-02-25 09:53:09 -03:00