Corey McGregor
be77fd9459
KEYCLOAK-2339 Adding impersonator details to user session notes and supporting built-in protocol mappers.
2019-03-08 09:14:42 +01:00
rmartinc
231db059b2
KEYCLOAK-8996: Provide a way to set a responder certificate in OCSP/X509 Authenticator
2019-03-07 07:57:20 +01:00
keycloak-bot
e843d84f6e
Set version to 6.0.0-SNAPSHOT
2019-03-06 15:54:08 +01:00
stianst
7ad02e7318
Fixes for releasing
2019-03-06 11:38:09 +01:00
mhajas
8a750c7fca
KEYCLOAK-6750 Adapt Tomcat adapter tests to new structure
2019-03-06 08:57:46 +01:00
Denis
4cde8d8534
KEYCLOAK-9686 - Compilation error in PNC for Keycloak 5.x
2019-03-06 08:36:33 +01:00
sebastienblanc
c2d5bbc662
KEYCLOAK-6979 : adding springboot tests app to parent pom
2019-03-06 08:11:46 +01:00
Sebastian Laskawiec
406097a508
KEYCLOAK-6749 Jetty App Server
2019-03-05 15:21:48 +01:00
vramik
2e7eb92f43
KEYCLOAK-8699 replace hostnames with nip.io ones to include cors tests by default
2019-03-05 12:00:01 +01:00
stianst
15478c83e4
Added release script
2019-03-05 11:45:08 +01:00
Martin Bartos RH
bec5d676e7
[KEYCLOAK-7907] Migrate model package from old testsuite
2019-03-05 09:39:17 +01:00
vramik
845275ef0f
KEYCLOAK-9624 support for legacy driver for migration tests
2019-03-05 09:30:31 +01:00
Michael Parker
7bd1f32eb1
KEYCLOAK-9077 Adds support for SAML SessionNotOnOrAfter attribute in response xml serialization
2019-03-05 09:05:41 +01:00
stianst
653a08885d
Added get-version script
2019-03-05 08:42:14 +01:00
stianst
c52c4fec23
KEYCLOAK-9720 Move bower/npm packaging from keycloak/keycloak-js-bower repository
2019-03-05 08:15:05 +01:00
mposolda
89d0c51e13
KEYCLOAK-3159 Migrate federation package from old testsuite
2019-03-04 13:37:12 +01:00
Gilles
f295a2e303
[KEYCLOAK-3723] Fixed updated of protocol mappers within client updates in clients-registrations resource
2019-03-04 11:57:59 +01:00
mposolda
d5b28013d1
KEYCLOAK-8523 Remove jaxrs package from old testsuite and deprecate jaxrs filter
2019-03-04 10:25:01 +01:00
Pedro Igor
6aa9096361
[KEYCLOAK-9451] - Policy evaluation fails when not evaluated against a particual resource
2019-02-28 10:38:09 -03:00
vramik
fab52ebc51
KEYCLOAK-9611 Add support to the testsuite for migration from 4.8.3.Final
2019-02-28 13:53:30 +01:00
Pedro Igor
75d9847672
[KEYCLOAK-9478] - Support multiple CIP providers in the policy enforcer configuration
2019-02-27 19:08:57 -03:00
Pedro Igor
bacc1b538f
[KEYCLOAK-8855] - Tests
2019-02-27 15:39:32 -03:00
sakanaou
007c364027
Store rewritten redirect URL in adapter-core
2019-02-27 15:39:32 -03:00
Philipp Nowak
39828b2c94
[KEYCLOAK-9539] Race condition SecurityContextHolder.setAuthentication()
...
This is an issue with the Spring Security Keycloak Adapter relating to
the way the Authentication is stored in the SecurityContext, causing a
race condition in application code using that. It does not seem to
affect actual Spring Security operation.
We had a pretty strange race condition in our application. When many
requests were incoming at the same time, occasionally the old
unauthenticated Authentication provided to
KeycloakAuthenticationProvider for performing the actual authentication
would stay the current authentication, as returned by
SecurityContextHolder.getContext().getAuthentication(). That resulted
in authenticated users' JavaScript requests occasionally (~1/50 given a
large request volume) returning a 403 because the 'old' token was still
in the context, causing Spring Security to see them as unauthenticated.
This PR resolves this issue by replacing the whole context, as suggested
by a Spring Security contributor in jzheaux/spring-security-oauth2-resource-server#48 . By default,
SecurityContextHolder keeps the actual context object in a ThreadLocal,
which should be safe from race-conditions. The actual Authentication
object, however, is kept in a mere field, hence the reason for this PR.
JIRA issue: https://issues.jboss.org/browse/KEYCLOAK-9539
2019-02-27 14:58:10 -03:00
Stefan Guilhen
9c34cc7365
[KEYCLOAK-9371] Fix premature termination of sessions when remember-me is in use
2019-02-27 15:08:50 +01:00
vramik
5d205d16e8
KEYCLOAK-9167 Using kcadm to update an identity-provider instance via a json file does not work without an "internalId" present in the json
2019-02-27 14:56:36 +01:00
Tomas Kyjovsky
49a86865cf
KEYCLOAK-8869 JStat monitoring for performance tests
2019-02-27 11:17:39 +01:00
mposolda
362faf3adb
KEYCLOAK-6627 Closing admin clients and testing clients in testsuite
2019-02-27 08:57:42 +01:00
Tomas Kyjovsky
195aeaca68
KEYCLOAK-9000 Update stress-testing script
2019-02-26 16:38:40 +01:00
Lars Wilhelmsen
9b1ab0f992
KEYCLOAK-9116: Fixes JWK serialization of ECDSA public key coordinates.
...
Signed-off-by: Lars Wilhelmsen <lars@sral.org>
2019-02-25 09:53:09 -03:00
Stan Silvert
b64f30c9d7
KEYCLOAK-8522: Remove broker tests covered in new testsuite.
2019-02-25 09:40:39 -03:00
Stan Silvert
05005a1791
KEYCLOAK-8522: Migrate IdpHint tests. Remove unneeded tests.
2019-02-25 09:40:39 -03:00
Stan Silvert
fe5966d224
KEYCLOAK-8602: PatternFly 4 integration
2019-02-25 08:26:54 -03:00
Stan Silvert
ccd6d248f4
KEYCLOAK-8603: Reimplement 'back to application' in react
2019-02-25 08:26:54 -03:00
stianst
8dfd07662c
KEYCLOAK-8397 Remove deprecated Keycloak Proxy
2019-02-25 08:23:12 -03:00
Simon Neaves
b5fbc04e5e
KEYCLOAK-9376 Add "aud" to DEFAULT_CLAIMS_SUPPORTED
...
See https://issues.jboss.org/browse/KEYCLOAK-9376?_sscc=t
2019-02-25 10:21:49 +01:00
Hynek Mlnarik
37ef47d6ab
KEYCLOAK-9509 Upgrade to Wildfly 15
...
KEYCLOAK-9584 Update Wildfly Arquillian version
KEYCLOAK-9581: Fix CookiePathTests
KEYCLOAK-9607 CLI sripts and configuration files update
KEYCLOAK-9580 Fix component registration error
KEYCLOAK-9590 Update JDG to newest version
* Infinispan is using whatever version is set in root pom.xml.
KEYCLOAK-9509 Fix Undertow tests
Co-Authored-By: vramik <vramik@redhat.com>
Co-Authored-By: sebastienblanc <scm.blanc@gmail.com>
2019-02-25 08:56:46 +01:00
Pedro Igor
99f8e5f808
[KEYCLOAK-9489] - Fixing fine-grained permission functionality
2019-02-22 09:22:14 -03:00
Pedro Igor
9314f13255
[KEYCLOAK-9093] - False-Positive UMA Policy Evaluation
2019-02-21 21:47:58 -03:00
Pedro Igor
4d5dff1d64
[KEYCLOAK-9474] - Public endpoints are returning 403 with body when enforcement mode is disabled
2019-02-21 16:27:07 -03:00
Stian Thorgersen
366ee083ac
Update pull_request_template.md
2019-02-21 12:30:16 +01:00
Stian Thorgersen
349336c6a6
Update pull_request_template.md
2019-02-21 12:29:32 +01:00
Stian Thorgersen
3a6a470640
Create pull_request_template.md
2019-02-21 12:28:31 +01:00
Stian Thorgersen
3a4e768555
Update CONTRIBUTING.md
2019-02-21 12:28:06 +01:00
Stian Thorgersen
7adde410ac
Update CONTRIBUTING.md
2019-02-21 12:27:40 +01:00
Steven Aerts
d36cb27bd9
KEYCLOAK-9526 admin console auth-url with hostname SPI
2019-02-21 11:55:11 +01:00
Freddy Tuxworth
3c0e8022a9
Added tests for common utilities CollectionUtil & HtmlUtils.
...
These tests were written using Diffblue Cover.
2019-02-21 11:45:17 +01:00
Gideon Caranzo
4cd617bc42
KEYCLOAK-8977 Added method to return KeycloakSession from RealmCreationEvent
2019-02-21 11:21:54 +01:00
Thibault Nélis
cc79963f81
Fix typo: "credentia" -> "credential"
2019-02-21 11:20:06 +01:00
Guilhem Lucas
b666756b8f
KEYCLOAK-9320 Make theme properties available in email templates
2019-02-21 11:19:17 +01:00