Commit graph

22014 commits

Author SHA1 Message Date
Eugenia
9fd54eb964
Adds realm roles section to app and storybook (#79)
* add Realm Roles page

* add section for no realm roles

* update role-model, fixed UI to match designs

* fix paths

* add storybook demo and role actions kebab

* fix build and clean up

* fix formatting

* fix lint

* fix test and update snapshot

* fix storybook demo

* update snapshot after rebase

* PR feedback from Stan

* add back pf addons

* Update src/realm-roles/RealmRolesSection.tsx

Co-authored-by: Stan Silvert <ssilvert@redhat.com>

* fix format

* localize NoRealmRoles component

* fix formatting

* changes to PR suggested by Sarah

Co-authored-by: Stan Silvert <ssilvert@redhat.com>
2020-09-18 10:04:55 +02:00
Peter Skopek
1bcb397a2f KEYCLOAK-14953 Unify wildfly component versions related properties already used in keycloak. 2020-09-17 23:27:25 -07:00
Darran Lofthouse
0adb33a59d [KEYCLOAK-14953] Make repository.jboss.org available for building the Galleon feature pack.
Update the EAP versions to match the most recent release.
2020-09-17 23:27:25 -07:00
Darran Lofthouse
64b8bca9d7 [KEYCLOAK-14953] Additional updates to the new Galleon feature pack:
- Adjust feature pack to depend on "wildfly-galleon-pack".
 - Declare dependency from "keycloak-client-oidc" on "undertow" and "ee" layers.
 - Update name of layer to "keycloak-client-oidc".
 - Update the producer to match the group and artifact ID of the maven artifact.
2020-09-17 23:27:25 -07:00
JF Denise
6a5c1defe1 [KEYCLOAK-14953] keycloak oidc/elytron adapter galleon-pack prototype 2020-09-17 23:27:25 -07:00
mhajas
b75ad2fbd8 KEYCLOAK-15259 Avoid using "null" Origin header as a valid value 2020-09-17 23:21:49 -07:00
mhajas
f7e0af438d KEYCLOAK-14232 Add Referrer-Policy: no-referrer to each response from Keycloak
(cherry picked from commit 0b49640231abc6e465542bd2608e1c908c079ced)
2020-09-17 23:21:49 -07:00
Stian Thorgersen
39ad765fc9 Update javascript-adapter.adoc 2020-09-17 23:10:46 -07:00
Thomas Vitale
6fdf747196 KEYCLOAK-15248 Remove duplicated steps in getting started guide 2020-09-17 23:09:02 -07:00
Sebastian Laskawiec
e213c1c791 KEYCLOAK-12410 Deploying themes using Keycloak Operator 2020-09-17 18:39:06 -03:00
Erik Jan de Wit
43a4132beb
let post css use all paths (#102) 2020-09-17 11:13:04 -04:00
Erik Jan de Wit
338e177c51
added react hook form to do forms (#99)
* added react hook form to do forms

* removed unnessary property
2020-09-17 09:51:40 -04:00
Erik Jan de Wit
b87bd2ca76
updated the realm selector (#90)
* updated the realm selector with:

1. realm context that works on other requests
2. added search bar when realm list > 5 realms

* fixed merge
2020-09-17 07:37:30 -04:00
Martin Kanis
f037dabdc1 KEYCLOAK-15199 Use stream variant method in jpa/RoleAdapter.getFirstAttribute 2020-09-17 13:18:21 +02:00
Pedro Igor
3fd6f0ce10 [KEYCLOAK-14255] - Fixing tests 2020-09-17 10:38:41 +02:00
Luca Leonardo Scorcia
c6608c1561 KEYCLOAK-15383 Translation strings escaped twice in saml-post-form.ftl 2020-09-16 21:31:51 +02:00
Pedro Igor
0978d78a48 [KEYCLOAK-14255] - Initial changes to configuration 2020-09-16 20:03:52 +02:00
Erik Jan de Wit
79c8942eeb
changed messages to keys (#88) 2020-09-16 10:56:23 -04:00
Luca Leonardo Scorcia
3973d47bd4 KEYCLOAK-15465 SAML Identity Broker - SP metadata writer always emits AttributeConsumingService isDefault attribute
The isDefault attribute is defined as optional, yet if it set to null Keycloak incorrectly emits the value isDefault="null".
2020-09-16 16:44:19 +02:00
Luca Leonardo Scorcia
d4302c0b88 KEYCLOAK-15485 Add option to enable SAML SP metadata signature 2020-09-16 16:40:49 +02:00
Luca Leonardo Scorcia
10077b1efe KEYCLOAK-15485 Add option to enable SAML SP metadata signature 2020-09-16 16:40:45 +02:00
Mark Wolfe
3723d78e3c KEYCLOAK-15460 Fix missing event types in SAML endpoint
A change was done in 32f13016fa which isn't setting the type for events and causing an internal error.
2020-09-16 16:36:19 +02:00
Martin Kanis
5d5e56dde3 KEYCLOAK-15199 Complement methods for accessing roles with Stream variants 2020-09-16 16:29:51 +02:00
Benjamin Weimer
f874e9a43c KEYCLOAK-9874 include realm and client roles in user info response 2020-09-16 10:01:02 +02:00
Joaquim Fellmann
be4780243b KEYCLOAK-15483 Replace badly displayed HTML message with simple text message for french locale (align with en, de, pt, po, tr, nl locales) 2020-09-15 17:09:53 -04:00
Erik Jan de Wit
601bba8057
initial version of groups (#86) 2020-09-15 15:54:52 -04:00
Erik Jan de Wit
3798c41db0
Added missing logic to realm form (#80)
* made alerts easier to use

* better clear message

* added missing logic to realm form

* format

* fixed types

* fixed test

* fix merge error
2020-09-15 15:44:28 -04:00
Eugenia
782a09e064
Merge pull request #93 from keycloak/edewit-patch-1
fix link
2020-09-15 10:07:03 -04:00
Erik Jan de Wit
fccff61c17
fix link 2020-09-15 15:41:40 +02:00
Christie Molloy
bbd98e0fb0
Merge pull request #91 from srambach/add-addons
adds patternfly addons
2020-09-14 16:21:03 -04:00
Sarah Rambacher
41b52c0666 adds patternfly addons 2020-09-14 15:49:31 -04:00
Takashi Norimatsu
b670734eec KEYCLOAK-14205 FAPI-RW Client Policy - Executor : Enforce Response Type of OIDC Hybrid Flow 2020-09-14 20:58:25 +02:00
Hynek Mlnarik
a05066d567 KEYCLOAK-15477 Fix permission evaluation logic 2020-09-14 20:53:46 +02:00
Sarah Rambacher
bb38bcf051
Restyle realm selector and fix centering (#87)
* clean up CSS on realm selector

* Fix width and correct CSS of realm selector

* Format and update snapshots

* Remove module css

* update snapshot
2020-09-14 14:10:54 -04:00
Konstantinos Georgilakis
f4f58ab707 KEYCLOAK-15540 correct SAMLAttributeConsumingServiceParser 2020-09-14 16:01:46 +02:00
mposolda
4123b7a91e KEYCLOAK-11678 Remove dummy resource. Adding keycloak-services and liquibase to jandex indexing 2020-09-14 09:27:34 -03:00
vmuzikar
a9a719b88c KEYCLOAK-15270 Account REST API doesn't verify audience 2020-09-14 08:43:09 -03:00
Dmitry Telegin
b62d68a591 KEYCLOAK-14952 - Unit test failure in keycloak-saml-core on Java 11 2020-09-14 11:17:57 +02:00
Stan Silvert
6348266175
Update README.md 2020-09-13 16:15:30 -04:00
Erik Jan de Wit
55a0f443ed
small fix to make the alert test more readable (#85) 2020-09-11 14:34:43 -04:00
mhajas
3186f1b5a9 KEYCLOAK-15514 Update AbstractStorageManager to check capability interface types 2020-09-11 14:42:48 +02:00
vmuzikar
cb5c893d87 Add tests for KEYCLOAK-15481 2020-09-11 07:03:24 -04:00
Stan Silvert
952e8fecee KEYCLOAK-15481: Display forbidden screen 2020-09-11 07:03:24 -04:00
Miquel Simon
2572b1464b KEYCLOAK-15395. Removed totp/remove (DELETE) and credentials/password (GET, POST) endpoints. 2020-09-10 18:03:03 -03:00
Erik Jan de Wit
1297c9f391
Restructure (#78)
* moved files into new structure

* translation files / namespace per "page"

fixes: #77

* renamed pages to sections

* moved save, delete and others to common bundle
2020-09-10 14:04:03 -04:00
Takashi Norimatsu
af2f18449b KEYCLOAK-14195 FAPI-RW Client Policy - Condition : Client - Client Role 2020-09-10 18:34:19 +02:00
Clement Cureau
b19fe5c01b Finegrain admin as fallback and added some tests 2020-09-10 12:26:55 -03:00
Clement Cureau
73378df52e [KEYCLOAK-11621] Allow user creation via group permissions (Admin API)
Problem:
Using fine-grained admin permissions on groups, it is not permitted to create new users
within a group.

Cause:
The POST /{realm}/users API does not check permission for each group part of the new
user representation

Solution:
- Change access logic for POST /{realm}/users to require MANAGE_MEMBERS and
MANAGE_MEMBERSHIP permissions on each of the incoming groups

Tests:
Manual API testing performed:
  1. admin user from master realm:
    - POST /{realm}/users without groups                  => HTTP 201 user created
    - POST /{realm}/users with groups                     => HTTP 201 user created
  2. user with MANAGE_MEMBERS & MANAGE_MEMBERSHIP permissions on group1
    - POST /{realm}/users without groups                  => HTTP 403 user NOT created
    - POST /{realm}/users with group1                     => HTTP 201 user created
    - POST /{realm}/users with group1 & group2            => HTTP 403 user NOT created
    - POST /{realm}/users with group1 & wrong group path  => HTTP 400 user NOT created
  3. user with MANAGE_MEMBERS permission on group1
    - POST /{realm}/users without groups                  => HTTP 403 user NOT created
    - POST /{realm}/users with group1                     => HTTP 403 user NOT created
    - POST /{realm}/users with group1 & group2            => HTTP 403 user NOT created
    - POST /{realm}/users with group1 & wrong group path  => HTTP 400 user NOT created
2020-09-10 12:26:55 -03:00
testn
706299557e KEYCLOAK-15174: ResourceServerAdapter.toEntity checks the wrong type 2020-09-10 12:19:25 -03:00
testn
c288175c03 KEYCLOAK-15208: PermissionTicketAdapter checks for the wrong type 2020-09-10 12:16:48 -03:00