repository
stringclasses
156 values
issue title
stringlengths
1
1.01k
labels
stringclasses
8 values
body
stringlengths
1
270k
keycloakkeycloak
keep pre release version of admin client up to date
Enhancement
after we move to use pre release version of the admin client as explain in keycloak keycloak 18686 we need as way to keep it up to date since our dependency be lock in package lock json npm will not install the late prerelease tag but rather the locked version that be present in the lockfile which be reference use a checksum this mean that we need a github action or a dependabot configuration to keep this dependency up to date also in the lockfile by mean of a commit on master preferably this would happen the very moment a new version of the admin client be publish so that we be always as up to date as possible
keycloakkeycloak
use pre release version of admin client
Enhancement
it have be decide to deprecate all of the admin client package except the one publish under keycloak keycloak admin client since this package use the keycloak release cycle and release script it be not possible to release new feature without also release a new version of keycloak this pose a problem for the development of the admin console as we need change from the admin client from time to time in between release to mitigate this problem we have decide to publish a pre release version of the admin client on every commit on master more info here this pre release version can be use during development and will be replace with the production version when run a release of the admin console
keycloakkeycloak
identity provider should use usefetch instead of useeffect
Enhancement
both the oidc and saml provider use the useeffect hook but we be try to standardize on usefetch within the keycloak admin console ui
keycloakkeycloak
update the discovery endpoint field
Enhancement
accord to the usability testing some user feel confuse with the discovery endpoint field in the keycloak oidc and sometimes may not understand it well to improve the user experience in the keycloak oidc user be only require to fill in hostname and realm name and then the discovery endpoint will be import automatically image
keycloakkeycloak
update the layout of field name and the correspond mark in the admin console
Bug
hi in the current console the layout of field name and the correspond mark be not consistent like follow image image image for well visual communication it would well to make the field name asterisk question make and field toggle center align maybe the field name should have a fix width to make sure that all component can be in the same line image image
keycloakkeycloak
ux review update the client setting form
Bug
hi edewit there be some update of the client setting form please check they 1 accord the new requirement we need to exchange the order of capability config and general setting like the picture below 2 there be new group name logout setting below the login setting that include some new setting than before please check the screenshot below 3 please update the jump to section accord to the update above
keycloakkeycloak
keycloak 17866 upgrade to quarkus v2
Enhancement
in summary update quarkus to v2 change maven setting to automatically include quarkus module into the reactor when jdk be set to 11 only for community change gha workflow to build and run on jdk 11 only for quarkus relate test improvement to dev mode to leverage quarkus dev console as a start point for improve devx two test be mark as ignore because due to instability when run on gha all ignore test for quarkus be go to be address by the failure be usually point to a single test method on each class and all relate to user profile need further investigation
keycloakkeycloak
incorrect warning message
Bug
this can be do post 1 0 go to client service account role choose a role and click unassign you will get a warning about remove mapping which say be you sure you want to remove this mapping it should say role or service account role instead of mapping
keycloakkeycloak
import client doesn t go to client setting
Bug
can be fix post 1 0 after you import a client and hit save it take you to a blank screen it should go to the setting page for the client you just import
keycloakkeycloak
when on a other realm do a reload will load the datum from master
Bug
the path be use to set the realm when do a reload but the datum be already load use master before
keycloakkeycloak
keycloak 18940 add support for search composite role
Enhancement
null
keycloakkeycloak
ux review the connection pool in the user fed need update
Enhancement
location user fed add ldap provider 1 the default value of the connection pooling should be on the current implementation be off 2 when it s on a bunch of configuration should appear the current implementation doesn t include this part image
keycloakkeycloak
verify that all route be use the correct access
Enhancement
when we start out with the routing mechanism it be not possible to add multiple access value to the route we need to ensure that all route be properly protect by verifying that all route have the correct access attribute to they
keycloakkeycloak
implement ability to rename a realm
Enhancement
in the old admin console it s possible to rename the realm however in our version this field have be explicitly disabled
keycloakkeycloak
keycloak 18727 improve user search query
Enhancement
the purpose of this pr be to improve the performance of the user search specifically when you search for a user in the ui since customer be face bad performance on system with a large amount of user the implementation be follow a suggestion from hmlnarik you can find the full discussion here tl dr you can now search for a user in 3 different way 1 prefix e g foo or foo new default 2 exact e g foo 3 infix e g foo old default however we would like to make the following remark and like to hear your feedback 1 change the default behavior of the user search endpoint be technically break the api one might also consider make a new endpoint and let the ui use it instead 2 for consistency we also change the user count if a search string be part of the input to work similarly to the user search 3 we only adjust the jpauserprovider and mapuserprovid because we want to hear your feedback on whether it be also necessary to adjust the ldapstorageprovider 4 while adjust the jpauserprovider and mapuserprovid we decide that it would be consistent to unify their query this mean the jpauserprovider now search for the search string on both the first name and last name column separately instead of concatenate they with coalesc also the search string get split on both provider now
keycloakkeycloak
keycloak 17866 upgrade to quarkus v2
Enhancement
depend on
keycloakkeycloak
keycloak 18680 always close result stream
Bug
null
keycloakkeycloak
keycloak 18922 ignore empty value for internal attribute not set to user
Bug
basically ignore empty null value when validate internal and read only attribute like ldap i d the administration console send an empty string even though the attribute be not set to user
keycloakkeycloak
keycloak 18875 minor improvement to attribute group ui
Bug
null
keycloakkeycloak
keycloak 18903 more customizable oidc wellknown provider
Enhancement
null
keycloakkeycloak
keycloak 18901 test for update clientnotificationendpoint to http u
Enhancement
rl should fail
keycloakkeycloak
keycloak 18875 ui for manage group of attribute
Enhancement
pedroigor velia follow up to the admin ui part
keycloakkeycloak
keycloak 18845 remove key type in map storage
Enhancement
this pr be to simplify mapstorage interface by remove the key type from the generic as it should be an implementation detail specifically see model map src main java org keycloak model map storage mapstorage java diff 91ca21d5c074b826e13ccf8efc1fd50ec91d2ce30c40a77ff463cd2e16d76f7b
keycloakkeycloak
keycloak 18842 convert subquery to join
Bug
in order to prevent bad performance on database that can not optimize subquerie in delete transform the deleteexpiredclientsession statement also have to use sql because jpa do not allow join in delete
keycloakkeycloak
keycloak 18815 update mapkeycloaktransaction return type to match mapstorage
Enhancement
null
keycloakkeycloak
keycloak 18805 update portuguese brazil translation
Bug
fix oauthgranttitle typo error
keycloakkeycloak
keycloak 18747 turn mapcliententity into interface introduce delegate
Enhancement
give that the map entity be turn into an interface it make more sense to use non primitive type to allow for null value this enable signalize that an entity do not define a particular value and build a base for definition of instance with default if a value be not present in the query instance I e be null the value would be obtain from a delegate contain the default
keycloakkeycloak
url of key provider
Bug
realm setting key povider should produce a bookmarkable url such as master realm setting key provider
keycloakkeycloak
keycloak 18695 support user lookup by i d with novell edirectory
Bug
the ldapoperationmanager do not encode guid correctly when look up federate user from novell edirectory the correct encoding can be find at see also keycloak 9841 7834 keycloak 10942 6251
keycloakkeycloak
update react hook form v7
Enhancement
more information can be find in the migration guide this be quite a large update as the api surface have change significantly
keycloakkeycloak
keycloak 18051 add regex redirect uri client policy
Enhancement
documentation pr
keycloakkeycloak
keycloak 18635 move class specific to concurrenthashmap to chm package
Enhancement
null
keycloakkeycloak
upgrade to react 17
Enhancement
react 17 be out and it s be a while so it would be good if we can get this update blocker enzyme do not yet support react 17 see
keycloakkeycloak
upgrade to snowpack 3
Enhancement
snowpack 3 have be out for some time now and we need to keep up
keycloakkeycloak
keycloak 18552 grouping of attribute in user profile step 1
Enhancement
group attribute in user profile dialog show group header and an optional description attribute be group by add the annotation group with the group name as value group header and optional description be configure via realm localization use the key userprofile attributegroup header and userprofile attributegroup description see also keycloak 18552
keycloakkeycloak
keycloak 18518 add expiration lifespan configuration to every distrib
Bug
uted and replicate cache
keycloakkeycloak
keycloak 18427 allow switching to declarative provider
Enhancement
keycloakkeycloak
keycloak 18414 simplify mapstorage interface
Enhancement
null
keycloakkeycloak
keycloak 18467 support unicode for realm localization text
Enhancement
this pr add unicode support for realm localization text see keycloak 18467 it change the datatype of the database column realm localization text to nclob instead of clob add the hibernate nationalize annotation to the corresponding java entity field relate documentation pr
keycloakkeycloak
keycloak 18447 dynamically select attribute base on request scope
Enhancement
pedroigor here be it include test in verifyprofilet btw I have to move legacy require definition for firstname and lastname attribute from abstract base provider to legacy provider as they be use when configure selector return false I think this be well approach than try to remove they in declarative provider there be not even any support for removal in the spi as they be really only legacy definition for legacy provider
keycloakkeycloak
keycloak 18410 unable to load protocol org jgroup aws s3 native s3 ping when use default jgroup ec2 xml
Enhancement
jira ticket add native s3 ping to pom xml then we could configure ha with s3
keycloakkeycloak
keycloak 17799 add cor header to json error response
Enhancement
this pr add cor header to json error response the source of which be keycloakerrorhandler exception mapper this will improve error handling within javascript adapter and other 3rd party js code when perform cross origin xhr request to auth server without this header cross origin xhr can t access to actual error response http status and json body use cor header will limit cross origin xhr request only to request without credential some note about provide test case to properly simulate cross origin xhr request testsuite should be run with enabled browser security also auth server host and auth server host2 parameter should be configure to two different from default localhost origin this can be do use nip io otherwise this test case will be skip run test with default phantomjs browser mvn nsu s maven setting xml f testsuite integration arquillian test base pom xml clean install dt corserrorresponset pauth server wildfly dkeycloak phantomjs cli args ignore ssl error true web security true dauth server host 127 0 0 1 nip io dauth server host2 7f000001 nip io or use firefox browser mvn nsu s maven setting xml f testsuite integration arquillian test base pom xml clean install dt corserrorresponset pauth server wildfly djs browser firefox dfirefoxheadless true dwebdriver gecko driver home local bin geckodriver dauth server host 127 0 0 1 nip io dauth server host2 7f000001 nip io
keycloakkeycloak
keycloak 18117 unhandled exception not release worker thread
Bug
null
keycloakkeycloak
keycloak 18390 groupprovider search implementation of jpa and map del
Bug
group search behave differently between jpa and map implementation with the change the root node be deliver by the map impl the same way as it be do on jpa impl
keycloakkeycloak
keycloak 18369 create mapkeycloaktransaction interface
Enhancement
null
keycloakkeycloak
keycloak 18359 default role migration be not perform correctly when empty realm i d
Bug
keycloakkeycloak
keycloak 18368 invalidate client session after refresh token re use
Bug
null
keycloakkeycloak
inconsistency when add additional support locale to a realm
Bug
address issue raise in
keycloakkeycloak
ux review group child group
Bug
hi edewit please check the comment about child group inside the group tab 1 there be a tab name role mapping 2 if there be no group be select the kebab icon should be disable if user want to delete group there should be a reminder for user as show in the screenshot below 3 there be a checkbox to help user select all group
keycloakkeycloak
keycloak 16811 add executor for disable full scope allow and add
Enhancement
it to fapi profile
keycloakkeycloak
keycloak 18069 migration of client policy json from keycloak 13
Bug
null
keycloakkeycloak
doc add readme file for npm publishing
Enhancement
I can not find how pom be publish to npm bower repo be archive put readme file and look for help on how to make it part of the npm publish process for context see
keycloakkeycloak
keycloak 18073 avoid modelduplicateexception during parallel starup o
Bug
f server
keycloakkeycloak
keycloak 2045 simple validation spi for userprofile spi
Enhancement
keycloak 2045 simple validation spi this pr be follow up of the original pr 7887 by thomasdarimont it be refine to work for userprofile spi main change against the original pr default format validator like email length pattern etc improve to work on list of string as userprofile attribute be list of string add reusable abstract base class to make implementation for this kind of validator easy improve handling of null value in default validator treat as valid value now to allow format validation for optional attribute in userprofile improve validation of configuration for some default validator add validator for integer and double number which also allow to validate configure min and max value change package for default validator agree with pedroigor add error message for error produce by default validator into base login theme resource remove unnecessary change to keycloak basic class like keycloaksession
keycloakkeycloak
keycloak 18113 refactor some executor condition provider id
Enhancement
null
keycloakkeycloak
keycloak 17267 add index to user attribute name and value to support
Bug
user sync from ldap the change in model test be need because we have some file like requireprovider java or keycloakmodelparameter java double in both test and main source I remove they from the test source directory and update the main one to the late change
keycloakkeycloak
keycloak 18086 cluster stack set not work
Bug
null
keycloakkeycloak
keycloak 11019 initial support for lazy offline user session loading
Enhancement
this pr include 7722 rebase to current master add model test
keycloakkeycloak
keycloak 17348 add manual pagination into userstoragemanager query
Bug
null
keycloakkeycloak
keycloak 18074 ignore server version for mysql in changeloghistoryservice
Bug
null
keycloakkeycloak
keycloak 17864 improve theme support
Enhancement
null
keycloakkeycloak
keycloak 18039 optimise offline session load on startup
Bug
update and replace 7902
keycloakkeycloak
keycloak 17947 propagate security domain to ejb
Enhancement
same fix as in just for the offline installer see
keycloakkeycloak
keycloak 17934 fix cache inconsistency when cache limit be exceed
Bug
remove object from cache when their revision be outdate see also discussion on keycloak dev
keycloakkeycloak
keycloak 17774 implement equal method for work cache event
Bug
replace 7981
keycloakkeycloak
keycloak 17208 upgrade quarkus 1 13 3 final
Enhancement
null
keycloakkeycloak
make sure issue from keycloak 17700 be cover
Bug
make sure issue from keycloak 17700 be cover in the new admin console to reproduce in old console 1 log in to keycloak admin console gui 2 navigate to client authorization evaluate section 3 under identity information section client dropdown do not list all the client dropdown only reach 20 value
keycloakkeycloak
keycloak 17874 server can not be start with oracle19crac
Bug
null
keycloakkeycloak
put documentation link in a single file for easy validation
Enhancement
in order to allow user to not have to find the documentation and search it to complete a task in the admin console we add learn more button the design be that when you click learn more the exact relevant section of the documentation appear we need to define the specific screen that have a learn more button we should set up a script to verify the link work
keycloakkeycloak
keycloak 12988 deprecate getuser method from userprovider and userqueryprovider
Bug
close 14018 this pr deprecate all method start with getuser in all user interface these method be use only in a few place that be replace by searchuser variant of method the only difference I find be that search variant of method in current jpa be use getuserbyid at the end of method so that find user be cache and also import validation be do while getuser method didn t do that this be cause some failure in ldap test that be fix in separate commit when approve I will squash
keycloakkeycloak
keycloak 14550 prepare map storage for tree
Enhancement
this pr fix several thing keycloak 17695 split mapstorage provider and provider factory keycloak 17696 make map storage amphibian allow it to be configure both in server config and as a component keycloak 17698 remove awareness of physical key type inside keycloak 17696 commit keycloak 17706 rename abstract entity to map entity inside keycloak 17696 commit keycloak 16127 unify registerentityforchange keycloak 17830 fix realm map entity to frommodel keycloak 17991 introduce preview feature for map storage need to resolve wildfly trigger onevent in map storage even when map storage be not in use the pr could be split into multiple prs at the cost of introduce conflicting change that would require additional conflict resolution
keycloakkeycloak
show instead of hide on scope role toggle
Bug
see the design it say show instead of hide in the current implementation
keycloakkeycloak
keycloak 17820 add default cluster configuration for azure and gcp
Enhancement
jira
keycloakkeycloak
keycloak 17039 local file in a webview fail with origin null
Bug
null
keycloakkeycloak
keycloak 16935 fix liquibase to work with mysql 8 0 23
Bug
null
keycloakkeycloak
keycloak 17794 replace eq ne operator with have value do not have value
Enhancement
null
keycloakkeycloak
keycloak 17615 move database initialization to jpaconnectionproviderfactory
Enhancement
migratemodel keycloaksession be execute conditionally when all realm client and clientscope provider be jpa it s base on assumtion that in map store we can do it without migration of model
keycloakkeycloak
keycloak 17781 make exist and notexist collection aware
Enhancement
null
keycloakkeycloak
keycloak 17503 optimise offline session load on startup
Enhancement
this pr contain optimisation startup time with a large number of offline session the reason that loading of offline session be quite slow be an ineffetive in memory join between offline user session and offline client session the current implementation generate a set of user session i d s from a segment of loaded offline user session and parse this set as a comma seperate string to the query for offline client session my propose implementation instead sort both offline user session and offline client session on user client i d which make a more effective join possible since the lastcreatedon be no long need for segmentation I have remove it primarily in test also the abc use for low possible user session i d have be replace with 00000000 0000 0000 0000 000000000000
keycloakkeycloak
realm role associate role associate role modal search filter by role name
Bug
search filter by role name when paginate extend work on keycloak keycloak ui 460
keycloakkeycloak
keycloak 16633 prevent deletion of internal client
Bug
implement functionality that prevent the deletion of internal client as describe in the jira issue
keycloakkeycloak
keycloak 17208 upgrading to quarkus 1 13 0 final
Enhancement
null
keycloakkeycloak
keycloak 17522 fix bug that keycloak instance not recognize by safari
Bug
keycloak v2 theme report the follow error and get stuck when log into the account console use safari image
keycloakkeycloak
keycloak 17442 upgrade to quarkus 1 12 2
Enhancement
null
keycloakkeycloak
keycloak 17000 add server tmp directory inside the auth server hom
Bug
e directory
keycloakkeycloak
keycloak 17409 support for amphibian both component and standalone provider
Enhancement
null
keycloakkeycloak
keycloak 14248 keycloak should throw an error when attempt to register user to ldap with empty rdn attribute
Bug
if be mandatory in ldap be on in a user attribute ldap mapper of rdn attribute an invalid ldap entry of dn cn 20 dc be create this pr add 0 length checking and white space s checking of rdn value so that kc do not create an invalid ldap entry
keycloakkeycloak
keycloak 17377 fix invalidation cluster test
Bug
null
keycloakkeycloak
keycloak 17263 add exact searching by e mail first name and last
Enhancement
add exact searching by e mail first name and last name in admin rest api client
keycloakkeycloak
keycloak 17316 fix bouncy castle dependency vulnerability cve 2020 28052
Bug
keycloakkeycloak
keycloak 17215 slowness issue while hit auth admin realm realm client viewableonly true after delete a role
Bug
fix for the idea be avoid the eviction of all the client in the realm when a role be delete I have test this and I think it be ok 1 all the relate client should be correctly evict from the cache as it be do inside the hasrolepredicate l219 2 the delete be do at database level use a query as it s do now for composite role 3 the scope mapping table have an index l210 on the role i d column so this should be fast this way only the return client of the predicate be evict and the subsequent search just reload the one that really have the role in the scope and be evict
keycloakkeycloak
keycloak 16898 locale dropdown be break in ie11
Bug
jira keycloak 16898
keycloakkeycloak
keycloak 17074 infinite loop logging as an user or impersonate an user as admin
Bug
fix for issue I have also modify the permissionst that test this it do not work before because the default realm role be not remove from the user in the test so it can access the v2 app perfectly now realm and account role be remove from the user and the loop be avoid
keycloakkeycloak
keycloak 17173 support for script provider in keycloak x
Bug
null
keycloakkeycloak
keycloak 15845
Bug
make sure we address this in the new admin console
keycloakkeycloak
keycloak 15988
Bug
make sure this be address in the new admin console
keycloakkeycloak
keycloak 16710
Bug
make sure this be address in new console
keycloakkeycloak
keycloak 17140
Bug
this pull request fix the issue describe here
keycloakkeycloak
keycloak 16996 user not able to revoke his offline token for directgr
Bug
ant client
keycloakkeycloak
keycloak 16802 improve performance of removed expire session in jpa
Enhancement
usersessionpersisterprovider