author int64 658 755k | date stringdate 2012-06-12 08:34:29 2024-07-22 14:51:21 | timezone int64 -46,800 43.2k | hash stringlengths 40 40 | message stringlengths 5 490 | mods listlengths 1 16 | language stringclasses 20
values | license stringclasses 3
values | repo stringlengths 5 68 | original_message stringlengths 12 491 |
|---|---|---|---|---|---|---|---|---|---|
339,179 | 06.04.2021 09:47:48 | -7,200 | 3bb5bff8e0bf9de91dde9323ef8bc2b637b90e1d | Do not include principal in the reference to broker sessionId | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/broker/saml/SAMLEndpoint.java",
"new_path": "services/src/main/java/org/keycloak/broker/saml/SAMLEndpoint.java",
"diff": "@@ -325,7 +325,7 @@ public class SAMLEndpoint {\n} else {\nfor (String sessionIndex : request.getSessi... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17495 Do not include principal in the reference to broker sessionId |
339,281 | 10.05.2021 18:36:19 | -7,200 | 1c283cdebc1cb69e4bc76817484ed48ff38aff6e | OTP secrets migrated incorrectly | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/resources/META-INF/jpa-changelog-8.0.0.xml",
"new_path": "model/jpa/src/main/resources/META-INF/jpa-changelog-8.0.0.xml",
"diff": "</changeSet>\n<!--Update format of credential to fill secret_data and credential_data - used on all databases ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-14301 OTP secrets migrated incorrectly |
339,185 | 18.05.2021 17:51:39 | -7,200 | 860fc4c06c1690db6fdf78da47ee7cd8a2a3a04e | KEYCLOAK-17757 Optimize IdP-first lookup | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/models/jpa/JpaClientProviderFactory.java",
"new_path": "model/jpa/src/main/java/org/keycloak/models/jpa/JpaClientProviderFactory.java",
"diff": "@@ -28,6 +28,7 @@ import javax.persistence.EntityManager;\nimport java.util.Ar... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17756 KEYCLOAK-17757 Optimize IdP-first lookup |
339,364 | 19.05.2021 15:53:16 | -7,200 | 7c2341f1ed7f628bf756d57e6ea53b87898ed42d | Client Policy UI Improvements: Action column for built-in profile | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/js/app.js",
"new_path": "themes/src/main/resources/theme/base/admin/resources/js/app.js",
"diff": "@@ -214,8 +214,8 @@ module.config([ '$routeProvider', function($routeProvider) {\nrealm : function(RealmLoad... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18041 Client Policy UI Improvements: Action column for built-in profile |
339,513 | 20.05.2021 13:14:49 | -32,400 | cc2d6f0741b2010693a386314e3be74db0d8fe2f | Display of options about device grant when selecting
"public" as the access type | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/OAuth2DeviceAuthorizationGrantTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/OAuth2DeviceAuthorizationGrantTest.... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18235 Display of options about device grant when selecting
"public" as the access type |
339,364 | 20.05.2021 18:11:44 | -7,200 | 5d578f0c90526088a9007be605271ca5f9ca144a | Quarkus: ClientPoliciesImportExportTest.testSingleFileRealmExportImport failed in GHA | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/java/org/keycloak/testsuite/rest/resource/TestingExportImportResource.java",
"new_path": "testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/s... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17905 Quarkus: ClientPoliciesImportExportTest.testSingleFileRealmExportImport failed in GHA |
339,511 | 21.05.2021 16:59:31 | -32,400 | 6532baa9a74fe916b98eb8f2040b4edb4d610eae | Option for skip return user's claims in the ID Token for hybrid flow | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/OIDCConfigAttributes.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/OIDCConfigAttributes.java",
"diff": "@@ -64,6 +64,8 @@ public final class OIDCConfigAttributes {\npublic static final S... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18127 Option for skip return user's claims in the ID Token for hybrid flow |
339,550 | 21.05.2021 21:02:36 | -32,400 | 4c49d595cbbd9f5173de69019165ebcdffdfa704 | Fix HOW-TO-RUN.md | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/HOW-TO-RUN.md",
"new_path": "testsuite/integration-arquillian/HOW-TO-RUN.md",
"diff": "@@ -462,6 +462,13 @@ The tests also use some constants placed in [test-constants.properties](tests/ba\nIn case a custom `settings.xml` is us... | Java | Apache License 2.0 | keycloak/keycloak | Fix HOW-TO-RUN.md |
339,465 | 08.04.2021 11:46:39 | -7,200 | 2817cb4a19b0ea3f3425bbfc602b01b89a3c6c66 | Use dedicated tmp directory even in unit tests | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/provider/quarkus/QuarkusPlatform.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/provider/quarkus/QuarkusPlatform.java",
"diff": "package org.keycloak.provider.quarkus;\nimport java.io.File;\n+import ja... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17683 Use dedicated tmp directory even in unit tests |
339,133 | 19.05.2021 13:55:12 | -7,200 | afb8da7ff07e0b056a69c7d612e0280196029498 | exclude test for remote testsuite. | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/saml/ArtifactBindingCustomResolverTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/saml/ArtifactBindingCustomResolverTest.java... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18056 exclude test for remote testsuite. |
339,465 | 24.05.2021 09:24:22 | -7,200 | d4374f37ae658c1c4189b0ac47b81a3c30a2b563 | Not possible to login with public client, which was confidential with custom client authenticator set | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/authentication/ClientAuthenticationFlow.java",
"new_path": "services/src/main/java/org/keycloak/authentication/ClientAuthenticationFlow.java",
"diff": "@@ -75,8 +75,9 @@ public class ClientAuthenticationFlow implements Authe... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18258 Not possible to login with public client, which was confidential with custom client authenticator set |
339,511 | 25.05.2021 11:49:26 | -32,400 | 6e7898039b558b6d684dde8b66b85641370b6e65 | SecureResponseTypeExecutor: polishing for FAPI 1 final | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureResponseTypeExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureResponseTypeExecutor.java",
"diff": "package org.keycloak.services.client... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18139 SecureResponseTypeExecutor: polishing for FAPI 1 final |
339,179 | 22.05.2021 20:21:12 | -7,200 | 4b2c20c87107cad2825cb6d7b920835c0fafb922 | Remove doubled synchronization of UserPolicies on UserRemovedEvent | [
{
"change_type": "MODIFY",
"old_path": "authz/policy/common/src/main/java/org/keycloak/authorization/policy/provider/user/UserPolicyProviderFactory.java",
"new_path": "authz/policy/common/src/main/java/org/keycloak/authorization/policy/provider/user/UserPolicyProviderFactory.java",
"diff": "package ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17765 Remove doubled synchronization of UserPolicies on UserRemovedEvent |
339,235 | 25.05.2021 10:40:08 | -7,200 | 962047e7eabc79c2edb8d46d5e59cd6d66f58824 | Check admin has view/query access first before listing clients | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/admin/ClientsResource.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/admin/ClientsResource.java",
"diff": "@@ -105,17 +105,17 @@ public class ClientsResource {\n@QueryParam(\"q\... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17750 Check admin has view/query access first before listing clients |
339,179 | 26.05.2021 13:18:58 | -7,200 | 5c71c3d97ff4dc94b64d53f6ee63b04c9cd919aa | Remove all clients querying fallback | [
{
"change_type": "MODIFY",
"old_path": "authz/policy/common/src/main/java/org/keycloak/authorization/policy/provider/role/RolePolicyProviderFactory.java",
"new_path": "authz/policy/common/src/main/java/org/keycloak/authorization/policy/provider/role/RolePolicyProviderFactory.java",
"diff": "@@ -173,... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17764 Remove all clients querying fallback (#8077) |
339,465 | 26.05.2021 09:36:51 | -7,200 | 9b76b07144ac8a90aebbb59220ec644116cee671 | WARNING in the log when login to public clients | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/authentication/ClientAuthenticationFlow.java",
"new_path": "services/src/main/java/org/keycloak/authentication/ClientAuthenticationFlow.java",
"diff": "@@ -78,9 +78,11 @@ public class ClientAuthenticationFlow implements Auth... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18284 WARNING in the log when login to public clients |
339,281 | 24.05.2021 19:44:07 | -7,200 | 3aa06c2721382543b4bbf51bc8cc87a49fd035c8 | avoid ModelDuplicateException during parallel starup of servers | [
{
"change_type": "MODIFY",
"old_path": "distribution/server-dist/src/main/docs/examples/map-storage-concurrenthashmap.cli",
"new_path": "distribution/server-dist/src/main/docs/examples/map-storage-concurrenthashmap.cli",
"diff": "@@ -24,6 +24,7 @@ embed-server\n/subsystem=keycloak-server/spi=deploym... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18073 avoid ModelDuplicateException during parallel starup of servers |
339,185 | 26.05.2021 16:25:09 | -7,200 | 94f676cb959f1daddf5d53a3cadef87d1032908a | Add index to client_attributes | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/conn/DefaultLiquibaseConnectionProvider.java",
"new_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/conn/DefaultLiquibaseConnectionProvider.java",
"diff": "@@... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18286 Add index to client_attributes |
339,281 | 23.05.2021 21:51:36 | -7,200 | 4e8b18f560c26f85529070c2c7847be7cca6ac09 | Avoid iterating over all clients in UserResource.getConsents() | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/admin/UserResource.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/admin/UserResource.java",
"diff": "@@ -440,33 +440,49 @@ public class UserResource {\nSet<ClientModel> offlineC... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17752 Avoid iterating over all clients in UserResource.getConsents() |
339,511 | 27.05.2021 17:46:47 | -32,400 | 669556af71622c28e0f7cc876d84936d8841e185 | RefreshTokenRequest returns incorrect error code during failed HoK request | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/HolderOfKeyEnforcerExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/HolderOfKeyEnforcerExecutor.java",
"diff": "@@ -180,7 +180,7 @@ public class H... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18296 RefreshTokenRequest returns incorrect error code during failed HoK request |
339,500 | 27.05.2021 14:41:30 | -7,200 | 122fbe1bc6eefb355655a1aca677349c89d36d0e | ClearExpiredUserSessions timeouts with large number of sessions | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/models/utils/KeycloakModelUtils.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/models/utils/KeycloakModelUtils.java",
"diff": "@@ -275,26 +275,22 @@ public final class KeycloakModelUtils {\n* @pa... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18298 ClearExpiredUserSessions timeouts with large number of sessions |
339,500 | 25.05.2021 16:55:41 | -7,200 | 23aee6c210e5f4169092046ae6f89928b2276c6e | Limit number of authSessios per rootAuthSession | [
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/AuthenticationSessionAdapter.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/AuthenticationSessionAdapter.java",
"diff": "@@ -291,4 +291,18 @@ pub... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16616 Limit number of authSessios per rootAuthSession |
339,185 | 19.05.2021 13:42:36 | -7,200 | 3d8f152787713f92423a61ce268e5727bbd0e5c9 | KEYCLOAK-17754 Optimize getClients() calls | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProvider.java",
"new_path": "model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProvider.java",
"diff": "@@ -60,6 +60,7 @@ import org.keycloak.models.RoleContainerModel;\nimport org.keycloak.models.R... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17747 KEYCLOAK-17754 Optimize getClients() calls |
339,179 | 27.05.2021 10:31:01 | -7,200 | b216b9579c80954b8859bac76aee5d5a81ec1ea2 | Fix SamlLogoutTest with different consumer and provider url | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/AbstractBaseBrokerTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/AbstractBaseBrokerTest.java",
"diff": "@@... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18264 Fix SamlLogoutTest with different consumer and provider url |
339,281 | 27.05.2021 23:52:59 | -7,200 | 2bf727d40836a54dda5cc42f5267dc7e34e9437c | remove KeycloakModelUtils.isClientScopeUsed method | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProvider.java",
"new_path": "model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProvider.java",
"diff": "@@ -832,14 +832,11 @@ public class JpaRealmProvider implements RealmProvider, ClientProvider, ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17753 remove KeycloakModelUtils.isClientScopeUsed method |
339,513 | 14.05.2021 15:07:19 | -32,400 | bc6a746780ab797519886c4448e12edebaac9cf5 | Token introspection of the revoked refresh token | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/TokenManager.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/TokenManager.java",
"diff": "@@ -263,6 +263,13 @@ public class TokenManager {\nvalid = false;\n}\n+ String tokenType = token.ge... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18112 Token introspection of the revoked refresh token |
339,465 | 26.05.2021 09:25:35 | -7,200 | 6e139b8fda5f78b2814d424f1c2cc7d10e167148 | Issues with boolean properties of executors | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/js/controllers/realm.js",
"new_path": "themes/src/main/resources/theme/base/admin/resources/js/controllers/realm.js",
"diff": "@@ -3218,6 +3218,14 @@ module.controller('ClientPoliciesProfilesEditExecutorCtrl... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18280 Issues with boolean properties of executors |
339,465 | 27.05.2021 10:11:42 | -7,200 | ab13e3e4fe5f6664d29411a9da9a0598451c9e55 | Enable Client policies feature by default | [
{
"change_type": "MODIFY",
"old_path": "common/src/main/java/org/keycloak/common/Profile.java",
"new_path": "common/src/main/java/org/keycloak/common/Profile.java",
"diff": "@@ -55,7 +55,7 @@ public class Profile {\nTOKEN_EXCHANGE(Type.PREVIEW),\nUPLOAD_SCRIPTS(DEPRECATED),\nWEB_AUTHN(Type.DEFAULT, ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17939 Enable Client policies feature by default |
339,235 | 15.04.2021 16:34:28 | -7,200 | c3a15cb368eaa20d6af362926e1d77e7d96f7420 | Add options to http-builder to enable expect-continue, and to disable re-use of connections | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/connections/httpclient/DefaultHttpClientFactory.java",
"new_path": "services/src/main/java/org/keycloak/connections/httpclient/DefaultHttpClientFactory.java",
"diff": "@@ -61,6 +61,7 @@ import org.apache.http.util.EntityUtil... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17796 Add options to http-builder to enable expect-continue, and to disable re-use of connections |
339,590 | 16.05.2021 18:03:06 | -7,200 | 14407a631c3f17ec9f35d6a2751729227a6c75f0 | show a button instead of logging in automatically with WebAuthn onLoad.
Safari will fail to use TouchID/FaceID if it is not triggered by an explicit user interaction. There is an open discussion in the WebAuthn-Spec to make this a mandatory behavior and quiet a few other auth-servers have adopted this behavior. | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/login/messages/messages_en.properties",
"new_path": "themes/src/main/resources/theme/base/login/messages/messages_en.properties",
"diff": "@@ -401,6 +401,7 @@ webauthn-login-title=Security Key login\nwebauthn-registration-t... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16075: show a button instead of logging in automatically with WebAuthn onLoad.
Safari will fail to use TouchID/FaceID if it is not triggered by an explicit user interaction. There is an open discussion in the WebAuthn-Spec to make this a mandatory behavior and quiet a few other auth-servers have adopted this behavior. |
339,590 | 21.05.2021 19:18:46 | -7,200 | 628274dee2ac268579dba14dd45e3a2165f82f73 | always show the register-button during webauthn-registration.
Safari will fail to register if the action has not been triggered by a user gesture. | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/login/webauthn-register.ftl",
"new_path": "themes/src/main/resources/theme/base/login/webauthn-register.ftl",
"diff": "}\n</script>\n- <#if !isSetRetry?has_content && isAppInitiatedAction?has_content>\n<input type=\"submit\... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16075: always show the register-button during webauthn-registration.
Safari will fail to register if the action has not been triggered by a user gesture. |
339,687 | 01.06.2021 09:59:51 | -7,200 | ccad4653d83b0f39a4c3d0640eb24e9bdaa8540e | Exclude FAPI tests for remote auth server. | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/client/FAPI1Test.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/client/FAPI1Test.java",
"diff": "@@ -73,6 +73,7 @@ import org... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18324. Exclude FAPI tests for remote auth server. |
339,281 | 01.06.2021 12:01:56 | -7,200 | 0959475099ab2bb15f148ef9c189c1f53048e1d0 | revisit tests - authz disabled | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/adapter/example/authorization/AbstractPhotozExampleAdapterTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/adapter/example/aut... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18305 revisit tests - authz disabled |
339,465 | 03.06.2021 07:50:28 | -7,200 | 12c47150e776f02cda173908e1308443e3e1be8a | FAPI1Test fails in pipeline with auth-server-undertow-non-tls | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/client/FAPI1Test.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/client/FAPI1Test.java",
"diff": "@@ -39,6 +39,8 @@ import org... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18337 FAPI1Test fails in pipeline with auth-server-undertow-non-tls |
339,571 | 27.05.2021 18:02:52 | -7,200 | cbd42882053fa79b173934f809f1358c3eaca50a | Adaptively add the default modular JVM options
to the "javaVmArguments" to start the cache server container with,
if the JVM used to run the cache server is modular (JDK 9+) | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/CrossDCTestEnricher.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/CrossDCTestEnricher.java",
"diff": "... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-17254] Adaptively add the default modular JVM options
to the "javaVmArguments" to start the cache server container with,
if the JVM used to run the cache server is modular (JDK 9+)
Signed-off-by: Jan Lieskovsky <jlieskov@redhat.com> |
339,581 | 31.05.2021 18:03:17 | -7,200 | 1033b272e8dcb8bc0681ec3df8e1a02d32134b1f | fix for KEYCLOAK-18267_KEYCLOAK-17254 | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/containers/InfinispanServerConfiguration.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/containers/Infinisp... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-13757 fix for KEYCLOAK-18267_KEYCLOAK-17254 |
339,465 | 03.06.2021 20:46:02 | -7,200 | 3d16a1e8d3be7f7f57e10e08e266cb1ac562433e | Add executor for disable 'Full Scope Allowed' and add it to FAPI profiles | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/FullScopeDisabledExecutor.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Lice... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16811 Add executor for disable 'Full Scope Allowed' and add it to FAPI profiles |
339,581 | 03.06.2021 16:02:42 | -7,200 | 80eabcb7ebf44d11ee3ef304e7f9e453b49f8b59 | WelcomePageTest fails on MSSQL 2019
removed reference to `FK_P56CTINXXB9GSK57FO49F9TAC` from the `DropAllServlet` | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/helpers/DropAllServlet.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/helpers/DropAllServlet.java",
"diff": "@@ -94,7 +94,6 @@ public class DropA... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18249 WelcomePageTest fails on MSSQL 2019
- removed reference to `FK_P56CTINXXB9GSK57FO49F9TAC` from the `DropAllServlet` |
339,281 | 03.06.2021 17:22:35 | -7,200 | 95bf912dc969a5f0423d8ca14b55aa986af9e97f | Fix update client with default default scope assigned as optional | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProvider.java",
"new_path": "model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProvider.java",
"diff": "@@ -868,7 +868,8 @@ public class JpaRealmProvider implements RealmProvider, ClientProvider, Cl... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18035 Fix update client with default default scope assigned as optional |
339,468 | 28.01.2021 08:54:19 | -3,600 | f66354a80e76712ec58960e8f7de3a98924dcd78 | add error parameters to access token response & improve logging | [
{
"change_type": "MODIFY",
"old_path": "core/src/main/java/org/keycloak/representations/AccessTokenResponse.java",
"new_path": "core/src/main/java/org/keycloak/representations/AccessTokenResponse.java",
"diff": "@@ -61,6 +61,15 @@ public class AccessTokenResponse {\n@JsonProperty(\"scope\")\nprotect... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16947 add error parameters to access token response & improve logging |
339,550 | 07.06.2021 15:08:30 | -32,400 | c1cf306b92364d4151f9cab572955ca9536f30b6 | start-up with kc.bat fails if folder name includes space | [
{
"change_type": "MODIFY",
"old_path": "distribution/server-x-dist/src/main/content/bin/kc.bat",
"new_path": "distribution/server-x-dist/src/main/content/bin/kc.bat",
"diff": "@@ -19,7 +19,7 @@ if \"%OS%\" == \"Windows_NT\" (\nset DIRNAME=.\\\n)\n-set \"SERVER_OPTS=-Dkc.home.dir=%DIRNAME%.. -Djboss.... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18364 start-up with kc.bat fails if folder name includes space |
339,550 | 08.06.2021 11:46:12 | -32,400 | ead667aaacd3118bac8353326c5e701c53efd394 | cannot configure Agroal ExceptionSorter correctly | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/configuration/Database.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/configuration/Database.java",
"diff": "@@ -47,6 +47,16 @@ public class Database {\nreturn DATABASES.containsKey(alias);\n}\n+ stati... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18378 cannot configure Agroal ExceptionSorter correctly |
339,465 | 02.06.2021 07:53:09 | -7,200 | 91865fa93e3169cf31d03c8c37578c14a0ebff60 | Invalidate client session after refresh token re-use | [
{
"change_type": "MODIFY",
"old_path": "core/src/main/java/org/keycloak/representations/JsonWebToken.java",
"new_path": "core/src/main/java/org/keycloak/representations/JsonWebToken.java",
"diff": "@@ -148,6 +148,15 @@ public class JsonWebToken implements Serializable, Token {\nreturn !isExpired() &... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18368 Invalidate client session after refresh token re-use |
339,550 | 02.06.2021 17:12:31 | -32,400 | 4d1576b96a0227fd8f7ec9ee0e714f68289606ff | "access_denied" instead of "interaction_required" should
be returned when a user cancels the login | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/OIDCLoginProtocol.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/OIDCLoginProtocol.java",
"diff": "@@ -314,7 +314,6 @@ public class OIDCLoginProtocol implements LoginProtocol {\nswitch (e... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18328 "access_denied" instead of "interaction_required" should
be returned when a user cancels the login |
339,364 | 10.06.2021 16:30:54 | -7,200 | 9854f21acecc175ce618396ba2e89daa36836e3d | Client Scopes are reset to realm's default when Client is updated | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/models/jpa/ClientAdapter.java",
"new_path": "model/jpa/src/main/java/org/keycloak/models/jpa/ClientAdapter.java",
"diff": "@@ -261,9 +261,11 @@ public class ClientAdapter implements ClientModel, JpaModel<ClientEntity> {\n@O... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18332 Client Scopes are reset to realm's default when Client is updated |
339,617 | 08.06.2021 14:29:11 | -7,200 | 74089a51b3503b8e68a62ff954a68f3499cd44ec | Update Group: don't check siblings if the name doesn't change | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/admin/GroupResource.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/admin/GroupResource.java",
"diff": "@@ -106,11 +106,13 @@ public class GroupResource {\nreturn ErrorResponse.e... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18383 Update Group: don't check siblings if the name doesn't change |
339,281 | 07.06.2021 22:30:54 | -7,200 | e3c76035b21a4f2c7ff5079b5067f775002d9627 | Default role migration is not performed correctly when empty realm id | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/custom/JpaUpdate13_0_0_MigrateDefaultRoles.java",
"new_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/custom/JpaUpdate13_0_0_MigrateDefaultRoles.java",
"diff... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18359 Default role migration is not performed correctly when empty realm id |
339,581 | 16.06.2021 01:11:49 | -7,200 | 6db1c8204ab4debecfa3950aae71d78db7183891 | SAMLAdapterCrossDCTest failures | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/HOW-TO-RUN.md",
"new_path": "testsuite/integration-arquillian/HOW-TO-RUN.md",
"diff": "@@ -816,6 +816,8 @@ It is possible to specify additional parameters:\nExample: `-Pauth-server-wildfly,cache-server-infinispan,cache-auth -Dh... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18393 SAMLAdapterCrossDCTest failures |
339,185 | 21.06.2021 15:56:57 | -7,200 | bfb134a6ce32dea1c868dfe6a2eb0df58450649f | Fail session loading when interrupted | [
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/initializer/CacheInitializer.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/initializer/CacheInitializer.java",
"diff": "@@ -36,6 +36,7 @@ public... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18091 Fail session loading when interrupted |
339,299 | 20.05.2021 12:26:55 | -7,200 | b87d764137ad88ff428126a4290e758c51ebab11 | Username and email form fields kept in registration
form when duplicate | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/authentication/forms/RegistrationProfile.java",
"new_path": "services/src/main/java/org/keycloak/authentication/forms/RegistrationProfile.java",
"diff": "@@ -78,7 +78,6 @@ public class RegistrationProfile implements FormActi... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-17443] Username and email form fields kept in registration
form when duplicate |
339,299 | 17.03.2021 11:43:11 | -3,600 | 82491ae5d2e3092ff41115a852a13aed46f14661 | Prefill username in "Forgot Your Password" form if
called from Login form | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/forms/login/freemarker/model/AuthenticationContextBean.java",
"new_path": "services/src/main/java/org/keycloak/forms/login/freemarker/model/AuthenticationContextBean.java",
"diff": "@@ -63,7 +63,7 @@ public class Authenticat... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17446 - Prefill username in "Forgot Your Password" form if
called from Login form |
339,299 | 18.06.2021 13:48:39 | -7,200 | 458c841c390589ec95e173e2d0955be54cdce887 | Dynamically select attributes based on requested scopes | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/userprofile/UserProfileMetadata.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/userprofile/UserProfileMetadata.java",
"diff": "package org.keycloak.userprofile;\n-import static org.keycloak.userp... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18447] Dynamically select attributes based on requested scopes |
339,520 | 21.06.2021 14:54:04 | -7,200 | ba8d27121cc9c74a5c9430ed5d19a2a3c440154c | Avoid NPE when parsing JWKS and keys without the use parameter | [
{
"change_type": "MODIFY",
"old_path": "core/src/main/java/org/keycloak/util/JWKSUtils.java",
"new_path": "core/src/main/java/org/keycloak/util/JWKSUtils.java",
"diff": "package org.keycloak.util;\n+import org.jboss.logging.Logger;\nimport org.keycloak.crypto.KeyUse;\nimport org.keycloak.crypto.KeyW... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-12500 Avoid NPE when parsing JWKS and keys without the use parameter |
339,504 | 02.04.2021 16:16:50 | -10,800 | 17b374f53af275099f93a2d5c0bf13614cc11b8f | [KEYCLOAK-16455][Adapter - JavaScript] Propagate 3rd party cookies check
errors outside of JS adapter | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/js/src/main/resources/keycloak.d.ts",
"new_path": "adapters/oidc/js/src/main/resources/keycloak.d.ts",
"diff": "@@ -178,6 +178,14 @@ declare namespace Keycloak {\n* @default false\n*/\nenableLogging?: boolean\n+\n+ /**\n+ * Configures how long wi... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-16455][Adapter - JavaScript] Propagate 3rd party cookies check
errors outside of JS adapter |
339,179 | 23.06.2021 18:10:34 | -7,200 | ccf9456bdf4173212657ddf12c6f6471d0dc05ad | Fix js tests timeout failure | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/javascript/JavascriptAdapterTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/javascript/JavascriptAdapterTest.java",
"diff... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18534 Fix js tests timeout failure |
339,550 | 21.06.2021 09:23:02 | -32,400 | 52ced98f92815c1d595bf4470c5939e061e07cd6 | Regex Policy for authorization service | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "authz/policy/common/src/main/java/org/keycloak/authorization/policy/provider/regex/RegexPolicyProvider.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18503 Regex Policy for authorization service |
339,468 | 28.08.2020 08:38:33 | -7,200 | 6e4a0044fdcce234c5951e5dceb38725fff22823 | Dont show backchannel logout options for bearer only clients in admin ui | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/partials/client-detail.html",
"new_path": "themes/src/main/resources/theme/base/admin/resources/partials/client-detail.html",
"diff": "<kc-tooltip>{{:: 'web-origins.tooltip' | translate}}</kc-tooltip>\n</div... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-15371 Dont show backchannel logout options for bearer only clients in admin ui |
339,299 | 24.06.2021 16:51:41 | -7,200 | 512bcd14f76aed02c1bd668d434cc5ee59a57932 | dynamic registration form | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/forms/login/LoginFormsPages.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/forms/login/LoginFormsPages.java",
"diff": "@@ -24,7 +24,7 @@ public enum LoginFormsPages {\nLOGIN, LOGIN_USERNAME, LOGI... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18428] - dynamic registration form |
339,506 | 09.06.2021 14:36:15 | -7,200 | ca6b78b730f9f3e9642ec1403151fce2ef97a96d | GroupProvider search implementation of JPA and Map delivers different results | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/group/MapGroupProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/group/MapGroupProvider.java",
"diff": "@@ -178,8 +178,15 @@ public class MapGroupProvider<K> implements GroupProvider {\n... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18390 GroupProvider search implementation of JPA and Map delivers different results |
339,511 | 30.06.2021 08:06:22 | -32,400 | cef742ee3f0072db2d0b533f8eb60460f7b16d62 | Remove OIDCWellKnownProvider.isAsymmetricAlgorithm | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/OIDCWellKnownProvider.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/OIDCWellKnownProvider.java",
"diff": "@@ -24,9 +24,6 @@ import org.keycloak.authentication.ClientAuthenticatorFactory;... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18583 Remove OIDCWellKnownProvider.isAsymmetricAlgorithm |
339,364 | 25.06.2021 17:31:29 | -7,200 | eb3bd8bbb5a79af5ddfdb34cb33ef44026ef57d9 | Make ErrorHandler to log all errors for debugging purposes | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/error/KeycloakErrorHandler.java",
"new_path": "services/src/main/java/org/keycloak/services/error/KeycloakErrorHandler.java",
"diff": "@@ -45,6 +45,7 @@ public class KeycloakErrorHandler implements ExceptionMapper<T... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18554 Make ErrorHandler to log all errors for debugging purposes |
339,179 | 12.05.2021 09:53:59 | -7,200 | b8565408ca7930281c2995a6de803ecd578e837a | Make exists and notExists collection aware | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/realm/MapRealmAdapter.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/realm/MapRealmAdapter.java",
"diff": "@@ -1534,7 +1534,7 @@ public abstract class MapRealmAdapter<K> extends AbstractRealm... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17781 Make exists and notExists collection aware |
339,299 | 30.06.2021 10:35:23 | -7,200 | bcfa6e43099d4328b5057bf53e46fae6341f2e52 | put attribute validators configuration into freemarker
template for user profile pages | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/userprofile/AttributeValidatorMetadata.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/userprofile/AttributeValidatorMetadata.java",
"diff": "package org.keycloak.userprofile;\n+import java.util.M... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18592 - put attribute validators configuration into freemarker
template for user profile pages |
339,658 | 29.06.2021 15:58:25 | -7,200 | aab6782baef2544e349d224b650d42bf720faddc | Remove duplicated statement
This is super minor but saw this while reading this file. | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/account/AccountRestService.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/account/AccountRestService.java",
"diff": "@@ -140,7 +140,6 @@ public class AccountRestService {\nrep.s... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18603 Remove duplicated statement
This is super minor but saw this while reading this file. |
339,185 | 29.06.2021 13:20:29 | -7,200 | 8a83ec83acee5652102051a481ea32c00f62a03a | map-storage profile for KeycloakServer | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/DefaultJpaConnectionProviderFactory.java",
"new_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/DefaultJpaConnectionProviderFactory.java",
"diff": "@@ -22,6 +22,7 @@ import org.hibernate.engine.... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18589 map-storage profile for KeycloakServer |
339,647 | 27.06.2021 20:57:51 | 10,800 | 164f3df08008f76e5318809a17fd2b496504ad73 | Support for additional parameters from the backchannel authentication request and backchannel authentication callback. | [
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/InfinispanOAuth2DeviceTokenStoreProvider.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/InfinispanOAuth2DeviceTokenStoreProvider.java",
"diff": "... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18502 - Support for additional parameters from the backchannel authentication request and backchannel authentication callback. |
339,185 | 28.06.2021 09:40:22 | -7,200 | f0e777c59212f91b8f253dc87458bf17757db8ac | Remove unnecessary id parameter from update operation | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/common/MapStorageUtils.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/common/MapStorageUtils.java",
"diff": "@@ -37,7 +37,7 @@ public class MapStorageUtils {\n*/\npublic static <K, V extends ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18414 Remove unnecessary id parameter from update operation |
339,281 | 24.06.2021 16:10:50 | -7,200 | 2b9b50d50a0abd7065ec9aa22bc71dc6540258d7 | fix migration of default role when realm id contains apostrophe | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/custom/JpaUpdate13_0_0_MigrateDefaultRoles.java",
"new_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/custom/JpaUpdate13_0_0_MigrateDefaultRoles.java",
"diff... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18194 fix migration of default role when realm id contains apostrophe |
339,281 | 23.06.2021 10:35:22 | -7,200 | 4db2c3f5708e04a40277e770bd39e24b861364a4 | make attributes multi-valued for map storage entities | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientAdapter.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientAdapter.java",
"diff": "@@ -23,10 +23,13 @@ import org.keycloak.models.RealmModel;\nimport org.keycloak.... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-15572 make attributes multi-valued for map storage entities |
339,299 | 01.07.2021 13:56:24 | -7,200 | 7af2133924d63a5a932c53b6fa4b1a6c5b1eec81 | User Profile Admin UI - hide unused configurations for
username and email attributes | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/js/controllers/realm.js",
"new_path": "themes/src/main/resources/theme/base/admin/resources/js/controllers/realm.js",
"diff": "@@ -1532,6 +1532,10 @@ module.controller('RealmUserProfileCtrl', function($scope... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18542 - User Profile Admin UI - hide unused configurations for
username and email attributes |
339,185 | 01.07.2021 18:55:14 | -7,200 | f15536a88c97d64937c2985c4c42bdeeb4ab05c3 | Move classes specific to ConcurrentHashMap to chm package | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapKeycloakTransaction.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapKeycloakTransaction.java",
"diff": "@@ -28,7 +28,6 @@ import java.... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18635 Move classes specific to ConcurrentHashMap to chm package |
339,299 | 30.06.2021 14:22:50 | -7,200 | f32447bcc1bd42cbe9ffb033aada76982a55590d | GUI order for user profile attributes | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/userprofile/AttributeMetadata.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/userprofile/AttributeMetadata.java",
"diff": "@@ -50,21 +50,23 @@ public final class AttributeMetadata {\nprivate fina... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18424] GUI order for user profile attributes |
339,511 | 03.07.2021 08:00:40 | -32,400 | 2b1624390a8e52fe7a6942fd7f8810d3940d4b50 | Client Policy - Endpoint : support CIBA Backchannel Authentication Endpoint | [
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/services/clientpolicy/ClientPolicyEvent.java",
"new_path": "server-spi/src/main/java/org/keycloak/services/clientpolicy/ClientPolicyEvent.java",
"diff": "@@ -36,6 +36,7 @@ public enum ClientPolicyEvent {\nTOKEN_REVOKE,\nTO... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17937 Client Policy - Endpoint : support CIBA Backchannel Authentication Endpoint |
339,487 | 07.07.2021 00:11:23 | 10,800 | 8934bc82badc459e07144038e141d38b6f8ff255 | Fix redirect-rewrite-rule JSON name | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/wildfly/wildfly-subsystem/src/main/java/org/keycloak/subsystem/adapter/extension/KeycloakAdapterConfigService.java",
"new_path": "adapters/oidc/wildfly/wildfly-subsystem/src/main/java/org/keycloak/subsystem/adapter/extension/KeycloakAdapterConfigServ... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18302] Fix redirect-rewrite-rule JSON name |
339,511 | 03.07.2021 22:02:49 | -32,400 | dce163d3e204115933df794772e4d49a4abf701f | CIBA signed request: Client must configure the algorithm | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/endpoints/request/BackchannelAuthenticationEndpointSignedRequestParser.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/endpoints/request/BackchannelAuthenticationEndpoi... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18587 CIBA signed request: Client must configure the algorithm |
339,511 | 04.07.2021 16:19:53 | -32,400 | 63b737545fb97a994ce635c624c200470b62abe2 | Client Policy - Endpoint : support Pushed Authorization Request Endpoint | [
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/services/clientpolicy/ClientPolicyEvent.java",
"new_path": "server-spi/src/main/java/org/keycloak/services/clientpolicy/ClientPolicyEvent.java",
"diff": "@@ -37,6 +37,7 @@ public enum ClientPolicyEvent {\nTOKEN_INTROSPECT,... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18653 Client Policy - Endpoint : support Pushed Authorization Request Endpoint |
339,511 | 05.07.2021 05:11:41 | -32,400 | 7cdcf0f93e12e0bf3c4ea63fb713cd7e38052ab6 | Client Policy - Endpoint : support Token Request by CIBA Backchannel Authentication | [
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/services/clientpolicy/ClientPolicyEvent.java",
"new_path": "server-spi/src/main/java/org/keycloak/services/clientpolicy/ClientPolicyEvent.java",
"diff": "@@ -38,6 +38,7 @@ public enum ClientPolicyEvent {\nUSERINFO_REQUEST,... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18654 Client Policy - Endpoint : support Token Request by CIBA Backchannel Authentication |
339,281 | 28.06.2021 13:57:46 | -7,200 | 333f77a0394a1adc3704906dd52cb104d6509773 | Add expiration lifespan configuration to every distributed and replicated cache | [
{
"change_type": "MODIFY",
"old_path": "distribution/galleon-feature-packs/server-galleon-pack/src/main/resources/content/bin/migrate-domain-clustered.cli",
"new_path": "distribution/galleon-feature-packs/server-galleon-pack/src/main/resources/content/bin/migrate-domain-clustered.cli",
"diff": "@@ -... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18518 Add expiration lifespan configuration to every distributed and replicated cache |
339,299 | 02.07.2021 10:48:57 | -7,200 | 6686482ba51c1aa42a139f596605214522c88fd2 | Support a dynamic IDP user review form | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/forms/login/LoginFormsPages.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/forms/login/LoginFormsPages.java",
"diff": "@@ -26,6 +26,6 @@ public enum LoginFormsPages {\nLOGIN_IDP_LINK_CONFIRM, LOG... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18591] - Support a dynamic IDP user review form |
339,281 | 09.07.2021 12:46:01 | -7,200 | 00017b44a389958db2b64da627ad0c1b3d89e490 | fix creation of roles during client registration | [
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/models/RoleContainerModel.java",
"new_path": "server-spi/src/main/java/org/keycloak/models/RoleContainerModel.java",
"diff": "@@ -20,6 +20,7 @@ package org.keycloak.models;\nimport java.util.ArrayList;\nimport java.util.Ar... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18311 fix creation of roles during client registration |
339,281 | 01.07.2021 22:41:33 | -7,200 | a8fdd79d1b9d78e94a7025e2a3f367561fd7557d | Inefficient call to ClientProvider.getClientsStream() | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleProvider.java",
"diff": "@@ -28,7 +28,6 @@ import org.keycloak.models.map.storage.MapKeycloakTransaction;\nimpo... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17763 Inefficient call to ClientProvider.getClientsStream() |
339,299 | 09.07.2021 15:48:07 | -7,200 | 7618e661369057add7b17da18b8bb70fc825d081 | separate template for IDP review page | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/forms/login/freemarker/Templates.java",
"new_path": "services/src/main/java/org/keycloak/forms/login/freemarker/Templates.java",
"diff": "@@ -75,8 +75,9 @@ public class Templates {\ncase SAML_POST_FORM:\nreturn \"saml-post-f... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18541] separate template for IDP review page |
339,665 | 08.10.2020 21:21:01 | -7,200 | 108bd91edcbdbe3c7e9c6dc2fb4b9d76520b19b5 | Add sort in tables | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/partials/identity-provider-mappers.html",
"new_path": "themes/src/main/resources/theme/base/admin/resources/partials/identity-provider-mappers.html",
"diff": "</tr>\n</thead>\n<tbody>\n- <tr ng-repeat=\"mapp... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-15909 Add sort in tables |
339,281 | 14.07.2021 00:39:06 | -7,200 | a07f3f9608429ccf370822ab7a51c6a51adee6ac | Add testing composite roles in RoleInvalidationClusterTest | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/cluster/RoleInvalidationClusterTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/cluster/RoleInvalidationClusterTest.java",
... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18688 Add testing composite roles in RoleInvalidationClusterTest |
339,443 | 22.06.2021 20:10:00 | -7,200 | a25c70784c67abebca9df2825362836df1ac584f | support unicode for realm localization texts | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/models/jpa/entities/RealmLocalizationTextsEntity.java",
"new_path": "model/jpa/src/main/java/org/keycloak/models/jpa/entities/RealmLocalizationTextsEntity.java",
"diff": "@@ -27,6 +27,8 @@ import javax.persistence.Entity;\n... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18467 support unicode for realm localization texts |
339,392 | 03.05.2021 18:04:13 | -7,200 | 7d26b245de221857877305713e627d5f31fabe6a | Propagate security domain to ejb
same fix as in just for the offline installer | [
{
"change_type": "MODIFY",
"old_path": "distribution/adapters/wildfly-adapter/cli/adapter-elytron-install-offline.cli",
"new_path": "distribution/adapters/wildfly-adapter/cli/adapter-elytron-install-offline.cli",
"diff": "@@ -57,3 +57,9 @@ if (outcome != success) of /subsystem=undertow/application-s... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17947 Propagate security domain to ejb
same fix as in https://github.com/keycloak/keycloak/pull/5977 just for the offline installer |
339,433 | 22.04.2021 01:29:33 | 25,200 | fbaeb18a5fb7b7f1ebed4af28b3cd27959a63655 | Added ID to admin event object. | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/events/jpa/JpaEventStoreProvider.java",
"new_path": "model/jpa/src/main/java/org/keycloak/events/jpa/JpaEventStoreProvider.java",
"diff": "@@ -146,7 +146,7 @@ public class JpaEventStoreProvider implements EventStoreProvider... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18471 Added ID to admin event object. |
339,433 | 29.06.2021 06:07:01 | 25,200 | 2c8d4ad9b49963f39ae90a71abd5f1e07e507ee7 | Realm localizations of one realm must not affect themes displayed in context of other realms. | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/email/freemarker/FreeMarkerEmailTemplateProvider.java",
"new_path": "services/src/main/java/org/keycloak/email/freemarker/FreeMarkerEmailTemplateProvider.java",
"diff": "@@ -207,9 +207,9 @@ public class FreeMarkerEmailTempla... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18590 Realm localizations of one realm must not affect themes displayed in context of other realms. |
339,511 | 09.07.2021 10:28:59 | -32,400 | 63f04c1118aa868cf6a7419a028e41596a267594 | Client policy executor for check Backchannel signed request algorithms matching FAPI compliant algorithms | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/clientpolicy/executor/SecureCibaAuthenticationRequestSigningAlgorithmExecutor.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors a... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18683 Client policy executor for check Backchannel signed request algorithms matching FAPI compliant algorithms |
339,511 | 19.07.2021 14:51:24 | -32,400 | f188f02d0387841e3936f5cae171813c00b38dd6 | FAPI-CIBA-ID1 conformance test : ID Token needs to include auth_time claim | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/CibaGrantType.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/CibaGrantType.java",
"diff": "@@ -26,6 +26,7 @@ import org.jboss.logging.Logger;\nimport org.keycloak.... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18826 FAPI-CIBA-ID1 conformance test : ID Token needs to include auth_time claim |
339,299 | 15.07.2021 15:16:33 | -7,200 | 61aa4e6a70f2f68052483fc699abe930abc15886 | Set "Email Verified" to false when email changed in
UserProfile Provider | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/userprofile/DefaultUserProfile.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/userprofile/DefaultUserProfile.java",
"diff": "@@ -42,14 +42,16 @@ import org.keycloak.models.UserModel;\n*/\npublic ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18750 - Set "Email Verified" to false when email changed in
UserProfile Provider |
339,511 | 20.07.2021 03:52:48 | -32,400 | 02a9eb442de779724df94c8a9f5d512c1bc86346 | FAPI-CIBA-ID1 conformance test : ClientRolesCondition needs to be evaluated on CIBA backchannel authentication request and token request | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/condition/ClientRolesCondition.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/condition/ClientRolesCondition.java",
"diff": "@@ -75,6 +75,8 @@ public class ClientRolesCond... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18829 FAPI-CIBA-ID1 conformance test : ClientRolesCondition needs to be evaluated on CIBA backchannel authentication request and token request |
339,511 | 20.07.2021 09:14:06 | -32,400 | f76c07476c0d6ed4c92329ec68dc5285c1beef2a | FAPI-CIBA-ID1 conformance test : Client JWT authentication should allow Backchannel Authentication endpoint as audience | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/authentication/authenticators/client/JWTClientAuthenticator.java",
"new_path": "services/src/main/java/org/keycloak/authentication/authenticators/client/JWTClientAuthenticator.java",
"diff": "@@ -19,6 +19,7 @@ package org.ke... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18827 FAPI-CIBA-ID1 conformance test : Client JWT authentication should allow Backchannel Authentication endpoint as audience |
339,511 | 20.07.2021 15:07:05 | -32,400 | e2c5fa20a23574843d747a7be6dacd40f4afb4c3 | Client Policy - Condition : ClientRolesCondition needs to be evaluated on PAR endpoint | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/condition/ClientRolesCondition.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/condition/ClientRolesCondition.java",
"diff": "@@ -77,6 +77,7 @@ public class ClientRolesCond... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18849 Client Policy - Condition : ClientRolesCondition needs to be evaluated on PAR endpoint |
339,511 | 20.07.2021 15:53:48 | -32,400 | f154b0b20993aac9d5b4d30f255236aa0e3e788a | FAPI-CIBA-ID1 conformance test : need to return 400 if user authentication is not successfully completed | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/CibaGrantType.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/CibaGrantType.java",
"diff": "@@ -178,7 +178,7 @@ public class CibaGrantType {\nif (deviceCode.isDenie... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18831 FAPI-CIBA-ID1 conformance test : need to return 400 if user authentication is not successfully completed |
339,465 | 20.07.2021 11:17:17 | -7,200 | db7e247f7ba777afbbd35c41743c8f460d3d09dc | KEYCLOAK-18850 Enable CIBA and PAR by default | [
{
"change_type": "MODIFY",
"old_path": "common/src/main/java/org/keycloak/common/Profile.java",
"new_path": "common/src/main/java/org/keycloak/common/Profile.java",
"diff": "@@ -60,9 +60,9 @@ public class Profile {\nUPLOAD_SCRIPTS(DEPRECATED),\nWEB_AUTHN(Type.DEFAULT, Type.PREVIEW),\nCLIENT_POLICIES... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18848 KEYCLOAK-18850 Enable CIBA and PAR by default |
339,688 | 15.07.2021 10:17:38 | 10,800 | f1ee2826c1b3f38f767428312fdc12913d7d4ab9 | Update Portuguese (Brazil) translations
Fix `oauthGrantTitle` typo error | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources-community/theme/base/login/messages/messages_pt_BR.properties",
"new_path": "themes/src/main/resources-community/theme/base/login/messages/messages_pt_BR.properties",
"diff": "@@ -32,7 +32,7 @@ unknownUser=Usu\\u00E1rio desconhecido\n... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18805] - Update Portuguese (Brazil) translations
- Fix `oauthGrantTitle` typo error |
339,511 | 21.07.2021 08:19:31 | -32,400 | 61fcbb307b94902f7314c2d8e2237fc0c39a9cfc | FAPI-CIBA-ID1 conformance test : HolderOfKeyEnforcerExecutor needs to be executed on CIBA token request | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/CibaGrantType.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/CibaGrantType.java",
"diff": "@@ -152,6 +152,13 @@ public class CibaGrantType {\nthrow new CorsErrorRe... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18830 FAPI-CIBA-ID1 conformance test : HolderOfKeyEnforcerExecutor needs to be executed on CIBA token request |
339,511 | 21.07.2021 10:09:32 | -32,400 | 8df36fbf28ed3a2b5a2f185df9701d198dea9ac4 | FAPI-CIBA-ID1 conformance test : Additional checks of signed authentication request | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/clientpolicy/executor/SecureCibaSignedAuthenticationRequestExecutor.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/clientpolicy/executor/SecureCibaSignedAuthentication... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18828 FAPI-CIBA-ID1 conformance test : Additional checks of signed authentication request |
339,511 | 21.07.2021 15:26:29 | -32,400 | 2c019c9ce5ef689c1a95e31b57b5aa3cd3813757 | FAPI-CIBA-ID1 conformance test : need to return 401 error=invalid_client if client authentication is not successfully completed on Backchannel Authentication endpoint | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/endpoints/BackchannelAuthenticationEndpoint.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/endpoints/BackchannelAuthenticationEndpoint.java",
"diff": "@@ -38,6 +38... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18832 FAPI-CIBA-ID1 conformance test : need to return 401 error=invalid_client if client authentication is not successfully completed on Backchannel Authentication endpoint |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.