repository stringclasses 156 values | issue title stringlengths 1 1.01k ⌀ | labels stringclasses 8 values | body stringlengths 1 270k ⌀ |
|---|---|---|---|
keycloakkeycloak | an ability to replace axio with other axios variant | Enhancement | I m use keycloak admin behind an http proxy non secure and get this error while try to connect to keycloak via https error negotiating ssl on fd 13 error 14090086 ssl routine ssl3 get server certificate certificate verify fail 1 1 0 I find that this be a long running bug on axio and they ve not fix this problem yet most people stumble on this problem move to use other library such as |
keycloakkeycloak | keycloak 16908 refactor usersessionpersisterprovider | Enhancement | null |
keycloakkeycloak | keycloak 16755 clearexpiredusersession optimization rely on infinis | Enhancement | pan expiration rather than keycloak own background task |
keycloakkeycloak | try to save a field too long bring up a 500 error | Bug | step go to client scope go to create client scope or go to an item detail fill any text input with a long text click save expect result the error be handle and the notification to the user show a message warn about the length of the text http response message warn about the error actual result notification message unclear to user could not update client scope error request fail with status code 500 http response message be error unknown error |
keycloakkeycloak | keycloak 16832 use realm name instead of i d | Bug | in order to get localization text |
keycloakkeycloak | keycloak 13633 remove java security acl group usage from tomcat adapter | Bug | this pr supersede 7533 check that for previous discussion this pr merely change a few abstraction around prevent the previous change from break other adapter I introduce the new interface principlefactory that be use on many place where previously genericprinciplefactory be use jbosswebprincipalfactory be not derive from genericprinciplefactory anymore both jbosswebprincipalfactory and genericprinciplefactory implement the new principlefactory interface allow they to be use in the same way as before just behind a different interface this change allow to implement jbosswebprincipalfactory and genericprinciplefactory completely separate from each other genericprinciplefactory now have no more reference to java security acl group instead it directly use its own simplegroup class jbosswebprincipalfactory be unchanged and still use java security acl group since that seem to be require by the system to be adapt |
keycloakkeycloak | keycloak 16803 update german translation | Enhancement | this pr update the german translation for the account email login and new account console |
keycloakkeycloak | keycloak 16801 improve performance of clearexpiredevent background task | Enhancement | null |
keycloakkeycloak | keycloak 16844 create an index to support offline session load | Bug | add the follow index create index idx offline uss preload on offline user session offline flag create on user session i d |
keycloakkeycloak | keycloak 16600 improvement when load many realm | Enhancement | run test use a database populate with the default setting from the keycloak benchmark tool use 1k realm delaying cache for some key property of realm client and client scope mark some key property as lazy for realm client and client scope fetch in batch some key property that usually span multiple query avoid fetch realm and user permission in the whoami endpoint but for a single and the current realm be manage from the admin console avoid query all realm from the admin console whenever possible when query realm from admin console return only the basic information expect result time to migrate should be reduce if compare with the late release migration from a previous database take forever you should be able to migrate in less than 5 minute depend on the database the next step be to run use a production grade db this be not a final solution though but it help a lot time to load the admin console be reduce if compare with the late release the console just doesn t open you should be able to open the admin console in a few second next step the work do to the admin console should pave the road to other improvement to make the console more multi realm friendly we need to resume discussion on how we want to change it so that we avoid list all realm provide way to search for realm etc test use more realm 5k |
keycloakkeycloak | consistency on notification message | Bug | there be a common message could not create x error request fail with status code 409 that include single quote surround the error but when you try to create a realm role with a duplicated i d the error doesn t contain single quote |
keycloakkeycloak | keycloak 16792 pass realm instead of i d to get realm localization text method | Bug | the realm controller within the ui for the security admin console be incorrectly send through the i d of the realm rather than the realm attribute when call the get realm localization text api method on the admin rest api this be cause 404 error in case where there be a realm with an i d that be different to the realm here be the documentation for get realm localization text getrealmlocalizationtext |
keycloakkeycloak | keycloak 16714 use linkexpirationformatter in email when timeperiodunit be define | Enhancement | just modify message lang property to use time unit catch cs de fr sk pt br it |
keycloakkeycloak | keycloak 16693 http 404 for all css on the login page | Bug | remove reference to a nonexistent resource in the login theme |
keycloakkeycloak | keycloak 16648 fix migration to 12 | Bug | null |
keycloakkeycloak | keycloak 16606 add default value to mandatory ldap attribute | Enhancement | the default empty value of do not always meet ldap attribute syntax requierement this be the case for for example posixaccount uidnumber and gidnumber attribute this patch add ability to set default value for attribute |
keycloakkeycloak | keycloak 16605 add localpart username template transformer | Enhancement | add transformer to extract localpart from email this come in handy when use google oidc or any other oidc without human readable uid |
keycloakkeycloak | keycloak 15524 cleanup user relate interface | Enhancement | null |
keycloakkeycloak | keycloak 16567 optimize stackutil class | Enhancement | null |
keycloakkeycloak | keycloak 11908 support for conditional create index base on number | Enhancement | jira ticket how to use change indexcreationthreshold property of connectionsliquibase spi in the configuration file like standalone xml xml define createindex change to the change log file jpa changelog x x x xml xml when migration if the number of record of the specify table be large than indexcreationthreshold createindex change do not run otherwise createindex change run spec the indexcreationthreshold value be common in all table the default indexcreationthreshold value be 10000 if the indexcreationthreshold value be 1 all createindex change run code defaultliquibaseconnectionprovider new field indexcreationthreshold in init method set this value from the indexcreationthreshold property s value in the configuration file in getliquibase method pass indexcreationthreshold to liquibasejpaupdaterprovider and quarkusjpaupdaterprovider via liquibase s changelogparameter liquibasejpaupdaterprovider and quarkusjpaupdaterprovider new validateindexthreshold method if indexcreationthreshold be not define or indexcreationthreshold equal 1 skip verification if there be a change instance of createindexchange in the changeset of unrunchangeset if the target table exist and the number of record of the target table be large than indexcreationthreshold mark the changeset as validationfaile in updatechangeset method call validateindexthreshold method when there be unrunchangeset |
keycloakkeycloak | read the config object when get an authorization permission | Enhancement | be your feature request relate to a problem please describe I want to be able to see which resource scope and policy be connect to a authorization permission with the findonepermission function and or findbyname function this have only be test against keycloak 11 0 3 describe the solution you d like I would like to be able to read the object property list in the config object of an authorization permission to see which resource scope and policy be use with that permission example from the keycloak web gui under athorization export setting I will get the follow information about my permission i d 15a43132 1582 4595 8a21 17ec7090ad69 name view member permission group 5eebfcc6 8195 4fd1 8a5d 238f8f304d7d type scope logic positive decisionstrategy unanimous config resource group resource 5eebfcc6 8195 4fd1 8a5d 238f8f304d7d scope view member view applypolicie test group policy when use the findbyname function I will receive the permission without any object property in the config object i d 15a43132 1582 4595 8a21 17ec7090ad69 name view member permission group 5eebfcc6 8195 4fd1 8a5d 238f8f304d7d type scope logic positive decisionstrategy unanimous config this also go for the findonepermission function but here the config object be not even list i d 15a43132 1582 4595 8a21 17ec7090ad69 name view member permission group 5eebfcc6 8195 4fd1 8a5d 238f8f304d7d type scope logic positive decisionstrategy unanimous describe alternative you ve consider I can not find another way to do it additional context when get a policy with findonepolicy function or findbyname function I will also see object property in the config object i d 741e36f1 b571 46e0 88cc e1d0579b7dd5 name test group policy description group member can only see group member type group logic positive decisionstrategy unanimous config group i d 21bea578 eafd 4795 82e8 dfe9e4e6db49 extendchildren false |
keycloakkeycloak | keycloak 16380 make idp display name available to idp link email subject | Enhancement | null |
keycloakkeycloak | keycloak 16341 make the new stream base method in server spi user | Bug | interface default instead of the collection base version this ensure that provide implementation for the collection base method be enough which preserve backwards compatibility with old custom implementation alternative interface now allow new implementation to focus on the stream variant of the query method |
keycloakkeycloak | keycloak 16322 code formatter for keycloak x | Enhancement | null |
keycloakkeycloak | keycloak 13639 improvement to metric and health status | Bug | some improvement to health check where revert change to the main filter so that it do not perform any additional logic but dispatch the request to a worker thread instal both metric and health endpoint within a specific build step allow run keycloakhealthcheck within the scope of a keycloaksession revert unnecessary change to jtatransactionwrapper and avoid impact the main distribution by run now within the same worker thread health and metric endpoint do not fail anymore due to error from narayana see increase the default timeout for transaction and keep it align with the wildfly dist 300s disable health check from any extension so that we only have our |
keycloakkeycloak | keycloak 16245 update quarkus 1 10 0 cr1 | Enhancement | null |
keycloakkeycloak | keycloak 16126 window support | Bug | change add a kc bat script fix error when deal with file due to wrong file separator main fix kc bat config do not work due to how window handle file lock to workaround the file lock issue on window I have to hack the runtime classloader so that jar file that be re generate when run the config command be close prior to run quarkus re augmentation class from these jar be only use when actually run the application and should be safe to be ignore the workaround should be fix on quarkus by meanwhile we can live with this workaround |
keycloakkeycloak | a few improvement | Enhancement | null |
keycloakkeycloak | update quarkus 1 9 1 final | Enhancement | null |
keycloakkeycloak | keycloak 16066 unable to build keycloak distribution on window due t | Bug | o io quarkus builder buildexception failure add null check in the keycloakprocessor configurehibernate class sign off by peter zaoral mposolda cc stianst pedroigor iankko ptal once you get a chance thank |
keycloakkeycloak | keycloak 15167 retrieve email from twitter idp | Enhancement | I m update this issue keycloak 15167 and open a new pull request close a week ago here |
keycloakkeycloak | keycloak 14255 avoid create cli during startup | Enhancement | null |
keycloakkeycloak | minor change to pom file and fix exception handle | Bug | in addition to minor change to the module dependency it also fix an error on how we be handle initialization exception error may happen when initialize provider and in this case the startupevent be never fire result in exception and their respective message not be show also change the logic to infer the default cluster mode to just rely on the dev profile like other dev option we need to test this and other thing once we start work on more test |
keycloakkeycloak | keycloak 14255 minor fix and improvement | Bug | fix the jdbc url resolution fix cluster test add a cluster stack option for cluster this one be already there when we start the cluster implementation I m just expose it otherwise you would set it via the spi connection infinispan default stack the cluster stack right now map to the default jgroup stack provide by infinispan but we can always provide our own I ve test this with kubernete and with this config you should have a run cluster spec container image pedroigor keycloak x late args auto config http enable true cluster stack kubernete djgroup dns query jgroups dns ping keycloak svc cluster local db postgre db url jdbc postgresql keycloak postgres keycloak db username keycloak db password password the only caveat here be that we need to set the jgroup dns query system property for now I think be ok but in the future we may want to provide well option for such configuration |
keycloakkeycloak | keycloak 11331 mysql support | Enhancement | null |
keycloakkeycloak | keycloak 15987 add support for realm import from url | Enhancement | null |
keycloakkeycloak | keycloak 15940 tomcat saml adapter lib miss dependency | Bug | issue exclude the ha api dependency from the com sun xml ws rt add for saml core the dependency be add by keycloak 11185 compilation issue with jdk 9 but the ha api be not need and it s create some warning in tomcat because it include some class path jar in the manifest mf that then do not exist without the ha api all tomcat test pass without issue and I have not see any saml problem in other client undertow wildfly tomcat with jdk 11 the arquillian tomcat container have also be upgrade to test the tomcat adapter use jdk 11 arq 2191 be require mhajas please review it and or move this to the correct person |
keycloakkeycloak | keycloak 15986 migration get fail through migrate domain cluster cli migrate domain standalone cli when host xml be not present | Enhancement | this pr fix the issue the migration through domain migration cli script get fail if anyone have delete or rename default host xml so to fix this issue I just add host config parameter to embed host controller cli command hence anyone can set the appropriate host configuration file in hostconfig property |
keycloakkeycloak | update to quarkus 1 9 0 final | Enhancement | null |
keycloakkeycloak | keycloak 15911 fix userstoragemanager do not pick up new ldap config | Bug | this pr fix the issue where the ldap configuration be not update when sync period or enable flag be not change |
keycloakkeycloak | keycloak 15910 rename cluster enable to cluster fix configurationtest | Bug | |
keycloakkeycloak | keycloak 15858 finish rename application role to client role in help text | Bug | this commit rename all application role to client role and adapt the sentence around it |
keycloakkeycloak | fix linte error | Good First Issue | also add linte to the github action so it run on every pr |
keycloakkeycloak | update quarkus 1 8 2 final | Enhancement | null |
keycloakkeycloak | keycloak 15592 fix remove keycloak adapter state cookie | Bug | this commit provide a fix for remove keycloak adapter state cookie by use path and domain parameter properly the issue be report here |
keycloakkeycloak | keycloak 15821 extend keycloak boot time | Enhancement | the implementation of suggestion mention in and a test image be available via docker run docker io slaskawi keycloak keycloak15821 |
keycloakkeycloak | keycloak 15830 remove authentication session after fail directgrant | Bug | pedroigor do you have a chance to review this please |
keycloakkeycloak | keycloak 15692 upgrade to wildfly 21 0 1 final | Enhancement | keycloak 15692 upgrade to wildfly 21 0 1 final base fix keycloak 15780 upgrade keycloak to wildfly 21 0 0 beta1 wildfly core 13 0 0 beta6 keycloak 16031 upgrade keycloak to wildfly 21 0 0 final wildfly core 13 0 1 final keycloak 16442 upgrade keycloak to wildfly 21 0 1 final wildfly core 13 0 3 final other dependent fix keycloak 15408 deprecate former wildfly and wildfly core version in arquillian s testsuite pom xml file as part of the upgrade script keycloak 15442 update the version of jboss parent as part of the wildfly upgrade script if necessary keycloak 15474 add verbose and force option to the wildfly upgrade automate script keycloak 15649 update urn jboss domain infinispan 10 0 version as part of the wildfly upgrade automate script keycloak 15652 wildfly upgrade automate script align python artifact version comparsion algorithm with the maven java one sign off by jan lieskovsky this be now ready for review relate prs website change documentation change link to jira file for fail test know not to be cause by this upgrade pr org keycloak testsuite javascript javascriptadaptertest failure keycloak 16434 arq 2209 org keycloak testsuite cluster clientinvalidationclustert crudwithfailover failure keycloak 16435 abstractj hmlnarik mhajas martin kanis mposolda pedroigor pskopek slaskawi stianst vmuzikar vramik ptal once get a chance thank jan |
keycloakkeycloak | keycloak 15807 wrong parsing of cookie header | Bug | null |
keycloakkeycloak | keycloak 14255 more improvement to cli | Enhancement | null |
keycloakkeycloak | interaction design for multi line input | Enhancement | this new component should have input from interaction design to enumerate behavior and keyboard control |
keycloakkeycloak | keycloak 15631 disable clustering for dev profile remove cluster x | Enhancement | pedroigor stianst do you have a chance to review please summary of the change in this pr remove file cluster xml from the distribution server x instead the exist infinispan configuration file from the quarkus runtime module be copy to the server x distribution during build this allow we to remove one of duplicate infinispan configuration file we still have quite a lot of they in whole workspace so still there be a need for many change if you want to update some property in the infinispan config however at least we have one less add version to our 3 quarkus module in the dependencymanagement in the main pom xml afaik this be still good maven practice and it allow to remove some of the version from other pom xml file in the codebase add boolean property cluster enable which map to the cluster property of defaultinfinispanconnectionprovider imo enable or disable clustering can be quite common operation hence I introduce 1st level property of it so people don t need to specify quite a long spi connection infinispan default cluster true pedroigor note configurationtest be fail for I but I have suspicion that it be not regression of my pr if it pass for you in your laptop then please don t merge this pr as it be a chance that fail test be a regression of this pr then |
keycloakkeycloak | keycloak 14255 more improvement to cli | Bug | null |
keycloakkeycloak | tab and enter key for multi line input | Bug | you can t add and remove item on multi line input use keyboard only tab order need to include the plus and minus button so you can go to they with the keyboard and select with enter key |
keycloakkeycloak | keycloak 15635 remove quarkus index dependency property from applic | Enhancement | ation property |
keycloakkeycloak | keycloak 14231 validate support locale | Bug | hmlnarik please can you make a review thank |
keycloakkeycloak | keycloak 14046 allow finegrain group admin to create user in console | Enhancement | enable create button and save button in admin console user view list and detail the flag use to enable those button be compute as follow since there s no computed flag from backend on admin user have fine grain admin permission on at least 1 group exist condition feature finegrain admin be enable access queryuser if the admin user hasn t the correct permission on the right group for the new user he s try to create backend will forbid the creation by return a 403 this change be follow pr 7035 which add the group field in the user creation form |
keycloakkeycloak | keycloak 15546 empty value can be set to valid redirect uris at client | Bug | delete empty element from the array variable of valid redirect uris |
keycloakkeycloak | keycloak 15532 add support for file type field in authenticator config | Enhancement | the template for display the configuration of authenticator do not currently support the input type of file it would be handy to allow file to be upload for the authenticator we be develop rather than paste the content of the file into a text field template theme src main resource theme base admin resource template kc provider config html |
keycloakkeycloak | keycloak 14846 default role processing be really slow | Bug | default role processing be really slow with a large number of client jira keycloak 14846 this approach should decrease time to obtain default role to user before this the static getdefaultrole method in defaultrole class have to iterate over all client instead of use only client with define default role I ve try to test with 1500 client which 150 of they have define at least one default role and protocol mapper I ve create 80 user and average creation time which include default role process the time need for retrieve the role be 40 small than before for long term consideration imo it should be good to provide db indexing for client and role |
keycloakkeycloak | keycloak 11678 remove dummy resource add keycloak service and liquibase to jandex indexing | Enhancement | summary of this pr change remove the dummy jax rs resource which be before use as a workaround to register builtin resteasy provider by default the quarkus use jandex for indexing just the application class and module with the bean xml however when use the property quarkus index dependency as describe in the doc how to generate a jandex index it can be use to register resource inside org keycloak keycloak services module which contain most of keycloak jax rs resource and it be sufficient to enforce resteasy to register all the require build in provider the provider annotation be remove from objectmapperresolver and keycloakerrorhandle as those class be register anyway in the keycloakapplication check that it work on keycloak on undertow wildfly and quarkus without any issue in this pr I ve enable jandex indexing also for the liquibase module this allow to remove workaround in the pom xml with unpack indexing liquibase and then manually read the index in liquibaseprocessor instead we can rely on quarkus with read the index pedroigor stianst wdyt do you eventually prefer to have resteasy and liquibase change in separate prs |
keycloakkeycloak | keycloak 15459 fix serialization of multi subtag locale in admin console s whoami response | Bug | serialize locale as a well form ietf bcp 47 language tag alter test to cover a locale make of more than one subtag |
keycloakkeycloak | keycloak 15298 idp facebook do not get correct name | Bug | fix 15298 |
keycloakkeycloak | keycloak 11494 get user for role composite | Enhancement | previous pr be I reopen since it s need by redhat see the issue the branch be rebase on master I or you can continue the development I m available to help I integrate this pr also you can see the discussion into I merge they because this parent relation be need to find user for role composite the idea be to add an optional and false by default parameter to the exist endpoint role user currently it get only the direct assignation which be useless in a lot of scenario when there be composite role and group have theses role this be a pull request to solve that it also include a checkbox in the user in role view to search in effective role the api always have this new parameter false by default and even the ui so there be no unwanted performance impact but it appear that in a complex group structure with hundred or thousand of child for a group the request can become very slow all improvement and suggestion be welcome |
keycloakkeycloak | keycloak 15238 fix potential resource leak | Bug | fix potential resource leak from not close stream reader |
keycloakkeycloak | keycloak 15139 backwards compatibility for ldap read only mode with I | Bug | mport user enable |
keycloakkeycloak | keycloak 14996 fix performance bottleneck in groupldapstoragemapper g | Bug | etallkcgroup performance bottleneck cause that with thousand of group there be thousand of db call during each call of getallkcgroup now there be always 1 db call and call the method getallkcgroup take 5 ms instead of 70 second when have 10k group in ldap |
keycloakkeycloak | keycloak 15186 sort user federation table | Enhancement | null |
keycloakkeycloak | keycloak 15184 use static inner class where possible | Enhancement | null |
keycloakkeycloak | keycloak 14767 openshift review endpoint audience fix | Bug | this pull request replace it introduce a mandatory audience check for openshift token review endpoint |
keycloakkeycloak | keycloak 15146 add support for search user by emailverified status | Enhancement | we now allow to search for user by their emailverifie status this enable user to easily find user and deal with incomplete user account see note it seem that there be no database index on user entity realm i d email verify but this be necessary to speedup lookup in large user database |
keycloakkeycloak | keycloak 15113 move away from deprecate promise success error | Enhancement | move away from deprecate promise success error by use the native method then catch instead |
keycloakkeycloak | keycloak 15091 fix regression theme can not use custom favicon any long | Bug | revert the part of keycloak 14163 common resource be not load from common path which have make the favicon a common resource and hence make it impossible to use a custom favicon after this change the favicon be a theme resource again and can be customize |
keycloakkeycloak | keycloak 15087 reduce get client and get role call in realm create | Enhancement | keycloak 15087 reduce get client and get role call in realm create |
keycloakkeycloak | keycloak 14781 extend admin rest api with search by federate identity | Enhancement | add parameter idpalias and idpuserid to the resource realm user and allow it to be combine with the enabled parameter add attribute federatedidentitie to userentity to allow join on this field extend integration test usert discussion on dev mailing list topic keycloak dev 962ddmyuhe issue |
keycloakkeycloak | keycloak 14988 add generate action token service endpoint | Enhancement | generate token via rest api to perform action |
keycloakkeycloak | keycloak 14963 add support limit allow e mail address | Enhancement | we now allow to restrict allow email address for regsitration and user profile change on realm level add test for restrict email address for a realm discussion on dev mailinglist topic keycloak dev hngne4qialw issue |
keycloakkeycloak | keycloak 14892 nullpointerexception when group mapping for ldap user | Bug | s be access |
keycloakkeycloak | keycloak 14869 fix nullpointer exception in fullnameldapstoragemapper | Bug | as the title suggest this fix to demonstrate the issue the pr add a second test for the fullname mapper since there be a todo I extract the test to its own class so that coverage can be increase in the future this pr already increase it slightly this be why the pr be now comparatively large but the change should be simple to review the issue can be see in the ticket the user have a mapper mapping saml attribute to user attribute but some of these attribute be actually empty so the corresponding out of bound exception be throw as previously there be a hard get 0 which clearly doesn t work on an empty list in addition to the fullnameldapstoragemapper I also go over the original pr again and fix all instance where this be do now in principle username and or email should never be null but I though it would be good to sanitize the input here to be sure |
keycloakkeycloak | keycloak 13692 upgrade to wildfly 20 0 1 final and infinispan 10 1 8 final | Enhancement | this pr replace the pr it contain same change but in addition to it it fix samladapterclustertest and samladaptercrossdctest failure also it remove change in realmcachesession java file the reason for another pr be that iankko be on pto for this week and I can t update the pr which be send by he associate prs documentation web |
keycloakkeycloak | keycloak 14747 ldap pooling should include ssl protocol by default | Enhancement | relate to |
keycloakkeycloak | keycloak 14707 use native promise | Enhancement | and get rid of console warning |
keycloakkeycloak | keycloak 14653 change operation type to update when update client scope | Bug | change operation type to update when update client scope and add representation in the admin event fix for issue |
keycloakkeycloak | keycloak 14663 fix spelling in ru translation | Bug | |
keycloakkeycloak | keycloak 13983 include algorithm parameter | Enhancement | add the capacity to add both public and secret algorithm specific datum to a passwordcredentialmodel the default way to create the model in maintain to minimize the change impact for the default hash infrastructure publish the passwordcredentialmodel constructor to ease in build such extended credential model |
keycloakkeycloak | keycloak 14904 fix accountrestservice | Bug | this be a followup for it fix a bug and a potential exploit I just notice while work on a followup for change the database model sadly one day too late when update the account through the accountrestservice username email firstname and lastname will be delete from the attribute of the usermodel I e the user will not have a valid username anymore this be not note before because all test implicitly connect to a jpa useradapter which store the field in different column in the database and not as attribute so in that case nothing happen cache might break though this be automatically fix when introduce the legacyprofile here however since that pr probably need some time to be review I ll propose this fix in the meantime sadly I don t know a relatively cheap way to provide a test show the problem I guess I d have to use an ldap provider in conjunction with the accountrestservice in addition I notice that the code allow a user to set the username by set an attribute name username and this will set the username without any check I add a test to show that this be possible it will fail with the current master as a quick fix I ll just not set the special attribute if they be specify in the representation without say anything since this be an edge case that will also be handle in the userprofile more gracefully soon I hope this be enough for now I have a look at to try to figure out whether I miss something else but couldn t see anything else I also go through each usage of removeattribute as this be the problematic function and find only this use and userresource where this be already do correctly |
keycloakkeycloak | wip keycloak 14597 update to new patternfly | Enhancement | also fix keycloak 8082 image |
keycloakkeycloak | keycloak 14576 fix npe in undertow | Bug | null |
keycloakkeycloak | keycloak 14570 feature fix npe | Bug | nullpointerexception occur when application use the endpoint with uri auth admin realm realm authentication config description providerid while body of response representation be be populate and iterate over property of providerfactory may lead to npe because of some providerfactory return null instead emptylist or whatever for example cookieauthenticatorfactory conditionaluserconfiguredauthenticatorfactory jira |
keycloakkeycloak | keycloak 6304 czech translation | Enhancement | add czech translation base on previous pr |
keycloakkeycloak | keycloak 14520 npe when deploy springboot as war | Bug | solve issue |
keycloakkeycloak | keycloak 14499 add toggle menu back on welcome screen | Bug | null |
keycloakkeycloak | keycloak 13160 add support for privacy preserve logging | Enhancement | the pr provide a new privacyfilterprovider spi which allow apply custom filtering of log message generate via keycloak s jboss log eventlistener for a start we ship with two implementation a default no op defaultemptyprivacyfilterprovider and a configurable anonymizingprivacyfilterprovider the latter use a customizable anonymizer to perform the obfuscation mask filtering of pii information special type hint allow to customize the obfuscation keycloak developer can now implement their own privacyfilterprovider implementation or extend the anonymizingprivacyfilterprovider it be also possible to use the privacyfilterprovider directly e g for own log message java keycloaksession getprovider privacyfilterprovider class filter some datum privacyfilterprovider pii it be also necessary to adapt the bruteforceprotector to use the jboss log eventlistener to benefit from the new spi you can find a discussion about this on the keycloak dev mailing list topic keycloak dev d43pon7zckw anonymization example for username email userid use r com val r com userid 45f31bdf 7afd 4d42 86ad 6b6c6e3eded3 45f ed3 ipaddress 127 0 0 1 12 0 1 with this in place we can generate log message that look like this 17 26 30 732 warn xnio 1 task 1 org keycloak event type login error realmid demo clientid null userid null ipaddress 12 0 1 error expire code restart after timeout true authsessionparentid 0a1a474e c08d 466f 881f efefbb788bb3 authsessiontabid 5oip xrunw4 17 26 33 863 warn xnio 1 task 2 org keycloak event type login error realmid demo clientid account userid bf 9ab ipaddress 12 0 1 error invalid user credential auth method openid connect redirect uri code i d 0a1a474e c08d 466f 881f efefbb788bb3 username te ter authsessionparentid 0a1a474e c08d 466f 881f efefbb788bb3 authsessiontabid 5oip xrunw4 17 26 33 869 warn brute force protector org keycloak event type login error realmid demo clientid null userid bf 9ab ipaddress 12 0 1 error recording login failure for user |
keycloakkeycloak | keycloak 14490 use snowpack optimze flag | Enhancement | since we be go to stay on snowpack 1 a little long we might as well go ahead and start use the optimize flag which have be show to decrease the download by almost 1 mb and decrease startup time |
keycloakkeycloak | keycloak 14476 revert location change of base64url js | Bug | ui build |
keycloakkeycloak | keycloak 13205 apply locale resolution strategy to admin console | Bug | add new locale attribute to whoami response query whoami before loading message use whoami locale instead of i d token locale for loading message |
keycloakkeycloak | keycloak 13692 upgrade to wildfly 20 0 1 final and infinispan 10 1 8 final | Enhancement | keycloak 13692 upgrade to wildfly 20 0 1 final and infinispan 10 1 8 final co author by jan lieskovsky co author by marek posolda associate prs update adapter version to wildfly 20 0 0 final on web page update necessary documentation |
keycloakkeycloak | keycloak 14412 keycloak js should honor configure default scope when onload require login be use | Bug | we now add the configure default scope to the login url when onload require login be use previously the configure default scope be ignore when when onload login require be use in the keycloak configuration |
keycloakkeycloak | authentication management require action | Enhancement | I see that require action be already in 1 13 x and be mention in readme but not publish yet I consider just use the git branch as my dependency but the build step do not run when the package be instal this way what s miss what work be still necessary for 1 13 1 to be publish |
keycloakkeycloak | keycloak 14368 stream serialization in jackson | Enhancement |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.