repository
stringclasses
156 values
issue title
stringlengths
1
1.01k
labels
stringclasses
8 values
body
stringlengths
1
270k
keycloakkeycloak
ux review client policy configure policy client scope the toolbar function of the select modal
Bug
describe the bug when the filter doesn t have any match result should show the toolbar with the empty state instead of the follow screenshot image sometimes the search result doesn t match the filter e g when I m search p role appear in the table which doesn t include a p in the role name image version 15 0 2 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy configure policy client scope the select modal layout
Bug
describe the bug protocol column be duplicate the table should follow the alphabetical order remove the pagination in the bottom image version 15 0 2 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy configure policy client scope the select component doesn t perform in the correct way
Bug
describe the bug the border of the select component be miss image version 15 0 2 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy configure policy role the select menu show duplicate option
Bug
describe the bug for the client role type the menu show an option for multiple time the placeholder should be select or create a role name when the user type in a new option name and trigger the creation ability if there re a lot of option that match the type word the create option be at the bottom of the menu and hard to detective this be a patternfly issue have communicate with pf team and they will soon introduce the menu component for the typeahead version it may use a fix footer to hold the create action instead for the client updater source role the same issue happen also admin role should be the default select option for this type image version 15 0 2 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy policy detail the spacing of the condition list be not consistent
Bug
describe the bug see the follow screenshot all the spacing should be align with the client role row image version 15 0 2 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
register event not trigger on external to internal token exchange
Enhancement
describe the bug if a user be create when use external token to internal token exchange external token to internal token exchange no eventtype register be trigger version 15 0 1 and 12 0 4 expect behavior a register event should also be log actual behavior no register event be trigger how to reproduce setup token exchange and login use a user that do not have an account in keycloak check the event we test this with both google and facebook idp anything else a register event be trigger if a keycloak user be create use the normal oauth 2 0 flow so I expect it to be trigger on token exchange too temporary fix note this will trigger 2 register event on the normal oauth 2 0 flow and one register event on token exchange add a new identityprovidermapper and trigger the event inside importnewuser public class triggerregisteruserevent extend abstractidentityprovidermapper public static final string compatible provider google facebook override public void importnewuser keycloaksession session realmmodel realm usermodel user identityprovidermappermodel mappermodel brokeredidentitycontext context eventbuilder event new eventbuilder realm session session getcontext getconnection event eventtype register user user client session getcontext getclient detail detail identity provider context getidpconfig getalias detail detail register method token exchange detail detail identity provider username context getusername if user getemail null event detail detail email user getemail event success
keycloakkeycloak
remove any reference to configuration profile
Enhancement
description we should remove any reference to the configuration profile include cli message cli option documentation discussion no response motivation no response detail no response
keycloakkeycloak
add a quarkus property for unsupported configuration option
Enhancement
description user should not use keycloak config source to set specific quarkus property use quarkus option be consider an advanced usage and not support by have a separate quarkus property file we have a clear separation between keycloak support and unsupported option as well as help to figure out what we might be miss in term of configuration option discussion motivation clear separation between keycloak and quarkus property well define approach for customization when keycloak be miss a set of one or more configuration option well define approach for understand how quarkus property be use and how we can improve the configuration to provide a proper abstraction depend on the property you want to set you might need re augmentation avoid additional overhead when start the server like load the file itself or perform additional step that can be optimize by a keycloak specific configuration no response detail no response
keycloakkeycloak
ux review client policy policy add condition the edit policy page doesn t load correctly after add a condition
Bug
describe the bug after add a condition and save the page will jump back to the policy detail page but the page doesn t load correctly edit it work when I try for another time not sure whether that s a one time issue image version 15 0 2 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy policy detail edit policy name will influence the page header
Bug
describe the bug I try to add some letter at the very beginning of the policy name new policy when I m type the first letter that I type will also be add to the page header see the screenshot image version 15 0 2 expect behavior the header win t change actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy policy detail button style be not correct
Bug
describe the bug the second button should be reload instead of revert the reload button should be in the link style image version 15 0 2 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy policy add profile the modal show a wrong table
Bug
describe the bug the table in the modal should be totally the same as the profile list only the global profile have label global the label be after the profile name the profile that have already be add win t show up in the modal anymore version 15 0 2 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy policy list disable a policy from the table should show a confirmation modal
Bug
describe the bug currently if the user disable the policy from the table there isn t a confirmation modal version 15 0 2 expect behavior image actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy profile executor detail the change can not be save
Bug
describe the bug I try to change the configuration of the executor the change win t be save whether I change they during creation or edit breadcrumb be not correct in the detail page should be realm setting client policy profile name executor detail breadcrumb be not correct in the creation page should be realm setting client policy profile name add executor image version 15 0 2 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy profile creation breadcrumb be not correct
Bug
describe the bug the client policy level be miss should be realm setting client policy create client profile image version 15 0 2 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy global profile executor detail all the setting should be read only the default value be not correct breadcrumb issue
Bug
describe the bug user be not permit to change the global profile so all the setting field should be read only disabled the default value of the setting be not correct please reference the old console for the correct setting the breadcrumb be not correct should be realm setting client policy client policy name executor detail version 15 0 2 expect behavior image actual behavior image how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy global profile detail label color be not correct
Bug
describe the bug the label should be in the same color as the outside list version 15 0 expect behavior image actual behavior image how to reproduce no response anything else no response
keycloakkeycloak
fix migration test
Bug
close 9550
keycloakkeycloak
ux review add the logout setting in the oidc client setting pgae
Bug
describe the bug edewit I ve review the oidc client setting page and find that there be a setting group name logout setting miss we can add this group under the login setting as show in the screenshot below in addition the group link should be add in the jump to section version new admin ui expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review some fun tuning of the search form in the admin event
Bug
describe the bug there be some fine tuning of the search form on the admin event page as show in the picture below 1 the field overlap tag it look wire so we can change this part 2 add a reset button in the search form version new admin ui expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review the client list should be arrange alphabetically
Bug
describe the bug I find that the client be not arrange alphabetically therefore we change the order of these client version new admin ui expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
keycloak x can not lookup embed theme resource from extension jar
Bug
describe the bug the wildfly base keycloak distribution support accessing embed template from theme resource folder in extension jar the keycloak x distribution fail to resolve template form theme resource during boostrap the providermanager be configure a keycloakdeploymentinfo with service lookup enable but without theme resource support l438 therefore no classpaththemeresourceproviderfactory be configure and therefore nest theme resource lookup be not support in the wildfly base keycloak distribution the classpaththemeresourceproviderfactory be register via the defaultproviderloader l65 version keycloak x 16 1 0 expect behavior keycloak x should support nest theme resource lookup as the wildfly base keycloak distribution do actual behavior nest theme resource lookup do not work how to reproduce 1 create an extension authenticator with embed resource 2 deploy the extension with keycloak x 3 try to access the authenticator 4 the server console will contain a strack trace indicate that the theme template could not be find anything else a naive fix could be to change the line l438 to java providermanager pm new providermanager keycloakdeploymentinfo create service theme themeresource classloader as a workaround we explicitly register the classpaththemeresourceproviderfactory with a custom implementation java package com github thomasdarimont keycloakx theme import com google auto service autoservice import org keycloak theme classpaththemeresourceproviderfactory import org keycloak theme themeresourceproviderfactory workaround for miss link classpaththemeresourceproviderfactory in keycloak x to support theme resource in extension jar autoservice themeresourceproviderfactory class public class customclasspaththemeresourceproviderfactory extend classpaththemeresourceproviderfactory private static final string i d custom classpath themeresource provider public customclasspaththemeresourceproviderfactory super i d thread currentthread getcontextclassloader override public string getid return i d
keycloakkeycloak
limit time for run model test
Bug
workaround for 9648
keycloakkeycloak
update admin console documentation link
Bug
describe the bug this be a follow up to add new doc link for the learn more link that appear on all landing page of the new admin console which be add in how to update link this be the file that contain all of the help url that need to be update to the late doc src help url ts currently the file contain link to the close match in the exist doc on keycloak org the admin guide main url be list at the top of the page const adminguide and each of the url be a specific anchor within that main url e g clientsurl adminguide assembly manage client server administration guide so you would just need to edit the one adminguide url at the top of the page with the late admin guide s index html and each of the 11 landing page url with the late anchor also there be 5 landing page that be miss description at the top of the page for these you could just edit the placeholder for string in these file src authentication message ts authenticationexplain placeholder for authentication explanation src group message ts groupsdescription placeholder for authentication explanation src realm setting message ts realmsettingsexplain placeholder for realm setting explanation src session message ts sessionexplain placeholder for session explanation src user message ts usersexplain placeholder for user explanation
keycloakkeycloak
memory leak in keycloak
Bug
describe the bug we have 2 application under 2 client and one app a be send heartbeat to the other b a be use client secret as credential in application yaml keycloak credential secret keycloak client secret for authzclient httpclient httpclient new httpclientbuilder disabletrustmanager build configuration configuration new configuration kcpropertie getauthserverurl kcpropertie getrealm kcproperties getresource kcpropertie getcredential httpclient authzclient create configuration for get access token accesstokenresponse accesstokenresponse authzclient obtainaccesstoken for send heartbeat httprequ request httprequ newbuilder initheartbeaturi header content type application json header accept application json header authorization bearer accesstoken post httprequest bodypublisher ofstre objectmapper writevalueasstre status build httpresponse response httpclient send request bodyhandler ofstre in keycloak client setting access token lifespan 30min client session max 20min client session idle 5min after a period of time memory usage of keycloak go up continuously when we dump the jvm heap we find 2 kind of object keep increase previous num instance byte class name module 5 164364 6574560 org infinispan container entry mortalcacheentry 9 164352 2629632 org keycloak model session infinispan entity actiontokenvalueentity after 1 hr 4 264762 10590480 org infinispan container entry mortalcacheentry 8 264750 4236000 org keycloak model session infinispan entities actiontokenvalueentity be there any config I m not do correctly or be there any memory leak in keycloak look forward to any idea thank a lot version 16 0 1 expect behavior memory do not increase continuously and get release periodically actual behavior memory usage increase continuously how to reproduce no response anything else no response
keycloakkeycloak
handle lazy loading exception for storage in new and old storage
Bug
describe the bug when lazy loading information from the jpa map storage the test concurrencytest createremoveclient show npe when a client be remove while populate the list of client with the old jpa storage this be handle that all exception during lazy loading where catch and the entity involve would be remove from the list of client return to the caller use try c getclientid return true catch exception ex return false version 17 0 0 snapshot expect behavior throw a specific exception relate to lazy loading across all storage implementation don t depend on a storage provider specific specific field as with c getclientid to trigger the exception document the behavior of remove client from the client list when a lazy loading exception occur handle lazy loading situation in map jpa storage implementation for deletion and modification of entity actual behavior all exception be catch provider specific field to trigger lazy loading problem no documentation present neither for the caller nor in the code no handling of lazy loading issue in jpa map storage provider how to reproduce run concurrencytest createremoveclient with map jpa storage configuration anything else there s be a github discussion to find out what need to be do this will be apply in all place where the pattern of filter out client be use also implement similar handling for map jpa role revisit l157 l166 to see if the isolation warning can now be drop out of scope client will not be able to identify what client have be remove this be the same behavior we have today all illegal state exception will be handle the same way both remove and modify client will lead to the client not be list in the caller s result no retrying of the request or return a 500 error as this could potentially lead to a denial of service situation when a lot of client be modify concurrently
keycloakkeycloak
infinity redirect on deployment keycloakx 16 1 0 image in kubernete ingress nginx service kx pod
Bug
describe the bug I have a problem with deployment keycloakx 16 1 0 image to kubernete ingress nginx service kx pod the problem be infinity redirection with login password correct on realm after press login button in version 14 we solve this by add flag http proxy address forward true on run keycloak in pod fail redirect url location now in 16th a lot of change come to distribution configuration and we see error unknown option http proxy address forward true I have be try start auto build hostname strict false hostname strict https false http enable true proxy edge db postgre option but they don t solve problem also try setup ingress with option nginx ingress kubernetes io auth url nginx ingress kubernetes io auth signin do not help ether url to keycloak but if I will do just port forwarding from pod to locahost with hostname localhost parameter set than everything work without issue so what can be analog of parameter http proxy address forward true for keycloakx 16 1 0 image how make it work correctly after ingress controller in k8s deployment apiversion app v1 kind deployment metadata name keycloak namespace namespace depl spec replicas 2 selector matchlabel service keycloak template metadata label layer security service keycloak spec container name keycloak image quay io keycloak keycloak x 16 1 0 args start auto build hostname strict false hostname strict https false hostname strict backchannel false http enable true proxy edge cache local db pool max size 5 cluster stack kubernete not work flag in 16 ver djgroup dns query keycloak jgroups ping namespace svc cluster local not work flag in 16ver db postgre db url jdbc postgresql db postgre keycloak db username user db password password metric enable true port containerport 8080 protocol tcp containerport 4444 protocol tcp containerport 8888 protocol tcp env name keycloak proxy address forward not work in 16 ver value true name keycloak admin value admin name keycloak admin password value admin name proxy address forward not work in 16 ver value true terminationmessagepath dev termination log terminationmessagepolicy file imagepullpolicy ifnotpresent restartpolicy always terminationgraceperiodsecond 30 dnspolicy clusterfirst schedulername default scheduler strategy type recreate revisionhistorylimit 10 progressdeadlinesecond 600 apiversion network k8s io v1 kind ingress metadata name keycloak namespace namespace depl annotation nginx ingress kubernetes io backend protocol http nginx ingress kubernetes io cor allow method put get post option nginx ingress kubernetes io cor allow origin nginx ingress kubernete io enable cor true nginx ingress kubernete io proxy body size 1000 m nginx ingress kubernetes io auth url nginx ingress kubernetes io auth signin nginx ingress kubernetes io auth response header x auth request user x auth request email spec rule host somesubdomaun subdomain domain com http path path pathtype implementationspecific backend service name keycloak port number 8080 apiversion v1 kind service metadata name keycloak namespace namespace depl spec port name http protocol tcp port 8080 targetport 8080 selector service keycloak type clusterip version keycloakx 16 1 0 expect behavior redirect succesful actual behavior too many redirect how to reproduce deploy on some domain with subdomain address in ingress not localhost k8s ingress go to login page to admin console enter admin admin redirect never stop until browser stop it anything else no response
keycloakkeycloak
add missing database constraint for client in jpa map storage
Bug
this should ensure consistency for the store even in the event of concurrent creation of client by multiple caller close 9610
keycloakkeycloak
navigate between routable tab show page loader
Bug
describe the bug when navigate between routable tab such as the one introduce in keycloak keycloak ui 1862 cause a page loader to appear this be due to the fact that some of these tab be on different route which mean that the original component get unmounted and then remount ideally the routable tab would ensure that the original route stay mount a solution will have to be make for this
keycloakkeycloak
exclude some folder from our sast analysis
Enhancement
description currently the codeql scanner have be analyze the whole codebase include folder like testsuite or example those folder be not relevant from the security standpoint consider that they do not expose our user and customer to any risk they be only relevant in the context of our pipeline but never use in production discussion no response motivation exclude those folder will reduce the false positive and a lot of noise allow our team to focus on what really matter detail add path ignore to the github action for codeql should do the job
keycloakkeycloak
impersonator username not preserve in chain of impersonation
Bug
describe the bug when impersonate user in chain for example user I impersonate user a impersonate user b impersonator username and impersonator i d user session note token mapper be enable impersonation be perform use impersonate button of keycloak admin console once user I be impersonate to user a the user be redirect to account page of user a user a come back to keycloak admin console and since the user have impersonation role user impersonate to user b it redirect to user b account page the access token capture do not have the entry for user I in impersonator field of token 1 1 sub user b i d prefer username user b username impersonator i d user a i d username user a username impersonation should not be possible for impersonated user version 15 0 2 expect behavior impersonation should not be possible for impersonated user actual behavior currently impersonation of impersonated user be possible and first impersonate user be not capture in access token how to reproduce user I impersonate user a impersonate user b impersonator username and impersonator i d user session note token mapper be enable impersonation be perform use impersonate button of keycloak admin console once user I be impersonate to user a the user be redirect to account page of user a user a come back to keycloak admin console and since the user have impersonation role user impersonate to user b it redirect to user b account page the access token capture do not have the entry for user I in impersonator field of token 1 anything else no response
keycloakkeycloak
build command should only accept build time option
Enhancement
description the build command should not allow persist runtime option the reason be not align with good practice where sensitive datum be persist into the server image container e g password urls etc provide a more clear separation and more clarity for user in regard to the different configuration stage discussion no response motivation no response detail no response
keycloakkeycloak
scope bug in device authorization request
Bug
describe the bug accord to the device authz grant specification see section 3 1 section 3 1 the device authorization request support request the scope of the access request through the scope optional parameter however keycloak do not honour well the scope parameter optional client scope this affect the consent which when enable do not show the scope request in the device authorisation request the userinfo endpoint after a successful device access token request do not contain the claim map to the request scope when the consent be enable the device access token request fail with the follow message error invalid scope error description client no long have request consent from user in order to solve this bug request scope be add to scope client note in authenticationsession after successfully verification version 16 1 0 expect behavior no response actual behavior no response how to reproduce execute device authorization request with scope parameter contain optional scope of client for optional scope with consent display on consent screen equal to true bullet one and three will happen for optional scope with consent display on consent screen equal to false bullet two will happen anything else no response
keycloakkeycloak
a flow can be create with seemly the same name of another
Enhancement
description the name of build in flow be in low case but all flow name be show with the initial in capital letter and there be no low case check so if the flow browser exist the user can create the flow browser and when they be show they look the same would be good to have a low case check discussion no response motivation there can be flow that be show to the user as if they be duplicate detail no response
keycloakkeycloak
calendar pop out on event filter
Enhancement
description on the event filter for user and for admin there be a date filter with a calendar icon the intuitive behaviour would be to click on the calendar and a calendar would pop out to choose the date but the date have to be introduce manually discussion no response motivation be more intuitive to the user and reduce the probability of an user introduce a wrong date format detail no response
keycloakkeycloak
open the resource path of an admin event lead to a error page
Bug
describe the bug open the resource path of an admin event lead to a error page version 16 1 0 expect behavior the page load correctly actual behavior the page show an error how to reproduce try to open the resource path of an admin event anything else no response
keycloakkeycloak
open an event with the middle button open a tab that never load
Bug
describe the bug open an event with the middle button open a tab that never load but if the user of the event be leave click the page load fast version 16 1 0 expect behavior a new tab be open load the user detail actual behavior an ever loading tab be open how to reproduce use the middle button of the mouse to open a user detail from the event screen anything else no response
keycloakkeycloak
remove output of summary in guide
Enhancement
description currently the guide template output the summary but it shouldn t be output as part of the guide when build a single page doc we don t want this include and on the website this will be include in different styling which the website generator will take care of discussion no response motivation no response detail no response
keycloakkeycloak
miss db constraint for jpa map storage for client
Bug
description the exist code code as part of the map storage can attempt a good effort to present inconsistency but this can t rely on constraint or unique key on the storage provider as different storage provider have different ability the current jpa map storage implementation doesn t have database constraint for client which could lead to inconsistent datum for example two client with the same name within a realm discussion no response motivation different map provider need to come up with solution that suit their storage back end to prevent or repair inconsistency for the jpa map storage implementation the implementation match the technology available would be unique key and constraint as a good effort attempt the mapclientprovider should trigger a search by clientid to see if the clientid be already take detail constraint to be add in table client clientid realmid unique implement as unique index in table client attribute fk client name unique implement as deferrable constraint to prevent issue with ordering of insert delete with hibernate index for fk client already exist should be sufficient as number of attribute be expect to be low mapclientprovider addclient will receive a search by realm and clientid to do a good effort prevention of duplicate clientid in the realm
keycloakkeycloak
ux review client policy profile the save button doesn t behave correctly
Bug
describe the bug the save button will change to be enable when the profile name field lose focus no matter it s be fill or not image version 15 0 1 expect behavior the save button will only be enable after the require field be fill actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy profile creation there s no action menu in the creation page
Bug
describe the bug there shouldn t be an action menu as the screenshot image version 15 0 1 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy profile creation cancel button should be the link button style
Bug
describe the bug the cancel button be the primary button style now should be the link button style version 15 0 1 expect behavior image actual behavior image how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy profile list search doesn t work
Bug
describe the bug the search doesn t work image version 15 0 1 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review client policy json editor the reload button should be the link button style
Bug
describe the bug the reload button be the secondary button style now should be the link button style version 15 0 1 expect behavior image actual behavior image how to reproduce no response anything else no response
keycloakkeycloak
create permission link doesn t do anything
Bug
describe the bug go to client authorization resource click on the create permission link and nothing happen see design version 17 0 0 snapshot expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
bad error message on import of auth setting
Bug
describe the bug 1 go to client authorization 2 import the attached json file message will be could not import the resource due to error instead of show the error from the server realm export 4 zip version 17 0 0 snapshot expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
empty modal be show when filter protocol by saml be select
Bug
describe the bug in client client scope add client scope modal empty modal be show when filter by protocol saml be select no saml item should be available in the list version keycloak 16 1 0 wildfly core 18 0 0 final expect behavior should allow to select back filter by name or other and item should be list actual behavior empty modal be show instead no list item no filter button how to reproduce 1 go to client any client i d detail client scope 2 click add client scope modal 3 select dropdown filter item protocol with subitem saml in modal 4 empty modal appear no list item and no filter dropdown element be present anything else no response
keycloakkeycloak
resteasy library inconsistency
Bug
describe the bug kc 15 kc16 contain in the main pom xml the dependency for the rest client 3 15 1 final resteasy version the problem be that under kc 16 1 0 on container with the wildfly server we find out that the related execution version from the server be 4 5 9 final image version 16 1 0 expect behavior the pom xml should be update to 4 5 9 final actual behavior there be api inconsistency while extend the project this concept affect kc16 upgrade with custom library we need to rewrite the resteasy library dependency which it can drive to future update problem how to reproduce generate a custom module and introduce the follow code resteasy v3 x httpservletresponse contextdata resteasyproviderfactory getcontextdata httpservletresponse class solve with resteasy v4 x httpservletresponse contextdata resteasyproviderfactoryimpl getinstance getcontextdata httpservletresponse class resteasyproviderfactory you will have an execution error on a kc16 wildfly server when the module be call with the following stacktrace 09 09 44 695 error org keycloak event eventbuilder default task 26 fail to send type to com custom keycloak provider event myerrorclass 647f9648 java lang incompatibleclasschangeerror expect static method java lang object org jboss resteasy spi resteasyproviderfactory getcontextdata java lang class at org keycloak event eventbuilder send eventbuilder java 229 at org keycloak event eventbuilder success eventbuilder java 192 at org keycloak service manager authenticationmanag finishedrequiredaction authenticationmanag java 1031 at org keycloak authentication authenticationprocessor authenticationcomplete authenticationprocessor java 1091 at org keycloak authentication authenticationprocessor authenticationaction authenticationprocessor java 958 at org keycloak service resource loginactionsservice processflow loginactionsservice java 312 at org keycloak service resource loginactionsservice processauthentication loginactionsservice java 283 at org keycloak service resource loginactionsservice authenticate loginactionsservice java 267 at org keycloak service resource loginactionsservice authenticateform loginactionsservice java 340 at java base jdk internal reflect nativemethodaccessorimpl invoke0 native method at java base jdk internal reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java 62 at java base jdk internal reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java 43 at java base java lang reflect method invoke method java 566 at org jboss resteasy core methodinjectorimpl invoke methodinjectorimpl java 170 at org jboss resteasy core methodinjectorimpl invoke methodinjectorimpl java 130 at org jboss resteasy core resourcemethodinvoker internalinvokeontarget detail info have be inform in anything else no response fix by
keycloakkeycloak
unable to reset filter for overview of client scope
Bug
it s not possible to reset the filter of the client scope overview once a filter have be set a solution have to be make for this see keycloak keycloak 18488 for more detail
keycloakkeycloak
wrong translation trust email property in the russian admin message ru property
Bug
describe the bug in the current version trust email and trust email tooltip have a translation trust email e mail trust email tooltip e mail realm which have the opposite meaning with the english version and mislead user version late expect behavior I suggest change the translation to trust email e mail trust email tooltip e mail realm it more accurately reflect the meaning of this set actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
in the user federation use mssql to report the error of ssl
Bug
describe the bug 1 I start a service with docker and make a persistence scheme with mysql docker run dt name keycloak db p 801 8080 e db vendor mysql e db user root e db password root e db addr xxxxxxxxxx e db port 3096 e db database keycloak e keycloak user keycloak e keycloak password keycloak jboss keycloak my 2 then in the user federation use a sqlserver as a third party datum source image 3 the service can start normally but when I ask all user I report an error acquisition attempt fail clearing pende acquire while try to acquire a need new resource we fail to succeed more than the maximum number of allow acquisition attempt 30 last acquisition attempt exception com microsoft sqlserver jdbc sqlserverexception the driver could not establish a secure connection to sql server by use secure socket layer ssl encryption error certificate do not conform to algorithm constraints clientconnectionid 36efacc2 c7a3 46eb 9c5c dc3dc3573275 image version from jboss keycloak late expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
add user keycloak sh try to talk with maven
Bug
describe the bug env rh sso on openshift via rhsso operator 7 5 1 not sure if this be generic keycloak or something rh sso specific but post here to start with during initial startup of keyckloak 0 container the add user keycloak sh be execute but just stall result in hang container send a quit to the jvm reveal a stack trace which show a stuck http client which be try to download something from maven the failure to download be because our outbound proxy have not be configure and thus outbound access be not possible the question be why it s try to download something from maven bad container image packaging from rhsso or bad packaging in keycloak main 1 prio 5 os prio 0 cpu 280 93ms elapse 38 03 tid 0x00007f1b04018000 nid 0x1cc runnable 0x00007f1b0c09a000 java lang thread state runnable at java net plainsocketimpl socketconnect native method at java net abstractplainsocketimpl doconnect abstractplainsocketimpl java 399 lock 0x0000000082735760 a java net sockssocketimpl at java net abstractplainsocketimpl connecttoaddress abstractplainsocketimpl java 242 at java net abstractplainsocketimpl connect abstractplainsocketimpl java 224 at java net sockssocketimpl connect sockssocketimpl java 392 at java net socket connect socket java 609 at sun security ssl sslsocketimpl connect sslsocketimpl java 299 at sun security ssl basesslsocketimpl connect basesslsocketimpl java 173 at sun net networkclient doconnect networkclient java 182 at sun net www http httpclient openserver httpclient java 474 at sun net www http httpclient openserver httpclient java 569 lock 0x000000008272e7b8 a sun net www protocol https httpsclient at sun net www protocol https httpsclient httpsclient java 266 at sun net www protocol https httpsclient new httpsclient java 373 at sun net www protocol https abstractdelegatehttpsurlconnection getnewhttpclient abstractdelegatehttpsurlconnection java 203 at sun net www protocol http httpurlconnection plainconnect0 httpurlconnection java 1187 at sun net www protocol http httpurlconnection plainconnect httpurlconnection java 1081 at sun net www protocol https abstractdelegatehttpsurlconnection connect abstractdelegatehttpsurlconnection java 189 at sun net www protocol http httpurlconnection getinputstream0 httpurlconnection java 1592 lock 0x000000008272bdb0 a sun net www protocol https delegatehttpsurlconnection at sun net www protocol http httpurlconnection getinputstream httpurlconnection java 1520 lock 0x000000008272bdb0 a sun net www protocol https delegatehttpsurlconnection at java net httpurlconnection getresponsecode httpurlconnection java 527 at sun net www protocol https httpsurlconnectionimpl getresponsecode httpsurlconnectionimpl java 334 at org jboss module maven mavenartifactutil downloadfile mavenartifactutil java 164 at org jboss module maven mavenartifactutil resolveartifact mavenartifactutil java 135 lock 0x0000000080946ae0 a java lang object at org jboss modules maven defaultmavenresolver lambda resolveartifact 0 defaultmavenresolver java 36 at org jboss module maven defaultmavenresolver lambda 23 0x0000000840082040 run unknown source at java security accesscontroller doprivilege native method at org jboss module maven mavenartifactutil doio mavenartifactutil java 237 at org jboss module maven defaultmavenresolver resolveartifact defaultmavenresolver java 36 at org jboss modules maven mavenresolver resolvejarartifact mavenresolver java 40 at org jboss modules xml modulexmlparser parseartifact modulexmlparser java 1048 at org jboss modules xml modulexmlparser parseresource modulexmlparser java 937 at org jboss modules xml modulexmlparser parsemodulecontent modulexmlparser java 697 at org jboss modules xml modulexmlparser parsedocument modulexmlparser java 469 at org jboss modules xml modulexmlparser parsemodulexml modulexmlparser java 335 at org jboss modules xml modulexmlparser parsemodulexml modulexmlparser java 293 at org jboss modules xml modulexmlparser parsemodulexml modulexmlparser java 254 at org jboss modules localmodulefinder parsemodulexmlfile localmodulefinder java 250 at org jboss modules localmodulefinder lambda findmodule 1 localmodulefinder java 195 at org jboss modules localmodulefinder lambda 8 0x0000000840064c40 run unknown source at java security accesscontroller doprivilege native method at org jboss modules localmodulefinder findmodule localmodulefinder java 195 at org jboss modules moduleloader findmodule0 moduleloader java 700 at org jboss modules moduleloader findmodule moduleloader java 693 at org jboss modules moduleloader loadmodulelocal moduleloader java 503 at org jboss modules delegatingmoduleloader preloadmodule delegatingmoduleloader java 57 at org jboss modules module addpath module java 1274 at org jboss modules module link module java 1644 at org jboss modules module relinkifnecessary module java 1672 at org jboss modules moduleloader loadmodule moduleloader java 303 at redirect redirectedutil loadprovider redirectedutil java 92 at redirect redirectedutil loadprovider redirectedutil java 86 at redirect documentbuilderfactory changedefaultfactory documentbuilderfactory java 53 at redirect jaxpredirecte changeall jaxpredirecte java 53 at org jboss module main main main java 362 version rhsso 7 5 1 expect behavior user should be create with resource in the distribution container image in this case but I suspect that be outside of keycloak opensource project not download from maven actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
migrate standalone cli break since 16 0 release
Bug
describe the bug the migration script that the upgrade guide tell I to run after upgrade fail to execute this happen both on upgrade and fresh instance after for version 16 and new the problematic section of the script line 253 257 if outcome fail of core service management security realm applicationrealm server identity ssl read resource echo add keystore to applicationrealm core service management security realm applicationrealm server identity ssl add keystore path application keystore keystore relative to jboss server config dir keystore password password alias server key password password generate self sign certificate host localhost echo end if line 462 466 if outcome success of subsystem elytron http authentication factory application http authentication read resource echo remove application http authentication from elytron subsystem subsystem elytron http authentication factory application http authentication remove echo end if remove these section before run the script resolve the issue e g bash se I 253 257d 462 466d jboss home bin migrate standalone cli version 16 and new expect behavior since the script be unchanged from keycloak 15 s version the expect output would be identical to keycloak 15 s output bash 4 4 jboss home bin jboss cli sh file jboss home bin migrate standalone cli warn if the follow embed server command fail manual intervention be need in such case remove any and declaration refer to the removed smallrye module from the standalone xml file and rerun this script for detail see migration change section in the upgrading guide we apologize for this inconvenience warn an illegal reflective access operation have occur warn illegal reflective access by org wildfly extension elytron ssldefinition jar file opt jboss keycloak module system layer base org wildfly extension elytron main wildfly elytron integration 15 0 1 final jar to method com sun net ssl internal ssl provider isfip warning please consider report this to the maintainer of org wildfly extension elytron ssldefinition warning use illegal access warn to enable warning of further illegal reflective access operation warn all illegal access operation will be deny in a future release begin migration add eviction strategy to keycloak user cache container outcome success outcome success update authorization cache container outcome success outcome success add spi userfederatedstorage outcome success update eviction and expiration in local cache key outcome success outcome success outcome success add eviction strategy to keycloak realm cache outcome success outcome success remove declaration for userfederatedstorage spi outcome success update eviction in local cache authorization outcome success add channel creation option read timeout to ejb3 remote outcome success remove eviction from hibernate entity cache and replace with object memory outcome success outcome success remove eviction from hibernate local query cache and replace with object memory outcome success outcome success remove eviction from keycloak realm cache and replace with object memory outcome success outcome success remove eviction from keycloak user cache and replace with object memory outcome success outcome success remove eviction from keycloak authorization cache and replace with object memory outcome success outcome success remove eviction from keycloak key cache and replace with object memory outcome success outcome success change jndi reference in connectionsinfinispan spi outcome success outcome success remove read timeout option from remote service from ejb3 subsystem outcome success outcome success remove config for unused fix hostname provider add base metric subsystem prefix to keycloak outcome success set value of to default datasource attribute in jpa subsystem to undefined outcome success end migration actual behavior bash 4 4 jboss home bin jboss cli sh file jboss home bin migrate standalone cli warn if the follow embed server command fail manual intervention be need in such case remove any and declaration refer to the removed smallrye module from the standalone xml file and rerun this script for detail see migration change section in the upgrading guide we apologize for this inconvenience warn an illegal reflective access operation have occur warn illegal reflective access by org wildfly extension elytron ssldefinition jar file opt jboss keycloak module system layer base org wildfly extension elytron main wildfly elytron integration 18 0 0 final jar to method com sun net ssl internal ssl provider isfip warning please consider report this to the maintainer of org wildfly extension elytron ssldefinition warning use illegal access warn to enable warning of further illegal reflective access operation warn all illegal access operation will be deny in a future release begin migration add eviction strategy to keycloak user cache container outcome success outcome success update authorization cache container outcome success outcome success add spi userfederatedstorage outcome success update eviction and expiration in local cache key outcome success outcome success outcome success add eviction strategy to keycloak realm cache outcome success outcome success remove declaration for userfederatedstorage spi outcome success update eviction in local cache authorization outcome success add keystore to applicationrealm fail to get the list of the operation property wflyctl0030 no resource definition be register for address core service management security realm applicationrealm server identity ssl how to reproduce 1 start a new blank keycloak instance e g docker run rm it name kc16 jboss keycloak 16 0 0 2 run the script e g bash docker exec it kc16 bash jboss home bin jboss cli sh file jboss home bin migrate standalone cli anything else my assumption be that this break with the wildfly elytron upgrade which accord to keycloak 16 s blog post change a lot about the configuration
keycloakkeycloak
different method getgroupscountbynamecontaine in mapgroupprovider and jparealmprovider
Bug
describe the bug see version 16 0 0 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
add support to link between guide
Enhancement
description server guide need to be able to link to other guide this have to be do in a way that allow the guide to be build in different way which will affect the link for example single html page should use anchor website should be able to control the url for link to guide itself with asciidoc attribute discussion no response motivation no response detail no response
keycloakkeycloak
optimize title summary and headline for proxy guide
Enhancement
description can be more concise and short discussion no response motivation no response detail no response
keycloakkeycloak
close 9562 add db index for userentity getrealmuserbyserviceaccount
Enhancement
as describe in 9562 the absence of this index can be rather painful on large instance
keycloakkeycloak
authentication flow i d not import
Bug
describe the bug when import a realm with authentication flow that have an i d set the flow don t have the same id after import this be especially annoying when use the keycloak operator or really any configuration as code setup that need the i d rather than the alia set authentication flow override on a client require the i d to be pass so be able to predefine it be crucial version 15 1 1 expect behavior if an i d be set in the realm json that be import the import authentication flow have the defined I d after import actual behavior the set i d in the realm json be ignore and a new one be generate how to reproduce 1 create realm 2 export realm 3 delete realm 4 import realm 5 compare authentication flow ids from export realm json to id of the import realm anything else no response
keycloakkeycloak
prevent lookup of client service account when feature be disabled
Enhancement
description org keycloak model userprovider getserviceaccount can be use to query the database to check for obtain a service account for a particular client however if the client do not have the feature enable when org keycloak model clientmodel isserviceaccountsenable return false then this lookup be wasteful and should be prevent discussion motivation when use the keycloak admin client initialization will cause that this lookup be perform on every rest request on a sizeable database this lookup be non trivial as it be uncached and require a full table scan see 9562 when rest request be make frequently this compound the issue greatly detail no response
keycloakkeycloak
add database index to benefit serviceaccount enable client
Enhancement
description when a client be use that make use of a service account authorization initialization cause the getrealmuserbyserviceaccount name query as define in org keycloak model jpa entities userentity to be execute execution of this query seem very inefficient although there be index that cover the realm i d column there be none that cover the service account client link column as a result all row in the table be evaluate when that table be sizeable this become noticable these query can be frequent eg usage of keycloak admin client will perform this for every rest call discussion motivation on instance of keycloak that have a large userbase the amount of system usage relate to repeat execution of this query be very significant the add resource usage associate with maintain an additional index would be very light for instance that have a small user base but worthwhile for instance that have a large userbase detail no response
keycloakkeycloak
search user by custom attribute
Bug
describe the bug the test case for search user by custom attribute be wrong here l101 by the documentation of keycloak rest api user resource the search param should be like user find q key1 value1 key2 value2 instead of user find key value type name description schema query q a query to search for custom attribute in the format key1 value2 key2 value2 string version 16 1 0 expect behavior search user by custom attribute should only return the match user actual behavior all user be return by follow the test case code how to reproduce user1 have attribute phone 123 user2 have attribute phone 456 if use code user find phone 123 two user will be filter out anything else official rest api documentation link here user resource
keycloakkeycloak
ldap connection timeout be treat as login failure and brute force lock the user
Bug
describe the bug hi team recently we be face an issue with brute force and ldap integration we have set quickloginmillisec in brute force setting page to 1ms and we run some health check script on the keycloak pod which make some rest call as ldap be integrate the user get authenticate with ldap call and when there be a connection timeout in ldap that be treat as login error and eventually when there be 2 ldap connection timeout in 1ms the user be get temporarily lock the script after retry for few sec they be abort its execution as we understand those very ldap connection be time out keycloak should be able to handle it gracefully by not treat connectiontimout exception as a loginerror and lock the user in ldapoperationmanager java exception handling should have be more robust for this we be plan to make some change like throw a runtimeexception in authenticate method would you be accept the change to resolve our issue till the time exception handling have be make robust thought please code snippet perform a simple authentication use the give dn and password to bind to the authentication context param dn param password throw authenticationexception if authentication be not successful public void authenticate string dn string password throw authenticationexception if password null password isempty throw new authenticationexception empty password use ldapcontext authctx null starttlsresponse tlsresponse null try hashtable env ldapcontextmanager getnonauthconnectionpropertie config never use connection pool to prevent password cache env put com sun jndi ldap connect pool false if this config isstarttls env put context security authentication simple env put context security principal dn env put context security credential password authctx new initialldapcontext env null if config isstarttls sslsocketfactory sslsocketfactory null string usetruststorespi config getusetruststorespi if usetruststorespi null usetruststorespi equal ldapconstant use truststore always truststoreprovider provider session getprovider truststoreprovider class sslsocketfactory provider getsslsocketfactory tlsresponse ldapcontextmanager starttls authctx simple dn password tochararray sslsocketfactory exception should be already throw by ldapcontextmanager starttls if starttls could not be establish but rather do some additional check if tlsresponse null throw new authenticationexception null tls response return from the authentication catch authenticationexception ae if logger isdebugenabled logger debugf ae authentication fail for dn s dn throw ae catch runtimeexception re if logger isdebugenabled logger debugf re connection timeout exception for dn s dn throw re catch exception e logg errorf e unexpected exception when validate password of dn s dn throw new authenticationexception unexpected exception when validate password of user finally if tlsresponse null try tlsresponse close catch ioexception e e printstacktrace if authctx null try authctx close catch namingexception e e printstacktrace version 11 0 expect behavior exception handle in case of ldap connection timeout should be robust actual behavior no response how to reproduce enable brute force in keycloak integrate ldap and create some user introduce some network delay or mock no response from ldap make some concurrent request with the same user observe the user lock and temporarily disable in keycoak anything else no response
keycloakkeycloak
multiple warning cause by typed varargs in tokenverifi
Enhancement
description the org keycloak tokenverifi withcheck l295 method declaration cause the follow warning a possible heap pollution warning at declaration site 16 more unchecked generic array creation warning at call site in keycloak service as we neither cast check to object nor rely on it be an instance of predicate it be safe to suppress the warning check out this for more info on the warning 1 2 3 jls 4 12 2 additionally there be a few warning relate to unchecked constructor call discussion no response motivation no response detail no response
keycloakkeycloak
readiness and liveness probe for the operator deployment of keycloak x
Enhancement
description the new keycloak x expose some basic health endpoint we should investigate and model on top of those proper default readiness and liveness probe for the keycloak deployment discussion no response motivation no response detail no response
keycloakkeycloak
load feature option the same way as normal option
Enhancement
description at the moment configuration cli option be load into the cli into the doc from 2 place normal option which map to 1 or more quarkus property be load via configuration mapper mapper java class but the feature relate buildtime option be load from profile directly and add to picocli see here l303 l332 we should unify our approach so that the mapper class and package be the one place to go to to add new configuration option this also reduce the maintenance overhead e g for the new guide which lack feature atm because they be not load by propertymapper getmapper so basically have a featurespropertymapper java class in the mapper directory and add these to propertymapper java l24 l32 like all the other mapper this would allow to work with all option in a unified way e g when get the option for the guide template like it s do here l17 l20 discussion no response motivation no response detail no response
keycloakkeycloak
improve the kustomize setup for the operator
Enhancement
description the current setup of kustomize for the operator be a bit scatter and not well integrate we need a base setup that allow easy extra overlay and well integrate with the resource generate by the quarkus operator sdk discussion no response motivation no response detail no response
keycloakkeycloak
rename or import a realm be incomplete
Bug
describe the bug rename a realm do not change valid redirect uris and base url of client account console the same problem occur at import of a realm with new name version 15 0 2 expect behavior uris and url contain new realm part actual behavior uris and url contain old string how to reproduce rename a realm and check account console setting anything else no response
keycloakkeycloak
ux review update the design of user event config in realm setting
Enhancement
describe the bug in the previous design we separate the save type table from the config form it s not the correct workflow therefore in the late design the save type will be put into the event config form as show in the picture below here be the prototype link for more detail version new admin ui expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
enable internationalization cause crash
Bug
describe the bug 1 go to realm setting localization 2 try to enable internationalization 3 observe the crash version 17 0 0 snapshot expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
crash when create identity provider
Bug
describe the bug 1 go to identity provider 2 add oidc or saml provider 3 type something into discovery endpoint field 4 click on use discovery endpoint 5 see error in console version 17 0 0 snapshot expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
backward compatibility for low case bearer type in token response
Enhancement
description the server be now more strict about the value of the bearer type use in token response in order to guarantee backward compatibility we should provide a client option to enable the bearer type value use low case discussion no response motivation backward compatibility with client use the wrong value for the bearer type detail no response
keycloakkeycloak
enable only tlsv1 3 as default for the https protocol and set expect value
Enhancement
description as per quarkus vertx http quarkus http ssl protocol quarkus default for the underlying value for our https protocol value be to enable both v1 3 and v1 2 of tls discussion no response motivation as tlsv1 3 be the general recommendation we should only enable tlsv1 3 per default detail no response
keycloakkeycloak
unable to view reset all list item to initial state after filter
Bug
describe the bug in client scope after filter list item by protocol saml and select back filter by name and press search button do not list all item version keycloak 16 1 0 wildfly core 18 0 0 final expect behavior should allow reset filter and show all item as they be previously list without any filter apply actual behavior do not list all item in initial state after filter how to reproduce 1 go to client scope 2 select filter drop down protocol saml 3 observe that only 1 item be list if exist saml 4 select filter drop down name and click search button 5 no way to reset filter to list all item from the screen anything else same behavior in client client scope
keycloakkeycloak
impossible to filter group by name use kcadm get group with q flag
Bug
describe the bug hi I be try to get information of specific group use this command from a kubernete pod use docker io jboss keycloak 14 0 0 image kcadm get group r q name kcadm be an alias for opt jboss keycloak bin kcadm sh unfortunately the comand return all the group in my realm but it do not filter by name as expect another strange thing be if I run with q flag sette on toto it also return all the group kcadm get group r q name toto I don t understand why q flag work for get user command e g kcadm get user r q username thank you in advance for your help julien version 14 0 0 expect behavior bash 4 4 kcadm get group r sdp q name group one i d name group one path group one subgroup actual behavior bash 4 4 kcadm get group r sdp q name group one i d name group one path group one subgroup i d name group two path group two subgroup i d name group three path group three subgroup how to reproduce deploy a keycloak install with 14 0 0 version run a container from docker io jboss keycloak 14 0 0 image kcadm config credential server auth realm master user password create multiple realm group run kcadm get group r q name anything else no response
keycloakkeycloak
action button be not disabled when no item select in the list
Bug
describe the bug toolbar action delete and change type to in client scope be not disabled after the action this allow to perform action again on non existent item and cause message could not delete client scope could not find client scope could not update the scope mapping client scope not find also affect client client detail client scope version keycloak 16 1 0 wildfly core 18 0 0 final expect behavior should not allow delete or modify non existent or non select item from the list actual behavior get error message perform action when item be not select how to reproduce 1 go to client scope 2 select any item from the list 3 perform delete action from upper toolbar 3 dot button 4 confirm modal confirmation message 5 without select any item perform step 3 again 6 you will receive confirmation to delete the item which previously be delete 7 confirm deletion will show could not delete client scope could not find client scope 8 also occur with change type to will get could not update the scope mapping client scope not find anything else same behavior in client client detail client scope
keycloakkeycloak
keycloak 19289 check if value to set be not null
Bug
describe the bug see for the detail version 15 0 2 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
dist x show config do not show always the right apply configuration
Bug
describe the bug under some circumstance show config do not show the currently apply configuration in runtime configuration but configuration from another profile instead version 16 1 0 expect behavior after run kc sh start dev the value of kc db when run the show config command should be h2 file as dev use h2 file actual behavior value kc db be still set to postgre same go for the other value previously set for the prod profile but not for all see attach picture for an example how to reproduce 1 add e g prod db postgre prod db username mydbuser prod db password mydbpassword prod db url jdbc postgresql localhost kc db to keycloak property 2 run kc sh build 3 run kc sh start dev 4 run kc sh show config anything else no response
keycloakkeycloak
user deletion and recreate in local database when timeout in ldap
Bug
it be observe that few keycloak ldap user be get delete and recreate automatically even when there be no change in ldap side upon investigation it be observe that the user deletion be cause by a keycloak bug in org keycloak storage ldap idm store ldap ldapoperationmanager getfilterbyid string i d this method be use to build a string which will be use to query the ldap server base on an attribute i d the method contain special handling if it be the objectguid attribute which be be filter in this case the method first make an ldap call which keycloak call guidresolve to enable it to perform special objectguid format if this call succeed then the proper filter be return and ultimately the correct object be retrieve from ldap the bug be if the guidresolve call fail cause a namingexception to be throw here be the relevant code try attribute attribute execute new ldapoperation override public attribute execute ldapcontext context throw namingexception return context getattribute strobjectguid override public string tostre return new stringbuilder ldapoperation guidresolve n append strobjectguid append strobjectguid tostre byte objectguid byte attribute get ldapconstant object guid get filter objectclass getuuidattributename ldapconstant equal ldaputil convertobjectguidtobytestre objectguid catch namingexception ne filter null as can be see above the namingexception be catch and ignore the method they fall through to its default handling for non objectgui attribute which return an incorrect filter keycloak then query ldap use the incorrect filter and receive back an empty result base on this it think the user do not exist in ldap and so delete it from the local db so a user may be delete if for example a communication timeout to the ldap server occur during the guidresolve call here be an example from the log of a correctly format filter filter objectclass objectguid 60d1ef00 ecfe 47de 8f5b d9d0c91a690c and here be the equivalent filter which have be properly encode filter objectclass objectguid 00 ef d1 60 fe ec de 47 8f 5b d9 d0 c9 1a 69 0c from the logs we can see that the incorrect filter be use before each user deletion this will need to be fix in the keycloak source code version 11 0 expect behavior an exception should be rethrown instead of search with a bad filter again and delete the user actual behavior no response how to reproduce enable 2fa and try to create a timeout from ldap for user search by i d anything else no response
keycloakkeycloak
dist x argument parse fail on semicolon
Bug
describe the bug you can reproduce the behaviour with this example command bash docker run rm it entrypoint bin bash quay io keycloak keycloak x late c opt keycloak bin kc sh build dkc db postgre dkc db username hippo dkc db password dkc db url jdbc postgresql hippo primary postgre operator svc 5432 hippo as you can notice the db password field be dkc db password add any other character to the password result in the same error message version main expect behavior the build command be correctly perform actual behavior this be the result output usage java option args to execute a class or java option jar args to execute a jar file or java option m args java option module args to execute the main class in a module or java option args to execute a single source file program argument follow the main class source file jar m or module be pass as the argument to main class where option include cp classpath class path a separate list of directory jar archive and zip archive to search for class file p module path a separate list of directory each directory be a directory of module upgrade module path a separate list of directory each directory be a directory of module that replace upgradeable module in the runtime image add module root module to resolve in addition to the initial module can also be all default all system all module path list module list observable module and exit d describe module describe a module and exit dry run create vm and load main class but do not execute main method the dry run option may be useful for validate the command line option such as the module system configuration validate module validate all module and exit the validate module option may be useful for find conflict and other error with module on the module path d set a system property verbose class module gc jni enable verbose output version print product version to the error stream and exit version print product version to the output stream and exit showversion print product version to the error stream and continue show version print product version to the output stream and continue show module resolution show module resolution output during startup h help print this help message to the error stream help print this help message to the output stream x print help on extra option to the error stream help extra print help on extra option to the output stream ea enableassertion enable assertion with specify granularity da disableassertion disable assertion with specify granularity esa enablesystemassertion enable system assertion dsa disablesystemassertion disable system assertion agentlib load native agent library e g agentlib jdwp see also agentlib jdwp help agentpath load native agent library by full pathname javaagent load java programming language agent see java lang instrument splash show splash screen with specify image hidpi scale image be automatically support and use if available the unscaled image filename e g image ext should always be pass as the argument to the splash option the most appropriate scale image provide will be pick up automatically see the splashscreen api documentation for more information argument file one or more argument file contain option disable file prevent further argument file expansion enable preview allow class to depend on preview feature of this release to specify an argument for a long option you can use or how to reproduce no response anything else no response
keycloakkeycloak
realm import not work when realm have custom auth flow
Bug
describe the bug when import to keycloak x v16 1 0 an export realm from keycloak v16 1 0 via the command bin kc sh import dir realm realm test realm the operation fail with error 2022 01 11 12 43 47 380 error org key qua run cli executionexceptionhandler main error fail to start server use profile import export 2022 01 11 12 43 47 380 error org key qua run cli executionexceptionhandler main error unable to resolve auth flow bind override for browser 2022 01 11 12 43 47 380 error org key qua run cli executionexceptionhandler main for more detail run the same command pass the verbose option also you can use help to see the detail about the usage of the particular command this seem to happen only for realm that have custom auth flow which override the browser auth flow version keycloak x 16 1 0 expect behavior import should succeed actual behavior import result in the follow error 2022 01 11 12 43 47 380 error org key qua run cli executionexceptionhandler main error fail to start server use profile import export 2022 01 11 12 43 47 380 error org key qua run cli executionexceptionhandler main error unable to resolve auth flow bind override for browser 2022 01 11 12 43 47 380 error org key qua run cli executionexceptionhandler main for more detail run the same command pass the verbose option also you can use help to see the detail about the usage of the particular command how to reproduce try import into keycloak x v16 1 0 any realm which have custom auth flow that override the default browser flow anything else os rhel8 openjdk 11 0 13 2021 10 19 lt maybe relate to this
keycloakkeycloak
rename resident key to discoverable credential
Enhancement
description the late spec have rename the concept of resident key or resident credential to discoverable credential both ui and documentation contain deprecate name and need to be update to refer to the up to date nomenclature see
keycloakkeycloak
upgrade webauthn4j dependency version
Enhancement
description the current version of webauthn4j dependency be 0 12 0 release it d be good to upgrade it
keycloakkeycloak
quarkus dist provider dir have outdate readme
Bug
describe the bug the readme instruct the user to use kc sh config which be apparently outdate kc sh config unmatched argument at index 0 config do you mean show config same issue affect also the theme dir version 16 1 0 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
expression resolution doesn t work for spi enable setting due to unneccesary boolean valueof call
Bug
describe the bug I m currently attempt to write a custom spi my plan be to use an environment variable to control whether that spi be enable for this I add the following to a startup script subsystem keycloak server spi external event publisher provider kafka add property foo env event publisher kafka foo bar env event publisher kafka bar enable env event publisher kafka enable however while the property for foo and bar be correctly resolve enable always stay at false after some debugging I find out that keycloak pass the value of enable to boolean valueof before the expression be resolve l145 when use a debugger to remove the boolean valueof call everything work fine and the expression be resolve correctly I strongly suspect that boolean valueof be not need in this place version 16 1 0 expect behavior expression can be use to control whether an spi be enable actual behavior every value other than true cause the spi to be disable how to reproduce create a custom spi set the value for enable to env custom spi enable set the environment variable custom spi enable to true start keycloak observe the spi not be enable anything else I would be willing to contribute a fix for this if this be deem to be a bug
keycloakkeycloak
transaction in event listener set to rollback only get commit
Bug
describe the bug call session gettransactionmanager setrollbackonly during user creation via the admin api do not cause the transaction to get roll back version 15 1 also present in 16 1 expect behavior neither the attribute add from within the event listener nor the user should be persist the whole transaction should fail maybe there should also be a log indicate this actual behavior instead the user get create successfully and also an attribute set from within the event listener be persistent as well there be no error message on the log how to reproduce 1 build and deploy my example event listener from here 2 configure keycloak to use the event listener note the event listener i d be sysout 3 add a user via the admin console anything else while create a user via oidc will not be successful this way and call setrollbackonly on eventtype register and also have configure email verification there be a nullpointerexception in verifyemail I m not sure if the transaction work or doesn t work as expect in this case at least there be transaction relate log message either way I think defaultkeycloaktransactionmanager commit really should check if the transaction be set to rollback only which as of my current understanding it do not do also throw an exception from within the event listener will not cause the transaction to fail the exception be only log while this might be debatable I root for the ejb concept of the application exception at least the behaviour should be document last but not least when build the event listener as an ejb and call ejbcontext setrollbackonly the transaction appear to get roll back properly
keycloakkeycloak
build in client can no long be delete
Bug
describe the bug in keycloak 15 0 2 it be possible to delete build in client of a realm account account console broker try the same with keycloak 15 1 0 or 15 1 1 yield an exception version 15 1 1 expect behavior just as in keycloak 15 0 2 it should be possible to delete build in client actual behavior when try to delete a build in client the browser s account console have the follow exception possibly unhandled rejection datum error invalid request error description could not delete client status 400 config method delete how to reproduce start keycloak 15 1 0 or 15 1 1 login as admin create a new realm test switch to realm test and navigate to client hit the delete button anything else no response
keycloakkeycloak
install fail follow the official guide configuration error security realm isn t an allow element here
Bug
describe the bug keycloak version 16 1 0 1 install the server follow this guide testing with a sample cluster domain cluster domain example 2 run add user sh and put the credential into follow configuration host controller 9 host controller 10 host controller security realm isn t an allow element here host controller host controller element allow here be audit log configuration change identity host controller management interface host controller host controller 11
keycloakkeycloak
add more detail about 2fa to authenticate page
Enhancement
description see for the detail discussion no response motivation no response detail no response
keycloakkeycloak
ux review realm role creation page header be miss and cancel doesn t work
Bug
describe the bug the header be miss click cancel can not return to the role list image version 15 0 1 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
fix timeunit function and timeunit2 function
Bug
close 9488 I fix the follow behavior when we set multiple of 24 to timeout of minute the admin console convert it and display the timeout of day the timeunit2 function be for almost all timeout and the timeunit function be for example for brute force protection
keycloakkeycloak
set 24 min to timeout the admin console display 1 day
Bug
describe the bug in the timeout view when I set 24 min to timeout and click the save button timeunit the admin console display 1 day timeunit2 version 16 1 0 expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
ux review add an inline alert for sign jwt authenticator
Bug
describe the bug in the credential page of a client we can add an inline alert after user change the authenticator to sign jwt as show in the screenshot below in the confirmation modal we can remove the alter add the alter generate a private key and certificate for the client from the key tab remove the alter from the modal version new admin ui expect behavior no response actual behavior no response how to reproduce no response anything else no response
keycloakkeycloak
login failure with infinispan remote cache
Bug
describe the bug I ve get keycloak point at an infinispan 13 0 remote cache both host in kubernete as separate pod when try to login to the admin console the front end error and will not let I login state unexpected error when handle authentication request to identity provider I ve verify the login attempt be take place by supply the incorrect password and it do seem to be work in the log when I m meet with this failure I get the follow error throw org keycloak service default task 9 kc services0013 fail authentication java lang classcastexception class org keycloak model session infinispan entity rootauthenticationsessionentity can not be cast to class org keycloak model session infinispan change sessionentitywrapper org keycloak model session infinispan entity rootauthenticationsessionentity and org keycloak model session infinispan change sessionentitywrapper be in unnamed module of loader 10ec5133 I ve test this with keycloak 16 1 16 0 and 15 1 and have the same issue in all of they I have completely remove any authentication to the infinispan cache and check anonymous authentication be work base off the error I do not believe the request be actually leave keycloak as I can not see any entry in the cache in infinispan I ve be configure as per the keycloak server configuration guide here assembly set up crossdc version 16 0 0 expect behavior login to the admin console should be successful and I should see a loginsession in the infinispan cache actual behavior org keycloak service default task 9 kc services0013 fail authentication java lang classcastexception class org keycloak model session infinispan entity rootauthenticationsessionentity can not be cast to class org keycloak model session infinispan change sessionentitywrapper org keycloak model session infinispan entity rootauthenticationsessionentity and org keycloak model session infinispan change sessionentitywrapper be in unnamed module of loader 10ec5133 how to reproduce no response anything else see attach standalone ha xml file from one of the deployment that be affect kc standalone txt
keycloakkeycloak
inconsistency within realm management client
Bug
describe the bug currently there be a few way to configure token exchange on the keycloak manually through web ui by import the realm on the startup or by use the adorsys keycloak config cli it doesn t matter which way be to select because at the end the permission for the identity provider be to be create on the realm management client but this realm management client embed one come with access type bearer only which restrict set up permission and policy within the client and use any authorization relate feature but by follow the official guide on the token exchange page token exchange this client later obtain the authorization tab this way bearer only client can now have protect resource and the most interesting part if you do the import of such client through the import api the realm management client would have access type confidential on top of it realm management client now have its own client i d secret which allow to sign in into the realm with admin privilege and it s not possible to disable the service account as per keycloak 3764 my question here be be it safe to just disable the service account for the realm management client to prevent the authentication with its credential the topic be initially discuss here version confirm on 15 0 2 16 1 0 expect behavior it be possible to import the realm with token exchange configuration without let an opportunity to allow someone use ream management credential to authenticate actual behavior after re import the realm with token exchange configure the realm management client have its own credential that could be use to authenticate to the realm how to reproduce 1 run keycloak with token exchange feature preview enable sh docker run p 8080 8080 e keycloak user admin e keycloak password admin quay io keycloak keycloak 16 1 0 dkeycloak profile feature token exchange enable dkeycloak profile feature admin fine grain authz enable 2 create a realm 3 create an identity provider for example google 4 configure token exchange for it follow the token exchange 5 export the realm 6 delete the real and import it from the file 7 realm management client should have client secret access type confidential anything else
keycloakkeycloak
group base policy be break in admin console
Bug
describe the bug group base policy be break in admin console screenshot from 2022 01 10 18 39 19 version 16 1 0 expect behavior dropdown should be visible to allow selection of a group actual behavior dropdown be break how to reproduce configure client with access type confidential authorization enable on go to authorization panel policy create policy group anything else no response
keycloakkeycloak
map storage factory be process event even when they be not configure
Bug
describe the bug when map storage feature be enable the map storage provider factory end up processing event even when they be not configure as the default provider factory for a component so when a realm be remove for example the role associate with the realm be also remove trigger a roleremovedevent user associate with the realm be also remove trigger a userremovedevent all factory that register themselves with the keycloaksessionfactory as event listener receive the event include the map storage factory the problem be that the map storage factory be attempt to handle the event even when they be not the default provider for the component this result in a variety of error range from the classcastexception throw by the mapclientproviderfactory when it try to cast the provider obtain from the session to mapclientprovider to nullpointerexception throw by the mapuserloginfailureproviderfactory when try to obtain the storage provider as part of its onevent logic version 16 1 0 expect behavior the map storage factory should not attempt to process event when they be not configure as the default provider for the component and removal of realm should work fine when use legacy jpa provider with the map storage feature enable actual behavior the map storage factory be erroneously attempt to handle event that be not mean for they result in a range of different error when for example a realm be remove how to reproduce easy way to reproduce be to enable the map storage feature but not configure any default provider for the component and then try to run any test for example declarativeusertest that add and remove realm user role note that run the test on undertow will configure server with the either the jpa or map when use the pmap storage profile provider for all component see keycloak server json and the error do not happen because the presence of a default provider either jpa or map avoid the situation where we have more than one factory initialize and register as a listener anything else no response
keycloakkeycloak
can t add user to parent group if member of a subgroup
Bug
describe the bug try to add a user to a parent group when the user already be a member of a subgroup don t work no error just not add to the group version 16 1 0 expect behavior user get add to the group or a error be throw actual behavior user be not add to the group and no visible error how to reproduce 1 create a new group 2 create a group under the newly create group 3 add a user to the subgroup create in step 2 4 try to add the user to the parent group create in step 1 you will get success add group membership but the user be not add to the group the same be true from the api the reverse order add to the root group first work as except anything else if this be work as expect the api should return a error and do it in reverse should not work image
keycloakkeycloak
keycloak server throw npe at startup when the map storage feature be enable
Bug
describe the bug when the map storage feature be enable it doesn t have to be configure just enable the server fail to start with a nullpointerexception 18 10 29 438 fatal org keycloak service serverservice thread pool 52 error during startup java lang nullpointerexception at snapshot org keycloak service resource keycloakapplication 1 run keycloakapplication java 134 at snapshot org keycloak model util keycloakmodelutil runjobintransaction keycloakmodelutil java 239 at snapshot org keycloak service resource keycloakapplication startup keycloakapplication java 128 at snapshot org keycloak provider wildfly wildflyplatform onstartup wildflyplatform java 36 at snapshot org keycloak service resource keycloakapplication keycloakapplication java 114 the point where the exception be throw be this java dblockprovider dblock dblockmanager getdblock dblock waitforlock dblockprovider namespace keycloak boot dblockmanager getdblock be essentially do session getprovider dblockprovider class which imply that keycloak be unable to obtain the lock provider when the map storage feature be enable this happen because the nolockingdblockproviderfactory that be enable with the map storage feature end up compete with the liqubasedblockproviderfactory that already exist and keycloak can t decide which factory to use explicitly configure the default provider or set the order of the liquibasedblockproviderfactory to 1 fix the issue the latter be the preferred solution as it be apply to all legacy jpa storage provider so that they wouldn t clash with the map provider enable by the map storage feature test use the wildfly distribution under distribution server dist and quarkus under distribution server x dist use the keycloakserver class which run on undertow work fine because the keycloak server json configuration use by this server contain explicit declaration of the default provider include the dblockprovider version 16 1 0 expect behavior keycloak server should be able to start without any error when the map storage feature be enable actual behavior keycloak server startup fail with a npe when the feature be enable how to reproduce easy way be to go to distribution server dist target keycloak x y z bin and start the server with the dkeycloak profile feature map storage enable flag standalone sh dkeycloak profile feature map storage enable anything else no response
keycloakkeycloak
upgrade liquibase to 4 6 2
Enhancement
description the liquibase version use currently by keycloak be 3 5 5 which be quite old and doesn t support cockroachdb with the new storage implementation for keycloak x we need to support cockroachdb along with postgre so we need to start look into upgrading liquibase besides support cockroachdb several improvement be make in liquibase 4 such as registration of extension use the serviceloader bug fix etc upgrading allow we to simplify the factory that register our custom extension acceptance criterion 1 there be report that new version of liquibase calculate the changelog checksum a bit differently which would cause issue for user migrate from previous keycloak version any upgrade work must ensure that all migration test pass in multiple operating system at the very least there must be a clear migration path for user that end up hit invalid checksum issue for example it might acceptable to require user to run liquibase s clearchecksum command if that allow for a clean migration to a keycloak version use liquibase 4 6 2 2 the new liquibase might impact the performance of the quarkus distribution this distribution contain performance enhancement for liquibase 3 5 5 so it might be necessary to carefully evaluate how the new liquibase behave and what enhancement can be make to deal with it s architecture that be significantly different than that of liquibase 3 5 5 discussion no response motivation main motivation be to use a liquibase version that support cockroachdb it also allow for easy registration of custom extension and incorporate many bug fix detail no response
keycloakkeycloak
well error message when placeholder can not be resolve
Enhancement
description when a placeholder can not be resolve the server show a not user friendly message with a stack trace update the configuration and instal your custom provider if any please wait error fail to run build command error io quarkus builder buildexception build failure build fail due to error error build step org keycloak quarkus deployment keycloakprocessor persistbuildtimepropertie throw an exception java util nosuchelementexception srcfg00011 could not expand value my db user in property kc db username at io smallrye config expressionconfigsourceinterceptor lambda getvalue 0 expressionconfigsourceinterceptor java 63 at io smallrye common expression expressionnode emit expressionnode java 22 at io smallrye common expression expression evaluateexception expression java 56 at io smallrye common expression expression evaluate expression java 70 at io smallrye config expressionconfigsourceinterceptor getvalue expressionconfigsourceinterceptor java 56 at io smallrye config expressionconfigsourceinterceptor getvalue expressionconfigsourceinterceptor java 36 at io smallrye config smallryeconfigsourceinterceptorcontext proceed smallryeconfigsourceinterceptorcontext java 20 at org keycloak quarkus runtime configuration mapper propertymapper getconfigvalue propertymapper java 96 at org keycloak quarkus runtime configuration mapper propertymapper getvalue propertymapper java 36 at org keycloak quarkus runtime configuration propertymappinginterceptor getvalue propertymappinginterceptor java 40 at io smallrye config smallryeconfigsourceinterceptorcontext proceed smallryeconfigsourceinterceptorcontext java 20 at io smallrye config propertynamesconfigsourceinterceptor getvalue propertynamesconfigsourceinterceptor java 61 at io smallrye config smallryeconfigsourceinterceptorcontext proceed smallryeconfigsourceinterceptorcontext java 20 at io smallrye config smallryeconfig getconfigvalue smallryeconfig java 305 at io smallrye config smallryeconfig getvalue smallryeconfig java 223 at io smallrye config smallryeconfig getoptionalvalue smallryeconfig java 322 at org keycloak quarkus runtime configuration configuration getoptionalvalue configuration java 88 at org keycloak quarkus deployment keycloakprocessor persistbuildtimepropertie keycloakprocessor java 318 at java base jdk internal reflect nativemethodaccessorimpl invoke0 native method at java base jdk internal reflect nativemethodaccessorimpl invoke nativemethodaccessorimpl java 62 at java base jdk internal reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java 43 at java base java lang reflect method invoke method java 566 at io quarkus deployment extensionloader 2 execute extensionloader java 887 at io quarkus builder buildcontext run buildcontext java 277 at org jboss thread contexthandler 1 runwith contexthandler java 18 at org jboss thread enhancedqueueexecutor task run enhancedqueueexecutor java 2449 at org jboss thread enhancedqueueexecutor threadbody run enhancedqueueexecutor java 1478 at java base java lang thread run thread java 829 at org jboss thread jbossthread run jbossthread java 501 the same go when run the start command discussion no response motivation we should improve ux and error message when fail to resolve placeholder from option value detail no response