Commit graph

21873 commits

Author SHA1 Message Date
Thomas Darimont
1a7aeb9b20 KEYCLOAK-8249 Improve extraction of Bearer tokens from Authorization headers (#6624)
We now provide a simple way to extract the Bearer token string from
Authorization header with a null fallback.

This allows us to have more fine grained error handling for the
various endpoints.
2020-01-06 13:58:52 +01:00
mhajas
28b01bc34d KEYCLOAK-12609 Fix integer overflow for SAML XMLTimeUtil add method parameters 2020-01-06 13:53:16 +01:00
Yoshiyuki Tabata
e96725127f KEYCLOAK-12165 Fix UserSessionProviderTest to work correctly (#6513) 2020-01-02 17:57:14 +01:00
mposolda
04737bd0df KEYCLOAK-12278 Default first broker login flow is broken after migration 2020-01-02 17:55:28 +01:00
Marek Posolda
fa453e9c0c
KEYCLOAK-12278 Default first broker login flow is broken after migration (#6556) 2020-01-02 17:53:56 +01:00
Pedro Igor
56d53b191a [KEYCLOAK-8779] - Fixing PartialImportTest 2019-12-28 06:24:19 -03:00
rmartinc
401d36b446 KEYCLOAK-8779: Partial export and import to an existing realm is breaking clients with service accounts 2019-12-27 15:59:38 -03:00
Michael Thirion
44ab3f46b7 [KEYCLOAK-6008] - Spring Boot does not honour wildcard auth-role (#6579) 2019-12-24 19:06:55 -03:00
Asbjørn Dyhrberg Thegler
1162455f32 KEYCLOAK-10894 Adds a ready indicating promise
This is non-intrusive and backwards compatible. With this change it is possible
to `await keycloakAuthorization.ready` to make sure the component has been
properly initialized.
2019-12-24 18:33:20 -03:00
Thomas Darimont
0219d62f09 KEYCLOAK-6867 UserInfoEndpoint should return WWW-Authenticate header for Invalid tokens
As required by the OIDC spec (1) we now return a proper WWW-Authenticate
response header if the given token is invalid.

1) https://openid.net/specs/openid-connect-core-1_0.html#UserInfoError
2019-12-23 07:42:06 -03:00
Andrei Arlou
23b794aa51 KEYCLOAK-12313 Remove unused method from org.keycloak.saml.common.util.DocumentUtil 2019-12-20 15:03:42 +01:00
Pedro Igor
e316e2a2f0 [KEYCLOAK-8616] - Process requests only if a deployment can be resolved 2019-12-20 13:33:12 +01:00
Andrei Arlou
eed4847469 KEYCLOAK-12311 Fix minor warnings with collections in packages: forms, keys, partialimport, protocol from module "services" 2019-12-20 13:31:38 +01:00
stianst
95741c2528 KEYCLOAK-12584 Fix link to user-credentials 2019-12-20 11:26:19 +01:00
stianst
d65a6bd18f KEYCLOAK-9647 Fix header for script authenticator 2019-12-20 10:46:00 +01:00
stianst
78c71b782c KEYCLOAK-12582 Fixes for product 2019-12-20 09:44:35 +01:00
Philipp Nanz
7409f6991f KEYCLOAK-12166 Argument 'customJacksonProvider' not being passed on 2019-12-20 09:06:55 +01:00
Hynek Mlnarik
9194cbe2c4 KEYCLOAK-12535 Fix broken links 2019-12-20 08:09:48 +01:00
Peter Skopek
7a14661fce KEYCLOAK-6115 Login fails if federated user is read-only and has selected a locale on the login screen 2019-12-19 14:36:50 +01:00
Pedro Igor
946088d48d [KEYCLOAK-12109] - Resolving authz discovery url using KeycloakUriBuilder 2019-12-19 14:18:21 +01:00
Pedro Igor
3bd193acd7 [KEYCLOAK-12412] - Policy enforcer should consider charset when comparing the content-type of the request 2019-12-19 14:14:33 +01:00
Andrei Arlou
aceb123242 KEYCLOAK-12417 Fix minor warnings in tests from module "services" 2019-12-19 10:51:37 +01:00
Andrei Arlou
697eaa4f36 KEYCLOAK-12309 Fix warnings with collections in packages:
authentification, authorization, broker, email, events, exportimport from module "services"
2019-12-18 14:02:27 +01:00
Tero Saarni
1ac76fde59 KEYCLOAK-12242 KEYCLOAK-12280
(cherry picked from commit 6f47d7fc2ccab4f31e373774c983501e83dffa4b)
2019-12-18 13:29:21 +01:00
Andrei Arlou
bb156fb2fd KEYCLOAK-12317 Fix minor warnings with modificators in packages: authentication, authorization, keys, partialimport, protocol from module "services" 2019-12-18 13:26:27 +01:00
Andrei Arlou
c61cc1a493 KEYCLOAK-12316 Simplify conditions in packages: authentication, broker, credential, protocol from module "services" 2019-12-18 13:22:36 +01:00
vramik
8be3ccf885 KEYCLOAK-12473 Add possibility to specify length of event detail when storing to database 2019-12-18 11:57:41 +01:00
Stefan Guilhen
2297644ee4 [KEYCLOAK-11707] Add documentation for the Elytron Credential Store provider 2019-12-18 11:54:08 +01:00
Stefan Guilhen
9f69386a53 [KEYCLOAK-11707] Add support for Elytron credential store vault
- Adds the elytron-cs-keystore provider that reads secrets from a keystore-backed elytron credential store
 - Introduces an abstract provider and factory that unifies code that is common to the existing implementations
 - Introduces a VaultKeyResolver interface to allow the creation of different algorithms to combine the realm
   and key names when constructing the vault entry id
 - Introduces a keyResolvers property to the existing implementation via superclass that allows for the
   configuration of one or more VaultKeyResolvers, creating a fallback mechanism in which different key formats
   are tried in the order they were declared when retrieving a secret from the vault
 - Adds more tests for the files-plaintext provider using the new key resolvers
 - Adds a VaultTestExecutionDecider to skip the elytron-cs-keystore tests when running in Undertow. This is
   needed because the new provider is available only as a Wildfly extension
2019-12-18 11:54:06 +01:00
harture
26458125cb [KEYCLOAK-12254] Fix re-evaluation of conditional flow (#6558) 2019-12-18 08:45:11 +01:00
Douglas Palmer
106e6e15a9 [KEYCLOAK-11859] Added option to always display a client in the accounts console 2019-12-17 17:12:49 -03:00
Bruno Oliveira da Silva
caf08da2af [KEYCLOAK-10962] Application screen for the new account console 2019-12-17 17:09:45 -03:00
vramik
c3d80651bf KEYCLOAK-12473 Add possibility to specify length of event detail when storing to database 2019-12-17 17:15:50 +01:00
stianst
454ac3f415 KEYCLOAK-9322 Exclude non-Keycloak packages from JavaDoc 2019-12-17 11:51:55 -03:00
jacac
3ae508e1b9 KEYCLOAK-12425 Encode userid with Base64Url. (#6585) 2019-12-16 20:40:27 +01:00
vmuzikar
4c17fa8664 KEYCLOAK-12104 UI tests for Linked Accounts Page 2019-12-16 16:06:03 -03:00
Stan Silvert
8efe89135e KEYCLOAK-8181: Implement spinner 2019-12-16 14:55:00 -03:00
vmuzikar
4f7b56d227 KEYCLOAK-12106 UI tests for Device Activity page 2019-12-16 14:26:58 -03:00
Erik Jan de Wit
fb999d96a5 reverted 2019-12-13 15:22:32 -05:00
Erik Jan de Wit
9cfb22f176 added redirectUri to go back where the user was 2019-12-13 15:22:32 -05:00
Erik Jan de Wit
af0f43b769 KEYCLOAK-11496 detect session timeout 2019-12-13 15:22:32 -05:00
Tomas Kyjovsky
3eedcdb154 KEYCLOAK-12430 Compilation error in examples/providers/authenticator module (#6583) 2019-12-12 21:55:08 +01:00
Douglas Palmer
af0594b58d [KEYCLOAK-12463] Fixed missing consents 2019-12-12 17:27:54 -03:00
Stef van der Wel
118b413152 KEYCLOAK-12315 Fixed rendering resources template without baseUri. 2019-12-11 16:52:39 -03:00
Douglas Palmer
f9fa5b551d [KEYCLOAK-5628] Added application endpoint 2019-12-11 13:06:04 -03:00
Cas Eliëns
66f5d1259f Fix typo 2019-12-11 16:18:59 +01:00
Martin Bartoš
2cf6483cdf [KEYCLOAK-12044] Fix messages in the UsernameForm (#6548) 2019-12-11 10:59:46 +01:00
Pedro Igor
05493371ca [KEYCLOAK-11336] - Fixing error in kc.sh 2019-12-11 10:38:31 +01:00
Thomas Darimont
6591bdcdf5 KEYCLOAK-12436 Fixes NPE in QuarkusCacheManagerProvider when default settings are used
org.keycloak.provider.quarkus.QuarkusCacheManagerProvider#loadDefaultConfiguration
fails with an NPE (while trying to unbox null into a boolean) if the current
config does not contain "clustered". This happens when quarkus:dev mode is used
without parameters.
2019-12-10 19:34:41 -03:00
mposolda
0f3e0f4d4e KEYCLOAK-12432 Compilation error in latest master in LDAPHardcodedAttributeTest 2019-12-10 18:01:11 -03:00