This adds support for using Jetty together with the Keycloak
spring-boot-adapter. Sadly the KeycloakSpringBootProperties.SecurityCollection
definition is mostly inspired by Tomcats SecurityConstraint/SecurityCollection
which doesn't provide a good fit for jettys structures.
In cases where jetty only allows one setting, we use the first value.
We only initialize KeycloakJettyServerCustomizer if jetty is used, same
applies for tomcat.
Revised configuration and extracted serverCustomizer code into
dedicated classes.
Prepared infrastructure for Undertow support.
Add a new keycloak.json property and mechanism to automatically
refresh access tokens if they are going to expire in less than a configurable
amount of time.
You just can add an 'adapter' option to the kc.init() function like :
kc.init({adapter: "default | cordova"});
This will allow the users to choose the adapter they want. They can force the use of the default adapter even if they are using cordova or use the cordova adapter even if they are using a regular desktop.
If you omit this parameter, it just fallback to the old way. So, if you are under cordova it will run the cordova adapter and if you are under a desktop, it will load the default adapter instead.
Hope this can help.
Previously the adapter configuration did not support specifying a proxy
for auth-server requests issued via the Apache HTTP Client by Keycloak.
This made it very difficult to connect an Application with Keycloak
that was required to use a proxy.
Introduced new `proxy-url` attribute to the adapter configuration
which makes it possible to configure a proxy to be used for auth-server
requests. Proxy-Host, Proxy-Port and Proxy-Scheme are taken from the
configured proxy URL.
Note that proxies that require authentication are currently not supported.
KEYCLOAK-2550
Typo in userguide
KEYCLOAK-1928 Kerberos working with IBM JDK
KEYCLOAK-1928 Remove sun.jdk.jgss module
KEYCLOAK-1928 Fix kerberos with adapter on JDK7
KPR-147 - Initial login scenarios around admin password - test
KEYCLOAK-2561 Fix issues with blank password
KEYCLOAK-2559 Missing add/remove button for 'Valid Redirect URIs' in a client settings form
Added simple test for JPA performance (with many users).
Fixed "re-import" operation logging.
Fixed for Timer.saveData()
Fixed for Timer.saveData()
ManyUsersTest: ArrayList --> LinkedList
Fix AbstractUserTest
Fix parentheses in login page object
Add tests for IDP initiated login
KEYCLOAK-1040
Allow import of realm keys (like we do for SAML)
KEYCLOAK-2556 Remove required for client create root url and saml endpoint
KEYCLOAK-2555 ForbiddenException when importing test realm or creating test user
KEYCLOAK-2553
Unexpected form behavior while creating a client
KEYCLOAK-2551
Broken navigation links while creating/editing a Client Mapper