Commit graph

11771 commits

Author SHA1 Message Date
slominskir
8dd96d6962 KEYCLOAK - 9923 - add-user-keycloak detect if Java uses modules (JDK 9+) 2019-04-09 17:34:16 -03:00
Hynek Mlnarik
a63efd872d KEYCLOAK-9822 Fix deadlock in OIDC adapter upon logout 2019-04-09 21:03:02 +02:00
Takashi Norimatsu
9b3e297cd0 KEYCLOAK-9756 PS256 algorithm support for token signing and validation 2019-04-09 20:52:02 +02:00
fisache
b4973ad7b5 [KEYCLOAK-9769] service account can't authorize when group policy exists in resource server 2019-04-09 15:23:50 -03:00
Francesco Degrassi
1bf19ada7e KEYCLOAK-9825: keep existing refresh token on token exchange requiring refresh if new one not provided in response 2019-04-09 15:21:56 -03:00
vramik
2aeda71e16 KEYCLOAK-6152 fix WAS adapter tests 2019-04-09 19:34:50 +02:00
Pedro Igor
b39cf1c736 [KEYCLOAK-9353] - Final field failing to be set when running quarkus in native mode 2019-04-09 09:49:05 -03:00
Francesco Degrassi
5b78063dce KEYCLOAK-6614: Support requesting refresh tokens from Google using access_type=offline 2019-04-08 15:06:03 -03:00
Sebastian Laskawiec
2e7f717e50 KEYCLOAK-9536 DB Allocator Plugin 2019-04-08 09:06:19 +02:00
mhajas
ccc8e06f9a KEYCLOAK-9895 Fix stability of Hawtio EAP6Fuse test 2019-04-08 08:30:31 +02:00
Pedro Igor
ad9f59f9f7 [KEYCLOAK-9353] - Avoids initialization of the policy enforcer during deployment 2019-04-05 16:02:53 -03:00
mposolda
a516a795a2 KEYCLOAK-9836 Deprecate keycloak-servlet-oauth-clien 2019-04-02 10:52:18 -03:00
Stefan Guilhen
2fa2437555 KEYCLOAK-5613 Add built-in optional client scope for MicroProfile-JWT 2019-04-02 08:40:19 -03:00
vramik
5b8b463fc0 KEYCLOAK-9814 ExportImportTest NPE 2019-04-02 13:17:58 +02:00
vramik
35fa4b878b KEYCLOAK-9712 KEYCLOAK-9911 moved Javascript adater tests and LoginModulesTest outsite of adapter package 2019-03-28 10:08:23 +01:00
Thomas Darimont
5eb9291f37 KEYCLOAK-9574 Fix broken Role Selection for LDAP Mapper in Admin-Console (#5883)
We now wrap the result of a role-selection in an JS array and
use the config value as is for rendering, instead of extracting
the first component (which was the first char, since the value
is a string).

Previously any mapper that used role selection could not be
used due to `LDAPMapperCreateCtrl` generating invalid config structures.

Since the component configuration is represented via
org.keycloak.representations.idm.ComponentRepresentation whose
`config` property is a `MultivaluedHashMap`
config values needs to be passed as an Array. However the
LDAPMapperCreateCtrl in (users.js) only passed the role as a String.

Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com>
2019-03-27 19:26:03 +01:00
rmartinc
a9a4e9daae KEYCLOAK-9884: "user-attribute-ldap-mapper" is not propagating the change of "username" (uid) attribute. 2019-03-27 19:07:51 +01:00
Mark Stickel
d5cc18b960 KEYCLOAK-9868 x5t and x5t#S256 JWK parameters 2019-03-27 19:05:57 +01:00
mhajas
c6bd293d25 KEYCLOAK-9893 Use SSL in EAP6, add / to url for EAP6 deployment 2019-03-27 14:02:03 +01:00
Hisanobu Okuda
b44c86bd26 KEYCLOAK-9833 Large SSO Session Idle/SSO Session Max causes login failure 2019-03-27 11:42:40 +01:00
Martin Ball
21e2fa8784 KEYCLOAK-4249 - Make IDP URL in keycloak-saml.xml configurable
Added the metadata url as an attribute on the IDP in the keycloak saml configuration which then propagates through to the DefaultSamlDeployment where it is used on the construction of the SamlDescriptorPublicKeyLocator thereby allowing support for ADFS or other IDP which uses a path that is different to the Keycloak IDP.

To make this work when testing with ADFS a change was made to SamlDescriptorIDPKeysExtractor because it would not extract keys from metadata which contained the EntityDescriptor as the root element. The solution was to change the xpath expression in SamlDescriptorIDPKeysExtractor so that it does not require a wrapping EntitiesDescriptor but instead loads all EntityDescriptors located in the document. This allows it to handle a single EntityDescriptor or multiple descriptors wrapped in an EntitiesDescriptor in the same xpath expression. A unit test SamlDescriptorIDPKeysExtractorTest has been added which validates that keys can be loaded in both scenarios.
2019-03-27 08:04:53 +01:00
mhajas
0d0eec8790 KEYCLOAK-9869 Fix stability of cluster tests on EAP6 2019-03-27 08:03:20 +01:00
mposolda
ad1a72ef8b KEYCLOAK-9886 remove deprecated testsuite pom.xml 2019-03-25 21:24:26 +01:00
mposolda
43aef9f2ae KEYCLOAK-9835 Remove old testsuite 2019-03-25 13:22:13 +01:00
Stan Silvert
837909fdfd KEYCLOAK-9657: Implement responsive Welcome Screen 2019-03-22 14:36:29 -03:00
Hynek Mlnarik
c3cebcae85 KEYCLOAK-9865 Update documentation in testsuite 2019-03-22 14:12:14 +01:00
vramik
b7c5ca8b38 KEYCLOAK-8535 Inconsistent SAML Logout endpoint handling 2019-03-22 14:09:31 +01:00
Pedro Igor
fe1ba7e0ef [KEYCLOAK-9250] - missing javadoc for org.keycloak.admin.client.Keycloak 2019-03-21 16:34:46 -03:00
Pedro Igor
20376c9111 [KEYCLOAK-9353] - Quarkus integration 2019-03-21 11:45:35 -03:00
Pedro Igor
d2275ca563 [KEYCLOAK-7939] - Startup logs warning instead of error when admin user already exists 2019-03-21 11:44:17 -03:00
Stan Silvert
a795bc0e3a KEYCLOAK-9659: Create readme build instructions for new account console. 2019-03-20 15:46:01 -03:00
mposolda
db271f7150 KEYCLOAK-9572 Support for multiple CRLs with X509 authentication 2019-03-20 15:00:44 +01:00
Stan Silvert
44b0f4efd3 KEYCLOAK-9656: Add linting to account management 2019-03-19 13:57:30 -03:00
Hynek Mlnarik
25c07f78bc KEYCLOAK-9578 Fix typo in SAML attribute name format 2019-03-19 11:45:38 +01:00
Hynek Mlnarik
1c906c834b KEYCLOAK-3373 Remove SAML IdP descriptor from client installation and publicize it in realm endpoint instead 2019-03-19 11:37:15 +01:00
fisache
a868b8b22a [KEYCLOAK-9772] Permissions are duplicated
- when resource server is current user
2019-03-18 16:37:54 -03:00
vramik
5808ad2de0 KEYCLOAK-9708 Enable SmallRye Health and Metrics extensions 2019-03-18 10:57:28 +01:00
stianst
8d42c9193b KEYCLOAK-9838 Trim username in admin welcome page 2019-03-18 09:20:38 +01:00
vramik
3cc405b1c5 KEYCLOAK-8542 Remove resteasy workaround - KeycloakStringEntityFilter 2019-03-16 13:53:54 +01:00
mposolda
a48698caa3 KEYCLOAK-6056 Map user by Subject Alternative Name (otherName) when authenticating user with X509 2019-03-15 23:11:47 +01:00
vramik
cf35a4648b KEYCLOAK-9780 Replace XSLT transformations by ant/CLI scripts 2019-03-15 22:18:09 +01:00
vramik
d7313d91e5 KEYCLOAK-9709 Upgrade to Wildfly 16 2019-03-15 22:18:09 +01:00
Grzegorz Grzybek
79c4d797db KEYCLOAK-9646 Fix itests for Fuse 7.3
Co-Authored-By: Hynek Mlnarik <hmlnarik@redhat.com>
2019-03-15 12:58:17 +01:00
mposolda
c5073e14f1 KEYCLOAK-8380 KEYCLOAK-8382 Cleanup some unneeded/obsolete/duplicated classes 2019-03-15 11:13:23 +01:00
Yaser Abouelenein
404ac1d050 KEYCLOAK-8701 changes needed to include x5c property in jwks 2019-03-15 06:01:15 +01:00
Axel Messinese
e18fb56389 KEYCLOAK-4978 Add endpoint to get groups by role 2019-03-15 06:00:17 +01:00
Martin Bartos RH
a3c175a21e KEYCLOAK-9348 UserStorageConsentTest fails with some databases 2019-03-15 05:58:59 +01:00
Martin Bartos RH
d0b7700c04 KEYCLOAK-8379 Migrate ModelClass: AuthenticationSessionProviderTest 2019-03-15 05:58:19 +01:00
Pedro Igor
93965512c5 [KEYCLOAK-8522] - Migrate broker tests from old to new testsuite 2019-03-15 05:57:24 +01:00
rmartinc
2602c222cd KEYCLOAK-4640: LDAP memberships are being replaced instead of being added or deleted 2019-03-14 18:40:15 +01:00