repository stringclasses 156 values | issue title stringlengths 1 1.01k ⌀ | labels stringclasses 8 values | body stringlengths 1 270k ⌀ |
|---|---|---|---|
keycloakkeycloak | realm setting localization can t view add or edit message bundle on realm other than master | Bug | describe the bug getrealmlocalizationtext work on master successfully if inspect under network in the dev console when the realm be change to anything other than master there be a get error 500 internal service error version 15 0 2 how to reproduce 1 select the master realm 2 go to realm setting localization tab 3 turn on internationalization and create a key value pair in the message bundle table 4 the table should refresh and the new datum should be display in the table 5 now select any realm other than the master realm 6 click on realm setting 6 open the dev console and under network observe that the get call for localization be not successful 7 repeat step 2 4 8 observe that the new key value pair be add but since the get call do not work the new datum be not show in the message bundle table |
keycloakkeycloak | keycloak import in typescript without allowsyntheticdefaultimport | Bug | describe the bug when use import as keycloak from keycloak js const keycloak keycloak I receive type default config string keycloakconfig undefined keycloakinstance have no call signature version 15 0 2 expect behavior one should be able to import keycloak and use it with typescript without turn on allowsyntheticdefaultimport actual behavior ts2349 this expression be not callable type default config string keycloakconfig undefined keycloakinstance have no call signature how to reproduce import keycloak with import as keycloak from keycloak js anything else suggest solution export like any other library in 2021 by export all function individually as module and with a default export |
keycloakkeycloak | introduce ancestor interface for entity with attribute | Enhancement | close 8973 |
keycloakkeycloak | userresource update set first name to last name if last name be null | Bug | describe the bug org keycloak admin client resource userresource be use for create and update user in keycloak there be only firstname for user but note that for some user in keycloak we have the same firstname and lastname after investigation we have find that after user update keycloak set firstname to lastname userresource resource realmresource user get user get 0 getid userrepresentation user inituser resource torepresentation userdto log debug before update user detail username first name last name user getusername user getfirstname user getlastname resource update user userrepresentation representation resource torepresentation log debug update user in keycloakclient username first name last name representation getusername representation getfirstname representation getlastname in inituser method last name be set null note code part just for show how be investigation do version 15 0 2 expect behavior to keep last name null actual behavior no response how to reproduce this happen randomly so it be hard to describe the step for reproduce the bug anything else no response |
keycloakkeycloak | cve review | Enhancement | description right now we be use keycloak 15 0 2 harbor do the security scan for we and it report 11 vulnerability for keycloak dependency the quay security scanner for the official keycloak image do not report any vulnerability I assume because of white listening be there any review documentation available that describe how whether keycloak be affect by a cve discussion no response motivation no response detail no response |
keycloakkeycloak | create delegate and empty instance in deepcloner | Enhancement | fix 9030 example of a field delegate file mapcliententityfielddelegate java implementation include relevant empty file mapcliententityimpl java and update field enum file mapcliententityfield java |
keycloakkeycloak | ux review some fine tuning of group initial page | Bug | describe the bug there be some fine tuning of the group initial page as show in the screenshot below 1 the main title group begin with an uppercase letter 2 if there be no exist group we can hide the action part version new ui expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | documentation for quarkus distribution | Enhancement | 10000 10001 |
keycloakkeycloak | refactor storageid | Enhancement | fix keycloak 9031 |
keycloakkeycloak | optimize storageid class | Enhancement | description storageid class suffer from several issue use more field than necessary the class be not immutable while it should be once an i d be assign it do not change have no equal hashcode tostring be not test fix these issue discussion no response motivation no response detail no response |
keycloakkeycloak | enhance generator to support entity delegate and empty instance | Enhancement | description tree storage need to create delegate for arbitrary type e g to support mapper and similarly some of the request need to be ignore or in other word delegate to and empty instance that ignore call to setter and always return null for any getter deepcloner should support creation of such delegate and empty entity instance discussion no response motivation no response detail no response |
keycloakkeycloak | notification message be not disappear | Bug | describe the bug change assign type of the item in client scope be show multiple notification which some of those never disappear version keycloak 15 0 2 wildfly core 15 0 1 final expect behavior notification should disappear after some short time 1 notification per action actual behavior notification never disappear multiple notification be show instead of single one per action how to reproduce 1 go to client scope 2 change assign type to default optional of the item from the item combobox in the list one notification should appear 3 wait until notification disappear 4 again change assign type to default optional of the item from the item combobox in the list 5 two notification appear instead of one one will disappear and another remain anything else more time assign type be change more notification be show on next time look like some array need to be clean before show notification after action |
keycloakkeycloak | field can be duplicate by the generator | Bug | describe the bug generator don t check whether a field be already declare in the inherited class the follow code generate fid even if it be already declare l43 in the parent class see code l433 l448 version expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | introduce model entity util method | Enhancement | fix 9025 |
keycloakkeycloak | map storage extract commonly use method to utility class | Enhancement | method for mutual translate entity interface to model and to name be be use in other storage as well and so should be extract from concurrenthashmapstorageproviderfactory to a separate utility class l113 l153 |
keycloakkeycloak | enhance available tree operation | Enhancement | fix 9022 |
keycloakkeycloak | simplify component model override | Enhancement | fix 9021 |
keycloakkeycloak | enhance tree node with operation for walk the tree | Enhancement | enhance the tree node implementation l31 with operation for walk the tree |
keycloakkeycloak | ux review optimize the no result page | Bug | describe the bug this be a global issue in the new ui there be some empty page with no search result on these page user can t return to the original page therefore we can add a link button to allow user to clear all the filter and then go back to the original page as show in the screenshot below this be a pf4 component please refer to the link here no match find version new ui expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | simplify override of componentmodel | Enhancement | description componentmodel have several method that have to be overridden in descendant as they contain copy and paste logic cf variant of get l83 l105 and put l107 l121 rather than a single overridable method also add ability to obtain componentmodel from componentmodelscope discussion no response motivation no response detail no response |
keycloakkeycloak | fix npe for component creation when realm unset but config know | Bug | fix 9019 |
keycloakkeycloak | npe in getcomponentprovider | Bug | describe the bug when the method for obtain component config be available the method keycloaksession getcomponentprovider class string function should create the provider even if the realm be unknown realm be only necessary for obtain component model in the alternative method keycloaksession getcomponentprovider class string version 15 0 2 expect behavior provider be create actual behavior exception be throw here l357 l359 how to reproduce no response anything else no response |
keycloakkeycloak | pre authorization hook for client policy | Enhancement | description provide a client policy event hook that would be trigger early in authorizationendpoint process most importantly before the client check discussion no response motivation the oauth 2 0 spec doesn t exclude the use of unregistered client rfc 6749 2 4 unregistered client section 2 4 some oidc base solution make use of that solid oidc be an important example solid oidc 5 client identifier clientid the pre authorization hook would facilitate implementation of solution that rely on unregistered ephemeral client on top of keycloak employing client policy detail no response |
keycloakkeycloak | ux review make label more readable inside mapper detail page | Bug | describe the bug on the mapper s detail page there be some field that be confuse we can refer to the current console to correct they in order to make they more readable I take the user client role mapper as an example and add a screenshot below please check and correct they version new admin console ui expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | ux review change the field order in the user address mapper | Bug | describe the bug in the new ui I find the order of the field be different from the current console we can change the order to align with the current console in addition these three label be confuse we can refer to the current console to correct they new ui proposal version new admin ui expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | can t properly edit identity provider mapper | Bug | describe the bug when edit all identity provider mapper be show advanced attribute to role as their mapper type regardless of which mapper type it be this make the entire form incorrect because it doesn t have the correct value for the mapper type that be be edit this be also cause the i d provider cypress test to fail I ve put a skip in for the should edit username template importer mapper test in identity provider saml test spec ts when this issue be fix remove the skip as the test should probably work as write version 16 0 expect behavior each mapper type should display its own specific form when edit not the advanced attribute to role form actual behavior when edit all identity provider mapper be show advanced attribute to role as their mapper type regardless of which mapper type it be how to reproduce create any i d provider mapper besides the advanced attribute to role mapper and save it try to edit it it will display the mapper type as advanced attribute to role and display the wrong form anything else no response |
keycloakkeycloak | documentation error user storage spi credentialinputvalidator | Bug | describe the bug the current code example in the documentation for section on credentialinputvalidator be use deprecate example credentialinputvalidator implementation the example show use credentialmodel password constant which be deprecate the correct option should be passwordcredentialmodel type version 15 0 2 expect behavior change the example to use the correct new constant actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | keycloak 19686 update bat script with late change | Bug | basically update kc bat with late change to kc sh allow use space when use option e g db postgre support for auto build support for option use the short prefix e g pf although auto build be possible it only work when run the command for the first time subsequent execution should fail due to generate bytecode jar be hold by another process and mess up with the distribution file basically the re augmentation step that create jar etc prematurely fail interestingly enough run the build command multiple time work I think something be miss when span exit the re augmentation jvm prior to actually run the server |
keycloakkeycloak | base email template for same appearance | Enhancement | description have one basic email theme and all the rest extend it will give more flexibility and reduce code duplication currently if we have to add header and footer in the template then we have to update all email template so for this solution there can be one base template like login have so in this case no need to change all template instead of change only base template accord to requirement mostly in the footer to show logo alignment of text in the centre or something else discussion motivation no response detail no response |
keycloakkeycloak | keycloak 19847 restore docker dist test coverage | Bug | null |
keycloakkeycloak | extend defaultbruteforceprotector | Enhancement | description in order to change the behavior of defaultbruteforceprotector developer should be able to extend defaultbruteforceprotector and adapt it to his own need discussion no response motivation not all access modifier be properly set detail defaultbruteforceprotector have two internal method success and failure both with wrong access modifier defaultbruteforceprotectorfactory have wrong access modifier for its own reference to defaultbruteforceprotector it would be good if extend the defaultbruteforceprotector factory could be do without code duplication defaultbruteforceprotector java public class mybruteforceprotector extend defaultbruteforceprotector private static final logger logger logg getlogger mybruteforceprotector class public mybruteforceprotector keycloaksessionfactory factory super factory override protect void success keycloaksession session loginevent event logger debug my success start super success session event logger debug my success end override protect void failure keycloaksession session loginevent event logger debug my failure start super failure session event logger debug my failure end defaultbruteforceprotectorfactory java public class mybruteforceprotectorfactory extend defaultbruteforceprotectorfactory override protect void initprotector keycloaksessionfactory factory protector new mybruteforceprotector factory override public string getid return my brute force detector produce log 16 20 21 845 debug org keycloak service manager mybruteforceprotector brute force protector my failure start 16 20 21 845 debug org keycloak service manager defaultbruteforceprotector brute force protector failure 16 20 21 846 warn org keycloak service brute force protector kc services0053 login failure for user adbd45d6 8333 44a5 b7be 71fe3f4a1ef1 from ip 127 0 0 1 16 20 21 846 debug org keycloak service manager defaultbruteforceprotector brute force protector new num failure 3 16 20 21 846 debug org keycloak service manager defaultbruteforceprotector brute force protector waitsecond 60 16 20 21 846 debug org keycloak service manager defaultbruteforceprotector brute force protector deltatime 952 16 20 21 846 debug org keycloak service manager defaultbruteforceprotector brute force protector set notbefore 1 638 458 481 16 20 21 847 debug org keycloak service manager mybruteforceprotector brute force protector my failure end |
keycloakkeycloak | jwt nonce claim be not honor when use client authentication | Bug | describe the bug keycloak do not add the nonce claim to the access token that be return when authenticate a confidential client use the client authenticator sign jwt with client secret even though the claim be present in the authentication request version 15 0 2 expect behavior the access token return by keycloak should contain a nonce claim with the same value as in the jwt of the authentication request actual behavior the access token return by keycloak contain no nonce claim even though a nonce claim be present in the jwt of the authentication request how to reproduce 1 create a new realm realm 2 disable all flow except sign jwt with client secret under realm authentication flow of client 3 create a client client with openid connect as protocol 4 configure client to I use access type confidential ii use client authenticator sign jwt with client secret under client credential 5 create a sign jwt use the client secret add the nonce claim with a random value 6 perform a post request to the token endpoint of realm with x www form urlencode and parameter grant type client credential client assertion jwt and client assertion type urn ietf param oauth client assertion type jwt bearer you will see that the return i d token do not contain a nonce claim anything else no response |
keycloakkeycloak | nullpointerexception when no relaystate be send from external idp | Bug | description when keycloak do not recieve the relaystate parameter in a response a nullpointerexception be throw the expect behavior would be that keycloak throw a message like miss relay state parameter in response discussion no response motivation no response detail no response |
keycloakkeycloak | blacklist false positive rate could be set a lot low | Enhancement | description your blacklist feature use a bloom filter a probabilistic datum structure that be super efficient at answer be this password in this really big set of bad password at the cost of the occasional false positive yay keycloak set 1 that false positive rate at 0 01 that mean one in a hundred time you set a password it will be reject as blacklist no matter how long and crazy it be boo my user with stupidly good password like the auto generate one from password manager get scared when they see that their password have be blacklist bloom filter be like suuuuper efficient and you could add a lot of zero to that 0 00001 for example for really not much 2 memory at all please stop scare my user that be smart enough to choose good password but not as smart as burton howard bloom 1 l190 2 discussion no response motivation no response detail literally change 0 01 to 0 00001 or something I mean check my math because we don t wanna eat all the ram |
keycloakkeycloak | improve tooltip and general help around the console | Enhancement | description will list all the text that need to be update in a spreadsheet discussion no response motivation no response detail no response |
keycloakkeycloak | address design consistency of the same pattern use in different place | Enhancement | description will publish convention and create issue for the inconsistency page discussion no response motivation no response detail no response |
keycloakkeycloak | user credential tab set up or reset password validation error not show when password mismatch | Bug | describe the bug the validation error text password and confirmation do not match be not implement yet version 15 0 2 expect behavior error message should display as per design actual behavior no response how to reproduce set up a new password and enter two different password observe that the red validation text do not show up anything else no response |
keycloakkeycloak | ux review update the search result page of event | Bug | describe the bug hi agagancarczyk I have review the event ui and find an issue on the search result page if there be no result as show in the screenshot below in order to well optimize this page I create a new screen as show below if there be no search result it will be display as an empty state and click the clear all filter button will return to the original page what do you think thank version admin new ui expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | ux review mapper detail | Bug | describe the bug hi edewit there be some fine tuning of the mapper detail page in the client scope please check they thank 1 we can add the i d as the tag as the picture show below 2 these three label be confuse we can use the label of the current console version new admin ui expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | introduce ancestor interface for attribute in map entity | Enhancement | description most of the map entity have attribute and each of they then have the same set of method for attribute manipulation l53 l57 move these method into a org keycloak model map common entitywithattribute interface and use it in all relevant entity instead of enumerate the same method discussion no response motivation no response detail no response |
keycloakkeycloak | user label credential edit api give error credential not find when try to save the label first time | Bug | describe the bug the api be throw an error credential not find even though the request url have the credentialid populate on saveuserlabel version 15 0 2 expect behavior the error should not be present and the user should be able to save the label the first and subsequent time actual behavior no response how to reproduce step to replicate 1 go to user menu item credential tab and set up a new credential 2 select a pencil icon and enter a text in the text box and select a tick icon 3 in the network tab chrome observe that the api be throw an error credential not find even though the request url have the credentialid populate on saveuserlabel anything else no response |
keycloakkeycloak | event list hide the interface on a empty search | Bug | describe the bug when search a non existent event in the event list the list interface disappear and you need to refresh the page to see the element again version 15 expect behavior the list should show an empty result actual behavior the list interface disappear how to reproduce go to event tab and search for a non existent element anything else no response |
keycloakkeycloak | delete a group from group detail still show the group | Bug | describe the bug delete a group from group detail still show the group in the list until the page be refresh and the message show say groupdelete version 15 expect behavior the group should disappear from the list after it be delete actual behavior the group only disappear from the list after the page be refresh how to reproduce delete a group from the group detail screen anything else no response |
keycloakkeycloak | create a client scope with space after or before give an error | Bug | describe the bug a client scope can be create with space after or before and they be change into so if you try create a test client scope it create a test client scope and when search for test to show the detail it can t find it and show an error version 15 expect behavior a client scope with space after or before shouldn t be allow actual behavior a client scope with space after or before be allow how to reproduce try create a client scope with space after or before anything else no response |
keycloakkeycloak | can create a client realm role user and group with seemingly duplicate name | Bug | describe the bug when create one of those item there be not a trim in the name create an item with the same name but space before or after the name let you create the item but in the list it show it without the extra space trim version 15 expect behavior create a new item with a duplicate name but add space before or after shouldn t be allow there should be a trim and maybe a case check actual behavior create a new item with a duplicate name but add space before or after be allow and then when list they can be confuse how to reproduce create a client with the client i d account have already the account client anything else no response |
keycloakkeycloak | authentication search fail | Bug | describe the bug authentication search of flow seem to use only the description to find a flow and not the flow name version 15 expect behavior search a flow by flow name in authentication tab show the flow actual behavior if the search word be not in the description the flow do not appear as a result how to reproduce search a flow by flow name when that flow name be not in the description create a new flow without description and try to search for it anything else no response |
keycloakkeycloak | redirect uri with have wrong redirect | Bug | describe the bug when request endpoint auth realm realm name protocol openid connect auth with on url the redirect merge querystring and hash param nowadays be common spa application use on url to make hash base route impact the only safe way to use keycloak js be to initialize before any router behavior it impossible to use bundle size on keycloak stuff create an instance of keycloak in page that be not necessarily need version 15 0 2 expect behavior redirect with query string and hash independently curl h cookie cookie I http 2 302 date mon 29 nov 2021 19 47 43 gmt content length 0 location internal url state secret state session state secret session code secret code actual behavior redirect with query string and hash merge independently shell curl h cookie cookie I http 2 302 date mon 29 nov 2021 19 47 43 gmt content length 0 location internal url state secret state session state secret session code secret code how to reproduce request auth realm realm name protocol openid connect auth with valid param example with mock param curl h cookie cookie I anything else more about hash router |
keycloakkeycloak | additional index to fix performance in environment with many user | Enhancement | description in a customer installation have 1 5 mio user we discover bad performance at two place add index help to fix they client credential grant flow index to fix it user entity realm i d service account client link admin event view index to fix it admin event entity admin event time I think it would make sense to add these index to the db migration a pr will follow discussion no response motivation no response detail no response |
keycloakkeycloak | hot rod map storage use wrong package name | Bug | describe the bug currently hotrod map storage implementation have some class in package org keycloak model map common client connection version 15 0 2 expect behavior hotrod specific class should be in a hotrod specific package actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | read only attribute outdated configuration guide | Bug | describe the bug in the configuration guide via standalone ha xml or cli seem both out of date in the late keycloak stable version 15 0 2 as of write this issue the provider have be change to declarative user profile this should be update since legacy user profile doesn t exist anymore version 15 0 2 expect behavior documentation be up to date to the late keycloak stable actual behavior documentation be not up to date how to reproduce n a anything else no response |
keycloakkeycloak | keycloak 19859 patch request filter to properly end response | Bug | null |
keycloakkeycloak | expose password policy in login form to freemarker template | Enhancement | description currently when a user want to register or update his password the user do not know which password policy be configure when the user input an invalid password the validator will stop after the first fail policy and show that one message proposal there should be a possibility to get the realm specific password policy in the login template so that theme developer could use they to create a password tooltip this be a follow up of this topic discussion no response motivation for user it can be a frustrating experience to guess all the password policy rule which they have to consider detail no response |
keycloakkeycloak | keycloak 19570 add annotation process for hotrod client | Enhancement | this pr add the possibility to automatically generate map interface for hotrod entity automatically here be an example of generate cliententitydelegate |
keycloakkeycloak | add custom liquibase extension to handle json operation | Enhancement | description the new storage jpa implementation use json structure to store some of the entity s attribute as a result the implementation rely on some json orient databse operation such as generate column from certain json property support on most dbs or set index for json property support on a couple of dbs liquibase doesn t support generate column or indexing of json property out of the box so we need a set of liquibase extension to provide custom tag that can be use in changelog file to generate the db specific sql statement for these use case discussion no response motivation have the liquibase extension in place for the use case mention in the description allow for database agnostic changelog where the specific detail of the syntax support by each database to handle json datum be leave to the extension to handle detail we can make use of the liquibase extension framework to introduce new configuration element for generate column and indexed json property it would look something like this xml the addgeneratedcolumn custom tag create a column that be generate use the value of the jsonproperty find in the json file store in the column jsoncolumn on postgre it would result in a sql statement like this sql alter table public test add entityversion integer generate always as metadata entityversion integer store the createjsonindex custom tag create an index for the jsonproperty find in the json file store in the column jsoncolumn on postgre it would result in a sql statement like this sql create index scope idx on public test use gin metadata fscopemapping jsonb path op the extension should also convert the json column type into jsonb binary json for database that have support for this type as it be more efficient so for example on postgre this change xml should result in the follow sql statement where the json type be convert to jsonb sql create table public test i d uuid not null metadata jsonb constraint test pkey primary key i d |
keycloakkeycloak | port in location header be 1 when do saml global logout | Bug | describe the bug when do sp initiate saml global logout the port in location header to redirect to logouturl of the saml adapter be 1 suppose there be eap wildfly with saml adapter and apache httpd as a reverse proxy in front of eap wildfly and their listen port be 8080 and 80 when a browser access httpd the host header of its request have no port number like host localhost forward the request to eap wildfly the host header would be host localhost as well then uri getport return 1 because no port be specify in the host header in keycloakhttpserverauthenticationmechanism sendredirect l176 exchange geturi getport return 1 in this case and it make location header invalid like version rh sso 7 4 x expect behavior location header should be like or actual behavior how to reproduce do glo anything else no response |
keycloakkeycloak | after the login fail the url lose the redirect uri parameter | Bug | describe the bug after the login fail the url lose the redirect uri parameter version 15 0 2 expect behavior actual behavior how to reproduce no response anything else no response |
keycloakkeycloak | can not add role to group | Bug | describe the bug can not add role to group through kcadm web interface work perfect bash 4 4 opt jboss keycloak bin kcadm sh create group r cdu s name cdu group lead top level group name cdu group lead already exist bash 4 4 opt jboss keycloak bin kcadm sh get group r cdu i d ad7dfff1 3867 4ab3 8b75 9e2e0a26be26 name cdu group admin path cdu group admin subgroup i d 58f9384e 0645 43f1 a6e5 62a7e8ba8bdf name cdu group audit path cdu group audit subgroup i d f18f766e a58f 46bf bebe 62bd35f2a118 name cdu group editor path cdu group editor subgroup i d cdd46ea4 f807 45c2 b6cb 5a18606dd0e2 name cdu group lead path cdu group lead subgroup i d d15b25fa a1b1 409f be5f 689370a53fe name cdu group user path cdu group user subgroup bash 4 4 opt jboss keycloak bin kcadm sh add role r cdu gname cdu group lead rolename user group not find for name cdu group lead version 9 0 0 expect behavior role add to group without problem actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | impersonate use api retrieve unusable token | Bug | describe the bug use token exchange as admin cli to obtain a regular user token to impersonate he get the token image not able to make any call with this token error invalid request error description user session not find or doesn t have client attach on it image version 15 0 2 expect behavior the result impersonate access token to be usable for make call as the impersonated user actual behavior no request can be do with give impersonate access token complain about user session not find or doesn t have client attach on it how to reproduce curl location request post header content type application x www form urlencode datum urlencode client i d admin cli data urlencode client secret 736eae33 d387 4be0 9313 datum urlencode grant type urn ietf param oauth grant type token exchange datum urlencode request token type urn ietf param oauth token type refresh token datum urlencode subject token eyjhbgcioijsu data urlencode audience p1cli datum urlencode request subject p1 test user get access token eyjhbgcioijsuzi1 expire in 3540 refresh expire in 1800 refresh token eyjhbgcioijiuzi1niisi token type bearer not before policy 0 session state 43777455 0361 465d a526 98e0fa626f5f scope domain profile email then use result access token to make any call in the name of impersonated user curl location request get header authorization bearer eyjhbgcioijsuzi1niisinr5c get error invalid request error description user session not find or doesn t have client attach on it anything else no response |
keycloakkeycloak | keycloak 19847 optimization and refactoring for well stable startup time | Enhancement | basically there be no change to ux but internal implementation change persist property be no long within the distribution but generate as part of build step and include in the artifact generate by quarkus during re augmentation there be several benefit here such as avoid break the server if you mess up the configuration no need to run build if you replace the classpath in the distribution and we can potentially make our default conf keycloak property even simple by just have there the production setting property file config source be now able to load multiple file from classpath property file load from file system e g run the distribution have a high priority this be somewhat related to 1 above move cluster build step to a specific class we should try to break a bit keycloakprocessor so that we have step well group on a per area basis it should also help make it easy to optimize re augmentation as build step be run in parallel remove unnecessary code path in cli create a fast path for start the server when the start command be execute without any option this be the main usage people should consider for well startup time we be basically avoid run unnecessary code relate to cli args parse and picocli bootstrapping it should also simplify the picocli related code move cli arg processing to the cli config source instead of have it spread everywhere avoid static init on keycloakconfigsourceprovider when look up persist property before the server be start e g still process cli command option before start the server this be mainly important when re augment the server because re augmentatoin run in a different classloader move bootstrap code from lifecycle observer to close the other bootstrap method within quarkuskeycloakapplication remove unnecessary step when run the main testsuite that be cause re augmentation to happen everytime the server be start e g just because the user profile provider be be set more test and improvement to dist x testsuite run a single smoke test use container the test be a bit unstable and fail from time to time due to timeout also have issue run locally in a stable fashion |
keycloakkeycloak | build fail on system with large group ids | Bug | describe the bug hello the build currently fail on system where the main group i d of the current user be over 2097151 this often happen on system use samba or sssd for active directory integration error fail to execute goal org apache maven plugin maven assembly plugin 3 1 1 single assemble on project keycloak server dist execution assemble of goal org apache maven plugin maven assembly plugin 3 1 1 single fail group i d redact 9 digit be too big 2097151 use star or posix extension to overcome this limit help 1 the fix be trivial pr 8927 version 16 0 0 snapshot expect behavior no response actual behavior no response how to reproduce no response anything else previously keycloak 4563 3936 regression introduce here diff 5a5ad27dcb26d0ea46e886bb1781b66b37aa627aa38bf3fb9ed65f186abf4266 |
keycloakkeycloak | infinispan hotrod socket be close after a transaction be abort by server | Bug | describe the bug hello currently verify on 14 0 0 very probably still the case on current 16 0 0 snapshot exception raise by infinispan server such as ispn000136 error execute command preparecommand on cache session or ispn000926 aftercompletion fail for synchronizationadapter cause the hotrod socket to be close by the client after the expiration of transport lock timeout default 1 min even when the error be properly handle client side and the connection be still healthy this seem to be mostly cosmetic as connection be properly reopen and transaction be retry this be cause by the issue ispn 12801 that be fix in infinispan 12 1 0 the fix would be to update the version of infinispan client and dependency but some refactoring upgrade of keycloak code seem require due to deprecation and change in infinispan client api version 14 0 0 expect behavior infinispan exception do not always cause hotrod socket to be close later actual behavior hotrod socket be always close after a server side exception be report to the client and the inactivity timeout elapse the follow exception be report by keycloak warn keycloak org infinispan hotrod ispn004098 closing connection i d 0x3c6691d7 l redact 38524 r redact redact 11222 due to transport error java net sockettimeoutexception removeoperation session key b0x033e2430343034636331632d35636264 39 flag 1 connection redact redact 11222 time out after 60000 ms at org infinispan client hotrod impl operation hotrodoperation run hotrodoperation java 176 at io netty util concurrent promisetask runtask promisetask java 98 at io netty util concurrent scheduledfuturetask run scheduledfuturetask java 170 at io netty util concurrent abstracteventexecutor safeexecute abstracteventexecutor java 164 at io netty util concurrent singlethreadeventexecutor runalltask singlethreadeventexecutor java 472 at io netty channel epoll epolleventloop run epolleventloop java 384 at io netty util concurrent singlethreadeventexecutor 4 run singlethreadeventexecutor java 989 at io netty util internal threadexecutormap 2 run threadexecutormap java 74 at java base java util concurrent threadpoolexecutor runworker threadpoolexecutor java 1128 at java base java util concurrent threadpoolexecutor worker run threadpoolexecutor java 628 at java base java lang thread run thread java 834 how to reproduce setup require keycloak cluster infinispan server remote cache node or cluster single site or cross site generate enough collide traffic to cause transaction to be roll back on the infinispan cluster check log of both server and notice that all error report by the infinispan server be cause hotrod connection to be close 1 min later by the keycloak server anything else no response |
keycloakkeycloak | apache2 sample setup for reverse proxy installation | Enhancement | description I wasn t able to find a work apache2 setup what ever I try there be still a browser mix content failure in the account page may be you can add a sample configuration for apache2 with nginx I be able to get it run the last fail apache2 setup debian 11 1 be documentroot var www html header setifempty x forward proto https proxypreservehost on proxypass add x forward for x forward host and x forward server proxypass proxypassreverse discussion no response motivation fail installation setup detail apache2 virtualhost sample setup |
keycloakkeycloak | reset password do not logout all session | Enhancement | describe the bug all the session of a user be not close when use forgot credential page version 15 0 2 expect behavior when a user be use multiple device a pc and a mobile device for example and be log in on each if he reset his password on the pc I expect it to be log out on all his device so it should be loggout out on his mobile device also actual behavior when a user change its password in the account page all session be log out amha this be expect when a user change its password with the forgot password page open session be not close how to reproduce log in to keycloak on a browser example firefox log in to keycloak with same user on another browser example chromium in keycloak admin console we can see two session for this user in a third browser or a private tab go to auth realm realm login action reset credential page and reset the password in keycloak admin console we can see old session for this user be not close anything else no response |
keycloakkeycloak | processingexception resteasy004655 unable to invoke request java net socketexception connection reset | Bug | describe the bug I get a reset error when I use keycloak to search for user this error do not appear every time only occasionally but I don t know how to fix it please help java private boolean verifyaccountfromkeycloak string account string email final usersresource usersresource keycloak realm currentrealm user if collectionutil isnotempty usersresource search account true return false list users2 usersresource search null null null email 0 20 return collectionutil isempty users2 users2 stream anymatch s email equal s getemail version 15 0 2 expect behavior no error or exception actual behavior javax ws rs processingexception resteasy004655 unable to invoke request java net socketexception connection reset at org jboss resteasy client jaxrs engines apachehttpclient4engine invoke apachehttpclient4engine java 328 at org jboss resteasy client jaxrs internal clientinvocation invoke clientinvocation java 443 at org jboss resteasy client jaxrs internal proxy clientinvoker invokesync clientinvoker java 149 at org jboss resteasy client jaxrs internal proxy clientinvoker invoke clientinvoker java 112 at org jboss resteasy client jaxrs internal proxy clientproxy invoke clientproxy java 76 at com sun proxy proxy196 refreshtoken unknown source at org keycloak admin client token tokenmanager refreshtoken tokenmanager java 111 at org keycloak admin client token tokenmanager getaccesstoken tokenmanager java 72 at org keycloak admin client token tokenmanager getaccesstokenstre tokenmanager java 65 at org keycloak admin client resource bearerauthfilter filter bearerauthfilter java 52 at org jboss resteasy client jaxrs internal clientinvocation filterrequest clientinvocation java 579 at org jboss resteasy client jaxrs internal clientinvocation invoke clientinvocation java 440 at org jboss resteasy client jaxrs internal proxy clientinvoker invokesync clientinvoker java 149 at org jboss resteasy client jaxrs internal proxy clientinvoker invoke clientinvoker java 112 at org jboss resteasy client jaxrs internal proxy clientproxy invoke clientproxy java 76 at com sun proxy proxy249 search unknown source at com commercial provider service impl userserviceimpl lambda verifyaccountfromkeycloak 0 userserviceimpl java 133 at java util concurrent completablefuture asyncsupply run completablefuture java 1590 1 common frame omit cause by java net socketexception connection reset at java net socketinputstream read socketinputstream java 210 at java net socketinputstream read socketinputstream java 141 at sun security ssl inputrecord readfully inputrecord java 465 at sun security ssl inputrecord read inputrecord java 503 at sun security ssl sslsocketimpl readrecord sslsocketimpl java 975 at sun security ssl sslsocketimpl readdatarecord sslsocketimpl java 933 at sun security ssl appinputstream read appinputstream java 105 at org apache http impl io sessioninputbufferimpl streamread sessioninputbufferimpl java 137 at org apache http impl io sessioninputbufferimpl fillbuffer sessioninputbufferimpl java 153 at org apache http impl io sessioninputbufferimpl readline sessioninputbufferimpl java 280 at org apache http impl conn defaulthttpresponseparser parsehead defaulthttpresponseparser java 138 at org apache http impl conn defaulthttpresponseparser parsehead defaulthttpresponseparser java 56 at org apache http impl io abstractmessagepars parse abstractmessageparser java 259 at org apache http impl defaultbhttpclientconnection receiveresponseheader defaultbhttpclientconnection java 163 at org apache http impl conn cpoolproxy receiveresponseheader cpoolproxy java 157 at org apache http protocol httprequestexecutor doreceiveresponse httprequestexecutor java 273 at org apache http protocol httprequestexecutor execute httprequestexecutor java 125 at org apache http impl execchain mainclientexec execute mainclientexec java 272 at org apache http impl execchain protocolexec execute protocolexec java 186 at org apache http impl execchain retryexec execute retryexec java 89 at org apache http impl execchain redirectexec execute redirectexec java 110 at org apache http impl client internalhttpclient doexecute original 3ayxwftd internalhttpclient java 185 at org apache http impl client internalhttpclient doexecute original 3ayxwftd accessor qdjclioy internalhttpclient java at org apache http impl client internalhttpclient auxiliary wwrcghze call unknown source at org apache skywalking apm agent core plugin interceptor enhance instmethodsinter intercept instmethodsinter java 86 at org apache http impl client internalhttpclient doexecute internalhttpclient java at org apache http impl client closeablehttpclient execute closeablehttpclient java 83 at org apache http impl client closeablehttpclient execute closeablehttpclient java 56 at org jboss resteasy client jaxrs engines apachehttpclient4engine invoke apachehttpclient4engine java 323 18 common frame omit how to reproduce sorry this error do not appear every time only occasionally anything else spring boot 2 3 11 release jdk image openjdk 8u212 jre slim |
keycloakkeycloak | custom spi userfederationprovider not create via admin api | Bug | describe the bug I be try to create a realm with a federate user store test provider be implement as custom spi and doesn t require any mandatory configuration i d hero realm hero userfederationprovider providername test provider displayname test provider the above payload be post to auth admin realm the realm be create but the federated user store be not add instead of custom spi I try to use ldap and it be work perfectly fine version 15 0 2 expect behavior realm along with federated store should be create in keycloak actual behavior realm create but user store not add how to reproduce admin api anything else l565 ldap and kerbero be hard code here be this the reason |
keycloakkeycloak | allow developer admin to configure samesite cookie attribute | Enhancement | description this isssue on the legacy issue tracker highlight the change make to the samesite cookie in order to support new version of chrome we have a request from our security team to enforce lax or strict option which be currently unavailable and uncontrollable as far as I be aware by a developer administrator discussion no response motivation no response detail no response |
keycloakkeycloak | model map should not depend on service | Enhancement | description keycloak model map module currently depend on service l52 l55 module this dependency be due to logg and few more constant and should be replace by appropriate maven artifact contant discussion no response motivation no response detail no response |
keycloakkeycloak | ux review optimize the help text of the display name | Bug | describe the bug when create a new resource there be a field name display name we can find that the tooltip of display name and name be the same it s confuse so we can optimize the wording of the display name tooltip version admin new ui expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | build failure on openjdk 17 | Bug | describe the bug try to build from scratch but run into error version main branch 1e1a6779befb9c836069761fb70d86cadd47b4cb expect behavior proper build actual behavior info 5 error info info info reactor summary for keycloak 16 0 0 snapshot info info keycloak success 6 476 s info keycloak common success 12 540 s info keycloak core success 14 529 s info keycloak server spi success 12 179 s info keycloak server private spi success 26 036 s info keycloak kerberos federation success 1 685 s info keycloak ldap userstoreprovider success 6 269 s info keycloak saml core public api success 15 817 s info keycloak saml core success 14 082 s info keycloak rest service success 01 09 min info keycloak js integration success 6 041 s info keycloak theme success 12 13 min info keycloak model parent success 0 095 s info keycloak model jpa success 15 056 s info keycloak model java annotation and processor success 1 116 s info keycloak model map failure 4 731 s info keycloak model infinispan skip info keycloak model hot rod skip info keycloak sssd federation skip info keycloak authz parent skip info keycloak authz provider parent skip info keycloak authz common policy provider skip info keycloak wildfly integration skip info keycloak wildfly add user script skip info keycloak wildfly extension skip info keycloak wildfly server subsystem skip info keycloak integration skip info keycloak client cli skip info keycloak client registration cli skip info keycloak admin cli skip info keycloak client cli distribution skip info distribution parent skip info keycloak distribution license common skip info keycloak distribution maven plugins parent skip info keycloak license processor maven plugin skip info feature pack build skip info keycloak feature pack server dependency skip info keycloak feature pack server skip info galleon feature pack build skip info keycloak galleon feature pack server skip info keycloak server galleon base distribution skip info info build failure info info total time 15 45 min info finish at 2021 11 23t15 07 01 01 00 info error fail to execute goal org apache maven plugins maven compiler plugin 3 8 1 jboss 1 compile default compile on project keycloak model map compilation failure compilation failure error keycloak model map src main java org keycloak model map storage chm concurrenthashmapstorageproviderfactory java 105 57 incompatible type invalid constructor reference error constructor mapcliententityimpl in class org keycloak model map client mapcliententityimpl can not be apply to give type error require no argument error find org keycloak model map common deepcloner error reason actual and formal argument list differ in length error keycloak model map target generate source annotation org keycloak model map client mapcliententityimpl java 5 8 org keycloak model map client mapcliententityimpl be not abstract and do not override abstract method setsurrogateauthrequire java lang boolean in org keycloak model map client mapcliententity error keycloak model map target generate source annotation org keycloak model map client mapcliententityimpl java 11 9 incompatible type miss return value error keycloak model map target generate source annotation org keycloak model map client mapprotocolmapperentityimpl java 5 8 org keycloak model map client mapprotocolmapperentityimpl be not abstract and do not override abstract method setconfig java util map in org keycloak model map client mapprotocolmapperentity error keycloak model map target generate source annotation org keycloak model map client mapprotocolmapperentityimpl java 11 9 incompatible type miss return value error help 1 error error to see the full stack trace of the error re run maven with the e switch error re run maven use the x switch to enable full debug log error error for more information about the error and possible solution please read the follow article error help 1 error error after correct the problem you can resume the build with the command error mvn rf keycloak model map how to reproduce git clone mvn pdistribution pl distribution server dist be dmaven test skip clean install anything else microsoft windows version 10 0 18363 1854 c 2019 microsoft corporation alle rechte vorbehalten java version java version 17 0 1 2021 10 19 lt java tm se runtime environment build 17 0 1 12 lt 39 java hotspot tm 64 bit server vm build 17 0 1 12 lts 39 mixed mode sharing mvn version apache maven 3 8 4 9b656c72d54e5bacbed989b64718c159fe39b537 maven home c program file x86 apache maven 3 8 4 java version 17 0 1 vendor oracle corporation runtime c program file java jdk 17 0 1 default locale de de platform encoding cp1252 os name window 10 version 10 0 arch amd64 family window |
keycloakkeycloak | improve mapclientprovider getalwaysdisplayinconsoleclientsstream implementation | Enhancement | description mapclientprovider getalwaysdisplayinconsoleclientsstream l166 l169 be implement in a way that it load all client from the underlie storage and then perform filtering base on alwaysdisplayinconsole field discussion no response motivation this issue be about add new searchable field so that filtering could happen on store level detail no response |
keycloakkeycloak | ux review default role realmname fine tuning | Bug | describe the bug on this page when user click this link there will be a dialogue popup please check the detail in this design link thank version admin ui expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | crash when create identity provider | Bug | describe the bug 1 identity provider add saml provider 2 type something in discovery endpoint field but don t save 3 click on use discovery endpoint version 16 0 0 expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | keycloakmetricshandler do not respect a custom context root | Enhancement | description currently the keycloakmetricshandler be bind with a strict path bind to metric this work fine with the default context path of however when a different context path be configure the metric endpoint doesn t work anymore and only return an error message if we enable metric via dkc metric enable true and configure a custom context path via dquarkus http root path auth we see the follow error response return if the auth metric endpoint be access the expect context root of metric be metric but a request with a different path be route to metricsrequesthandler the problem be that the org keycloak quarkus runtime service health keycloakmetricshandler be configure with a fix metric path which be use to check an incoming request discussion no response motivation to remain compatible with old keycloak deployment we want to use the custom context path auth at the same time we also want metric to be available out of the box detail a small fix be to make keycloakmetricshandler aware of the configure context path package org keycloak quarkus runtime service health import io quarkus smallrye metric runtime smallryemetricshandler import org keycloak quarkus runtime configuration configuration import static org keycloak quarkus runtime configuration microprofileconfigprovider n quarkus prefix public class keycloakmetricshandler extend smallryemetricshandl public static final string default metric endpoint metric public keycloakmetricshandler string contextpathprefix configuration getoptionalvalue n quarkus prefix concat http root path orelse string metricspath contextpathprefix default metric endpoint replaceall setmetricspath metricspath |
keycloakkeycloak | keycloak return redirect url with wrong port | Bug | describe the bug when develop a frontend for a localhost I connect to the backend and go through authorization through the keycloak keycloak always after redirection substitute the port on which the backend be run 8080 if you launch the frontend on localhost 8080 then everything will be fine but if on a different port then the redirect url will be with port 8080 and authorization do not work how to make it return the redirect url with the correct port version 12 0 4 expect behavior keycloak return the correct redirect url and authorization pass actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | keycloak 19833 fix command line completion on zsh | Bug | this fix the currently break command line completion feature on zsh the root problem be that have in the generate by picocli function name break the completion script this also well conform to picocli canonical usage I test manually on zsh and bash to avoid regression and now everything look good cc dguhr pedroigor |
keycloakkeycloak | user attribute on login verify email ftl | Enhancement | description we would like to show to which email address the email be send on the login verify email ftl page example you will receive an email from we on 0 contain a link which but the login verify email ftl template have no user attribute available to get the email address from discussion motivation no response detail no response |
keycloakkeycloak | user profile field with scope restriction break configuration import on nullpointerexception | Bug | describe the bug use the declarative user profile test module I experiment nullpointerexception on full realm configuration import if I use the require scope or enable when scope feature in the user profile json definition that would be these two section json selector scope microprofile jwt permission view edit name field displayname field require role scope json selector scope permission view edit name field displayname field require role scope profile the realm configuration export be ok but when try to import it it will crash at java lang nullpointerexception at org keycloak userprofile config upconfigutil validatescope upconfigutil java 178 version 15 0 2 expect behavior regular full configuration import actual behavior import crash on nullpointerexception how to reproduce I use a very simple user profile to test the issue I only add one field after the default one a field name field with the enable when scope option activate here be the export profile definition in the main keycloak json export org keycloak userprofile userprofileprovider i d 133390a8 5744 454f ab58 a09f3e28b04d providerid declarative user profile subcomponent config config piece 0 attribute name username displayname username validation length min 3 max 255 username prohibit character name email displayname email validation email length max 255 name firstname displayname firstname require role user permission view admin user edit admin user validation length max 255 person name prohibit character name lastname displayname lastname require role user permission view admin user edit admin user validation length max 255 person name prohibit character selector scope microprofile jwt permission view edit name field displayname field group config piece count 1 the problematic part be selector scope microprofile jwt mircoprofile jwt could be any scope that would still crash if we replace it with an empty scope selector scope the import go without problem I run the import in a docker version of keycloak image jboss keycloak 15 0 2 this way bash export jdbc param echo jdbc param se s opt jboss keycloak bin standalone sh djboss socket bind port offset 150 dkeycloak migration action import dkeycloak migration provider dir dkeycloak migration strategy overwrite exist dkeycloak profile feature upload script enable dkeycloak migration dir config full dkeycloak profile feature declarative user profile enable and this be the java lang nullpointerexception error on validatescope obtain when a scope be add on a field log 13 59 42 509 info org keycloak service serverservice thread pool 66 kc services0030 full model import request strategy overwrite exist 13 59 42 698 info org keycloak exportimport util importutil serverservice thread pool 66 realm master already exist remove it before import 13 59 48 417 info org keycloak exportimport util importutil serverservice thread pool 66 realm master import 13 59 48 668 info org keycloak exportimport dir dirimportprovider serverservice thread pool 66 import user from config full master user 0 json 13 59 48 835 info org keycloak exportimport util importutil serverservice thread pool 66 realm cxx already exist remove it before import 13 59 52 787 info org keycloak exportimport util importutil serverservice thread pool 66 realm cxx import 13 59 53 409 info org keycloak exportimport dir dirimportprovider serverservice thread pool 66 import user from config full cxx user 0 json 13 59 53 637 info org keycloak exportimport util importutil serverservice thread pool 66 realm test already exist remove it before import 13 59 55 253 fatal org keycloak service serverservice thread pool 66 error during startup java lang nullpointerexception at org keycloak userprofile config upconfigutil validatescope upconfigutil java 178 at org keycloak userprofile config upconfigutil validateattribute upconfigutil java 161 at org keycloak userprofile config upconfigutil lambda validateattribute 2 upconfigutil java 114 at java base java util arraylist foreach arraylist java 1541 at org keycloak userprofile config upconfigutil validateattribute upconfigutil java 114 at org keycloak userprofile config upconfigutil validate upconfigutil java 93 at org keycloak userprofile declarativeuserprofileprovider validateconfiguration declarativeuserprofileprovider java 182 at org keycloak model jpa realmadapter importcomponentmodel realmadapter java 2020 at org keycloak model util representationtomodel importcomponents representationtomodel java 620 at org keycloak model util representationtomodel importrealm representationtomodel java 399 at org keycloak service manager realmmanager importrealm realmmanager java 557 at org keycloak exportimport util importutil importrealm importutil java 110 at org keycloak exportimport dir dirimportprovider 4 runexportimporttask dirimportprovider java 138 at org keycloak exportimport util exportimportsessiontask run exportimportsessiontask java 35 at org keycloak model util keycloakmodelutil runjobintransaction keycloakmodelutil java 250 at org keycloak exportimport dir dirimportprovider importrealm dirimportprovider java 134 at org keycloak exportimport dir dirimportprovider importmodel dirimportprovider java 76 at org keycloak exportimport exportimportmanager runimport exportimportmanager java 87 at org keycloak service resource keycloakapplication bootstrap keycloakapplication java 207 at org keycloak service resource keycloakapplication 1 run keycloakapplication java 136 at org keycloak model util keycloakmodelutil runjobintransaction keycloakmodelutil java 250 at org keycloak service resource keycloakapplication startup keycloakapplication java 128 at org keycloak provider wildfly wildflyplatform onstartup wildflyplatform java 36 at org keycloak service resource keycloakapplication keycloakapplication java 114 at java base jdk internal reflect nativeconstructoraccessorimpl newinstance0 native method at java base jdk internal reflect nativeconstructoraccessorimpl newinstance nativeconstructoraccessorimpl java 62 at java base jdk internal reflect delegatingconstructoraccessorimpl newinstance delegatingconstructoraccessorimpl java 45 at java base java lang reflect constructor newinstance constructor java 490 at org jboss resteasy core constructorinjectorimpl construct constructorinjectorimpl java 152 at org jboss resteasy spi resteasyproviderfactory createproviderinstance resteasyproviderfactory java 2835 at org jboss resteasy spi resteasydeployment createapplication resteasydeployment java 376 at org jboss resteasy spi resteasydeployment startinternal resteasydeployment java 288 at org jboss resteasy spi resteasydeployment start resteasydeployment java 98 at org jboss resteasy plugin server servlet servletcontainerdispatcher init servletcontainerdispatcher java 140 at org jboss resteasy plugin server servlet httpservletdispatcher init httpservletdispatcher java 42 at io undertow servlet core lifecyleinterceptorinvocation proceed lifecyleinterceptorinvocation java 117 at org wildfly extension undertow security runaslifecycleinterceptor init runaslifecycleinterceptor java 78 at io undertow servlet core lifecyleinterceptorinvocation proceed lifecyleinterceptorinvocation java 103 at io undertow servlet core managedservlet defaultinstancestrategy start managedservlet java 305 at io undertow servlet core managedservlet createservlet managedservlet java 145 at io undertow servlet core deploymentmanagerimpl 2 call deploymentmanagerimpl java 588 at io undertow servlet core deploymentmanagerimpl 2 call deploymentmanagerimpl java 559 at io undertow servlet core servletrequestcontextthreadsetupaction 1 call servletrequestcontextthreadsetupaction java 42 at io undertow servlet core contextclassloadersetupaction 1 call contextclassloadersetupaction java 43 at org wildfly extension undertow security securitycontextthreadsetupaction lambda create 0 securitycontextthreadsetupaction java 105 at org wildfly extension undertow deployment undertowdeploymentinfoservice undertowthreadsetupaction lambda create 0 undertowdeploymentinfoservice java 1530 at org wildfly extension undertow deployment undertowdeploymentinfoservice undertowthreadsetupaction lambda create 0 undertowdeploymentinfoservice java 1530 at org wildfly extension undertow deployment undertowdeploymentinfoservice undertowthreadsetupaction lambda create 0 undertowdeploymentinfoservice java 1530 at org wildfly extension undertow deployment undertowdeploymentinfoservice undertowthreadsetupaction lambda create 0 undertowdeploymentinfoservice java 1530 at io undertow servlet core deploymentmanagerimpl start deploymentmanagerimpl java 601 at org wildfly extension undertow deployment undertowdeploymentservice startcontext undertowdeploymentservice java 97 at org wildfly extension undertow deployment undertowdeploymentservice 1 run undertowdeploymentservice java 78 at java base java util concurrent executors runnableadapter call executor java 515 at java base java util concurrent futuretask run futuretask java 264 at org jboss thread contextclassloadersavingrunnable run contextclassloadersavingrunnable java 35 at org jboss thread enhancedqueueexecutor saferun enhancedqueueexecutor java 1990 at org jboss thread enhancedqueueexecutor threadbody doruntask enhancedqueueexecutor java 1486 at org jboss thread enhancedqueueexecutor threadbody run enhancedqueueexecutor java 1377 at java base java lang thread run thread java 829 at org jboss thread jbossthread run jbossthread java 513 13 59 55 255 info org jboss resteasy resteasy jaxrs i18n serverservice thread pool 66 resteasy002225 deploy javax ws rs core application class org keycloak service resource keycloakapplication 13 59 55 259 info org jboss resteasy resteasy jaxrs i18n serverservice thread pool 66 resteasy002200 add class resource org keycloak service resource jsresource from application class org keycloak service resource keycloakapplication 13 59 55 260 info org jboss resteasy resteasy jaxrs i18n serverservice thread pool 66 resteasy002205 add provider class org keycloak service filter keycloaksecurityheadersfilter from application class org keycloak service resource keycloakapplication 13 59 55 260 info org jboss resteasy resteasy jaxrs i18n serverservice thread pool 66 resteasy002200 add class resource org keycloak service resource themeresource from application class org keycloak service resource keycloakapplication 13 59 55 260 info org jboss resteasy resteasy jaxrs i18n serverservice thread pool 66 resteasy002205 add provider class org keycloak service error keycloakerrorhandler from application class org keycloak service resource keycloakapplication 13 59 55 261 info org jboss resteasy resteasy jaxrs i18n serverservice thread pool 66 resteasy002220 add singleton resource org keycloak service resource robotsresource from application class org keycloak service resource keycloakapplication 13 59 55 261 info org jboss resteasy resteasy jaxrs i18n serverservice thread pool 66 resteasy002220 add singleton resource org keycloak service resource admin adminroot from application class org keycloak service resource keycloakapplication 13 59 55 261 info org jboss resteasy resteasy jaxrs i18n serverservice thread pool 66 resteasy002220 add singleton resource org keycloak services resource welcomeresource from application class org keycloak service resource keycloakapplication 13 59 55 261 info org jboss resteasy resteasy jaxrs i18n serverservice thread pool 66 resteasy002210 add provider singleton org keycloak services util objectmapperresolver from application class org keycloak service resource keycloakapplication 13 59 55 261 info org jboss resteasy resteasy jaxrs i18n serverservice thread pool 66 resteasy002220 add singleton resource org keycloak service resource realmsresource from application class org keycloak service resource keycloakapplication 13 59 55 260 info org jboss as server thread 1 wflysrv0220 server shutdown have be request via an os signal 13 59 55 290 info org jboss as connector subsystem datasource msc service thread 1 8 wflyjca0010 unbound datum source java jboss datasources keycloakds 13 59 55 297 info org wildfly extension undertow msc service thread 1 7 wflyut0008 undertow https listener https suspend 13 59 55 297 info org jboss as mail extension msc service thread 1 2 wflymail0002 unbound mail session java jboss mail default 13 59 55 320 info org jboss as connector deployer jdbc msc service thread 1 1 wflyjca0019 stop driver service with driver name postgresql 13 59 55 324 info org wildfly extension undertow msc service thread 1 7 wflyut0007 undertow https listener https stop be bind to 127 0 0 1 8593 13 59 55 341 info org jboss resteasy plugin validation i18n serverservice thread pool 66 resteasy008550 unable to find cdi support validatorfactory use default validatorfactory 13 59 55 404 info org wildfly extension undertow serverservice thread pool 66 wflyut0021 register web context auth for server default server 13 59 55 406 info org wildfly extension undertow serverservice thread pool 66 wflyut0022 unregistered web context auth from server default server 13 59 55 412 info org jboss as connector subsystem datasource msc service thread 1 6 wflyjca0010 unbound datum source java jboss datasource exampled 13 59 55 415 info org jboss as connector deployer jdbc msc service thread 1 4 wflyjca0019 stop driver service with driver name h2 13 59 55 419 info org wildfly extension undertow msc service thread 1 3 wflyut0019 host default host stop 13 59 55 441 info org wildfly extension undertow msc service thread 1 5 wflyut0008 undertow http listener default suspend 13 59 55 445 info org jboss as server deployment msc service thread 1 6 wflysrv0028 stop deployment keycloak server war runtime name keycloak server war in 179ms 13 59 55 447 info org wildfly extension undertow msc service thread 1 5 wflyut0007 undertow http listener default stop be bind to 127 0 0 1 8230 13 59 55 447 info org jboss as cluster infinispan serverservice thread pool 70 wflyclinf0003 stop loginfailure cache from keycloak container 13 59 55 452 info org jboss as cluster infinispan serverservice thread pool 69 wflyclinf0003 stop offlineclientsession cache from keycloak container 13 59 55 452 info org wildfly extension undertow msc service thread 1 1 wflyut0004 undertow 2 2 5 final stop 13 59 55 460 info org jboss as cluster infinispan serverservice thread pool 77 wflyclinf0003 stop key cache from keycloak container 13 59 55 460 info org jboss as cluster infinispan serverservice thread pool 71 wflyclinf0003 stop authenticationsession cache from keycloak container 13 59 55 461 info org jboss as cluster infinispan serverservice thread pool 73 wflyclinf0003 stop session cache from keycloak container 13 59 55 465 info org jboss as cluster infinispan serverservice thread pool 78 wflyclinf0003 stop user cache from keycloak container 13 59 55 472 info org jboss as cluster infinispan serverservice thread pool 75 wflyclinf0003 stop authorization cache from keycloak container 13 59 55 472 info org jboss as cluster infinispan serverservice thread pool 76 wflyclinf0003 stop offlinesession cache from keycloak container 13 59 55 472 info org jboss as cluster infinispan serverservice thread pool 79 wflyclinf0003 stop clientsession cache from keycloak container 13 59 55 472 info org jboss as cluster infinispan serverservice thread pool 72 wflyclinf0003 stop work cache from keycloak container 13 59 55 474 info org jboss as cluster infinispan serverservice thread pool 74 wflyclinf0003 stop actiontoken cache from keycloak container 13 59 55 482 info org jboss as cluster infinispan serverservice thread pool 80 wflyclinf0003 stop realm cache from keycloak container 13 59 55 483 info org infinispan manager defaultcachemanager serverservice thread pool 80 stop cache manager null on null 13 59 55 550 info org jboss as cluster infinispan serverservice thread pool 66 wflyclinf0003 stop http remote connector cache from ejb container 13 59 55 551 info org infinispan manager defaultcachemanager serverservice thread pool 66 stop cache manager null on null 13 59 55 556 error org jboss as controller management operation controller boot thread wflyctl0013 operation add fail address subsystem metric java lang nullpointerexception at org wildfly extension metric metricssubsystemadd 2 execute metricssubsystemadd java 91 at org jboss as controller abstractoperationcontext executestep abstractoperationcontext java 1040 at org jboss as controller abstractoperationcontext processstage abstractoperationcontext java 779 at org jboss as controller abstractoperationcontext executeoperation abstractoperationcontext java 468 at org jboss as controller operationcontextimpl executeoperation operationcontextimpl java 1415 at org jboss as controller modelcontrollerimpl boot modelcontrollerimpl java 529 at org jboss as controller abstractcontrollerservice boot abstractcontrollerservice java 515 at org jboss as controller abstractcontrollerservice boot abstractcontrollerservice java 477 at org jboss as server serverservice boot serverservice java 459 at org jboss as server serverservice boot serverservice java 412 at org jboss as controller abstractcontrollerservice 1 run abstractcontrollerservice java 416 at java base java lang thread run thread java 829 13 59 55 562 error org jboss as server serverservice thread pool 43 wflysrv0022 deploy of deployment keycloak server war be roll back with no failure message 13 59 55 581 info org jboss as msc service thread 1 1 wflysrv0050 keycloak 15 0 2 wildfly core 15 0 1 final stop in 314ms anything else no response |
keycloakkeycloak | keycloak 15 0 2 adapter spring boot 2 6 application don t start because of circular reference due to dependency injection | Bug | describe the bug when use keycloak 15 0 2 with spring boot 2 6 release 19 november 2021 the application fail to start with the follow description application fail to start description the dependency of some of the bean in the application context form a cycle webmvckeycloaksecurityconfigureradapter field private org keycloak adapters keycloakconfigresolver org keycloak adapter springsecurity config keycloakwebsecurityconfigureradapter keycloakconfigresolver action rely upon circular reference be discourage and they be prohibit by default update your application to remove the dependency cycle between bean as a last resort it may be possible to break the cycle automatically by set spring main allow circular reference to true by use the workaround spring main allow circular reference to true the application start successfully version 15 0 2 expect behavior the application must start even if we do not set spring main allow circular reference to true actual behavior crash of the application how to reproduce use keycloak security adapter 15 0 2 with spring boot 2 6 0 with spring main allow circular reference no set or set to false anything else no response |
keycloakkeycloak | support for solid oidc | Enhancement | description hello be keycloak plan to support solid oidc 1 if yes when would solid oidc be available to keycloak instance good regard discussion no response motivation I would allow keycloak user to log in to solid pod with their keycloak sso account instead of have to create a new account on the solid pod instance detail no response |
keycloakkeycloak | keycloak 19798 filter option base on the command | Enhancement | basically filter option for start star dev and build command enable show additional option for the above command use a ha be it a good short name or help all also add some hint about use the new option if support by the command avoid boilerplate configuration in option spec remove unnecessary logic to default to start command as per previous change now you need to explicitly run start |
keycloakkeycloak | not able to get account be disabled contact your administrator message | Bug | describe the bug hi I be not able to see account be disabled contact your administrator message when user be disable temporary permanent when he enter wrong pass continuously for configurable amount of time user be get disable but I be not see the message when I login post user be disabled please help I to fix the issue version 13 0 1 expect behavior I should be able to get account be disabled contact your administrator when user be locked or disabled actual behavior no response how to reproduce configure lockout of user in key cloak relm set then enter wrong credential for above configurable about of time user get disabled but I be not get the account be disabled contact your administrator message anything else no response |
keycloakkeycloak | service account leak in get user api with exact query parameter set | Bug | describe the bug hello when call the get realm user endpoint with the optional query parameter exact set to any value without specify any other query parameter the list of user also contain service account user from the client with service account enable in that realm it seem like this be a bug because when this optional query parameter be not set those service account user be never return if this be the intend behavior I would expect to be able to replicate the default behavior by specify exact true or exact false whatever the default currently be in case I misunderstood something be there a way to reliably filter out the service account user when specify the exact query parameter thank a lot for your help version 15 0 2 expect behavior service account user not show up in the get realm user endpoint or otherwise consistent behavior when specify or omit the exact query parameter actual behavior service account user show up when set the exact query parameter to any value how to reproduce create a new realm create a dummy oidc client in the realm set service account enable on the newly create client client call get realm user exact true or get realm user exact false when simply call get realm user the service account user do not show up anything else no response |
keycloakkeycloak | keycloak 19798 move pf cf v option to the root command and error handling | Enhancement | basically move pf v and cf option to the root command kc sh pf v cf the option be not follow a specific order have some issue to make this happen it should be possible now to use different configuration property use the above format when run build and start command improvement to error handle code by move code into a single place and a more standard format for error message when a command exit with an error move message e g exception we throw at runtime to a single place to make easy to manage they and possibly internationalize message |
keycloakkeycloak | keycloak 15 0 2 offline session couldn t load on admin page | Bug | describe the bug error when search offline session in admin page when it have datum keycloak upgrading from 4 6 0 to 15 0 2 database postgre the total offline session item around 13k version 15 0 2 expect behavior can load offline session without error actual behavior 1 use admin page fail several time wait around 30 second then we could search again the time be not specific 2 use api fail 2 time with different error how to reproduce 1 the 1st approach use admin ui login to keycloak admin as admin user change to a realm that have client exist choose specific client that have offline session search offline session 2 the 2nd approach use api auth admin realm realm name client client uuid offline session first 0 max 5 login as admin use api to search offline session with the client have offline session anything else I do try to call api to search 1 by 1 there be no error but the error occur when I search more than 2 when you could search without error need to restart keycloak to reproduce here be the error log keycloak 15 0 2 offline session txt |
keycloakkeycloak | ue review update of oidc client creation | Enhancement | describe the bug hi edewit there be some update about the oidc client creation process please check the design link 1 the direct access grant should be off by default 2 there be 3 step in the oidc client creation process thank version new console ui expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | quarkus version | Enhancement | description I be work on a custom spi relate to jpa I run into a problem while deploy this spi in keycloak x due to the quarkus version old version of quarkus do not support mapping file in persistence xml and orm xml I see that you have update the quarkus version in keycloak version 16 could you please update it in the current keycloak version 15 0 2 as well discussion no response motivation no response detail no response |
keycloakkeycloak | keycloak adapter for wildfly eap doesn t report inaccessible key in keystore and throw nullpointerexception instead | Bug | describe the bug with follow configuration xml when password be wrong password or alia be not find in the keystore adapter throw follow exception 09 07 53 949 error io undertow request default task 1 ut005023 exception handle request to vanilla profile jsp java lang runtimeexception could not create authentication request at 00002 org keycloak adapter saml abstractinitiatelogin challenge abstractinitiatelogin java 64 at 00002 org keycloak adapter saml undertow abstractsamlauthmech sendchallenge abstractsamlauthmech java 65 at redhat 00001 io undertow security impl securitycontextimpl challengesender transition securitycontextimpl java 301 at redhat 00001 io undertow security impl securitycontextimpl challengesender transition securitycontextimpl java 319 at redhat 00001 io undertow security impl securitycontextimpl challengesender access 300 securitycontextimpl java 284 at redhat 00001 io undertow security impl securitycontextimpl sendchallenge securitycontextimpl java 130 at redhat 00001 io undertow security impl securitycontextimpl authtransition securitycontextimpl java 102 at redhat 00001 io undertow security impl securitycontextimpl authtransition securitycontextimpl java 107 at redhat 00001 io undertow security impl securitycontextimpl authenticate securitycontextimpl java 92 at redhat 00001 io undertow servlet handler security servletauthenticationcallhandler handlerequest servletauthenticationcallhandler java 55 at redhat 00001 io undertow server handler disablecachehandler handlerequest disablecachehandler java 33 at redhat 00001 io undertow server handler predicatehandler handlerequ predicatehandler java 43 at redhat 00001 io undertow security handler authenticationconstrainthandler handlerequest authenticationconstrainthandler java 53 at redhat 00001 io undertow security handler abstractconfidentialityhandler handlerequest abstractconfidentialityhandler java 46 at redhat 00001 io undertow servlet handler security servletconfidentialityconstrainthandler handlerequ servletconfidentialityconstrainthandler java 64 at redhat 00001 io undertow servlet handler security servletsecurityconstrainthandler handlerequest servletsecurityconstrainthandler java 59 at redhat 00001 io undertow security handler authenticationmechanismshandler handlerequest authenticationmechanismshandler java 60 at redhat 00001 io undertow servlet handler security cachedauthenticatedsessionhandler handlerequ cachedauthenticatedsessionhandler java 77 at redhat 00001 io undertow security handler notificationreceiverhandler handlerequ notificationreceiverhandler java 50 at redhat 00001 io undertow security handler abstractsecuritycontextassociationhandler handlerequest abstractsecuritycontextassociationhandler java 43 at redhat 00001 io undertow server handler predicatehandler handlerequ predicatehandler java 43 at redhat 00002 org wildfly extension undertow security jacc jacccontextidhandler handlerequest jacccontextidhandler java 61 at redhat 00001 io undertow server handler predicatehandler handlerequ predicatehandler java 43 at redhat 00002 org wildfly extension undertow deployment globalrequestcontrollerhandler handlerequ globalrequestcontrollerhandler java 68 at redhat 00001 io undertow servlet handler senderrorpagehandler handlerequest senderrorpagehandler java 52 at redhat 00001 io undertow server handler predicatehandler handlerequ predicatehandler java 43 at redhat 00001 io undertow server handler metricshandler handlerequest metricshandler java 64 at redhat 00001 io undertow servlet core metricschainhandler handlerequ metricschainhandl java 59 at redhat 00001 io undertow servlet handler servletinitialhandler handlefirstrequest servletinitialhandler java 280 at redhat 00001 io undertow servlet handler servletinitialhandler access 100 servletinitialhandler java 79 at redhat 00001 io undertow servlet handler servletinitialhandler 2 call servletinitialhandler java 134 at redhat 00001 io undertow servlet handler servletinitialhandler 2 call servletinitialhandler java 131 at redhat 00001 io undertow servlet core servletrequestcontextthreadsetupaction 1 call servletrequestcontextthreadsetupaction java 48 at redhat 00001 io undertow servlet core contextclassloadersetupaction 1 call contextclassloadersetupaction java 43 at redhat 00002 org wildfly extension undertow security securitycontextthreadsetupaction lambda create 0 securitycontextthreadsetupaction java 105 at redhat 00002 org wildfly extension undertow deployment undertowdeploymentinfoservice undertowthreadsetupaction lambda create 0 undertowdeploymentinfoservice java 1530 at redhat 00002 org wildfly extension undertow deployment undertowdeploymentinfoservice undertowthreadsetupaction lambda create 0 undertowdeploymentinfoservice java 1530 at redhat 00002 org wildfly extension undertow deployment undertowdeploymentinfoservice undertowthreadsetupaction lambda create 0 undertowdeploymentinfoservice java 1530 at redhat 00002 org wildfly extension undertow deployment undertowdeploymentinfoservice undertowthreadsetupaction lambda create 0 undertowdeploymentinfoservice java 1530 at redhat 00001 io undertow servlet handler servletinitialhandler dispatchrequest servletinitialhandler java 260 at redhat 00001 io undertow servlet handler servletinitialhandler access 000 servletinitialhandler java 79 at redhat 00001 io undertow servlet handler servletinitialhandler 1 handlerequest servletinitialhandler java 100 at redhat 00001 io undertow server connector executeroothandler connector java 387 at redhat 00001 io undertow server httpserverexchange 1 run httpserverexchange java 852 at redhat 00001 org jboss thread contextclassloadersavingrunnable run contextclassloadersavingrunnable java 35 at redhat 00001 org jboss thread enhancedqueueexecutor saferun enhancedqueueexecutor java 1990 at redhat 00001 org jboss thread enhancedqueueexecutor threadbody doruntask enhancedqueueexecutor java 1486 at redhat 00001 org jboss thread enhancedqueueexecutor threadbody run enhancedqueueexecutor java 1377 at redhat 00001 org xnio xnioworker workerthreadfactory 1 1 run xnioworker java 1280 at java base java lang thread run thread java 829 cause by java lang nullpointerexception signingkey can not be null at java xml crypto javax xml crypto dsig dom domsigncontext domsigncontext java 100 at 00002 org keycloak saml process core util xmlsignatureutil sign xmlsignatureutil java 412 at 00002 org keycloak saml process api saml v2 sig saml2signature sign saml2signature java 142 at 00002 org keycloak saml process api saml v2 sig saml2signature signsamldocument saml2signature java 159 at 00002 org keycloak saml basesaml2bindingbuilder signdocument basesaml2bindingbuilder java 277 at 00002 org keycloak saml basesaml2bindingbuilder basepostbindingbuilder basesaml2bindingbuilder java 154 at 00002 org keycloak saml basesaml2bindingbuilder postbinde basesaml2bindingbuilder java 219 at 00002 org keycloak adapter saml samlutil sendsaml samlutil java 45 at 00002 org keycloak adapter saml profile abstractsamlauthenticationhandler 3 sendauthnrequ abstractsamlauthenticationhandler java 622 at 00002 org keycloak adapter saml abstractinitiatelogin challenge abstractinitiatelogin java 61 49 more version red hat sso 7 4 9 expect behavior underlying issue be not ignore and message that alia can not be retrieve from the keystore be print actual behavior npe be throw this npe doesn t describe the root cause only outcome the real root cause be inability to retrieve alia from the keystore and this fact stay hide from the user how to reproduce use java kesytore in adapter configuration xml set password to wrong valueor alias to one that can not be find in the keystore and make a saml request with adapter configure like this anything else no response |
keycloakkeycloak | generate delegate use wrong class | Bug | describe the bug these two line l557 l558 result in the follow generate code for client java private final org keycloak model map common delegate delegateprovider delegateprovider public mapcliententitydelegate org keycloak model map common delegate delegateprovider delegateprovider this delegateprovider delegateprovider however we want the delegateprovider to provide mapcliententity not another mapcliententitydelegate I think it should be the follow java private final org keycloak model map common delegate delegateprovider delegateprovider public mapcliententitydelegate org keycloak model map common delegate delegateprovider delegateprovider this delegateprovider delegateprovider version 15 0 2 expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | perform an external to internal token exchange with an i d token with provider mapper enable result in unknown error | Bug | describe the bug use azure ad as an example idp take an azure i d token and perform ext to int token exchange with any provider mapper enable result in the below exception delete the mapper result in the kc token be return as expect 13 58 37 336 error org keycloak service error keycloakerrorhandler default task 20 uncaught server error java lang classcastexception class java lang string can not be cast to class org keycloak representation jsonwebtoken java lang string be in module java base of loader bootstrap org keycloak representation jsonwebtoken be in unnamed module of loader 1ef5fc40 at org keycloak broker oidc mappers abstractclaimmapper getclaimvalue abstractclaimmapper java 82 at org keycloak broker oidc mappers abstractclaimmapper getclaimvalue abstractclaimmapper java 69 at org keycloak broker oidc mappers userattributemapper preprocessfederatedidentity userattributemapper java 113 at org keycloak protocol oidc defaulttokenexchangeprovider importuserfromexternalidentity defaulttokenexchangeprovider java 479 at org keycloak protocol oidc defaulttokenexchangeprovider exchangeexternaltoken defaulttokenexchangeprovider java 451 at org keycloak protocol oidc defaulttokenexchangeprovider tokenexchange defaulttokenexchangeprovider java 157 at org keycloak protocol oidc defaulttokenexchangeprovider exchange defaulttokenexchangeprovider java 123 at org keycloak protocol oidc endpoint tokenendpoint tokenexchange tokenendpoint java 832 at org keycloak protocol oidc endpoint tokenendpoint processgrantrequest tokenendpoint java 206 at jdk internal reflect generatedmethodaccessor724 invoke unknown source at java base jdk internal reflect delegatingmethodaccessorimpl invoke delegatingmethodaccessorimpl java 43 at java base java lang reflect method invoke method java 566 at org jboss resteasy core methodinjectorimpl invoke methodinjectorimpl java 138 at org jboss resteasy core resourcemethodinvoker internalinvokeontarget resourcemethodinvoker java 546 at org jboss resteasy core resourcemethodinvoker invokeontargetafterfilter resourcemethodinvoker java 435 at org jboss resteasy core resourcemethodinvoker lambda invokeontarget 0 resourcemethodinvoker java 396 at org jboss resteasy core interception prematchcontainerrequestcontext filter prematchcontainerrequestcontext java 358 at org jboss resteasy core resourcemethodinvoker invokeontarget resourcemethodinvoker java 398 at org jboss resteasy core resourcemethodinvoker invoke resourcemethodinvoker java 365 at org jboss resteasy core resourcelocatorinvoker invokeontargetobject resourcelocatorinvoker java 150 at org jboss resteasy core resourcelocatorinvoker invoke resourcelocatorinvoker java 110 at org jboss resteasy core resourcelocatorinvoker invokeontargetobject resourcelocatorinvoker java 141 at org jboss resteasy core resourcelocatorinvoker invoke resourcelocatorinvoker java 104 at org jboss resteasy core synchronousdispatcher invoke synchronousdispatcher java 440 at org jboss resteasy core synchronousdispatcher lambda invoke 4 synchronousdispatcher java 229 at org jboss resteasy core synchronousdispatcher lambda preprocess 0 synchronousdispatcher java 135 at org jboss resteasy core interception prematchcontainerrequestcontext filter prematchcontainerrequestcontext java 358 at org jboss resteasy core synchronousdispatcher preprocess synchronousdispatcher java 138 at org jboss resteasy core synchronousdispatcher invoke synchronousdispatcher java 215 at org jboss resteasy plugin server servlet servletcontainerdispatcher service servletcontainerdispatcher java 245 at org jboss resteasy plugin server servlet httpservletdispatcher service httpservletdispatcher java 61 at org jboss resteasy plugin server servlet httpservletdispatcher service httpservletdispatcher java 56 at javax servlet http httpservlet service httpservlet java 590 at io undertow servlet handler servlethandler handlerequ servlethandler java 74 at io undertow servlet handler filterhandler filterchainimpl dofilter filterhandler java 129 at org keycloak provider wildfly wildflyrequestfilter lambda dofilter 0 wildflyrequestfilter java 41 at org keycloak service filter abstractrequestfilter filter abstractrequestfilter java 43 at org keycloak provider wildfly wildflyrequestfilter dofilter wildflyrequestfilter java 39 at io undertow servlet core managedfilter dofilter managedfilter java 61 at io undertow servlet handler filterhandler filterchainimpl dofilter filterhandler java 131 at io undertow servlet handler filterhandler handlerequest filterhandler java 84 at io undertow servlet handler security servletsecurityrolehandler handlerequest servletsecurityrolehandler java 62 at io undertow servlet handler servletchain 1 handlerequ servletchain java 68 at io undertow servlet handler servletdispatchinghandler handlerequest servletdispatchinghandler java 36 at org wildfly extension undertow security securitycontextassociationhandler handlerequest securitycontextassociationhandler java 78 at io undertow server handler predicatehandler handlerequ predicatehandler java 43 at io undertow servlet handler redirectdirhandler handlerequest redirectdirhandler java 68 at io undertow servlet handler security sslinformationassociationhandler handlerequest sslinformationassociationhandler java 117 at io undertow servlet handler security servletauthenticationcallhandler handlerequest servletauthenticationcallhandler java 57 at io undertow server handler predicatehandler handlerequ predicatehandler java 43 at io undertow security handler abstractconfidentialityhandler handlerequest abstractconfidentialityhandler java 46 at io undertow servlet handler security servletconfidentialityconstrainthandler handlerequ servletconfidentialityconstrainthandler java 64 at io undertow security handler authenticationmechanismshandler handlerequest authenticationmechanismshandler java 60 at io undertow servlet handler security cachedauthenticatedsessionhandler handlerequ cachedauthenticatedsessionhandler java 77 at io undertow security handler notificationreceiverhandler handlerequ notificationreceiverhandler java 50 at io undertow security handler abstractsecuritycontextassociationhandler handlerequest abstractsecuritycontextassociationhandler java 43 at io undertow server handler predicatehandler handlerequ predicatehandler java 43 at org wildfly extension undertow security jacc jacccontextidhandler handlerequest jacccontextidhandler java 61 at io undertow server handler predicatehandler handlerequ predicatehandler java 43 at org wildfly extension undertow deployment globalrequestcontrollerhandler handlerequ globalrequestcontrollerhandler java 68 at io undertow servlet handler senderrorpagehandler handlerequest senderrorpagehandler java 52 at io undertow server handler predicatehandler handlerequ predicatehandler java 43 at io undertow servlet handler servletinitialhandler handlefirstrequest servletinitialhandler java 269 at io undertow servlet handler servletinitialhandler access 100 servletinitialhandler java 78 at io undertow servlet handler servletinitialhandler 2 call servletinitialhandler java 133 at io undertow servlet handler servletinitialhandler 2 call servletinitialhandler java 130 at io undertow servlet core servletrequestcontextthreadsetupaction 1 call servletrequestcontextthreadsetupaction java 48 at io undertow servlet core contextclassloadersetupaction 1 call contextclassloadersetupaction java 43 at org wildfly extension undertow security securitycontextthreadsetupaction lambda create 0 securitycontextthreadsetupaction java 105 at org wildfly extension undertow deployment undertowdeploymentinfoservice undertowthreadsetupaction lambda create 0 undertowdeploymentinfoservice java 1530 at org wildfly extension undertow deployment undertowdeploymentinfoservice undertowthreadsetupaction lambda create 0 undertowdeploymentinfoservice java 1530 at org wildfly extension undertow deployment undertowdeploymentinfoservice undertowthreadsetupaction lambda create 0 undertowdeploymentinfoservice java 1530 at org wildfly extension undertow deployment undertowdeploymentinfoservice undertowthreadsetupaction lambda create 0 undertowdeploymentinfoservice java 1530 at io undertow servlet handler servletinitialhandler dispatchrequest servletinitialhandler java 249 at io undertow servlet handler servletinitialhandler access 000 servletinitialhandler java 78 at io undertow servlet handler servletinitialhandler 1 handlerequest servletinitialhandler java 99 at io undertow server connector executeroothandler connector java 387 at io undertow server httpserverexchange 1 run httpserverexchange java 841 at org jboss thread contextclassloadersavingrunnable run contextclassloadersavingrunnable java 35 at org jboss thread enhancedqueueexecutor saferun enhancedqueueexecutor java 1990 at org jboss thread enhancedqueueexecutor threadbody doruntask enhancedqueueexecutor java 1486 at org jboss thread enhancedqueueexecutor threadbody run enhancedqueueexecutor java 1377 at org xnio xnioworker workerthreadfactory 1 1 run xnioworker java 1280 at java base java lang thread run thread java 829 version 15 0 2 expect behavior the token should be return as expect and mapper should apply as normal actual behavior the request fail with unknown error the above exception and mapper do not apply how to reproduce 1 enable aad as an idp 2 retrieve an aad i d token however you like I use postman s build in token retrieval 3 send a token exchange request post client i d grant type urn ietf param oauth grant type token exchange subject token subject issuer subject token type urn ietf param oauth token type i d token anything else no response |
keycloakkeycloak | ux review add two new part in client scope evaluate page | Bug | describe the bug hi edewit compare to the old console there be 2 new part in the client scope evaluate page name generate i d token and generate user info they be both code block we can use the pf4 s component name code block here be the component link basic but I be not sure if we can remove the icon and just leave the code area could you please add these 2 new part and check the pf4 s component thank version new admin ui expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | ux review saml client setting update | Bug | describe the bug hi edewit I find there be some difference between the new ui and the current console could you please check the design below and update the current implementation here be the design link thank version new admin ui expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | ux review some fine tuning of user event config | Bug | describe the bug hi edewit there be some fine tuning of user event setting in the realm setting page please check they thank 1 we can get rid of the title the same thing happen to the admin event setting page 2 if user turn on the save event but don t save the change the save type table below will not appear 3 we can change delete to remove in the kebab menu version new admin ui expect behavior no response actual behavior no response how to reproduce no response anything else no response |
keycloakkeycloak | it d be nice to be able to set the override user initiate action lifespan value over the api | Enhancement | description I d like to be able to set the realm setting token override user initiate action lifespan value over the api discussion no response motivation it d be nice to be able to manage these value from terraform and if I understand correctly keycloak do not provide an api endpoint to do this detail no response |
keycloakkeycloak | multi arch container image for quarkus distribution amd64 arm64 | Enhancement | description copy from jira issue the current keycloak docker image doesn t contain an arm64 build in the manifest but the base image use be build for arm64 discussion motivation this be become more important now we have the apple m1 chipset and also give that cloud provider be also provide arm base host option would be great if you can start push an arm64 build so user like I don t need to build it themselves detail no response |
keycloakkeycloak | update security policy | Enhancement | description the security policy need to be update to reflect that jira should no long be use to report security vulnerability discussion no response motivation no response detail no response |
keycloakkeycloak | official support for microsoft mobile authenticator app | Enhancement | description I just test mobile authenticator app from microsoft with totp and keycloak and it seem work fine without any change the link to the product be as google authentificator be already part of the official documentation I guess it s helpful to add another product to documentation so everybody can choose which company have more trust for the totp application discussion no response motivation no response detail no response |
keycloakkeycloak | keycloak 19798 hostname support for dist x | Enhancement | null |
keycloakkeycloak | replace deprecate hamcrest all dependency | Enhancement | description we use deprecate hamcrest all dependency in our testsuite and it d be great to replace it with official support dependency I ve encounter some issue with that when I be develop new test discussion no response motivation no response detail no response |
keycloakkeycloak | convert maproleentity to interface | Enhancement | description convert mapgroupentity to interface discussion no response motivation no response detail no response |
keycloakkeycloak | convert mapgroupentity to interface | Enhancement | description convert mapgroupentity to interface discussion no response motivation no response detail no response |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.