author int64 658 755k | date stringdate 2012-06-12 08:34:29 2024-07-22 14:51:21 | timezone int64 -46,800 43.2k | hash stringlengths 40 40 | message stringlengths 5 490 | mods listlengths 1 16 | language stringclasses 20
values | license stringclasses 3
values | repo stringlengths 5 68 | original_message stringlengths 12 491 |
|---|---|---|---|---|---|---|---|---|---|
339,595 | 11.12.2020 19:39:01 | 21,600 | 6255ebe6b537c9502cb5ae5163704c4681fbdee3 | Implement Audit Events for Authorization Services requests | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/events/Details.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/events/Details.java",
"diff": "@@ -47,6 +47,7 @@ public interface Details {\nString REASON = \"reason\";\nString REVOKED_CLIENT = \"r... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-16536] Implement Audit Events for Authorization Services requests |
339,465 | 23.02.2021 09:55:02 | -3,600 | 6f409d088a97095fd78f38eff7dc01ed29072cdc | Reset Password Success Message not shown when Kerberos is Enabled | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/authentication/AuthenticationProcessor.java",
"new_path": "services/src/main/java/org/keycloak/authentication/AuthenticationProcessor.java",
"diff": "@@ -54,11 +54,14 @@ import org.keycloak.services.util.CacheControlUtil;\ni... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-15239 Reset Password Success Message not shown when Kerberos is Enabled |
339,202 | 05.02.2021 13:14:49 | -3,600 | 52a939f61a70b40751b058f125828a99e6096223 | Update Arquillian drone version to 2.5.2 | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/pom.xml",
"new_path": "testsuite/integration-arquillian/pom.xml",
"diff": "<!--the version of shrinkwrap_resolver should align with the version in arquillian-bom-->\n<shrinkwrap-resolver.version>3.1.4</shrinkwrap-resolver.versi... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17125 Update Arquillian drone version to 2.5.2 |
339,633 | 16.12.2020 23:26:35 | -32,400 | b83064b14207800f70474e2a7e52b59b0ca1dffb | Add algorithm settings for client assertion signature in OIDC identity broker | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/broker/oidc/AbstractOAuth2IdentityProvider.java",
"new_path": "services/src/main/java/org/keycloak/broker/oidc/AbstractOAuth2IdentityProvider.java",
"diff": "@@ -438,14 +438,16 @@ public abstract class AbstractOAuth2Identity... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16679 Add algorithm settings for client assertion signature in OIDC identity broker |
339,462 | 16.02.2021 09:04:14 | -3,600 | 197b34889c3e57f53eacdc4a7b2c26ff6c890c50 | Fix reset password MS AD LDS mapper | [
{
"change_type": "MODIFY",
"old_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/msadlds/MSADLDSUserAccountControlStorageMapper.java",
"new_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/msadlds/MSADLDSUserAccountControlStorageMapper.java",
"diff": "@@... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17146 : Fix reset password MS AD LDS mapper |
339,479 | 02.03.2021 08:52:44 | 0 | 78754d112719c4075f4b37edaded0bc0bee17091 | Add a method to check if the introspection request has duplicate parameters | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenIntrospectionEndpoint.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenIntrospectionEndpoint.java",
"diff": "@@ -81,6 +81,9 @@ public class TokenIntrospectionE... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17259 Add a method to check if the introspection request has duplicate parameters |
339,414 | 13.10.2020 12:23:59 | -7,200 | 23bfaef4bb9482914fe3a980091496b9f379759a | Account Log of user login with realm not available details when update profile | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/events/Details.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/events/Details.java",
"diff": "@@ -37,6 +37,12 @@ public interface Details {\nString IDENTITY_PROVIDER_USERNAME = \"identity_provider... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-15535 Account Log of user login with realm not available details when update profile |
339,399 | 04.03.2021 02:49:12 | 21,600 | b122f31d2ccb08390456ef9b54f6164624b0bf80 | Fix NPEs when user storage doesn't implement the CredentialInputValidator interface | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/credential/UserCredentialStoreManager.java",
"new_path": "services/src/main/java/org/keycloak/credential/UserCredentialStoreManager.java",
"diff": "@@ -255,7 +255,7 @@ public class UserCredentialStoreManager extends Abstract... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17257 Fix NPEs when user storage doesn't implement the CredentialInputValidator interface |
339,494 | 03.03.2021 06:01:39 | -3,600 | 8203c4451effd67b48af691e40c3df16829ac700 | Removed setting default password for LDAPRule configuration | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/util/LDAPRule.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/util/LDAPRule.java",
"diff": "@@ -227,9 +227,6 @@ public class L... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-14766 - Removed setting default password for LDAPRule configuration |
339,465 | 04.03.2021 11:19:05 | -3,600 | 99c1ee7f5a1efaecde88e982674ff8d0ec03c959 | KEYCLOAK-16948 Cors on error responses for logoutEndpoint and tokenEndpoint | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/LogoutEndpoint.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/LogoutEndpoint.java",
"diff": "@@ -43,6 +43,7 @@ import org.keycloak.protocol.oidc.utils.RedirectUtils;\n... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16793 KEYCLOAK-16948 Cors on error responses for logoutEndpoint and tokenEndpoint |
339,179 | 16.02.2021 15:03:52 | -3,600 | fc29a39e5a6e56e77e05ec2587de41d929191ee9 | Do not require destination with SOAP binding | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/broker/saml/SAMLEndpoint.java",
"new_path": "services/src/main/java/org/keycloak/broker/saml/SAMLEndpoint.java",
"diff": "@@ -240,6 +240,10 @@ public class SAMLEndpoint {\nprotected abstract SAMLDocumentHolder extractRequest... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16592 Do not require destination with SOAP binding |
339,281 | 05.03.2021 22:06:25 | -3,600 | 2c64a5607284bfd87d22a96210a43ad991f1bf01 | Use KeycloakMarshallUtil for writing collection for LockEntryPredicate | [
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/cluster/infinispan/LockEntryPredicate.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/cluster/infinispan/LockEntryPredicate.java",
"diff": "package org.keycloak.cluster.infinispan;\nimport org.infinis... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17325 Use KeycloakMarshallUtil for writing collection for LockEntryPredicate |
339,133 | 08.03.2021 15:05:51 | -3,600 | ef57714eaa1e2b275962ed3e9a2244d963a38497 | fix -> added org.infinispan.commons module into jboss-deployment-structure.xml | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/resources/jboss-deployment-structure.xml",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/resources/jboss-deployment-structure.xml",
"diff": "<module name=\"org.keycloak.keycloak-model-jpa... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17301 - fix -> added org.infinispan.commons module into jboss-deployment-structure.xml |
339,479 | 04.03.2021 16:39:47 | -32,400 | 2605eddbe710f8e32b71aa3af1479b64dcb80c9a | Add a method to check if the token revocation request has duplicate parameters | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenRevocationEndpoint.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenRevocationEndpoint.java",
"diff": "@@ -99,6 +99,8 @@ public class TokenRevocationEndpoint {... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17300 Add a method to check if the token revocation request has duplicate parameters |
339,133 | 04.03.2021 15:51:10 | -3,600 | b3ea6f74beb2bb0fa625e0cd438ce72bb97ff465 | Exclude Remote execution for the LDAPVaultCredentialsTest, fixed broken exclude Remote execution for the LDAPUserLoginTest. | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/federation/ldap/LDAPUserLoginTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/federation/ldap/LDAPUserLoginTest.java",
"di... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16212 - Exclude Remote execution for the LDAPVaultCredentialsTest, fixed broken exclude Remote execution for the LDAPUserLoginTest. |
339,202 | 09.03.2021 13:07:02 | -3,600 | 95d9cd2b380a3dee423dc2f19d589e3c678c0026 | Fix DeviceActivityTest, SigningInTest and PermissionsTest | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/other/base-ui/src/test/java/org/keycloak/testsuite/ui/account2/PermissionsTest.java",
"new_path": "testsuite/integration-arquillian/tests/other/base-ui/src/test/java/org/keycloak/testsuite/ui/account2/PermissionsTest.java",
... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17376 - Fix DeviceActivityTest, SigningInTest and PermissionsTest |
339,687 | 09.03.2021 13:21:27 | -3,600 | 1d54dd5e8befc2117a8b641ddd223a45b90b6794 | Fixed Spring Boot tests with new offset value. | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/other/springboot-tests/src/test/java/org/keycloak/testsuite/springboot/OfflineTokenSpringBootTest.java",
"new_path": "testsuite/integration-arquillian/tests/other/springboot-tests/src/test/java/org/keycloak/testsuite/springbo... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16006. Fixed Spring Boot tests with new offset value. |
339,185 | 11.03.2021 09:35:37 | -3,600 | 4946484cb6b5b99440e8087851a9cde1e40feaf5 | Fix invalidation cluster tests (do not hide failures) | [
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/connections/infinispan/DefaultInfinispanConnectionProviderFactory.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/connections/infinispan/DefaultInfinispanConnectionProviderFactory.java",
"diff": "@@ -... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17377 Fix invalidation cluster tests (do not hide failures) |
339,479 | 08.03.2021 09:23:51 | -32,400 | db30b470c40199213593b1097dd0e929e231f47c | Make the default value of default signature algorithm show up in the admin console | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/models/Constants.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/models/Constants.java",
"diff": "@@ -62,6 +62,7 @@ public final class Constants {\n// KEYCLOAK-7688 Offline Session Max for Offline... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17342 Make the default value of default signature algorithm show up in the admin console |
339,198 | 11.03.2021 10:44:04 | -3,600 | d2c98b20f3a67f46f6cf2b97659b46a79c58b614 | LDAPS connection tests not working when protocol set in upper case | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/models/LDAPConstants.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/models/LDAPConstants.java",
"diff": "@@ -163,7 +163,7 @@ public class LDAPConstants {\n} else if (useTruststoreSpi != null && u... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17404: LDAPS connection tests not working when protocol set in upper case |
339,273 | 01.03.2021 08:59:27 | -3,600 | 82fc4012983ea3f6dc2a24f157ab7ced57150465 | use LDAPUser UUID as an identifier instead of username | [
{
"change_type": "MODIFY",
"old_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/LDAPStorageProvider.java",
"new_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/LDAPStorageProvider.java",
"diff": "@@ -486,7 +486,10 @@ public class LDAPStorageProvider implements UserSto... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-9841] use LDAPUser UUID as an identifier instead of username |
339,465 | 11.03.2021 16:28:45 | -3,600 | 853a6d73276849877819f2dc23133557f6e1e601 | Adding server tmp directory inside the auth-server home directory | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/configuration/KeycloakConfigSourceProvider.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/configuration/KeycloakConfigSourceProvider.java",
"diff": "@@ -28,6 +28,7 @@ import java.util.List;\nimport org... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17000 Adding server tmp directory inside the auth-server home directory |
339,663 | 22.03.2021 11:18:10 | -3,600 | 6e3dbfcb3dc4632f111415390b749a6017e324ba | Fix typo in 'applicationName' | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources-community/theme/base/account/messages/messages_fr.properties",
"new_path": "themes/src/main/resources-community/theme/base/account/messages/messages_fr.properties",
"diff": "@@ -165,7 +165,7 @@ invalidPasswordNotUsernameMessage=Mot de... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16660 Fix typo in 'applicationName' |
339,203 | 23.10.2020 18:58:15 | -7,200 | b3ee471e11e2bfdc668d902a336745c029e95d86 | refactor(tomcat-adapter-spi): remove usage of java.security.acl.Group to make jdk 15 possible | [
{
"change_type": "MODIFY",
"old_path": "adapters/spi/tomcat-adapter-spi/src/main/java/org/keycloak/adapters/tomcat/GenericPrincipalFactory.java",
"new_path": "adapters/spi/tomcat-adapter-spi/src/main/java/org/keycloak/adapters/tomcat/GenericPrincipalFactory.java",
"diff": "@@ -22,13 +22,7 @@ import ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-13633 refactor(tomcat-adapter-spi): remove usage of java.security.acl.Group to make jdk 15 possible
Signed-off-by: Phillip Schichtel <phillip@schich.tel> |
339,203 | 29.10.2020 14:02:06 | -3,600 | 52db22925c9302ae0c4d86bb9e97fd853ba912a3 | refactor(tomcat-adapter-spi): change to specific imports instead of star import | [
{
"change_type": "MODIFY",
"old_path": "adapters/spi/tomcat-adapter-spi/src/main/java/org/keycloak/adapters/tomcat/GenericPrincipalFactory.java",
"new_path": "adapters/spi/tomcat-adapter-spi/src/main/java/org/keycloak/adapters/tomcat/GenericPrincipalFactory.java",
"diff": "@@ -22,7 +22,11 @@ import ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-13633 refactor(tomcat-adapter-spi): change to specific imports instead of star import |
339,575 | 13.01.2021 22:09:33 | -3,600 | f754b34c0c76718270f6b2265fc459289c35deb6 | Generalize GenericPrincipalFactory to PrincipleFactory
This allows to replace java.security.acl.Group usage only where necessary while keeping legacy adapter unchanged. | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/as7-eap6/as7-adapter-spi/src/main/java/org/keycloak/adapters/jbossweb/JBossWebPrincipalFactory.java",
"new_path": "adapters/oidc/as7-eap6/as7-adapter-spi/src/main/java/org/keycloak/adapters/jbossweb/JBossWebPrincipalFactory.java",
"diff": "@@ -27... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-13633 Generalize GenericPrincipalFactory to PrincipleFactory
This allows to replace java.security.acl.Group usage only where necessary while keeping legacy adapter unchanged.
Signed-off-by: Phillip Schichtel <phillip@schich.tel> |
339,571 | 14.03.2021 11:43:17 | -3,600 | 5fac80b05e7d930b686083c9f53aa49f892bbbfe | Testsuite Wildfly initialization error on Windows
Java CLASSPATH is wrongly parsed on Windows | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/AuthServerTestEnricher.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/AuthServerTestEnricher.java",
"di... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-17100] Testsuite Wildfly initialization error on Windows
[KEYCLOAK-17392] Java CLASSPATH is wrongly parsed on Windows
Signed-off-by: Jan Lieskovsky <jlieskov@redhat.com>
Co-Authored-By: Peter Zaoral <pzaoral@redhat.com> |
339,615 | 26.03.2021 12:13:44 | -7,200 | a60cb65252aec21ea1899a73d5fc136ae5058383 | Enlist the EventListenerTransaction with the Keycloak Transaction Manager | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/events/email/EmailEventListenerProvider.java",
"new_path": "services/src/main/java/org/keycloak/events/email/EmailEventListenerProvider.java",
"diff": "@@ -50,6 +50,8 @@ public class EmailEventListenerProvider implements Eve... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17444 Enlist the EventListenerTransaction with the Keycloak Transaction Manager |
339,156 | 12.02.2021 16:32:24 | -7,200 | ec5c25656266aa88ca8d9a8bb017497792099ade | Support for transient NameIDPolicy and AllowCreate in SAML IdP | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/broker/saml/SAMLIdentityProvider.java",
"new_path": "services/src/main/java/org/keycloak/broker/saml/SAMLIdentityProvider.java",
"diff": "@@ -130,6 +130,9 @@ public class SAMLIdentityProvider extends AbstractIdentityProvider... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-5657 Support for transient NameIDPolicy and AllowCreate in SAML IdP |
339,571 | 30.03.2021 13:02:31 | -7,200 | 07ea524433bf260c31d811d780355d1b00bf8b16 | Fix:
$ git diff --name-only HEAD^
fatal: ambiguous argument 'HEAD^': unknown revision or path not in the working tree.
Use '--' to separate paths from revisions, like this:
'git <command> [<revision>...] -- [<file>...]'
GHA failure on 'Test Clustering on Wildfly' phase. See e.g. recent: | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/ci.yml",
"new_path": ".github/workflows/ci.yml",
"diff": "@@ -187,6 +187,8 @@ jobs:\nruns-on: ubuntu-latest\nsteps:\n- uses: actions/checkout@v2\n+ with:\n+ fetch-depth: 2\n- name: Check whether this phase should run\nrun: echo \"GIT_DIFF=$[ ... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-17326] Fix:
$ git diff --name-only HEAD^
fatal: ambiguous argument 'HEAD^': unknown revision or path not in the working tree.
Use '--' to separate paths from revisions, like this:
'git <command> [<revision>...] -- [<file>...]'
GHA failure on 'Test Clustering on Wildfly' phase. See e.g. recent:
https://github.com/keycloak/keycloak/pull/7705/checks?check_run_id=2023996258
Signed-off-by: Jan Lieskovsky <jlieskov@redhat.com> |
339,687 | 06.04.2021 09:03:04 | -7,200 | 5f551e018d672b93f2570b8e5f32cf04448cca8d | Disabled test in remote environment. | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/UserTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/UserTest.java",
"diff": "@@ -1104,7 +1104,7 @@ public cla... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17310. Disabled test in remote environment. (#7898) |
339,281 | 30.03.2021 20:16:51 | -7,200 | d1ad905407e3f8be9a206bbdfa3bde9fa0db21b8 | fix MultiVersionClusterTest.verifyFailureOn* tests | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/migration/cluster/MultiVersionClusterTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/migration/cluster/MultiVersionClusterTes... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17640 fix MultiVersionClusterTest.verifyFailureOn* tests |
339,511 | 07.04.2021 13:25:58 | -32,400 | 7b227ae47c7b9fa3bd9db40a7d4eb70614b574d8 | Client Policy - Executor : Limiting available period of Request Object | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureRequestObjectExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureRequestObjectExecutor.java",
"diff": "@@ -125,6 +125,25 @@ public class ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17666 Client Policy - Executor : Limiting available period of Request Object |
339,443 | 25.03.2021 16:41:33 | -3,600 | a48d04bfe0982a60e9506696aaf4a43323092da8 | save attributes when role is created (with REST POST request)
add missing mapping code to RoleContainerResource#createRole
extend ClientRolesTest and RealmRolesTest to check that now the attributes are saved when a role is created
remove no longer needed code which updated roles because attributes were not saved on creation | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/admin/RoleContainerResource.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/admin/RoleContainerResource.java",
"diff": "@@ -53,6 +53,7 @@ import javax.ws.rs.core.MediaType;\nimpo... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16082 save attributes when role is created (with REST POST request)
- add missing mapping code to RoleContainerResource#createRole
- extend ClientRolesTest and RealmRolesTest to check that now the attributes are saved when a role is created
- remove no longer needed code which updated roles because attributes were not saved on creation |
339,511 | 08.04.2021 09:11:21 | -32,400 | e9035bb7b34fb305f03d419bbae7520a16424bdb | Client Policy - Executor : Limiting available period of Request Object with its configuration | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureRequestObjectExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureRequestObjectExecutor.java",
"diff": "@@ -19,6 +19,7 @@ package org.keyc... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17681 Client Policy - Executor : Limiting available period of Request Object with its configuration |
339,511 | 07.04.2021 17:35:42 | -32,400 | 322170849947161624c6256bf0f48582f1525866 | Client Policy - Executor : Only Accept Confidential Client | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/ConfidentialClientAcceptExecutor.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17667 Client Policy - Executor : Only Accept Confidential Client |
339,511 | 08.04.2021 11:20:53 | -32,400 | 8b0b657a8f03e3df7776b3d627860336d4d7e46f | Client Policy - Executor : remove inner config class for executor without any config | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureRedirectUriEnforceExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureRedirectUriEnforceExecutor.java",
"diff": "@@ -32,8 +32,6 @@ import... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17682 Client Policy - Executor : remove inner config class for executor without any config |
339,202 | 30.03.2021 13:03:14 | -7,200 | 2f0f99c20488f9b68a58782ece02bf419cfad02b | Fix DefaultRolesTest | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/other/console/src/main/java/org/keycloak/testsuite/console/page/roles/RoleCompositeRoles.java",
"new_path": "testsuite/integration-arquillian/tests/other/console/src/main/java/org/keycloak/testsuite/console/page/roles/RoleCom... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17619 - Fix DefaultRolesTest |
339,202 | 30.03.2021 13:23:16 | -7,200 | cd342ad5714f15db1cc8b0cd55b788e6543c6dc8 | Fix ClientClientScopesTest | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/other/console/src/test/java/org/keycloak/testsuite/console/clients/ClientClientScopesTest.java",
"new_path": "testsuite/integration-arquillian/tests/other/console/src/test/java/org/keycloak/testsuite/console/clients/ClientCli... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17620 - Fix ClientClientScopesTest |
339,235 | 07.04.2021 16:39:03 | -7,200 | a09142c43a9a1986be38b7f89eb2dc689d6aaa36 | Fix getting client scope by name resulting in listing clients | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/models/utils/KeycloakModelUtils.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/models/utils/KeycloakModelUtils.java",
"diff": "@@ -714,10 +714,7 @@ public final class KeycloakModelUtils {\n.filte... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17678 Fix getting client scope by name resulting in listing clients |
339,179 | 12.04.2021 13:45:09 | -7,200 | 64ccbda5d552ff1ffaf435255a8b43d66a5fe2af | Compute token expiration using Time.currentTime() instead of userSession.getStarted() | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/TokenManager.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/TokenManager.java",
"diff": "@@ -763,7 +763,7 @@ public class TokenManager {\n}\nif (clientSessionMaxLifespan > 0) {\n- int cli... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17323 Compute token expiration using Time.currentTime() instead of userSession.getStarted() |
339,633 | 14.03.2021 13:44:12 | -32,400 | ada7f3743089f070d53dab39607fc1cb0742afbd | Set custom user attribute to Name ID Format for a SAML client | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/saml/SamlProtocol.java",
"new_path": "services/src/main/java/org/keycloak/protocol/saml/SamlProtocol.java",
"diff": "@@ -49,8 +49,10 @@ import org.keycloak.models.UserSessionModel;\nimport org.keycloak.protocol.Logi... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16918 Set custom user attribute to Name ID Format for a SAML client
https://issues.redhat.com/browse/KEYCLOAK-16918
Co-authored-by: Michal Hajas <mhajas@redhat.com> |
339,351 | 20.04.2021 20:19:15 | -7,200 | 30e735dd250c2c22596cb5ff81ca7ad1af5f0d21 | fix TypeScript definition of createAccountUrl parameter | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/js/src/main/resources/keycloak.d.ts",
"new_path": "adapters/oidc/js/src/main/resources/keycloak.d.ts",
"diff": "@@ -249,6 +249,13 @@ declare namespace Keycloak {\ninterface KeycloakRegisterOptions extends Omit<KeycloakLoginOptions, 'action'> { }\... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17684: fix TypeScript definition of createAccountUrl parameter (#7917) |
339,511 | 21.04.2021 10:03:23 | -32,400 | 190b60c5cd46535a8ee14162bb2c1e3c14f914cb | Client Policy - Condition : Client - Client Host : Removing Option | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/condition/ClientUpdateSourceHostsCondition.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/condition/ClientUpdateSourceHostsCondition.java",
"diff": "@@ -74,8 +74,6 @@ publ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17827 Client Policy - Condition : Client - Client Host : Removing Option |
339,185 | 16.04.2021 19:48:57 | -7,200 | ff4c0e4412425ae25698b0ec7bd4fc491fa4a2b6 | Fix liquibase to work with MySQL 8.0.23+ | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/LiquibaseJpaUpdaterProvider.java",
"new_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/LiquibaseJpaUpdaterProvider.java",
"diff": "@@ -44,6 +44,7 @@ import o... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16935 Fix liquibase to work with MySQL 8.0.23+ |
339,550 | 20.04.2021 08:20:22 | -32,400 | fa6903a1b54a1f74cad0fc9f3e7007a9e757884a | Adding default clustering configuration for Azure and GCP
to help message | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/configuration/PropertyMappers.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/configuration/PropertyMappers.java",
"diff": "@@ -143,7 +143,7 @@ public final class PropertyMappers {\ncreateWithDefault(\"... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17820 Adding default clustering configuration for Azure and GCP
to help message |
339,132 | 07.04.2021 00:10:38 | -7,200 | 5d3f80ab5745fb0229459fa47d824ef8ae241d1d | Add query parameter support for Spring | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/spring-security/src/main/java/org/keycloak/adapters/springsecurity/authentication/KeycloakAuthenticationEntryPoint.java",
"new_path": "adapters/oidc/spring-security/src/main/java/org/keycloak/adapters/springsecurity/authentication/KeycloakAuthenticat... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17665 Add query parameter support for Spring |
339,177 | 28.03.2021 10:56:10 | -7,200 | ae9df51438fe0186b623281c47c3e07ad991a2a4 | Missing french translation for loginAccountTitle | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources-community/theme/base/login/messages/messages_fr.properties",
"new_path": "themes/src/main/resources-community/theme/base/login/messages/messages_fr.properties",
"diff": "@@ -16,6 +16,7 @@ kerberosNotConfiguredTitle=Kerberos non config... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17608 Missing french translation for loginAccountTitle |
339,189 | 21.04.2021 08:47:15 | -7,200 | 455e93856c60a9c6dc641a2a33ed1283e8a6daf7 | Unnessary calls to session.users().getUserById in DefaultBruteForceProtector | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/managers/DefaultBruteForceProtector.java",
"new_path": "services/src/main/java/org/keycloak/services/managers/DefaultBruteForceProtector.java",
"diff": "@@ -103,10 +103,6 @@ public class DefaultBruteForceProtector i... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17829
Unnessary calls to session.users().getUserById in DefaultBruteForceProtector |
339,701 | 30.03.2021 14:01:49 | -7,200 | 8255cba930196a53d0274be3a1f22b7e39df9c4f | KEYCLOAK-17612- Invalid SAML Response : Invalid Destination | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/broker/saml/SAMLEndpoint.java",
"new_path": "services/src/main/java/org/keycloak/broker/saml/SAMLEndpoint.java",
"diff": "@@ -67,8 +67,8 @@ import org.keycloak.saml.processing.core.saml.v2.util.AssertionUtil;\nimport org.key... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17612- Invalid SAML Response : Invalid Destination |
339,281 | 13.04.2021 22:23:48 | -7,200 | 162043beecdb155877bc27470add60040b4827f9 | Move database initialization from KeycloakApplication to JpaConnectionProviderFactory | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/ci.yml",
"new_path": ".github/workflows/ci.yml",
"diff": "@@ -160,7 +160,7 @@ jobs:\nrun: |\ndeclare -A PARAMS TESTGROUP\nPARAMS[\"quarkus\"]=\"-Pauth-server-quarkus\"\n- PARAMS[\"undertow-map\"]=\"-Pauth-server-undertow -Dkeycloak.client.pro... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17615 Move database initialization from KeycloakApplication to JpaConnectionProviderFactory |
339,281 | 28.04.2021 13:47:08 | -7,200 | de79493294874b9623a4f3fb6d7b20b75e18c0b8 | Add maven profile for map storage | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/ci.yml",
"new_path": ".github/workflows/ci.yml",
"diff": "@@ -160,7 +160,7 @@ jobs:\nrun: |\ndeclare -A PARAMS TESTGROUP\nPARAMS[\"quarkus\"]=\"-Pauth-server-quarkus\"\n- PARAMS[\"undertow-map\"]=\"-Pauth-server-undertow -Dkeycloak.client.pro... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17896 Add maven profile for map storage |
339,571 | 19.04.2021 18:33:59 | -7,200 | 9a76ccce86d988ce695d68c68ff9846f2cfbec77 | Upgrade Keycloak to Wildfly 23.0.1.Final / Wildfly Core 15.0.1.Final
Return the versions of Wildfly deprecated module in the Arquillian
testsuite to those defined by Wildfly 21 | [
{
"change_type": "MODIFY",
"old_path": "pom.xml",
"new_path": "pom.xml",
"diff": "<product.rhsso.version>7.4.0.GA</product.rhsso.version>\n<product.build-time>${timestamp}</product.build-time>\n- <wildfly.version>23.0.0.Final</wildfly.version>\n+ <wildfly.version>23.0.1.Final</wildfly.version>\n<wil... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-17818] Upgrade Keycloak to Wildfly 23.0.1.Final / Wildfly Core 15.0.1.Final
[KEYCLOAK-17227] Return the versions of Wildfly deprecated module in the Arquillian
testsuite to those defined by Wildfly 21
Signed-off-by: Jan Lieskovsky <jlieskov@redhat.com> |
339,418 | 05.03.2021 16:45:19 | -3,600 | b75648bda2018345f6ea7f6d28da83c2f1e57990 | Evaluate ID-Token and UserInfo-Endpoint:
add additional REST endpoints for evaluation:
- for ID Token: GET /realm/clients/id/evaluate-scopes/generate-example-id-token
- for UserInfo-Endpoint: GET /realm/clients/id/evaluate-scopes/generate-example-userinfo
extend UI: add additional tabs "Generated ID Token" and "Generated User Info" to the client scopes evaluation screen | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/TokenManager.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/TokenManager.java",
"diff": "package org.keycloak.protocol.oidc;\n+import java.util.HashMap;\nimport org.jboss.logging.Logger;\... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17284 Evaluate ID-Token and UserInfo-Endpoint:
- add additional REST endpoints for evaluation:
- for ID Token: GET /realm/clients/id/evaluate-scopes/generate-example-id-token
- for UserInfo-Endpoint: GET /realm/clients/id/evaluate-scopes/generate-example-userinfo
- extend UI: add additional tabs "Generated ID Token" and "Generated User Info" to the client scopes evaluation screen
Co-authored-by: Daniel Fesenmeyer <daniel.fesenmeyer@bosch.io> |
339,185 | 26.04.2021 09:53:33 | -7,200 | df4f88a0c8c7c05b524322f9852624f90d4e863b | Fix non-existent work cache configuration | [
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/connections/infinispan/DefaultInfinispanConnectionProviderFactory.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/connections/infinispan/DefaultInfinispanConnectionProviderFactory.java",
"diff": "@@ -... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17869 Fix non-existent work cache configuration |
339,185 | 26.04.2021 10:43:57 | -7,200 | 3e91e6f966f0d61783614e2b8ae0852d83af44f6 | Fix ConcurrentModificationException upon liquibase initialization | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/conn/DefaultLiquibaseConnectionProvider.java",
"new_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/conn/DefaultLiquibaseConnectionProvider.java",
"diff": "@@... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17870 Fix ConcurrentModificationException upon liquibase initialization |
339,185 | 26.04.2021 10:49:08 | -7,200 | 7d4255b2a15a487e937122bf942bd99fa4b564c7 | Add support for running parallel model tests | [
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/initializer/InfinispanCacheInitializer.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/initializer/InfinispanCacheInitializer.java",
"diff": "@@ -... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17871 Add support for running parallel model tests |
339,364 | 27.04.2021 17:44:08 | -7,200 | 315b9e3c2970145e03dfaaddc364d588c9ebf060 | Account Permanent Lockout and login error messages | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/services/managers/BruteForceProtector.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/services/managers/BruteForceProtector.java",
"diff": "@@ -28,9 +28,21 @@ import org.keycloak.provider.Provider... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17835 Account Permanent Lockout and login error messages |
339,364 | 28.04.2021 17:23:33 | -7,200 | 5a33ec2244a077880febca9b1afd21be9bce2a35 | disabledReason as read-only attribute, AuthenticatorUtils | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/authentication/authenticators/browser/AbstractUsernameFormAuthenticator.java",
"new_path": "services/src/main/java/org/keycloak/authentication/authenticators/browser/AbstractUsernameFormAuthenticator.java",
"diff": "@@ -34,1... | Java | Apache License 2.0 | keycloak/keycloak | disabledReason as read-only attribute, AuthenticatorUtils |
339,442 | 30.04.2021 16:01:02 | -7,200 | ee315ecab18cc0332c4816c8f46f99ffc7ea2b4e | * fixed cache inconsistency when cache limit is exceeded | [
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/CacheManager.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/CacheManager.java",
"diff": "@@ -101,6 +101,12 @@ public abstract class CacheManager {\nif ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17934 * fixed cache inconsistency when cache limit is exceeded |
339,281 | 04.05.2021 09:24:46 | -7,200 | b4c85c83e6c7231e9a7aa02488beae0087225366 | AccountBrokerTest fails with SocketTimeoutException in GHA / map | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/ci.yml",
"new_path": ".github/workflows/ci.yml",
"diff": "@@ -160,7 +160,7 @@ jobs:\nrun: |\ndeclare -A PARAMS TESTGROUP\nPARAMS[\"quarkus\"]=\"-Pauth-server-quarkus\"\n- PARAMS[\"undertow-map\"]=\"-Pauth-server-undertow -Pmap-storage\"\n+ PA... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17944 AccountBrokerTest fails with SocketTimeoutException in GHA / map |
339,364 | 13.04.2021 17:28:34 | -7,200 | f2c08e9b8fd97e237f07edf575044bfb954a8e0a | Run QS tests with each PR in the Keycloak repo | [
{
"change_type": "ADD",
"old_path": null,
"new_path": ".github/scripts/quickstarts/prepare-server.sh",
"diff": "+#!/bin/bash -e\n+\n+VERSION=$(mvn -q -Dexec.executable=echo -Dexec.args='${project.version}' --non-recursive exec:exec -f keycloak)\n+\n+unzip ~/.m2/repository/org/keycloak/keycloak-serve... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17743 Run QS tests with each PR in the Keycloak repo |
339,364 | 30.04.2021 16:25:28 | -7,200 | 57fca2a34f6feb61292538c4fa3ee0bb69b51263 | Reset password link is not invalidated if email address is changed | [
{
"change_type": "RENAME",
"old_path": "services/src/main/java/org/keycloak/authentication/actiontoken/AbstractActionTokenHander.java",
"new_path": "services/src/main/java/org/keycloak/authentication/actiontoken/AbstractActionTokenHandler.java",
"diff": "package org.keycloak.authentication.actiontok... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-15170 Reset password link is not invalidated if email address is changed |
339,281 | 04.05.2021 20:49:29 | -7,200 | 0cecd0f33f6c4af46924d5a1284519e0606b2993 | MSSQL not updatable | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/resources/META-INF/jpa-changelog-13.0.0.xml",
"new_path": "model/jpa/src/main/resources/META-INF/jpa-changelog-13.0.0.xml",
"diff": "<dropForeignKeyConstraint baseTableName=\"KEYCLOAK_GROUP\" constraintName=\"FK_GROUP_REALM\"/>\n</changeSet>... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17992 MSSQL not updatable |
339,465 | 27.04.2021 18:21:33 | -7,200 | 20fc430be0a7f1a5765dbd067a1dffe3da3cb2dc | Server cannot be started with oracle19cRAC | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/resources/META-INF/jpa-changelog-13.0.0.xml",
"new_path": "model/jpa/src/main/resources/META-INF/jpa-changelog-13.0.0.xml",
"diff": "</changeSet>\n<changeSet author=\"keycloak\" id=\"json-string-accomodation\">\n- <modifyDataType tableName=\... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17874 Server cannot be started with oracle19cRAC |
339,139 | 28.04.2021 14:41:40 | -36,000 | e73c6103cfc25c2a4eb3f04c844d527ae73e3c68 | This reverts - Do not create keys during startup but on-demand
Restoring the original realm key provisioning process due to undesirable behaviour when using
on demand provisoning under load (duplicate keys created). | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/managers/ApplianceBootstrap.java",
"new_path": "services/src/main/java/org/keycloak/services/managers/ApplianceBootstrap.java",
"diff": "@@ -26,6 +26,7 @@ import org.keycloak.models.RealmModel;\nimport org.keycloak.... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17888 This reverts [KEYCLOAK-14299] - Do not create keys during startup but on-demand
Restoring the original realm key provisioning process due to undesirable behaviour when using
on demand provisoning under load (duplicate keys created). |
339,571 | 30.04.2021 15:44:56 | -7,200 | a41f5c390da71f3254beb666ee0ad35db31563bc | Upgrade Keycloak to Wildfly 23.0.2.Final | [
{
"change_type": "MODIFY",
"old_path": "distribution/galleon-feature-packs/adapter-galleon-pack/pom.xml",
"new_path": "distribution/galleon-feature-packs/adapter-galleon-pack/pom.xml",
"diff": "<properties>\n<feature-pack.resources.directory>${basedir}/../../feature-packs/adapter-feature-pack/src/ma... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-17933] Upgrade Keycloak to Wildfly 23.0.2.Final
Signed-off-by: Jan Lieskovsky <jlieskov@redhat.com> |
339,343 | 05.05.2021 15:33:10 | -7,200 | b2ed99c70d3be181b423a412d8bdc79c1f8110e8 | Fix typo in authenticatorFlow representation | [
{
"change_type": "MODIFY",
"old_path": "core/src/main/java/org/keycloak/representations/idm/AbstractAuthenticationExecutionRepresentation.java",
"new_path": "core/src/main/java/org/keycloak/representations/idm/AbstractAuthenticationExecutionRepresentation.java",
"diff": "@@ -67,11 +67,27 @@ public c... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16928 Fix typo in authenticatorFlow representation |
339,511 | 02.05.2021 09:58:38 | -32,400 | b78d151a232e5d538e359792397f8f9064f53ed3 | Client Policy : Implement existing ConsentRequiredClientRegistrationPolicy as Client Policies' executor | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/ConsentRequiredExecutor.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licens... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16808 Client Policy : Implement existing ConsentRequiredClientRegistrationPolicy as Client Policies' executor
Co-authored-by: Andrii Murashkin <amu@adorsys.com.ua> |
339,511 | 04.05.2021 19:57:33 | -32,400 | 0a4fdc64f309d294b1bbcc6d1ede1eaacb657a43 | SecureSigningAlgorithmForSignedJwtEnforceExecutor polishing for FAPI | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureSigningAlgorithmForSignedJwtEnforceExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureSigningAlgorithmForSignedJwtEnforceExecutor.java",
... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17929 SecureSigningAlgorithmForSignedJwtEnforceExecutor polishing for FAPI |
339,281 | 05.05.2021 16:29:12 | -7,200 | 020dd530b9333a98d29aa9866e3cf7ac40514732 | Invalid role creation with oracle database | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProvider.java",
"new_path": "model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProvider.java",
"diff": "@@ -245,9 +245,9 @@ public class JpaRealmProvider implements RealmProvider, ClientProvider, Cl... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18009 Invalid role creation with oracle database |
339,185 | 20.04.2021 13:17:14 | -7,200 | 93feae104b5d2e5e5f2af111800dfa0f410537c6 | Unify registerEntityForChanges | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/authSession/MapRootAuthenticationSessionProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/authSession/MapRootAuthenticationSessionProvider.java",
"diff": "@@ -23,7 +23,6 @@ import org.k... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16127 Unify registerEntityForChanges |
339,185 | 20.04.2021 15:19:16 | -7,200 | 253dee077e35f9c1dd3ef5f37ab7203513bcf6be | Fix realm Map*Entity to/fromModel | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/realm/entity/MapAuthenticatorConfigEntity.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/realm/entity/MapAuthenticatorConfigEntity.java",
"diff": "@@ -40,7 +40,7 @@ public class MapAuthentica... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17830 Fix realm Map*Entity to/fromModel |
339,185 | 04.05.2021 10:01:33 | -7,200 | 98a88e3e8bdc66889af53943ad64eeb0e8277a93 | Introduce preview feature for map storage | [
{
"change_type": "MODIFY",
"old_path": "common/src/main/java/org/keycloak/common/Profile.java",
"new_path": "common/src/main/java/org/keycloak/common/Profile.java",
"diff": "@@ -55,7 +55,8 @@ public class Profile {\nUPLOAD_SCRIPTS(DEPRECATED),\nWEB_AUTHN(Type.DEFAULT, Type.PREVIEW),\nCLIENT_POLICIES... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17991 Introduce preview feature for map storage |
339,179 | 05.05.2021 12:30:22 | -7,200 | e7821bb67b2b622b661c260dcbbba87f0948ec8b | Add a warning to standalone migration scripts to perform a manual migration script if needed + fix test failures when migrating from 9.0.3 | [
{
"change_type": "MODIFY",
"old_path": "distribution/feature-packs/server-feature-pack/src/main/resources/content/bin/migrate-standalone-ha.cli",
"new_path": "distribution/feature-packs/server-feature-pack/src/main/resources/content/bin/migrate-standalone-ha.cli",
"diff": "+echo\n+echo *** WARNING *... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17995 Add a warning to standalone migration scripts to perform a manual migration script if needed + fix test failures when migrating from 9.0.3 |
339,364 | 06.05.2021 12:31:51 | -7,200 | f9d4f3c7c29dff4dec06b88d8acfa07a5356669f | GH Actions unable to build KC | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/ci.yml",
"new_path": ".github/workflows/ci.yml",
"diff": "@@ -2,6 +2,10 @@ name: Keycloak CI\non: [push, pull_request]\n+env:\n+ # workaround for Maven >= 3.8.1 (see KEYCLOAK-17812)\n+ MVN_MIRRORS: '[{ \"id\": \"jboss-public-repository-group-... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18023 GH Actions unable to build KC |
339,511 | 07.05.2021 11:47:08 | -32,400 | faab3183e075ed99dc0a69ca5bac3b896d70567b | Enforce SecureSigningAlgorithmForSignedJwtEnforceExecutor to private-key-jwt clients regardless their option | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureSigningAlgorithmForSignedJwtEnforceExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureSigningAlgorithmForSignedJwtEnforceExecutor.java",
... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18034 Enforce SecureSigningAlgorithmForSignedJwtEnforceExecutor to private-key-jwt clients regardless their option |
339,511 | 05.05.2021 12:08:10 | -32,400 | b38b1eb782a4f413a5ae6d0806bf1419bc9f1f03 | SecureSigningAlgorithmEnforceExecutor: Ability to auto-configure default algorithm | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureSigningAlgorithmEnforceExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureSigningAlgorithmEnforceExecutor.java",
"diff": "package org.ke... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17895 SecureSigningAlgorithmEnforceExecutor: Ability to auto-configure default algorithm |
339,511 | 06.05.2021 07:10:05 | -32,400 | 624d300a5599005abe40ed68be53bb397acad722 | Not possible to create client in the admin console when client policy with "secure-redirecturi-enforce-executor" condition is used | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureRedirectUriEnforceExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureRedirectUriEnforceExecutor.java",
"diff": "package org.keycloak.ser... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17938 Not possible to create client in the admin console when client policy with "secure-redirecturi-enforce-executor" condition is used |
339,511 | 06.05.2021 12:30:46 | -32,400 | b4e4e75743babdbf16f2788aa2fb71f4e0c8e958 | Determine public client based on token_endpoint_auth_method during OIDC dynamic client registration | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientregistration/oidc/DescriptionConverter.java",
"new_path": "services/src/main/java/org/keycloak/services/clientregistration/oidc/DescriptionConverter.java",
"diff": "@@ -88,8 +88,6 @@ public class DescriptionCo... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17928 Determine public client based on token_endpoint_auth_method during OIDC dynamic client registration |
339,550 | 16.04.2021 14:47:34 | -32,400 | ce4f31a8c396f20a6295ed99f0b4bae4222d962d | Help message for DB is incorrect | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/configuration/PropertyMappers.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/configuration/PropertyMappers.java",
"diff": "@@ -128,7 +128,7 @@ public final class PropertyMappers {\n}\naddInitialization... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17801 Help message for DB is incorrect |
339,164 | 29.04.2021 10:44:33 | -7,200 | 0bf347e26df4a883d4daa98b50fb4e6abe1bfbbe | Parse CLI arguments with multiple =
To support cases like --db-url=jdbc:mariadb://localhost/kc?a=1
Reverts a part of commit | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/configuration/ConfigArgsConfigSource.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/configuration/ConfigArgsConfigSource.java",
"diff": "@@ -98,11 +98,14 @@ public class ConfigArgsConfigSource extends ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17897 Parse CLI arguments with multiple =
To support cases like --db-url=jdbc:mariadb://localhost/kc?a=1
Reverts a part of commit 04415d34eab5ed577c472802df4ca11fbafabc7e |
339,511 | 08.05.2021 08:15:46 | -32,400 | 5dced05591b065418364457c5bbb63c40ea4cc30 | Client Policies : Rename "secure-redirecturi-enforce-executor" to indicate what this executor does | [
{
"change_type": "RENAME",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureRedirectUriEnforceExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureClientRegisteringUriEnforceExecutor.java",
"diff": "@@ -40,19 +40,1... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18050 Client Policies : Rename "secure-redirecturi-enforce-executor" to indicate what this executor does |
339,185 | 11.05.2021 08:50:36 | -7,200 | f25de94ae1cb0dc45c2bbe6da68f12a21bb0ed04 | Report test coverage for model tests | [
{
"change_type": "MODIFY",
"old_path": "testsuite/model/pom.xml",
"new_path": "testsuite/model/pom.xml",
"diff": "<jdbc.mvn.artifactId>h2</jdbc.mvn.artifactId>\n<jdbc.mvn.version>${h2.version}</jdbc.mvn.version>\n<log4j.configuration>file:${project.build.directory}/dependency/log4j.properties</log4j... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18070 Report test coverage for model tests |
339,511 | 11.05.2021 05:08:47 | -32,400 | 355a5d65fb86eae07ef0749bef7af0a06ca7bd2a | Client Policies : Revise SecureRequestObjectExecutor to have an option for checking nbf claim | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureRequestObjectExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureRequestObjectExecutor.java",
"diff": "@@ -59,8 +59,20 @@ public class Se... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18052 Client Policies : Revise SecureRequestObjectExecutor to have an option for checking nbf claim |
339,185 | 11.05.2021 14:08:19 | -7,200 | 8feefe94ac96b4be0ed0751abf128f754b027b43 | Ignore server version for MySQL in ChangeLogHistoryService | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/conn/CustomChangeLogHistoryService.java",
"new_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/conn/CustomChangeLogHistoryService.java",
"diff": "@@ -50,7 +50... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18074 Ignore server version for MySQL in ChangeLogHistoryService |
339,179 | 12.05.2021 13:09:05 | -7,200 | f37a24dd91ca2768d478cf735bbf99d041ed58b9 | Add manual pagination into UserStorageManager#query | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/storage/UserStorageManager.java",
"new_path": "services/src/main/java/org/keycloak/storage/UserStorageManager.java",
"diff": "@@ -52,6 +52,8 @@ import java.util.Map;\nimport java.util.Objects;\nimport java.util.Optional;\nim... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17348 Add manual pagination into UserStorageManager#query |
339,202 | 11.05.2021 15:28:00 | -7,200 | 716afe94044b057261e8c98d59f3abd0d249d615 | Remove "role_list" from expected default client scopes | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/other/console/src/test/java/org/keycloak/testsuite/console/clients/ClientClientScopesTest.java",
"new_path": "testsuite/integration-arquillian/tests/other/console/src/test/java/org/keycloak/testsuite/console/clients/ClientCli... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18075 - Remove "role_list" from expected default client scopes |
339,281 | 13.05.2021 10:52:05 | -7,200 | d78d4a8d47588a2ac1d794733aa4c9a3281f4924 | deprecate ScopeMappedResource.getScopeMappings() | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/admin/ScopeMappedResource.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/admin/ScopeMappedResource.java",
"diff": "@@ -85,10 +85,12 @@ public class ScopeMappedResource {\n* Get ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17760 deprecate ScopeMappedResource.getScopeMappings() |
339,581 | 04.03.2021 02:39:47 | -3,600 | 12921357292fc2d69982e944df0db3a20dfb6873 | Align tested databases with EAP 7.4 support matrix | [
{
"change_type": "MODIFY",
"old_path": "pom.xml",
"new_path": "pom.xml",
"diff": "<jetty9.version>${jetty92.version}</jetty9.version>\n<liquibase.version>3.5.5</liquibase.version>\n- <mysql.version>8.0.23</mysql.version>\n<osgi.version>4.2.0</osgi.version>\n<pax.web.version>7.1.0</pax.web.version>\n... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17322 Align tested databases with EAP 7.4 support matrix |
339,590 | 16.05.2021 20:09:28 | -7,200 | 10f7ea01d4b429b05763c839db34e3f3c9c1e49c | only persist webauthn-authentication count if the authenticator increments it beyond zero
Fixes an issue with Apple Keys stored in the secure enclave. They don's support counters and recommend attestation instead. This is a valid design choice according to the Webauthn-Spec (counters are mentioned as SHOULD) | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/credential/WebAuthnCredentialProvider.java",
"new_path": "services/src/main/java/org/keycloak/credential/WebAuthnCredentialProvider.java",
"diff": "@@ -195,12 +195,17 @@ public class WebAuthnCredentialProvider implements Cre... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16091: only persist webauthn-authentication count if the authenticator increments it beyond zero
Fixes an issue with Apple Keys stored in the secure enclave. They don's support counters and recommend attestation instead. This is a valid design choice according to the Webauthn-Spec (counters are mentioned as SHOULD) |
339,185 | 13.04.2021 13:31:43 | -7,200 | c2e2cbe180a5287baf0c1370b17fa7e6d61f5458 | Remove need for iterating by all clients | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/authorization/store/syncronization/UserSynchronizer.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/authorization/store/syncronization/UserSynchronizer.java",
"diff": "@@ -25,15 +25,12 @@ import j... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17749 Remove need for iterating by all clients |
339,465 | 14.05.2021 14:11:36 | -7,200 | 71dcbec642b6419ae6a7c7fb865816bbbd04adea | Refactoring retrieve of condition/executor providers. Make sure correct configuration of executor/condition is used for particular provider | [
{
"change_type": "MODIFY",
"old_path": "core/src/main/java/org/keycloak/representations/idm/ClientPolicyConditionRepresentation.java",
"new_path": "core/src/main/java/org/keycloak/representations/idm/ClientPolicyConditionRepresentation.java",
"diff": "package org.keycloak.representations.idm;\nimpor... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18108 Refactoring retrieve of condition/executor providers. Make sure correct configuration of executor/condition is used for particular provider |
339,462 | 06.04.2021 09:00:58 | -7,200 | df714506cc9aa05c8ab53c8acd2e6d2b7275bd5e | Can't impersonate | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/admin/UserResource.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/admin/UserResource.java",
"diff": "@@ -298,9 +298,10 @@ public class UserResource {\nRealmModel authenticatedRe... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17655 - Can't impersonate |
339,364 | 18.05.2021 14:56:42 | -7,200 | 65fbf3f68cf0d33f4c935235ee53cdc05783c7cf | Client Policy UI Improvements: JSON error handling | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/admin/ClientPoliciesResource.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/admin/ClientPoliciesResource.java",
"diff": "@@ -25,7 +25,6 @@ import javax.ws.rs.Produces;\nimport j... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18079 Client Policy UI Improvements: JSON error handling |
339,185 | 13.04.2021 07:33:49 | -7,200 | c02a706a865b87c3c9aea184429b14eaeff75204 | Optimize validation of redirect URIs in logout endpoint
Reimplementation of | [
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/RealmCacheSession.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/RealmCacheSession.java",
"diff": "@@ -568,6 +568,11 @@ public class RealmCacheSession ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17748 Optimize validation of redirect URIs in logout endpoint
Reimplementation of KEYCLOAK-17718 |
339,364 | 18.05.2021 17:08:08 | -7,200 | 23fef24fe12c763ac07b12a17cc7ea0c33f3cb3e | Client Policy UI Improvements: Add delete confirmation modal dialog | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/js/controllers/realm.js",
"new_path": "themes/src/main/resources/theme/base/admin/resources/js/controllers/realm.js",
"diff": "@@ -2972,6 +2972,7 @@ module.controller('ClientPoliciesProfilesListCtrl', functi... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18042 Client Policy UI Improvements: Add delete confirmation modal dialog |
339,179 | 14.05.2021 14:52:43 | -7,200 | e609949264a59c7d672eaa5d884ee65955ebe6e7 | Add index to user attribute name and value to support user sync from ldap | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "model/jpa/src/main/resources/META-INF/jpa-changelog-14.0.0.xml",
"diff": "+<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"no\"?>\n+<!--\n+ ~ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ ~ * and other contributors as indicated b... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17267 Add index to user attribute name and value to support user sync from ldap |
339,364 | 19.05.2021 18:00:45 | -7,200 | d0f01740be810f194aa08118e59a10a8e8338189 | Client Policy UI Improvements: Navigation | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"new_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"diff": "@@ -868,9 +868,12 @@ no-conditions-available=No Conditions Available\nco... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18043 Client Policy UI Improvements: Navigation |
339,281 | 11.05.2021 22:25:48 | -7,200 | 3913526934d1537ee2fe32386ebc7b9439e59e92 | Update to 13.0.0 fails due to liquibase error | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/resources/META-INF/jpa-changelog-13.0.0.xml",
"new_path": "model/jpa/src/main/resources/META-INF/jpa-changelog-13.0.0.xml",
"diff": "</createIndex>\n</changeSet>\n- <changeSet author=\"keycloak\" id=\"json-string-accomodation\">\n+ <changeSe... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18031 Update to 13.0.0 fails due to liquibase error |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.