Pedro Igor
84d099e48f
[KEYCLOAK-11282] - Properly resolve config resolver
...
Co-authored-by: mhajas <mhajas@redhat.com>
2020-03-17 15:49:00 +01:00
mposolda
56d1ab19a8
KEYCLOAK-11412 Display more nice error message when creating top level group with same name
2020-03-16 21:03:46 +01:00
mposolda
d7688f6b12
KEYCLOAK-12869 REST sends credential type when no credential exists and credential disabled
2020-03-16 21:02:40 +01:00
Stan Silvert
1f1ed36b71
KEYCLOAK-9782: Do not allow duplicate group name when updating
2020-03-13 10:13:45 -04:00
Pedro Igor
62f5850731
Fixing examples in master
2020-03-12 11:21:17 -03:00
Sebastian Laskawiec
8774a0f4ba
KEYCLOAK-12881 KEYCLOAK-13099 Update FederatedIdentities and Groups on POST
2020-03-12 14:57:02 +01:00
stianst
ec1c21efe9
KEYCLOAK-12344 Update examples version
2020-03-12 09:22:51 +01:00
mposolda
72e4690248
KEYCLOAK-13174 Not possible to delegate creating or deleting OTP credential to userStorage
2020-03-11 12:51:56 +01:00
mposolda
803f398dba
KEYCLOAK-12876 KEYCLOAK-13148 KEYCLOAK-13149 KEYCLOAK-13151 Re-introduce some changes to preserve UserStorage SPI backwards compatibility. Added test for backwards compatibility of user storage
2020-03-11 12:51:56 +01:00
Thomas Darimont
cd51ff3474
KEYCLOAK-13186 Remove role information from RefreshTokens
...
We now no longer expose role assignment information into the RefreshToken.
Previously RefreshTokens contained information about the realm and
client specific roles which are assigned to a user. Since the role
information is usually either taken from the AccessToken, IDToken or
the User-Info endpoint and the RefreshToken is an internal format which
is opaque to the client, it would be a waste of space to keep that
information in the RefreshToken.
See:
https://lists.jboss.org/pipermail/keycloak-dev/2019-April/011936.html
2020-03-11 06:28:22 +01:00
rmartinc
ad3b9fc389
KEYCLOAK-12579: LDAP groups duplicated during UI listing of user groups
2020-03-11 06:14:29 +01:00
mposolda
bc1146ac2f
KEYCLOAK-10029 Offline token migration fix. Always test offline-token migration when run MigrationTest
2020-03-10 20:38:16 +01:00
stianst
db26520046
KEYCLOAK-13237 Allow look ahead window set to 0 for otp policy
2020-03-10 16:01:57 +01:00
Pedro Igor
b7a395a3ef
[KEYCLOAK-11345] - Test basic features of Keycloak.X with current tetsuite
2020-03-10 15:59:35 +01:00
stianst
097a9b6e2e
KEYCLOAK-13233 Fix missing text-security files
2020-03-10 15:50:00 +01:00
Phy
2b35321b7c
KEYCLOAK-13253 read rpId from policy in WebAuthnAuthenticator
...
A new method, getRpID, is created.
2020-03-09 17:04:26 +01:00
vramik
83461d033b
KEYCLOAK-11808 update testsuite to use current jdbc driver version for migration testing
2020-03-09 15:05:12 +01:00
Sebastian Schuster
99aba33980
KEYCLOAK-13163 Fixed searching for user with fine-grained permissions
2020-03-09 09:56:13 -03:00
vmuzikar
8cfd4d60e6
KEYCLOAK-13069 Fix failing RH-SSO base tests
2020-03-09 13:50:40 +01:00
vmuzikar
a840d6ff9a
KEYCLOAK-13260 Fix "Test authentication" button for LDAP User Federation
2020-03-09 13:36:57 +01:00
vramik
e4baef41d1
KEYCLOAK-11424 DBAllocatorUnavailableException
2020-03-09 08:59:02 +01:00
Phy
8aa5019efe
KEYCLOAK-13074 Don't return LDAP group members if under IMPORT mode
...
If GroupLDAPStorageMapper is running under IMPORT mode, getGroupMembers should not return users in LDAP, which, according to how UserStorageManager.query works (getting both user federation and Keycloak storage), will cause duplicate users in the list.
A test has been added as well, which will fail before the fix in the mapper.
2020-03-06 11:44:36 +01:00
stianst
ed97d40939
KEYCLOAK-9851 Removed properties from realm json attributes that are included as fields
2020-03-05 17:59:50 +01:00
Laure-Emmanuelle Issler
967ff939ec
KEYCLOAK-13026 Set path of OAuth_Token_Request_State cookie to /
2020-03-05 16:21:24 +01:00
mabartos
a1bbab9eb2
KEYCLOAK-12799 Missing Cancel button on The WebAuthn setup screen when using AIA
2020-03-05 15:04:38 +01:00
stianst
fae333750a
KEYCLOAK-10330 Force Jackson2 provider to be used by Keycloak admin client, to prevent json-b provider taking over
2020-03-05 14:24:58 +01:00
stianst
b84160786b
KEYCLOAK-12885 Make sure empty protocol in client scope doesn't result in NPE in well-known endpoint
2020-03-05 13:43:46 +01:00
Pedro Igor
23b4aee445
[KEYCLOAK-13056] - Searching clients with reduced permissions results in 403
2020-03-05 13:39:25 +01:00
Pedro Igor
30b07a1ff5
[KEYCLOAK-13175] - Setting the enforcement mode when fetching lazily fetching resources
2020-03-05 13:31:21 +01:00
stianst
75a772f52b
KEYCLOAK-10967 Add JSON body methods for test ldap and smtp connections. Deprecate old form based methods.
2020-03-05 10:07:58 +01:00
stianst
b39b84c5dc
KEYCLOAK-13102 Remove error log message on invalid response_type
2020-03-05 08:47:12 +01:00
vramik
701fb06de1
KEYCLOAK-12968 fix ClientTest.getAllClientsSearchAndPagination for postgresql
2020-03-05 06:40:03 +01:00
Pedro Igor
2f489a41eb
[KEYCLOAK-12192] - Missing Input Validation in IDP Authorization URLs
2020-03-05 06:32:35 +01:00
Hynek Mlnarik
0cf0955318
KEYCLOAK-13181 Fix NPE in EAP 6 adapter
2020-03-04 10:19:43 +01:00
Jon Koops
c1bf183998
KEYCLOAK-9346 Add new KeycloakPromise to support native promises
...
Co-authored-by: mhajas <mhajas@redhat.com>
2020-03-04 08:53:35 +01:00
stianst
bcb542d9cc
KEYCLOAK-13116 Fix backwards compatilbity changes in LocaleSelectorSPI
2020-03-04 06:39:24 +01:00
Thomas Kuestermann
8ed355a5fe
KEYCLOAK-12749 single worker/IO thread, use OAUTH2 constants
2020-03-03 12:39:19 -03:00
Thomas Kuestermann
22555371d8
KEYCLOAK-12749 fix "invalid state" error due to IE requesting favicon
...
Internet Explorer occasionally requests a favicon before doing the
actual redirect to localhost. This commit adds Undertow to properly
handle those unwanted requests.
2020-03-03 12:39:19 -03:00
stianst
7b1b1cd35f
Fixes
2020-03-03 10:35:38 +01:00
stianst
6978806a7e
KEYCLOAK-12285 Add support for RestEasy 4 to admin client
2020-03-03 10:35:38 +01:00
Douglas Palmer
dfb67c3aa4
[KEYCLOAK-12980] Username not updated when "Email as username" is enabled
2020-03-03 10:26:35 +01:00
Ronaldo Spido
1e0fcc4883
KEYCLOAK-13119 Fixing migration to Keycloak 2.2.0+ to correctly preserve default identity provider
2020-03-03 06:49:57 +01:00
Pedro Igor
49b1dbba68
[KEYCLOAK-11804] - Block service accounts to authenticate or manage credentials
2020-03-03 06:48:02 +01:00
Stefan Guilhen
3fa8a5aa88
[KEYCLOAK-12612][KEYCLOAK-12944] Fix validation of SAML destination URLs
...
- no longer compare them to the server absolutePath; instead use the base URI to build the validation URL
2020-03-03 06:48:02 +01:00
Hynek Mlnarik
f45f882f0c
KEYCLOAK-11903 Test for XSW attacks
2020-03-02 21:26:13 +01:00
Dmitry Telegin
08319db242
KEYCLOAK-13167 - JDBC resource leak in custom migrations
2020-03-02 21:19:07 +01:00
Martin Kanis
cec04fecc7
KEYCLOAK-12695 Upgrade to openshift-restclient-java 8.0.0.Final
2020-03-02 21:16:45 +01:00
mhajas
df11a8a864
KEYCLOAK-12606 Add test
2020-03-02 20:07:52 +01:00
Helder dos Santos Alves
1ca417c2c0
KEYCLOAK-13085 minor fixes
2020-03-02 15:06:23 -03:00
Helder dos Santos Alves
80a95eb520
KEYCLOAK-13085 pt_BR messages for login and email
2020-03-02 15:06:23 -03:00