Jan Lieskovsky
9eb400262f
KEYCLOAK-6055 Include X.509 certificate data in audit logs
...
Signed-off-by: Jan Lieskovsky <jlieskov@redhat.com>
Co-authored-by: mposolda <mposolda@gmail.com>
2019-04-30 11:31:04 +02:00
Sergey Vikulov
996ceb2ce8
Fixed typo in messages of base theme ( #5890 )
2019-04-29 14:40:37 +01:00
mhajas
4fc2870e51
KEYCLOAK-9740 Wrongly set settings for nested maven run
2019-04-29 13:48:05 +02:00
Sebastian Loesch
96250c9685
[KEYCLOAK-9573] Allow AdminEvents for custom resource types
2019-04-26 09:57:28 +01:00
mposolda
39a5978273
KEYCLOAK-5473 X509 Add missing tests for User Identity Sources
2019-04-25 09:11:41 +02:00
Tomas Kyjovsky
6ffe14c8e1
KEYCLOAK-10117 Testsuite module "App Server - EAP" doesn't build with default parameters
2019-04-24 14:29:51 +02:00
mposolda
5b663dbc69
KEYCLOAK-9713 Warning in the log during export/import on current master
2019-04-24 10:56:43 +02:00
Hynek Mlnarik
65326ce16a
KEYCLOAK-9629 Update cookie type
2019-04-24 07:18:41 +01:00
Sebastian Loesch
43393220bf
Add X.509 authenticator option for canonical DN
...
Because the current distinguished name determination is security provider
dependent, a new authenticator option is added to use the canonical format
of the distinguished name, as descriped in
javax.security.auth.x500.X500Principal.getName(String format).
2019-04-23 21:04:18 +02:00
mposolda
7a671052a3
KEYCLOAK-9988 Fix unstable UserSessionPersisterOfflineTest.testExpired. Adding ResetTimeOffsetEvent
2019-04-23 20:58:37 +02:00
mhajas
4272495d24
KEYCLOAK-9748 Refactoring of springBoot tests including addition of how to run docs
2019-04-23 20:43:16 +02:00
mhajas
3f08238c2d
KEYCLOAK-6641 Stabilize SpringBoot tests
2019-04-23 20:43:16 +02:00
Stan Silvert
6806a4c660
KEYCLOAK-7219: Remove keycloak.js from new Account Console
2019-04-22 13:56:08 -03:00
Stan Silvert
e52be73d41
KEYCLOAK-10074: Account Console Performance
2019-04-22 09:47:12 -03:00
Martin Kanis
e5092bb617
KEYCLOAK-10090 Fix alignment for CD 6 release in PNC
2019-04-18 09:13:02 +02:00
keycloak-bot
49d4e935cb
Set version to 7.0.0-SNAPSHOT
2019-04-17 09:48:07 +01:00
Martin Bartos RH
0e2a781bb8
KEYCLOAK-10064 Merge preview features test: AccountRestServiceTest
2019-04-16 14:40:44 +02:00
Martin Bartos RH
a6e53b3f1c
KEYCLOAK-10063 Merge preview features test: ClientTokenExchangeTest
2019-04-16 12:49:54 +02:00
Sebastian Laskawiec
0042726dd8
KEYCLOAK-9601 KEYCLOAK-9602 Jetty 8.1 and 9.1 removal
...
Co-Authored-By: mhajas <mhajas@redhat.com>
2019-04-16 11:21:29 +02:00
vramik
e2d69632e9
KEYCLOAK-10004 refactor fuse adapter tests
2019-04-16 10:11:27 +02:00
moehman
0193e78ff9
KEYCLOAK-10070 Fix typo in account/message_de.properties
2019-04-16 08:39:34 +02:00
Anders Rønning
3f7d32d1ae
KEYCLOAK-10026: Add missing TypeScript definition for init options
2019-04-15 07:46:05 -04:00
Stan Silvert
2736dd9d61
KEYCLOAK-9644: Implement Nav and Headers using PF4 React
2019-04-12 16:15:51 -03:00
mposolda
81a37d3496
KEYCLOAK-7144 Improve admin console label/tooltip around anonymous bind option in LDAP storage provider
2019-04-12 20:23:33 +02:00
mposolda
a8af51c7bb
KEYCLOAK-9988 Fix unstable UserSessionProviderOfflineTest.testExpired
2019-04-12 17:16:53 +02:00
slominskir
4a227ae564
KEYCLOAK-5665 - elytron propagate security domain to ejb
2019-04-12 10:23:56 -03:00
Bekh-Ivanov George
ebcfeb20a3
[KEYCLOAK-10020] - Add ability to request user-managed (ticket) permissions by name
2019-04-12 08:44:57 -03:00
stianst
e7deb77725
Fix NPM dependency to download using https
2019-04-12 08:09:30 +01:00
Pedro Igor
c8970c95d5
[KEYCLOAK-10015] - CIP not properly resolving objects from JSON request body
2019-04-11 18:19:43 -03:00
mhajas
5b47df8979
KEYCLOAK-10013 Do not reject tokens with issuedAt == notBefore
2019-04-11 21:57:11 +02:00
Peter Skopek
92567d5a77
KEYCLOAK-8347 Welcome page test migration clean up
2019-04-11 21:52:52 +02:00
Peter Skopek
3a105cf9e9
KEYCLOAK-8347 migrate Welcome page test to base testsuite
2019-04-11 21:52:52 +02:00
vramik
7638226741
KEYCLOAK-10002 remove microprofile-metrics and microprofile-health extensions in domain mode
2019-04-10 11:04:09 +02:00
slominskir
8dd96d6962
KEYCLOAK - 9923 - add-user-keycloak detect if Java uses modules (JDK 9+)
2019-04-09 17:34:16 -03:00
Hynek Mlnarik
a63efd872d
KEYCLOAK-9822 Fix deadlock in OIDC adapter upon logout
2019-04-09 21:03:02 +02:00
Takashi Norimatsu
9b3e297cd0
KEYCLOAK-9756 PS256 algorithm support for token signing and validation
2019-04-09 20:52:02 +02:00
fisache
b4973ad7b5
[KEYCLOAK-9769] service account can't authorize when group policy exists in resource server
2019-04-09 15:23:50 -03:00
Francesco Degrassi
1bf19ada7e
KEYCLOAK-9825: keep existing refresh token on token exchange requiring refresh if new one not provided in response
2019-04-09 15:21:56 -03:00
vramik
2aeda71e16
KEYCLOAK-6152 fix WAS adapter tests
2019-04-09 19:34:50 +02:00
Pedro Igor
b39cf1c736
[KEYCLOAK-9353] - Final field failing to be set when running quarkus in native mode
2019-04-09 09:49:05 -03:00
Francesco Degrassi
5b78063dce
KEYCLOAK-6614: Support requesting refresh tokens from Google using access_type=offline
2019-04-08 15:06:03 -03:00
Sebastian Laskawiec
2e7f717e50
KEYCLOAK-9536 DB Allocator Plugin
2019-04-08 09:06:19 +02:00
mhajas
ccc8e06f9a
KEYCLOAK-9895 Fix stability of Hawtio EAP6Fuse test
2019-04-08 08:30:31 +02:00
Pedro Igor
ad9f59f9f7
[KEYCLOAK-9353] - Avoids initialization of the policy enforcer during deployment
2019-04-05 16:02:53 -03:00
mposolda
a516a795a2
KEYCLOAK-9836 Deprecate keycloak-servlet-oauth-clien
2019-04-02 10:52:18 -03:00
Stefan Guilhen
2fa2437555
KEYCLOAK-5613 Add built-in optional client scope for MicroProfile-JWT
2019-04-02 08:40:19 -03:00
vramik
5b8b463fc0
KEYCLOAK-9814 ExportImportTest NPE
2019-04-02 13:17:58 +02:00
vramik
35fa4b878b
KEYCLOAK-9712 KEYCLOAK-9911 moved Javascript adater tests and LoginModulesTest outsite of adapter package
2019-03-28 10:08:23 +01:00
Thomas Darimont
5eb9291f37
KEYCLOAK-9574 Fix broken Role Selection for LDAP Mapper in Admin-Console ( #5883 )
...
We now wrap the result of a role-selection in an JS array and
use the config value as is for rendering, instead of extracting
the first component (which was the first char, since the value
is a string).
Previously any mapper that used role selection could not be
used due to `LDAPMapperCreateCtrl` generating invalid config structures.
Since the component configuration is represented via
org.keycloak.representations.idm.ComponentRepresentation whose
`config` property is a `MultivaluedHashMap`
config values needs to be passed as an Array. However the
LDAPMapperCreateCtrl in (users.js) only passed the role as a String.
Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com>
2019-03-27 19:26:03 +01:00
rmartinc
a9a4e9daae
KEYCLOAK-9884: "user-attribute-ldap-mapper" is not propagating the change of "username" (uid) attribute.
2019-03-27 19:07:51 +01:00