vramik
419d9c6351
KEYCLOAK-11597 Remote testing changes + possibility to exclude tests for specific auth server
...
Co-Authored-By: <mhajas@redhat.com>
2020-01-06 14:29:36 +01:00
Thomas Darimont
1a7aeb9b20
KEYCLOAK-8249 Improve extraction of Bearer tokens from Authorization headers ( #6624 )
...
We now provide a simple way to extract the Bearer token string from
Authorization header with a null fallback.
This allows us to have more fine grained error handling for the
various endpoints.
2020-01-06 13:58:52 +01:00
mhajas
28b01bc34d
KEYCLOAK-12609 Fix integer overflow for SAML XMLTimeUtil add method parameters
2020-01-06 13:53:16 +01:00
Yoshiyuki Tabata
e96725127f
KEYCLOAK-12165 Fix UserSessionProviderTest to work correctly ( #6513 )
2020-01-02 17:57:14 +01:00
Marek Posolda
fa453e9c0c
KEYCLOAK-12278 Default first broker login flow is broken after migration ( #6556 )
2020-01-02 17:53:56 +01:00
Pedro Igor
56d53b191a
[KEYCLOAK-8779] - Fixing PartialImportTest
2019-12-28 06:24:19 -03:00
rmartinc
401d36b446
KEYCLOAK-8779: Partial export and import to an existing realm is breaking clients with service accounts
2019-12-27 15:59:38 -03:00
Michael Thirion
44ab3f46b7
[KEYCLOAK-6008] - Spring Boot does not honour wildcard auth-role ( #6579 )
2019-12-24 19:06:55 -03:00
Asbjørn Dyhrberg Thegler
1162455f32
KEYCLOAK-10894 Adds a ready indicating promise
...
This is non-intrusive and backwards compatible. With this change it is possible
to `await keycloakAuthorization.ready` to make sure the component has been
properly initialized.
2019-12-24 18:33:20 -03:00
Thomas Darimont
0219d62f09
KEYCLOAK-6867 UserInfoEndpoint should return WWW-Authenticate header for Invalid tokens
...
As required by the OIDC spec (1) we now return a proper WWW-Authenticate
response header if the given token is invalid.
1) https://openid.net/specs/openid-connect-core-1_0.html#UserInfoError
2019-12-23 07:42:06 -03:00
Andrei Arlou
23b794aa51
KEYCLOAK-12313 Remove unused method from org.keycloak.saml.common.util.DocumentUtil
2019-12-20 15:03:42 +01:00
Pedro Igor
e316e2a2f0
[KEYCLOAK-8616] - Process requests only if a deployment can be resolved
2019-12-20 13:33:12 +01:00
Andrei Arlou
eed4847469
KEYCLOAK-12311 Fix minor warnings with collections in packages: forms, keys, partialimport, protocol from module "services"
2019-12-20 13:31:38 +01:00
Philipp Nanz
7409f6991f
KEYCLOAK-12166 Argument 'customJacksonProvider' not being passed on
2019-12-20 09:06:55 +01:00
Peter Skopek
7a14661fce
KEYCLOAK-6115 Login fails if federated user is read-only and has selected a locale on the login screen
2019-12-19 14:36:50 +01:00
Pedro Igor
946088d48d
[KEYCLOAK-12109] - Resolving authz discovery url using KeycloakUriBuilder
2019-12-19 14:18:21 +01:00
Pedro Igor
3bd193acd7
[KEYCLOAK-12412] - Policy enforcer should consider charset when comparing the content-type of the request
2019-12-19 14:14:33 +01:00
Andrei Arlou
aceb123242
KEYCLOAK-12417 Fix minor warnings in tests from module "services"
2019-12-19 10:51:37 +01:00
Andrei Arlou
697eaa4f36
KEYCLOAK-12309 Fix warnings with collections in packages:
...
authentification, authorization, broker, email, events, exportimport from module "services"
2019-12-18 14:02:27 +01:00
Tero Saarni
1ac76fde59
KEYCLOAK-12242 KEYCLOAK-12280
...
(cherry picked from commit 6f47d7fc2ccab4f31e373774c983501e83dffa4b)
2019-12-18 13:29:21 +01:00
Andrei Arlou
bb156fb2fd
KEYCLOAK-12317 Fix minor warnings with modificators in packages: authentication, authorization, keys, partialimport, protocol from module "services"
2019-12-18 13:26:27 +01:00
Andrei Arlou
c61cc1a493
KEYCLOAK-12316 Simplify conditions in packages: authentication, broker, credential, protocol from module "services"
2019-12-18 13:22:36 +01:00
Stefan Guilhen
9f69386a53
[KEYCLOAK-11707] Add support for Elytron credential store vault
...
- Adds the elytron-cs-keystore provider that reads secrets from a keystore-backed elytron credential store
- Introduces an abstract provider and factory that unifies code that is common to the existing implementations
- Introduces a VaultKeyResolver interface to allow the creation of different algorithms to combine the realm
and key names when constructing the vault entry id
- Introduces a keyResolvers property to the existing implementation via superclass that allows for the
configuration of one or more VaultKeyResolvers, creating a fallback mechanism in which different key formats
are tried in the order they were declared when retrieving a secret from the vault
- Adds more tests for the files-plaintext provider using the new key resolvers
- Adds a VaultTestExecutionDecider to skip the elytron-cs-keystore tests when running in Undertow. This is
needed because the new provider is available only as a Wildfly extension
2019-12-18 11:54:06 +01:00
harture
26458125cb
[KEYCLOAK-12254] Fix re-evaluation of conditional flow ( #6558 )
2019-12-18 08:45:11 +01:00
Douglas Palmer
106e6e15a9
[KEYCLOAK-11859] Added option to always display a client in the accounts console
2019-12-17 17:12:49 -03:00
Bruno Oliveira da Silva
caf08da2af
[KEYCLOAK-10962] Application screen for the new account console
2019-12-17 17:09:45 -03:00
vramik
c3d80651bf
KEYCLOAK-12473 Add possibility to specify length of event detail when storing to database
2019-12-17 17:15:50 +01:00
stianst
454ac3f415
KEYCLOAK-9322 Exclude non-Keycloak packages from JavaDoc
2019-12-17 11:51:55 -03:00
jacac
3ae508e1b9
KEYCLOAK-12425 Encode userid with Base64Url. ( #6585 )
2019-12-16 20:40:27 +01:00
vmuzikar
4c17fa8664
KEYCLOAK-12104 UI tests for Linked Accounts Page
2019-12-16 16:06:03 -03:00
Stan Silvert
8efe89135e
KEYCLOAK-8181: Implement spinner
2019-12-16 14:55:00 -03:00
vmuzikar
4f7b56d227
KEYCLOAK-12106 UI tests for Device Activity page
2019-12-16 14:26:58 -03:00
Erik Jan de Wit
fb999d96a5
reverted
2019-12-13 15:22:32 -05:00
Erik Jan de Wit
9cfb22f176
added redirectUri
to go back where the user was
2019-12-13 15:22:32 -05:00
Erik Jan de Wit
af0f43b769
KEYCLOAK-11496 detect session timeout
2019-12-13 15:22:32 -05:00
Tomas Kyjovsky
3eedcdb154
KEYCLOAK-12430 Compilation error in examples/providers/authenticator
module ( #6583 )
2019-12-12 21:55:08 +01:00
Douglas Palmer
af0594b58d
[KEYCLOAK-12463] Fixed missing consents
2019-12-12 17:27:54 -03:00
Stef van der Wel
118b413152
KEYCLOAK-12315 Fixed rendering resources template without baseUri.
2019-12-11 16:52:39 -03:00
Douglas Palmer
f9fa5b551d
[KEYCLOAK-5628] Added application endpoint
2019-12-11 13:06:04 -03:00
Cas Eliëns
66f5d1259f
Fix typo
2019-12-11 16:18:59 +01:00
Martin Bartoš
2cf6483cdf
[KEYCLOAK-12044] Fix messages in the UsernameForm ( #6548 )
2019-12-11 10:59:46 +01:00
Pedro Igor
05493371ca
[KEYCLOAK-11336] - Fixing error in kc.sh
2019-12-11 10:38:31 +01:00
Thomas Darimont
6591bdcdf5
KEYCLOAK-12436 Fixes NPE in QuarkusCacheManagerProvider when default settings are used
...
org.keycloak.provider.quarkus.QuarkusCacheManagerProvider#loadDefaultConfiguration
fails with an NPE (while trying to unbox null into a boolean) if the current
config does not contain "clustered". This happens when quarkus:dev mode is used
without parameters.
2019-12-10 19:34:41 -03:00
mposolda
0f3e0f4d4e
KEYCLOAK-12432 Compilation error in latest master in LDAPHardcodedAttributeTest
2019-12-10 18:01:11 -03:00
Cédric Couralet
bde94f2f08
KEYCLOAK-11770 add an hardcoded attribute mapper ( #6396 )
...
Signed-off-by: Cédric Couralet <cedric.couralet@insee.fr>
2019-12-10 12:57:46 +01:00
Dmitry Telegin
56aa14ffab
KEYCLOAK-11347 - MicroProfile-Config
2019-12-10 12:08:22 +01:00
Pedro Igor
d3e59bd0d1
[KEYCLOAK-11336] - Updating Quarkus version and some fixes/enhancements for container image
2019-12-10 09:17:16 +01:00
moremagic
17237ee7fc
KEYCLOAK-6758
2019-12-10 09:15:25 +01:00
Stian Thorgersen
762de6e5ad
Update README.md
2019-12-09 21:09:11 +01:00
Denis Richtárik
48bddc37ae
KEYCLOAK-12011 Remove cancel button from OTP form ( #6511 )
...
* KEYCLOAK-12011 Remove cancel button from OTP form
* Remove back button
2019-12-09 19:23:26 +01:00