Commit graph

22605 commits

Author SHA1 Message Date
Sebastian Laskawiec
e213c1c791 KEYCLOAK-12410 Deploying themes using Keycloak Operator 2020-09-17 18:39:06 -03:00
Erik Jan de Wit
43a4132beb
let post css use all paths (#102) 2020-09-17 11:13:04 -04:00
Erik Jan de Wit
338e177c51
added react hook form to do forms (#99)
* added react hook form to do forms

* removed unnessary property
2020-09-17 09:51:40 -04:00
Erik Jan de Wit
b87bd2ca76
updated the realm selector (#90)
* updated the realm selector with:

1. realm context that works on other requests
2. added search bar when realm list > 5 realms

* fixed merge
2020-09-17 07:37:30 -04:00
Martin Kanis
f037dabdc1 KEYCLOAK-15199 Use stream variant method in jpa/RoleAdapter.getFirstAttribute 2020-09-17 13:18:21 +02:00
Pedro Igor
3fd6f0ce10 [KEYCLOAK-14255] - Fixing tests 2020-09-17 10:38:41 +02:00
Luca Leonardo Scorcia
c6608c1561 KEYCLOAK-15383 Translation strings escaped twice in saml-post-form.ftl 2020-09-16 21:31:51 +02:00
Pedro Igor
0978d78a48 [KEYCLOAK-14255] - Initial changes to configuration 2020-09-16 20:03:52 +02:00
Erik Jan de Wit
79c8942eeb
changed messages to keys (#88) 2020-09-16 10:56:23 -04:00
Luca Leonardo Scorcia
3973d47bd4 KEYCLOAK-15465 SAML Identity Broker - SP metadata writer always emits AttributeConsumingService isDefault attribute
The isDefault attribute is defined as optional, yet if it set to null Keycloak incorrectly emits the value isDefault="null".
2020-09-16 16:44:19 +02:00
Luca Leonardo Scorcia
d4302c0b88 KEYCLOAK-15485 Add option to enable SAML SP metadata signature 2020-09-16 16:40:49 +02:00
Luca Leonardo Scorcia
10077b1efe KEYCLOAK-15485 Add option to enable SAML SP metadata signature 2020-09-16 16:40:45 +02:00
Mark Wolfe
3723d78e3c KEYCLOAK-15460 Fix missing event types in SAML endpoint
A change was done in 32f13016fa which isn't setting the type for events and causing an internal error.
2020-09-16 16:36:19 +02:00
Martin Kanis
5d5e56dde3 KEYCLOAK-15199 Complement methods for accessing roles with Stream variants 2020-09-16 16:29:51 +02:00
Benjamin Weimer
f874e9a43c KEYCLOAK-9874 include realm and client roles in user info response 2020-09-16 10:01:02 +02:00
Joaquim Fellmann
be4780243b KEYCLOAK-15483 Replace badly displayed HTML message with simple text message for french locale (align with en, de, pt, po, tr, nl locales) 2020-09-15 17:09:53 -04:00
Erik Jan de Wit
601bba8057
initial version of groups (#86) 2020-09-15 15:54:52 -04:00
Erik Jan de Wit
3798c41db0
Added missing logic to realm form (#80)
* made alerts easier to use

* better clear message

* added missing logic to realm form

* format

* fixed types

* fixed test

* fix merge error
2020-09-15 15:44:28 -04:00
Eugenia
782a09e064
Merge pull request #93 from keycloak/edewit-patch-1
fix link
2020-09-15 10:07:03 -04:00
Erik Jan de Wit
fccff61c17
fix link 2020-09-15 15:41:40 +02:00
Christie Molloy
bbd98e0fb0
Merge pull request #91 from srambach/add-addons
adds patternfly addons
2020-09-14 16:21:03 -04:00
Sarah Rambacher
41b52c0666 adds patternfly addons 2020-09-14 15:49:31 -04:00
Takashi Norimatsu
b670734eec KEYCLOAK-14205 FAPI-RW Client Policy - Executor : Enforce Response Type of OIDC Hybrid Flow 2020-09-14 20:58:25 +02:00
Hynek Mlnarik
a05066d567 KEYCLOAK-15477 Fix permission evaluation logic 2020-09-14 20:53:46 +02:00
Sarah Rambacher
bb38bcf051
Restyle realm selector and fix centering (#87)
* clean up CSS on realm selector

* Fix width and correct CSS of realm selector

* Format and update snapshots

* Remove module css

* update snapshot
2020-09-14 14:10:54 -04:00
Konstantinos Georgilakis
f4f58ab707 KEYCLOAK-15540 correct SAMLAttributeConsumingServiceParser 2020-09-14 16:01:46 +02:00
mposolda
4123b7a91e KEYCLOAK-11678 Remove dummy resource. Adding keycloak-services and liquibase to jandex indexing 2020-09-14 09:27:34 -03:00
vmuzikar
a9a719b88c KEYCLOAK-15270 Account REST API doesn't verify audience 2020-09-14 08:43:09 -03:00
Dmitry Telegin
b62d68a591 KEYCLOAK-14952 - Unit test failure in keycloak-saml-core on Java 11 2020-09-14 11:17:57 +02:00
Stan Silvert
6348266175
Update README.md 2020-09-13 16:15:30 -04:00
Erik Jan de Wit
55a0f443ed
small fix to make the alert test more readable (#85) 2020-09-11 14:34:43 -04:00
mhajas
3186f1b5a9 KEYCLOAK-15514 Update AbstractStorageManager to check capability interface types 2020-09-11 14:42:48 +02:00
vmuzikar
cb5c893d87 Add tests for KEYCLOAK-15481 2020-09-11 07:03:24 -04:00
Stan Silvert
952e8fecee KEYCLOAK-15481: Display forbidden screen 2020-09-11 07:03:24 -04:00
Miquel Simon
2572b1464b KEYCLOAK-15395. Removed totp/remove (DELETE) and credentials/password (GET, POST) endpoints. 2020-09-10 18:03:03 -03:00
Erik Jan de Wit
1297c9f391
Restructure (#78)
* moved files into new structure

* translation files / namespace per "page"

fixes: #77

* renamed pages to sections

* moved save, delete and others to common bundle
2020-09-10 14:04:03 -04:00
Takashi Norimatsu
af2f18449b KEYCLOAK-14195 FAPI-RW Client Policy - Condition : Client - Client Role 2020-09-10 18:34:19 +02:00
Clement Cureau
b19fe5c01b Finegrain admin as fallback and added some tests 2020-09-10 12:26:55 -03:00
Clement Cureau
73378df52e [KEYCLOAK-11621] Allow user creation via group permissions (Admin API)
Problem:
Using fine-grained admin permissions on groups, it is not permitted to create new users
within a group.

Cause:
The POST /{realm}/users API does not check permission for each group part of the new
user representation

Solution:
- Change access logic for POST /{realm}/users to require MANAGE_MEMBERS and
MANAGE_MEMBERSHIP permissions on each of the incoming groups

Tests:
Manual API testing performed:
  1. admin user from master realm:
    - POST /{realm}/users without groups                  => HTTP 201 user created
    - POST /{realm}/users with groups                     => HTTP 201 user created
  2. user with MANAGE_MEMBERS & MANAGE_MEMBERSHIP permissions on group1
    - POST /{realm}/users without groups                  => HTTP 403 user NOT created
    - POST /{realm}/users with group1                     => HTTP 201 user created
    - POST /{realm}/users with group1 & group2            => HTTP 403 user NOT created
    - POST /{realm}/users with group1 & wrong group path  => HTTP 400 user NOT created
  3. user with MANAGE_MEMBERS permission on group1
    - POST /{realm}/users without groups                  => HTTP 403 user NOT created
    - POST /{realm}/users with group1                     => HTTP 403 user NOT created
    - POST /{realm}/users with group1 & group2            => HTTP 403 user NOT created
    - POST /{realm}/users with group1 & wrong group path  => HTTP 400 user NOT created
2020-09-10 12:26:55 -03:00
testn
706299557e KEYCLOAK-15174: ResourceServerAdapter.toEntity checks the wrong type 2020-09-10 12:19:25 -03:00
testn
c288175c03 KEYCLOAK-15208: PermissionTicketAdapter checks for the wrong type 2020-09-10 12:16:48 -03:00
Heikki Simperi
4500dcbbc6 KEYCLOAK-13837 Admin cli command has alias parameter should be keyAlias 2020-09-10 10:58:52 -03:00
Andy Munro
df1cb476fe KEYCLOAK-14845 Updating IBM Z and OpenJ9 terminology 2020-09-09 15:02:07 -03:00
Sebastian Laskawiec
e01159a943 KEYCLOAK-14767 OpenShift Review Endpoint audience fix 2020-09-09 11:57:24 -03:00
Erik Jan de Wit
7f66895631
added export and delete (#63)
* added export and delete

* added types
2020-09-09 16:34:05 +02:00
Michael Furman
6b9a5f2854 Update spring-security-adapter.adoc 2020-09-09 11:19:57 +02:00
Michael Furman
cdbdac6c36 Fixing KEYCLOAK-14642
Fixing documentation to resolve KEYCLOAK-14642
2020-09-09 11:19:57 +02:00
Takashi Norimatsu
cbb79f0430 KEYCLOAK-15448 FAPI-RW : Error Response on OIDC private_key_jwt Client Authentication Error (400 error=invalid_client) 2020-09-09 11:14:21 +02:00
Stan Silvert
8fbcf7582a
Flesh out left navigation (#76)
Co-authored-by: Erik Jan de Wit <erikjan.dewit@gmail.com>
2020-09-09 11:07:17 +02:00
mhajas
df52c12ebb KEYCLOAK-15479 Replace enlistAfterCompletion with enlist in MapClientProvider 2020-09-09 08:27:38 +02:00