mposolda
5b663dbc69
KEYCLOAK-9713 Warning in the log during export/import on current master
2019-04-24 10:56:43 +02:00
Hynek Mlnarik
65326ce16a
KEYCLOAK-9629 Update cookie type
2019-04-24 07:18:41 +01:00
Sebastian Loesch
43393220bf
Add X.509 authenticator option for canonical DN
...
Because the current distinguished name determination is security provider
dependent, a new authenticator option is added to use the canonical format
of the distinguished name, as descriped in
javax.security.auth.x500.X500Principal.getName(String format).
2019-04-23 21:04:18 +02:00
mposolda
7a671052a3
KEYCLOAK-9988 Fix unstable UserSessionPersisterOfflineTest.testExpired. Adding ResetTimeOffsetEvent
2019-04-23 20:58:37 +02:00
mhajas
4272495d24
KEYCLOAK-9748 Refactoring of springBoot tests including addition of how to run docs
2019-04-23 20:43:16 +02:00
mhajas
3f08238c2d
KEYCLOAK-6641 Stabilize SpringBoot tests
2019-04-23 20:43:16 +02:00
Stan Silvert
6806a4c660
KEYCLOAK-7219: Remove keycloak.js from new Account Console
2019-04-22 13:56:08 -03:00
Stan Silvert
e52be73d41
KEYCLOAK-10074: Account Console Performance
2019-04-22 09:47:12 -03:00
Martin Kanis
e5092bb617
KEYCLOAK-10090 Fix alignment for CD 6 release in PNC
2019-04-18 09:13:02 +02:00
keycloak-bot
49d4e935cb
Set version to 7.0.0-SNAPSHOT
2019-04-17 09:48:07 +01:00
Martin Bartos RH
0e2a781bb8
KEYCLOAK-10064 Merge preview features test: AccountRestServiceTest
2019-04-16 14:40:44 +02:00
Martin Bartos RH
a6e53b3f1c
KEYCLOAK-10063 Merge preview features test: ClientTokenExchangeTest
2019-04-16 12:49:54 +02:00
Sebastian Laskawiec
0042726dd8
KEYCLOAK-9601 KEYCLOAK-9602 Jetty 8.1 and 9.1 removal
...
Co-Authored-By: mhajas <mhajas@redhat.com>
2019-04-16 11:21:29 +02:00
vramik
e2d69632e9
KEYCLOAK-10004 refactor fuse adapter tests
2019-04-16 10:11:27 +02:00
moehman
0193e78ff9
KEYCLOAK-10070 Fix typo in account/message_de.properties
2019-04-16 08:39:34 +02:00
Anders Rønning
3f7d32d1ae
KEYCLOAK-10026: Add missing TypeScript definition for init options
2019-04-15 07:46:05 -04:00
Stan Silvert
2736dd9d61
KEYCLOAK-9644: Implement Nav and Headers using PF4 React
2019-04-12 16:15:51 -03:00
mposolda
81a37d3496
KEYCLOAK-7144 Improve admin console label/tooltip around anonymous bind option in LDAP storage provider
2019-04-12 20:23:33 +02:00
mposolda
a8af51c7bb
KEYCLOAK-9988 Fix unstable UserSessionProviderOfflineTest.testExpired
2019-04-12 17:16:53 +02:00
slominskir
4a227ae564
KEYCLOAK-5665 - elytron propagate security domain to ejb
2019-04-12 10:23:56 -03:00
Bekh-Ivanov George
ebcfeb20a3
[KEYCLOAK-10020] - Add ability to request user-managed (ticket) permissions by name
2019-04-12 08:44:57 -03:00
stianst
e7deb77725
Fix NPM dependency to download using https
2019-04-12 08:09:30 +01:00
Pedro Igor
c8970c95d5
[KEYCLOAK-10015] - CIP not properly resolving objects from JSON request body
2019-04-11 18:19:43 -03:00
mhajas
5b47df8979
KEYCLOAK-10013 Do not reject tokens with issuedAt == notBefore
2019-04-11 21:57:11 +02:00
Peter Skopek
92567d5a77
KEYCLOAK-8347 Welcome page test migration clean up
2019-04-11 21:52:52 +02:00
Peter Skopek
3a105cf9e9
KEYCLOAK-8347 migrate Welcome page test to base testsuite
2019-04-11 21:52:52 +02:00
vramik
7638226741
KEYCLOAK-10002 remove microprofile-metrics and microprofile-health extensions in domain mode
2019-04-10 11:04:09 +02:00
slominskir
8dd96d6962
KEYCLOAK - 9923 - add-user-keycloak detect if Java uses modules (JDK 9+)
2019-04-09 17:34:16 -03:00
Hynek Mlnarik
a63efd872d
KEYCLOAK-9822 Fix deadlock in OIDC adapter upon logout
2019-04-09 21:03:02 +02:00
Takashi Norimatsu
9b3e297cd0
KEYCLOAK-9756 PS256 algorithm support for token signing and validation
2019-04-09 20:52:02 +02:00
fisache
b4973ad7b5
[KEYCLOAK-9769] service account can't authorize when group policy exists in resource server
2019-04-09 15:23:50 -03:00
Francesco Degrassi
1bf19ada7e
KEYCLOAK-9825: keep existing refresh token on token exchange requiring refresh if new one not provided in response
2019-04-09 15:21:56 -03:00
vramik
2aeda71e16
KEYCLOAK-6152 fix WAS adapter tests
2019-04-09 19:34:50 +02:00
Pedro Igor
b39cf1c736
[KEYCLOAK-9353] - Final field failing to be set when running quarkus in native mode
2019-04-09 09:49:05 -03:00
Francesco Degrassi
5b78063dce
KEYCLOAK-6614: Support requesting refresh tokens from Google using access_type=offline
2019-04-08 15:06:03 -03:00
Sebastian Laskawiec
2e7f717e50
KEYCLOAK-9536 DB Allocator Plugin
2019-04-08 09:06:19 +02:00
mhajas
ccc8e06f9a
KEYCLOAK-9895 Fix stability of Hawtio EAP6Fuse test
2019-04-08 08:30:31 +02:00
Pedro Igor
ad9f59f9f7
[KEYCLOAK-9353] - Avoids initialization of the policy enforcer during deployment
2019-04-05 16:02:53 -03:00
mposolda
a516a795a2
KEYCLOAK-9836 Deprecate keycloak-servlet-oauth-clien
2019-04-02 10:52:18 -03:00
Stefan Guilhen
2fa2437555
KEYCLOAK-5613 Add built-in optional client scope for MicroProfile-JWT
2019-04-02 08:40:19 -03:00
vramik
5b8b463fc0
KEYCLOAK-9814 ExportImportTest NPE
2019-04-02 13:17:58 +02:00
vramik
35fa4b878b
KEYCLOAK-9712 KEYCLOAK-9911 moved Javascript adater tests and LoginModulesTest outsite of adapter package
2019-03-28 10:08:23 +01:00
Thomas Darimont
5eb9291f37
KEYCLOAK-9574 Fix broken Role Selection for LDAP Mapper in Admin-Console ( #5883 )
...
We now wrap the result of a role-selection in an JS array and
use the config value as is for rendering, instead of extracting
the first component (which was the first char, since the value
is a string).
Previously any mapper that used role selection could not be
used due to `LDAPMapperCreateCtrl` generating invalid config structures.
Since the component configuration is represented via
org.keycloak.representations.idm.ComponentRepresentation whose
`config` property is a `MultivaluedHashMap`
config values needs to be passed as an Array. However the
LDAPMapperCreateCtrl in (users.js) only passed the role as a String.
Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com>
2019-03-27 19:26:03 +01:00
rmartinc
a9a4e9daae
KEYCLOAK-9884: "user-attribute-ldap-mapper" is not propagating the change of "username" (uid) attribute.
2019-03-27 19:07:51 +01:00
Mark Stickel
d5cc18b960
KEYCLOAK-9868 x5t and x5t#S256 JWK parameters
2019-03-27 19:05:57 +01:00
mhajas
c6bd293d25
KEYCLOAK-9893 Use SSL in EAP6, add / to url for EAP6 deployment
2019-03-27 14:02:03 +01:00
Hisanobu Okuda
b44c86bd26
KEYCLOAK-9833 Large SSO Session Idle/SSO Session Max causes login failure
2019-03-27 11:42:40 +01:00
Martin Ball
21e2fa8784
KEYCLOAK-4249 - Make IDP URL in keycloak-saml.xml configurable
...
Added the metadata url as an attribute on the IDP in the keycloak saml configuration which then propagates through to the DefaultSamlDeployment where it is used on the construction of the SamlDescriptorPublicKeyLocator thereby allowing support for ADFS or other IDP which uses a path that is different to the Keycloak IDP.
To make this work when testing with ADFS a change was made to SamlDescriptorIDPKeysExtractor because it would not extract keys from metadata which contained the EntityDescriptor as the root element. The solution was to change the xpath expression in SamlDescriptorIDPKeysExtractor so that it does not require a wrapping EntitiesDescriptor but instead loads all EntityDescriptors located in the document. This allows it to handle a single EntityDescriptor or multiple descriptors wrapped in an EntitiesDescriptor in the same xpath expression. A unit test SamlDescriptorIDPKeysExtractorTest has been added which validates that keys can be loaded in both scenarios.
2019-03-27 08:04:53 +01:00
mhajas
0d0eec8790
KEYCLOAK-9869 Fix stability of cluster tests on EAP6
2019-03-27 08:03:20 +01:00
mposolda
ad1a72ef8b
KEYCLOAK-9886 remove deprecated testsuite pom.xml
2019-03-25 21:24:26 +01:00