author int64 658 755k | date stringdate 2012-06-12 08:34:29 2024-07-22 14:51:21 | timezone int64 -46,800 43.2k | hash stringlengths 40 40 | message stringlengths 5 490 | mods listlengths 1 16 | language stringclasses 20
values | license stringclasses 3
values | repo stringlengths 5 68 | original_message stringlengths 12 491 |
|---|---|---|---|---|---|---|---|---|---|
339,465 | 21.07.2021 11:20:30 | -7,200 | 3993b736254d3f174725a489de946fc9f70da9e9 | CIBATests failing for auth-server-remote | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/client/CIBATest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/client/CIBATest.java",
"diff": "@@ -35,6 +35,7 @@ import stati... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18865 CIBATests failing for auth-server-remote |
339,133 | 28.06.2021 11:44:59 | -7,200 | 1ea0232acac0200b0f6130bd80c3662e6f09dced | > New quickstarts scripts folder. | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/ci.yml",
"new_path": ".github/workflows/ci.yml",
"diff": "@@ -396,13 +396,13 @@ jobs:\nrun: keycloak/.github/scripts/quickstarts/prepare-server.sh\n- name: Build Quickstarts\n- run: .github/scripts/build-quickstarts.sh\n+ run: scripts/build-q... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16534 -> New quickstarts scripts folder. |
339,299 | 16.07.2021 13:59:26 | -7,200 | f307c56fe17dad09ab6360400aed29c073ed1503 | UserProfile metadata in Account REST API | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "core/src/main/java/org/keycloak/representations/account/UserProfileAttributeMetadata.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed und... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18812 UserProfile metadata in Account REST API |
339,299 | 22.07.2021 14:55:15 | -7,200 | fff27f8bd6b8e3102f7d31e8a0676313e46d5082 | fixing Account REST API tests under User Profile enabled | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/account/AccountRestServiceTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/account/AccountRestServiceTest.java",
"diff": "... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18812 fixing Account REST API tests under User Profile enabled |
339,511 | 23.07.2021 03:04:50 | -32,400 | 84e19f1c57b790a462d28c98af52ba506550be74 | FAPI-CIBA-ID1 : need to only accept confidential client on Backchannel Authentication endpoint | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/ConfidentialClientAcceptExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/ConfidentialClientAcceptExecutor.java",
"diff": "@@ -45,6 +45,8 @@ public... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18833 FAPI-CIBA-ID1 : need to only accept confidential client on Backchannel Authentication endpoint |
339,185 | 22.07.2021 19:05:28 | -7,200 | 6b9040d18adc1d937be57b1eb81e38105301b053 | Fix intermittent LoginTest failures | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/updaters/RealmAttributeUpdater.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/updaters/RealmAttributeUpdater.java",
"diff": "... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18876 Fix intermittent LoginTest failures |
339,511 | 23.07.2021 05:36:28 | -32,400 | 643671651421936daf772a04d866fb17f7a01b9c | Client Policies : ClientScopesCondition needs to be evaluated on CIBA backchannel authentication request and token request | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/CibaGrantType.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/CibaGrantType.java",
"diff": "@@ -152,6 +152,7 @@ public class CibaGrantType {\nthrow new CorsErrorRes... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18834 Client Policies : ClientScopesCondition needs to be evaluated on CIBA backchannel authentication request and token request |
339,487 | 22.07.2021 17:06:58 | 10,800 | 579302f396a777b626fb476b3d9a1c657beceaca | Register the subsystem parser for older versions of the OIDC adapter schemas | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/as7-eap6/as7-subsystem/src/main/java/org/keycloak/subsystem/as7/KeycloakExtension.java",
"new_path": "adapters/oidc/as7-eap6/as7-subsystem/src/main/java/org/keycloak/subsystem/as7/KeycloakExtension.java",
"diff": "@@ -37,7 +37,9 @@ import static ... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18878] Register the subsystem parser for older versions of the OIDC adapter schemas |
339,511 | 22.07.2021 13:19:11 | -32,400 | 9018fe9fadbd3281ee4865ec3dd53aa9c63fda97 | Global client profile for FAPI CIBA | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/resources/keycloak-default-client-profiles.json",
"new_path": "services/src/main/resources/keycloak-default-client-profiles.json",
"diff": "}\n}\n]\n+ },\n+ {\n+ \"name\" : \"fapi-ciba\",\n+ \"description\" : \"Client profile, which enforce c... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18863 Global client profile for FAPI CIBA |
339,653 | 08.07.2021 21:03:50 | -7,200 | c6e7c06f6c880fd230ea54d742d6b5017da5ef56 | Support user lookup by ID with Novell eDirectory
The LDAPOperationManager does not encode GUID correctly when looking up
federated users from Novell eDirectory.
The correct encoding can be found here: | [
{
"change_type": "MODIFY",
"old_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/idm/store/ldap/LDAPOperationManager.java",
"new_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/idm/store/ldap/LDAPOperationManager.java",
"diff": "@@ -392,6 +392,8 @@ public class LDAPOpe... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18695 Support user lookup by ID with Novell eDirectory
The LDAPOperationManager does not encode GUID correctly when looking up
federated users from Novell eDirectory.
The correct encoding can be found here:
https://support.novell.com/docs/Tids/Solutions/10096551.html |
339,465 | 27.07.2021 09:01:18 | -7,200 | ce80a3ba9b5092e40b1189aa11e23238df051952 | Test for update clientNotificationEndpoint to 'http' URL should fail | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/client/ClientPoliciesTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/client/ClientPoliciesTest.java",
"diff": "@@ -43,6 +... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18901 Test for update clientNotificationEndpoint to 'http' URL should fail |
339,465 | 27.07.2021 21:24:23 | -7,200 | 4520cbd38c17588f0b35c0222ab177373ec07fa5 | Support cert-bound tokens when doing client credentials grant. Client policies support for client credentials grant | [
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/services/clientpolicy/ClientPolicyEvent.java",
"new_path": "server-spi/src/main/java/org/keycloak/services/clientpolicy/ClientPolicyEvent.java",
"diff": "@@ -32,6 +32,7 @@ public enum ClientPolicyEvent {\nUNREGISTER,\nAUTH... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18904 Support cert-bound tokens when doing client credentials grant. Client policies support for client credentials grant |
339,343 | 22.06.2021 16:17:46 | -7,200 | aee2ccfeea84159eeb5b2ca900b8e7b1fc43be99 | Galleon Adapter Pack dependencies adjust to EAP 7.4.0. | [
{
"change_type": "MODIFY",
"old_path": "distribution/galleon-feature-packs/adapter-galleon-pack/pom.xml",
"new_path": "distribution/galleon-feature-packs/adapter-galleon-pack/pom.xml",
"diff": "<modelVersion>4.0.0</modelVersion>\n- <groupId>${galleon-adapter-group-id}</groupId>\n+ <groupId>org.keycl... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17502 Galleon Adapter Pack dependencies adjust to EAP 7.4.0. |
339,343 | 22.06.2021 19:50:09 | -7,200 | 052606fbcbc84d4797cd5fc49570834f9c3621cc | Galleon Server Pack dependencies adjust to EAP 7.4.0 | [
{
"change_type": "MODIFY",
"old_path": "distribution/galleon-feature-packs/adapter-galleon-pack/pom.xml",
"new_path": "distribution/galleon-feature-packs/adapter-galleon-pack/pom.xml",
"diff": "<dependencies>\n<dependency>\n<groupId>org.jboss.eap</groupId>\n- <artifactId>wildfly-galleon-pack</artifa... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17502 Galleon Server Pack dependencies adjust to EAP 7.4.0 |
339,343 | 21.07.2021 16:17:30 | -7,200 | ac92e600fc9cdda1ff99ee76d2dda960d2864db2 | fix productization issue with two formats of packaged final server distribution | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "distribution/server-dist/assembly-zip-only.xml",
"diff": "+<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n+<assembly xmlns=\"http://maven.apache.org/plugins/maven-assembly-plugin/assembly/1.1.2\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instanc... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17502 fix productization issue with two formats of packaged final server distribution |
339,442 | 07.07.2021 17:35:32 | -7,200 | acb2ac1c8d1c82874f52436cbfef1ddfec301bec | UI for managing group of attributes | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"new_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"diff": "@@ -1919,6 +1919,7 @@ dialogs.delete.message=Are you sure you want to pe... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18875 UI for managing group of attributes |
339,465 | 21.07.2021 11:16:37 | -7,200 | e58eeca80066d225e390c4237c6b83636648325e | Add UPDATE_PASSWORD required action only to authenticationSession when MSAD requires user to change password | [
{
"change_type": "MODIFY",
"old_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/msad/MSADUserAccountControlStorageMapper.java",
"new_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/msad/MSADUserAccountControlStorageMapper.java",
"diff": "@@ -24,6 +24,7... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18706 Add UPDATE_PASSWORD required action only to authenticationSession when MSAD requires user to change password |
339,465 | 28.07.2021 08:22:41 | -7,200 | 05dfed721a62a4117d1c8e5dcfdc7b6e26e466dd | The mtls_endpoint_aliases claim is not advertized in the discovery document | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "core/src/main/java/org/keycloak/protocol/oidc/representations/MTLSEndpointAliases.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18636 The mtls_endpoint_aliases claim is not advertized in the discovery document |
339,465 | 28.07.2021 10:27:40 | -7,200 | 9b0e1fff8d6f97f37029f1340c7095088c44f95d | More customizable OIDC WellKnown provider | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/OIDCWellKnownProvider.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/OIDCWellKnownProvider.java",
"diff": "@@ -46,6 +46,7 @@ import org.keycloak.services.clientregistration.ClientRegistra... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18903 More customizable OIDC WellKnown provider |
339,465 | 10.02.2021 10:44:11 | -3,600 | 4dacbb9e0b733f772d6e76884c56448f06109806 | User not able to revoke his offline token for directGrant clients | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/account/AccountRestService.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/account/AccountRestService.java",
"diff": "@@ -492,7 +492,7 @@ public class AccountRestService {\nrealm... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16996 User not able to revoke his offline token for directGrant clients |
339,487 | 27.06.2021 23:31:12 | 10,800 | 9e676fce7ed2a481466bb5e1d3ce5e31c0d56514 | Fix SAML adapters so they allow unescaped characters in URIs
Makes adapters bahavior consistent with containers that allow unescaped characters in URIs | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/adapter-core/src/main/java/org/keycloak/adapters/OAuthRequestAuthenticator.java",
"new_path": "adapters/oidc/adapter-core/src/main/java/org/keycloak/adapters/OAuthRequestAuthenticator.java",
"diff": "@@ -151,7 +151,7 @@ public class OAuthRequestA... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18559] Fix SAML adapters so they allow unescaped characters in URIs
- Makes adapters bahavior consistent with containers that allow unescaped characters in URIs |
339,652 | 10.06.2021 17:47:47 | -7,200 | a412bb7b99468fc80db57f18e2c1271696b86fc1 | Skip SAML 2.0 AttributeValue with user-defined xsi types | [
{
"change_type": "MODIFY",
"old_path": "saml-core/src/main/java/org/keycloak/saml/processing/core/parsers/saml/assertion/SAMLAttributeValueParser.java",
"new_path": "saml-core/src/main/java/org/keycloak/saml/processing/core/parsers/saml/assertion/SAMLAttributeValueParser.java",
"diff": "@@ -105,7 +1... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18417] Skip SAML 2.0 AttributeValue with user-defined xsi types |
339,185 | 29.07.2021 21:38:38 | -7,200 | 0cdce1340d876faa0e405a65e45aea3367fb4273 | Always close result stream | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/authorization/jpa/store/JPAPermissionTicketStore.java",
"new_path": "model/jpa/src/main/java/org/keycloak/authorization/jpa/store/JPAPermissionTicketStore.java",
"diff": "@@ -43,6 +43,7 @@ import org.keycloak.models.utils.K... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18680 Always close result stream |
339,343 | 29.07.2021 09:21:58 | -7,200 | 3ed20e287896cde238f8d7c2d2b8b8bfc943dc1b | Product distribution ZIP does not include rh-sso-7.5 folder | [
{
"change_type": "MODIFY",
"old_path": "distribution/server-dist/pom.xml",
"new_path": "distribution/server-dist/pom.xml",
"diff": "</dependencies>\n<build>\n- <finalName>${server.output.dir.prefix}-${server.output.dir.version}</finalName>\n<plugins>\n<plugin>\n<groupId>org.jboss.galleon</groupId>\n... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18597 Product distribution ZIP does not include rh-sso-7.5 folder |
339,690 | 30.07.2021 19:58:36 | -19,080 | 443bd4a1baa229cf674cb2b617df8838fc92d22d | update keycloak js for
while working on cordova+angular+ios the keycloak logout is not working. as the user clicks logout the user can again see the app instead of the inappbrowser page for login.
with clearcache=yes in the inappbrowser open the issue appears no more. | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/js/src/main/resources/keycloak.js",
"new_path": "adapters/oidc/js/src/main/resources/keycloak.js",
"diff": "var promise = createPromise();\nvar logoutUrl = kc.createLogoutUrl(options);\n- var ref = cordovaOpenWindowWrapper(logoutUrl, '_blank', 'l... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-15595: update keycloak js for KEYCLOAK-15595
while working on cordova+angular+ios the keycloak logout is not working. as the user clicks logout the user can again see the app instead of the inappbrowser page for login.
with clearcache=yes in the inappbrowser open the issue appears no more. |
339,652 | 30.07.2021 16:47:08 | -7,200 | 4e8e4592caf6f045508b249ed28120cdf37e3a42 | Support SAML 2.0 Encrypted IDs in Assertion | [
{
"change_type": "MODIFY",
"old_path": "saml-core/src/main/java/org/keycloak/saml/processing/core/saml/v2/util/AssertionUtil.java",
"new_path": "saml-core/src/main/java/org/keycloak/saml/processing/core/saml/v2/util/AssertionUtil.java",
"diff": "@@ -27,24 +27,30 @@ import org.keycloak.dom.saml.v2.as... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18419] Support SAML 2.0 Encrypted IDs in Assertion |
339,456 | 18.06.2021 10:23:01 | 14,400 | 1ad34c6ab0a639cdfe0e4f56eb8e0bcc10f5bf13 | French i18n contains wrong param | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources-community/theme/base/email/messages/messages_fr.properties",
"new_path": "themes/src/main/resources-community/theme/base/email/messages/messages_fr.properties",
"diff": "@@ -2,8 +2,8 @@ emailVerificationSubject=V\\u00e9rification du c... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18498] French i18n contains wrong param |
339,319 | 18.06.2021 14:22:07 | -7,200 | b4536a394abc8551ce9af24491278a56e25c2290 | Missing null check for session.userCache() added
NPE when existing user from LDAP is found (same LDAP_ID, but with changed username) and session.userCache() is null. | [
{
"change_type": "MODIFY",
"old_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/LDAPStorageProvider.java",
"new_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/LDAPStorageProvider.java",
"diff": "@@ -525,7 +525,9 @@ public class LDAPStorageProvider implements UserStor... | Java | Apache License 2.0 | keycloak/keycloak | Missing null check for session.userCache() added
NPE when existing user from LDAP is found (same LDAP_ID, but with changed username) and session.userCache() is null. |
339,251 | 01.08.2021 16:55:30 | -28,800 | a0b01b6ef4fc4d35964353696a2a7cd8ac74c69f | The username returned by token introspect endpoint is null when remove or modify username mapper | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/AccessTokenIntrospectionProvider.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/AccessTokenIntrospectionProvider.java",
"diff": "@@ -25,6 +25,7 @@ import org.keycloak.crypto.SignatureProv... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16703 The username returned by token introspect endpoint is null when remove or modify username mapper |
339,479 | 07.04.2020 14:37:43 | -7,200 | d8cb279bc4af68a023dd4fa05e673f95ca3340ea | add config for loading custom IdMapper class | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/servlet-filter/src/main/java/org/keycloak/adapters/servlet/KeycloakOIDCFilter.java",
"new_path": "adapters/oidc/servlet-filter/src/main/java/org/keycloak/adapters/servlet/KeycloakOIDCFilter.java",
"diff": "@@ -43,6 +43,9 @@ import java.io.FileInp... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17693 add config for loading custom IdMapper class |
339,465 | 03.08.2021 10:54:49 | -7,200 | b1d39aa136662d54deca10c97374f0932ce6316b | DirectGrant login should fail if authenticationSession contains some required actions | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenEndpoint.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenEndpoint.java",
"diff": "@@ -660,7 +660,7 @@ public class TokenEndpoint {\n}\nprocessor.evaluateRequi... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18949 DirectGrant login should fail if authenticationSession contains some required actions |
339,506 | 09.06.2021 11:14:06 | -7,200 | 565251d5a6f0d7885a9a5fc84037161d582af982 | Fix Groups search by name returns unwanted groups, cleanup test, skip tests on map storage provider feature | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/group/GroupTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/group/GroupTest.java",
"diff": "@@ -19,6 +19,7 @@ ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18380 Fix Groups search by name returns unwanted groups, cleanup test, skip tests on map storage provider feature |
339,506 | 09.06.2021 14:16:00 | -7,200 | 5d9d749fbdbd0693fb3cb4835662c4b54619faf5 | Fix Groups search by name returns unwanted groups | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/group/GroupTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/group/GroupTest.java",
"diff": "@@ -847,11 +847,9 ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18380 Fix Groups search by name returns unwanted groups
Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com>
Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com> |
339,185 | 03.08.2021 22:46:05 | -7,200 | 2acb43a6277acb3ab3f177fa6165d3e6ae0ee0c6 | Fix index on client attributes | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/resources/META-INF/jpa-changelog-14.0.0.xml",
"new_path": "model/jpa/src/main/resources/META-INF/jpa-changelog-14.0.0.xml",
"diff": "<changeSet author=\"keycloak\" id=\"14.0.0-KEYCLOAK-18286\">\n<preConditions onSqlOutput=\"TEST\" onFail=\"M... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18617 Fix index on client attributes |
339,550 | 03.06.2021 17:47:34 | -32,400 | b31b60fffe33154d075d952dba86a27d3621339b | Support JWKS OAuth2 Client Metadata in the "by value" key loading method | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/keys/loader/ClientPublicKeyLoader.java",
"new_path": "services/src/main/java/org/keycloak/keys/loader/ClientPublicKeyLoader.java",
"diff": "@@ -37,6 +37,7 @@ import org.keycloak.representations.idm.CertificateRepresentation;... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18341 Support JWKS OAuth2 Client Metadata in the "by value" key loading method |
339,165 | 03.08.2021 13:50:07 | -7,200 | 624a9a3ed7c49215764efd9f6bd522c46750d2c7 | Fix permission error when deleting client | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/authorization/store/syncronization/ClientApplicationSynchronizer.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/authorization/store/syncronization/ClientApplicationSynchronizer.java",
"diff": "@@... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18509 Fix permission error when deleting client |
339,500 | 05.08.2021 11:26:47 | -7,200 | b42f765c2abdafd38da3b5908f0a9af1b6aea8c3 | Token OIDC introspection endpoint should not update any of the timestamps | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/AccessTokenIntrospectionProvider.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/AccessTokenIntrospectionProvider.java",
"diff": "package org.keycloak.protocol.oidc;\nimport com.fasterxml.... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18982 Token OIDC introspection endpoint should not update any of the timestamps |
339,500 | 03.08.2021 15:58:35 | -7,200 | 6886bd6651c608011457d259968ab3e906c58336 | ExecutionException when computed future - InfinispanCacheInitializer | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java",
"new_path": "model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java",
"diff": "@@ -228,13 +228,19 @@ public class JpaUserSessio... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18941 ExecutionException when computed future - InfinispanCacheInitializer |
339,502 | 05.07.2021 13:22:06 | -10,800 | 62f222291cb18a49abaf3957accecaeb5b365a51 | Fixing the distribution/server-dist build problem | [
{
"change_type": "MODIFY",
"old_path": "distribution/galleon-feature-packs/server-galleon-pack/pom.xml",
"new_path": "distribution/galleon-feature-packs/server-galleon-pack/pom.xml",
"diff": "<scope>provided</scope>\n</dependency>\n+ <dependency>\n+ <groupId>org.keycloak</groupId>\n+ <artifactId>key... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18491 - Fixing the distribution/server-dist build problem |
339,433 | 26.03.2021 08:16:37 | 25,200 | 269b661b8a109e9813c4796445e058bfb372e55e | Prevent deletion of internal clients. | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/managers/ClientManager.java",
"new_path": "services/src/main/java/org/keycloak/services/managers/ClientManager.java",
"diff": "@@ -52,6 +52,8 @@ import java.util.Set;\nimport java.util.TreeSet;\nimport java.util.str... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16633 Prevent deletion of internal clients. |
339,299 | 09.08.2021 17:03:30 | -7,200 | afa6e31d367ed90912a01dae279b0261ae737a74 | User Profile: Patched handling of the "whitespace-only"
texts in pattern and length validators | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/validate/AbstractStringValidator.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/validate/AbstractStringValidator.java",
"diff": "*/\npackage org.keycloak.validate;\n-import org.keycloak.utils.Str... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-19006] User Profile: Patched handling of the "whitespace-only"
texts in pattern and length validators |
339,465 | 16.08.2021 16:20:26 | -7,200 | 3e0f8aed30caf7844c4992c460dd8e57e66cc904 | Reload user after being updated | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/js/controllers/users.js",
"new_path": "themes/src/main/resources/theme/base/admin/resources/js/controllers/users.js",
"diff": "@@ -385,7 +385,7 @@ module.controller('UserDetailCtrl', function($scope, realm, ... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19038 Reload user after being updated |
339,465 | 17.08.2021 15:46:49 | -7,200 | 418d1e34714b5587c1900054bc499213c11dbc1b | Sync UPDATE_PASSWORD required action to only to MSAD with WRITABLE edit mode. Add tests for MSAD mapper | [
{
"change_type": "MODIFY",
"old_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/msad/MSADUserAccountControlStorageMapper.java",
"new_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/msad/MSADUserAccountControlStorageMapper.java",
"diff": "@@ -276,9 +276... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19039 Sync UPDATE_PASSWORD required action to only to MSAD with WRITABLE edit mode. Add tests for MSAD mapper |
339,189 | 10.08.2021 14:20:14 | -7,200 | ba946b54f7ded054c54965b25d2f5ce370293893 | LDAPOperationManager.getFilterById is causing additional call to AD | [
{
"change_type": "MODIFY",
"old_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/idm/store/ldap/LDAPOperationManager.java",
"new_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/idm/store/ldap/LDAPOperationManager.java",
"diff": "@@ -373,33 +373,10 @@ public class LDAPO... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19021
LDAPOperationManager.getFilterById is causing additional call to AD |
339,167 | 18.08.2021 14:15:34 | -7,200 | 18cef60bbd3ba9989d15668b17dd0a80a0852fbe | Problems with validation of Email field that contains uppercase character | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/userprofile/DefaultAttributes.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/userprofile/DefaultAttributes.java",
"diff": "@@ -24,9 +24,11 @@ import java.util.Collections;\nimport java.util.HashM... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19037 Problems with validation of Email field that contains uppercase character |
339,281 | 18.08.2021 13:13:01 | -7,200 | 5fe675b6128fffa6173209adaa2c742075cb35b5 | prevent deletion of default role using RoleContainerResource | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/admin/RoleContainerResource.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/admin/RoleContainerResource.java",
"diff": "@@ -57,6 +57,7 @@ import java.util.Map;\nimport java.util.... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18841 prevent deletion of default role using RoleContainerResource |
339,345 | 31.08.2021 13:14:02 | 14,400 | 1c2752300b8c66b393e89ebcd95d2279993fc022 | Add a .gitleaks.toml
Help ignore false positives during internal code scans
~ B'ezrat Hashem ~ | [
{
"change_type": "ADD",
"old_path": null,
"new_path": ".gitleaks.toml",
"diff": "+#\n+# GitLeaks Repo Specific Configuration\n+#\n+# This allowlist is used to help Red Hat ignore false positives during its code\n+# scans.\n+\n+[allowlist]\n+ paths = [\n+ '''saml-core/src/test/java/org/keycloak/saml/... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19155: Add a .gitleaks.toml
Help ignore false positives during internal code scans
~ B'ezrat Hashem ~ |
339,281 | 30.08.2021 09:32:41 | -7,200 | d216f8f748f053a965087423c5eaf122e8e0b93a | Add custom ForeignKeySnapshotGenerator | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/CustomForeignKeySnapshotGenerator.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19104 Add custom ForeignKeySnapshotGenerator |
339,660 | 14.06.2021 14:09:56 | -7,200 | c7f8544b0c9bfd399666a645493dc94a90edadbb | Reset password : wrong email instructions when duplicates email is allowed | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/forms/login/freemarker/model/RealmBean.java",
"new_path": "services/src/main/java/org/keycloak/forms/login/freemarker/model/RealmBean.java",
"diff": "@@ -74,6 +74,10 @@ public class RealmBean {\nreturn realm.isLoginWithEmail... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18454 Reset password : wrong email instructions when duplicates email is allowed |
339,189 | 03.09.2021 12:49:25 | -7,200 | 0c64d32b9b19522d32128c2c7229e02524864d69 | LDAPDn should use a static Pattern instead calling String.split with a regex | [
{
"change_type": "MODIFY",
"old_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/idm/model/LDAPDn.java",
"new_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/idm/model/LDAPDn.java",
"diff": "@@ -22,6 +22,7 @@ import java.util.Collection;\nimport java.util.Deque;\nimpor... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19183
LDAPDn should use a static Pattern instead calling String.split with a regex |
339,185 | 02.09.2021 21:01:20 | -7,200 | 4518b3d3d11a7e5941a97863702cf26b0b1ad8fc | Split note for broker and SP SAML request ID | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/broker/saml/SAMLEndpoint.java",
"new_path": "services/src/main/java/org/keycloak/broker/saml/SAMLEndpoint.java",
"diff": "@@ -445,7 +445,7 @@ public class SAMLEndpoint {\n}\n// Validate InResponseTo attribute: must match the... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19143 Split note for broker and SP SAML request ID |
339,618 | 06.09.2021 10:11:39 | -7,200 | 5c3df54e90f9e6d9360e55aba32d99244878a0bb | extend building.md to prevent build errors | [
{
"change_type": "MODIFY",
"old_path": "docs/building.md",
"new_path": "docs/building.md",
"diff": "@@ -6,6 +6,23 @@ Ensure you have JDK 8 (or newer), Maven 3.5.4 (or newer) and Git installed\nmvn -version\ngit --version\n+**NOTE**\n+\n+If you use Maven 3.8.1 or newer, please add the following mirro... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17812 extend building.md to prevent build errors |
339,433 | 15.06.2021 05:40:41 | 25,200 | 67e3df654f62a9fb2f85140524cfbde08b5635b3 | Admin events trigger transaction rollback if exception is thrown. | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/admin/AdminEventBuilder.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/admin/AdminEventBuilder.java",
"diff": "@@ -242,11 +242,7 @@ public class AdminEventBuilder {\neventCopy.s... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18740 Admin events trigger transaction rollback if exception is thrown. |
339,465 | 14.09.2021 20:27:09 | -7,200 | 11e5f66c60ea53140dbc711a59b683f33462f9b9 | EDIT MODE field should not be leave empty | [
{
"change_type": "MODIFY",
"old_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/LDAPStorageProviderFactory.java",
"new_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/LDAPStorageProviderFactory.java",
"diff": "@@ -281,6 +281,18 @@ public class LDAPStorageProviderFacto... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19056 EDIT MODE field should not be leave empty (#8380) |
339,189 | 14.09.2021 19:09:46 | -7,200 | 4fe7d6d318a97618ae437f286cc4777a6f15d33b | LDAP Connection Pool not used with org.keycloak.truststore.SSLSocketFactory | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/truststore/SSLSocketFactory.java",
"new_path": "services/src/main/java/org/keycloak/truststore/SSLSocketFactory.java",
"diff": "@@ -22,6 +22,7 @@ import org.jboss.logging.Logger;\nimport java.io.IOException;\nimport java.net... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17110
LDAP Connection Pool not used with org.keycloak.truststore.SSLSocketFactory |
339,453 | 12.07.2021 13:12:59 | -7,200 | b5d477c421c26d5a7f91360a1282d7d07cd6436a | Check for federated credentials when resolving authenticators | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/authentication/AuthenticationSelectionResolver.java",
"new_path": "services/src/main/java/org/keycloak/authentication/AuthenticationSelectionResolver.java",
"diff": "@@ -23,6 +23,7 @@ import java.util.HashMap;\nimport java.u... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18556] Check for federated credentials when resolving authenticators |
339,618 | 17.09.2021 12:57:52 | -7,200 | 6d036a4647aa87796d39403ecea72ebfe4190ada | Already working Tests after upgrade to Quarkus2 | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/adapter/servlet/BrokerLinkAndTokenExchangeTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/adapter/servlet/BrokerLinkAndTokenE... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-13770 Already working Tests after upgrade to Quarkus2 |
339,251 | 06.08.2021 17:59:19 | -28,800 | c9809f015168e890bd45e9891f45b72f8041a530 | href attribute of a "Unable to scan?" tag is wrong in "Configure TOTP" page | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/forms/login/freemarker/model/TotpBean.java",
"new_path": "services/src/main/java/org/keycloak/forms/login/freemarker/model/TotpBean.java",
"diff": "@@ -77,7 +77,8 @@ public class TotpBean {\n}\npublic String getManualUrl() {... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18873 href attribute of a "Unable to scan?" tag is wrong in "Configure TOTP" page |
339,511 | 05.07.2021 07:01:24 | -32,400 | 375e47877efae5fe901f1019826f71151f0a4a12 | Client Policy - Endpoint : support Device Authorization Endpoint | [
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/services/clientpolicy/ClientPolicyEvent.java",
"new_path": "server-spi/src/main/java/org/keycloak/services/clientpolicy/ClientPolicyEvent.java",
"diff": "@@ -40,6 +40,8 @@ public enum ClientPolicyEvent {\nLOGOUT_REQUEST,\n... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18558 Client Policy - Endpoint : support Device Authorization Endpoint |
339,666 | 13.09.2021 15:14:59 | -7,200 | 2c22ccbf979c1cc939f7740b578118db1d1f200f | Use client storage provider id to construct client StorageId, so that a valid 'external' client id will be generated. | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java",
"new_path": "model/jpa/src/main/java/org/keycloak/models/jpa/session/JpaUserSessionPersisterProvider.java",
"diff": "@@ -434,7 +434,7 @@ public class JpaUserSessionP... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19286 Use client storage provider id to construct client StorageId, so that a valid 'external' client id will be generated. |
339,618 | 16.09.2021 15:42:55 | -7,200 | ac9e1f7f9277d6b487898023b1540ef99fededea | Fix Corrupted STDOUT warning | [
{
"change_type": "MODIFY",
"old_path": "pom.xml",
"new_path": "pom.xml",
"diff": "<plugin>\n<groupId>org.apache.maven.plugins</groupId>\n<artifactId>maven-surefire-plugin</artifactId>\n+ <version>3.0.0-M5</version>\n<configuration>\n+ <forkNode implementation=\"org.apache.maven.plugin.surefire.exten... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-13701 Fix Corrupted STDOUT warning |
339,154 | 20.09.2021 22:32:15 | -10,800 | 8f09d34272616090265225992e005c1fc3e79df2 | RealmsAdminResource now returns also a brief representation (not by default, to be backwards compatible) for realms[] if the appropriate flag is sent. | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/models/utils/ModelToRepresentation.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/models/utils/ModelToRepresentation.java",
"diff": "@@ -312,6 +312,16 @@ public class ModelToRepresentation {\nret... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18288 (#8096)
RealmsAdminResource now returns also a brief representation (not by default, to be backwards compatible) for realms[] if the appropriate flag is sent. |
339,487 | 21.09.2021 12:18:25 | 10,800 | 271033c3a4fca68634ed51acdb53883f8bf9efcb | Replace usages of deprecated setAllowNull(boolean) calls in the adapters subsystems with setRequired(boolean)
- WildFly will remove deprecated APIs, code needs to be changed before the next WildFly upgrade. | [
{
"change_type": "MODIFY",
"old_path": "adapters/saml/wildfly/wildfly-subsystem/src/main/java/org/keycloak/subsystem/adapter/saml/extension/IdentityProviderDefinition.java",
"new_path": "adapters/saml/wildfly/wildfly-subsystem/src/main/java/org/keycloak/subsystem/adapter/saml/extension/IdentityProviderD... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-19102] Replace usages of deprecated setAllowNull(boolean) calls in the adapters subsystems with setRequired(boolean)
- WildFly will remove deprecated APIs, code needs to be changed before the next WildFly upgrade. |
339,364 | 20.08.2021 19:34:55 | -7,200 | 69a146db7e91afdbc6935300b6975fa52a376eed | Keycloak cannot fetch group claims from openshift | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "services/src/main/java/org/keycloak/social/openshift/OpenshiftV4AttributeMapper.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under th... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18128 Keycloak cannot fetch group claims from openshift |
339,618 | 17.09.2021 15:36:02 | -7,200 | 20b91c7d4f2f3ff428c144f66ef3df5eb7442dc0 | Fix Quarkus ScriptDeploymentTests, Hostnametests and tests relying on user attribute config | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/HOW-TO-RUN.md",
"new_path": "testsuite/integration-arquillian/HOW-TO-RUN.md",
"diff": "@@ -1051,7 +1051,7 @@ Make sure you build the project using the `quarkus` profile as follows:\nRun tests using the `auth-server-quarkus` pro... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-13770 Fix Quarkus ScriptDeploymentTests, Hostnametests and tests relying on user attribute config |
339,235 | 27.09.2021 14:20:08 | -7,200 | 9f79476520b088656f88bd85182b498c45aacee3 | Fix issues in IntelliJ | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/fuse7/camel-undertow/pom.xml",
"new_path": "adapters/oidc/fuse7/camel-undertow/pom.xml",
"diff": "<packaging>bundle</packaging>\n<properties>\n- <maven.compiler.target>1.7</maven.compiler.target>\n- <maven.compiler.source>1.7</maven.compiler.sour... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19403 Fix issues in IntelliJ |
339,235 | 27.09.2021 16:12:48 | -7,200 | 8b262e3094b8481e05c81f9bb0fed31e61f91360 | Rewrite camel-undertow to stick with 1.7 | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/fuse7/camel-undertow/pom.xml",
"new_path": "adapters/oidc/fuse7/camel-undertow/pom.xml",
"diff": "<packaging>bundle</packaging>\n<properties>\n- <maven.compiler.target>1.8</maven.compiler.target>\n- <maven.compiler.source>1.8</maven.compiler.sour... | Java | Apache License 2.0 | keycloak/keycloak | Rewrite camel-undertow to stick with 1.7 |
339,235 | 27.09.2021 16:25:40 | -7,200 | b04236f7de32c311ea9428f2775db040c6727c98 | Fix saml-core issues without changing Java version | [
{
"change_type": "MODIFY",
"old_path": "saml-core/pom.xml",
"new_path": "saml-core/pom.xml",
"diff": "<description/>\n<properties>\n- <maven.compiler.target>1.8</maven.compiler.target>\n- <maven.compiler.source>1.8</maven.compiler.source>\n+ <maven.compiler.target>1.7</maven.compiler.target>\n+ <mav... | Java | Apache License 2.0 | keycloak/keycloak | Fix saml-core issues without changing Java version |
339,235 | 28.09.2021 11:47:36 | -7,200 | 12c7bc73505b62abed11d8bf6fca6258eec512b3 | Compile issues in IntelliJ due to imports of sun packages | [
{
"change_type": "MODIFY",
"old_path": "common/src/main/java/org/keycloak/common/util/PemUtils.java",
"new_path": "common/src/main/java/org/keycloak/common/util/PemUtils.java",
"diff": "@@ -35,6 +35,9 @@ import java.security.cert.X509Certificate;\n*/\npublic final class PemUtils {\n+ public static f... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19410 Compile issues in IntelliJ due to imports of sun packages |
339,618 | 28.09.2021 14:57:01 | -7,200 | 82964f746057947bf3bd9e07513cdf7ad9c13df2 | Working FixedHostnameTest for Quarkus | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/containers/KeycloakQuarkusServerDeployableContainer.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/containe... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-13770 Working FixedHostnameTest for Quarkus |
339,228 | 28.10.2020 20:56:09 | -3,600 | 64717f650b11cbc06bb498bbc4d6d107c9aed180 | Retrieve email from Twitter IdP | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/social/twitter/TwitterIdentityProvider.java",
"new_path": "services/src/main/java/org/keycloak/social/twitter/TwitterIdentityProvider.java",
"diff": "@@ -47,6 +47,7 @@ import twitter4j.Twitter;\nimport twitter4j.TwitterFacto... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-15167 Retrieve email from Twitter IdP |
339,618 | 30.09.2021 08:45:45 | -7,200 | 8cf35c9b7bea9516515f325e00016b4c0e5fa82f | Working DefaultThemeManagerTest | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/servers/auth-server/quarkus/pom.xml",
"new_path": "testsuite/integration-arquillian/servers/auth-server/quarkus/pom.xml",
"diff": "<offline.session.cache.owners>2</offline.session.cache.owners>\n<login.failure.cache.owners>2</l... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-13770 - Working DefaultThemeManagerTest |
339,329 | 04.10.2021 05:10:18 | 14,400 | 90947404a5f5a3b884aca95492c09f65adf9af14 | Make IdP display name available to idp link email subject
Make IdP display name available to idp link email subject | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/email/freemarker/FreeMarkerEmailTemplateProvider.java",
"new_path": "services/src/main/java/org/keycloak/email/freemarker/FreeMarkerEmailTemplateProvider.java",
"diff": "@@ -145,8 +145,13 @@ public class FreeMarkerEmailTempl... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16380 Make IdP display name available to idp link email subject (#7626)
KEYCLOAK-16380 Make IdP display name available to idp link email subject |
339,519 | 25.06.2021 13:55:10 | -7,200 | e5b05d05f0f796f27138325432ee2e954dc02fac | Fixed the adapter to use dynamic openid-configuration instead of building the tokenUrl by itself. | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/adapter-core/src/main/java/org/keycloak/adapters/BasicAuthRequestAuthenticator.java",
"new_path": "adapters/oidc/adapter-core/src/main/java/org/keycloak/adapters/BasicAuthRequestAuthenticator.java",
"diff": "@@ -89,9 +89,7 @@ public class BasicAu... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18551 Fixed the adapter to use dynamic openid-configuration instead of building the tokenUrl by itself. |
339,618 | 04.10.2021 13:54:22 | -7,200 | 021245a33095c899ab1d9606016f7cd1b9e33a7f | fix PasswordPolicyTest for Quarkus | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/servers/auth-server/quarkus/pom.xml",
"new_path": "testsuite/integration-arquillian/servers/auth-server/quarkus/pom.xml",
"diff": "</resources>\n</configuration>\n</execution>\n+ <execution>\n+ <id>add-pw-blacklist-file</id>\n+... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19463 fix PasswordPolicyTest for Quarkus |
339,618 | 04.10.2021 09:34:00 | -7,200 | 24a6b77fb46a3f821d91cd7d2de226ed40e3dbde | Allow comma separated args-list in CLI | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/cli/Picocli.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/cli/Picocli.java",
"diff": "@@ -42,6 +42,8 @@ import picocli.CommandLine;\nfinal class Picocli {\nprivate static final Logger logger = Logger.... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19425 Allow comma separated args-list in CLI |
339,581 | 04.10.2021 16:33:12 | -7,200 | 01a0e11c8f56d265e3ae824221e766b2ac7e215e | pass infinispan javaVmArguments via JAVA_OPTS instead of CLI parameters | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/containers/InfinispanServerDeployableContainer.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/containers/In... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19392 pass infinispan javaVmArguments via JAVA_OPTS instead of CLI parameters |
339,235 | 05.10.2021 09:38:01 | -7,200 | 12157bb66c1032ee7d067bda84dff311b2ad7994 | Add noopener/noreferrer to links | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/partials/client-list.html",
"new_path": "themes/src/main/resources/theme/base/admin/resources/partials/client-list.html",
"diff": "<td><a href=\"#/realms/{{realm.realm}}/clients/{{client.id}}\">{{client.clie... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19467 Add noopener/noreferrer to links |
339,618 | 05.10.2021 16:42:09 | -7,200 | cd7a22c174f6a23729b9d74fb4b560c6acda24e1 | Unignore LoginTest.loginWithLongRedirectUri by adding property to authserver-quarkus | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/servers/auth-server/quarkus/src/main/content/conf/keycloak.properties",
"new_path": "testsuite/integration-arquillian/servers/auth-server/quarkus/src/main/content/conf/keycloak.properties",
"diff": "@@ -35,3 +35,6 @@ spi.passwo... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19476: Unignore LoginTest.loginWithLongRedirectUri by adding property to authserver-quarkus |
339,618 | 13.09.2021 17:15:56 | -7,200 | 97ee8832a3946b220f04a89f91fd0fa12d732587 | Add special case for kubeadmin without uid and OCP4 | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/social/openshift/OpenshiftV4IdentityProvider.java",
"new_path": "services/src/main/java/org/keycloak/social/openshift/OpenshiftV4IdentityProvider.java",
"diff": "@@ -3,7 +3,6 @@ package org.keycloak.social.openshift;\nimport... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19079 Add special case for kubeadmin without uid and OCP4 |
339,618 | 07.10.2021 11:13:31 | -7,200 | 00feef4dbe9c465cc9c4ddd0fd999959038f3219 | Unignore ArtifactBindingCustomResolverTest and make SetDefaultProvider Annotation usable for Quarkus-based distribution | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/servers/auth-server/quarkus/src/main/content/conf/keycloak.properties",
"new_path": "testsuite/integration-arquillian/servers/auth-server/quarkus/src/main/content/conf/keycloak.properties",
"diff": "@@ -40,4 +40,4 @@ spi.connec... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19496 Unignore ArtifactBindingCustomResolverTest and make SetDefaultProvider Annotation usable for Quarkus-based distribution |
339,185 | 04.10.2021 12:16:40 | -7,200 | 576292a662328c4f91cf118bd3cf0a46b1f47bcc | Introduce MapProtocolMapperEntity | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientAdapter.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientAdapter.java",
"diff": "@@ -503,10 +503,35 @@ public abstract class MapClientAdapter extends AbstractCli... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19480 Introduce MapProtocolMapperEntity |
339,618 | 11.10.2021 16:32:01 | -7,200 | 395cd792ff0d86bf870fcbb18820813549f5833a | Fix resourcetag after restart in Keycloak.X | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/connections/jpa/QuarkusJpaConnectionProviderFactory.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/connections/jpa/QuarkusJpaConnectionProviderFactory.java",
"diff": "@@ -29,7 +29,6 @@ import java.sql.... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19521 Fix resourcetag after restart in Keycloak.X |
339,618 | 11.10.2021 16:36:29 | -7,200 | ce0070508f0ca7636c0a8a16371c0e574e2e5a8a | Unignore JsonFileImportTests now that is done | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/migration/AbstractJsonFileImportMigrationTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/migration/AbstractJsonFileImportMigr... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19457 Unignore JsonFileImportTests now that KEYCLOAK-19521 is done |
339,250 | 29.07.2021 10:20:07 | -7,200 | 5b0986e490090433658e9a1e607c0e248f4cc756 | Add support for searching users by custom user attributes
Users can now be searched by custom attributes using 'q' in the query parameters. The implementation is roughly the same as search clients by custom attributes. | [
{
"change_type": "MODIFY",
"old_path": "integration/admin-client/src/main/java/org/keycloak/admin/client/resource/UsersResource.java",
"new_path": "integration/admin-client/src/main/java/org/keycloak/admin/client/resource/UsersResource.java",
"diff": "@@ -109,6 +109,20 @@ public interface UsersResou... | Java | Apache License 2.0 | keycloak/keycloak | [KEYCLOAK-18891] Add support for searching users by custom user attributes
Users can now be searched by custom attributes using 'q' in the query parameters. The implementation is roughly the same as search clients by custom attributes. |
339,511 | 08.10.2021 15:57:03 | -32,400 | a4f83c569d5da0dc046cb497ff4bc117b36dd3e2 | Nested JWT JOSE header needs to set JWT to cty field | [
{
"change_type": "MODIFY",
"old_path": "core/src/main/java/org/keycloak/jose/jwe/JWEHeader.java",
"new_path": "core/src/main/java/org/keycloak/jose/jwe/JWEHeader.java",
"diff": "@@ -67,6 +67,14 @@ public class JWEHeader implements JOSEHeader {\nthis.keyId = keyId;\n}\n+ public JWEHeader(String algor... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19510 Nested JWT JOSE header needs to set JWT to cty field |
339,281 | 12.10.2021 16:28:05 | -7,200 | dacf28af84e17f13fc3d03d63cb4ee2c5dfdc927 | Removal of client creates new instance of provider for each client role | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProviderFactory.java",
"new_path": "model/jpa/src/main/java/org/keycloak/models/jpa/JpaRealmProviderFactory.java",
"diff": "@@ -26,6 +26,7 @@ import org.keycloak.models.RealmProviderFactory;\nimport javax... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19536 Removal of client creates new instance of provider for each client role |
339,500 | 12.10.2021 09:21:12 | -7,200 | d069ec79499982dd00f7055eb8e061c5df8186bf | Show sessions functionality does not work consistently | [
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/InfinispanUserSessionProvider.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/InfinispanUserSessionProvider.java",
"diff": "@@ -370,7 +370,7 @@ pu... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18737 Show sessions functionality does not work consistently
Co-authored-by: Pavel Bezdienezhnykh
Co-authored-by: Martin Kanis <mkanis@redhat.com> |
339,618 | 12.10.2021 15:10:55 | -7,200 | 8f3940032ef46f6f7036d8ec119bfca8f46fcfa2 | Add dependency for openshift restclient to quarkus dist to make the OpenShiftClientStorageTest work. | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/pom.xml",
"new_path": "quarkus/runtime/pom.xml",
"diff": "<name>Keycloak Quarkus Server Extension</name>\n<artifactId>keycloak-quarkus-server</artifactId>\n<description>Keycloak Server</description>\n-\n<dependencies>\n<!-- Quarkus -->\n<depend... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19461 Add dependency for openshift restclient to quarkus dist to make the OpenShiftClientStorageTest work. |
339,256 | 15.10.2020 23:37:34 | -32,400 | f9fdee0fba2f202183f194c6a96f6a09c153c688 | add attributes to keycloak.d.ts | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/js/src/main/resources/keycloak.d.ts",
"new_path": "adapters/oidc/js/src/main/resources/keycloak.d.ts",
"diff": "@@ -308,13 +308,23 @@ declare namespace Keycloak {\n}\ninterface KeycloakTokenParsed {\n+ acr?: string;\n+ aud?: string;\n+ auth_time?... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16426 add attributes to keycloak.d.ts |
339,256 | 02.10.2021 13:53:41 | -32,400 | bf01ae0885b67a2bf98d33033553c32a83c7e7bd | adapt signature to official spec | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/js/src/main/resources/keycloak.d.ts",
"new_path": "adapters/oidc/js/src/main/resources/keycloak.d.ts",
"diff": "@@ -308,23 +308,19 @@ declare namespace Keycloak {\n}\ninterface KeycloakTokenParsed {\n- acr?: string;\n+ iss?: string;\n+ sub?: stri... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16426 adapt signature to official spec |
339,256 | 08.10.2021 19:17:36 | -32,400 | 5d560c1051a00dcaf04138aa6c50123f72fe525e | add optional field to token parsed | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/js/src/main/resources/keycloak.d.ts",
"new_path": "adapters/oidc/js/src/main/resources/keycloak.d.ts",
"diff": "@@ -321,6 +321,7 @@ declare namespace Keycloak {\nsession_state?: string;\nrealm_access?: KeycloakRoles;\nresource_access?: KeycloakRe... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-16426 add optional field to token parsed |
339,465 | 14.10.2021 21:09:57 | -7,200 | c5432e71adf74a274f4d736d4ba05e5adcb77d5d | Misleading label for client parameter 'Pushed Authorization Request Enabled' | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"new_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"diff": "@@ -1899,7 +1899,7 @@ tls-client-certificate-bound-access-tokens=OAuth 2... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19557 Misleading label for client parameter 'Pushed Authorization Request Enabled' |
339,465 | 15.10.2021 09:40:30 | -7,200 | acd00a492b990625fbfca95c1dd117bdd6e398ec | Avoid auto-creating invalid redirect URL for FAPI clients | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureClientUrisExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureClientUrisExecutor.java",
"diff": "@@ -62,7 +62,14 @@ public class SecureCl... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19556 Avoid auto-creating invalid redirect URL for FAPI clients |
339,618 | 14.10.2021 14:08:38 | -7,200 | a3b23700eaf5b2a3f00f3313e99ee29536ebdfd3 | Fix Resteasy Bug in Authenticators for Keycloak.X | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/authentication/authenticators/client/AbstractClientAuthenticator.java",
"new_path": "services/src/main/java/org/keycloak/authentication/authenticators/client/AbstractClientAuthenticator.java",
"diff": "package org.keycloak.a... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19553 Fix Resteasy Bug in Authenticators for Keycloak.X |
339,465 | 15.10.2021 11:08:24 | -7,200 | 7010017e0ea75688565a5110eb416d53b201c57b | Improvements in ConsentRequiredExecutor of client policies | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/ConsentRequiredExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/ConsentRequiredExecutor.java",
"diff": "package org.keycloak.services.clientpolicy... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19555 Improvements in ConsentRequiredExecutor of client policies |
339,364 | 18.10.2021 09:35:32 | -7,200 | 7d0af8519b0c4c90badd420bba75005ae4cdfa8a | Simplify the RHSSO setup in an OpenShift Disconnected cluster
Simplify the RHSSO setup in an OpenShift Disconnected cluster | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/connections/httpclient/DefaultHttpClientFactory.java",
"new_path": "services/src/main/java/org/keycloak/connections/httpclient/DefaultHttpClientFactory.java",
"diff": "@@ -39,6 +39,8 @@ import java.util.concurrent.TimeUnit;\... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19080 Simplify the RHSSO setup in an OpenShift Disconnected cluster
KEYCLOAK-19080 Simplify the RHSSO setup in an OpenShift Disconnected cluster |
339,618 | 14.10.2021 16:45:53 | -7,200 | 7b135c4dfce3c8cd79cf515fd02f35059a21e07e | Unignore OpenShiftTokenReviewEndpointTest | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/openshift/OpenShiftTokenReviewEndpointTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/openshift/OpenShiftTokenReviewEndpointT... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19461 Unignore OpenShiftTokenReviewEndpointTest |
339,706 | 18.10.2021 11:47:43 | 14,400 | c392538f6954c1ab533e63847a5b96047931c127 | Different user authenticated results in server error instead of bad request | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/authentication/AuthenticationProcessor.java",
"new_path": "services/src/main/java/org/keycloak/authentication/AuthenticationProcessor.java",
"diff": "@@ -1042,7 +1042,7 @@ public class AuthenticationProcessor {\nif (!authSes... | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19575: Different user authenticated results in server error instead of bad request |
339,213 | 16.10.2020 16:07:05 | -10,800 | 01b92220d25e14191b6735c192e40eca2bc27a3b | [feature/KEYCLOAK-15976]: Latvian language support | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "themes/src/main/resources-community/theme/base/account/messages/messages_lv.properties",
"diff": "+# encoding: utf-8\n+doSave=Saglab\\u0101t\n+doCancel=Atcelt\n+doLogOutAllSessions=Izlogoties no vis\\u0101m sesij\\u0101m\n+doRemove=No\\u0146emt\... | Java | Apache License 2.0 | keycloak/keycloak | [feature/KEYCLOAK-15976]: KEYCLOAK-15976 Latvian language support |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.