author
int64 658
755k
| date
stringlengths 19
19
| timezone
int64 -46,800
43.2k
| hash
stringlengths 40
40
| message
stringlengths 5
490
| mods
list | language
stringclasses 20
values | license
stringclasses 3
values | repo
stringlengths 5
68
| original_message
stringlengths 12
491
|
---|---|---|---|---|---|---|---|---|---|
339,618 | 19.10.2021 09:56:18 | -7,200 | 02355403e974c896860c5a7fabb4654b153f027d | Quarkus update to 2.4.0.CR1 | [
{
"change_type": "MODIFY",
"old_path": "quarkus/deployment/src/main/java/org/keycloak/quarkus/deployment/KeycloakProcessor.java",
"new_path": "quarkus/deployment/src/main/java/org/keycloak/quarkus/deployment/KeycloakProcessor.java",
"diff": "@@ -126,6 +126,12 @@ class KeycloakProcessor {\nprivate static final Map<String, Function<ScriptProviderMetadata, ProviderFactory>> DEPLOYEABLE_SCRIPT_PROVIDERS = new HashMap<>();\nprivate static final String KEYCLOAK_SCRIPTS_JSON_PATH = \"META-INF/keycloak-scripts.json\";\n+ private static final List<Class<? extends ProviderFactory>> IGNORED_PROVIDER_FACTORY = Arrays.asList(\n+ JBossJtaTransactionManagerLookup.class,\n+ DefaultJpaConnectionProviderFactory.class,\n+ DefaultLiquibaseConnectionProvider.class,\n+ LiquibaseJpaUpdaterProviderFactory.class);\n+\nstatic {\nDEPLOYEABLE_SCRIPT_PROVIDERS.put(AUTHENTICATORS, KeycloakProcessor::registerScriptAuthenticator);\nDEPLOYEABLE_SCRIPT_PROVIDERS.put(POLICIES, KeycloakProcessor::registerScriptPolicy);\n@@ -387,11 +393,7 @@ class KeycloakProcessor {\npreConfiguredProviders.putAll(deployedScriptProviders);\nfor (ProviderFactory factory : loadedFactories) {\n- if (Arrays.asList(\n- JBossJtaTransactionManagerLookup.class,\n- DefaultJpaConnectionProviderFactory.class,\n- DefaultLiquibaseConnectionProvider.class,\n- LiquibaseJpaUpdaterProviderFactory.class).contains(factory.getClass())) {\n+ if (IGNORED_PROVIDER_FACTORY.contains(factory.getClass())) {\ncontinue;\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/pom.xml",
"new_path": "quarkus/pom.xml",
"diff": "<properties>\n<!-- Quarkus version -->\n- <quarkus.version>2.3.0.Final</quarkus.version>\n+ <quarkus.version>2.4.0.CR1</quarkus.version>\n<!--\nOverride versions based on Quarkus dependencies.\nMake sure to update these dependencies when Quarkus version changes.\n+ See https://github.com/quarkusio/quarkus/blob/<versionTag>/bom/application/pom.xml\n+ for reference\n-->\n<resteasy.version>4.7.0.Final</resteasy.version>\n<jackson.version>2.12.5</jackson.version>\n<jackson.databind.version>${jackson.version}</jackson.databind.version>\n- <hibernate.core.version>5.6.0.Beta2</hibernate.core.version>\n+ <hibernate.core.version>5.6.0.CR1</hibernate.core.version>\n<mysql.driver.version>8.0.26</mysql.driver.version>\n- <postgresql.version>42.2.23</postgresql.version>\n+ <postgresql.version>42.2.24</postgresql.version>\n<microprofile-metrics-api.version>3.0</microprofile-metrics-api.version>\n<wildfly.common.version>1.5.4.Final-format-001</wildfly.common.version>\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/pom.xml",
"new_path": "quarkus/runtime/pom.xml",
"diff": "<scope>test</scope>\n</dependency>\n+ <!-- logging wrapper for log4j-->\n+ <dependency>\n+ <groupId>org.jboss.logmanager</groupId>\n+ <artifactId>log4j-jboss-logmanager</artifactId>\n+ </dependency>\n+\n<!-- twitter api -->\n<dependency>\n<groupId>org.twitter4j</groupId>\n<artifactId>openshift-restclient-java</artifactId>\n<version>${version.com.openshift.openshift-restclient-java}</version>\n<exclusions>\n+ <exclusion>\n+ <groupId>log4j</groupId>\n+ <artifactId>log4j</artifactId>\n+ </exclusion>\n<exclusion>\n<groupId>org.slf4j</groupId>\n<artifactId>slf4j-log4j12</artifactId>\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19582 Quarkus update to 2.4.0.CR1 |
339,468 | 19.08.2021 11:32:58 | -7,200 | 8d1c3bbeb007c78c4a317259a0ee568510be1229 | Entrypoint of Keycloak Docker Image that's used in
performance tests is not executable for jboss user | [
{
"change_type": "MODIFY",
"old_path": "testsuite/performance/keycloak/src/main/scripts/Dockerfile",
"new_path": "testsuite/performance/keycloak/src/main/scripts/Dockerfile",
"diff": "@@ -19,7 +19,7 @@ ADD *.sh /usr/local/bin/\nUSER root\nRUN chown -R jboss .; chgrp -R jboss .; chmod -R -v ug+x bin/*.sh ; \\\n- chmod -R -v ug+x /usr/local/bin/\n+ chmod -R -v +x /usr/local/bin/\nUSER jboss\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19076 Entrypoint of Keycloak Docker Image that's used in
performance tests is not executable for jboss user |
339,511 | 14.10.2021 10:04:38 | -32,400 | 263161ff6690318078eb123f92eaa48ed80940b4 | FAPI 2.0 Baseline : Reject Resource Owner Password Credentials Grant | [
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/services/clientpolicy/ClientPolicyEvent.java",
"new_path": "server-spi/src/main/java/org/keycloak/services/clientpolicy/ClientPolicyEvent.java",
"diff": "@@ -42,6 +42,7 @@ public enum ClientPolicyEvent {\nBACKCHANNEL_TOKEN_REQUEST,\nPUSHED_AUTHORIZATION_REQUEST,\nDEVICE_AUTHORIZATION_REQUEST,\n- DEVICE_TOKEN_REQUEST\n+ DEVICE_TOKEN_REQUEST,\n+ RESOURCE_OWNER_PASSWORD_CREDENTIALS_REQUEST\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenEndpoint.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/TokenEndpoint.java",
"diff": "@@ -74,6 +74,7 @@ import org.keycloak.services.CorsErrorResponseException;\nimport org.keycloak.services.ServicesLogger;\nimport org.keycloak.services.Urls;\nimport org.keycloak.services.clientpolicy.ClientPolicyException;\n+import org.keycloak.services.clientpolicy.context.ResourceOwnerPasswordCredentialsContext;\nimport org.keycloak.services.clientpolicy.context.ServiceAccountTokenRequestContext;\nimport org.keycloak.services.clientpolicy.context.TokenRefreshContext;\nimport org.keycloak.services.clientpolicy.context.TokenRequestContext;\n@@ -630,6 +631,14 @@ public class TokenEndpoint {\nevent.error(Errors.CONSENT_DENIED);\nthrow new CorsErrorResponseException(cors, OAuthErrorException.INVALID_CLIENT, \"Client requires user consent\", Response.Status.BAD_REQUEST);\n}\n+\n+ try {\n+ session.clientPolicy().triggerOnEvent(new ResourceOwnerPasswordCredentialsContext(formParams));\n+ } catch (ClientPolicyException cpe) {\n+ event.error(cpe.getError());\n+ throw new CorsErrorResponseException(cors, cpe.getError(), cpe.getErrorDetail(), cpe.getErrorStatus());\n+ }\n+\nString scope = getRequestedScopes();\nRootAuthenticationSessionModel rootAuthSession = new AuthenticationSessionManager(session).createAuthenticationSession(realm, false);\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/context/ResourceOwnerPasswordCredentialsContext.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.services.clientpolicy.context;\n+\n+import javax.ws.rs.core.MultivaluedMap;\n+\n+import org.keycloak.services.clientpolicy.ClientPolicyContext;\n+import org.keycloak.services.clientpolicy.ClientPolicyEvent;\n+\n+/**\n+ * @author <a href=\"mailto:[email protected]\">Takashi Norimatsu</a>\n+ */\n+public class ResourceOwnerPasswordCredentialsContext implements ClientPolicyContext {\n+\n+ private final MultivaluedMap<String, String> params;\n+\n+ public ResourceOwnerPasswordCredentialsContext(MultivaluedMap<String, String> params) {\n+ this.params = params;\n+ }\n+\n+ @Override\n+ public ClientPolicyEvent getEvent() {\n+ return ClientPolicyEvent.RESOURCE_OWNER_PASSWORD_CREDENTIALS_REQUEST;\n+ }\n+\n+ public MultivaluedMap<String, String> getParams() {\n+ return params;\n+ }\n+\n+}\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/RejectResourceOwnerPasswordCredentialsGrantExecutor.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.services.clientpolicy.executor;\n+\n+import javax.ws.rs.core.MultivaluedMap;\n+\n+import org.keycloak.OAuthErrorException;\n+import org.keycloak.models.KeycloakSession;\n+import org.keycloak.representations.idm.ClientPolicyExecutorConfigurationRepresentation;\n+import org.keycloak.representations.idm.ClientRepresentation;\n+import org.keycloak.services.clientpolicy.ClientPolicyContext;\n+import org.keycloak.services.clientpolicy.ClientPolicyException;\n+import org.keycloak.services.clientpolicy.context.ClientCRUDContext;\n+import org.keycloak.services.clientpolicy.context.ResourceOwnerPasswordCredentialsContext;\n+\n+import com.fasterxml.jackson.annotation.JsonProperty;\n+\n+/**\n+ * @author <a href=\"mailto:[email protected]\">Takashi Norimatsu</a>\n+ */\n+public class RejectResourceOwnerPasswordCredentialsGrantExecutor implements ClientPolicyExecutorProvider<RejectResourceOwnerPasswordCredentialsGrantExecutor.Configuration> {\n+\n+ private final KeycloakSession session;\n+ private Configuration configuration;\n+\n+ public RejectResourceOwnerPasswordCredentialsGrantExecutor(KeycloakSession session) {\n+ this.session = session;\n+ }\n+\n+ @Override\n+ public void setupConfiguration(Configuration config) {\n+ this.configuration = config;\n+ }\n+\n+ @Override\n+ public Class<Configuration> getExecutorConfigurationClass() {\n+ return Configuration.class;\n+ }\n+\n+ public static class Configuration extends ClientPolicyExecutorConfigurationRepresentation {\n+ @JsonProperty(\"auto-configure\")\n+ protected Boolean autoConfigure;\n+\n+ public Boolean isAutoConfigure() {\n+ return autoConfigure;\n+ }\n+\n+ public void setAutoConfigure(Boolean autoConfigure) {\n+ this.autoConfigure = autoConfigure;\n+ }\n+ }\n+\n+ @Override\n+ public String getProviderId() {\n+ return RejectResourceOwnerPasswordCredentialsGrantExecutorFactory.PROVIDER_ID;\n+ }\n+\n+ @Override\n+ public void executeOnEvent(ClientPolicyContext context) throws ClientPolicyException {\n+ switch (context.getEvent()) {\n+ case REGISTER:\n+ case UPDATE:\n+ ClientCRUDContext clientUpdateContext = (ClientCRUDContext)context;\n+ autoConfigure(clientUpdateContext.getProposedClientRepresentation());\n+ validate(clientUpdateContext.getProposedClientRepresentation());\n+ break;\n+ case RESOURCE_OWNER_PASSWORD_CREDENTIALS_REQUEST:\n+ ResourceOwnerPasswordCredentialsContext ropcContext = (ResourceOwnerPasswordCredentialsContext)context;\n+ executeOnAuthorizationRequest(ropcContext.getParams());\n+ return;\n+ default:\n+ return;\n+ }\n+ }\n+\n+ private void autoConfigure(ClientRepresentation rep) {\n+ if (configuration.isAutoConfigure())\n+ rep.setDirectAccessGrantsEnabled(Boolean.FALSE);\n+ }\n+\n+ private void validate(ClientRepresentation rep) throws ClientPolicyException {\n+ boolean isResourceOwnerPasswordCredentialsGrantEnabled = rep.isDirectAccessGrantsEnabled().booleanValue();\n+ if (!isResourceOwnerPasswordCredentialsGrantEnabled) return;\n+ throw new ClientPolicyException(OAuthErrorException.INVALID_CLIENT_METADATA, \"Invalid client metadata: resource owner password credentials grant enabled\");\n+ }\n+\n+ private void executeOnAuthorizationRequest(MultivaluedMap<String, String> params) throws ClientPolicyException {\n+ // Before client policies operation, Token Endpoint logic has already checked whether resource owner password credentials grant is activated for a client.\n+ // This method rejects resource owner password credentials grant regardless of client setting for allowing resource owner password credentials grant.\n+ throw new ClientPolicyException(OAuthErrorException.INVALID_GRANT, \"resource owner password credentials grant is prohibited.\");\n+ }\n+\n+}\n\\ No newline at end of file\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/RejectResourceOwnerPasswordCredentialsGrantExecutorFactory.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.services.clientpolicy.executor;\n+\n+import java.util.Collections;\n+import java.util.List;\n+\n+import org.keycloak.Config.Scope;\n+import org.keycloak.models.KeycloakSession;\n+import org.keycloak.models.KeycloakSessionFactory;\n+import org.keycloak.provider.ProviderConfigProperty;\n+\n+/**\n+ * @author <a href=\"mailto:[email protected]\">Takashi Norimatsu</a>\n+ */\n+public class RejectResourceOwnerPasswordCredentialsGrantExecutorFactory implements ClientPolicyExecutorProviderFactory {\n+\n+ public static final String PROVIDER_ID = \"reject-ropc-grant\";\n+\n+ public static final String AUTO_CONFIGURE = \"auto-configure\";\n+\n+ private static final ProviderConfigProperty AUTO_CONFIGURE_PROPERTY = new ProviderConfigProperty(\n+ AUTO_CONFIGURE, \"Auto-configure\", \"If On, then the during client creation or update, the configuration of the client will be auto-configured to reject a resource owner password credentials grant.\", ProviderConfigProperty.BOOLEAN_TYPE, false);\n+\n+ @Override\n+ public ClientPolicyExecutorProvider create(KeycloakSession session) {\n+ return new RejectResourceOwnerPasswordCredentialsGrantExecutor(session);\n+ }\n+\n+ @Override\n+ public void init(Scope config) {\n+ }\n+\n+ @Override\n+ public void postInit(KeycloakSessionFactory factory) {\n+ }\n+\n+ @Override\n+ public void close() {\n+ }\n+\n+ @Override\n+ public String getId() {\n+ return PROVIDER_ID;\n+ }\n+\n+ @Override\n+ public String getHelpText() {\n+ return \"It makes keycloak to reject a resource owner password credentials grant.\";\n+ }\n+\n+ @Override\n+ public List<ProviderConfigProperty> getConfigProperties() {\n+ return Collections.singletonList(AUTO_CONFIGURE_PROPERTY);\n+ }\n+\n+}\n\\ No newline at end of file\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/resources/META-INF/services/org.keycloak.services.clientpolicy.executor.ClientPolicyExecutorProviderFactory",
"new_path": "services/src/main/resources/META-INF/services/org.keycloak.services.clientpolicy.executor.ClientPolicyExecutorProviderFactory",
"diff": "@@ -14,3 +14,4 @@ org.keycloak.protocol.oidc.grants.ciba.clientpolicy.executor.SecureCibaSessionEn\norg.keycloak.protocol.oidc.grants.ciba.clientpolicy.executor.SecureCibaSignedAuthenticationRequestExecutorFactory\norg.keycloak.protocol.oidc.grants.ciba.clientpolicy.executor.SecureCibaAuthenticationRequestSigningAlgorithmExecutorFactory\norg.keycloak.services.clientpolicy.executor.SecureLogoutExecutorFactory\n+org.keycloak.services.clientpolicy.executor.RejectResourceOwnerPasswordCredentialsGrantExecutorFactory\n\\ No newline at end of file\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/client/ClientPoliciesTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/client/ClientPoliciesTest.java",
"diff": "@@ -79,6 +79,7 @@ import org.keycloak.services.clientpolicy.executor.ConsentRequiredExecutorFactor\nimport org.keycloak.services.clientpolicy.executor.FullScopeDisabledExecutorFactory;\nimport org.keycloak.services.clientpolicy.executor.HolderOfKeyEnforcerExecutorFactory;\nimport org.keycloak.services.clientpolicy.executor.PKCEEnforcerExecutorFactory;\n+import org.keycloak.services.clientpolicy.executor.RejectResourceOwnerPasswordCredentialsGrantExecutorFactory;\nimport org.keycloak.services.clientpolicy.executor.SecureClientAuthenticatorExecutorFactory;\nimport org.keycloak.services.clientpolicy.executor.SecureClientUrisExecutorFactory;\nimport org.keycloak.services.clientpolicy.executor.SecureLogoutExecutorFactory;\n@@ -148,6 +149,7 @@ import static org.keycloak.testsuite.util.ClientPoliciesUtil.createSecureSigning\nimport static org.keycloak.testsuite.util.ClientPoliciesUtil.createSecureSigningAlgorithmForSignedJwtEnforceExecutorConfig;\nimport static org.keycloak.testsuite.util.ClientPoliciesUtil.createTestRaiseExeptionConditionConfig;\nimport static org.keycloak.testsuite.util.ClientPoliciesUtil.createFullScopeDisabledExecutorConfig;\n+import static org.keycloak.testsuite.util.ClientPoliciesUtil.createRejectisResourceOwnerPasswordCredentialsGrantExecutorConfig;\nimport javax.ws.rs.BadRequestException;\n@@ -2695,6 +2697,47 @@ public class ClientPoliciesTest extends AbstractClientPoliciesTest {\nassertTrue(driver.getPageSource().contains(\"Front-channel logout is not allowed for this client\"));\n}\n+ @Test\n+ public void testRejectResourceOwnerCredentialsGrantExecutor() throws Exception {\n+\n+ String clientId = generateSuffixedName(CLIENT_NAME);\n+ String clientSecret = \"secret\";\n+\n+ createClientByAdmin(clientId, (ClientRepresentation clientRep) -> {\n+ clientRep.setSecret(clientSecret);\n+ clientRep.setStandardFlowEnabled(Boolean.TRUE);\n+ clientRep.setDirectAccessGrantsEnabled(Boolean.TRUE);\n+ clientRep.setPublicClient(Boolean.FALSE);\n+ });\n+\n+ // register profiles\n+ String json = (new ClientProfilesBuilder()).addProfile(\n+ (new ClientProfileBuilder()).createProfile(PROFILE_NAME, \"Purofairu desu\")\n+ .addExecutor(RejectResourceOwnerPasswordCredentialsGrantExecutorFactory.PROVIDER_ID,\n+ createRejectisResourceOwnerPasswordCredentialsGrantExecutorConfig(Boolean.TRUE))\n+ .toRepresentation()\n+ ).toString();\n+ updateProfiles(json);\n+\n+ // register policies\n+ json = (new ClientPoliciesBuilder()).addPolicy(\n+ (new ClientPolicyBuilder()).createPolicy(POLICY_NAME, \"Porisii desu\", Boolean.TRUE)\n+ .addCondition(AnyClientConditionFactory.PROVIDER_ID,\n+ createAnyClientConditionConfig())\n+ .addProfile(PROFILE_NAME)\n+ .toRepresentation()\n+ ).toString();\n+ updatePolicies(json);\n+\n+ oauth.clientId(clientId);\n+ OAuthClient.AccessTokenResponse response = oauth.doGrantAccessTokenRequest(clientSecret, TEST_USER_NAME, TEST_USER_PASSWORD, null);\n+\n+ assertEquals(400, response.getStatusCode());\n+ assertEquals(OAuthErrorException.INVALID_GRANT, response.getError());\n+ assertEquals(\"resource owner password credentials grant is prohibited.\", response.getErrorDescription());\n+\n+ }\n+\nprivate void openVerificationPage(String verificationUri) {\ndriver.navigate().to(verificationUri);\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/util/ClientPoliciesUtil.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/util/ClientPoliciesUtil.java",
"diff": "@@ -41,6 +41,7 @@ import org.keycloak.services.clientpolicy.executor.ConsentRequiredExecutor;\nimport org.keycloak.services.clientpolicy.executor.FullScopeDisabledExecutor;\nimport org.keycloak.services.clientpolicy.executor.HolderOfKeyEnforcerExecutor;\nimport org.keycloak.services.clientpolicy.executor.PKCEEnforcerExecutor;\n+import org.keycloak.services.clientpolicy.executor.RejectResourceOwnerPasswordCredentialsGrantExecutor;\nimport org.keycloak.services.clientpolicy.executor.SecureClientAuthenticatorExecutor;\nimport org.keycloak.services.clientpolicy.executor.SecureRequestObjectExecutor;\nimport org.keycloak.services.clientpolicy.executor.SecureResponseTypeExecutor;\n@@ -211,6 +212,12 @@ public final class ClientPoliciesUtil {\nreturn config;\n}\n+ public static RejectResourceOwnerPasswordCredentialsGrantExecutor.Configuration createRejectisResourceOwnerPasswordCredentialsGrantExecutorConfig(Boolean autoConfigure) {\n+ RejectResourceOwnerPasswordCredentialsGrantExecutor.Configuration config = new RejectResourceOwnerPasswordCredentialsGrantExecutor.Configuration();\n+ config.setAutoConfigure(autoConfigure);\n+ return config;\n+ }\n+\npublic static class ClientPoliciesBuilder {\nprivate final ClientPoliciesRepresentation policiesRep;\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19540 FAPI 2.0 Baseline : Reject Resource Owner Password Credentials Grant |
339,179 | 21.10.2021 10:25:33 | -7,200 | cfbb7f55534edce56ed5dd928ffb3b111af64684 | Remove CRUD operations from MapStorage interface | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/authSession/MapRootAuthenticationSessionProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/authSession/MapRootAuthenticationSessionProvider.java",
"diff": "@@ -147,7 +147,7 @@ public class MapRootAuthenticationSessionProvider implements AuthenticationSessi\nModelCriteriaBuilder<RootAuthenticationSessionModel> mcb = sessionStore.createCriteriaBuilder()\n.compare(SearchableFields.REALM_ID, Operator.EQ, realm.getId());\n- sessionStore.delete(withCriteria(mcb));\n+ tx.delete(withCriteria(mcb));\n}\n@Override\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientProvider.java",
"diff": "@@ -216,7 +216,7 @@ public class MapClientProvider implements ClientProvider {\nModelCriteriaBuilder<ClientModel> mcb = clientStore.createCriteriaBuilder()\n.compare(SearchableFields.REALM_ID, Operator.EQ, realm.getId());\n- return this.clientStore.getCount(withCriteria(mcb));\n+ return tx.getCount(withCriteria(mcb));\n}\n@Override\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/MapStorage.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/MapStorage.java",
"diff": "@@ -22,10 +22,6 @@ import java.util.stream.Stream;\n/**\n* Implementation of this interface interacts with a persistence storage storing various entities, e.g. users, realms.\n- * It contains basic object CRUD operations as well as bulk {@link #read(org.keycloak.models.map.storage.QueryParameters)}\n- * and bulk {@link #delete(org.keycloak.models.map.storage.QueryParameters)} operations,\n- * and operation for determining the number of the objects satisfying given criteria\n- * ({@link #getCount(org.keycloak.models.map.storage.QueryParameters)}).\n*\n* @author hmlnarik\n* @param <V> Type of the stored values that contains all the data stripped of session state. In other words, in the entities\n@@ -37,75 +33,6 @@ import java.util.stream.Stream;\n*/\npublic interface MapStorage<V extends AbstractEntity, M> {\n- /**\n- * Creates an object in the store. ID of the {@code value} may be prescribed in id of the {@code value}.\n- * If the id is {@code null} or its format is not matching the store internal format for ID, then\n- * the {@code value}'s ID will be generated and returned in the id of the return value.\n- * @param value Entity to create in the store\n- * @throws NullPointerException if {@code value} is {@code null}\n- * @see AbstractEntity#getId()\n- * @return Entity representing the {@code value} in the store. It may or may not be the same instance as {@code value}\n- */\n- V create(V value);\n-\n- /**\n- * Returns object with the given {@code key} from the storage or {@code null} if object does not exist.\n- * <br>\n- * TODO: Consider returning {@code Optional<V>} instead.\n- * @param key Key of the object. Must not be {@code null}.\n- * @return See description\n- * @throws NullPointerException if the {@code key} is {@code null}\n- */\n- V read(String key);\n-\n- /**\n- * Returns stream of objects satisfying given {@code criteria} from the storage.\n- * The criteria are specified in the given criteria builder based on model properties.\n- *\n- * @param queryParameters parameters for the query like firstResult, maxResult, requested ordering, etc.\n- * @return Stream of objects. Never returns {@code null}.\n- * @throws IllegalStateException If {@code criteria} is not compatible, i.e. has not been originally created\n- * by the {@link #createCriteriaBuilder()} method of this object.\n- */\n- Stream<V> read(QueryParameters<M> queryParameters);\n-\n- /**\n- * Returns the number of objects satisfying given {@code criteria} from the storage.\n- * The criteria are specified in the given criteria builder based on model properties.\n- *\n- * @param queryParameters parameters for the query like firstResult, maxResult, requested ordering, etc.\n- * @return Number of objects. Never returns {@code null}.\n- * @throws IllegalStateException If {@code criteria} is not compatible, i.e. has not been originally created\n- * by the {@link #createCriteriaBuilder()} method of this object.\n- */\n- long getCount(QueryParameters<M> queryParameters);\n-\n- /**\n- * Updates the object with the key of the {@code value}'s ID in the storage if it already exists.\n- *\n- * @param value Updated value\n- * @throws NullPointerException if the object or its {@code id} is {@code null}\n- * @see AbstractEntity#getId()\n- */\n- V update(V value);\n-\n- /**\n- * Deletes object with the given {@code key} from the storage, if exists, no-op otherwise.\n- * @param key\n- * @return Returns {@code true} if the object has been deleted or result cannot be determined, {@code false} otherwise.\n- */\n- boolean delete(String key);\n-\n- /**\n- * Deletes objects that match the given criteria.\n- * @param queryParameters parameters for the query like firstResult, maxResult, requested ordering, etc.\n- * @return Number of removed objects (might return {@code -1} if not supported)\n- * @throws IllegalStateException If {@code criteria} is not compatible, i.e. has not been originally created\n- * by the {@link #createCriteriaBuilder()} method of this object.\n- */\n- long delete(QueryParameters<M> queryParameters);\n-\n-\n/**\n* Returns criteria builder for the storage engine.\n* The criteria are specified in the given criteria builder based on model properties.\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapKeycloakTransaction.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapKeycloakTransaction.java",
"diff": "@@ -43,7 +43,7 @@ public class ConcurrentHashMapKeycloakTransaction<K, V extends AbstractEntity &\nprotected boolean active;\nprotected boolean rollback;\nprotected final Map<String, MapTaskWithValue> tasks = new LinkedHashMap<>();\n- protected final MapStorage<V, M> map;\n+ protected final ConcurrentHashMapStorage<K, V, M> map;\nprotected final StringKeyConvertor<K> keyConvertor;\nprotected final DeepCloner cloner;\n@@ -51,7 +51,7 @@ public class ConcurrentHashMapKeycloakTransaction<K, V extends AbstractEntity &\nCREATE, UPDATE, DELETE,\n}\n- public ConcurrentHashMapKeycloakTransaction(MapStorage<V, M> map, StringKeyConvertor<K> keyConvertor, DeepCloner cloner) {\n+ public ConcurrentHashMapKeycloakTransaction(ConcurrentHashMapStorage<K, V, M> map, StringKeyConvertor<K> keyConvertor, DeepCloner cloner) {\nthis.map = map;\nthis.keyConvertor = keyConvertor;\nthis.cloner = cloner;\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorage.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorage.java",
"diff": "@@ -41,6 +41,11 @@ import java.util.function.Predicate;\nimport static org.keycloak.utils.StreamsUtil.paginatedStream;\n/**\n+ *\n+ * It contains basic object CRUD operations as well as bulk {@link #read(org.keycloak.models.map.storage.QueryParameters)}\n+ * and bulk {@link #delete(org.keycloak.models.map.storage.QueryParameters)} operations,\n+ * and operation for determining the number of the objects satisfying given criteria\n+ * ({@link #getCount(org.keycloak.models.map.storage.QueryParameters)}).\n*\n* @author hmlnarik\n*/\n@@ -59,7 +64,15 @@ public class ConcurrentHashMapStorage<K, V extends AbstractEntity & UpdatableEnt\nthis.cloner = cloner;\n}\n- @Override\n+ /**\n+ * Creates an object in the store. ID of the {@code value} may be prescribed in id of the {@code value}.\n+ * If the id is {@code null} or its format is not matching the store internal format for ID, then\n+ * the {@code value}'s ID will be generated and returned in the id of the return value.\n+ * @param value Entity to create in the store\n+ * @throws NullPointerException if {@code value} is {@code null}\n+ * @see AbstractEntity#getId()\n+ * @return Entity representing the {@code value} in the store. It may or may not be the same instance as {@code value}\n+ */\npublic V create(V value) {\nK key = keyConvertor.fromStringSafe(value.getId());\nif (key == null) {\n@@ -70,26 +83,49 @@ public class ConcurrentHashMapStorage<K, V extends AbstractEntity & UpdatableEnt\nreturn value;\n}\n- @Override\n+ /**\n+ * Returns object with the given {@code key} from the storage or {@code null} if object does not exist.\n+ * <br>\n+ * TODO: Consider returning {@code Optional<V>} instead.\n+ * @param key Key of the object. Must not be {@code null}.\n+ * @return See description\n+ * @throws NullPointerException if the {@code key} is {@code null}\n+ */\npublic V read(String key) {\nObjects.requireNonNull(key, \"Key must be non-null\");\nK k = keyConvertor.fromStringSafe(key);\nreturn store.get(k);\n}\n- @Override\n+ /**\n+ * Updates the object with the key of the {@code value}'s ID in the storage if it already exists.\n+ *\n+ * @param value Updated value\n+ * @throws NullPointerException if the object or its {@code id} is {@code null}\n+ * @see AbstractEntity#getId()\n+ */\npublic V update(V value) {\nK key = getKeyConvertor().fromStringSafe(value.getId());\nreturn store.replace(key, value);\n}\n- @Override\n+ /**\n+ * Deletes object with the given {@code key} from the storage, if exists, no-op otherwise.\n+ * @param key\n+ * @return Returns {@code true} if the object has been deleted or result cannot be determined, {@code false} otherwise.\n+ */\npublic boolean delete(String key) {\nK k = getKeyConvertor().fromStringSafe(key);\nreturn store.remove(k) != null;\n}\n- @Override\n+ /**\n+ * Deletes objects that match the given criteria.\n+ * @param queryParameters parameters for the query like firstResult, maxResult, requested ordering, etc.\n+ * @return Number of removed objects (might return {@code -1} if not supported)\n+ * @throws IllegalStateException If {@code criteria} is not compatible, i.e. has not been originally created\n+ * by the {@link #createCriteriaBuilder()} method of this object.\n+ */\npublic long delete(QueryParameters<M> queryParameters) {\nModelCriteriaBuilder<M> criteria = queryParameters.getModelCriteriaBuilder();\n@@ -139,7 +175,15 @@ public class ConcurrentHashMapStorage<K, V extends AbstractEntity & UpdatableEnt\nreturn keyConvertor;\n}\n- @Override\n+ /**\n+ * Returns stream of objects satisfying given {@code criteria} from the storage.\n+ * The criteria are specified in the given criteria builder based on model properties.\n+ *\n+ * @param queryParameters parameters for the query like firstResult, maxResult, requested ordering, etc.\n+ * @return Stream of objects. Never returns {@code null}.\n+ * @throws IllegalStateException If {@code criteria} is not compatible, i.e. has not been originally created\n+ * by the {@link #createCriteriaBuilder()} method of this object.\n+ */\npublic Stream<V> read(QueryParameters<M> queryParameters) {\nModelCriteriaBuilder<M> criteria = queryParameters.getModelCriteriaBuilder();\n@@ -160,7 +204,15 @@ public class ConcurrentHashMapStorage<K, V extends AbstractEntity & UpdatableEnt\nreturn stream.map(Map.Entry::getValue);\n}\n- @Override\n+ /**\n+ * Returns the number of objects satisfying given {@code criteria} from the storage.\n+ * The criteria are specified in the given criteria builder based on model properties.\n+ *\n+ * @param queryParameters parameters for the query like firstResult, maxResult, requested ordering, etc.\n+ * @return Number of objects. Never returns {@code null}.\n+ * @throws IllegalStateException If {@code criteria} is not compatible, i.e. has not been originally created\n+ * by the {@link #createCriteriaBuilder()} method of this object.\n+ */\npublic long getCount(QueryParameters<M> queryParameters) {\nreturn read(queryParameters).count();\n}\n"
},
{
"change_type": "RENAME",
"old_path": "testsuite/model/src/test/java/org/keycloak/testsuite/model/MapStorageTest.java",
"new_path": "testsuite/model/src/test/java/org/keycloak/testsuite/model/ConcurrentHashMapStorageTest.java",
"diff": "@@ -50,9 +50,9 @@ import static org.hamcrest.Matchers.nullValue;\n@RequireProvider(value = ClientProvider.class, only = {MapClientProviderFactory.PROVIDER_ID})\n@RequireProvider(RealmProvider.class)\n@RequireProvider(value = MapStorageProvider.class, only = {ConcurrentHashMapStorageProviderFactory.PROVIDER_ID})\n-public class MapStorageTest extends KeycloakModelTest {\n+public class ConcurrentHashMapStorageTest extends KeycloakModelTest {\n- private static final Logger LOG = Logger.getLogger(MapStorageTest.class.getName());\n+ private static final Logger LOG = Logger.getLogger(ConcurrentHashMapStorageTest.class.getName());\nprivate String realmId;\n@@ -155,7 +155,7 @@ public class MapStorageTest extends KeycloakModelTest {\nassertClientsPersisted(component1Id, component2Id, idMain, id1, id2);\n}\n- private <K,K1> void assertClientDoesNotExist(MapStorage<MapClientEntity, ClientModel> storage, String id, final StringKeyConvertor<K1> kc, final StringKeyConvertor<K> kcStorage) {\n+ private <K,K1> void assertClientDoesNotExist(ConcurrentHashMapStorage<K, MapClientEntity, ClientModel> storage, String id, final StringKeyConvertor<K1> kc, final StringKeyConvertor<K> kcStorage) {\n// Assert that the other stores do not contain the to-be-created clients (if they use compatible key format)\ntry {\nassertThat(storage.read(id), nullValue());\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19593 Remove CRUD operations from MapStorage interface
Signed-off-by: Michal Hajas <[email protected]> |
339,156 | 23.09.2021 11:20:38 | -10,800 | a5c8c455510f8f637dc1d8ceb99538c8eece7096 | correct AttributeConsumingService bug in SAML SP metadata | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/broker/saml/SAMLIdentityProvider.java",
"new_path": "services/src/main/java/org/keycloak/broker/saml/SAMLIdentityProvider.java",
"diff": "@@ -359,8 +359,7 @@ public class SAMLIdentityProvider extends AbstractIdentityProvider<SAMLIdentityP\nboolean wantAssertionsEncrypted = getConfig().isWantAssertionsEncrypted();\nString entityId = getEntityId(uriInfo, realm);\nString nameIDPolicyFormat = getConfig().getNameIDPolicyFormat();\n- int attributeConsumingServiceIndex = getConfig().getAttributeConsumingServiceIndex() != null ? getConfig().getAttributeConsumingServiceIndex(): 1;\n- String attributeConsumingServiceName = getConfig().getAttributeConsumingServiceName();\n+\nList<Element> signingKeys = new LinkedList<>();\nList<Element> encryptionKeys = new LinkedList<>();\n@@ -394,41 +393,37 @@ public class SAMLIdentityProvider extends AbstractIdentityProvider<SAMLIdentityP\nwantAuthnRequestsSigned, wantAssertionsSigned, wantAssertionsEncrypted,\nentityId, nameIDPolicyFormat, signingKeys, encryptionKeys);\n- // Create the AttributeConsumingService\n+ // Create the AttributeConsumingService if at least one attribute importer mapper exists\n+ List<IdentityProviderMapperModel> mappers = realm.getIdentityProviderMappersByAliasStream(getConfig().getAlias()).filter(mapper -> \"saml-user-attribute-idp-mapper\".equals(mapper.getIdentityProviderMapper())).collect(Collectors.toList());\n+\n+ if (!mappers.isEmpty()) {\n+ int attributeConsumingServiceIndex = getConfig().getAttributeConsumingServiceIndex() != null ? getConfig().getAttributeConsumingServiceIndex() : 1;\n+ String attributeConsumingServiceName = getConfig().getAttributeConsumingServiceName();\n+ //default value for attributeConsumingServiceName\n+ if (attributeConsumingServiceName == null)\n+ attributeConsumingServiceName = realm.getDisplayName() != null ? realm.getDisplayName() : realm.getName() ;\nAttributeConsumingServiceType attributeConsumingService = new AttributeConsumingServiceType(attributeConsumingServiceIndex);\nattributeConsumingService.setIsDefault(true);\n- if (attributeConsumingServiceName != null && attributeConsumingServiceName.length() > 0)\n- {\nString currentLocale = realm.getDefaultLocale() == null ? \"en\" : realm.getDefaultLocale();\nLocalizedNameType attributeConsumingServiceNameElement = new LocalizedNameType(currentLocale);\nattributeConsumingServiceNameElement.setValue(attributeConsumingServiceName);\nattributeConsumingService.addServiceName(attributeConsumingServiceNameElement);\n- }\n// Look for the SP descriptor and add the attribute consuming service\nfor (EntityDescriptorType.EDTChoiceType choiceType : entityDescriptor.getChoiceType()) {\nList<EntityDescriptorType.EDTDescriptorChoiceType> descriptors = choiceType.getDescriptors();\n-\n- if (descriptors != null) {\nfor (EntityDescriptorType.EDTDescriptorChoiceType descriptor : descriptors) {\n- if (descriptor.getSpDescriptor() != null) {\ndescriptor.getSpDescriptor().addAttributeConsumerService(attributeConsumingService);\n}\n}\n- }\n- }\n// Add the attribute mappers\n- realm.getIdentityProviderMappersByAliasStream(getConfig().getAlias())\n- .forEach(mapper -> {\n- IdentityProviderMapper target = (IdentityProviderMapper) session.getKeycloakSessionFactory().getProviderFactory(IdentityProviderMapper.class, mapper.getIdentityProviderMapper());\n- if (target instanceof SamlMetadataDescriptorUpdater)\n- {\n- SamlMetadataDescriptorUpdater metadataAttrProvider = (SamlMetadataDescriptorUpdater)target;\n+ mappers.forEach(mapper -> {\n+ SamlMetadataDescriptorUpdater metadataAttrProvider = (SamlMetadataDescriptorUpdater) session.getKeycloakSessionFactory().getProviderFactory(IdentityProviderMapper.class, mapper.getIdentityProviderMapper());\nmetadataAttrProvider.updateMetadata(mapper, entityDescriptor);\n- }\n});\n+ }\n// Write the metadata and export it to a string\nmetadataWriter.writeEntityDescriptor(entityDescriptor);\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/broker/saml/mappers/UserAttributeMapper.java",
"new_path": "services/src/main/java/org/keycloak/broker/saml/mappers/UserAttributeMapper.java",
"diff": "@@ -234,17 +234,12 @@ public class UserAttributeMapper extends AbstractIdentityProviderMapper implemen\n// Add the requestedAttribute item to any AttributeConsumingServices\nfor (EntityDescriptorType.EDTChoiceType choiceType : entityDescriptor.getChoiceType()) {\nList<EntityDescriptorType.EDTDescriptorChoiceType> descriptors = choiceType.getDescriptors();\n-\n- if (descriptors != null) {\nfor (EntityDescriptorType.EDTDescriptorChoiceType descriptor : descriptors) {\n- if (descriptor.getSpDescriptor() != null && descriptor.getSpDescriptor().getAttributeConsumingService() != null) {\n- for (AttributeConsumingServiceType attributeConsumingService: descriptor.getSpDescriptor().getAttributeConsumingService())\n- {\n+ for (AttributeConsumingServiceType attributeConsumingService : descriptor.getSpDescriptor().getAttributeConsumingService()) {\nattributeConsumingService.addRequestedAttribute(requestedAttribute);\n}\n}\n- }\n- }\n+\n}\n}\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/KcSamlSpDescriptorTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/KcSamlSpDescriptorTest.java",
"diff": "@@ -13,6 +13,7 @@ import org.keycloak.models.IdentityProviderMapperSyncMode;\nimport org.keycloak.representations.idm.IdentityProviderMapperRepresentation;\nimport org.keycloak.saml.common.exceptions.ParsingException;\nimport org.keycloak.saml.processing.core.parsers.saml.SAMLParser;\n+import org.keycloak.testsuite.Assert;\nimport org.keycloak.testsuite.updaters.IdentityProviderAttributeUpdater;\nimport java.io.Closeable;\n@@ -21,6 +22,9 @@ import java.net.URISyntaxException;\nimport static org.hamcrest.MatcherAssert.assertThat;\nimport static org.hamcrest.Matchers.is;\n+import static org.hamcrest.Matchers.empty;\n+import static org.hamcrest.Matchers.not;\n+import static org.hamcrest.Matchers.notNullValue;\npublic class KcSamlSpDescriptorTest extends AbstractBrokerTest {\n@@ -30,9 +34,9 @@ public class KcSamlSpDescriptorTest extends AbstractBrokerTest {\n}\n@Test\n- public void testAttributeConsumingServiceIndexInSpMetadata() throws IOException, ParsingException, URISyntaxException {\n+ public void testAttributeConsumingServiceNameInSpMetadata() throws IOException, ParsingException, URISyntaxException {\ntry (Closeable idpUpdater = new IdentityProviderAttributeUpdater(identityProviderResource)\n- .setAttribute(SAMLIdentityProviderConfig.ATTRIBUTE_CONSUMING_SERVICE_INDEX, \"15\")\n+ .setAttribute(SAMLIdentityProviderConfig.ATTRIBUTE_CONSUMING_SERVICE_NAME, \"My Attribute Set\")\n.update())\n{\n@@ -41,32 +45,50 @@ public class KcSamlSpDescriptorTest extends AbstractBrokerTest {\nEntityDescriptorType o = (EntityDescriptorType) parser.parse(new StringInputStream(spDescriptorString));\nSPSSODescriptorType spDescriptor = o.getChoiceType().get(0).getDescriptors().get(0).getSpDescriptor();\n- assertThat(spDescriptor.getAttributeConsumingService().isEmpty(), is(false));\n- assertThat(spDescriptor.getAttributeConsumingService().get(0).getIndex(), is(15));\n+ //attribute mappers do not exist- no AttributeConsumingService\n+ assertThat(spDescriptor.getAttributeConsumingService(), empty());\n}\n}\n@Test\n- public void testAttributeConsumingServiceNameInSpMetadata() throws IOException, ParsingException, URISyntaxException {\n+ public void testAttributeConsumingServiceMappersInSpMetadataWithoutServiceName() throws IOException, ParsingException, URISyntaxException {\ntry (Closeable idpUpdater = new IdentityProviderAttributeUpdater(identityProviderResource)\n- .setAttribute(SAMLIdentityProviderConfig.ATTRIBUTE_CONSUMING_SERVICE_NAME, \"My Attribute Set\")\n+ .setAttribute(SAMLIdentityProviderConfig.ATTRIBUTE_CONSUMING_SERVICE_INDEX, \"12\")\n.update())\n{\n+ IdentityProviderMapperRepresentation attrMapperEmail = new IdentityProviderMapperRepresentation();\n+ attrMapperEmail.setName(\"attribute-mapper-email\");\n+ attrMapperEmail.setIdentityProviderMapper(UserAttributeMapper.PROVIDER_ID);\n+ attrMapperEmail.setConfig(ImmutableMap.<String,String>builder()\n+ .put(IdentityProviderMapperModel.SYNC_MODE, IdentityProviderMapperSyncMode.INHERIT.toString())\n+ .put(UserAttributeMapper.ATTRIBUTE_NAME, \"email_attr_name\")\n+ .put(UserAttributeMapper.ATTRIBUTE_FRIENDLY_NAME, \"email_attr_friendlyname\")\n+ .put(UserAttributeMapper.USER_ATTRIBUTE, \"email\")\n+ .build());\n+ attrMapperEmail.setIdentityProviderAlias(bc.getIDPAlias());\n+\n+ identityProviderResource.addMapper(attrMapperEmail);\nString spDescriptorString = identityProviderResource.export(null).readEntity(String.class);\nSAMLParser parser = SAMLParser.getInstance();\nEntityDescriptorType o = (EntityDescriptorType) parser.parse(new StringInputStream(spDescriptorString));\nSPSSODescriptorType spDescriptor = o.getChoiceType().get(0).getDescriptors().get(0).getSpDescriptor();\n- assertThat(spDescriptor.getAttributeConsumingService().isEmpty(), is(false));\n- assertThat(spDescriptor.getAttributeConsumingService().get(0).getServiceName().get(0).getValue(), is(\"My Attribute Set\"));\n+ assertThat(spDescriptor.getAttributeConsumingService(), not(empty()));\n+ assertThat(spDescriptor.getAttributeConsumingService().get(0).getIndex(), is(12));\n+ assertThat(spDescriptor.getAttributeConsumingService().get(0).getRequestedAttribute(), notNullValue());\n+ assertThat(spDescriptor.getAttributeConsumingService().get(0).getRequestedAttribute(), not(empty()));\n+ assertThat(spDescriptor.getAttributeConsumingService().get(0).getRequestedAttribute().get(0).getName(), is(\"email_attr_name\"));\n+ assertThat(spDescriptor.getAttributeConsumingService().get(0).getRequestedAttribute().get(0).getFriendlyName(), is(\"email_attr_friendlyname\"));\n+ assertThat(spDescriptor.getAttributeConsumingService().get(0).getServiceName(), notNullValue());\n+ assertThat(spDescriptor.getAttributeConsumingService().get(0).getServiceName().get(0).getValue(), is(bc.consumerRealmName()));\n}\n}\n@Test\n- public void testAttributeConsumingServiceMappersInSpMetadata() throws IOException, ParsingException, URISyntaxException {\n+ public void testAttributeConsumingServiceMappersInSpMetadataWithServiceName() throws IOException, ParsingException, URISyntaxException {\ntry (Closeable idpUpdater = new IdentityProviderAttributeUpdater(identityProviderResource)\n- .setAttribute(SAMLIdentityProviderConfig.ATTRIBUTE_CONSUMING_SERVICE_INDEX, \"12\")\n+ .setAttribute(SAMLIdentityProviderConfig.ATTRIBUTE_CONSUMING_SERVICE_INDEX, \"12\").setAttribute(SAMLIdentityProviderConfig.ATTRIBUTE_CONSUMING_SERVICE_NAME, \"My Attribute Set\")\n.update())\n{\nIdentityProviderMapperRepresentation attrMapperEmail = new IdentityProviderMapperRepresentation();\n@@ -87,12 +109,14 @@ public class KcSamlSpDescriptorTest extends AbstractBrokerTest {\nEntityDescriptorType o = (EntityDescriptorType) parser.parse(new StringInputStream(spDescriptorString));\nSPSSODescriptorType spDescriptor = o.getChoiceType().get(0).getDescriptors().get(0).getSpDescriptor();\n- assertThat(spDescriptor.getAttributeConsumingService().isEmpty(), is(false));\n+ assertThat(spDescriptor.getAttributeConsumingService(), not(empty()));\nassertThat(spDescriptor.getAttributeConsumingService().get(0).getIndex(), is(12));\n- assertThat(spDescriptor.getAttributeConsumingService().get(0).getRequestedAttribute() != null, is(true));\n- assertThat(spDescriptor.getAttributeConsumingService().get(0).getRequestedAttribute().isEmpty(), is(false));\n+ assertThat(spDescriptor.getAttributeConsumingService().get(0).getRequestedAttribute(), notNullValue());\n+ assertThat(spDescriptor.getAttributeConsumingService().get(0).getRequestedAttribute(), not(empty()));\nassertThat(spDescriptor.getAttributeConsumingService().get(0).getRequestedAttribute().get(0).getName(), is(\"email_attr_name\"));\nassertThat(spDescriptor.getAttributeConsumingService().get(0).getRequestedAttribute().get(0).getFriendlyName(), is(\"email_attr_friendlyname\"));\n+ assertThat(spDescriptor.getAttributeConsumingService().get(0).getServiceName(), notNullValue());\n+ assertThat(spDescriptor.getAttributeConsumingService().get(0).getServiceName().get(0).getValue(), is(\"My Attribute Set\"));\n}\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"new_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"diff": "@@ -746,7 +746,7 @@ identity-provider.saml.protocol-endpoints.saml.tooltip=Shows the configuration o\nidentity-provider.saml.attribute-consuming-service-index=Attribute Consuming Service Index\nidentity-provider.saml.attribute-consuming-service-index.tooltip=Index of the Attribute Consuming Service profile to request during authentication\nidentity-provider.saml.attribute-consuming-service-name=Attribute Consuming Service Name\n-identity-provider.saml.attribute-consuming-service-name.tooltip=Name of the Attribute Consuming Service profile to advertise in the SP metadata\n+identity-provider.saml.attribute-consuming-service-name.tooltip=Name of the Attribute Consuming Service profile to advertise in the SP metadata. Default value equal to the realm display name when configured, otherwise equal to the realm name.\nsaml-config=SAML Config\nidentity-provider.saml-config.tooltip=SAML SP and external IDP configuration.\nsingle-signon-service-url=Single Sign-On Service URL\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19388 correct AttributeConsumingService bug in SAML SP metadata |
339,618 | 21.10.2021 10:57:07 | -7,200 | d6ae76d8f21b9fbe28654bff62bc77082f226099 | Update Quarkus to 2.4.0.Final | [
{
"change_type": "MODIFY",
"old_path": "quarkus/pom.xml",
"new_path": "quarkus/pom.xml",
"diff": "<properties>\n<!-- Quarkus version -->\n- <quarkus.version>2.4.0.CR1</quarkus.version>\n+ <quarkus.version>2.4.0.Final</quarkus.version>\n<!--\nOverride versions based on Quarkus dependencies.\n<resteasy.version>4.7.0.Final</resteasy.version>\n<jackson.version>2.12.5</jackson.version>\n<jackson.databind.version>${jackson.version}</jackson.databind.version>\n- <hibernate.core.version>5.6.0.CR1</hibernate.core.version>\n+ <hibernate.core.version>5.6.0.Final</hibernate.core.version>\n<mysql.driver.version>8.0.26</mysql.driver.version>\n<postgresql.version>42.2.24</postgresql.version>\n<microprofile-metrics-api.version>3.0</microprofile-metrics-api.version>\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19599 Update Quarkus to 2.4.0.Final |
339,511 | 16.10.2021 15:59:33 | -32,400 | 0d62c6d498730991b497c320d592da4193acb4b3 | Client Policies : Wrong SecureLogoutExecutor's provider ID | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureLogoutExecutor.java",
"new_path": "services/src/main/java/org/keycloak/services/clientpolicy/executor/SecureLogoutExecutor.java",
"diff": "@@ -65,7 +65,7 @@ public class SecureLogoutExecutor implements ClientPolicyExecutorProvider<Secure\n@Override\npublic String getProviderId() {\n- return PKCEEnforcerExecutorFactory.PROVIDER_ID;\n+ return SecureLogoutExecutorFactory.PROVIDER_ID;\n}\n@Override\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19565 Client Policies : Wrong SecureLogoutExecutor's provider ID |
339,185 | 25.10.2021 16:56:37 | -7,200 | 877ae965900cc5e88d3d3d5beab3b22c5a3263fd | Introduce storage-independent ModelCriteriaBuilder | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/criteria/DefaultModelCriteria.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+package org.keycloak.models.map.storage.criteria;\n+\n+import org.keycloak.models.map.storage.ModelCriteriaBuilder;\n+import org.keycloak.models.map.storage.criteria.ModelCriteriaNode.ExtOperator;\n+import org.keycloak.storage.SearchableModelField;\n+\n+/**\n+ * Descriptive model criteria implementation which in other words represents a Boolean formula on searchable fields.\n+ * @author hmlnarik\n+ */\n+public class DefaultModelCriteria<M> implements ModelCriteriaBuilder<M> {\n+\n+ private final ModelCriteriaNode<M> node;\n+\n+ public DefaultModelCriteria() {\n+ this.node = null;\n+ }\n+\n+ private DefaultModelCriteria(ModelCriteriaNode<M> node) {\n+ this.node = node;\n+ }\n+\n+ @Override\n+ public DefaultModelCriteria<M> compare(SearchableModelField<M> modelField, Operator op, Object... value) {\n+ final ModelCriteriaNode<M> targetNode;\n+ if (isEmpty()) {\n+ targetNode = new ModelCriteriaNode<>(modelField, op, value);\n+ } else if (node.getNodeOperator() == ExtOperator.AND) {\n+ targetNode = node.cloneTree();\n+ targetNode.addChild(new ModelCriteriaNode<>(modelField, op, value));\n+ } else {\n+ targetNode = new ModelCriteriaNode<>(ExtOperator.AND);\n+ targetNode.addChild(node.cloneTree());\n+ targetNode.addChild(new ModelCriteriaNode<>(modelField, op, value));\n+ }\n+ return new DefaultModelCriteria<>(targetNode);\n+ }\n+\n+ @Override\n+ public DefaultModelCriteria<M> and(ModelCriteriaBuilder<M>... mcbs) {\n+ final ModelCriteriaNode<M> targetNode = new ModelCriteriaNode<>(ExtOperator.AND);\n+ for (ModelCriteriaBuilder<M> mcb : mcbs) {\n+ targetNode.addChild(((DefaultModelCriteria<M>) mcb.unwrap(DefaultModelCriteria.class)).node);\n+ }\n+ return new DefaultModelCriteria<>(targetNode);\n+ }\n+\n+ @Override\n+ public DefaultModelCriteria<M> or(ModelCriteriaBuilder<M>... mcbs) {\n+ final ModelCriteriaNode<M> targetNode = new ModelCriteriaNode<>(ExtOperator.OR);\n+ for (ModelCriteriaBuilder<M> mcb : mcbs) {\n+ targetNode.addChild(((DefaultModelCriteria<M>) mcb.unwrap(DefaultModelCriteria.class)).node);\n+ }\n+ return new DefaultModelCriteria<>(targetNode);\n+ }\n+\n+ @Override\n+ public DefaultModelCriteria<M> not(ModelCriteriaBuilder<M> mcb) {\n+ final ModelCriteriaNode<M> targetNode = new ModelCriteriaNode<>(ExtOperator.NOT);\n+ targetNode.addChild(((DefaultModelCriteria<M>) mcb.unwrap(DefaultModelCriteria.class)).node);\n+ return new DefaultModelCriteria<>(targetNode);\n+ }\n+\n+ /**\n+ * Copies contents of this {@code ModelCriteriaBuilder} into\n+ * another {@code ModelCriteriaBuilder}.\n+ * @param mcb {@code ModelCriteriaBuilder} to copy the contents onto\n+ * @return Updated {@code ModelCriteriaBuilder}\n+ */\n+ public ModelCriteriaBuilder<M> flashToModelCriteriaBuilder(ModelCriteriaBuilder<M> mcb) {\n+ return mcb == null ? null : node.flashToModelCriteriaBuilder(mcb);\n+ }\n+\n+ public boolean isEmpty() {\n+ return node == null;\n+ }\n+\n+ @Override\n+ public String toString() {\n+ return isEmpty() ? \"\" : node.toString();\n+ }\n+\n+}\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/criteria/ModelCriteriaNode.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+package org.keycloak.models.map.storage.criteria;\n+\n+import org.keycloak.models.map.storage.ModelCriteriaBuilder;\n+import org.keycloak.models.map.storage.ModelCriteriaBuilder.Operator;\n+import org.keycloak.models.map.storage.tree.DefaultTreeNode;\n+import org.keycloak.storage.SearchableModelField;\n+import java.util.Arrays;\n+import java.util.Collections;\n+import java.util.Objects;\n+import java.util.stream.Collectors;\n+\n+/**\n+ *\n+ * @author hmlnarik\n+ */\n+public class ModelCriteriaNode<M> extends DefaultTreeNode<ModelCriteriaNode<M>> {\n+\n+ public static enum ExtOperator {\n+ AND {\n+ @Override public <M> ModelCriteriaBuilder<M> apply(ModelCriteriaBuilder<M> mcb, ModelCriteriaNode<M> node) {\n+ if (node.getChildren().isEmpty()) {\n+ return null;\n+ }\n+ final ModelCriteriaBuilder[] operands = node.getChildren().stream()\n+ .map(n -> n.flashToModelCriteriaBuilder(mcb))\n+ .filter(Objects::nonNull)\n+ .toArray(ModelCriteriaBuilder[]::new);\n+ return operands.length == 0 ? null : mcb.and(operands);\n+ }\n+ @Override public String toString(ModelCriteriaNode<?> node) {\n+ return \"(\" + node.getChildren().stream().map(ModelCriteriaNode::toString).collect(Collectors.joining(\" && \")) + \")\";\n+ }\n+ },\n+ OR {\n+ @Override public <M> ModelCriteriaBuilder<M> apply(ModelCriteriaBuilder<M> mcb, ModelCriteriaNode<M> node) {\n+ if (node.getChildren().isEmpty()) {\n+ return null;\n+ }\n+ final ModelCriteriaBuilder[] operands = node.getChildren().stream()\n+ .map(n -> n.flashToModelCriteriaBuilder(mcb))\n+ .filter(Objects::nonNull)\n+ .toArray(ModelCriteriaBuilder[]::new);\n+ return operands.length == 0 ? null : mcb.or(operands);\n+ }\n+ @Override public String toString(ModelCriteriaNode<?> node) {\n+ return \"(\" + node.getChildren().stream().map(ModelCriteriaNode::toString).collect(Collectors.joining(\" || \")) + \")\";\n+ }\n+ },\n+ NOT {\n+ @Override public <M> ModelCriteriaBuilder<M> apply(ModelCriteriaBuilder<M> mcb, ModelCriteriaNode<M> node) {\n+ return mcb.not(node.getChildren().iterator().next().flashToModelCriteriaBuilder(mcb));\n+ }\n+ @Override public String toString(ModelCriteriaNode<?> node) {\n+ return \"! \" + node.getChildren().iterator().next().toString();\n+ }\n+ },\n+ SIMPLE_OPERATOR {\n+ @Override public <M> ModelCriteriaBuilder<M> apply(ModelCriteriaBuilder<M> mcb, ModelCriteriaNode<M> node) {\n+ return mcb.compare(\n+ node.field,\n+ node.simpleOperator,\n+ node.simpleOperatorArguments\n+ );\n+ }\n+ @Override public String toString(ModelCriteriaNode<?> node) {\n+ return node.field.getName() + \" \" + node.simpleOperator + \" \" + Arrays.deepToString(node.simpleOperatorArguments);\n+ }\n+ },\n+ ;\n+\n+ public abstract <M> ModelCriteriaBuilder<M> apply(ModelCriteriaBuilder<M> mcbCreator, ModelCriteriaNode<M> node);\n+ public abstract String toString(ModelCriteriaNode<?> node);\n+ }\n+\n+ private final ExtOperator nodeOperator;\n+\n+ private final Operator simpleOperator;\n+\n+ private final SearchableModelField<M> field;\n+\n+ private final Object[] simpleOperatorArguments;\n+\n+ public ModelCriteriaNode(SearchableModelField<M> field, Operator simpleOperator, Object... simpleOperatorArguments) {\n+ super(Collections.emptyMap());\n+ this.simpleOperator = simpleOperator;\n+ this.field = field;\n+ this.simpleOperatorArguments = simpleOperatorArguments;\n+ this.nodeOperator = ExtOperator.SIMPLE_OPERATOR;\n+ }\n+\n+ public ModelCriteriaNode(ExtOperator nodeOperator) {\n+ super(Collections.emptyMap());\n+ this.nodeOperator = nodeOperator;\n+ this.simpleOperator = null;\n+ this.field = null;\n+ this.simpleOperatorArguments = null;\n+ }\n+\n+ private ModelCriteriaNode(ExtOperator nodeOperator, Operator simpleOperator, SearchableModelField<M> field, Object[] simpleOperatorArguments) {\n+ super(Collections.emptyMap());\n+ this.nodeOperator = nodeOperator;\n+ this.simpleOperator = simpleOperator;\n+ this.field = field;\n+ this.simpleOperatorArguments = simpleOperatorArguments;\n+ }\n+\n+ public ExtOperator getNodeOperator() {\n+ return nodeOperator;\n+ }\n+\n+ public ModelCriteriaNode<M> cloneTree() {\n+ return cloneTree(n -> new ModelCriteriaNode<>(n.nodeOperator, n.simpleOperator, n.field, n.simpleOperatorArguments));\n+ }\n+\n+ public ModelCriteriaBuilder<M> flashToModelCriteriaBuilder(ModelCriteriaBuilder<M> mcb) {\n+ final ModelCriteriaBuilder<M> res = nodeOperator.apply(mcb, this);\n+ return res == null ? mcb : res;\n+ }\n+\n+ @Override\n+ public String toString() {\n+ return nodeOperator.toString(this);\n+ }\n+\n+}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/tree/DefaultTreeNode.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/tree/DefaultTreeNode.java",
"diff": "@@ -26,8 +26,8 @@ import java.util.ListIterator;\nimport java.util.Map;\nimport java.util.Optional;\nimport java.util.Queue;\n-import java.util.Stack;\nimport java.util.function.Consumer;\n+import java.util.function.Function;\nimport java.util.function.Predicate;\n/**\n@@ -39,8 +39,8 @@ import java.util.function.Predicate;\n*/\npublic class DefaultTreeNode<Self extends DefaultTreeNode<Self>> implements TreeNode<Self> {\n- private final Map<String, Object> edgeProperties = new HashMap<>();\n- private final Map<String, Object> nodeProperties = new HashMap<>();\n+ private final Map<String, Object> nodeProperties;\n+ private final Map<String, Object> edgeProperties;\nprivate final Map<String, Object> treeProperties;\nprivate final LinkedList<Self> children = new LinkedList<>();\nprivate String id;\n@@ -51,6 +51,14 @@ public class DefaultTreeNode<Self extends DefaultTreeNode<Self>> implements Tree\n*/\nprotected DefaultTreeNode(Map<String, Object> treeProperties) {\nthis.treeProperties = treeProperties;\n+ this.edgeProperties = new HashMap<>();\n+ this.nodeProperties = new HashMap<>();\n+ }\n+\n+ public DefaultTreeNode(Map<String, Object> nodeProperties, Map<String, Object> edgeProperties, Map<String, Object> treeProperties) {\n+ this.nodeProperties = nodeProperties;\n+ this.edgeProperties = edgeProperties;\n+ this.treeProperties = treeProperties;\n}\n@Override\n@@ -106,7 +114,7 @@ public class DefaultTreeNode<Self extends DefaultTreeNode<Self>> implements Tree\n@Override\npublic Optional<Self> findFirstDfs(Predicate<Self> visitor) {\nDeque<Self> stack = new LinkedList<>();\n- stack.add((Self) this);\n+ stack.add(getThis());\nwhile (! stack.isEmpty()) {\nSelf node = stack.pop();\nif (visitor.test(node)) {\n@@ -124,7 +132,7 @@ public class DefaultTreeNode<Self extends DefaultTreeNode<Self>> implements Tree\n@Override\npublic Optional<Self> findFirstBottommostDfs(Predicate<Self> visitor) {\nDeque<Self> stack = new LinkedList<>();\n- stack.add((Self) this);\n+ stack.add(getThis());\nwhile (! stack.isEmpty()) {\nSelf node = stack.pop();\nif (visitor.test(node)) {\n@@ -149,7 +157,7 @@ public class DefaultTreeNode<Self extends DefaultTreeNode<Self>> implements Tree\n@Override\npublic Optional<Self> findFirstBfs(Predicate<Self> visitor) {\nQueue<Self> queue = new LinkedList<>();\n- queue.add((Self) this);\n+ queue.add(getThis());\nwhile (! queue.isEmpty()) {\nSelf node = queue.poll();\nif (visitor.test(node)) {\n@@ -165,7 +173,7 @@ public class DefaultTreeNode<Self extends DefaultTreeNode<Self>> implements Tree\npublic List<Self> getPathToRoot(PathOrientation orientation) {\nLinkedList<Self> res = new LinkedList<>();\nConsumer<Self> addFunc = orientation == PathOrientation.BOTTOM_FIRST ? res::addLast : res::addFirst;\n- Optional<Self> p = Optional.of((Self) this);\n+ Optional<Self> p = Optional.of(getThis());\nwhile (p.isPresent()) {\naddFunc.accept(p.get());\np = p.get().getParent();\n@@ -186,7 +194,7 @@ public class DefaultTreeNode<Self extends DefaultTreeNode<Self>> implements Tree\nif (! this.children.contains(node)) {\nthis.children.add(node);\n}\n- node.setParent((Self) this);\n+ node.setParent(getThis());\n// Prevent setting a parent of this node as a child of this node. In such a case, remove the parent of this node\nfor (Optional<Self> p = getParent(); p.isPresent(); p = p.get().getParent()) {\n@@ -205,7 +213,7 @@ public class DefaultTreeNode<Self extends DefaultTreeNode<Self>> implements Tree\nif (! this.children.contains(node)) {\nthis.children.add(index, node);\n}\n- node.setParent((Self) this);\n+ node.setParent(getThis());\n// Prevent setting a parent of this node as a child of this node. In such a case, remove the parent of this node\nfor (Optional<Self> p = getParent(); p.isPresent(); p = p.get().getParent()) {\n@@ -276,12 +284,23 @@ public class DefaultTreeNode<Self extends DefaultTreeNode<Self>> implements Tree\nif (this.parent != null) {\nSelf previousParent = this.parent;\nthis.parent = null;\n- previousParent.removeChild((Self) this);\n+ previousParent.removeChild(getThis());\n}\nif (parent != null) {\nthis.parent = parent;\n- parent.addChild((Self) this);\n+ parent.addChild(getThis());\n+ }\n}\n+\n+ public <RNode extends TreeNode<? super RNode>> RNode cloneTree(Function<Self, RNode> instantiateFunc) {\n+ final RNode res = instantiateFunc.apply(getThis());\n+ this.getChildren().forEach(c -> res.addChild(c.cloneTree(instantiateFunc)));\n+ return res;\n+ }\n+\n+ @SuppressWarnings(\"unchecked\")\n+ private Self getThis() {\n+ return (Self) this;\n}\n}\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "model/map/src/test/java/org/keycloak/models/map/storage/criteria/DefaultModelCriteriaTest.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+package org.keycloak.models.map.storage.criteria;\n+\n+import org.keycloak.models.ClientModel;\n+import org.keycloak.models.map.storage.ModelCriteriaBuilder.Operator;\n+import static org.hamcrest.MatcherAssert.assertThat;\n+import org.junit.Test;\n+import static org.hamcrest.Matchers.hasToString;\n+import static org.keycloak.models.ClientModel.SearchableFields.*;\n+\n+/**\n+ *\n+ * @author hmlnarik\n+ */\n+public class DefaultModelCriteriaTest {\n+\n+ @Test\n+ public void testSimpleCompare() {\n+ DefaultModelCriteria<ClientModel> v = new DefaultModelCriteria<>();\n+ assertThat(v.compare(CLIENT_ID, Operator.EQ, 3), hasToString(\"clientId EQ [3]\"));\n+ assertThat(v.compare(CLIENT_ID, Operator.EQ, 4).compare(ID, Operator.EQ, 5), hasToString(\"(clientId EQ [4] && id EQ [5])\"));\n+ }\n+\n+ @Test\n+ public void testSimpleCompareAnd() {\n+ DefaultModelCriteria<ClientModel> v = new DefaultModelCriteria<>();\n+ assertThat(v.and(v.compare(CLIENT_ID, Operator.EQ, 3)), hasToString(\"(clientId EQ [3])\"));\n+ assertThat(v.and(v.compare(CLIENT_ID, Operator.EQ, 4).compare(ID, Operator.EQ, 5)), hasToString(\"((clientId EQ [4] && id EQ [5]))\"));\n+ assertThat(v.and(v.compare(CLIENT_ID, Operator.EQ, 4), v.compare(ID, Operator.EQ, 5)), hasToString(\"(clientId EQ [4] && id EQ [5])\"));\n+ }\n+\n+ @Test\n+ public void testSimpleCompareOr() {\n+ DefaultModelCriteria<ClientModel> v = new DefaultModelCriteria<>();\n+ assertThat(v.or(v.compare(CLIENT_ID, Operator.EQ, 3)), hasToString(\"(clientId EQ [3])\"));\n+ assertThat(v.or(v.compare(CLIENT_ID, Operator.EQ, 4).compare(ID, Operator.EQ, 5)), hasToString(\"((clientId EQ [4] && id EQ [5]))\"));\n+ assertThat(v.or(v.compare(CLIENT_ID, Operator.EQ, 4), v.compare(ID, Operator.EQ, 5)), hasToString(\"(clientId EQ [4] || id EQ [5])\"));\n+ }\n+\n+ @Test\n+ public void testSimpleCompareAndOr() {\n+ DefaultModelCriteria<ClientModel> v = new DefaultModelCriteria<>();\n+ assertThat(v.or(\n+ v.and(\n+ v.compare(CLIENT_ID, Operator.EQ, 4),\n+ v.compare(ID, Operator.EQ, 5)\n+ ),\n+ v.compare(ATTRIBUTE, Operator.EQ, \"city\", \"Ankh-Morpork\")\n+ ), hasToString(\"((clientId EQ [4] && id EQ [5]) || attribute EQ [city, Ankh-Morpork])\"));\n+ }\n+\n+ @Test\n+ public void testComplexCompareAndOr() {\n+ DefaultModelCriteria<ClientModel> v = new DefaultModelCriteria<>();\n+ assertThat(v.or(\n+ v.and(\n+ v.compare(CLIENT_ID, Operator.EQ, 4),\n+ v.compare(REALM_ID, Operator.EQ, \"aa\")\n+ ),\n+ v.not(v.compare(ID, Operator.EQ, 5))\n+ ),\n+ hasToString(\"((clientId EQ [4] && realmId EQ [aa]) || ! id EQ [5])\")\n+ );\n+\n+ assertThat(v.or(\n+ v.and(\n+ v.compare(CLIENT_ID, Operator.EQ, 4),\n+ v.compare(REALM_ID, Operator.EQ, \"aa\")\n+ ),\n+ v.not(\n+ v.compare(ID, Operator.EQ, 5)\n+ ).compare(ENABLED, Operator.EQ, \"true\")\n+ ),\n+ hasToString(\"((clientId EQ [4] && realmId EQ [aa]) || (! id EQ [5] && enabled EQ [true]))\")\n+ );\n+ }\n+\n+ @Test\n+ public void testFlashingToAnotherMCB() {\n+ DefaultModelCriteria<ClientModel> v = new DefaultModelCriteria<>();\n+ assertThat(v.or(\n+ v.and(\n+ v.compare(CLIENT_ID, Operator.EQ, 4),\n+ v.compare(REALM_ID, Operator.EQ, \"aa\")\n+ ),\n+ v.not(v.compare(ID, Operator.EQ, 5))\n+ ).flashToModelCriteriaBuilder(new DefaultModelCriteria<>()),\n+ hasToString(\"((clientId EQ [4] && realmId EQ [aa]) || ! id EQ [5])\")\n+ );\n+\n+ assertThat(v.or(\n+ v.and(\n+ v.compare(CLIENT_ID, Operator.EQ, 4),\n+ v.compare(REALM_ID, Operator.EQ, \"aa\")\n+ ),\n+ v.not(\n+ v.compare(ID, Operator.EQ, 5)\n+ ).compare(ENABLED, Operator.EQ, \"true\")\n+ ).flashToModelCriteriaBuilder(new DefaultModelCriteria<>()),\n+ hasToString(\"((clientId EQ [4] && realmId EQ [aa]) || (! id EQ [5] && enabled EQ [true]))\")\n+ );\n+ }\n+\n+}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18854 Introduce storage-independent ModelCriteriaBuilder |
339,492 | 03.09.2021 10:20:04 | 10,800 | a2a788ec393b45ce8a7fdd4b996e17051328ba0a | Oracle test fixes | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/actions/RequiredActionUpdateProfileWithUserProfileTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/actions/RequiredActionUpdateProfileWithUserProfileTest.java",
"diff": "*/\npackage org.keycloak.testsuite.actions;\n+import static org.hamcrest.CoreMatchers.is;\n+import static org.hamcrest.MatcherAssert.assertThat;\nimport static org.junit.Assert.assertEquals;\nimport static org.junit.Assert.assertFalse;\nimport static org.junit.Assert.assertTrue;\n@@ -31,6 +33,7 @@ import static org.keycloak.testsuite.forms.VerifyProfileTest.CONFIGURATION_FOR_U\nimport java.util.ArrayList;\nimport java.util.Collections;\n+import org.apache.commons.lang3.StringUtils;\nimport org.junit.Assert;\nimport org.junit.Before;\nimport org.junit.Test;\n@@ -48,7 +51,6 @@ import org.keycloak.testsuite.forms.VerifyProfileTest;\nimport org.keycloak.testsuite.pages.AppPage.RequestType;\nimport org.keycloak.testsuite.util.ClientScopeBuilder;\nimport org.keycloak.testsuite.util.KeycloakModelUtils;\n-import org.keycloak.userprofile.EventAuditingAttributeChangeListener;\nimport org.openqa.selenium.By;\n/**\n@@ -295,7 +297,7 @@ public class RequiredActionUpdateProfileWithUserProfileTest extends RequiredActi\n// assert user is really updated in persistent store\nUserRepresentation user = ActionUtil.findUserWithAdminClient(adminClient, USERNAME1);\nAssert.assertEquals(\"New first\", user.getFirstName());\n- Assert.assertEquals(\"\", user.getLastName());\n+ assertThat(StringUtils.isEmpty(user.getLastName()), is(true));\nAssert.assertEquals(\"[email protected]\", user.getEmail());\nAssert.assertEquals(USERNAME1, user.getUsername());\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/KcOidcFirstBrokerLoginWithUserProfileTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/KcOidcFirstBrokerLoginWithUserProfileTest.java",
"diff": "*/\npackage org.keycloak.testsuite.broker;\n+import static org.hamcrest.CoreMatchers.is;\n+import static org.hamcrest.MatcherAssert.assertThat;\nimport static org.junit.Assert.assertEquals;\nimport static org.keycloak.testsuite.broker.BrokerTestTools.getConsumerRoot;\nimport static org.keycloak.testsuite.broker.BrokerTestTools.waitForPage;\n@@ -23,6 +25,7 @@ import static org.keycloak.testsuite.forms.VerifyProfileTest.ATTRIBUTE_DEPARTMEN\nimport static org.keycloak.testsuite.forms.VerifyProfileTest.PERMISSIONS_ADMIN_EDITABLE;\nimport static org.keycloak.testsuite.forms.VerifyProfileTest.PERMISSIONS_ALL;\n+import org.apache.commons.lang3.StringUtils;\nimport org.junit.Assert;\nimport org.junit.Before;\nimport org.junit.Test;\n@@ -355,7 +358,7 @@ public class KcOidcFirstBrokerLoginWithUserProfileTest extends KcOidcFirstBroker\nUserRepresentation user = VerifyProfileTest.getUserByUsername(testRealm(),\"attributeNotRequiredAndSelectedByScopeCanBeIgnored\");\nassertEquals(\"FirstAA\", user.getFirstName());\nassertEquals(\"LastAA\", user.getLastName());\n- assertEquals(\"\", user.firstAttribute(ATTRIBUTE_DEPARTMENT));\n+ assertThat(StringUtils.isEmpty(user.firstAttribute(ATTRIBUTE_DEPARTMENT)), is(true));\n}\n@Test\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/RegisterWithUserProfileTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/RegisterWithUserProfileTest.java",
"diff": "*/\npackage org.keycloak.testsuite.forms;\n+import static org.hamcrest.CoreMatchers.is;\n+import static org.hamcrest.MatcherAssert.assertThat;\nimport static org.junit.Assert.assertEquals;\nimport static org.keycloak.testsuite.forms.VerifyProfileTest.PERMISSIONS_ALL;\n@@ -28,6 +30,7 @@ import java.util.ArrayList;\nimport java.util.Collections;\nimport java.util.List;\n+import org.apache.commons.lang3.StringUtils;\nimport org.junit.Assert;\nimport org.junit.Before;\nimport org.junit.Test;\n@@ -545,7 +548,7 @@ public class RegisterWithUserProfileTest extends RegisterTest {\nUserRepresentation user = getUser(userId);\nassertEquals(\"FirstAA\", user.getFirstName());\nassertEquals(\"LastAA\", user.getLastName());\n- assertEquals(\"\", user.firstAttribute(ATTRIBUTE_DEPARTMENT));\n+ assertThat(StringUtils.isEmpty(user.firstAttribute(ATTRIBUTE_DEPARTMENT)), is(true));\n}\n@Test\n@@ -613,7 +616,12 @@ public class RegisterWithUserProfileTest extends RegisterTest {\nassertEquals(username.toLowerCase(), user.getUsername());\nassertEquals(email.toLowerCase(), user.getEmail());\nassertEquals(firstName, user.getFirstName());\n- assertEquals(lastName, user.getLastName());\n+\n+ if (StringUtils.isEmpty(lastName)) {\n+ assertThat(StringUtils.isEmpty(user.getLastName()), is(true));\n+ } else {\n+ assertThat(user.getLastName(), is(lastName));\n+ }\n}\nprotected void setUserProfileConfiguration(String configuration) {\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/VerifyProfileTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/VerifyProfileTest.java",
"diff": "*/\npackage org.keycloak.testsuite.forms;\n+import static org.hamcrest.CoreMatchers.is;\n+import static org.hamcrest.MatcherAssert.assertThat;\nimport static org.junit.Assert.assertEquals;\nimport static org.junit.Assert.assertFalse;\nimport static org.junit.Assert.assertTrue;\n@@ -29,6 +31,7 @@ import java.util.UUID;\nimport javax.ws.rs.core.Response;\n+import org.apache.commons.lang3.StringUtils;\nimport org.jboss.arquillian.graphene.page.Page;\nimport org.jboss.arquillian.test.api.ArquillianResource;\nimport org.junit.Assert;\n@@ -58,7 +61,6 @@ import org.keycloak.testsuite.util.OAuthClient;\nimport org.keycloak.testsuite.util.RealmBuilder;\nimport org.keycloak.testsuite.util.UserBuilder;\nimport org.keycloak.userprofile.UserProfileContext;\n-import org.keycloak.userprofile.EventAuditingAttributeChangeListener;\nimport org.openqa.selenium.By;\n/**\n@@ -420,7 +422,7 @@ public class VerifyProfileTest extends AbstractTestRealmKeycloakTest {\nUserRepresentation user = getUser(user2Id);\nassertEquals(\"First\", user.getFirstName());\n- assertEquals(\"\", user.getLastName());\n+ assertThat(StringUtils.isEmpty(user.getLastName()), is(true));\n}\n@Test\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18401 Oracle test fixes |
339,706 | 01.11.2021 13:53:05 | 14,400 | 62482eb313de4b4e0c9ae922746edd962ecb540d | Server error (NullPointerException) when trying to view users using KeycloakServer | [
{
"change_type": "MODIFY",
"old_path": "testsuite/utils/src/main/resources/META-INF/keycloak-server.json",
"new_path": "testsuite/utils/src/main/resources/META-INF/keycloak-server.json",
"diff": "},\n\"userProfile\": {\n- \"provider\": \"${keycloak.userProfile.provider:}\",\n+ \"provider\": \"${keycloak.userProfile.provider:declarative-user-profile}\",\n\"declarative-user-profile\": {\n\"read-only-attributes\": [ \"deniedFoo\", \"deniedBar*\", \"deniedSome/thing\", \"deniedsome*thing\" ],\n\"admin-read-only-attributes\": [ \"deniedSomeAdmin\" ]\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19721: Server error (NullPointerException) when trying to view users using KeycloakServer |
339,185 | 01.11.2021 13:18:52 | -3,600 | 6966e0cfe9e19dc822b899d11253e818f736d436 | Optimize DefaultModelCriteria creation | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/ModelCriteriaBuilder.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/ModelCriteriaBuilder.java",
"diff": "@@ -117,7 +117,7 @@ public interface ModelCriteriaBuilder<M> {\n* @return\n* @throws CriterionNotSupported If the operator is not supported for the given field.\n*/\n- ModelCriteriaBuilder<M> compare(SearchableModelField<M> modelField, Operator op, Object... value);\n+ ModelCriteriaBuilder<M> compare(SearchableModelField<? super M> modelField, Operator op, Object... value);\n/**\n* Creates and returns a new instance of {@code ModelCriteriaBuilder} that\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorage.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorage.java",
"diff": "@@ -53,7 +53,7 @@ public class ConcurrentHashMapStorage<K, V extends AbstractEntity & UpdatableEnt\nprotected final ConcurrentMap<K, V> store = new ConcurrentHashMap<>();\n- protected final Map<SearchableModelField<M>, UpdatePredicatesFunc<K, V, M>> fieldPredicates;\n+ protected final Map<SearchableModelField<? super M>, UpdatePredicatesFunc<K, V, M>> fieldPredicates;\nprotected final StringKeyConvertor<K> keyConvertor;\nprotected final DeepCloner cloner;\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/MapFieldPredicates.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/MapFieldPredicates.java",
"diff": "@@ -527,7 +527,7 @@ public class MapFieldPredicates {\n}\n@SuppressWarnings(\"unchecked\")\n- public static <K, V extends AbstractEntity, M> Map<SearchableModelField<M>, UpdatePredicatesFunc<K, V, M>> getPredicates(Class<M> clazz) {\n+ public static <K, V extends AbstractEntity, M> Map<SearchableModelField<? super M>, UpdatePredicatesFunc<K, V, M>> getPredicates(Class<M> clazz) {\nreturn PREDICATES.get(clazz);\n}\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/MapModelCriteriaBuilder.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/MapModelCriteriaBuilder.java",
"diff": "@@ -43,14 +43,14 @@ public class MapModelCriteriaBuilder<K, V extends AbstractEntity, M> implements\nprivate static final Predicate<Object> ALWAYS_FALSE = (e) -> false;\nprivate final Predicate<? super K> keyFilter;\nprivate final Predicate<? super V> entityFilter;\n- private final Map<SearchableModelField<M>, UpdatePredicatesFunc<K, V, M>> fieldPredicates;\n+ private final Map<SearchableModelField<? super M>, UpdatePredicatesFunc<K, V, M>> fieldPredicates;\nprivate final StringKeyConvertor<K> keyConvertor;\n- public MapModelCriteriaBuilder(StringKeyConvertor<K> keyConvertor, Map<SearchableModelField<M>, UpdatePredicatesFunc<K, V, M>> fieldPredicates) {\n+ public MapModelCriteriaBuilder(StringKeyConvertor<K> keyConvertor, Map<SearchableModelField<? super M>, UpdatePredicatesFunc<K, V, M>> fieldPredicates) {\nthis(keyConvertor, fieldPredicates, ALWAYS_TRUE, ALWAYS_TRUE);\n}\n- private MapModelCriteriaBuilder(StringKeyConvertor<K> keyConvertor, Map<SearchableModelField<M>, UpdatePredicatesFunc<K, V, M>> fieldPredicates, Predicate<? super K> indexReadFilter, Predicate<? super V> sequentialReadFilter) {\n+ private MapModelCriteriaBuilder(StringKeyConvertor<K> keyConvertor, Map<SearchableModelField<? super M>, UpdatePredicatesFunc<K, V, M>> fieldPredicates, Predicate<? super K> indexReadFilter, Predicate<? super V> sequentialReadFilter) {\nthis.keyConvertor = keyConvertor;\nthis.fieldPredicates = fieldPredicates;\nthis.keyFilter = indexReadFilter;\n@@ -58,7 +58,7 @@ public class MapModelCriteriaBuilder<K, V extends AbstractEntity, M> implements\n}\n@Override\n- public MapModelCriteriaBuilder<K, V, M> compare(SearchableModelField<M> modelField, Operator op, Object... values) {\n+ public MapModelCriteriaBuilder<K, V, M> compare(SearchableModelField<? super M> modelField, Operator op, Object... values) {\nUpdatePredicatesFunc<K, V, M> method = fieldPredicates.get(modelField);\nif (method == null) {\nthrow new IllegalArgumentException(\"Filter not implemented for field \" + modelField);\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/criteria/DefaultModelCriteria.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/criteria/DefaultModelCriteria.java",
"diff": "@@ -19,6 +19,8 @@ package org.keycloak.models.map.storage.criteria;\nimport org.keycloak.models.map.storage.ModelCriteriaBuilder;\nimport org.keycloak.models.map.storage.criteria.ModelCriteriaNode.ExtOperator;\nimport org.keycloak.storage.SearchableModelField;\n+import java.util.concurrent.atomic.AtomicBoolean;\n+import java.util.stream.Stream;\n/**\n* Descriptive model criteria implementation which in other words represents a Boolean formula on searchable fields.\n@@ -26,55 +28,113 @@ import org.keycloak.storage.SearchableModelField;\n*/\npublic class DefaultModelCriteria<M> implements ModelCriteriaBuilder<M> {\n- private final ModelCriteriaNode<M> node;\n+ private static final DefaultModelCriteria<?> INSTANCE = new DefaultModelCriteria<>(null);\n- public DefaultModelCriteria() {\n- this.node = null;\n- }\n+ private final ModelCriteriaNode<M> node;\nprivate DefaultModelCriteria(ModelCriteriaNode<M> node) {\nthis.node = node;\n}\n+ public static <M> DefaultModelCriteria<M> criteria() {\n+ return (DefaultModelCriteria<M>) INSTANCE;\n+ }\n+\n@Override\n- public DefaultModelCriteria<M> compare(SearchableModelField<M> modelField, Operator op, Object... value) {\n- final ModelCriteriaNode<M> targetNode;\n+ public DefaultModelCriteria<M> compare(SearchableModelField<? super M> modelField, Operator op, Object... value) {\n+ return compare(new ModelCriteriaNode<>(modelField, op, value));\n+ }\n+\n+ private DefaultModelCriteria<M> compare(final ModelCriteriaNode<M> nodeToAdd) {\n+ ModelCriteriaNode<M> targetNode;\n+\nif (isEmpty()) {\n- targetNode = new ModelCriteriaNode<>(modelField, op, value);\n+ targetNode = nodeToAdd;\n} else if (node.getNodeOperator() == ExtOperator.AND) {\ntargetNode = node.cloneTree();\n- targetNode.addChild(new ModelCriteriaNode<>(modelField, op, value));\n+ targetNode.addChild(nodeToAdd);\n} else {\ntargetNode = new ModelCriteriaNode<>(ExtOperator.AND);\ntargetNode.addChild(node.cloneTree());\n- targetNode.addChild(new ModelCriteriaNode<>(modelField, op, value));\n+ targetNode.addChild(nodeToAdd);\n}\n+\nreturn new DefaultModelCriteria<>(targetNode);\n}\n@Override\npublic DefaultModelCriteria<M> and(ModelCriteriaBuilder<M>... mcbs) {\n+ if (mcbs.length == 1) {\n+ ModelCriteriaNode<M> toBeChild = ((DefaultModelCriteria<M>) mcbs[0].unwrap(DefaultModelCriteria.class)).node;\n+ if (toBeChild.getNodeOperator() == ExtOperator.AND || toBeChild.getNodeOperator() == ExtOperator.OR) {\n+ return ((DefaultModelCriteria<M>) mcbs[0].unwrap(DefaultModelCriteria.class));\n+ }\n+ }\n+\nfinal ModelCriteriaNode<M> targetNode = new ModelCriteriaNode<>(ExtOperator.AND);\n+ AtomicBoolean hasFalseNode = new AtomicBoolean(false);\nfor (ModelCriteriaBuilder<M> mcb : mcbs) {\n- targetNode.addChild(((DefaultModelCriteria<M>) mcb.unwrap(DefaultModelCriteria.class)).node);\n+ final ModelCriteriaNode<M> nodeToAdd = ((DefaultModelCriteria<M>) mcb.unwrap(DefaultModelCriteria.class)).node;\n+ getNodesToAddForAndOr(nodeToAdd, ExtOperator.AND)\n+ .filter(ModelCriteriaNode::isNotTrueNode)\n+ .peek(n -> { if (n.isFalseNode()) hasFalseNode.lazySet(true); })\n+ .map(ModelCriteriaNode::cloneTree)\n+ .forEach(targetNode::addChild);\n+\n+ if (hasFalseNode.get()) {\n+ return compare(new ModelCriteriaNode<>(ExtOperator.__FALSE__));\n}\n- return new DefaultModelCriteria<>(targetNode);\n+ }\n+\n+ if (targetNode.getChildren().isEmpty()) {\n+ // AND on empty set of formulae is TRUE: It does hold that there all formulae are satisfied\n+ return compare(new ModelCriteriaNode<>(ExtOperator.__TRUE__));\n+ }\n+\n+ return compare(targetNode);\n}\n@Override\npublic DefaultModelCriteria<M> or(ModelCriteriaBuilder<M>... mcbs) {\n+ if (mcbs.length == 1) {\n+ ModelCriteriaNode<M> toBeChild = ((DefaultModelCriteria<M>) mcbs[0].unwrap(DefaultModelCriteria.class)).node;\n+ if (toBeChild.getNodeOperator() == ExtOperator.AND || toBeChild.getNodeOperator() == ExtOperator.OR) {\n+ return ((DefaultModelCriteria<M>) mcbs[0].unwrap(DefaultModelCriteria.class));\n+ }\n+ }\n+\nfinal ModelCriteriaNode<M> targetNode = new ModelCriteriaNode<>(ExtOperator.OR);\n+ AtomicBoolean hasTrueNode = new AtomicBoolean(false);\nfor (ModelCriteriaBuilder<M> mcb : mcbs) {\n- targetNode.addChild(((DefaultModelCriteria<M>) mcb.unwrap(DefaultModelCriteria.class)).node);\n+ final ModelCriteriaNode<M> nodeToAdd = ((DefaultModelCriteria<M>) mcb.unwrap(DefaultModelCriteria.class)).node;\n+ getNodesToAddForAndOr(nodeToAdd, ExtOperator.OR)\n+ .filter(ModelCriteriaNode::isNotFalseNode)\n+ .peek(n -> { if (n.isTrueNode()) hasTrueNode.lazySet(true); })\n+ .map(ModelCriteriaNode::cloneTree)\n+ .forEach(targetNode::addChild);\n+\n+ if (hasTrueNode.get()) {\n+ return compare(new ModelCriteriaNode<>(ExtOperator.__TRUE__));\n}\n- return new DefaultModelCriteria<>(targetNode);\n+ }\n+\n+ if (targetNode.getChildren().isEmpty()) {\n+ // OR on empty set of formulae is FALSE: It does not hold that there is at least one satisfied formula\n+ return compare(new ModelCriteriaNode<>(ExtOperator.__FALSE__));\n+ }\n+\n+ return compare(targetNode);\n}\n@Override\npublic DefaultModelCriteria<M> not(ModelCriteriaBuilder<M> mcb) {\nfinal ModelCriteriaNode<M> targetNode = new ModelCriteriaNode<>(ExtOperator.NOT);\n- targetNode.addChild(((DefaultModelCriteria<M>) mcb.unwrap(DefaultModelCriteria.class)).node);\n- return new DefaultModelCriteria<>(targetNode);\n+ ModelCriteriaNode<M> toBeChild = ((DefaultModelCriteria<M>) mcb.unwrap(DefaultModelCriteria.class)).node;\n+ if (toBeChild.getNodeOperator() == ExtOperator.NOT) {\n+ return compare(toBeChild.getChildren().get(0).cloneTree());\n+ }\n+ targetNode.addChild(toBeChild.cloneTree());\n+ return compare(targetNode);\n}\n/**\n@@ -83,10 +143,35 @@ public class DefaultModelCriteria<M> implements ModelCriteriaBuilder<M> {\n* @param mcb {@code ModelCriteriaBuilder} to copy the contents onto\n* @return Updated {@code ModelCriteriaBuilder}\n*/\n- public ModelCriteriaBuilder<M> flashToModelCriteriaBuilder(ModelCriteriaBuilder<M> mcb) {\n+ public <C extends ModelCriteriaBuilder<M>> C flashToModelCriteriaBuilder(C mcb) {\nreturn mcb == null ? null : node.flashToModelCriteriaBuilder(mcb);\n}\n+ /**\n+ * Optimizes this formula into another {@code ModelCriteriaBuilder}, using the values of\n+ * {@link ExtOperator#__TRUE__} and {@link ExtOperator#__FALSE__} accordingly.\n+ * @return New instance of {@code }\n+ */\n+ public DefaultModelCriteria<M> optimize() {\n+ return flashToModelCriteriaBuilder(criteria());\n+ }\n+\n+ @FunctionalInterface\n+ public interface AtomicFormulaTester<M> {\n+ public Boolean test(SearchableModelField<? super M> field, Operator operator, Object[] operatorArguments);\n+ }\n+\n+ public DefaultModelCriteria<M> partiallyEvaluate(AtomicFormulaTester<M> tester) {\n+ return new DefaultModelCriteria<>(node.cloneTree((field, operator, operatorArguments) -> {\n+ Boolean res = tester.test(field, operator, operatorArguments);\n+ if (res == null) {\n+ return new ModelCriteriaNode<>(field, operator, operatorArguments);\n+ } else {\n+ return new ModelCriteriaNode<>(res ? ExtOperator.__TRUE__ : ExtOperator.__FALSE__);\n+ }\n+ }, ModelCriteriaNode::new));\n+ }\n+\npublic boolean isEmpty() {\nreturn node == null;\n}\n@@ -96,4 +181,14 @@ public class DefaultModelCriteria<M> implements ModelCriteriaBuilder<M> {\nreturn isEmpty() ? \"\" : node.toString();\n}\n+ private Stream<ModelCriteriaNode<M>> getNodesToAddForAndOr(ModelCriteriaNode<M> nodeToAdd, ExtOperator operatorBeingAdded) {\n+ final ExtOperator op = nodeToAdd.getNodeOperator();\n+\n+ if (op == operatorBeingAdded) {\n+ return nodeToAdd.getChildren().stream();\n+ }\n+\n+ return Stream.of(nodeToAdd);\n+ }\n+\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/criteria/ModelCriteriaNode.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/criteria/ModelCriteriaNode.java",
"diff": "@@ -23,17 +23,19 @@ import org.keycloak.storage.SearchableModelField;\nimport java.util.Arrays;\nimport java.util.Collections;\nimport java.util.Objects;\n+import java.util.function.Function;\nimport java.util.stream.Collectors;\n+import java.util.stream.Stream;\n/**\n- *\n+ * TODO: Introduce separation of parameter values and the structure\n* @author hmlnarik\n*/\npublic class ModelCriteriaNode<M> extends DefaultTreeNode<ModelCriteriaNode<M>> {\npublic static enum ExtOperator {\nAND {\n- @Override public <M> ModelCriteriaBuilder<M> apply(ModelCriteriaBuilder<M> mcb, ModelCriteriaNode<M> node) {\n+ @Override public <M, C extends ModelCriteriaBuilder<M>> C apply(C mcb, ModelCriteriaNode<M> node) {\nif (node.getChildren().isEmpty()) {\nreturn null;\n}\n@@ -41,14 +43,14 @@ public class ModelCriteriaNode<M> extends DefaultTreeNode<ModelCriteriaNode<M>>\n.map(n -> n.flashToModelCriteriaBuilder(mcb))\n.filter(Objects::nonNull)\n.toArray(ModelCriteriaBuilder[]::new);\n- return operands.length == 0 ? null : mcb.and(operands);\n+ return operands.length == 0 ? null : (C) mcb.and(operands);\n}\n@Override public String toString(ModelCriteriaNode<?> node) {\nreturn \"(\" + node.getChildren().stream().map(ModelCriteriaNode::toString).collect(Collectors.joining(\" && \")) + \")\";\n}\n},\nOR {\n- @Override public <M> ModelCriteriaBuilder<M> apply(ModelCriteriaBuilder<M> mcb, ModelCriteriaNode<M> node) {\n+ @Override public <M, C extends ModelCriteriaBuilder<M>> C apply(C mcb, ModelCriteriaNode<M> node) {\nif (node.getChildren().isEmpty()) {\nreturn null;\n}\n@@ -56,23 +58,23 @@ public class ModelCriteriaNode<M> extends DefaultTreeNode<ModelCriteriaNode<M>>\n.map(n -> n.flashToModelCriteriaBuilder(mcb))\n.filter(Objects::nonNull)\n.toArray(ModelCriteriaBuilder[]::new);\n- return operands.length == 0 ? null : mcb.or(operands);\n+ return operands.length == 0 ? null : (C) mcb.or(operands);\n}\n@Override public String toString(ModelCriteriaNode<?> node) {\nreturn \"(\" + node.getChildren().stream().map(ModelCriteriaNode::toString).collect(Collectors.joining(\" || \")) + \")\";\n}\n},\nNOT {\n- @Override public <M> ModelCriteriaBuilder<M> apply(ModelCriteriaBuilder<M> mcb, ModelCriteriaNode<M> node) {\n- return mcb.not(node.getChildren().iterator().next().flashToModelCriteriaBuilder(mcb));\n+ @Override public <M, C extends ModelCriteriaBuilder<M>> C apply(C mcb, ModelCriteriaNode<M> node) {\n+ return (C) mcb.not(node.getChildren().iterator().next().flashToModelCriteriaBuilder(mcb));\n}\n@Override public String toString(ModelCriteriaNode<?> node) {\nreturn \"! \" + node.getChildren().iterator().next().toString();\n}\n},\n- SIMPLE_OPERATOR {\n- @Override public <M> ModelCriteriaBuilder<M> apply(ModelCriteriaBuilder<M> mcb, ModelCriteriaNode<M> node) {\n- return mcb.compare(\n+ ATOMIC_FORMULA {\n+ @Override public <M, C extends ModelCriteriaBuilder<M>> C apply(C mcb, ModelCriteriaNode<M> node) {\n+ return (C) mcb.compare(\nnode.field,\nnode.simpleOperator,\nnode.simpleOperatorArguments\n@@ -82,9 +84,25 @@ public class ModelCriteriaNode<M> extends DefaultTreeNode<ModelCriteriaNode<M>>\nreturn node.field.getName() + \" \" + node.simpleOperator + \" \" + Arrays.deepToString(node.simpleOperatorArguments);\n}\n},\n+ __FALSE__ {\n+ @Override public <M, C extends ModelCriteriaBuilder<M>> C apply(C mcb, ModelCriteriaNode<M> node) {\n+ return (C) mcb.or();\n+ }\n+ @Override public String toString(ModelCriteriaNode<?> node) {\n+ return \"__FALSE__\";\n+ }\n+ },\n+ __TRUE__ {\n+ @Override public <M, C extends ModelCriteriaBuilder<M>> C apply(C mcb, ModelCriteriaNode<M> node) {\n+ return (C) mcb.and();\n+ }\n+ @Override public String toString(ModelCriteriaNode<?> node) {\n+ return \"__TRUE__\";\n+ }\n+ }\n;\n- public abstract <M> ModelCriteriaBuilder<M> apply(ModelCriteriaBuilder<M> mcbCreator, ModelCriteriaNode<M> node);\n+ public abstract <M, C extends ModelCriteriaBuilder<M>> C apply(C mcbCreator, ModelCriteriaNode<M> node);\npublic abstract String toString(ModelCriteriaNode<?> node);\n}\n@@ -92,16 +110,27 @@ public class ModelCriteriaNode<M> extends DefaultTreeNode<ModelCriteriaNode<M>>\nprivate final Operator simpleOperator;\n- private final SearchableModelField<M> field;\n+ private final SearchableModelField<? super M> field;\nprivate final Object[] simpleOperatorArguments;\n- public ModelCriteriaNode(SearchableModelField<M> field, Operator simpleOperator, Object... simpleOperatorArguments) {\n+ public ModelCriteriaNode(SearchableModelField<? super M> field, Operator simpleOperator, Object[] simpleOperatorArguments) {\nsuper(Collections.emptyMap());\nthis.simpleOperator = simpleOperator;\nthis.field = field;\nthis.simpleOperatorArguments = simpleOperatorArguments;\n- this.nodeOperator = ExtOperator.SIMPLE_OPERATOR;\n+ this.nodeOperator = ExtOperator.ATOMIC_FORMULA;\n+\n+ if (simpleOperatorArguments != null) {\n+ for (int i = 0; i < simpleOperatorArguments.length; i ++) {\n+ Object arg = simpleOperatorArguments[i];\n+ if (arg instanceof Stream) {\n+ try (Stream<?> sArg = (Stream<?>) arg) {\n+ simpleOperatorArguments[i] = sArg.collect(Collectors.toList());\n+ }\n+ }\n+ }\n+ }\n}\npublic ModelCriteriaNode(ExtOperator nodeOperator) {\n@@ -112,7 +141,7 @@ public class ModelCriteriaNode<M> extends DefaultTreeNode<ModelCriteriaNode<M>>\nthis.simpleOperatorArguments = null;\n}\n- private ModelCriteriaNode(ExtOperator nodeOperator, Operator simpleOperator, SearchableModelField<M> field, Object[] simpleOperatorArguments) {\n+ private ModelCriteriaNode(ExtOperator nodeOperator, Operator simpleOperator, SearchableModelField<? super M> field, Object[] simpleOperatorArguments) {\nsuper(Collections.emptyMap());\nthis.nodeOperator = nodeOperator;\nthis.simpleOperator = simpleOperator;\n@@ -125,11 +154,40 @@ public class ModelCriteriaNode<M> extends DefaultTreeNode<ModelCriteriaNode<M>>\n}\npublic ModelCriteriaNode<M> cloneTree() {\n- return cloneTree(n -> new ModelCriteriaNode<>(n.nodeOperator, n.simpleOperator, n.field, n.simpleOperatorArguments));\n+ return cloneTree(ModelCriteriaNode::new, ModelCriteriaNode::new);\n+ }\n+\n+ @FunctionalInterface\n+ public interface AtomicFormulaInstantiator<M> {\n+ public ModelCriteriaNode<M> instantiate(SearchableModelField<? super M> field, Operator operator, Object[] operatorArguments);\n+ }\n+\n+ public ModelCriteriaNode<M> cloneTree(AtomicFormulaInstantiator<M> atomicFormulaInstantiator, Function<ExtOperator, ModelCriteriaNode<M>> booleanNodeInstantiator) {\n+ return cloneTree(n ->\n+ n.getNodeOperator() == ExtOperator.ATOMIC_FORMULA\n+ ? atomicFormulaInstantiator.instantiate(n.field, n.simpleOperator, n.simpleOperatorArguments)\n+ : booleanNodeInstantiator.apply(n.nodeOperator)\n+ );\n+ }\n+\n+ public boolean isFalseNode() {\n+ return getNodeOperator() == ExtOperator.__FALSE__;\n+ }\n+\n+ public boolean isNotFalseNode() {\n+ return getNodeOperator() != ExtOperator.__FALSE__;\n+ }\n+\n+ public boolean isTrueNode() {\n+ return getNodeOperator() == ExtOperator.__TRUE__;\n+ }\n+\n+ public boolean isNotTrueNode() {\n+ return getNodeOperator() != ExtOperator.__TRUE__;\n}\n- public ModelCriteriaBuilder<M> flashToModelCriteriaBuilder(ModelCriteriaBuilder<M> mcb) {\n- final ModelCriteriaBuilder<M> res = nodeOperator.apply(mcb, this);\n+ public <C extends ModelCriteriaBuilder<M>> C flashToModelCriteriaBuilder(C mcb) {\n+ final C res = nodeOperator.apply(mcb, this);\nreturn res == null ? mcb : res;\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/test/java/org/keycloak/models/map/storage/criteria/DefaultModelCriteriaTest.java",
"new_path": "model/map/src/test/java/org/keycloak/models/map/storage/criteria/DefaultModelCriteriaTest.java",
"diff": "package org.keycloak.models.map.storage.criteria;\nimport org.keycloak.models.ClientModel;\n+import org.keycloak.models.RoleModel;\nimport org.keycloak.models.map.storage.ModelCriteriaBuilder.Operator;\n+import java.util.Arrays;\nimport static org.hamcrest.MatcherAssert.assertThat;\nimport org.junit.Test;\nimport static org.hamcrest.Matchers.hasToString;\nimport static org.keycloak.models.ClientModel.SearchableFields.*;\n+import static org.keycloak.models.map.storage.criteria.DefaultModelCriteria.criteria;\n/**\n*\n@@ -31,42 +34,71 @@ public class DefaultModelCriteriaTest {\n@Test\npublic void testSimpleCompare() {\n- DefaultModelCriteria<ClientModel> v = new DefaultModelCriteria<>();\n+ DefaultModelCriteria<ClientModel> v = criteria();\nassertThat(v.compare(CLIENT_ID, Operator.EQ, 3), hasToString(\"clientId EQ [3]\"));\nassertThat(v.compare(CLIENT_ID, Operator.EQ, 4).compare(ID, Operator.EQ, 5), hasToString(\"(clientId EQ [4] && id EQ [5])\"));\n}\n@Test\npublic void testSimpleCompareAnd() {\n- DefaultModelCriteria<ClientModel> v = new DefaultModelCriteria<>();\n+ DefaultModelCriteria<ClientModel> v = criteria();\n+ assertThat(v.and(), hasToString(\"__TRUE__\"));\n+ assertThat(v.and(v.or()), hasToString(\"__FALSE__\"));\n+\nassertThat(v.and(v.compare(CLIENT_ID, Operator.EQ, 3)), hasToString(\"(clientId EQ [3])\"));\n- assertThat(v.and(v.compare(CLIENT_ID, Operator.EQ, 4).compare(ID, Operator.EQ, 5)), hasToString(\"((clientId EQ [4] && id EQ [5]))\"));\n+ assertThat(v.and(v.compare(CLIENT_ID, Operator.EQ, 3), v.or()), hasToString(\"__FALSE__\"));\n+ assertThat(v.and(v.compare(CLIENT_ID, Operator.EQ, 4).compare(ID, Operator.EQ, 5)), hasToString(\"(clientId EQ [4] && id EQ [5])\"));\nassertThat(v.and(v.compare(CLIENT_ID, Operator.EQ, 4), v.compare(ID, Operator.EQ, 5)), hasToString(\"(clientId EQ [4] && id EQ [5])\"));\n}\n@Test\npublic void testSimpleCompareOr() {\n- DefaultModelCriteria<ClientModel> v = new DefaultModelCriteria<>();\n+ DefaultModelCriteria<ClientModel> v = criteria();\n+ assertThat(v.or(), hasToString(\"__FALSE__\"));\n+ assertThat(v.or(v.and()), hasToString(\"__TRUE__\"));\n+\nassertThat(v.or(v.compare(CLIENT_ID, Operator.EQ, 3)), hasToString(\"(clientId EQ [3])\"));\n- assertThat(v.or(v.compare(CLIENT_ID, Operator.EQ, 4).compare(ID, Operator.EQ, 5)), hasToString(\"((clientId EQ [4] && id EQ [5]))\"));\n+ assertThat(v.or(v.compare(CLIENT_ID, Operator.EQ, 3), v.and()), hasToString(\"__TRUE__\"));\n+ assertThat(v.or(v.compare(CLIENT_ID, Operator.EQ, 4).compare(ID, Operator.EQ, 5)), hasToString(\"(clientId EQ [4] && id EQ [5])\"));\nassertThat(v.or(v.compare(CLIENT_ID, Operator.EQ, 4), v.compare(ID, Operator.EQ, 5)), hasToString(\"(clientId EQ [4] || id EQ [5])\"));\n+ assertThat(v.or(v.or(v.compare(CLIENT_ID, Operator.EQ, 4), v.compare(ID, Operator.EQ, 5))), hasToString(\"(clientId EQ [4] || id EQ [5])\"));\n+ assertThat(v.and(v.or(v.compare(CLIENT_ID, Operator.EQ, 4), v.compare(ID, Operator.EQ, 5))), hasToString(\"(clientId EQ [4] || id EQ [5])\"));\n}\n@Test\npublic void testSimpleCompareAndOr() {\n- DefaultModelCriteria<ClientModel> v = new DefaultModelCriteria<>();\n+ DefaultModelCriteria<ClientModel> v = criteria();\nassertThat(v.or(\nv.and(\nv.compare(CLIENT_ID, Operator.EQ, 4),\nv.compare(ID, Operator.EQ, 5)\n),\n- v.compare(ATTRIBUTE, Operator.EQ, \"city\", \"Ankh-Morpork\")\n+ v.not(v.not(v.compare(ATTRIBUTE, Operator.EQ, \"city\", \"Ankh-Morpork\")))\n), hasToString(\"((clientId EQ [4] && id EQ [5]) || attribute EQ [city, Ankh-Morpork])\"));\n+\n+ DefaultModelCriteria<RoleModel> mcb = criteria();\n+ assertThat(mcb.and(\n+ mcb.compare(RoleModel.SearchableFields.REALM_ID, Operator.EQ, \"realmId\"),\n+ mcb.compare(RoleModel.SearchableFields.CLIENT_ID, Operator.EQ, \"clientId\"),\n+ mcb.or(\n+ mcb.compare(RoleModel.SearchableFields.NAME, Operator.ILIKE, \"%search%\"),\n+ mcb.compare(RoleModel.SearchableFields.DESCRIPTION, Operator.ILIKE, \"%search%\")\n+ )\n+ ), hasToString(\"(realmId EQ [realmId] && clientId EQ [clientId] && (name ILIKE [%search%] || description ILIKE [%search%]))\"));\n+\n+ assertThat(mcb\n+ .compare(RoleModel.SearchableFields.REALM_ID, Operator.EQ, \"realmId\")\n+ .compare(RoleModel.SearchableFields.CLIENT_ID, Operator.EQ, \"clientId\")\n+ .or(\n+ mcb.compare(RoleModel.SearchableFields.NAME, Operator.ILIKE, \"%search%\"),\n+ mcb.compare(RoleModel.SearchableFields.DESCRIPTION, Operator.ILIKE, \"%search%\")\n+ ),\n+ hasToString(\"(realmId EQ [realmId] && clientId EQ [clientId] && (name ILIKE [%search%] || description ILIKE [%search%]))\"));\n}\n@Test\npublic void testComplexCompareAndOr() {\n- DefaultModelCriteria<ClientModel> v = new DefaultModelCriteria<>();\n+ DefaultModelCriteria<ClientModel> v = criteria();\nassertThat(v.or(\nv.and(\nv.compare(CLIENT_ID, Operator.EQ, 4),\n@@ -88,18 +120,49 @@ public class DefaultModelCriteriaTest {\n),\nhasToString(\"((clientId EQ [4] && realmId EQ [aa]) || (! id EQ [5] && enabled EQ [true]))\")\n);\n+\n+ assertThat(v.or(\n+ v.and(\n+ v.compare(CLIENT_ID, Operator.EQ, 4),\n+ v.compare(REALM_ID, Operator.EQ, \"aa\")\n+ ),\n+ v.not(\n+ v.not(\n+ v.compare(ID, Operator.EQ, 5)\n+ ).compare(ENABLED, Operator.EQ, \"true\")\n+ )\n+ ),\n+ hasToString(\"((clientId EQ [4] && realmId EQ [aa]) || ! (! id EQ [5] && enabled EQ [true]))\")\n+ );\n+\n+ assertThat(v.or(\n+ v.and(\n+ v.compare(CLIENT_ID, Operator.EQ, 4),\n+ v.compare(REALM_ID, Operator.EQ, \"aa\")\n+ ),\n+ v.not(\n+ v.not(\n+ v.and(\n+ v.compare(ID, Operator.EQ, 5)\n+ .compare(ENABLED, Operator.EQ, \"true\")\n+ )\n+ )\n+ )\n+ ),\n+ hasToString(\"((clientId EQ [4] && realmId EQ [aa]) || (id EQ [5] && enabled EQ [true]))\")\n+ );\n}\n@Test\npublic void testFlashingToAnotherMCB() {\n- DefaultModelCriteria<ClientModel> v = new DefaultModelCriteria<>();\n+ DefaultModelCriteria<ClientModel> v = criteria();\nassertThat(v.or(\nv.and(\nv.compare(CLIENT_ID, Operator.EQ, 4),\nv.compare(REALM_ID, Operator.EQ, \"aa\")\n),\nv.not(v.compare(ID, Operator.EQ, 5))\n- ).flashToModelCriteriaBuilder(new DefaultModelCriteria<>()),\n+ ).flashToModelCriteriaBuilder(criteria()),\nhasToString(\"((clientId EQ [4] && realmId EQ [aa]) || ! id EQ [5])\")\n);\n@@ -111,9 +174,35 @@ public class DefaultModelCriteriaTest {\nv.not(\nv.compare(ID, Operator.EQ, 5)\n).compare(ENABLED, Operator.EQ, \"true\")\n- ).flashToModelCriteriaBuilder(new DefaultModelCriteria<>()),\n+ ).flashToModelCriteriaBuilder(criteria()),\nhasToString(\"((clientId EQ [4] && realmId EQ [aa]) || (! id EQ [5] && enabled EQ [true]))\")\n);\n}\n+ @Test\n+ public void testCloning() {\n+ DefaultModelCriteria<ClientModel> v = criteria();\n+\n+ assertThat(v.and(v.compare(CLIENT_ID, Operator.EQ, 4).compare(ID, Operator.EQ, 5))\n+ .partiallyEvaluate((field, operator, operatorArguments) ->\n+ (field == CLIENT_ID && operator == Operator.EQ && Arrays.asList(operatorArguments).contains(4))\n+ || (field == ID && operator == Operator.EQ && Arrays.asList(operatorArguments).contains(5))\n+ ? true\n+ : null\n+ ),\n+ hasToString(\"(__TRUE__ && __TRUE__)\"));\n+\n+ assertThat(v.and(v.compare(CLIENT_ID, Operator.EQ, 4).compare(ID, Operator.EQ, 5))\n+ .partiallyEvaluate((field, operator, operatorArguments) ->\n+ (field == CLIENT_ID && operator == Operator.EQ && Arrays.asList(operatorArguments).contains(4))\n+ || (field == ID && operator == Operator.EQ && Arrays.asList(operatorArguments).contains(5))\n+ ? true\n+ : null\n+ ).optimize(),\n+ hasToString(\"__TRUE__\"));\n+\n+ assertThat(v.and(v.compare(CLIENT_ID, Operator.EQ, 4).compare(ID, Operator.EQ, 5))\n+ .partiallyEvaluate((field, operator, operatorArguments) -> field == CLIENT_ID && operator == Operator.EQ && Arrays.asList(operatorArguments).contains(6) ? true : null),\n+ hasToString(\"(clientId EQ [4] && id EQ [5])\"));\n+ }\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19749 Optimize DefaultModelCriteria creation |
339,364 | 03.11.2021 17:37:03 | -3,600 | adda65deb683213f8a701cb205588dbe33189c17 | Update the quickstarts to remove problematic language in the repository | [
{
"change_type": "MODIFY",
"old_path": ".github/workflows/ci.yml",
"new_path": ".github/workflows/ci.yml",
"diff": "@@ -369,7 +369,7 @@ jobs:\n- uses: actions/checkout@v2\nwith:\nrepository: keycloak/keycloak-quickstarts\n- ref: master # default is \"latest\"\n+ ref: main # default is \"latest\"\n- uses: actions/checkout@v2\nwith:\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19756 Update the quickstarts to remove problematic language in the repository |
339,618 | 01.11.2021 13:16:25 | -3,600 | 29b1aec4b5897c13344252904e22306169bf51b8 | Change Locations of h2-db files and gzip files | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/Environment.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/Environment.java",
"diff": "@@ -39,6 +39,7 @@ public final class Environment {\npublic static final String CLI_ARGS = \"kc.config.args\";\npublic static final String PROFILE =\"kc.profile\";\npublic static final String ENV_PROFILE =\"KC_PROFILE\";\n+ public static final String DATA_PATH = \"/data\";\nprivate Environment() {}\n@@ -60,6 +61,10 @@ public final class Environment {\nreturn null;\n}\n+ public static String getDataDir() {\n+ return getHomeDir() + DATA_PATH;\n+ }\n+\npublic static Path getProvidersPath() {\nPath homePath = Environment.getHomePath();\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/integration/QuarkusPlatform.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/integration/QuarkusPlatform.java",
"diff": "@@ -148,7 +148,8 @@ public class QuarkusPlatform implements PlatformProvider {\nthrow new RuntimeException(\"It was not possible to create temporary directory keycloak-quarkus-tmp\", ioex);\n}\n} else {\n- tmpDir = new File(homeDir, \"tmp\");\n+ String dataDir = Environment.getDataDir();\n+ tmpDir = new File(dataDir, \"tmp\");\ntmpDir.mkdir();\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/storage/database/Database.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/storage/database/Database.java",
"diff": "@@ -94,7 +94,7 @@ public final class Database {\npublic String apply(String alias) {\nif (\"h2-file\".equalsIgnoreCase(alias)) {\nreturn \"jdbc:h2:file:${kc.home.dir:${kc.db.url.path:~}}\" + File.separator + \"${kc.data.dir:data}\"\n- + File.separator + \"keycloakdb${kc.db.url.properties:;;AUTO_SERVER=TRUE}\";\n+ + File.separator + \"h2\" + File.separator + \"keycloakdb${kc.db.url.properties:;;AUTO_SERVER=TRUE}\";\n}\nreturn \"jdbc:h2:mem:keycloakdb${kc.db.url.properties:}\";\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/test/java/org/keycloak/provider/quarkus/ConfigurationTest.java",
"new_path": "quarkus/runtime/src/test/java/org/keycloak/provider/quarkus/ConfigurationTest.java",
"diff": "@@ -224,7 +224,7 @@ public class ConfigurationTest {\nSystem.setProperty(CLI_ARGS, \"--db=h2-file\");\nSmallRyeConfig config = createConfig();\nassertEquals(QuarkusH2Dialect.class.getName(), config.getConfigValue(\"quarkus.hibernate-orm.dialect\").getValue());\n- assertEquals(\"jdbc:h2:file:~/data/keycloakdb;;AUTO_SERVER=TRUE\", config.getConfigValue(\"quarkus.datasource.jdbc.url\").getValue());\n+ assertEquals(\"jdbc:h2:file:~/data/h2/keycloakdb;;AUTO_SERVER=TRUE\", config.getConfigValue(\"quarkus.datasource.jdbc.url\").getValue());\nSystem.setProperty(CLI_ARGS, \"--db=h2-mem\");\nconfig = createConfig();\n@@ -250,7 +250,7 @@ public class ConfigurationTest {\nSystem.setProperty(CLI_ARGS, \"--db=h2-file\");\nSmallRyeConfig config = createConfig();\nassertEquals(QuarkusH2Dialect.class.getName(), config.getConfigValue(\"quarkus.hibernate-orm.dialect\").getValue());\n- assertEquals(\"jdbc:h2:file:test-dir\" + File.separator + \"data\" + File.separator + \"keycloakdb;;test=test;test1=test1\", config.getConfigValue(\"quarkus.datasource.jdbc.url\").getValue());\n+ assertEquals(\"jdbc:h2:file:test-dir\" + File.separator + \"data\" + File.separator + \"h2\" + File.separator + \"keycloakdb;;test=test;test1=test1\", config.getConfigValue(\"quarkus.datasource.jdbc.url\").getValue());\nSystem.setProperty(\"kc.db.url.properties\", \"?test=test&test1=test1\");\nSystem.setProperty(CLI_ARGS, \"--db=mariadb\");\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19711 Change Locations of h2-db files and gzip files |
339,281 | 04.11.2021 10:21:15 | -3,600 | 439e2e42888d961360293e3eb436593ef5f3cf63 | fix MapClientProvider.getClientByClientId | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientProvider.java",
"diff": "@@ -241,7 +241,7 @@ public class MapClientProvider implements ClientProvider {\nModelCriteriaBuilder<ClientModel> mcb = criteria();\nmcb = mcb.compare(SearchableFields.REALM_ID, Operator.EQ, realm.getId())\n- .compare(SearchableFields.CLIENT_ID, Operator.ILIKE, clientId);\n+ .compare(SearchableFields.CLIENT_ID, Operator.EQ, clientId);\nreturn tx.read(withCriteria(mcb))\n.map(entityToAdapterFunc(realm))\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19763 fix MapClientProvider.getClientByClientId |
339,618 | 04.11.2021 14:33:24 | -3,600 | 8bafdb130ea68200c56781c253f81e093c2882a1 | Quarkus Update to 2.4.1.Final | [
{
"change_type": "MODIFY",
"old_path": "quarkus/pom.xml",
"new_path": "quarkus/pom.xml",
"diff": "<properties>\n<!-- Quarkus version -->\n- <quarkus.version>2.4.0.Final</quarkus.version>\n+ <quarkus.version>2.4.1.Final</quarkus.version>\n<!--\nOverride versions based on Quarkus dependencies.\n<resteasy.version>4.7.0.Final</resteasy.version>\n<jackson.version>2.12.5</jackson.version>\n<jackson.databind.version>${jackson.version}</jackson.databind.version>\n- <hibernate.core.version>5.6.0.Final</hibernate.core.version>\n+ <hibernate.core.version>5.6.1.Final</hibernate.core.version>\n<mysql.driver.version>8.0.26</mysql.driver.version>\n<postgresql.version>42.2.24</postgresql.version>\n<microprofile-metrics-api.version>3.0</microprofile-metrics-api.version>\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Keycloak-19762 Quarkus Update to 2.4.1.Final |
339,511 | 02.11.2021 17:33:45 | -32,400 | d0493b4306c5021b35da952d0d8343c8a3b682d4 | Existing ECDSA key provider's key pair is not regenerated when its curve is changed on Admin Console | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/keys/GeneratedEcdsaKeyProviderFactory.java",
"new_path": "services/src/main/java/org/keycloak/keys/GeneratedEcdsaKeyProviderFactory.java",
"diff": "@@ -28,7 +28,10 @@ import org.keycloak.models.RealmModel;\nimport org.keycloak.provider.ConfigurationValidationHelper;\nimport org.keycloak.provider.ProviderConfigProperty;\n+import java.security.KeyFactory;\nimport java.security.KeyPair;\n+import java.security.interfaces.ECPublicKey;\n+import java.security.spec.X509EncodedKeySpec;\nimport java.util.List;\npublic class GeneratedEcdsaKeyProviderFactory extends AbstractEcdsaKeyProviderFactory {\n@@ -103,7 +106,7 @@ public class GeneratedEcdsaKeyProviderFactory extends AbstractEcdsaKeyProviderFa\ngenerateKeys(model, ecInNistRep);\nlogger.debugv(\"Generated keys for {0}\", realm.getName());\n} else {\n- String currentEc = model.get(ECDSA_ELLIPTIC_CURVE_KEY);\n+ String currentEc = getCurveFromPublicKey(model.getConfig().getFirst(GeneratedEcdsaKeyProviderFactory.ECDSA_PUBLIC_KEY_KEY));\nif (!ecInNistRep.equals(currentEc)) {\ngenerateKeys(model, ecInNistRep);\nlogger.debugv(\"Elliptic Curve changed, generating new keys for {0}\", realm.getName());\n@@ -123,4 +126,14 @@ public class GeneratedEcdsaKeyProviderFactory extends AbstractEcdsaKeyProviderFa\n}\n}\n+ private String getCurveFromPublicKey(String publicEcdsaKeyBase64Encoded) {\n+ try {\n+ KeyFactory kf = KeyFactory.getInstance(\"EC\");\n+ X509EncodedKeySpec publicKeySpec = new X509EncodedKeySpec(Base64.decode(publicEcdsaKeyBase64Encoded));\n+ ECPublicKey ecKey = (ECPublicKey) kf.generatePublic(publicKeySpec);\n+ return \"P-\" + ecKey.getParams().getCurve().getField().getFieldSize();\n+ } catch (Throwable t) {\n+ throw new ComponentValidationException(\"Failed to get EC from its public key\", t);\n+ }\n+ }\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/keys/GeneratedEcdsaKeyProviderTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/keys/GeneratedEcdsaKeyProviderTest.java",
"diff": "package org.keycloak.testsuite.keys;\nimport static org.junit.Assert.assertEquals;\n+import static org.junit.Assert.assertNotEquals;\nimport static org.junit.Assert.assertNotNull;\nimport static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;\n+import java.security.KeyFactory;\n+import java.security.interfaces.ECPublicKey;\n+import java.security.spec.X509EncodedKeySpec;\nimport java.util.List;\nimport javax.ws.rs.WebApplicationException;\n@@ -28,8 +32,10 @@ import javax.ws.rs.core.Response;\nimport org.jboss.arquillian.graphene.page.Page;\nimport org.junit.Rule;\nimport org.junit.Test;\n+import org.keycloak.common.util.Base64;\nimport org.keycloak.common.util.MultivaluedHashMap;\nimport org.keycloak.crypto.KeyType;\n+import org.keycloak.keys.AbstractEcdsaKeyProviderFactory;\nimport org.keycloak.keys.GeneratedEcdsaKeyProviderFactory;\nimport org.keycloak.keys.KeyProvider;\nimport org.keycloak.representations.idm.ComponentRepresentation;\n@@ -88,7 +94,7 @@ public class GeneratedEcdsaKeyProviderTest extends AbstractKeycloakTest {\nunsupportedEc(\"K-163\");\n}\n- private void supportedEc(String ecInNistRep) {\n+ private String supportedEc(String ecInNistRep) {\nlong priority = System.currentTimeMillis();\nComponentRepresentation rep = createRep(\"valid\", GeneratedEcdsaKeyProviderFactory.ID);\n@@ -127,6 +133,8 @@ public class GeneratedEcdsaKeyProviderTest extends AbstractKeycloakTest {\nassertEquals(id, key.getProviderId());\nassertEquals(KeyType.EC, key.getType());\nassertEquals(priority, key.getProviderPriority());\n+\n+ return id; // created key's component id\n}\nprivate void unsupportedEc(String ecInNistRep) {\n@@ -152,6 +160,60 @@ public class GeneratedEcdsaKeyProviderTest extends AbstractKeycloakTest {\nassertEquals(isEcAccepted, false);\n}\n+ @Test\n+ public void changeCurveFromP256ToP384() throws Exception {\n+ changeCurve(\"P-256\", \"P-384\");\n+ }\n+\n+ @Test\n+ public void changeCurveFromP384ToP521() throws Exception {\n+ changeCurve(\"P-384\", \"P-521\");\n+ }\n+\n+ @Test\n+ public void changeCurveFromP521ToP256() throws Exception {\n+ changeCurve(\"P-521\", \"P-256\");\n+ }\n+\n+ private void changeCurve(String FromEcInNistRep, String ToEcInNistRep) throws Exception {\n+ String keyComponentId = supportedEc(FromEcInNistRep);\n+ KeysMetadataRepresentation keys = adminClient.realm(TEST_REALM_NAME).keys().getKeyMetadata();\n+ KeysMetadataRepresentation.KeyMetadataRepresentation originalKey = null;\n+ for (KeyMetadataRepresentation k : keys.getKeys()) {\n+ if (KeyType.EC.equals(k.getType()) && keyComponentId.equals(k.getProviderId())) {\n+ originalKey = k;\n+ break;\n+ }\n+ }\n+\n+ ComponentRepresentation createdRep = adminClient.realm(TEST_REALM_NAME).components().component(keyComponentId).toRepresentation();\n+ createdRep.getConfig().putSingle(ECDSA_ELLIPTIC_CURVE_KEY, ToEcInNistRep);\n+ adminClient.realm(TEST_REALM_NAME).components().component(keyComponentId).update(createdRep);\n+\n+ createdRep = adminClient.realm(TEST_REALM_NAME).components().component(keyComponentId).toRepresentation();\n+\n+ // stands for the number of properties in the key provider config\n+ assertEquals(2, createdRep.getConfig().size());\n+ assertEquals(ToEcInNistRep, createdRep.getConfig().getFirst(ECDSA_ELLIPTIC_CURVE_KEY));\n+\n+ keys = adminClient.realm(TEST_REALM_NAME).keys().getKeyMetadata();\n+ KeysMetadataRepresentation.KeyMetadataRepresentation key = null;\n+ for (KeyMetadataRepresentation k : keys.getKeys()) {\n+ if (KeyType.EC.equals(k.getType()) && keyComponentId.equals(k.getProviderId())) {\n+ key = k;\n+ break;\n+ }\n+ }\n+ assertNotNull(key);\n+\n+ assertEquals(keyComponentId, key.getProviderId());\n+ assertNotEquals(originalKey.getKid(), key.getKid()); // kid is changed if key was regenerated\n+ assertEquals(KeyType.EC, key.getType());\n+ assertNotEquals(originalKey.getAlgorithm(), key.getAlgorithm());\n+ assertEquals(ToEcInNistRep, AbstractEcdsaKeyProviderFactory.convertAlgorithmToECDomainParmNistRep(key.getAlgorithm()));\n+ assertEquals(ToEcInNistRep, getCurveFromPublicKey(key.getPublicKey()));\n+ }\n+\nprotected ComponentRepresentation createRep(String name, String providerId) {\nComponentRepresentation rep = new ComponentRepresentation();\nrep.setName(name);\n@@ -161,4 +223,11 @@ public class GeneratedEcdsaKeyProviderTest extends AbstractKeycloakTest {\nrep.setConfig(new MultivaluedHashMap<>());\nreturn rep;\n}\n+\n+ private String getCurveFromPublicKey(String publicEcdsaKeyBase64Encoded) throws Exception {\n+ KeyFactory kf = KeyFactory.getInstance(\"EC\");\n+ X509EncodedKeySpec publicKeySpec = new X509EncodedKeySpec(Base64.decode(publicEcdsaKeyBase64Encoded));\n+ ECPublicKey ecKey = (ECPublicKey) kf.generatePublic(publicKeySpec);\n+ return \"P-\" + ecKey.getParams().getCurve().getField().getFieldSize();\n+ }\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19723 Existing ECDSA key provider's key pair is not regenerated when its curve is changed on Admin Console |
339,706 | 29.10.2021 15:54:21 | 14,400 | cec6a8a884421ce0303032e19111c04c3d701e8e | Attempt to reuse denied device authorization code results in server error | [
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/RootAuthenticationSessionAdapter.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/RootAuthenticationSessionAdapter.java",
"diff": "@@ -20,6 +20,7 @@ package org.keycloak.models.sessions.infinispan;\nimport java.util.Comparator;\nimport java.util.HashMap;\nimport java.util.Map;\n+import java.util.Objects;\nimport java.util.concurrent.TimeUnit;\nimport org.infinispan.Cache;\n@@ -117,6 +118,8 @@ public class RootAuthenticationSessionAdapter implements RootAuthenticationSessi\n@Override\npublic AuthenticationSessionModel createAuthenticationSession(ClientModel client) {\n+ Objects.requireNonNull(client, \"client\");\n+\nMap<String, AuthenticationSessionEntity> authenticationSessions = entity.getAuthenticationSessions();\nif (authenticationSessions.size() >= authSessionsLimit) {\nString tabId = authenticationSessions.entrySet().stream().min(TIMESTAMP_COMPARATOR).map(Map.Entry::getKey).orElse(null);\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/events/Errors.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/events/Errors.java",
"diff": "@@ -109,6 +109,5 @@ public interface Errors {\nString INVALID_OAUTH2_DEVICE_CODE = \"invalid_oauth2_device_code\";\nString EXPIRED_OAUTH2_DEVICE_CODE = \"expired_oauth2_device_code\";\nString INVALID_OAUTH2_USER_CODE = \"invalid_oauth2_user_code\";\n- String EXPIRED_OAUTH2_USER_CODE = \"expired_oauth2_user_code\";\nString SLOW_DOWN = \"slow_down\";\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/device/endpoints/DeviceEndpoint.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/device/endpoints/DeviceEndpoint.java",
"diff": "@@ -19,13 +19,9 @@ package org.keycloak.protocol.oidc.grants.device.endpoints;\nimport org.jboss.logging.Logger;\nimport org.jboss.resteasy.spi.HttpRequest;\n-import org.keycloak.OAuth2Constants;\nimport org.keycloak.OAuthErrorException;\n-import org.keycloak.authentication.AuthenticationProcessor;\nimport org.keycloak.common.util.Base64Url;\nimport org.keycloak.common.util.SecretGenerator;\n-import org.keycloak.common.util.Time;\n-import org.keycloak.constants.AdapterConstants;\nimport org.keycloak.events.Details;\nimport org.keycloak.events.Errors;\nimport org.keycloak.events.EventBuilder;\n@@ -39,9 +35,7 @@ import org.keycloak.models.OAuth2DeviceTokenStoreProvider;\nimport org.keycloak.models.OAuth2DeviceUserCodeModel;\nimport org.keycloak.models.OAuth2DeviceUserCodeProvider;\nimport org.keycloak.models.RealmModel;\n-import org.keycloak.models.utils.SystemClientUtil;\nimport org.keycloak.protocol.AuthorizationEndpointBase;\n-import org.keycloak.protocol.oidc.OIDCAdvancedConfigWrapper;\nimport org.keycloak.protocol.oidc.OIDCLoginProtocol;\nimport org.keycloak.protocol.oidc.endpoints.request.AuthorizationEndpointRequest;\nimport org.keycloak.protocol.oidc.endpoints.request.AuthorizationEndpointRequestParserProcessor;\n@@ -57,7 +51,6 @@ import org.keycloak.services.Urls;\nimport org.keycloak.services.clientpolicy.ClientPolicyException;\nimport org.keycloak.services.messages.Messages;\nimport org.keycloak.services.resource.RealmResourceProvider;\n-import org.keycloak.services.resources.SessionCodeChecks;\nimport org.keycloak.services.resources.Cors;\nimport org.keycloak.services.util.CacheControlUtil;\nimport org.keycloak.sessions.AuthenticationSessionModel;\n@@ -66,7 +59,6 @@ import org.keycloak.util.TokenUtil;\nimport javax.ws.rs.Consumes;\nimport javax.ws.rs.GET;\n-import javax.ws.rs.HttpMethod;\nimport javax.ws.rs.OPTIONS;\nimport javax.ws.rs.POST;\nimport javax.ws.rs.Path;\n@@ -77,10 +69,7 @@ import javax.ws.rs.core.MediaType;\nimport javax.ws.rs.core.MultivaluedMap;\nimport javax.ws.rs.core.Response;\n-import static org.keycloak.protocol.oidc.endpoints.AuthorizationEndpoint.LOGIN_SESSION_NOTE_ADDITIONAL_REQ_PARAMS_PREFIX;\nimport static org.keycloak.protocol.oidc.grants.device.DeviceGrantType.OAUTH2_DEVICE_USER_CODE;\n-import static org.keycloak.protocol.oidc.grants.device.DeviceGrantType.OAUTH2_USER_CODE_VERIFY;\n-import static org.keycloak.services.resources.LoginActionsService.SESSION_CODE;\n/**\n* @author <a href=\"mailto:[email protected]\">Hiroyuki Wada</a>\n@@ -210,13 +199,20 @@ public class DeviceEndpoint extends AuthorizationEndpointBase implements RealmRe\nOAuth2DeviceCodeModel deviceCode = store.getByUserCode(realm, formattedUserCode);\nif (deviceCode == null) {\n- event.error(Errors.INVALID_OAUTH2_USER_CODE);\n- return createVerificationPage(Messages.OAUTH2_DEVICE_INVALID_USER_CODE);\n+ return invalidUserCodeResponse(Messages.OAUTH2_DEVICE_INVALID_USER_CODE, \"device code not found (it may already have been used)\");\n+ }\n+\n+ if (!deviceCode.isPending()) {\n+ event.detail(\"device_code_user_session_id\", deviceCode.getUserSessionId());\n+ return invalidUserCodeResponse(Messages.OAUTH2_DEVICE_INVALID_USER_CODE, \"device code already used and not yet deleted\");\n+ }\n+\n+ if (deviceCode.isDenied()) {\n+ return invalidUserCodeResponse(Messages.OAUTH2_DEVICE_INVALID_USER_CODE, \"device code denied\");\n}\nif (deviceCode.isExpired()) {\n- event.error(Errors.INVALID_OAUTH2_USER_CODE);\n- return createVerificationPage(Messages.OAUTH2_DEVICE_EXPIRED_USER_CODE);\n+ return invalidUserCodeResponse(Messages.OAUTH2_DEVICE_EXPIRED_USER_CODE, \"device code expired\");\n}\nreturn processVerification(deviceCode, formattedUserCode);\n@@ -272,6 +268,18 @@ public class DeviceEndpoint extends AuthorizationEndpointBase implements RealmRe\n}\n}\n+ /**\n+ * @param errorMessage Message code for the verification page\n+ * @param reason For event details; not exposed to end user\n+ * @return Verification page response with error message\n+ */\n+ private Response invalidUserCodeResponse(String errorMessage, String reason) {\n+ event.error(Errors.INVALID_OAUTH2_USER_CODE);\n+ event.detail(Details.REASON, reason);\n+ logger.debugf(\"invalid user code: %s\", reason);\n+ return createVerificationPage(errorMessage);\n+ }\n+\nprivate Response createVerificationPage(String errorMessage) {\nString execution = AuthenticatedClientSessionModel.Action.USER_CODE_VERIFICATION.name();\n@@ -286,12 +294,6 @@ public class DeviceEndpoint extends AuthorizationEndpointBase implements RealmRe\n}\nprivate Response processVerification(OAuth2DeviceCodeModel deviceCode, String userCode) {\n- long expiresIn = deviceCode.getExpiration() - Time.currentTime();\n- if (expiresIn < 0) {\n- event.error(Errors.EXPIRED_OAUTH2_USER_CODE);\n- return createVerificationPage(Messages.OAUTH2_DEVICE_INVALID_USER_CODE);\n- }\n-\nClientModel client = realm.getClientByClientId(deviceCode.getClientId());\nAuthenticationSessionModel authenticationSession = createAuthenticationSession(client);\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/pages/OAuth2DeviceVerificationPage.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/pages/OAuth2DeviceVerificationPage.java",
"diff": "@@ -26,6 +26,8 @@ import org.openqa.selenium.support.FindBy;\n*/\npublic class OAuth2DeviceVerificationPage extends LanguageComboboxAwarePage {\n+ private static final String CONSENT_DENIED_MESSAGE = \"Consent denied for connecting the device.\";\n+\n@FindBy(id = \"device-user-code\")\nprivate WebElement userCodeInput;\n@@ -74,6 +76,11 @@ public class OAuth2DeviceVerificationPage extends LanguageComboboxAwarePage {\nisInvalidUserCodePage());\n}\n+ public void assertExpiredUserCodePage() {\n+ Assert.assertTrue(\"Expected expired user code page but was \" + driver.getTitle() + \" (\" + driver.getCurrentUrl() + \")\",\n+ isExpiredUserCodePage());\n+ }\n+\nprivate boolean isApprovedPage() {\nif (driver.getTitle().startsWith(\"Sign in to \")) {\ntry {\n@@ -88,9 +95,8 @@ public class OAuth2DeviceVerificationPage extends LanguageComboboxAwarePage {\nprivate boolean isDeniedPage() {\nif (driver.getTitle().startsWith(\"Sign in to \")) {\ntry {\n- driver.findElement(By.id(\"kc-page-title\")).getText().equals(\"Device Login Failed\");\n- driver.findElement(By.className(\"instruction\")).getText().equals(\"Consent denied for connecting the device.\");\n- return true;\n+ return driver.findElement(By.id(\"kc-page-title\")).getText().equals(\"Device Login Failed\")\n+ && driver.findElement(By.className(\"instruction\")).getText().equals(CONSENT_DENIED_MESSAGE);\n} catch (Throwable t) {\n}\n}\n@@ -101,9 +107,20 @@ public class OAuth2DeviceVerificationPage extends LanguageComboboxAwarePage {\nif (driver.getTitle().startsWith(\"Sign in to \")) {\ntry {\ndriver.findElement(By.id(\"device-user-code\"));\n- driver.findElement(By.id(\"kc-page-title\")).getText().equals(\"Device Login\");\n- driver.findElement(By.className(\"kc-feedback-text\")).getText().equals(\"Invalid code, please try again.\");\n- return true;\n+ return driver.findElement(By.id(\"kc-page-title\")).getText().equals(\"Device Login\")\n+ && driver.findElement(By.className(\"kc-feedback-text\")).getText().equals(\"Invalid code, please try again.\");\n+ } catch (Throwable t) {\n+ }\n+ }\n+ return false;\n+ }\n+\n+ private boolean isExpiredUserCodePage() {\n+ if (driver.getTitle().startsWith(\"Sign in to \")) {\n+ try {\n+ driver.findElement(By.id(\"device-user-code\"));\n+ return driver.findElement(By.id(\"kc-page-title\")).getText().equals(\"Device Login\")\n+ && driver.findElement(By.className(\"kc-feedback-text\")).getText().equals(\"The code has expired. Please go back to your device and try connecting again.\");\n} catch (Throwable t) {\n}\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/OAuth2DeviceAuthorizationGrantTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/OAuth2DeviceAuthorizationGrantTest.java",
"diff": "@@ -303,7 +303,7 @@ public class OAuth2DeviceAuthorizationGrantTest extends AbstractKeycloakTest {\nresetTimeOffset();\n}\n- verificationPage.assertInvalidUserCodePage();\n+ verificationPage.assertExpiredUserCodePage();\n}\n@Test\n@@ -614,6 +614,39 @@ public class OAuth2DeviceAuthorizationGrantTest extends AbstractKeycloakTest {\nAssert.assertEquals(15, rep.getOAuth2DeviceCodeLifespan().intValue());\n}\n+ // KEYCLOAK-19700\n+ @Test\n+ public void testConsentCancelCannotBeReused() throws Exception {\n+ // Device Authorization Request from device\n+ oauth.realm(REALM_NAME);\n+ oauth.clientId(DEVICE_APP);\n+ OAuthClient.DeviceAuthorizationResponse response = oauth.doDeviceAuthorizationRequest(DEVICE_APP, \"secret\");\n+\n+ Assert.assertEquals(200, response.getStatusCode());\n+ assertNotNull(response.getDeviceCode());\n+ assertNotNull(response.getUserCode());\n+ assertNotNull(response.getVerificationUri());\n+ assertNotNull(response.getVerificationUriComplete());\n+ Assert.assertEquals(60, response.getExpiresIn());\n+ Assert.assertEquals(5, response.getInterval());\n+\n+ openVerificationPage(response.getVerificationUriComplete());\n+ loginPage.assertCurrent();\n+\n+ // Do Login\n+ oauth.fillLoginForm(\"device-login\", \"password\");\n+\n+ // Consent\n+ grantPage.assertCurrent();\n+ grantPage.cancel();\n+\n+ verificationPage.assertDeniedPage();\n+\n+ openVerificationPage(response.getVerificationUriComplete());\n+\n+ verificationPage.assertInvalidUserCodePage();\n+ }\n+\nprivate void openVerificationPage(String verificationUri) {\ndriver.navigate().to(verificationUri);\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19700: Attempt to reuse denied device authorization code results in server error |
339,550 | 11.06.2021 15:42:43 | -32,400 | 9be4c289d86328e74876920cca42dda95693f11a | Improve logging for token introspection | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/AccessTokenIntrospectionProvider.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/AccessTokenIntrospectionProvider.java",
"diff": "package org.keycloak.protocol.oidc;\nimport com.fasterxml.jackson.databind.node.ObjectNode;\n+import org.jboss.logging.Logger;\nimport org.keycloak.TokenVerifier;\nimport org.keycloak.common.VerificationException;\nimport org.keycloak.crypto.SignatureProvider;\n@@ -40,6 +41,7 @@ public class AccessTokenIntrospectionProvider implements TokenIntrospectionProvi\nprivate final KeycloakSession session;\nprivate final TokenManager tokenManager;\nprivate final RealmModel realm;\n+ private static final Logger logger = Logger.getLogger(AccessTokenIntrospectionProvider.class);\npublic AccessTokenIntrospectionProvider(KeycloakSession session) {\nthis.session = session;\n@@ -90,6 +92,7 @@ public class AccessTokenIntrospectionProvider implements TokenIntrospectionProvi\naccessToken = verifier.verify().getToken();\n} catch (VerificationException e) {\n+ logger.debugf(\"JWT check failed: %s\", e.getMessage());\nreturn null;\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/TokenManager.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/TokenManager.java",
"diff": "@@ -237,6 +237,7 @@ public class TokenManager {\n.withChecks(NotBeforeCheck.forModel(client), TokenVerifier.IS_ACTIVE)\n.verify();\n} catch (VerificationException e) {\n+ logger.debugf(\"JWT check failed: %s\", e.getMessage());\nreturn false;\n}\n@@ -326,6 +327,7 @@ public class TokenManager {\n.withChecks(NotBeforeCheck.forModel(session ,realm, user))\n.verify();\n} catch (VerificationException e) {\n+ logger.debugf(\"JWT check failed: %s\", e.getMessage());\nreturn false;\n}\nreturn true;\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18440 Improve logging for token introspection |
339,618 | 05.11.2021 11:58:14 | -3,600 | 13a7f773a9e208124b6cb2235e22a4f8e2adca98 | Use FolderThemeProviderFactory with fallback for quarkus so no need to always set config or system variable | [
{
"change_type": "MODIFY",
"old_path": "distribution/server-x-dist/src/main/content/bin/kc.sh",
"new_path": "distribution/server-x-dist/src/main/content/bin/kc.sh",
"diff": "@@ -23,7 +23,7 @@ fi\nGREP=\"grep\"\nDIRNAME=`dirname \"$RESOLVED_NAME\"`\n-SERVER_OPTS=\"-Dkc.home.dir=$DIRNAME/../ -Djboss.server.config.dir=$DIRNAME/../conf -Dkeycloak.theme.dir=$DIRNAME/../themes -Djava.util.logging.manager=org.jboss.logmanager.LogManager\"\n+SERVER_OPTS=\"-Dkc.home.dir=$DIRNAME/../ -Djboss.server.config.dir=$DIRNAME/../conf -Djava.util.logging.manager=org.jboss.logmanager.LogManager\"\nDEBUG_MODE=\"${DEBUG:-false}\"\nDEBUG_PORT=\"${DEBUG_PORT:-8787}\"\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/deployment/src/main/java/org/keycloak/quarkus/deployment/KeycloakProcessor.java",
"new_path": "quarkus/deployment/src/main/java/org/keycloak/quarkus/deployment/KeycloakProcessor.java",
"diff": "@@ -124,6 +124,7 @@ import org.keycloak.representations.provider.ScriptProviderMetadata;\nimport org.keycloak.quarkus.runtime.integration.web.NotFoundHandler;\nimport org.keycloak.services.ServicesLogger;\nimport org.keycloak.quarkus.runtime.services.health.KeycloakMetricsHandler;\n+import org.keycloak.theme.FolderThemeProviderFactory;\nimport org.keycloak.transaction.JBossJtaTransactionManagerLookup;\nimport org.keycloak.quarkus.runtime.Environment;\nimport org.keycloak.util.JsonSerialization;\n@@ -141,6 +142,7 @@ class KeycloakProcessor {\nJBossJtaTransactionManagerLookup.class,\nDefaultJpaConnectionProviderFactory.class,\nDefaultLiquibaseConnectionProvider.class,\n+ FolderThemeProviderFactory.class,\nLiquibaseJpaUpdaterProviderFactory.class);\nstatic {\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/Environment.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/Environment.java",
"diff": "@@ -40,6 +40,7 @@ public final class Environment {\npublic static final String PROFILE =\"kc.profile\";\npublic static final String ENV_PROFILE =\"KC_PROFILE\";\npublic static final String DATA_PATH = \"/data\";\n+ public static final String DEFAULT_THEMES_PATH = \"/themes\";\nprivate Environment() {}\n@@ -65,6 +66,10 @@ public final class Environment {\nreturn getHomeDir() + DATA_PATH;\n}\n+ public static String getDefaultThemeRootDir() {\n+ return getHomeDir() + DEFAULT_THEMES_PATH;\n+ }\n+\npublic static Path getProvidersPath() {\nPath homePath = Environment.getHomePath();\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/themes/QuarkusFolderThemeProviderFactory.java",
"diff": "+package org.keycloak.quarkus.runtime.themes;\n+\n+import org.keycloak.Config;\n+import org.keycloak.models.KeycloakSession;\n+import org.keycloak.models.KeycloakSessionFactory;\n+import org.keycloak.quarkus.runtime.Environment;\n+import org.keycloak.theme.FolderThemeProvider;\n+import org.keycloak.theme.ThemeProvider;\n+import org.keycloak.theme.ThemeProviderFactory;\n+\n+import java.io.File;\n+import java.util.Objects;\n+\n+public class QuarkusFolderThemeProviderFactory implements ThemeProviderFactory {\n+\n+ private static final String CONFIG_DIR_KEY = \"dir\";\n+ private FolderThemeProvider themeProvider;\n+\n+ @Override\n+ public ThemeProvider create(KeycloakSession sessions) {\n+ return themeProvider;\n+ }\n+\n+ @Override\n+ public void init(Config.Scope config) {\n+ String configDir = config.get(CONFIG_DIR_KEY);\n+ File rootDir = getThemeRootDirWithFallback(configDir);\n+ themeProvider = new FolderThemeProvider(rootDir);\n+ }\n+\n+ @Override\n+ public void postInit(KeycloakSessionFactory factory) {\n+\n+ }\n+\n+ @Override\n+ public void close() {\n+\n+ }\n+\n+ @Override\n+ public String getId() {\n+ return \"folder\";\n+ }\n+\n+ /**\n+ * Determines if the theme root directory we get\n+ * from {@link Config} exists.\n+ * If not, uses the default theme directory as a fallback.\n+ *\n+ * @param rootDirFromConfig string value from {@link Config}\n+ * @return Directory to use as theme root directory in {@link File} format, either from config or from default. Null if none is available.\n+ * @throws RuntimeException when filesystem path is not accessible\n+ */\n+ private File getThemeRootDirWithFallback(String rootDirFromConfig) {\n+ File themeRootDir;\n+\n+ themeRootDir = new File(Objects.requireNonNullElseGet(rootDirFromConfig, Environment::getDefaultThemeRootDir));\n+\n+ if (!themeRootDir.exists()) {\n+ return null;\n+ }\n+\n+ return themeRootDir;\n+ }\n+}\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "quarkus/runtime/src/main/resources/META-INF/services/org.keycloak.theme.ThemeProviderFactory",
"diff": "+org.keycloak.quarkus.runtime.themes.QuarkusFolderThemeProviderFactory\n+\n+\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/server/src/main/resources/META-INF/keycloak.properties",
"new_path": "quarkus/server/src/main/resources/META-INF/keycloak.properties",
"diff": "@@ -9,9 +9,6 @@ http.enabled=false\n# Metrics and healthcheck are disabled by default\nmetrics.enabled=false\n-# Themes\n-spi.theme.folder.dir=${kc.home.dir:}/themes\n-\n# Basic settings for running in production. Change accordingly before deploying the server.\n# Database\n#%prod.db=postgres\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/servers/auth-server/quarkus/src/main/content/conf/keycloak.properties",
"new_path": "testsuite/integration-arquillian/servers/auth-server/quarkus/src/main/content/conf/keycloak.properties",
"diff": "@@ -27,9 +27,6 @@ spi.truststore.file.password=secret\nspi.user-profile.declarative-user-profile.read-only-attributes=deniedFoo,deniedBar*,deniedSome/thing,deniedsome*thing\nspi.user-profile.declarative-user-profile.admin-read-only-attributes=deniedSomeAdmin\n-#theme folders dir\n-spi.theme.folder.dir=${kc.home.dir:}/themes\n-\n#password-blacklists path\nspi.password-policy.password-blacklist.blacklists-path=${kc.home.dir:}/dependency/password-blacklists\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19446 Use FolderThemeProviderFactory with fallback for quarkus so no need to always set config or system variable |
339,430 | 26.10.2021 15:14:52 | -7,200 | bfe6f34e1dcad575e56699ef170103de8b7305b6 | NoIssue: Add the resourceTypes query parameter to the admin clients getAdminEvents method. | [
{
"change_type": "MODIFY",
"old_path": "integration/admin-client/src/main/java/org/keycloak/admin/client/resource/RealmResource.java",
"new_path": "integration/admin-client/src/main/java/org/keycloak/admin/client/resource/RealmResource.java",
"diff": "@@ -142,7 +142,7 @@ public interface RealmResource {\n@Produces(MediaType.APPLICATION_JSON)\nList<AdminEventRepresentation> getAdminEvents(@QueryParam(\"operationTypes\") List<String> operationTypes, @QueryParam(\"authRealm\") String authRealm, @QueryParam(\"authClient\") String authClient,\n@QueryParam(\"authUser\") String authUser, @QueryParam(\"authIpAddress\") String authIpAddress,\n- @QueryParam(\"resourcePath\") String resourcePath, @QueryParam(\"dateFrom\") String dateFrom,\n+ @QueryParam(\"resourcePath\") String resourcePath, @QueryParam(\"resourceTypes\") List<String> resourceTypes, @QueryParam(\"dateFrom\") String dateFrom,\n@QueryParam(\"dateTo\") String dateTo, @QueryParam(\"first\") Integer firstResult,\n@QueryParam(\"max\") Integer maxResults);\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | NoIssue: Add the resourceTypes query parameter to the admin clients getAdminEvents method. |
339,430 | 02.11.2021 09:20:44 | -3,600 | 1f000fe2185a9951cf7d30e94ac9b0af0c387680 | NoIssue: Introduce additional getAdminEvents method with the resourceTypes query parameter. | [
{
"change_type": "MODIFY",
"old_path": "integration/admin-client/src/main/java/org/keycloak/admin/client/resource/RealmResource.java",
"new_path": "integration/admin-client/src/main/java/org/keycloak/admin/client/resource/RealmResource.java",
"diff": "@@ -137,6 +137,15 @@ public interface RealmResource {\n@Produces(MediaType.APPLICATION_JSON)\nList<AdminEventRepresentation> getAdminEvents();\n+ @GET\n+ @Path(\"admin-events\")\n+ @Produces(MediaType.APPLICATION_JSON)\n+ List<AdminEventRepresentation> getAdminEvents(@QueryParam(\"operationTypes\") List<String> operationTypes, @QueryParam(\"authRealm\") String authRealm, @QueryParam(\"authClient\") String authClient,\n+ @QueryParam(\"authUser\") String authUser, @QueryParam(\"authIpAddress\") String authIpAddress,\n+ @QueryParam(\"resourcePath\") String resourcePath, @QueryParam(\"dateFrom\") String dateFrom,\n+ @QueryParam(\"dateTo\") String dateTo, @QueryParam(\"first\") Integer firstResult,\n+ @QueryParam(\"max\") Integer maxResults);\n+\n@GET\n@Path(\"admin-events\")\n@Produces(MediaType.APPLICATION_JSON)\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | NoIssue: Introduce additional getAdminEvents method with the resourceTypes query parameter. |
339,169 | 19.04.2021 11:45:06 | -7,200 | 36da2d20e97a10821c7305881d3ffa343b5ad001 | Local file in a webview fails when requesting with "Origin: null" since 11.0.2 | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/adapter-core/src/main/java/org/keycloak/adapters/PreAuthActionsHandler.java",
"new_path": "adapters/oidc/adapter-core/src/main/java/org/keycloak/adapters/PreAuthActionsHandler.java",
"diff": "@@ -104,7 +104,7 @@ public class PreAuthActionsHandler {\nreturn false;\n}\nString origin = facade.getRequest().getHeader(CorsHeaders.ORIGIN);\n- if (origin == null || origin.equals(\"null\")) {\n+ if (origin == null) {\nlog.debug(\"checkCorsPreflight: no origin header\");\nreturn false;\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/Cors.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/Cors.java",
"diff": "@@ -135,7 +135,7 @@ public class Cors {\npublic Response build() {\nString origin = request.getHttpHeaders().getRequestHeaders().getFirst(ORIGIN_HEADER);\n- if (origin == null || origin.equals(\"null\")) {\n+ if (origin == null) {\nlogger.trace(\"No origin header ignoring\");\nreturn builder.build();\n}\n@@ -182,7 +182,7 @@ public class Cors {\npublic void build(HttpResponse response) {\nString origin = request.getHttpHeaders().getRequestHeaders().getFirst(ORIGIN_HEADER);\n- if (origin == null || origin.equals(\"null\")) {\n+ if (origin == null) {\nlogger.trace(\"No origin header ignoring\");\nreturn;\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oidc/OIDCWellKnownProviderTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oidc/OIDCWellKnownProviderTest.java",
"diff": "@@ -263,6 +263,13 @@ public class OIDCWellKnownProviderTest extends AbstractKeycloakTest {\nResponse response = request.get();\nassertEquals(\"http://somehost\", response.getHeaders().getFirst(Cors.ACCESS_CONTROL_ALLOW_ORIGIN));\n+\n+\n+ Invocation.Builder nullRequest = oidcDiscoveryTarget.request();\n+ nullRequest.header(Cors.ORIGIN_HEADER, \"null\");\n+ Response nullResponse = nullRequest.get();\n+\n+ assertEquals(\"null\", nullResponse.getHeaders().getFirst(Cors.ACCESS_CONTROL_ALLOW_ORIGIN));\n}\n@Test\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17039 Local file in a webview fails when requesting with "Origin: null" since 11.0.2 |
339,347 | 21.10.2021 16:09:22 | -7,200 | 951a232b24217503f852268c902b240f7505e5b5 | Update messages_es.properties
Add `loginAccountTitle` locale to `messages_es.properties` | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources-community/theme/base/login/messages/messages_es.properties",
"new_path": "themes/src/main/resources-community/theme/base/login/messages/messages_es.properties",
"diff": "@@ -16,6 +16,7 @@ bypassKerberosDetail=O bien no est\\u00E1s identificado mediante Kerberos o tu na\nkerberosNotSetUp=Kerberos no est\\u00E1 configurado. No puedes identificarte.\nregisterWithTitle=Reg\\u00EDstrate con {0}\nregisterWithTitleHtml={0}\n+loginAccountTitle=Acceder a tu cuenta\nloginTitle=Inicia sesi\\u00F3n en {0}\nloginTitleHtml={0}\nimpersonateTitle={0}\\u00A0Personificar Usuario\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Update messages_es.properties
Add `loginAccountTitle` locale to `messages_es.properties` |
339,618 | 12.11.2021 14:55:06 | -3,600 | 35bc1c673eea475e5eadb4cca10d02eb09da8424 | Update Quarkus to 2.4.2.Final | [
{
"change_type": "MODIFY",
"old_path": "quarkus/pom.xml",
"new_path": "quarkus/pom.xml",
"diff": "<properties>\n<!-- Quarkus version -->\n- <quarkus.version>2.4.1.Final</quarkus.version>\n+ <quarkus.version>2.4.2.Final</quarkus.version>\n<!--\nOverride versions based on Quarkus dependencies.\nSee https://github.com/quarkusio/quarkus/blob/<versionTag>/bom/application/pom.xml\nfor reference\n-->\n- <resteasy.version>4.7.0.Final</resteasy.version>\n+ <resteasy.version>4.7.3.Final</resteasy.version>\n<jackson.version>2.12.5</jackson.version>\n<jackson.databind.version>${jackson.version}</jackson.databind.version>\n<hibernate.core.version>5.6.1.Final</hibernate.core.version>\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19814 - Update Quarkus to 2.4.2.Final |
339,235 | 11.11.2021 10:06:36 | -3,600 | 89a5710b04baed1a07f6bb668286602cdddf8b31 | Update security policy
Closes | [
{
"change_type": "MODIFY",
"old_path": "SECURITY.md",
"new_path": "SECURITY.md",
"diff": "# Security Policy\n-## Supported Versions\n-\n-To receive fixes for security vulnerabilities it is required to always upgrade to the latest version of Keycloak.\n-See https://www.keycloak.org/downloads for the latest release.\n+The Keycloak team takes security very seriously, and aim to resolve issues as quickly as possible. Building secure\n+software is a continuous process, and can always be improved. As such we welcome reports on potential security\n+vulnerabilities, as well as suggestions around hardening the software and our process.\n-Fixes will only be released for previous releases under special circumstances.\n+## Reporting a suspected vulnerability\n-## Reporting a Vulnerability\n+It is important that suspected vulnerabilities are disclosed in a responsible way, and are not publicly disclosed until\n+after they have been analysed and a fix is available.\n-To report a security vulnerability:\n+To report a security vulnerability, send an email to [email protected].\n-You can report a security vulnerability either through email, or in our issue tracker. If you are uncertain what you have\n-discovered is a vulnerability or you believe it is a critical issue please report using email (or both).\n+If you would like to work with us on a fix for the security vulnerability, please include your GitHub username\n+in the above email, and we will provide you access to a temporary private fork where we can collaborate on a fix\n+without it being disclosed publicly.\n-To report through email send an email to [email protected].\n+Do *not* open a public issue, send a pull request, or disclose any information about the suspected vulnerability publicly.\n+If you discover any publicly disclosed security vulnerabilities, please notify us *immediately* through\[email protected].\n-To report through issue tracker:\n+## Supported Versions\n-* Go to https://issues.jboss.org/browse/KEYCLOAK\n-* Create a new issue in the Keycloak project\n-* Make sure the \"This issue is security relevant\" checkbox is checked\n+Depending on the severity of a vulnerability the issue may be fixed in the current `major.minor` release of Keycloak, or\n+for lower severity vulnerabilities or hardening in the following `major.minor` release. Refer to\n+`https://www.keycloak.org/downloads` to find the latest release.\n-If you have a patch for the issue please use `git format-patch` and attach to the email or issue. Please do not open a\n-pull request on GitHub as that may disclose sensitive details around the vulnerability.\n+If you are unable to regularly upgrade Keycloak we encourage you to consider\n+[Red Hat Single Sign-On](https://access.redhat.com/products/red-hat-single-sign-on), which offers\n+[long term support](https://access.redhat.com/support/policy/updates/jboss_notes#p_sso) of specific versions of Keycloak.\n\\ No newline at end of file\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Update security policy
Closes #8823 |
339,235 | 16.11.2021 09:56:45 | -3,600 | f6daca8a602d5440a0564ab7eb3e654e148aba72 | Fix dl of admin-ui | [
{
"change_type": "MODIFY",
"old_path": "themes/pom.xml",
"new_path": "themes/pom.xml",
"diff": "<repository>\n<id>github</id>\n<!-- Do not decode the PAT below, as it will force Github to revoke it. -->\n- <url>https://keycloak-packages:g[email protected]/keycloak/keycloak-admin-ui</url>\n+ <url>https://keycloak-packages:g[email protected]/keycloak/keycloak-admin-ui</url>\n<releases>\n<enabled>false</enabled>\n</releases>\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Fix dl of admin-ui |
339,618 | 10.11.2021 10:46:08 | -3,600 | 8bd18ff21ac83a04c726c0fc548394064efb0fc4 | throw error when using start command after start-dev without rebuild first | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/Environment.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/Environment.java",
"diff": "@@ -23,9 +23,7 @@ import java.io.File;\nimport java.io.FilenameFilter;\nimport java.nio.file.Path;\nimport java.nio.file.Paths;\n-import java.util.Arrays;\n-import java.util.Collections;\n-import java.util.Map;\n+import java.util.*;\nimport java.util.function.Function;\nimport java.util.stream.Collectors;\n@@ -41,6 +39,8 @@ public final class Environment {\npublic static final String ENV_PROFILE =\"KC_PROFILE\";\npublic static final String DATA_PATH = \"/data\";\npublic static final String DEFAULT_THEMES_PATH = \"/themes\";\n+ public static final String DEV_PROFILE_VALUE = \"dev\";\n+ public static final String USER_INVOKED_CLI_COMMAND = \"picocli.invoked.command\";\nprivate Environment() {}\n@@ -93,6 +93,29 @@ public final class Environment {\nreturn \"./kc.sh\";\n}\n+ /**\n+ * Sets the originally invoked cli args. Useful to verify the originally invoked command\n+ * when calling another cli command internally (e.g. start-dev calls build internally)\n+ */\n+ public static void setUserInvokedCliArgs(List<String> cliArgs) {\n+ System.setProperty(USER_INVOKED_CLI_COMMAND, String.join(\",\", cliArgs));\n+ }\n+\n+ /**\n+ * Reads the previously set system property for the originally command.\n+ * Use the System variable, when you trigger other command executions internally, but need a reference to the\n+ * actually invoked command.\n+ *\n+ * @return the invoked command from the CLI, or empty List if not set.\n+ */\n+ public static List<String> getUserInvokedCliArgs() {\n+ if(System.getProperty(USER_INVOKED_CLI_COMMAND) == null) {\n+ return Collections.emptyList();\n+ }\n+\n+ return List.of(System.getProperty(USER_INVOKED_CLI_COMMAND).split(\",\"));\n+ }\n+\npublic static String getConfigArgs() {\nreturn System.getProperty(CLI_ARGS, \"\");\n}\n@@ -123,7 +146,7 @@ public final class Environment {\n}\npublic static boolean isDevMode() {\n- if (\"dev\".equalsIgnoreCase(getProfile())) {\n+ if (DEV_PROFILE_VALUE.equalsIgnoreCase(getProfile())) {\nreturn true;\n}\n@@ -132,7 +155,11 @@ public final class Environment {\nreturn true;\n}\n- return \"dev\".equals(getBuiltTimeProperty(PROFILE).orElse(null));\n+ return DEV_PROFILE_VALUE.equals(getBuiltTimeProperty(PROFILE).orElse(null));\n+ }\n+\n+ public static boolean isDevProfile(){\n+ return Optional.ofNullable(getProfile()).orElse(\"\").equalsIgnoreCase(DEV_PROFILE_VALUE);\n}\npublic static boolean isImportExportMode() {\n@@ -144,7 +171,7 @@ public final class Environment {\n}\npublic static void forceDevProfile() {\n- setProfile(\"dev\");\n+ setProfile(DEV_PROFILE_VALUE);\n}\npublic static Map<String, File> getProviderFiles() {\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/KeycloakMain.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/KeycloakMain.java",
"diff": "package org.keycloak.quarkus.runtime;\n-import static org.keycloak.quarkus.runtime.Environment.isDevMode;\n+import static org.keycloak.quarkus.runtime.Environment.isDevProfile;\n+import static org.keycloak.quarkus.runtime.Environment.getProfileOrDefault;\nimport static org.keycloak.quarkus.runtime.cli.Picocli.error;\nimport static org.keycloak.quarkus.runtime.cli.Picocli.parseAndRun;\n-import static org.keycloak.quarkus.runtime.Environment.getProfileOrDefault;\nimport java.io.PrintWriter;\nimport java.util.ArrayList;\n@@ -80,7 +80,7 @@ public class KeycloakMain implements QuarkusApplication {\n*/\n@Override\npublic int run(String... args) throws Exception {\n- if (isDevMode()) {\n+ if (isDevProfile()) {\nLOGGER.warnf(\"Running the server in dev mode. DO NOT use this configuration in production.\");\n}\nQuarkus.waitForExit();\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/Picocli.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/Picocli.java",
"diff": "@@ -132,12 +132,13 @@ public final class Picocli {\nprivate static boolean requiresReAugmentation(CommandLine cmd) {\nif (hasConfigChanges()) {\ncmd.getOut().println(\"Changes detected in configuration. Updating the server image.\");\n+ if(!isDevMode()) {\ncmd.getOut().printf(\"For an optional runtime and bypass this step, please run the '%s' command prior to starting the server:%n%n\\t%s %s %s%n\",\nBuild.NAME,\nEnvironment.getCommand(),\nBuild.NAME,\nString.join(\" \", asList(ARG_SPLIT.split(Environment.getConfigArgs()))) + \"\\n\");\n-\n+ }\nreturn true;\n}\n@@ -152,6 +153,8 @@ public final class Picocli {\n// force the server image to be set with the dev profile\nEnvironment.forceDevProfile();\n}\n+\n+ Environment.setUserInvokedCliArgs(cliArgs);\n}\nList<String> configArgsList = new ArrayList<>(cliArgs);\n@@ -166,8 +169,10 @@ public final class Picocli {\ncmd.execute(configArgsList.toArray(new String[0]));\n+ if(!isDevMode()) {\ncmd.getOut().printf(\"Next time you run the server, just run:%n%n\\t%s %s%n%n\", Environment.getCommand(), Start.NAME);\n}\n+ }\nprivate static boolean hasProviderChanges() {\nFile propertiesFile = KeycloakConfigSourceProvider.getPersistedConfigFile().toFile();\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/command/AbstractCommand.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/command/AbstractCommand.java",
"diff": "@@ -25,6 +25,8 @@ import picocli.CommandLine.Model.CommandSpec;\nimport picocli.CommandLine.Spec;\nimport picocli.CommandLine.Option;\n+import static org.keycloak.quarkus.runtime.cli.Picocli.error;\n+\npublic abstract class AbstractCommand {\n@Spec\n@@ -49,4 +51,8 @@ public abstract class AbstractCommand {\npublic void setConfigFile(String path) {\nSystem.setProperty(KeycloakConfigSourceProvider.KEYCLOAK_CONFIG_FILE_PROP, path);\n}\n+\n+ protected void showDevNotAllowedErrorAndExit(String cmd) {\n+ error(spec.commandLine(), String.format(\"You can not '%s' the server using the 'dev' configuration profile. Please re-build the server first, using './kc.sh build' for the default production profile, or using '/.kc.sh build --profile=<profile>' with a profile more suitable for production.%n\", cmd));\n+ }\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/command/Build.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/command/Build.java",
"diff": "package org.keycloak.quarkus.runtime.cli.command;\n-import static org.keycloak.quarkus.runtime.Environment.getHomePath;\n+import static org.keycloak.quarkus.runtime.Environment.*;\nimport static org.keycloak.quarkus.runtime.cli.Picocli.error;\nimport static org.keycloak.quarkus.runtime.cli.Picocli.println;\n@@ -29,6 +29,8 @@ import io.quarkus.bootstrap.runner.RunnerClassLoader;\nimport io.quarkus.runtime.configuration.ProfileManager;\nimport picocli.CommandLine.Command;\n+import java.util.List;\n+\n@Command(name = Build.NAME,\nheader = \"Creates a new and optimized server image.\",\ndescription = {\n@@ -67,14 +69,19 @@ public final class Build extends AbstractCommand implements Runnable {\n@Override\npublic void run() {\n+ exitWithErrorIfDevProfileIsSetAndNotStartDev();\n+\nSystem.setProperty(\"quarkus.launch.rebuild\", \"true\");\nprintln(spec.commandLine(), \"Updating the configuration and installing your custom providers, if any. Please wait.\");\ntry {\nbeforeReaugmentationOnWindows();\nQuarkusEntryPoint.main();\n+\n+ if (!isDevMode()) {\nprintln(spec.commandLine(), \"Server configuration updated and persisted. Run the following command to review the configuration:\\n\");\nprintln(spec.commandLine(), \"\\t\" + Environment.getCommand() + \" show-config\\n\");\n+ }\n} catch (Throwable throwable) {\nerror(spec.commandLine(), \"Failed to update server configuration.\", throwable);\n} finally {\n@@ -82,6 +89,13 @@ public final class Build extends AbstractCommand implements Runnable {\n}\n}\n+ private void exitWithErrorIfDevProfileIsSetAndNotStartDev() {\n+ List<String> userInvokedCliArgs = Environment.getUserInvokedCliArgs();\n+ if(Environment.isDevProfile() && !userInvokedCliArgs.contains(StartDev.NAME)) {\n+ showDevNotAllowedErrorAndExit(Build.NAME);\n+ }\n+ }\n+\nprivate void beforeReaugmentationOnWindows() {\n// On Windows, files generated during re-augmentation are locked and can't be re-created.\n// To workaround this behavior, we reset the internal cache of the runner classloader and force files\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/command/Start.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/command/Start.java",
"diff": "package org.keycloak.quarkus.runtime.cli.command;\n+import static org.keycloak.quarkus.runtime.Environment.isDevProfile;\nimport static org.keycloak.quarkus.runtime.cli.Picocli.NO_PARAM_LABEL;\n+import static org.keycloak.quarkus.runtime.cli.Picocli.error;\n+import static org.keycloak.quarkus.runtime.configuration.Configuration.getBuiltTimeProperty;\n+import org.keycloak.quarkus.runtime.Environment;\nimport picocli.CommandLine;\nimport picocli.CommandLine.Command;\n+import java.util.List;\n+import java.util.Optional;\n+\n@Command(name = Start.NAME,\nheader = \"Start the server.\",\ndescription = {\n@@ -44,4 +51,26 @@ public final class Start extends AbstractStartCommand implements Runnable {\nparamLabel = NO_PARAM_LABEL,\norder = 1)\nBoolean autoConfig;\n+\n+ @Override\n+ protected void doBeforeRun() {\n+ checkIfProfileIsNotDev();\n+ }\n+\n+ /**\n+ * Checks if the profile provided by either the current argument, the system environment or the persisted properties is dev.\n+ * Fails with an error when dev profile is used for the start command, or continues with the found profile if its not the dev profile.\n+ */\n+ private void checkIfProfileIsNotDev() {\n+ List<String> currentCliArgs = spec.commandLine().getParseResult().expandedArgs();\n+\n+ Optional<String> currentProfile = Optional.ofNullable(Environment.getProfile());\n+ Optional<String> persistedProfile = getBuiltTimeProperty(\"kc.profile\");\n+\n+ setProfile(currentProfile.orElse(persistedProfile.orElse(\"prod\")));\n+\n+ if (isDevProfile() && (!currentCliArgs.contains(AUTO_BUILD_OPTION_LONG) || !currentCliArgs.contains(AUTO_BUILD_OPTION_SHORT))) {\n+ showDevNotAllowedErrorAndExit(Start.NAME);\n+ }\n+ }\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/mappers/Messages.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/mappers/Messages.java",
"diff": "@@ -35,7 +35,7 @@ public final class Messages {\npublic static IllegalStateException httpsConfigurationNotSet() {\nStringBuilder builder = new StringBuilder(\"Key material not provided to setup HTTPS. Please configure your keys/certificates\");\n- if (!\"dev\".equals(Environment.getProfile())) {\n+ if (!Environment.DEV_PROFILE_VALUE.equals(Environment.getProfile())) {\nbuilder.append(\" or start the server in development mode\");\n}\nbuilder.append(\".\");\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19808 throw error when using start command after start-dev without rebuild first |
339,179 | 16.11.2021 15:11:15 | -3,600 | 4291caff3c8450b85b72332362e5d313b403e42e | Fix Delegate bug | [
{
"change_type": "MODIFY",
"old_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/GenerateEntityImplementationsProcessor.java",
"new_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/GenerateEntityImplementationsProcessor.java",
"diff": "@@ -554,8 +554,8 @@ public class GenerateEntityImplementationsProcessor extends AbstractProcessor {\n}\npw.println(\"public class \" + mapSimpleClassName + \" implements \" + className + \" {\");\n- pw.println(\" private final org.keycloak.models.map.common.delegate.DelegateProvider<\" + mapSimpleClassName + \"> delegateProvider;\");\n- pw.println(\" public \" + mapSimpleClassName + \"(org.keycloak.models.map.common.delegate.DelegateProvider<\" + mapSimpleClassName + \"> delegateProvider) {\");\n+ pw.println(\" private final org.keycloak.models.map.common.delegate.DelegateProvider<\" + className + \"> delegateProvider;\");\n+ pw.println(\" public \" + mapSimpleClassName + \"(org.keycloak.models.map.common.delegate.DelegateProvider<\" + className + \"> delegateProvider) {\");\npw.println(\" this.delegateProvider = delegateProvider;\");\npw.println(\" }\");\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Fix Delegate bug |
339,618 | 16.11.2021 16:42:37 | -3,600 | 4fd29759ad53371b040be5af7afc424ff861d481 | Use Config variables instead of system variables to change the default jdbc url | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/mappers/DatabasePropertyMappers.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/mappers/DatabasePropertyMappers.java",
"diff": "@@ -47,12 +47,25 @@ final class DatabasePropertyMappers {\n.to(\"quarkus.datasource.jdbc.url\")\n.mapFrom(\"db\")\n.transformer((value, context) -> Database.getDefaultUrl(value).orElse(value))\n- .description(\"The database JDBC URL. If not provided, a default URL is set based on the selected database vendor. \" +\n- \"For instance, if using 'postgres', the JDBC URL would be 'jdbc:postgresql://localhost/keycloak'. \" +\n- \"The host, database and properties can be overridden by setting the following system properties,\" +\n- \" respectively: -Dkc.db.url.host, -Dkc.db.url.database, -Dkc.db.url.properties.\")\n+ .description(\"The full database JDBC URL. If not provided, a default URL is set based on the selected database vendor. \" +\n+ \"For instance, if using 'postgres', the default JDBC URL would be 'jdbc:postgresql://localhost/keycloak'. \")\n.paramLabel(\"jdbc-url\")\n.build(),\n+ builder().from(\"db.url.host\")\n+ .to(\"kc.db.url.host\")\n+ .description(\"Sets the hostname of the default JDBC URL of the chosen vendor. If the `db-url` option is set, this option is ignored.\")\n+ .paramLabel(\"hostname\")\n+ .build(),\n+ builder().from(\"db.url.database\")\n+ .to(\"kc.db.url.database\")\n+ .description(\"Sets the database name of the default JDBC URL of the chosen vendor. If the `db-url` option is set, this option is ignored.\")\n+ .paramLabel(\"dbname\")\n+ .build(),\n+ builder().from(\"db.url.properties\")\n+ .to(\"kc.db.url.properties\")\n+ .description(\"Sets the properties of the default JDBC URL of the chosen vendor. If the `db-url` option is set, this option is ignored.\")\n+ .paramLabel(\"properties\")\n+ .build(),\nbuilder().from(\"db.username\")\n.to(\"quarkus.datasource.username\")\n.description(\"The username of the database user.\")\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/test/java/org/keycloak/provider/quarkus/ConfigurationTest.java",
"new_path": "quarkus/runtime/src/test/java/org/keycloak/provider/quarkus/ConfigurationTest.java",
"diff": "@@ -253,6 +253,26 @@ public class ConfigurationTest {\nassertEquals(\"postgresql\", config.getConfigValue(\"quarkus.datasource.db-kind\").getValue());\n}\n+ @Test\n+ public void testDefaultDbPropertiesGetApplied() {\n+ System.setProperty(CLI_ARGS, \"--db=postgres\" + ARG_SEPARATOR + \"--db-url-host=myhost\" + ARG_SEPARATOR + \"--db-url-database=kcdb\" + ARG_SEPARATOR + \"--db-url-properties=?foo=bar\");\n+ SmallRyeConfig config = createConfig();\n+ assertEquals(\"io.quarkus.hibernate.orm.runtime.dialect.QuarkusPostgreSQL10Dialect\",\n+ config.getConfigValue(\"quarkus.hibernate-orm.dialect\").getValue());\n+ assertEquals(\"jdbc:postgresql://myhost/kcdb?foo=bar\", config.getConfigValue(\"quarkus.datasource.jdbc.url\").getValue());\n+ assertEquals(\"postgresql\", config.getConfigValue(\"quarkus.datasource.db-kind\").getValue());\n+ }\n+\n+ @Test\n+ public void testSetDbUrlOverridesDefaultDataSource() {\n+ System.setProperty(CLI_ARGS, \"--db=mariadb\" + ARG_SEPARATOR + \"--db-url-host=myhost\" + ARG_SEPARATOR + \"--db-url=jdbc:mariadb://localhost/keycloak\");\n+ SmallRyeConfig config = createConfig();\n+ assertEquals(\"org.hibernate.dialect.MariaDBDialect\",\n+ config.getConfigValue(\"quarkus.hibernate-orm.dialect\").getValue());\n+ assertEquals(\"jdbc:mariadb://localhost/keycloak\", config.getConfigValue(\"quarkus.datasource.jdbc.url\").getValue());\n+ assertEquals(\"mariadb\", config.getConfigValue(\"quarkus.datasource.db-kind\").getValue());\n+ }\n+\n@Test\npublic void testDatabaseProperties() {\nSystem.setProperty(\"kc.db.url.properties\", \";;test=test;test1=test1\");\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19824: Use Config variables instead of system variables to change the default jdbc url |
339,660 | 28.09.2021 22:02:24 | -7,200 | ed6eea26ea61bd3ded66e5096ed1038cfffd7ec6 | Allows to set login_hint on registration and reset-credentials pages | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/forms/login/freemarker/FreeMarkerLoginFormsProvider.java",
"new_path": "services/src/main/java/org/keycloak/forms/login/freemarker/FreeMarkerLoginFormsProvider.java",
"diff": "@@ -19,6 +19,7 @@ package org.keycloak.forms.login.freemarker;\nimport org.jboss.logging.Logger;\nimport org.keycloak.OAuth2Constants;\nimport org.keycloak.authentication.AuthenticationFlowContext;\n+import org.keycloak.authentication.authenticators.browser.AbstractUsernameFormAuthenticator;\nimport org.keycloak.authentication.authenticators.browser.OTPFormAuthenticator;\nimport org.keycloak.authentication.requiredactions.util.UpdateProfileContext;\nimport org.keycloak.authentication.requiredactions.util.UserUpdateProfileContext;\n@@ -52,6 +53,7 @@ import org.keycloak.models.KeycloakSession;\nimport org.keycloak.models.RealmModel;\nimport org.keycloak.models.UserModel;\nimport org.keycloak.models.utils.FormMessage;\n+import org.keycloak.protocol.oidc.OIDCLoginProtocol;\nimport org.keycloak.services.Urls;\nimport org.keycloak.services.messages.Messages;\nimport org.keycloak.services.resources.LoginActionsService;\n@@ -69,6 +71,7 @@ import org.keycloak.userprofile.UserProfileContext;\nimport org.keycloak.userprofile.UserProfileProvider;\nimport org.keycloak.utils.MediaType;\n+import javax.ws.rs.core.MultivaluedHashMap;\nimport javax.ws.rs.core.MultivaluedMap;\nimport javax.ws.rs.core.Response;\nimport javax.ws.rs.core.UriBuilder;\n@@ -534,6 +537,10 @@ public class FreeMarkerLoginFormsProvider implements LoginFormsProvider {\n@Override\npublic Response createPasswordReset() {\n+ String loginHint = authenticationSession.getClientNote(OIDCLoginProtocol.LOGIN_HINT_PARAM);\n+ if (loginHint != null && !loginHint.isEmpty()) {\n+ authenticationSession.setAuthNote(AbstractUsernameFormAuthenticator.ATTEMPTED_USERNAME, loginHint);\n+ }\nreturn createResponse(LoginFormsPages.LOGIN_RESET_PASSWORD);\n}\n@@ -549,6 +556,16 @@ public class FreeMarkerLoginFormsProvider implements LoginFormsProvider {\n@Override\npublic Response createRegistration() {\n+ String loginHint = authenticationSession.getClientNote(OIDCLoginProtocol.LOGIN_HINT_PARAM);\n+ if (loginHint != null && !loginHint.isEmpty()) {\n+ this.formData = new MultivaluedHashMap<>();\n+ if(this.realm.isRegistrationEmailAsUsername()) {\n+ this.formData.putSingle(\"email\", loginHint);\n+ } else {\n+ this.formData.putSingle(\"username\", loginHint);\n+ }\n+ }\n+\nreturn createResponse(LoginFormsPages.REGISTER);\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/OIDCLoginProtocolService.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/OIDCLoginProtocolService.java",
"diff": "@@ -119,6 +119,11 @@ public class OIDCLoginProtocolService {\nreturn uriBuilder.path(OIDCLoginProtocolService.class, \"auth\");\n}\n+ public static UriBuilder registrationsUrl(UriBuilder baseUriBuilder) {\n+ UriBuilder uriBuilder = tokenServiceBaseUrl(baseUriBuilder);\n+ return uriBuilder.path(OIDCLoginProtocolService.class, \"registrations\");\n+ }\n+\npublic static UriBuilder delegatedUrl(UriInfo uriInfo) {\nUriBuilder uriBuilder = tokenServiceBaseUrl(uriInfo);\nreturn uriBuilder.path(OIDCLoginProtocolService.class, \"kcinitBrowserLoginComplete\");\n@@ -172,7 +177,7 @@ public class OIDCLoginProtocolService {\n* Registration endpoint\n*/\n@Path(\"registrations\")\n- public Object registerPage() {\n+ public Object registrations() {\nAuthorizationEndpoint endpoint = new AuthorizationEndpoint(realm, event);\nResteasyProviderFactory.getInstance().injectProperties(endpoint);\nreturn endpoint.register();\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/pages/RegisterPage.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/pages/RegisterPage.java",
"diff": "@@ -19,6 +19,7 @@ package org.keycloak.testsuite.pages;\nimport org.jboss.arquillian.graphene.page.Page;\nimport org.junit.Assert;\n+import org.keycloak.protocol.oidc.OIDCLoginProtocol;\nimport org.keycloak.testsuite.auth.page.AccountFields;\nimport org.keycloak.testsuite.auth.page.PasswordFields;\nimport org.keycloak.testsuite.util.UIUtils;\n@@ -232,7 +233,13 @@ public class RegisterPage extends AbstractPage {\n@Override\npublic void open() {\n- throw new UnsupportedOperationException();\n+ oauth.openRegistrationForm();\n+ assertCurrent();\n+ }\n+\n+ public void openWithLoginHint(String loginHint) {\n+ oauth.addCustomParameter(OIDCLoginProtocol.LOGIN_HINT_PARAM, loginHint).openRegistrationForm();\n+ assertCurrent();\n}\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/util/OAuthClient.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/util/OAuthClient.java",
"diff": "@@ -1324,6 +1324,10 @@ public class OAuthClient {\ndriver.navigate().to(getLoginFormUrl());\n}\n+ public void openRegistrationForm() {\n+ driver.navigate().to(getRegistrationFormUrl());\n+ }\n+\npublic void openOAuth2DeviceVerificationForm(String verificationUri) {\ndriver.navigate().to(verificationUri);\n}\n@@ -1413,6 +1417,30 @@ public class OAuthClient {\nreturn b.build(realm).toString();\n}\n+ private String getRegistrationFormUrl() {\n+ UriBuilder b = OIDCLoginProtocolService.registrationsUrl(UriBuilder.fromUri(baseUrl));\n+ if (responseType != null) {\n+ b.queryParam(OAuth2Constants.RESPONSE_TYPE, responseType);\n+ }\n+ if (clientId != null) {\n+ b.queryParam(OAuth2Constants.CLIENT_ID, clientId);\n+ }\n+ if (redirectUri != null) {\n+ b.queryParam(OAuth2Constants.REDIRECT_URI, redirectUri);\n+ }\n+\n+ String scopeParam = openid ? TokenUtil.attachOIDCScope(scope) : scope;\n+ if (scopeParam != null && !scopeParam.isEmpty()) {\n+ b.queryParam(OAuth2Constants.SCOPE, scopeParam);\n+ }\n+\n+ if (customParameters != null) {\n+ customParameters.keySet().stream().forEach(i -> b.queryParam(i, customParameters.get(i)));\n+ }\n+\n+ return b.build(realm).toString();\n+ }\n+\npublic Entity getLoginEntityForPOST() {\nForm form = new Form()\n.param(OAuth2Constants.SCOPE, TokenUtil.attachOIDCScope(scope))\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/RegisterTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/RegisterTest.java",
"diff": "@@ -606,6 +606,23 @@ public class RegisterTest extends AbstractTestRealmKeycloakTest {\n}\n}\n+ @Test\n+ public void registerWithLoginHint() throws IOException {\n+\n+ registerPage.openWithLoginHint(\"username_test\");\n+\n+ assertEquals(\"username_test\", registerPage.getUsername());\n+ }\n+\n+ @Test\n+ public void registerWithLoginHint_emailAsUsername() throws IOException {\n+ try (RealmAttributeUpdater rau = configureRealmRegistrationEmailAsUsername(true).update()) {\n+ registerPage.openWithLoginHint(\"[email protected]\");\n+\n+ assertEquals(\"[email protected]\", registerPage.getEmail());\n+ }\n+ }\n+\n//KEYCLOAK-14161\n@Test\npublic void customRegistrationPageFormTest() {\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/ResetPasswordTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/ResetPasswordTest.java",
"diff": "@@ -1209,6 +1209,18 @@ public class ResetPasswordTest extends AbstractTestRealmKeycloakTest {\nassertEquals(\"Invalid email address.\", errorPage.getError());\n}\n+ @Test\n+ public void resetPasswordWithLoginHint() throws IOException {\n+ // Redirect directly to KC \"forgot password\" endpoint instead of \"authenticate\" endpoint\n+ String loginUrl = oauth.getLoginFormUrl();\n+ String forgotPasswordUrl = loginUrl.replace(\"/auth?\", \"/forgot-credentials?\"); // Workaround, but works\n+\n+ driver.navigate().to(forgotPasswordUrl + \"&login_hint=test\");\n+ resetPasswordPage.assertCurrent();\n+\n+ assertEquals(\"test\", resetPasswordPage.getUsername());\n+ }\n+\nprivate void changePasswordOnUpdatePage(WebDriver driver) {\nassertThat(driver.getPageSource(), Matchers.containsString(\"You need to change your password.\"));\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19413 Allows to set login_hint on registration and reset-credentials pages |
339,511 | 04.11.2021 12:07:31 | -32,400 | 10c3e149d36d0be1e421ff149359c854cc0ed8f0 | RSA key provider with key use = enc cannot select corresponding algorithm on Admin Console | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/models/utils/DefaultKeyProviders.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/models/utils/DefaultKeyProviders.java",
"diff": "@@ -21,6 +21,7 @@ import org.keycloak.common.util.MultivaluedHashMap;\nimport org.keycloak.component.ComponentModel;\nimport org.keycloak.crypto.Algorithm;\nimport org.keycloak.crypto.KeyUse;\n+import org.keycloak.jose.jwe.JWEConstants;\nimport org.keycloak.keys.KeyProvider;\nimport org.keycloak.models.RealmModel;\n@@ -33,15 +34,18 @@ public class DefaultKeyProviders {\npublic static void createProviders(RealmModel realm) {\nif (!hasProvider(realm, \"rsa-generated\")) {\n- createRsaKeyProvider(\"rsa-generated\", KeyUse.SIG, realm);\n- createRsaKeyProvider(\"rsa-enc-generated\", KeyUse.ENC, realm);\n+ createRsaKeyProvider(\"rsa-generated\", realm);\n+ }\n+\n+ if (!hasProvider(realm, \"rsa-enc-generated\")) {\n+ createRsaEncKeyProvider(\"rsa-enc-generated\", realm);\n}\ncreateSecretProvider(realm);\ncreateAesProvider(realm);\n}\n- private static void createRsaKeyProvider(String name, KeyUse keyUse, RealmModel realm) {\n+ private static void createRsaKeyProvider(String name, RealmModel realm) {\nComponentModel generated = new ComponentModel();\ngenerated.setName(name);\ngenerated.setParentId(realm.getId());\n@@ -50,7 +54,23 @@ public class DefaultKeyProviders {\nMultivaluedHashMap<String, String> config = new MultivaluedHashMap<>();\nconfig.putSingle(\"priority\", \"100\");\n- config.putSingle(\"keyUse\", keyUse.getSpecName());\n+ config.putSingle(\"keyUse\", KeyUse.SIG.name());\n+ generated.setConfig(config);\n+\n+ realm.addComponentModel(generated);\n+ }\n+\n+ private static void createRsaEncKeyProvider(String name, RealmModel realm) {\n+ ComponentModel generated = new ComponentModel();\n+ generated.setName(name);\n+ generated.setParentId(realm.getId());\n+ generated.setProviderId(\"rsa-enc-generated\");\n+ generated.setProviderType(KeyProvider.class.getName());\n+\n+ MultivaluedHashMap<String, String> config = new MultivaluedHashMap<>();\n+ config.putSingle(\"priority\", \"100\");\n+ config.putSingle(\"keyUse\", KeyUse.ENC.name());\n+ config.putSingle(\"algorithm\", JWEConstants.RSA_OAEP);\ngenerated.setConfig(config);\nrealm.addComponentModel(generated);\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "services/src/main/java/org/keycloak/keys/AbstractGeneratedRsaKeyProviderFactory.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.keys;\n+\n+import java.security.KeyPair;\n+import java.security.PrivateKey;\n+import java.security.cert.Certificate;\n+import java.security.interfaces.RSAPrivateKey;\n+\n+import org.jboss.logging.Logger;\n+import org.keycloak.common.util.CertificateUtils;\n+import org.keycloak.common.util.KeyUtils;\n+import org.keycloak.common.util.MultivaluedHashMap;\n+import org.keycloak.common.util.PemUtils;\n+import org.keycloak.component.ComponentModel;\n+import org.keycloak.component.ComponentValidationException;\n+import org.keycloak.crypto.KeyUse;\n+import org.keycloak.models.KeycloakSession;\n+import org.keycloak.models.RealmModel;\n+import org.keycloak.provider.ConfigurationValidationHelper;\n+import org.keycloak.provider.ProviderConfigurationBuilder;\n+\n+public abstract class AbstractGeneratedRsaKeyProviderFactory extends AbstractRsaKeyProviderFactory {\n+\n+ abstract protected Logger getLogger();\n+\n+ public final static ProviderConfigurationBuilder rsaKeyConfigurationBuilder() {\n+ return ProviderConfigurationBuilder.create()\n+ .property(Attributes.PRIORITY_PROPERTY)\n+ .property(Attributes.ENABLED_PROPERTY)\n+ .property(Attributes.ACTIVE_PROPERTY);\n+ }\n+\n+ @Override\n+ public boolean createFallbackKeys(KeycloakSession session, KeyUse keyUse, String algorithm) {\n+ if (isValidKeyUse(keyUse) && isSupportedRsaAlgorithm(algorithm)) {\n+ RealmModel realm = session.getContext().getRealm();\n+\n+ ComponentModel generated = new ComponentModel();\n+ generated.setName(\"fallback-\" + algorithm);\n+ generated.setParentId(realm.getId());\n+ generated.setProviderId(getId());\n+ generated.setProviderType(KeyProvider.class.getName());\n+\n+ MultivaluedHashMap<String, String> config = new MultivaluedHashMap<>();\n+ config.putSingle(Attributes.PRIORITY_KEY, \"-100\");\n+ config.putSingle(Attributes.ALGORITHM_KEY, algorithm);\n+ generated.setConfig(config);\n+\n+ realm.addComponentModel(generated);\n+\n+ return true;\n+ } else {\n+ return false;\n+ }\n+ }\n+\n+ abstract protected boolean isValidKeyUse(KeyUse keyUse);\n+\n+ abstract protected boolean isSupportedRsaAlgorithm(String algorithm);\n+\n+ @Override\n+ public void validateConfiguration(KeycloakSession session, RealmModel realm, ComponentModel model) throws ComponentValidationException {\n+ super.validateConfiguration(session, realm, model);\n+\n+ ConfigurationValidationHelper.check(model).checkList(Attributes.KEY_SIZE_PROPERTY, false);\n+\n+ int size = model.get(Attributes.KEY_SIZE_KEY, 2048);\n+\n+ if (!(model.contains(Attributes.PRIVATE_KEY_KEY) && model.contains(Attributes.CERTIFICATE_KEY))) {\n+ generateKeys(realm, model, size);\n+\n+ getLogger().debugv(\"Generated keys for {0}\", realm.getName());\n+ } else {\n+ PrivateKey privateKey = PemUtils.decodePrivateKey(model.get(Attributes.PRIVATE_KEY_KEY));\n+ int currentSize = ((RSAPrivateKey) privateKey).getModulus().bitLength();\n+ if (currentSize != size) {\n+ generateKeys(realm, model, size);\n+\n+ getLogger().debugv(\"Key size changed, generating new keys for {0}\", realm.getName());\n+ }\n+ }\n+ }\n+\n+ private void generateKeys(RealmModel realm, ComponentModel model, int size) {\n+ KeyPair keyPair;\n+ try {\n+ keyPair = KeyUtils.generateRsaKeyPair(size);\n+ model.put(Attributes.PRIVATE_KEY_KEY, PemUtils.encodeKey(keyPair.getPrivate()));\n+ } catch (Throwable t) {\n+ throw new ComponentValidationException(\"Failed to generate keys\", t);\n+ }\n+\n+ generateCertificate(realm, model, keyPair);\n+ }\n+\n+ private void generateCertificate(RealmModel realm, ComponentModel model, KeyPair keyPair) {\n+ try {\n+ Certificate certificate = CertificateUtils.generateV1SelfSignedCertificate(keyPair, realm.getName());\n+ model.put(Attributes.CERTIFICATE_KEY, PemUtils.encodeCertificate(certificate));\n+ } catch (Throwable t) {\n+ throw new ComponentValidationException(\"Failed to generate certificate\", t);\n+ }\n+ }\n+}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/keys/Attributes.java",
"new_path": "services/src/main/java/org/keycloak/keys/Attributes.java",
"diff": "@@ -19,6 +19,7 @@ package org.keycloak.keys;\nimport org.keycloak.crypto.Algorithm;\nimport org.keycloak.crypto.KeyUse;\n+import org.keycloak.jose.jwe.JWEConstants;\nimport org.keycloak.provider.ProviderConfigProperty;\nimport static org.keycloak.provider.ProviderConfigProperty.*;\n@@ -69,4 +70,8 @@ public interface Attributes {\nAlgorithm.HS256,\nAlgorithm.HS256, Algorithm.HS384, Algorithm.HS512);\n+ ProviderConfigProperty RS_ENC_ALGORITHM_PROPERTY = new ProviderConfigProperty(ALGORITHM_KEY, \"Algorithm\", \"Intended algorithm for the key encryption\", LIST_TYPE,\n+ JWEConstants.RSA_OAEP,\n+ JWEConstants.RSA1_5, JWEConstants.RSA_OAEP, JWEConstants.RSA_OAEP_256);\n+\n}\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "services/src/main/java/org/keycloak/keys/GeneratedRsaEncKeyProviderFactory.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.keys;\n+\n+import java.util.List;\n+\n+import org.jboss.logging.Logger;\n+import org.keycloak.component.ComponentModel;\n+import org.keycloak.crypto.KeyUse;\n+import org.keycloak.jose.jwe.JWEConstants;\n+import org.keycloak.models.KeycloakSession;\n+import org.keycloak.provider.ProviderConfigProperty;\n+\n+/**\n+ * @author <a href=\"mailto:[email protected]\">Takashi Norimatsu</a>\n+ */\n+public class GeneratedRsaEncKeyProviderFactory extends AbstractGeneratedRsaKeyProviderFactory {\n+\n+ private static final Logger logger = Logger.getLogger(GeneratedRsaEncKeyProviderFactory.class);\n+\n+ public static final String ID = \"rsa-enc-generated\";\n+\n+ private static final String HELP_TEXT = \"Generates RSA keys for key encryption and creates a self-signed certificate\";\n+\n+ private static final List<ProviderConfigProperty> CONFIG_PROPERTIES = AbstractGeneratedRsaKeyProviderFactory.rsaKeyConfigurationBuilder()\n+ .property(Attributes.KEY_SIZE_PROPERTY)\n+ .property(Attributes.RS_ENC_ALGORITHM_PROPERTY)\n+ .build();\n+\n+ @Override\n+ public KeyProvider create(KeycloakSession session, ComponentModel model) {\n+ model.put(Attributes.KEY_USE, KeyUse.ENC.name());\n+ return new ImportedRsaKeyProvider(session.getContext().getRealm(), model);\n+ }\n+\n+ @Override\n+ public String getHelpText() {\n+ return HELP_TEXT;\n+ }\n+\n+ @Override\n+ public List<ProviderConfigProperty> getConfigProperties() {\n+ return CONFIG_PROPERTIES;\n+ }\n+\n+ @Override\n+ public String getId() {\n+ return ID;\n+ }\n+\n+ @Override\n+ protected boolean isValidKeyUse(KeyUse keyUse) {\n+ return keyUse.equals(KeyUse.ENC);\n+ }\n+\n+ @Override\n+ protected boolean isSupportedRsaAlgorithm(String algorithm) {\n+ return algorithm.equals(JWEConstants.RSA1_5)\n+ || algorithm.equals(JWEConstants.RSA_OAEP)\n+ || algorithm.equals(JWEConstants.RSA_OAEP_256);\n+ }\n+\n+ @Override\n+ protected Logger getLogger() {\n+ return logger;\n+ }\n+\n+}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/keys/GeneratedRsaKeyProviderFactory.java",
"new_path": "services/src/main/java/org/keycloak/keys/GeneratedRsaKeyProviderFactory.java",
"diff": "package org.keycloak.keys;\nimport org.jboss.logging.Logger;\n-import org.keycloak.common.util.CertificateUtils;\n-import org.keycloak.common.util.KeyUtils;\n-import org.keycloak.common.util.MultivaluedHashMap;\n-import org.keycloak.common.util.PemUtils;\nimport org.keycloak.component.ComponentModel;\n-import org.keycloak.component.ComponentValidationException;\nimport org.keycloak.crypto.Algorithm;\nimport org.keycloak.crypto.KeyUse;\nimport org.keycloak.models.KeycloakSession;\n-import org.keycloak.models.RealmModel;\n-import org.keycloak.provider.ConfigurationValidationHelper;\nimport org.keycloak.provider.ProviderConfigProperty;\n-import java.security.KeyPair;\n-import java.security.PrivateKey;\n-import java.security.cert.Certificate;\n-import java.security.interfaces.RSAPrivateKey;\nimport java.util.List;\n/**\n* @author <a href=\"mailto:[email protected]\">Stian Thorgersen</a>\n*/\n-public class GeneratedRsaKeyProviderFactory extends AbstractRsaKeyProviderFactory {\n+public class GeneratedRsaKeyProviderFactory extends AbstractGeneratedRsaKeyProviderFactory {\nprivate static final Logger logger = Logger.getLogger(GeneratedRsaKeyProviderFactory.class);\npublic static final String ID = \"rsa-generated\";\n- private static final String HELP_TEXT = \"Generates RSA keys and creates a self-signed certificate\";\n+ private static final String HELP_TEXT = \"Generates RSA signature keys and creates a self-signed certificate\";\n- private static final List<ProviderConfigProperty> CONFIG_PROPERTIES = AbstractRsaKeyProviderFactory.configurationBuilder()\n+ private static final List<ProviderConfigProperty> CONFIG_PROPERTIES = AbstractGeneratedRsaKeyProviderFactory.rsaKeyConfigurationBuilder()\n.property(Attributes.KEY_SIZE_PROPERTY)\n- .property(Attributes.KEY_USE_PROPERTY)\n+ .property(Attributes.RS_ALGORITHM_PROPERTY)\n.build();\n@Override\npublic KeyProvider create(KeycloakSession session, ComponentModel model) {\n+ if (model.getConfig().get(Attributes.KEY_USE) == null) {\n+ // for backward compatibility : it allows \"enc\" key use for \"rsa-generated\" provider\n+ model.put(Attributes.KEY_USE, KeyUse.SIG.name());\n+ }\nreturn new ImportedRsaKeyProvider(session.getContext().getRealm(), model);\n}\n@Override\n- public boolean createFallbackKeys(KeycloakSession session, KeyUse keyUse, String algorithm) {\n- if (keyUse.equals(KeyUse.SIG) && isSupportedRsaAlgorithm(algorithm)) {\n- RealmModel realm = session.getContext().getRealm();\n-\n- ComponentModel generated = new ComponentModel();\n- generated.setName(\"fallback-\" + algorithm);\n- generated.setParentId(realm.getId());\n- generated.setProviderId(ID);\n- generated.setProviderType(KeyProvider.class.getName());\n-\n- MultivaluedHashMap<String, String> config = new MultivaluedHashMap<>();\n- config.putSingle(Attributes.PRIORITY_KEY, \"-100\");\n- config.putSingle(Attributes.ALGORITHM_KEY, algorithm);\n- generated.setConfig(config);\n-\n- realm.addComponentModel(generated);\n-\n- return true;\n- } else {\n- return false;\n- }\n- }\n-\n- private boolean isSupportedRsaAlgorithm(String algorithm) {\n- return algorithm.equals(Algorithm.RS256)\n- || algorithm.equals(Algorithm.PS256)\n- || algorithm.equals(Algorithm.RS384)\n- || algorithm.equals(Algorithm.PS384)\n- || algorithm.equals(Algorithm.RS512)\n- || algorithm.equals(Algorithm.PS512);\n+ public String getHelpText() {\n+ return HELP_TEXT;\n}\n@Override\n- public void validateConfiguration(KeycloakSession session, RealmModel realm, ComponentModel model) throws ComponentValidationException {\n- super.validateConfiguration(session, realm, model);\n-\n- ConfigurationValidationHelper.check(model).checkList(Attributes.KEY_SIZE_PROPERTY, false);\n-\n- int size = model.get(Attributes.KEY_SIZE_KEY, 2048);\n-\n- if (!(model.contains(Attributes.PRIVATE_KEY_KEY) && model.contains(Attributes.CERTIFICATE_KEY))) {\n- generateKeys(realm, model, size);\n-\n- logger.debugv(\"Generated keys for {0}\", realm.getName());\n- } else {\n- PrivateKey privateKey = PemUtils.decodePrivateKey(model.get(Attributes.PRIVATE_KEY_KEY));\n- int currentSize = ((RSAPrivateKey) privateKey).getModulus().bitLength();\n- if (currentSize != size) {\n- generateKeys(realm, model, size);\n-\n- logger.debugv(\"Key size changed, generating new keys for {0}\", realm.getName());\n- }\n- }\n- }\n-\n- private void generateKeys(RealmModel realm, ComponentModel model, int size) {\n- KeyPair keyPair;\n- try {\n- keyPair = KeyUtils.generateRsaKeyPair(size);\n- model.put(Attributes.PRIVATE_KEY_KEY, PemUtils.encodeKey(keyPair.getPrivate()));\n- } catch (Throwable t) {\n- throw new ComponentValidationException(\"Failed to generate keys\", t);\n- }\n-\n- generateCertificate(realm, model, keyPair);\n+ public List<ProviderConfigProperty> getConfigProperties() {\n+ return CONFIG_PROPERTIES;\n}\n- private void generateCertificate(RealmModel realm, ComponentModel model, KeyPair keyPair) {\n- try {\n- Certificate certificate = CertificateUtils.generateV1SelfSignedCertificate(keyPair, realm.getName());\n- model.put(Attributes.CERTIFICATE_KEY, PemUtils.encodeCertificate(certificate));\n- } catch (Throwable t) {\n- throw new ComponentValidationException(\"Failed to generate certificate\", t);\n- }\n+ @Override\n+ public String getId() {\n+ return ID;\n}\n@Override\n- public String getHelpText() {\n- return HELP_TEXT;\n+ protected boolean isValidKeyUse(KeyUse keyUse) {\n+ return keyUse.equals(KeyUse.SIG);\n}\n@Override\n- public List<ProviderConfigProperty> getConfigProperties() {\n- return CONFIG_PROPERTIES;\n+ protected boolean isSupportedRsaAlgorithm(String algorithm) {\n+ return algorithm.equals(Algorithm.RS256)\n+ || algorithm.equals(Algorithm.PS256)\n+ || algorithm.equals(Algorithm.RS384)\n+ || algorithm.equals(Algorithm.PS384)\n+ || algorithm.equals(Algorithm.RS512)\n+ || algorithm.equals(Algorithm.PS512);\n}\n@Override\n- public String getId() {\n- return ID;\n+ protected Logger getLogger() {\n+ return logger;\n}\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/resources/META-INF/services/org.keycloak.keys.KeyProviderFactory",
"new_path": "services/src/main/resources/META-INF/services/org.keycloak.keys.KeyProviderFactory",
"diff": "@@ -21,3 +21,4 @@ org.keycloak.keys.GeneratedRsaKeyProviderFactory\norg.keycloak.keys.JavaKeystoreKeyProviderFactory\norg.keycloak.keys.ImportedRsaKeyProviderFactory\norg.keycloak.keys.GeneratedEcdsaKeyProviderFactory\n+org.keycloak.keys.GeneratedRsaEncKeyProviderFactory\n\\ No newline at end of file\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/keys/GeneratedRsaKeyProviderTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/keys/GeneratedRsaKeyProviderTest.java",
"diff": "@@ -22,9 +22,10 @@ import org.junit.Rule;\nimport org.junit.Test;\nimport org.keycloak.common.util.MultivaluedHashMap;\nimport org.keycloak.common.util.PemUtils;\n+import org.keycloak.crypto.KeyUse;\nimport org.keycloak.jose.jws.AlgorithmType;\n+import org.keycloak.keys.GeneratedRsaEncKeyProviderFactory;\nimport org.keycloak.keys.GeneratedRsaKeyProviderFactory;\n-import org.keycloak.keys.KeyMetadata;\nimport org.keycloak.keys.KeyProvider;\nimport org.keycloak.representations.idm.ComponentRepresentation;\nimport org.keycloak.representations.idm.ErrorRepresentation;\n@@ -64,10 +65,19 @@ public class GeneratedRsaKeyProviderTest extends AbstractKeycloakTest {\n}\n@Test\n- public void defaultKeysize() throws Exception {\n+ public void defaultKeysizeForSig() throws Exception {\n+ defaultKeysize(GeneratedRsaKeyProviderFactory.ID, KeyUse.SIG);\n+ }\n+\n+ @Test\n+ public void defaultKeysizeForEnc() throws Exception {\n+ defaultKeysize(GeneratedRsaEncKeyProviderFactory.ID, KeyUse.ENC);\n+ }\n+\n+ private void defaultKeysize(String providerId, KeyUse keyUse) throws Exception {\nlong priority = System.currentTimeMillis();\n- ComponentRepresentation rep = createRep(\"valid\", GeneratedRsaKeyProviderFactory.ID);\n+ ComponentRepresentation rep = createRep(\"valid\", providerId);\nrep.setConfig(new MultivaluedHashMap<>());\nrep.getConfig().putSingle(\"priority\", Long.toString(priority));\n@@ -88,13 +98,23 @@ public class GeneratedRsaKeyProviderTest extends AbstractKeycloakTest {\nassertEquals(AlgorithmType.RSA.name(), key.getType());\nassertEquals(priority, key.getProviderPriority());\nassertEquals(2048, ((RSAPublicKey) PemUtils.decodePublicKey(keys.getKeys().get(0).getPublicKey())).getModulus().bitLength());\n+ assertEquals(keyUse, key.getUse());\n}\n@Test\n- public void largeKeysize() throws Exception {\n+ public void largeKeysizeForSig() throws Exception {\n+ largeKeysize(GeneratedRsaKeyProviderFactory.ID, KeyUse.SIG);\n+ }\n+\n+ @Test\n+ public void largeKeysizeForEnc() throws Exception {\n+ largeKeysize(GeneratedRsaEncKeyProviderFactory.ID, KeyUse.ENC);\n+ }\n+\n+ private void largeKeysize(String providerId, KeyUse keyUse) throws Exception {\nlong priority = System.currentTimeMillis();\n- ComponentRepresentation rep = createRep(\"valid\", GeneratedRsaKeyProviderFactory.ID);\n+ ComponentRepresentation rep = createRep(\"valid\", providerId);\nrep.setConfig(new MultivaluedHashMap<>());\nrep.getConfig().putSingle(\"priority\", Long.toString(priority));\nrep.getConfig().putSingle(\"keySize\", \"4096\");\n@@ -116,13 +136,23 @@ public class GeneratedRsaKeyProviderTest extends AbstractKeycloakTest {\nassertEquals(AlgorithmType.RSA.name(), key.getType());\nassertEquals(priority, key.getProviderPriority());\nassertEquals(4096, ((RSAPublicKey) PemUtils.decodePublicKey(keys.getKeys().get(0).getPublicKey())).getModulus().bitLength());\n+ assertEquals(keyUse, key.getUse());\n+ }\n+\n+ @Test\n+ public void updatePriorityForSig() throws Exception {\n+ updatePriority(GeneratedRsaKeyProviderFactory.ID, KeyUse.SIG);\n}\n@Test\n- public void updatePriority() throws Exception {\n+ public void updatePriorityForEnc() throws Exception {\n+ updatePriority(GeneratedRsaEncKeyProviderFactory.ID, KeyUse.ENC);\n+ }\n+\n+ private void updatePriority(String providerId, KeyUse keyUse) throws Exception {\nlong priority = System.currentTimeMillis();\n- ComponentRepresentation rep = createRep(\"valid\", GeneratedRsaKeyProviderFactory.ID);\n+ ComponentRepresentation rep = createRep(\"valid\", providerId);\nrep.setConfig(new MultivaluedHashMap<>());\nrep.getConfig().putSingle(\"priority\", Long.toString(priority));\n@@ -147,13 +177,23 @@ public class GeneratedRsaKeyProviderTest extends AbstractKeycloakTest {\nString publicKey2 = keys.getKeys().get(0).getPublicKey();\nassertEquals(publicKey, publicKey2);\n+ assertEquals(keyUse, keys.getKeys().get(0).getUse());\n+ }\n+\n+ @Test\n+ public void updateKeysizeForSig() throws Exception {\n+ updateKeysize(GeneratedRsaKeyProviderFactory.ID, KeyUse.SIG);\n}\n@Test\n- public void updateKeysize() throws Exception {\n+ public void updateKeysizeForEnc() throws Exception {\n+ updateKeysize(GeneratedRsaEncKeyProviderFactory.ID, KeyUse.ENC);\n+ }\n+\n+ private void updateKeysize(String providerId, KeyUse keyUse) throws Exception {\nlong priority = System.currentTimeMillis();\n- ComponentRepresentation rep = createRep(\"valid\", GeneratedRsaKeyProviderFactory.ID);\n+ ComponentRepresentation rep = createRep(\"valid\", providerId);\nrep.setConfig(new MultivaluedHashMap<>());\nrep.getConfig().putSingle(\"priority\", Long.toString(priority));\n@@ -177,11 +217,21 @@ public class GeneratedRsaKeyProviderTest extends AbstractKeycloakTest {\nassertNotEquals(publicKey, publicKey2);\nassertEquals(2048, ((RSAPublicKey) PemUtils.decodePublicKey(publicKey)).getModulus().bitLength());\nassertEquals(4096, ((RSAPublicKey) PemUtils.decodePublicKey(publicKey2)).getModulus().bitLength());\n+ assertEquals(keyUse, keys.getKeys().get(0).getUse());\n+ }\n+\n+ @Test\n+ public void invalidKeysizeForSig() throws Exception {\n+ invalidKeysize(GeneratedRsaKeyProviderFactory.ID);\n}\n@Test\n- public void invalidKeysize() throws Exception {\n- ComponentRepresentation rep = createRep(\"invalid\", GeneratedRsaKeyProviderFactory.ID);\n+ public void invalidKeysizeForEnd() throws Exception {\n+ invalidKeysize(GeneratedRsaEncKeyProviderFactory.ID);\n+ }\n+\n+ private void invalidKeysize(String providerId) throws Exception {\n+ ComponentRepresentation rep = createRep(\"invalid\", providerId);\nrep.getConfig().putSingle(\"keySize\", \"1234\");\nResponse response = adminClient.realm(\"test\").components().add(rep);\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19699 RSA key provider with key use = enc cannot select corresponding algorithm on Admin Console |
339,475 | 07.09.2021 03:34:36 | -32,400 | 884471c7296017d7c6dc2e060a8904b36f5fb811 | Avoid using stream that has been operated | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/device/DeviceGrantType.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/device/DeviceGrantType.java",
"diff": "@@ -273,15 +273,14 @@ public class DeviceGrantType {\n// Compute client scopes again from scope parameter. Check if user still has them granted\n// (but in device_code-to-token request, it could just theoretically happen that they are not available)\nString scopeParam = deviceCodeModel.getScope();\n- Stream<ClientScopeModel> clientScopes = TokenManager.getRequestedClientScopes(scopeParam, client);\n- if (!TokenManager.verifyConsentStillAvailable(session, user, client, clientScopes)) {\n+ if (!TokenManager.verifyConsentStillAvailable(session, user, client, TokenManager.getRequestedClientScopes(scopeParam, client))) {\nevent.error(Errors.NOT_ALLOWED);\nthrow new CorsErrorResponseException(cors, OAuthErrorException.INVALID_SCOPE,\n\"Client no longer has requested consent from user\", Response.Status.BAD_REQUEST);\n}\nClientSessionContext clientSessionCtx = DefaultClientSessionContext.fromClientSessionAndClientScopes(clientSession,\n- clientScopes, session);\n+ TokenManager.getRequestedClientScopes(scopeParam, client), session);\n// Set nonce as an attribute in the ClientSessionContext. Will be used for the token generation\nclientSessionCtx.setAttribute(OIDCLoginProtocol.NONCE_PARAM, deviceCodeModel.getNonce());\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/OAuth2DeviceAuthorizationGrantTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/OAuth2DeviceAuthorizationGrantTest.java",
"diff": "@@ -27,6 +27,7 @@ import org.junit.Rule;\nimport org.junit.Test;\nimport org.keycloak.admin.client.resource.ClientResource;\nimport org.keycloak.admin.client.resource.RealmResource;\n+import org.keycloak.models.ClientScopeModel;\nimport org.keycloak.models.OAuth2DeviceConfig;\nimport org.keycloak.models.utils.KeycloakModelUtils;\nimport org.keycloak.protocol.oidc.OIDCAdvancedConfigWrapper;\n@@ -59,6 +60,7 @@ public class OAuth2DeviceAuthorizationGrantTest extends AbstractKeycloakTest {\npublic static final String REALM_NAME = \"test\";\npublic static final String DEVICE_APP = \"test-device\";\npublic static final String DEVICE_APP_PUBLIC = \"test-device-public\";\n+ public static final String DEVICE_APP_PUBLIC_CUSTOM_CONSENT = \"test-device-public-custom-consent\";\n@Rule\npublic AssertEvents events = new AssertEvents(this);\n@@ -93,6 +95,14 @@ public class OAuth2DeviceAuthorizationGrantTest extends AbstractKeycloakTest {\n.build();\nrealm.client(appPublic);\n+ ClientRepresentation appPublicCustomConsent = ClientBuilder.create().id(KeycloakModelUtils.generateId()).publicClient()\n+ .clientId(DEVICE_APP_PUBLIC_CUSTOM_CONSENT).attribute(OAuth2DeviceConfig.OAUTH2_DEVICE_AUTHORIZATION_GRANT_ENABLED, \"true\")\n+ .consentRequired(true)\n+ .attribute(ClientScopeModel.DISPLAY_ON_CONSENT_SCREEN, \"true\")\n+ .attribute(ClientScopeModel.CONSENT_SCREEN_TEXT, \"This is the custom consent screen text.\")\n+ .build();\n+ realm.client(appPublicCustomConsent);\n+\nuserId = KeycloakModelUtils.generateId();\nUserRepresentation user = UserBuilder.create()\n.id(userId)\n@@ -192,6 +202,42 @@ public class OAuth2DeviceAuthorizationGrantTest extends AbstractKeycloakTest {\nassertNotNull(token);\n}\n+ @Test\n+ public void testPublicClientCustomConsent() throws Exception {\n+ // Device Authorization Request from device\n+ oauth.realm(REALM_NAME);\n+ oauth.clientId(DEVICE_APP_PUBLIC_CUSTOM_CONSENT);\n+ OAuthClient.DeviceAuthorizationResponse response = oauth.doDeviceAuthorizationRequest(DEVICE_APP_PUBLIC_CUSTOM_CONSENT, null);\n+\n+ Assert.assertEquals(200, response.getStatusCode());\n+ assertNotNull(response.getDeviceCode());\n+ assertNotNull(response.getUserCode());\n+ assertNotNull(response.getVerificationUri());\n+ assertNotNull(response.getVerificationUriComplete());\n+ Assert.assertEquals(60, response.getExpiresIn());\n+ Assert.assertEquals(5, response.getInterval());\n+\n+ openVerificationPage(response.getVerificationUriComplete());\n+\n+ // Do Login\n+ oauth.fillLoginForm(\"device-login\", \"password\");\n+\n+ // Consent\n+ Assert.assertTrue(grantPage.getDisplayedGrants().contains(\"This is the custom consent screen text.\"));\n+ grantPage.accept();\n+\n+ // Token request from device\n+ OAuthClient.AccessTokenResponse tokenResponse = oauth.doDeviceTokenRequest(DEVICE_APP_PUBLIC_CUSTOM_CONSENT, null, response.getDeviceCode());\n+\n+ Assert.assertEquals(200, tokenResponse.getStatusCode());\n+\n+ String tokenString = tokenResponse.getAccessToken();\n+ assertNotNull(tokenString);\n+ AccessToken token = oauth.verifyToken(tokenString);\n+\n+ assertNotNull(token);\n+ }\n+\n@Test\npublic void testNoRefreshToken() throws Exception {\nClientResource client = ApiUtil.findClientByClientId(adminClient.realm(REALM_NAME), DEVICE_APP);\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19237 Avoid using stream that has been operated |
339,660 | 04.09.2021 17:36:51 | -7,200 | 38448f377985d830db2f0f699a21e8236968c6a9 | french translation of emailInstructionUsername | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources-community/theme/base/login/messages/messages_fr.properties",
"new_path": "themes/src/main/resources-community/theme/base/login/messages/messages_fr.properties",
"diff": "@@ -111,6 +111,7 @@ emailLinkIdp5=pour continuer.\nbackToLogin=« Retour \\u00e0 la connexion\nemailInstruction=Entrez votre nom d''utilisateur ou votre courriel ; un courriel va vous \\u00eatre envoy\\u00e9 vous permettant de cr\\u00e9er un nouveau mot de passe.\n+emailInstructionUsername=Entrez votre nom d''utilisateur ; un courriel va vous \\u00eatre envoy\\u00e9 vous permettant de cr\\u00e9er un nouveau mot de passe.\ncopyCodeInstruction=Copiez le code et recopiez le dans votre application :\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19229 : french translation of emailInstructionUsername |
339,433 | 13.09.2021 04:32:35 | 25,200 | 661aca44520b17769800973d2f35db9530a862a1 | Implemented new identity provider mapper "Advanced claim to group mapper" alongside tests. | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/broker/provider/BrokeredIdentityContext.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/broker/provider/BrokeredIdentityContext.java",
"diff": "@@ -224,6 +224,21 @@ public class BrokeredIdentityContext {\nreturn roles;\n}\n+ /**\n+ * Obtains the set of groups that were assigned by mappers.\n+ *\n+ * @return a {@link Set} containing the groups.\n+ */\n+ @SuppressWarnings(\"unchecked\")\n+ private Set<String> getMapperAssignedGroups() {\n+ Set<String> groups = (Set<String>) this.contextData.get(Constants.MAPPER_GRANTED_GROUPS);\n+ if (groups == null) {\n+ groups = new HashSet<>();\n+ this.contextData.put(Constants.MAPPER_GRANTED_GROUPS, groups);\n+ }\n+ return groups;\n+ }\n+\n/**\n* Verifies if a mapper has already granted the specified role.\n*\n@@ -234,6 +249,16 @@ public class BrokeredIdentityContext {\nreturn this.getMapperGrantedRoles().contains(roleName);\n}\n+ /**\n+ * Verifies if a mapper has already assigned the specified group.\n+ *\n+ * @param groupId the id of the group.\n+ * @return {@code true} if a mapper has already assigned the group; {@code false} otherwise.\n+ */\n+ public boolean hasMapperAssignedGroup(final String groupId) {\n+ return this.getMapperAssignedGroups().contains(groupId);\n+ }\n+\n/**\n* Adds the specified role to the set of roles granted by mappers.\n*\n@@ -243,6 +268,15 @@ public class BrokeredIdentityContext {\nthis.getMapperGrantedRoles().add(roleName);\n}\n+ /**\n+ * Adds the specified group to the set of groups assigned by mappers.\n+ *\n+ * @param groupId the id of the group.\n+ */\n+ public void addMapperAssignedGroup(final String groupId) {\n+ this.getMapperAssignedGroups().add(groupId);\n+ }\n+\n/**\n* @deprecated use {@link #setFirstName(String)} and {@link #setLastName(String)} instead\n* @param name\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/broker/provider/ConfigConstants.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/broker/provider/ConfigConstants.java",
"diff": "@@ -23,4 +23,5 @@ package org.keycloak.broker.provider;\n*/\npublic interface ConfigConstants {\nString ROLE = \"role\";\n+ String GROUP = \"group\";\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/models/Constants.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/models/Constants.java",
"diff": "@@ -99,6 +99,9 @@ public final class Constants {\n// Roles already granted by a mapper when updating brokered users.\npublic static final String MAPPER_GRANTED_ROLES = \"MAPPER_GRANTED_ROLES\";\n+ // Groups already assigned by a mapper when updating brokered users.\n+ public static final String MAPPER_GRANTED_GROUPS = \"MAPPER_GRANTED_GROUPS\";\n+\n// Indication to admin-rest-endpoint that realm keys should be re-generated\npublic static final String GENERATE = \"GENERATE\";\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/provider/ProviderConfigProperty.java",
"new_path": "server-spi/src/main/java/org/keycloak/provider/ProviderConfigProperty.java",
"diff": "@@ -38,6 +38,7 @@ public class ProviderConfigProperty {\npublic static final String SCRIPT_TYPE=\"Script\";\npublic static final String FILE_TYPE=\"File\";\npublic static final String ROLE_TYPE=\"Role\";\n+ public static final String GROUP_TYPE=\"Group\";\n/**\n* Possibility to configure single String value, which needs to be chosen from the list of predefined values (HTML select)\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "services/src/main/java/org/keycloak/broker/oidc/mappers/AbstractClaimToGroupMapper.java",
"diff": "+/*\n+ * Copyright 2016 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.broker.oidc.mappers;\n+\n+import org.keycloak.broker.provider.BrokeredIdentityContext;\n+import org.keycloak.broker.provider.ConfigConstants;\n+import org.keycloak.broker.provider.IdentityBrokerException;\n+import org.keycloak.models.GroupModel;\n+import org.keycloak.models.IdentityProviderMapperModel;\n+import org.keycloak.models.KeycloakSession;\n+import org.keycloak.models.RealmModel;\n+import org.keycloak.models.UserModel;\n+import org.keycloak.models.utils.KeycloakModelUtils;\n+\n+public abstract class AbstractClaimToGroupMapper extends AbstractClaimMapper {\n+\n+ @Override\n+ public void importNewUser(KeycloakSession session, RealmModel realm, UserModel user,\n+ IdentityProviderMapperModel mapperModel, BrokeredIdentityContext context) {\n+\n+ GroupModel group = this.getGroup(realm, mapperModel);\n+ if (applies(mapperModel, context)) {\n+ user.joinGroup(group);\n+ }\n+ }\n+\n+ @Override\n+ public void updateBrokeredUser(KeycloakSession session, RealmModel realm, UserModel user,\n+ IdentityProviderMapperModel mapperModel, BrokeredIdentityContext context) {\n+\n+ GroupModel group = this.getGroup(realm, mapperModel);\n+ String groupId = mapperModel.getConfig().get(ConfigConstants.GROUP);\n+\n+ if (!context.hasMapperAssignedGroup(groupId)) {\n+ if (applies(mapperModel, context)) {\n+ context.addMapperAssignedGroup(groupId);\n+ user.joinGroup(group);\n+ } else {\n+ user.leaveGroup(group);\n+ }\n+ }\n+ }\n+\n+ /**\n+ * This method must be implemented by subclasses and they must return {@code true} if their mapping can be applied\n+ * (i.e. user has the OIDC claim that should be mapped) or {@code false} otherwise.\n+ *\n+ * @param mapperModel a reference to the {@link IdentityProviderMapperModel}.\n+ * @param context a reference to the {@link BrokeredIdentityContext}.\n+ * @return {@code true} if the mapping can be applied or {@code false} otherwise.*\n+ */\n+ protected abstract boolean applies(final IdentityProviderMapperModel mapperModel,\n+ final BrokeredIdentityContext context);\n+\n+ /**\n+ * Obtains the {@link GroupModel} corresponding the group configured in the specified\n+ * {@link IdentityProviderMapperModel}.\n+ * If the group doesn't exist, this method throws an {@link IdentityBrokerException}.\n+ *\n+ * @param realm a reference to the realm.\n+ * @param mapperModel a reference to the {@link IdentityProviderMapperModel} containing the configured group.\n+ * @return the {@link GroupModel}\n+ * @throws IdentityBrokerException if the group doesn't exist.\n+ */\n+ private GroupModel getGroup(final RealmModel realm, final IdentityProviderMapperModel mapperModel) {\n+ GroupModel group = KeycloakModelUtils.findGroupByPath(realm, mapperModel.getConfig().get(ConfigConstants.GROUP));\n+\n+ if (group == null) {\n+ throw new IdentityBrokerException(\"Unable to find group: \" + group.getId());\n+ }\n+ return group;\n+ }\n+}\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "services/src/main/java/org/keycloak/broker/oidc/mappers/AdvancedClaimToGroupMapper.java",
"diff": "+/*\n+ * Copyright 2016 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.broker.oidc.mappers;\n+\n+import org.keycloak.broker.oidc.KeycloakOIDCIdentityProviderFactory;\n+import org.keycloak.broker.oidc.OIDCIdentityProviderFactory;\n+import org.keycloak.broker.provider.BrokeredIdentityContext;\n+import org.keycloak.broker.provider.ConfigConstants;\n+import org.keycloak.models.IdentityProviderMapperModel;\n+import org.keycloak.models.IdentityProviderSyncMode;\n+import org.keycloak.provider.ProviderConfigProperty;\n+\n+import java.util.ArrayList;\n+import java.util.Arrays;\n+import java.util.HashSet;\n+import java.util.List;\n+import java.util.Map;\n+import java.util.Set;\n+\n+import static org.keycloak.utils.RegexUtils.valueMatchesRegex;\n+\n+public class AdvancedClaimToGroupMapper extends AbstractClaimToGroupMapper {\n+\n+ public static final String CLAIM_PROPERTY_NAME = \"claims\";\n+ public static final String ARE_CLAIM_VALUES_REGEX_PROPERTY_NAME = \"are.claim.values.regex\";\n+\n+ public static final String[] COMPATIBLE_PROVIDERS = {KeycloakOIDCIdentityProviderFactory.PROVIDER_ID, OIDCIdentityProviderFactory.PROVIDER_ID};\n+\n+ private static final List<ProviderConfigProperty> configProperties = new ArrayList<>();\n+\n+ static {\n+ ProviderConfigProperty claimsProperty = new ProviderConfigProperty();\n+ claimsProperty.setName(CLAIM_PROPERTY_NAME);\n+ claimsProperty.setLabel(\"Claims\");\n+ claimsProperty.setHelpText(\"Name and value of the claims to search for in token. You can reference nested claims using a '.', i.e. 'address.locality'. To use dot (.) literally, escape it with backslash (\\\\.)\");\n+ claimsProperty.setType(ProviderConfigProperty.MAP_TYPE);\n+ configProperties.add(claimsProperty);\n+ ProviderConfigProperty isClaimValueRegexProperty = new ProviderConfigProperty();\n+ isClaimValueRegexProperty.setName(ARE_CLAIM_VALUES_REGEX_PROPERTY_NAME);\n+ isClaimValueRegexProperty.setLabel(\"Regex Claim Values\");\n+ isClaimValueRegexProperty.setHelpText(\"If enabled claim values are interpreted as regular expressions.\");\n+ isClaimValueRegexProperty.setType(ProviderConfigProperty.BOOLEAN_TYPE);\n+ configProperties.add(isClaimValueRegexProperty);\n+ ProviderConfigProperty groupProperty = new ProviderConfigProperty();\n+ groupProperty.setName(ConfigConstants.GROUP);\n+ groupProperty.setLabel(\"Group\");\n+ groupProperty.setHelpText(\"Group to assign the user to if claim is present.\");\n+ groupProperty.setType(ProviderConfigProperty.GROUP_TYPE);\n+ configProperties.add(groupProperty);\n+ }\n+\n+ public static final String PROVIDER_ID = \"oidc-advanced-group-idp-mapper\";\n+\n+ @Override\n+ public boolean supportsSyncMode(IdentityProviderSyncMode syncMode) {\n+ return true;\n+ }\n+\n+ @Override\n+ public List<ProviderConfigProperty> getConfigProperties() {\n+ return configProperties;\n+ }\n+\n+ @Override\n+ public String getId() {\n+ return PROVIDER_ID;\n+ }\n+\n+ @Override\n+ public String[] getCompatibleProviders() {\n+ return COMPATIBLE_PROVIDERS;\n+ }\n+\n+ @Override\n+ public String getDisplayCategory() {\n+ return \"Group Importer\";\n+ }\n+\n+ @Override\n+ public String getDisplayType() {\n+ return \"Advanced Claim to Group\";\n+ }\n+\n+ @Override\n+ public String getHelpText() {\n+ return \"If all claims exists, assign the user to the specified group.\";\n+ }\n+\n+ @Override\n+ protected boolean applies(IdentityProviderMapperModel mapperModel, BrokeredIdentityContext context) {\n+ Map<String, String> claims = mapperModel.getConfigMap(CLAIM_PROPERTY_NAME);\n+ boolean areClaimValuesRegex = Boolean.parseBoolean(mapperModel.getConfig().get(ARE_CLAIM_VALUES_REGEX_PROPERTY_NAME));\n+\n+ for (Map.Entry<String, String> claim : claims.entrySet()) {\n+ Object value = getClaimValue(context, claim.getKey());\n+\n+ boolean claimValuesMismatch = !(areClaimValuesRegex ? valueMatchesRegex(claim.getValue(), value) : valueEquals(claim.getValue(), value));\n+ if (claimValuesMismatch) {\n+ return false;\n+ }\n+ }\n+\n+ return true;\n+ }\n+}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/resources/META-INF/services/org.keycloak.broker.provider.IdentityProviderMapper",
"new_path": "services/src/main/resources/META-INF/services/org.keycloak.broker.provider.IdentityProviderMapper",
"diff": "@@ -20,6 +20,7 @@ org.keycloak.broker.provider.HardcodedAttributeMapper\norg.keycloak.broker.provider.HardcodedUserSessionAttributeMapper\norg.keycloak.broker.oidc.mappers.ClaimToRoleMapper\norg.keycloak.broker.oidc.mappers.AdvancedClaimToRoleMapper\n+org.keycloak.broker.oidc.mappers.AdvancedClaimToGroupMapper\norg.keycloak.broker.oidc.mappers.ExternalKeycloakRoleToRoleMapper\norg.keycloak.broker.oidc.mappers.UserAttributeMapper\norg.keycloak.broker.oidc.mappers.UsernameTemplateMapper\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/IdentityProviderTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/IdentityProviderTest.java",
"diff": "@@ -562,12 +562,12 @@ public class IdentityProviderTest extends AbstractAdminTest {\ncreate(createRep(\"keycloak-oidc\", \"keycloak-oidc\"));\nprovider = realm.identityProviders().get(\"keycloak-oidc\");\nmapperTypes = provider.getMapperTypes();\n- assertMapperTypes(mapperTypes, \"keycloak-oidc-role-to-role-idp-mapper\", \"oidc-user-attribute-idp-mapper\", \"oidc-role-idp-mapper\", \"oidc-username-idp-mapper\", \"oidc-advanced-role-idp-mapper\");\n+ assertMapperTypes(mapperTypes, \"keycloak-oidc-role-to-role-idp-mapper\", \"oidc-user-attribute-idp-mapper\", \"oidc-role-idp-mapper\", \"oidc-username-idp-mapper\", \"oidc-advanced-group-idp-mapper\", \"oidc-advanced-role-idp-mapper\");\ncreate(createRep(\"oidc\", \"oidc\"));\nprovider = realm.identityProviders().get(\"oidc\");\nmapperTypes = provider.getMapperTypes();\n- assertMapperTypes(mapperTypes, \"oidc-user-attribute-idp-mapper\", \"oidc-role-idp-mapper\", \"oidc-username-idp-mapper\", \"oidc-advanced-role-idp-mapper\");\n+ assertMapperTypes(mapperTypes, \"oidc-user-attribute-idp-mapper\", \"oidc-role-idp-mapper\", \"oidc-username-idp-mapper\", \"oidc-advanced-group-idp-mapper\", \"oidc-advanced-role-idp-mapper\");\ncreate(createRep(\"saml\", \"saml\"));\nprovider = realm.identityProviders().get(\"saml\");\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/AbstractAdvancedGroupMapperTest.java",
"diff": "+package org.keycloak.testsuite.broker;\n+\n+import static org.keycloak.models.IdentityProviderMapperSyncMode.FORCE;\n+import static org.keycloak.models.IdentityProviderMapperSyncMode.IMPORT;\n+\n+import org.junit.Before;\n+import org.junit.Test;\n+import org.keycloak.models.IdentityProviderMapperSyncMode;\n+import org.keycloak.representations.idm.GroupRepresentation;\n+import org.keycloak.representations.idm.IdentityProviderRepresentation;\n+import org.keycloak.representations.idm.UserRepresentation;\n+\n+import com.google.common.collect.ImmutableList;\n+import com.google.common.collect.ImmutableMap;\n+\n+import java.util.List;\n+\n+public abstract class AbstractAdvancedGroupMapperTest extends AbstractGroupMapperTest {\n+\n+ private static final String CLAIMS_OR_ATTRIBUTES = \"[\\n\" +\n+ \" {\\n\" +\n+ \" \\\"key\\\": \\\"\" + KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME + \"\\\",\\n\" +\n+ \" \\\"value\\\": \\\"value 1\\\"\\n\" +\n+ \" },\\n\" +\n+ \" {\\n\" +\n+ \" \\\"key\\\": \\\"\" + KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME_2 + \"\\\",\\n\" +\n+ \" \\\"value\\\": \\\"value 2\\\"\\n\" +\n+ \" }\\n\" +\n+ \"]\";\n+\n+ private static final String CLAIMS_OR_ATTRIBUTES_REGEX = \"[\\n\" +\n+ \" {\\n\" +\n+ \" \\\"key\\\": \\\"\" + KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME + \"\\\",\\n\" +\n+ \" \\\"value\\\": \\\"va.*\\\"\\n\" +\n+ \" },\\n\" +\n+ \" {\\n\" +\n+ \" \\\"key\\\": \\\"\" + KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME_2 + \"\\\",\\n\" +\n+ \" \\\"value\\\": \\\"value 2\\\"\\n\" +\n+ \" }\\n\" +\n+ \"]\";\n+\n+ private String newValueForAttribute2 = \"\";\n+\n+ @Before\n+ public void addMapperTestGroupToConsumerRealm() {\n+ GroupRepresentation mapperTestGroup = new GroupRepresentation();\n+ mapperTestGroup.setName(MAPPER_TEST_GROUP_NAME);\n+ mapperTestGroup.setPath(MAPPER_TEST_GROUP_PATH);\n+\n+ adminClient.realm(bc.consumerRealmName()).groups().add(mapperTestGroup);\n+ }\n+\n+ @Test\n+ public void allValuesMatch() {\n+ createAdvancedGroupMapper(CLAIMS_OR_ATTRIBUTES, false);\n+ createUserInProviderRealm(ImmutableMap.<String, List<String>>builder()\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME, ImmutableList.<String>builder().add(\"value 1\").build())\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME_2, ImmutableList.<String>builder().add(\"value 2\").build())\n+ .build());\n+\n+ logInAsUserInIDPForFirstTime();\n+\n+ UserRepresentation user = findUser(bc.consumerRealmName(), bc.getUserLogin(), bc.getUserEmail());\n+ assertThatUserHasBeenAssignedToGroup(user);\n+ }\n+\n+ @Test\n+ public void valuesMismatch() {\n+ createAdvancedGroupMapper(CLAIMS_OR_ATTRIBUTES, false);\n+ createUserInProviderRealm(ImmutableMap.<String, List<String>>builder()\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME, ImmutableList.<String>builder().add(\"value 1\").build())\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME_2, ImmutableList.<String>builder().add(\"value mismatch\").build())\n+ .build());\n+\n+ logInAsUserInIDPForFirstTime();\n+\n+ UserRepresentation user = findUser(bc.consumerRealmName(), bc.getUserLogin(), bc.getUserEmail());\n+ assertThatUserHasNotBeenAssignedToGroup(user);\n+ }\n+\n+ @Test\n+ public void valuesMatchIfNoClaimsSpecified() {\n+ createAdvancedGroupMapper(\"[]\", false);\n+ createUserInProviderRealm(ImmutableMap.<String, List<String>>builder()\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME, ImmutableList.<String>builder().add(\"some value\").build())\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME_2, ImmutableList.<String>builder().add(\"some value\").build())\n+ .build());\n+\n+ logInAsUserInIDPForFirstTime();\n+\n+ UserRepresentation user = findUser(bc.consumerRealmName(), bc.getUserLogin(), bc.getUserEmail());\n+ assertThatUserHasBeenAssignedToGroup(user);\n+ }\n+\n+ @Test\n+ public void allValuesMatchRegex() {\n+ createAdvancedGroupMapper(CLAIMS_OR_ATTRIBUTES_REGEX, true);\n+ createUserInProviderRealm(ImmutableMap.<String, List<String>>builder()\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME, ImmutableList.<String>builder().add(\"value 1\").build())\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME_2, ImmutableList.<String>builder().add(\"value 2\").build())\n+ .build());\n+\n+ logInAsUserInIDPForFirstTime();\n+\n+ UserRepresentation user = findUser(bc.consumerRealmName(), bc.getUserLogin(), bc.getUserEmail());\n+ assertThatUserHasBeenAssignedToGroup(user);\n+ }\n+\n+ @Test\n+ public void valuesMismatchRegex() {\n+ createAdvancedGroupMapper(CLAIMS_OR_ATTRIBUTES_REGEX, true);\n+ createUserInProviderRealm(ImmutableMap.<String, List<String>>builder()\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME, ImmutableList.<String>builder().add(\"mismatch\").build())\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME_2, ImmutableList.<String>builder().add(\"value 2\").build())\n+ .build());\n+\n+ logInAsUserInIDPForFirstTime();\n+\n+ UserRepresentation user = findUser(bc.consumerRealmName(), bc.getUserLogin(), bc.getUserEmail());\n+ assertThatUserHasNotBeenAssignedToGroup(user);\n+ }\n+\n+ @Test\n+ public void updateBrokeredUserMismatchLeavesGroup() {\n+ newValueForAttribute2 = \"value mismatch\";\n+ UserRepresentation user = createMapperAndLoginAsUserTwiceWithMapper(FORCE, false);\n+\n+ assertThatUserHasNotBeenAssignedToGroup(user);\n+ }\n+\n+ @Test\n+ public void updateBrokeredUserMismatchDoesNotLeaveGroupInImportMode() {\n+ newValueForAttribute2 = \"value mismatch\";\n+ UserRepresentation user = createMapperAndLoginAsUserTwiceWithMapper(IMPORT, false);\n+\n+ assertThatUserHasBeenAssignedToGroup(user);\n+ }\n+\n+ @Test\n+ public void updateBrokeredUserMatchDoesntLeaveGroup() {\n+ newValueForAttribute2 = \"value 2\";\n+ UserRepresentation user = createMapperAndLoginAsUserTwiceWithMapper(FORCE, false);\n+\n+ assertThatUserHasBeenAssignedToGroup(user);\n+ }\n+\n+ @Test\n+ public void updateBrokeredUserIsAssignedToGroupInForceModeWhenCreatingTheMapperAfterFirstLogin() {\n+ newValueForAttribute2 = \"value 2\";\n+ UserRepresentation user = createMapperAndLoginAsUserTwiceWithMapper(FORCE, true);\n+\n+ assertThatUserHasBeenAssignedToGroup(user);\n+ }\n+\n+ public UserRepresentation createMapperAndLoginAsUserTwiceWithMapper(IdentityProviderMapperSyncMode syncMode, boolean createAfterFirstLogin) {\n+ return loginAsUserTwiceWithMapper(syncMode, createAfterFirstLogin, ImmutableMap.<String, List<String>>builder()\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME, ImmutableList.<String>builder().add(\"value 1\").build())\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME_2, ImmutableList.<String>builder().add(\"value 2\").build())\n+ .build());\n+ }\n+\n+ @Override\n+ protected void updateUser() {\n+ UserRepresentation user = findUser(bc.providerRealmName(), bc.getUserLogin(), bc.getUserEmail());\n+ ImmutableMap<String, List<String>> matchingAttributes = ImmutableMap.<String, List<String>>builder()\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME, ImmutableList.<String>builder().add(\"value 1\").build())\n+ .put(KcOidcBrokerConfiguration.ATTRIBUTE_TO_MAP_NAME_2, ImmutableList.<String>builder().add(newValueForAttribute2).build())\n+ .put(\"some.other.attribute\", ImmutableList.<String>builder().add(\"some value\").build())\n+ .build();\n+ user.setAttributes(matchingAttributes);\n+ adminClient.realm(bc.providerRealmName()).users().get(user.getId()).update(user);\n+ }\n+\n+ @Override\n+ protected void createMapperInIdp(IdentityProviderRepresentation idp, IdentityProviderMapperSyncMode syncMode) {\n+ createMapperInIdp(idp, CLAIMS_OR_ATTRIBUTES, false, syncMode);\n+ }\n+\n+ protected void createAdvancedGroupMapper(String claimsOrAttributeRepresentation, boolean areClaimsOrAttributeValuesRegexes) {\n+ IdentityProviderRepresentation idp = setupIdentityProvider();\n+ createMapperInIdp(idp, claimsOrAttributeRepresentation, areClaimsOrAttributeValuesRegexes, IMPORT);\n+ }\n+\n+ abstract protected void createMapperInIdp(\n+ IdentityProviderRepresentation idp, String claimsOrAttributeRepresentation, boolean areClaimsOrAttributeValuesRegexes, IdentityProviderMapperSyncMode syncMode);\n+}\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/AbstractGroupMapperTest.java",
"diff": "+package org.keycloak.testsuite.broker;\n+\n+import static org.junit.Assert.assertFalse;\n+import static org.junit.Assert.assertTrue;\n+import static org.keycloak.testsuite.broker.BrokerTestTools.getConsumerRoot;\n+\n+import org.keycloak.models.IdentityProviderMapperSyncMode;\n+import org.keycloak.representations.idm.IdentityProviderRepresentation;\n+import org.keycloak.representations.idm.UserRepresentation;\n+\n+import java.util.ArrayList;\n+import java.util.List;\n+import java.util.Map;\n+\n+public abstract class AbstractGroupMapperTest extends AbstractIdentityProviderMapperTest {\n+\n+ public static final String MAPPER_TEST_GROUP_NAME = \"mapper-test\";\n+ public static final String MAPPER_TEST_GROUP_PATH = \"/\" + MAPPER_TEST_GROUP_NAME;\n+\n+ protected abstract void createMapperInIdp(\n+ IdentityProviderRepresentation idp, IdentityProviderMapperSyncMode syncMode);\n+\n+ protected void updateUser() {\n+ }\n+\n+ protected UserRepresentation loginAsUserTwiceWithMapper(\n+ IdentityProviderMapperSyncMode syncMode, boolean createAfterFirstLogin,\n+ Map<String, List<String>> userConfig) {\n+ final IdentityProviderRepresentation idp = setupIdentityProvider();\n+ if (!createAfterFirstLogin) {\n+ createMapperInIdp(idp, syncMode);\n+ }\n+ createUserInProviderRealm(userConfig);\n+\n+ logInAsUserInIDPForFirstTime();\n+\n+ UserRepresentation user = findUser(bc.consumerRealmName(), bc.getUserLogin(), bc.getUserEmail());\n+ if (!createAfterFirstLogin) {\n+ assertThatUserHasBeenAssignedToGroup(user);\n+ } else {\n+ assertThatUserHasNotBeenAssignedToGroup(user);\n+ }\n+\n+ if (createAfterFirstLogin) {\n+ createMapperInIdp(idp, syncMode);\n+ }\n+ logoutFromRealm(getConsumerRoot(), bc.consumerRealmName());\n+\n+ updateUser();\n+\n+ logInAsUserInIDP();\n+ user = findUser(bc.consumerRealmName(), bc.getUserLogin(), bc.getUserEmail());\n+ return user;\n+ }\n+\n+ protected void assertThatUserHasBeenAssignedToGroup(UserRepresentation user) {\n+ List<String> groupNames = new ArrayList<>();\n+\n+ realm.users().get(user.getId()).groups().forEach(group -> {\n+ groupNames.add(group.getName());\n+ });\n+\n+ assertTrue(groupNames.contains(MAPPER_TEST_GROUP_NAME));\n+ }\n+\n+ protected void assertThatUserHasNotBeenAssignedToGroup(UserRepresentation user) {\n+ List<String> groupNames = new ArrayList<>();\n+\n+ realm.users().get(user.getId()).groups().forEach(group -> {\n+ groupNames.add(group.getName());\n+ });\n+\n+ assertFalse(groupNames.contains(MAPPER_TEST_GROUP_NAME));\n+ }\n+}\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/OidcAdvancedClaimToGroupMapperTest.java",
"diff": "+package org.keycloak.testsuite.broker;\n+\n+import org.keycloak.admin.client.resource.IdentityProviderResource;\n+import org.keycloak.broker.oidc.mappers.AdvancedClaimToGroupMapper;\n+import org.keycloak.broker.provider.ConfigConstants;\n+import org.keycloak.models.IdentityProviderMapperModel;\n+import org.keycloak.models.IdentityProviderMapperSyncMode;\n+import org.keycloak.representations.idm.IdentityProviderMapperRepresentation;\n+import org.keycloak.representations.idm.IdentityProviderRepresentation;\n+\n+import com.google.common.collect.ImmutableMap;\n+\n+public class OidcAdvancedClaimToGroupMapperTest extends AbstractAdvancedGroupMapperTest {\n+ @Override\n+ protected BrokerConfiguration getBrokerConfiguration() {\n+ return new KcOidcBrokerConfiguration();\n+ }\n+\n+ @Override\n+ protected void createMapperInIdp(IdentityProviderRepresentation idp, String claimsOrAttributeRepresentation,\n+ boolean areClaimsOrAttributeValuesRegexes, IdentityProviderMapperSyncMode syncMode) {\n+ IdentityProviderMapperRepresentation advancedClaimToGroupMapper = new IdentityProviderMapperRepresentation();\n+ advancedClaimToGroupMapper.setName(\"advanced-claim-to-group-mapper\");\n+ advancedClaimToGroupMapper.setIdentityProviderMapper(AdvancedClaimToGroupMapper.PROVIDER_ID);\n+ advancedClaimToGroupMapper.setConfig(ImmutableMap.<String, String> builder()\n+ .put(IdentityProviderMapperModel.SYNC_MODE, syncMode.toString())\n+ .put(AdvancedClaimToGroupMapper.CLAIM_PROPERTY_NAME, claimsOrAttributeRepresentation)\n+ .put(AdvancedClaimToGroupMapper.ARE_CLAIM_VALUES_REGEX_PROPERTY_NAME,\n+ areClaimsOrAttributeValuesRegexes ? \"true\" : \"false\")\n+ .put(ConfigConstants.GROUP, MAPPER_TEST_GROUP_PATH)\n+ .build());\n+\n+ IdentityProviderResource idpResource = realm.identityProviders().get(idp.getAlias());\n+ advancedClaimToGroupMapper.setIdentityProviderAlias(bc.getIDPAlias());\n+ idpResource.addMapper(advancedClaimToGroupMapper).close();\n+ }\n+}\n"
},
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"new_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"diff": "@@ -253,6 +253,8 @@ aggregate.attrs.label=Aggregate attribute values\naggregate.attrs.tooltip=Indicates if attribute values should be aggregated with the group attributes. If using OpenID Connect mapper the multivalued option needs to be enabled too in order to get all the values. Duplicated values are discarded and the order of values is not guaranteed with this option.\nselectRole.label=Select Role\nselectRole.tooltip=Enter role in the textbox to the left, or click this button to browse and select the role you want.\n+selectGroup.label=Select Group\n+selectGroup.tooltip=Enter group in the textbox to the left, or click this button to browse and select the group you want.\ntokenClaimName.label=Token Claim Name\ntokenClaimName.tooltip=Name of the claim to insert into the token. This can be a fully qualified name like 'address.street'. In this case, a nested json object will be created. To prevent nesting and use dot literally, escape the dot with backslash (\\\\.).\njsonType.label=Claim JSON Type\n@@ -1061,10 +1063,12 @@ export-clients=Export clients\naction=Action\nrole-selector=Role Selector\n+group-selector=Group Selector\nrealm-roles.tooltip=Realm roles that can be selected.\nselect-a-role=Select a role\nselect-realm-role=Select realm role\n+select-group=Select group\nclient-roles.tooltip=Client roles that can be selected.\nselect-client-role=Select client role\n"
},
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/js/app.js",
"new_path": "themes/src/main/resources/theme/base/admin/resources/js/app.js",
"diff": "@@ -3048,6 +3048,154 @@ module.controller('RoleSelectorModalCtrl', function($scope, realm, config, confi\n})\n});\n+module.controller('GroupSelectorModalCtrl', function($scope, $q, realm, config, configName, GroupsCount, Groups, Group, GroupChildren, Notifications, Dialog, ComponentUtils, $modalInstance, $translate) {\n+ $scope.realm = realm;\n+ $scope.groupList = [\n+ {\n+ \"id\" : \"realm\",\n+ \"name\": $translate.instant('groups'),\n+ \"subGroups\" : []\n+ }\n+ ];\n+ $scope.groupSelector = {\n+ searchCriteria: undefined,\n+ currentPage: 1,\n+ pageSize: 20,\n+ numberOfPages: 1\n+ };\n+ $scope.groupSelector.currentPageInput = $scope.groupSelector.currentPage;\n+\n+ var refreshGroups = function (search) {\n+ console.log('refreshGroups');\n+ $scope.groupSelector.currentPageInput = $scope.groupSelector.currentPage;\n+\n+ var first = ($scope.groupSelector.currentPage * $scope.groupSelector.pageSize) - $scope.groupSelector.pageSize;\n+ console.log('first:' + first);\n+ var queryParams = {\n+ realm : realm.realm,\n+ first : first,\n+ max : $scope.groupSelector.pageSize\n+ };\n+ var countParams = {\n+ realm : realm.realm,\n+ top : 'true'\n+ };\n+\n+ if(angular.isDefined(search) && search !== '') {\n+ queryParams.search = search;\n+ countParams.search = search;\n+ }\n+\n+ var promiseGetGroups = $q.defer();\n+ Groups.query(queryParams, function(entry) {\n+ promiseGetGroups.resolve(entry);\n+ }, function() {\n+ promiseGetGroups.reject($translate.instant('group.fetch.fail', {params: queryParams}));\n+ });\n+ promiseGetGroups.promise.then(function(groups) {\n+ $scope.groupList = [\n+ {\n+ \"id\" : \"realm\",\n+ \"name\": $translate.instant('groups'),\n+ \"subGroups\": ComponentUtils.sortGroups('name', groups)\n+ }\n+ ];\n+ if (angular.isDefined(search) && search !== '') {\n+ // Add highlight for concrete text match\n+ setTimeout(function () {\n+ document.querySelectorAll('span').forEach(function (element) {\n+ if (element.textContent.indexOf(search) != -1) {\n+ angular.element(element).addClass('highlight');\n+ }\n+ });\n+ }, 500);\n+ }\n+ }, function (failed) {\n+ Notifications.error(failed);\n+ });\n+\n+ var promiseCount = $q.defer();\n+ console.log('countParams: realm[' + countParams.realm);\n+ GroupsCount.query(countParams, function(entry) {\n+ promiseCount.resolve(entry);\n+ }, function() {\n+ promiseCount.reject($translate.instant('group.fetch.fail', {params: countParams}));\n+ });\n+ promiseCount.promise.then(function(entry) {\n+ if(angular.isDefined(entry.count) && entry.count > $scope.groupSelector.pageSize) {\n+ $scope.groupSelector.numberOfPages = Math.ceil(entry.count/$scope.groupSelector.pageSize);\n+ } else {\n+ $scope.groupSelector.numberOfPages = 1;\n+ }\n+ }, function (failed) {\n+ Notifications.error(failed);\n+ });\n+ };\n+\n+ refreshGroups();\n+\n+ $scope.$watch('groupSelector.currentPage', function(newValue, oldValue) {\n+ if(parseInt(newValue, 10) !== oldValue) {\n+ refreshGroups($scope.groupSelector.searchCriteria);\n+ }\n+ });\n+\n+ $scope.clearSearch = function() {\n+ $scope.groupSelector.searchCriteria = '';\n+ if (parseInt($scope.groupSelector.currentPage, 10) === 1) {\n+ refreshGroups();\n+ } else {\n+ $scope.groupSelector.currentPage = 1;\n+ }\n+ };\n+\n+ $scope.searchGroup = function() {\n+ if (parseInt($scope.groupSelector.currentPage, 10) === 1) {\n+ refreshGroups($scope.groupSelector.searchCriteria);\n+ } else {\n+ $scope.groupSelector.currentPage = 1;\n+ }\n+ };\n+\n+ $scope.selectGroup = function(selected) {\n+ if(!selected || selected.id === \"realm\") return;\n+\n+ config[configName] = selected.path;\n+ $modalInstance.close();\n+ }\n+\n+ $scope.edit = $scope.selectGroup;\n+\n+ $scope.cancel = function() {\n+ $modalInstance.dismiss();\n+ }\n+\n+ var isLeaf = function(node) {\n+ return node.id !== \"realm\" && (!node.subGroups || node.subGroups.length === 0);\n+ };\n+\n+ $scope.getGroupClass = function(node) {\n+ if (node.id === \"realm\") {\n+ return 'pficon pficon-users';\n+ }\n+ if (isLeaf(node)) {\n+ return 'normal';\n+ }\n+ if (node.subGroups.length && node.collapsed) return 'collapsed';\n+ if (node.subGroups.length && !node.collapsed) return 'expanded';\n+ return 'collapsed';\n+\n+ };\n+\n+ $scope.getSelectedClass = function(node) {\n+ if (node.selected) {\n+ return 'selected';\n+ }\n+ return undefined;\n+ }\n+});\n+\n+\nmodule.controller('ProviderConfigCtrl', function ($modal, $scope, $route, ComponentUtils, Client) {\nclientSelectControl($scope, $route.current.params.realm, Client);\n$scope.fileNames = {};\n@@ -3091,6 +3239,24 @@ module.controller('ProviderConfigCtrl', function ($modal, $scope, $route, Compon\n})\n}\n+ $scope.openGroupSelector = function (configName, config) {\n+ $modal.open({\n+ templateUrl: resourceUrl + '/partials/modal/group-selector.html',\n+ controller: 'GroupSelectorModalCtrl',\n+ resolve: {\n+ realm: function () {\n+ return $scope.realm;\n+ },\n+ config: function () {\n+ return config;\n+ },\n+ configName: function () {\n+ return configName;\n+ }\n+ }\n+ })\n+ }\n+\n$scope.changeClient = function(configName, config, client, multivalued) {\nif (!client || !client.id) {\nconfig[configName] = null;\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "themes/src/main/resources/theme/base/admin/resources/partials/modal/group-selector.html",
"diff": "+<div class=\"modal-header\">\n+ <button type=\"button\" class=\"close\" ng-click=\"cancel()\">\n+ <span class=\"pficon pficon-close\"></span>\n+ </button>\n+ <h4 class=\"modal-title\">{{:: 'group-selector' | translate}}</h4>\n+</div>\n+<div style=\"padding: 0 15px 15px 15px;\">\n+ <form>\n+ <table class=\"table table-striped table-bordered\" style=\"margin-bottom: 0\">\n+ <thead>\n+ <tr>\n+ <th class=\"kc-table-actions\" colspan=\"5\">\n+ <div class=\"form-inline\">\n+ <div class=\"pull-left\">\n+ <div class=\"input-group\">\n+ <input type=\"text\" placeholder=\"{{:: 'search.placeholder' | translate}}\" ng-model=\"groupSelector.searchCriteria\" class=\"form-control search\" onkeydown=\"if (event.keyCode == 13) document.getElementById('groupSearch').click()\">\n+ <div class=\"input-group-addon\">\n+ <i class=\"fa fa-search\" id=\"groupSearch\" ng-click=\"searchGroup()\"></i>\n+ </div>\n+ </div>\n+ </div>\n+\n+ <button id=\"viewAllGroups\" class=\"btn btn-default\" ng-click=\"clearSearch()\">{{:: 'view-all-groups' | translate}}</button>\n+ <div class=\"pull-right\">\n+ <button id=\"selectGroup\" class=\"btn btn-default\" ng-click=\"selectGroup(tree.currentNode)\">{{:: 'selectGroup.label' | translate}}</button>\n+ </div>\n+ </div>\n+ </th>\n+ </tr>\n+ </thead>\n+ <tbody>\n+ <tr>\n+ <td>\n+ <div\n+ tree-id=\"tree\"\n+ angular-treeview=\"true\"\n+ tree-model=\"groupList\"\n+ node-id=\"id\"\n+ node-label=\"name\"\n+ node-children=\"subGroups\" >\n+ </div>\n+ </td>\n+ </tr>\n+ </tbody>\n+ </table>\n+ <div style=\"margin-bottom: 50px\">\n+ <kc-paging current-page=\"groupSelector.currentPage\" number-of-pages=\"groupSelector.numberOfPages\" current-page-input=\"groupSelector.currentPageInput\"></kc-paging>\n+ </div>\n+ </form>\n+</div>\n\\ No newline at end of file\n"
},
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/templates/kc-provider-config.html",
"new_path": "themes/src/main/resources/theme/base/admin/resources/templates/kc-provider-config.html",
"diff": "</div>\n</div>\n</div>\n+ <div class=\"col-md-6\" data-ng-if=\"option.type == 'Group'\">\n+ <div class=\"row\">\n+ <div class=\"col-md-8\">\n+ <input class=\"form-control\" type=\"text\" data-ng-model=\"config[ option.name ]\" >\n+ </div>\n+ <div class=\"col-md-2\">\n+ <button type=\"button\" data-ng-click=\"openGroupSelector(option.name, config)\" class=\"btn btn-default\" tooltip-placement=\"top\" tooltip-trigger=\"mouseover mouseout\" tooltip=\"{{:: 'selectGroup.tooltip' | translate}}\">{{:: 'selectGroup.label' | translate}}</button>\n+ </div>\n+ </div>\n+ </div>\n<div class=\"col-md-4\" data-ng-if=\"option.type == 'ClientList'\">\n<input type=\"hidden\" ui-select2=\"clientsUiSelect\" id=\"clients\" data-ng-init=\"initSelectedClient(option.name, config)\" data-ng-model=\"selectedClient\" data-ng-change=\"changeClient(option.name, config, selectedClient, false);\" data-placeholder=\"{{:: 'selectOne' | translate}}...\">\n</input>\n"
},
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/keycloak/common/resources/lib/angular/treeview/angular.treeview.js",
"new_path": "themes/src/main/resources/theme/keycloak/common/resources/lib/angular/treeview/angular.treeview.js",
"diff": "var nodeChildren = attrs.nodeChildren || 'children';\n//tree template\n-\nvar template =\n'<ul>' +\n'<li data-ng-repeat=\"node in ' + treeModel + '\">' +\n'</li>' +\n'</ul>';\n-\n//check tree id, tree model\nif( treeId && treeModel ) {\n//root node\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19283 Implemented new identity provider mapper "Advanced claim to group mapper" alongside tests. |
339,304 | 22.11.2021 17:09:12 | 28,800 | 743abf0fb163c7927367e30fa375a35b4a1e2a3a | fixed bug that keycloak instance not recognized by Safari | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/keycloak.v2/account/index.ftl",
"new_path": "themes/src/main/resources/theme/keycloak.v2/account/index.ftl",
"diff": "<body>\n<script>\n- const keycloak = Keycloak({\n+ var keycloak = Keycloak({\nauthServerUrl: authUrl,\nrealm: realm,\nclientId: 'account-console'\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-17522 fixed bug that keycloak instance not recognized by Safari (#7880) |
339,281 | 08.11.2021 14:09:22 | -3,600 | 6b8890f5ddcc26b51580e6ad360e7073d6b17d9c | Inconsistent creation of default-roles-<realm> | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/custom/JpaUpdate13_0_0_MigrateDefaultRoles.java",
"new_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/custom/JpaUpdate13_0_0_MigrateDefaultRoles.java",
"diff": "@@ -18,8 +18,8 @@ package org.keycloak.connections.jpa.updater.liquibase.custom;\nimport java.sql.PreparedStatement;\nimport java.sql.ResultSet;\n-import java.util.HashSet;\n-import java.util.Set;\n+import java.util.HashMap;\n+import java.util.Map;\nimport java.util.UUID;\nimport liquibase.exception.CustomChangeException;\nimport liquibase.statement.core.InsertStatement;\n@@ -30,44 +30,44 @@ import org.keycloak.models.Constants;\npublic class JpaUpdate13_0_0_MigrateDefaultRoles extends CustomKeycloakTask {\n- private final Set<String> realmIds = new HashSet<>();\n+ private final Map<String, String> realmIdsAndNames = new HashMap<>();\n@Override\nprotected void generateStatementsImpl() throws CustomChangeException {\n- extractRealmIds(\"SELECT ID FROM \" + getTableName(\"REALM\"));\n+ extractRealmIdsAndNames(\"SELECT ID,NAME FROM \" + getTableName(\"REALM\"));\nString clientTable = getTableName(\"CLIENT\");\nString clientDefaultRolesTable = getTableName(\"CLIENT_DEFAULT_ROLES\");\nString compositeRoleTable = getTableName(\"COMPOSITE_ROLE\");\n- for (String realmId : realmIds) {\n+ for (Map.Entry<String, String> entry : realmIdsAndNames.entrySet()) {\nString id = UUID.randomUUID().toString();\n- String roleName = determineDefaultRoleName(realmId);\n+ String roleName = determineDefaultRoleName(entry.getKey(), entry.getValue());\nstatements.add(\n// create new default role\nnew InsertStatement(null, null, database.correctObjectName(\"KEYCLOAK_ROLE\", Table.class))\n.addColumnValue(\"ID\", id)\n- .addColumnValue(\"CLIENT_REALM_CONSTRAINT\", realmId)\n+ .addColumnValue(\"CLIENT_REALM_CONSTRAINT\", entry.getValue())\n.addColumnValue(\"CLIENT_ROLE\", Boolean.FALSE)\n.addColumnValue(\"DESCRIPTION\", \"${role_\" + roleName + \"}\")\n.addColumnValue(\"NAME\", roleName)\n- .addColumnValue(\"REALM_ID\", realmId)\n- .addColumnValue(\"REALM\", realmId)\n+ .addColumnValue(\"REALM_ID\", entry.getValue())\n+ .addColumnValue(\"REALM\", entry.getValue())\n);\nstatements.add(\n// assign the role to the realm\nnew UpdateStatement(null, null, database.correctObjectName(\"REALM\", Table.class))\n.addNewColumnValue(\"DEFAULT_ROLE\", id)\n.setWhereClause(\"REALM.ID=?\")\n- .addWhereParameter(realmId)\n+ .addWhereParameter(entry.getValue())\n);\nstatements.add(\n// copy data from REALM_DEFAULT_ROLES to COMPOSITE_ROLE\nnew RawSqlStatement(\"INSERT INTO \" + compositeRoleTable + \" (COMPOSITE, CHILD_ROLE) \" +\n\"SELECT '\" + id + \"', ROLE_ID FROM \" + getTableName(\"REALM_DEFAULT_ROLES\") +\n- \" WHERE REALM_ID = '\" + database.escapeStringForDatabase(realmId) + \"'\")\n+ \" WHERE REALM_ID = '\" + database.escapeStringForDatabase(entry.getValue()) + \"'\")\n);\nstatements.add(\n// copy data from CLIENT_DEFAULT_ROLES to COMPOSITE_ROLE\n@@ -75,17 +75,17 @@ public class JpaUpdate13_0_0_MigrateDefaultRoles extends CustomKeycloakTask {\n\"SELECT '\" + id + \"', \" + clientDefaultRolesTable + \".ROLE_ID FROM \" +\nclientDefaultRolesTable + \" INNER JOIN \" + clientTable + \" ON \" +\nclientTable + \".ID = \" + clientDefaultRolesTable + \".CLIENT_ID AND \" +\n- clientTable + \".REALM_ID = '\" + database.escapeStringForDatabase(realmId) + \"'\")\n+ clientTable + \".REALM_ID = '\" + database.escapeStringForDatabase(entry.getValue()) + \"'\")\n);\n}\n}\n- private void extractRealmIds(String sql) throws CustomChangeException {\n+ private void extractRealmIdsAndNames(String sql) throws CustomChangeException {\ntry (PreparedStatement statement = jdbcConnection.prepareStatement(sql);\nResultSet rs = statement.executeQuery()) {\nwhile (rs.next()) {\n- realmIds.add(rs.getString(1));\n+ realmIdsAndNames.put(rs.getString(1), rs.getString(2));\n}\n} catch (Exception e) {\n@@ -93,13 +93,13 @@ public class JpaUpdate13_0_0_MigrateDefaultRoles extends CustomKeycloakTask {\n}\n}\n- private String determineDefaultRoleName(String realmId) throws CustomChangeException {\n- String roleName = Constants.DEFAULT_ROLES_ROLE_PREFIX + \"-\" + realmId.toLowerCase();\n+ private String determineDefaultRoleName(String realmId, String realmName) throws CustomChangeException {\n+ String roleName = Constants.DEFAULT_ROLES_ROLE_PREFIX + \"-\" + realmName.toLowerCase();\nif (isRoleNameAvailable(realmId, roleName)) {\nreturn roleName;\n} else {\nfor (int i = 1; i < Integer.MAX_VALUE; i++) {\n- roleName = Constants.DEFAULT_ROLES_ROLE_PREFIX + \"-\" + realmId.toLowerCase() + \"-\" + i;\n+ roleName = Constants.DEFAULT_ROLES_ROLE_PREFIX + \"-\" + realmName.toLowerCase() + \"-\" + i;\nif (isRoleNameAvailable(realmId, roleName)) return roleName;\n}\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19525 Inconsistent creation of default-roles-<realm> |
339,281 | 23.11.2021 10:58:17 | -3,600 | 1adce39e1d26d9ffac58d61889e76a06019fcf61 | 8886 Add alwaysDisplayInConsole searchable client field | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientProvider.java",
"diff": "@@ -164,8 +164,11 @@ public class MapClientProvider implements ClientProvider {\n@Override\npublic Stream<ClientModel> getAlwaysDisplayInConsoleClientsStream(RealmModel realm) {\n- return getClientsStream(realm)\n- .filter(ClientModel::isAlwaysDisplayInConsole);\n+ DefaultModelCriteria<ClientModel> mcb = criteria();\n+ mcb = mcb.compare(SearchableFields.REALM_ID, Operator.EQ, realm.getId())\n+ .compare(SearchableFields.ALWAYS_DISPLAY_IN_CONSOLE, Operator.EQ, Boolean.TRUE);\n+ return tx.read(withCriteria(mcb).orderBy(SearchableFields.CLIENT_ID, ASCENDING))\n+ .map(entityToAdapterFunc(realm));\n}\n@Override\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/MapFieldPredicates.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/MapFieldPredicates.java",
"diff": "@@ -106,6 +106,7 @@ public class MapFieldPredicates {\nput(CLIENT_PREDICATES, ClientModel.SearchableFields.CLIENT_ID, MapClientEntity::getClientId);\nput(CLIENT_PREDICATES, ClientModel.SearchableFields.SCOPE_MAPPING_ROLE, MapFieldPredicates::checkScopeMappingRole);\nput(CLIENT_PREDICATES, ClientModel.SearchableFields.ENABLED, MapClientEntity::isEnabled);\n+ put(CLIENT_PREDICATES, ClientModel.SearchableFields.ALWAYS_DISPLAY_IN_CONSOLE, MapClientEntity::isAlwaysDisplayInConsole);\nput(CLIENT_PREDICATES, ClientModel.SearchableFields.ATTRIBUTE, MapFieldPredicates::checkClientAttributes);\nput(CLIENT_SCOPE_PREDICATES, ClientScopeModel.SearchableFields.REALM_ID, MapClientScopeEntity::getRealmId);\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/models/ClientModel.java",
"new_path": "server-spi/src/main/java/org/keycloak/models/ClientModel.java",
"diff": "@@ -47,6 +47,7 @@ public interface ClientModel extends ClientScopeModel, RoleContainerModel, Prot\npublic static final SearchableModelField<ClientModel> CLIENT_ID = new SearchableModelField<>(\"clientId\", String.class);\npublic static final SearchableModelField<ClientModel> ENABLED = new SearchableModelField<>(\"enabled\", Boolean.class);\npublic static final SearchableModelField<ClientModel> SCOPE_MAPPING_ROLE = new SearchableModelField<>(\"scopeMappingRole\", String.class);\n+ public static final SearchableModelField<ClientModel> ALWAYS_DISPLAY_IN_CONSOLE = new SearchableModelField<>(\"alwaysDisplayInConsole\", Boolean.class);\n/**\n* Search for attribute value. The parameters is a pair {@code (attribute_name, values...)} where {@code attribute_name}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | 8886 Add alwaysDisplayInConsole searchable client field |
339,172 | 11.11.2021 15:29:16 | -3,600 | c9e1e00b95d9f9f7a6f11c7e0c341781ed234c7b | BFD and Direct Grant - inconsistent number of failures
Do not "failure" on temporary or permanently locked users, but "forceChallenge"
Failure increments number of failures, and forceChallenge doesn't
Test cases cover:
1. Already disabled users
2. Temporarily disabled users by BFD
3. Permanently disabled users by BFD | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/authentication/authenticators/directgrant/ValidateUsername.java",
"new_path": "services/src/main/java/org/keycloak/authentication/authenticators/directgrant/ValidateUsername.java",
"diff": "@@ -82,7 +82,7 @@ public class ValidateUsername extends AbstractDirectGrantAuthenticator {\ncontext.getEvent().user(user);\ncontext.getEvent().error(bruteForceError);\nResponse challengeResponse = errorResponse(Response.Status.UNAUTHORIZED.getStatusCode(), \"invalid_grant\", \"Invalid user credentials\");\n- context.failure(AuthenticationFlowError.INVALID_USER, challengeResponse);\n+ context.forceChallenge(challengeResponse);\nreturn;\n}\n@@ -90,7 +90,7 @@ public class ValidateUsername extends AbstractDirectGrantAuthenticator {\ncontext.getEvent().user(user);\ncontext.getEvent().error(Errors.USER_DISABLED);\nResponse challengeResponse = errorResponse(Response.Status.BAD_REQUEST.getStatusCode(), \"invalid_grant\", \"Account disabled\");\n- context.failure(AuthenticationFlowError.INVALID_USER, challengeResponse);\n+ context.forceChallenge(challengeResponse);\nreturn;\n}\ncontext.setUser(user);\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/BruteForceTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/BruteForceTest.java",
"diff": "*/\npackage org.keycloak.testsuite.forms;\n+import org.hamcrest.MatcherAssert;\nimport org.jboss.arquillian.graphene.page.Page;\nimport org.junit.After;\nimport org.junit.Assert;\n@@ -98,13 +99,15 @@ public class BruteForceTest extends AbstractTestRealmKeycloakTest {\nprivate int lifespan;\n+ private static final Integer failureFactor= 2;\n+\n@Override\npublic void configureTestRealm(RealmRepresentation testRealm) {\nUserRepresentation user = RealmRepUtil.findUser(testRealm, \"test-user@localhost\");\nUserBuilder.edit(user).totpSecret(\"totpSecret\");\ntestRealm.setBruteForceProtected(true);\n- testRealm.setFailureFactor(2);\n+ testRealm.setFailureFactor(failureFactor);\ntestRealm.setMaxDeltaTimeSeconds(20);\ntestRealm.setMaxFailureWaitSeconds(100);\ntestRealm.setWaitIncrementSeconds(5);\n@@ -122,7 +125,7 @@ public class BruteForceTest extends AbstractTestRealmKeycloakTest {\nclearUserFailures();\nclearAllUserFailures();\nRealmRepresentation realm = adminClient.realm(\"test\").toRepresentation();\n- realm.setFailureFactor(2);\n+ realm.setFailureFactor(failureFactor);\nrealm.setMaxDeltaTimeSeconds(20);\nrealm.setMaxFailureWaitSeconds(100);\nrealm.setWaitIncrementSeconds(5);\n@@ -316,6 +319,73 @@ public class BruteForceTest extends AbstractTestRealmKeycloakTest {\n}\n+ @Test\n+ public void testNumberOfFailuresForDisabledUsersWithPasswordGrantType() throws Exception {\n+ try {\n+ UserRepresentation user = adminClient.realm(\"test\").users().search(\"test-user@localhost\", 0, 1).get(0);\n+ assertUserNumberOfFailures(user.getId(), 0);\n+ user.setEnabled(false);\n+ updateUser(user);\n+\n+ OAuthClient.AccessTokenResponse response = getTestToken(\"invalid\", \"invalid\");\n+ Assert.assertNull(response.getAccessToken());\n+ Assert.assertEquals(response.getError(), \"invalid_grant\");\n+ Assert.assertEquals(response.getErrorDescription(), \"Account disabled\");\n+ events.clear();\n+\n+ assertUserNumberOfFailures(user.getId(), 0);\n+ } finally {\n+ UserRepresentation user = adminClient.realm(\"test\").users().search(\"test-user@localhost\", 0, 1).get(0);\n+ user.setEnabled(true);\n+ updateUser(user);\n+ events.clear();\n+ }\n+ }\n+\n+ @Test\n+ public void testNumberOfFailuresForTemporaryDisabledUsersWithPasswordGrantType() throws Exception {\n+ UserRepresentation user = adminClient.realm(\"test\").users().search(\"test-user@localhost\", 0, 1).get(0);\n+\n+ // Lock user (temporarily) and make sure the number of failures matches failure factor\n+ lockUserWithPasswordGrant();\n+ assertUserNumberOfFailures(user.getId(), failureFactor);\n+\n+ // Try to login with invalid credentials and make sure the number of failures doesn't change during temporary lockout\n+ sendInvalidPasswordPasswordGrant();\n+ assertUserNumberOfFailures(user.getId(), failureFactor);\n+\n+ events.clear();\n+ }\n+\n+ @Test\n+ public void testNumberOfFailuresForPermanentlyDisabledUsersWithPasswordGrantType() throws Exception {\n+ RealmRepresentation realm = testRealm().toRepresentation();\n+ try {\n+ // Set permanent lockout for the test\n+ realm.setPermanentLockout(true);\n+ testRealm().update(realm);\n+\n+ UserRepresentation user = adminClient.realm(\"test\").users().search(\"test-user@localhost\", 0, 1).get(0);\n+\n+ // Lock user (permanently) and make sure the number of failures matches failure factor\n+ lockUserWithPasswordGrant();\n+ assertUserNumberOfFailures(user.getId(), failureFactor);\n+ assertUserDisabledReason(BruteForceProtector.DISABLED_BY_PERMANENT_LOCKOUT);\n+\n+ // Try to login with invalid credentials and make sure the number of failures doesn't change during temporary lockout\n+ sendInvalidPasswordPasswordGrant();\n+ assertUserNumberOfFailures(user.getId(), failureFactor);\n+\n+ events.clear();\n+ } finally {\n+ realm.setPermanentLockout(false);\n+ testRealm().update(realm);\n+ UserRepresentation user = adminClient.realm(\"test\").users().search(\"test-user@localhost\", 0, 1).get(0);\n+ user.setEnabled(true);\n+ updateUser(user);\n+ }\n+ }\n+\n@Test\npublic void testBrowserInvalidPassword() throws Exception {\nloginSuccess();\n@@ -725,4 +795,30 @@ public class BruteForceTest extends AbstractTestRealmKeycloakTest {\n.firstAttribute(UserModel.DISABLED_REASON);\nassertEquals(expected, actual);\n}\n+\n+ private void assertUserNumberOfFailures(String userId, Integer numberOfFailures) {\n+ Map<String, Object> userAttackInfo = adminClient.realm(\"test\").attackDetection().bruteForceUserStatus(userId);\n+ MatcherAssert.assertThat((Integer) userAttackInfo.get(\"numFailures\"), is(numberOfFailures));\n+ }\n+\n+ private void sendInvalidPasswordPasswordGrant() throws Exception {\n+ String totpSecret = totp.generateTOTP(\"totpSecret\");\n+ OAuthClient.AccessTokenResponse response = getTestToken(\"invalid\", totpSecret);\n+ Assert.assertNull(response.getAccessToken());\n+ Assert.assertEquals(response.getError(), \"invalid_grant\");\n+ Assert.assertEquals(response.getErrorDescription(), \"Invalid user credentials\");\n+ events.clear();\n+ }\n+\n+ private void lockUserWithPasswordGrant() throws Exception {\n+ String totpSecret = totp.generateTOTP(\"totpSecret\");\n+ OAuthClient.AccessTokenResponse response = getTestToken(\"password\", totpSecret);\n+ Assert.assertNotNull(response.getAccessToken());\n+ Assert.assertNull(response.getError());\n+ events.clear();\n+\n+ for (int i = 0; i < failureFactor; ++i) {\n+ sendInvalidPasswordPasswordGrant();\n+ }\n+ }\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19773 BFD and Direct Grant - inconsistent number of failures
Do not "failure" on temporary or permanently locked users, but "forceChallenge"
Failure increments number of failures, and forceChallenge doesn't
Test cases cover:
1. Already disabled users
2. Temporarily disabled users by BFD
3. Permanently disabled users by BFD |
339,290 | 05.11.2021 15:55:02 | -39,600 | b03b390dd2475979d97f34891b96839a68cd7097 | Prevent user enumeration in FIPS mode | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/authentication/authenticators/browser/AbstractUsernameFormAuthenticator.java",
"new_path": "services/src/main/java/org/keycloak/authentication/authenticators/browser/AbstractUsernameFormAuthenticator.java",
"diff": "@@ -98,7 +98,7 @@ public abstract class AbstractUsernameFormAuthenticator extends AbstractFormAuth\nprotected void runDefaultDummyHash(AuthenticationFlowContext context) {\nPasswordHashProvider hash = context.getSession().getProvider(PasswordHashProvider.class, PasswordPolicy.HASH_ALGORITHM_DEFAULT);\n- hash.encode(\"dummypassword\", PasswordPolicy.HASH_ITERATIONS_DEFAULT);\n+ hash.encode(\"SlightlyLongerDummyPassword\", PasswordPolicy.HASH_ITERATIONS_DEFAULT);\n}\nprotected void dummyHash(AuthenticationFlowContext context) {\n@@ -113,7 +113,7 @@ public abstract class AbstractUsernameFormAuthenticator extends AbstractFormAuth\nreturn;\n} else {\n- hash.encode(\"dummypassword\", policy.getHashIterations());\n+ hash.encode(\"SlightlyLongerDummyPassword\", policy.getHashIterations());\n}\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19228: Prevent user enumeration in FIPS mode |
339,179 | 29.11.2021 16:24:58 | -3,600 | a5c3b834430f6747acd9602e427aa25f13392f35 | Closes - Make MapGroupEntity generated | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/group/MapGroupAdapter.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/group/MapGroupAdapter.java",
"diff": "@@ -26,6 +26,7 @@ import org.keycloak.models.RoleModel;\nimport java.util.Collections;\nimport java.util.List;\nimport java.util.Map;\n+import java.util.Set;\nimport java.util.stream.Stream;\n@@ -83,7 +84,8 @@ public class MapGroupAdapter extends AbstractGroupModel<MapGroupEntity> {\n@Override\npublic Map<String, List<String>> getAttributes() {\n- return entity.getAttributes();\n+ Map<String, List<String>> attrs = entity.getAttributes();\n+ return attrs == null ? Collections.emptyMap() : attrs;\n}\n@Override\n@@ -147,7 +149,8 @@ public class MapGroupAdapter extends AbstractGroupModel<MapGroupEntity> {\n@Override\npublic boolean hasDirectRole(RoleModel role) {\n- return entity.getGrantedRoles().contains(role.getId());\n+ Set<String> grantedRoles = entity.getGrantedRoles();\n+ return grantedRoles != null && grantedRoles.contains(role.getId());\n}\n@Override\n@@ -162,12 +165,13 @@ public class MapGroupAdapter extends AbstractGroupModel<MapGroupEntity> {\n@Override\npublic Stream<RoleModel> getRoleMappingsStream() {\n- return entity.getGrantedRoles().stream()\n+ Set<String> grantedRoles = entity.getGrantedRoles();\n+ return grantedRoles == null ? Stream.empty() : grantedRoles.stream()\n.map(roleId -> session.roles().getRoleById(realm, roleId));\n}\n@Override\npublic void deleteRoleMapping(RoleModel role) {\n- entity.removeRole(role.getId());\n+ entity.removeGrantedRole(role.getId());\n}\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/group/MapGroupEntity.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/group/MapGroupEntity.java",
"diff": "/*\n- * Copyright 2020 Red Hat, Inc. and/or its affiliates\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n* and other contributors as indicated by the @author tags.\n*\n* Licensed under the Apache License, Version 2.0 (the \"License\");\npackage org.keycloak.models.map.group;\n+import org.keycloak.models.map.annotations.GenerateEntityImplementations;\nimport org.keycloak.models.map.common.AbstractEntity;\n-\n+import org.keycloak.models.map.common.DeepCloner;\nimport org.keycloak.models.map.common.UpdatableEntity;\n-import java.util.HashMap;\n-import java.util.HashSet;\n+\nimport java.util.List;\nimport java.util.Map;\n-import java.util.Objects;\nimport java.util.Set;\n-/**\n- *\n- * @author mhajas\n- */\n-public class MapGroupEntity extends UpdatableEntity.Impl implements AbstractEntity {\n-\n- private String id;\n- private String realmId;\n-\n- private String name;\n- private String parentId;\n- private Map<String, List<String>> attributes = new HashMap<>();\n- private Set<String> grantedRoles = new HashSet<>();\n-\n- /**\n- * Flag signalizing that any of the setters has been meaningfully used.\n- */\n+@GenerateEntityImplementations(\n+ inherits = \"org.keycloak.models.map.group.MapGroupEntity.AbstractGroupEntity\"\n+)\[email protected]\n+public interface MapGroupEntity extends UpdatableEntity, AbstractEntity {\n- public MapGroupEntity() {}\n+ public abstract class AbstractGroupEntity extends UpdatableEntity.Impl implements MapGroupEntity {\n- public MapGroupEntity(String id, String realmId) {\n- this.id = id;\n- this.realmId = realmId;\n- }\n+ private String id;\n@Override\npublic String getId() {\n@@ -64,71 +48,25 @@ public class MapGroupEntity extends UpdatableEntity.Impl implements AbstractEnti\nthis.updated |= id != null;\n}\n- public String getName() {\n- return name;\n}\n- public void setName(String name) {\n- this.updated |= ! Objects.equals(this.name, name);\n- this.name = name;\n- }\n+ Map<String, List<String>> getAttributes();\n+ void setAttributes(Map<String, List<String>> attributes);\n+ List<String> getAttribute(String name);\n+ void setAttribute(String name, List<String> value);\n+ void removeAttribute(String name);\n- public String getParentId() {\n- return parentId;\n- }\n+ String getName();\n+ void setName(String name);\n- public void setParentId(String parentId) {\n- this.updated |= !Objects.equals(this.parentId, parentId);\n- this.parentId = parentId;\n- }\n-\n- public Map<String, List<String>> getAttributes() {\n- return attributes;\n- }\n+ String getParentId();\n+ void setParentId(String parentId);\n- public void setAttributes(Map<String, List<String>> attributes) {\n- this.updated |= ! Objects.equals(this.attributes, attributes);\n- this.attributes = attributes;\n- }\n+ String getRealmId();\n+ void setRealmId(String realmId);\n- public void setAttribute(String name, List<String> value) {\n- this.updated |= !this.attributes.containsKey(name) || !this.attributes.get(name).equals(value);\n- this.attributes.put(name, value);\n- }\n-\n- public void removeAttribute(String name) {\n- this.updated |= this.attributes.remove(name) != null;\n- }\n-\n- public List<String> getAttribute(String name) {\n- return this.attributes.get(name);\n- }\n-\n- public String getRealmId() {\n- return this.realmId;\n- }\n-\n- public void setRealmId(String realmId) {\n- this.updated |= !Objects.equals(this.realmId, realmId);\n- this.realmId = realmId;\n- }\n-\n- public Set<String> getGrantedRoles() {\n- return grantedRoles;\n- }\n-\n- public void setGrantedRoles(Set<String> grantedRoles) {\n- this.updated |= !Objects.equals(this.grantedRoles, grantedRoles);\n- this.grantedRoles = grantedRoles;\n- }\n-\n- public void removeRole(String role) {\n- this.updated |= this.grantedRoles.contains(role);\n- this.grantedRoles.remove(role);\n- }\n-\n- public void addGrantedRole(String role) {\n- this.updated |= !this.grantedRoles.contains(role);\n- this.grantedRoles.add(role);\n- }\n+ Set<String> getGrantedRoles();\n+ void setGrantedRoles(Set<String> grantedRoles);\n+ void addGrantedRole(String role);\n+ void removeGrantedRole(String role);\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/group/MapGroupProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/group/MapGroupProvider.java",
"diff": "@@ -197,7 +197,9 @@ public class MapGroupProvider implements GroupProvider {\nthrow new ModelDuplicateException(\"Group with name '\" + name + \"' in realm \" + realm.getName() + \" already exists for requested parent\" );\n}\n- MapGroupEntity entity = new MapGroupEntity(id, realm.getId());\n+ MapGroupEntity entity = new MapGroupEntityImpl();\n+ entity.setId(id);\n+ entity.setRealmId(realm.getId());\nentity.setName(name);\nentity.setParentId(toParent == null ? null : toParent.getId());\nif (id != null && tx.read(id) != null) {\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorageProviderFactory.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorageProviderFactory.java",
"diff": "@@ -52,6 +52,7 @@ import org.keycloak.models.map.common.DeepCloner;\nimport org.keycloak.models.map.common.Serialization;\nimport org.keycloak.models.map.common.UpdatableEntity;\nimport org.keycloak.models.map.group.MapGroupEntity;\n+import org.keycloak.models.map.group.MapGroupEntityImpl;\nimport org.keycloak.models.map.loginFailure.MapUserLoginFailureEntity;\nimport org.keycloak.models.map.realm.MapRealmEntity;\nimport org.keycloak.models.map.role.MapRoleEntity;\n@@ -104,6 +105,7 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide\n.genericCloner(Serialization::from)\n.constructorDC(MapClientEntityImpl.class, MapClientEntityImpl::new)\n.constructor(MapProtocolMapperEntity.class, MapProtocolMapperEntityImpl::new)\n+ .constructor(MapGroupEntityImpl.class, MapGroupEntityImpl::new)\n.build();\npublic static final Map<Class<?>, String> MODEL_TO_NAME = new HashMap<>();\n@@ -153,7 +155,7 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide\nINTERFACE_TO_IMPL.put(MapClientEntity.class, MapClientEntityImpl.class);\n// INTERFACE_TO_IMPL.put(MapClientScopeEntity.class, MapClientScopeEntityImpl.class);\n// INTERFACE_TO_IMPL.put(MapClientEntity.class, MapClientEntityImpl.class);\n-// INTERFACE_TO_IMPL.put(MapGroupEntity.class, MapGroupEntityImpl.class);\n+ INTERFACE_TO_IMPL.put(MapGroupEntity.class, MapGroupEntityImpl.class);\n// INTERFACE_TO_IMPL.put(MapRealmEntity.class, MapRealmEntityImpl.class);\n// INTERFACE_TO_IMPL.put(MapRoleEntity.class, MapRoleEntityImpl.class);\n// INTERFACE_TO_IMPL.put(MapRootAuthenticationSessionEntity.class, MapRootAuthenticationSessionEntityImpl.class);\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Closes #8807 - Make MapGroupEntity generated |
339,618 | 29.11.2021 10:54:52 | -3,600 | 7f734c9e68827cb01f01c05e6e2d361240214680 | Sanitize CLI Log output and show-config output | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/Picocli.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/Picocli.java",
"diff": "@@ -25,6 +25,7 @@ import static org.keycloak.quarkus.runtime.configuration.Configuration.getBuiltT\nimport static org.keycloak.quarkus.runtime.configuration.Configuration.getConfig;\nimport static org.keycloak.quarkus.runtime.Environment.isDevMode;\nimport static org.keycloak.quarkus.runtime.configuration.Configuration.getRuntimeProperty;\n+import static org.keycloak.quarkus.runtime.configuration.mappers.PropertyMappers.formatValue;\nimport static org.keycloak.quarkus.runtime.configuration.mappers.PropertyMappers.isBuildTimeProperty;\nimport static org.keycloak.utils.StringUtil.isNotBlank;\nimport static picocli.CommandLine.Model.UsageMessageSpec.SECTION_KEY_COMMAND_LIST;\n@@ -34,6 +35,7 @@ import java.io.FileInputStream;\nimport java.io.InputStream;\nimport java.util.ArrayList;\nimport java.util.Arrays;\n+import java.util.Collections;\nimport java.util.Iterator;\nimport java.util.List;\nimport java.util.Map;\n@@ -49,13 +51,13 @@ import org.keycloak.quarkus.runtime.cli.command.Main;\nimport org.keycloak.quarkus.runtime.cli.command.Start;\nimport org.keycloak.quarkus.runtime.cli.command.StartDev;\nimport org.keycloak.common.Profile;\n+import org.keycloak.quarkus.runtime.configuration.MicroProfileConfigProvider;\nimport org.keycloak.quarkus.runtime.configuration.mappers.ConfigCategory;\nimport org.keycloak.quarkus.runtime.configuration.mappers.PropertyMappers;\nimport org.keycloak.quarkus.runtime.configuration.KeycloakConfigSourceProvider;\nimport org.keycloak.quarkus.runtime.configuration.mappers.PropertyMapper;\nimport org.keycloak.quarkus.runtime.Environment;\n-import io.quarkus.runtime.Quarkus;\nimport io.smallrye.config.ConfigValue;\nimport picocli.CommandLine;\nimport picocli.CommandLine.Model.CommandSpec;\n@@ -118,11 +120,12 @@ public final class Picocli {\nif (hasConfigChanges()) {\ncmd.getOut().println(\"Changes detected in configuration. Updating the server image.\");\nif(!isDevMode()) {\n+ List<String> cliInput = getSanitizedCliInput();\ncmd.getOut().printf(\"For an optional runtime and bypass this step, please run the '%s' command prior to starting the server:%n%n\\t%s %s %s%n\",\nBuild.NAME,\nEnvironment.getCommand(),\nBuild.NAME,\n- String.join(\" \", asList(ARG_SPLIT.split(Environment.getConfigArgs()))) + \"\\n\");\n+ String.join(\" \", cliInput) + \"\\n\");\n}\nreturn true;\n}\n@@ -130,6 +133,39 @@ public final class Picocli {\nreturn hasProviderChanges();\n}\n+ /**\n+ * checks the raw cli input for possible credentials / properties which should be masked,\n+ * and masks them.\n+ * @return a list of potentially masked properties in CLI format, e.g. `--db-password=*******`\n+ * instead of the actual passwords value.\n+ */\n+ private static List<String> getSanitizedCliInput() {\n+\n+ if(Environment.getConfigArgs().isEmpty()) {\n+ return Collections.emptyList();\n+ }\n+\n+ List<String> rawCliArgs = asList(ARG_SPLIT.split(Environment.getConfigArgs()));\n+ List<String> properties = new ArrayList<>();\n+\n+ if (!rawCliArgs.isEmpty()) {\n+ for(String rawCliArg : rawCliArgs) {\n+ String rawKey = rawCliArg.split(\"=\")[0];\n+ PropertyMapper mapper = PropertyMappers.getMapper(rawKey);\n+ String value = rawCliArg.split(\"=\")[1];\n+\n+ if (mapper != null) {\n+ value = formatValue(\n+ mapper.getFrom(),\n+ value);\n+ }\n+\n+ properties.add(rawKey + \"=\" + value);\n+ }\n+ }\n+ return properties;\n+ }\n+\nprivate static void runReAugmentation(List<String> cliArgs, CommandLine cmd) {\nList<String> configArgsList = new ArrayList<>(cliArgs);\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/mappers/PropertyMapper.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/mappers/PropertyMapper.java",
"diff": "@@ -22,6 +22,7 @@ import java.util.function.BiFunction;\nimport io.smallrye.config.ConfigSourceInterceptorContext;\nimport io.smallrye.config.ConfigValue;\n+import org.keycloak.quarkus.runtime.cli.Picocli;\nimport org.keycloak.quarkus.runtime.configuration.MicroProfileConfigProvider;\npublic class PropertyMapper {\n@@ -46,6 +47,8 @@ public class PropertyMapper {\nprivate final ConfigCategory category;\nprivate final String paramLabel;\nprivate final boolean hidden;\n+ private String cliFormat;\n+\nPropertyMapper(String from, String to, String defaultValue, BiFunction<String, ConfigSourceInterceptorContext, String> mapper,\nString mapFrom, boolean buildTime, String description, String paramLabel, boolean mask, Iterable<String> expectedValues,\n@@ -62,6 +65,7 @@ public class PropertyMapper {\nthis.expectedValues = expectedValues == null ? Collections.emptyList() : expectedValues;\nthis.category = category != null ? category : ConfigCategory.GENERAL;\nthis.hidden = hidden;\n+ setCliFormat(this.from);\n}\npublic static PropertyMapper.Builder builder(String fromProp, String toProp) {\n@@ -163,6 +167,26 @@ public class PropertyMapper {\nreturn hidden;\n}\n+ public boolean isBuildTime() {\n+ return buildTime;\n+ }\n+\n+ public String getTo() {\n+ return to;\n+ }\n+\n+ public String getParamLabel() {\n+ return paramLabel;\n+ }\n+\n+ public String getCliFormat() {\n+ return cliFormat;\n+ }\n+\n+ boolean isMask() {\n+ return mask;\n+ }\n+\nprivate ConfigValue transformValue(String value, ConfigSourceInterceptorContext context) {\nif (value == null) {\nreturn null;\n@@ -181,20 +205,8 @@ public class PropertyMapper {\nreturn null;\n}\n- public boolean isBuildTime() {\n- return buildTime;\n- }\n-\n- boolean isMask() {\n- return mask;\n- }\n-\n- public String getTo() {\n- return to;\n- }\n-\n- public String getParamLabel() {\n- return paramLabel;\n+ private void setCliFormat(String from) {\n+ cliFormat = Picocli.ARG_PREFIX + PropertyMappers.toCLIFormat(from).substring(3);\n}\npublic static class Builder {\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/mappers/PropertyMappers.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/mappers/PropertyMappers.java",
"diff": "@@ -15,6 +15,7 @@ import java.util.stream.Collectors;\npublic final class PropertyMappers {\n+ public static String VALUE_MASK = \"*******\";\nstatic final MappersConfig MAPPERS = new MappersConfig();\nprivate PropertyMappers(){}\n@@ -96,6 +97,7 @@ public final class PropertyMappers {\nif (name.indexOf('.') == -1) {\nreturn name;\n}\n+\nreturn MicroProfileConfigProvider.NS_KEYCLOAK_PREFIX\n.concat(name.substring(3, name.lastIndexOf('.') + 1)\n.replaceAll(\"\\\\.\", \"-\") + name.substring(name.lastIndexOf('.') + 1));\n@@ -116,23 +118,26 @@ public final class PropertyMappers {\n}\npublic static String formatValue(String property, String value) {\n+ property = removeProfilePrefixIfNeeded(property);\nPropertyMapper mapper = getMapper(property);\nif (mapper != null && mapper.isMask()) {\n- return \"*******\";\n+ return VALUE_MASK;\n}\nreturn value;\n}\n- public static PropertyMapper getMapper(String property) {\n- PropertyMapper mapper = MAPPERS.get(property);\n-\n- if (mapper != null) {\n- return mapper;\n+ private static String removeProfilePrefixIfNeeded(String property) {\n+ if(property.startsWith(\"%\")) {\n+ String profilePrefix = property.substring(0, property.indexOf(\".\") +1);\n+ property = property.split(profilePrefix)[1];\n+ }\n+ return property;\n}\n- return null;\n+ public static PropertyMapper getMapper(String property) {\n+ return MAPPERS.get(property);\n}\npublic static Collection<PropertyMapper> getMappers() {\n@@ -164,6 +169,7 @@ public final class PropertyMappers {\nfor (PropertyMapper mapper : mappers) {\nsuper.put(mapper.getTo(), mapper);\nsuper.put(mapper.getFrom(), mapper);\n+ super.put(mapper.getCliFormat(), mapper);\n}\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19858: Sanitize CLI Log output and show-config output |
339,161 | 29.10.2021 17:01:26 | -3,600 | d9bf511406a00ca02822e8f2ffc1010b3deec1c3 | Optimised (split) the clearExpiredEvents query to reduce execution time | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/events/jpa/JpaEventStoreProvider.java",
"new_path": "model/jpa/src/main/java/org/keycloak/events/jpa/JpaEventStoreProvider.java",
"diff": "@@ -88,17 +88,18 @@ public class JpaEventStoreProvider implements EventStoreProvider {\nif (KeycloakModelUtils.isRealmProviderJpa(session)) {\n// Group realms by expiration times. This will be effective if different realms have same/similar event expiration times, which will probably be the case in most environments\n- List<Long> eventExpirations = em.createQuery(\"select distinct realm.eventsExpiration from RealmEntity realm\").getResultList();\n+ List<Long> eventExpirations = em.createQuery(\"select distinct realm.eventsExpiration from RealmEntity realm where realm.eventsExpiration > 0\").getResultList();\nfor (Long expiration : eventExpirations) {\n- if (expiration > 0) {\n- int currentNumDeleted = em.createQuery(\"delete from EventEntity where realmId in (select realm.id from RealmEntity realm where realm.eventsExpiration = :expiration) and time < :eventTime\")\n+ List<String> realmIds = em.createQuery(\"select realm.id from RealmEntity realm where realm.eventsExpiration = :expiration\")\n.setParameter(\"expiration\", expiration)\n+ .getResultList();\n+ int currentNumDeleted = em.createQuery(\"delete from EventEntity where realmId in :realmIds and time < :eventTime\")\n+ .setParameter(\"realmIds\", realmIds)\n.setParameter(\"eventTime\", currentTimeMillis - (expiration * 1000))\n.executeUpdate();\nlogger.tracef(\"Deleted %d events for the expiration %d\", currentNumDeleted, expiration);\nnumDeleted += currentNumDeleted;\n}\n- }\nlogger.debugf(\"Cleared %d expired events in all realms\", numDeleted);\n} else {\nsession.realms().getRealmsStream().forEach(realm -> {\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19052: Optimised (split) the clearExpiredEvents query to reduce execution time |
339,550 | 25.11.2021 17:06:22 | -32,400 | b1eeb0626e5f462e293579f008a93b7468914b9b | fix offline token refresh date | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/admin/UserResource.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/admin/UserResource.java",
"diff": "@@ -954,7 +954,7 @@ public class UserResource {\nif (clientSession == null) {\nreturn null;\n}\n- rep.setLastAccess(clientSession.getTimestamp());\n+ rep.setLastAccess(Time.toMillis(clientSession.getTimestamp()));\nreturn rep;\n}\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/ClientTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/ClientTest.java",
"diff": "@@ -19,8 +19,11 @@ package org.keycloak.testsuite.admin;\nimport static java.util.Arrays.asList;\nimport static org.hamcrest.CoreMatchers.is;\n+import static org.hamcrest.Matchers.allOf;\nimport static org.hamcrest.Matchers.containsInAnyOrder;\n+import static org.hamcrest.Matchers.greaterThan;\nimport static org.hamcrest.Matchers.hasItem;\n+import static org.hamcrest.Matchers.lessThan;\nimport static org.hamcrest.Matchers.not;\nimport static org.junit.Assert.assertEquals;\nimport static org.junit.Assert.assertFalse;\n@@ -536,6 +539,8 @@ public class ClientTest extends AbstractAdminTest {\nList<UserSessionRepresentation> offlineUserSessions = realm.clients().get(id).getOfflineUserSessions(0, 100);\nassertEquals(1, offlineUserSessions.size());\nassertEquals(\"testuser\", offlineUserSessions.get(0).getUsername());\n+ org.hamcrest.MatcherAssert.assertThat(offlineUserSessions.get(0).getLastAccess(),\n+ allOf(greaterThan(Time.currentTimeMillis() - 10000L), lessThan(Time.currentTimeMillis())));\nuserSessions = realm.users().get(userId).getOfflineSessions(id);\nassertEquals(\"There should be one offline session\", 1, userSessions.size());\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-13847 fix offline token refresh date |
339,465 | 01.12.2021 10:11:19 | -3,600 | b2288727e5fc4f155cb0a43c5959dff6a54c5bc9 | Missing org.jboss.logging in keycloak-core modules | [
{
"change_type": "MODIFY",
"old_path": "distribution/feature-packs/adapter-feature-pack/src/main/resources/modules/system/add-ons/keycloak/org/keycloak/keycloak-core/main/module.xml",
"new_path": "distribution/feature-packs/adapter-feature-pack/src/main/resources/modules/system/add-ons/keycloak/org/keycloak/keycloak-core/main/module.xml",
"diff": "<module name=\"com.fasterxml.jackson.jaxrs.jackson-jaxrs-json-provider\"/>\n<module name=\"org.keycloak.keycloak-common\" />\n<module name=\"org.bouncycastle\" />\n+ <module name=\"org.jboss.logging\"/>\n<module name=\"javax.api\"/>\n<module name=\"javax.activation.api\"/>\n<module name=\"sun.jdk\" optional=\"true\" />\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19864 Missing org.jboss.logging in keycloak-core modules |
339,281 | 30.11.2021 00:29:58 | -3,600 | 783eecf612d43cf6869ce9d1808f195dd94773be | Closes - Convert MapRoleEntity to interface | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleAdapter.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleAdapter.java",
"diff": "@@ -21,6 +21,7 @@ import java.util.HashSet;\nimport java.util.List;\nimport java.util.Map;\nimport java.util.Objects;\n+import java.util.Set;\nimport java.util.stream.Stream;\nimport org.jboss.logging.Logger;\nimport static org.keycloak.common.util.StackUtil.getShortStackTrace;\n@@ -65,21 +66,23 @@ public class MapRoleAdapter extends AbstractRoleModel<MapRoleEntity> implements\n@Override\npublic boolean isComposite() {\n- return ! entity.getCompositeRoles().isEmpty();\n+ return ! (entity.getCompositeRoles() == null || entity.getCompositeRoles().isEmpty());\n}\n@Override\npublic Stream<RoleModel> getCompositesStream() {\n- LOG.tracef(\"%% %s(%s).getCompositesStream():%d - %s\", entity.getName(), entity.getId(), entity.getCompositeRoles().size(), getShortStackTrace());\n- return entity.getCompositeRoles().stream()\n+ Set<String> compositeRoles = entity.getCompositeRoles() == null ? Collections.emptySet() : entity.getCompositeRoles();\n+ LOG.tracef(\"%% %s(%s).getCompositesStream():%d - %s\", entity.getName(), entity.getId(), compositeRoles.size(), getShortStackTrace());\n+ return compositeRoles.stream()\n.map(uuid -> session.roles().getRoleById(realm, uuid))\n.filter(Objects::nonNull);\n}\n@Override\npublic Stream<RoleModel> getCompositesStream(String search, Integer first, Integer max) {\n- LOG.tracef(\"%% (%s).getCompositesStream(%s, %d, %d):%d - %s\", this, search, first, max, entity.getCompositeRoles().size(), getShortStackTrace());\n- return session.roles().getRolesStream(realm, entity.getCompositeRoles().stream(), search, first, max);\n+ Set<String> compositeRoles = entity.getCompositeRoles() == null ? Collections.emptySet() : entity.getCompositeRoles();\n+ LOG.tracef(\"%% (%s).getCompositesStream(%s, %d, %d):%d - %s\", this, search, first, max, compositeRoles.size(), getShortStackTrace());\n+ return session.roles().getRolesStream(realm, compositeRoles.stream(), search, first, max);\n}\n@Override\n@@ -96,7 +99,8 @@ public class MapRoleAdapter extends AbstractRoleModel<MapRoleEntity> implements\n@Override\npublic boolean isClientRole() {\n- return entity.isClientRole();\n+ final Boolean clientRole = entity.isClientRole();\n+ return clientRole == null ? false : clientRole;\n}\n@Override\n@@ -126,7 +130,8 @@ public class MapRoleAdapter extends AbstractRoleModel<MapRoleEntity> implements\n@Override\npublic Map<String, List<String>> getAttributes() {\n- return entity.getAttributes();\n+ Map<String, List<String>> attributes = entity.getAttributes();\n+ return attributes == null ? Collections.emptyMap() : attributes;\n}\n@Override\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleEntity.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleEntity.java",
"diff": "*/\npackage org.keycloak.models.map.role;\n-import java.util.HashMap;\n-import java.util.HashSet;\nimport java.util.List;\nimport java.util.Map;\n-import java.util.Objects;\nimport java.util.Set;\n+import org.keycloak.models.map.annotations.GenerateEntityImplementations;\nimport org.keycloak.models.map.common.AbstractEntity;\n+import org.keycloak.models.map.common.DeepCloner;\nimport org.keycloak.models.map.common.UpdatableEntity;\n-public class MapRoleEntity extends UpdatableEntity.Impl implements AbstractEntity {\n+@GenerateEntityImplementations(\n+ inherits = \"org.keycloak.models.map.role.MapRoleEntity.AbstractRoleEntity\"\n+)\[email protected]\n+public interface MapRoleEntity extends AbstractEntity, UpdatableEntity {\n- private String id;\n- private String realmId;\n-\n- private String name;\n- private String description;\n- private boolean clientRole;\n- private String clientId;\n- private Set<String> compositeRoles = new HashSet<>();\n- private Map<String, List<String>> attributes = new HashMap<>();\n-\n- /**\n- * Flag signalizing that any of the setters has been meaningfully used.\n- */\n+ public abstract class AbstractRoleEntity extends UpdatableEntity.Impl implements MapRoleEntity {\n- public MapRoleEntity() {}\n-\n- public MapRoleEntity(String id, String realmId) {\n- this.id = id;\n- this.realmId = realmId;\n- }\n+ private String id;\n@Override\npublic String getId() {\n@@ -60,87 +46,40 @@ public class MapRoleEntity extends UpdatableEntity.Impl implements AbstractEntit\nthis.updated |= id != null;\n}\n- public String getName() {\n- return name;\n}\n- public void setName(String name) {\n- this.updated |= ! Objects.equals(this.name, name);\n- this.name = name;\n+ default Boolean isComposite() {\n+ return ! (getCompositeRoles() == null || getCompositeRoles().isEmpty());\n}\n- public String getDescription() {\n- return description;\n- }\n+ Boolean isClientRole();\n- public void setDescription(String description) {\n- this.updated |= ! Objects.equals(this.description, description);\n- this.description = description;\n- }\n+ String getRealmId();\n- public Map<String, List<String>> getAttributes() {\n- return attributes;\n- }\n+ String getClientId();\n- public void setAttributes(Map<String, List<String>> attributes) {\n- this.updated |= ! Objects.equals(this.attributes, attributes);\n- this.attributes = attributes;\n- }\n+ String getName();\n- public void setAttribute(String name, List<String> values) {\n- this.updated |= ! Objects.equals(this.attributes.put(name, values), values);\n- }\n+ String getDescription();\n- public void removeAttribute(String name) {\n- this.updated |= this.attributes.remove(name) != null;\n- }\n+ void setClientRole(Boolean clientRole);\n- public String getRealmId() {\n- return realmId;\n- }\n+ void setRealmId(String realmId);\n- public void setRealmId(String realmId) {\n- this.updated |= ! Objects.equals(this.realmId, realmId);\n- this.realmId = realmId;\n- }\n-\n- public boolean isClientRole() {\n- return clientRole;\n- }\n-\n- public void setClientRole(boolean clientRole) {\n- this.updated |= ! Objects.equals(this.clientRole, clientRole);\n- this.clientRole = clientRole;\n- }\n-\n- public boolean isComposite() {\n- return ! (compositeRoles == null || compositeRoles.isEmpty());\n- }\n+ void setClientId(String clientId);\n- public Set<String> getCompositeRoles() {\n- return compositeRoles;\n- }\n+ void setName(String name);\n- public String getClientId() {\n- return clientId;\n- }\n+ void setDescription(String description);\n- public void setClientId(String clientId) {\n- this.updated |= ! Objects.equals(this.clientId, clientId);\n- this.clientId = clientId;\n- }\n+ Set<String> getCompositeRoles();\n+ void setCompositeRoles(Set<String> compositeRoles);\n+ void addCompositeRole(String roleId);\n+ void removeCompositeRole(String roleId);\n- public void setCompositeRoles(Set<String> compositeRoles) {\n- this.updated |= ! Objects.equals(this.compositeRoles, compositeRoles);\n- this.compositeRoles.clear();\n- this.compositeRoles.addAll(compositeRoles);\n- }\n+ Map<String, List<String>> getAttributes();\n+ void setAttributes(Map<String, List<String>> attributes);\n+ void setAttribute(String name, List<String> values);\n+ void removeAttribute(String name);\n- public void addCompositeRole(String roleId) {\n- this.updated |= this.compositeRoles.add(roleId);\n- }\n-\n- public void removeCompositeRole(String roleId) {\n- this.updated |= this.compositeRoles.remove(roleId);\n- }\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleProvider.java",
"diff": "@@ -66,9 +66,10 @@ public class MapRoleProvider implements RoleProvider {\nLOG.tracef(\"addRealmRole(%s, %s, %s)%s\", realm, id, name, getShortStackTrace());\n- MapRoleEntity entity = new MapRoleEntity(id, realm.getId());\n- entity.setName(name);\n+ MapRoleEntity entity = new MapRoleEntityImpl();\n+ entity.setId(id);\nentity.setRealmId(realm.getId());\n+ entity.setName(name);\nif (tx.read(entity.getId()) != null) {\nthrow new ModelDuplicateException(\"Role exists: \" + id);\n}\n@@ -121,7 +122,9 @@ public class MapRoleProvider implements RoleProvider {\nLOG.tracef(\"addClientRole(%s, %s, %s)%s\", client, id, name, getShortStackTrace());\n- MapRoleEntity entity = new MapRoleEntity(id, client.getRealm().getId());\n+ MapRoleEntity entity = new MapRoleEntityImpl();\n+ entity.setId(id);\n+ entity.setRealmId(client.getRealm().getId());\nentity.setName(name);\nentity.setClientRole(true);\nentity.setClientId(client.getId());\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorageProviderFactory.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorageProviderFactory.java",
"diff": "@@ -56,6 +56,7 @@ import org.keycloak.models.map.group.MapGroupEntityImpl;\nimport org.keycloak.models.map.loginFailure.MapUserLoginFailureEntity;\nimport org.keycloak.models.map.realm.MapRealmEntity;\nimport org.keycloak.models.map.role.MapRoleEntity;\n+import org.keycloak.models.map.role.MapRoleEntityImpl;\nimport com.fasterxml.jackson.databind.JavaType;\nimport java.io.File;\nimport java.io.IOException;\n@@ -106,6 +107,7 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide\n.constructorDC(MapClientEntityImpl.class, MapClientEntityImpl::new)\n.constructor(MapProtocolMapperEntity.class, MapProtocolMapperEntityImpl::new)\n.constructor(MapGroupEntityImpl.class, MapGroupEntityImpl::new)\n+ .constructor(MapRoleEntityImpl.class, MapRoleEntityImpl::new)\n.build();\npublic static final Map<Class<?>, String> MODEL_TO_NAME = new HashMap<>();\n@@ -154,10 +156,9 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide\nstatic {\nINTERFACE_TO_IMPL.put(MapClientEntity.class, MapClientEntityImpl.class);\n// INTERFACE_TO_IMPL.put(MapClientScopeEntity.class, MapClientScopeEntityImpl.class);\n-// INTERFACE_TO_IMPL.put(MapClientEntity.class, MapClientEntityImpl.class);\nINTERFACE_TO_IMPL.put(MapGroupEntity.class, MapGroupEntityImpl.class);\n// INTERFACE_TO_IMPL.put(MapRealmEntity.class, MapRealmEntityImpl.class);\n-// INTERFACE_TO_IMPL.put(MapRoleEntity.class, MapRoleEntityImpl.class);\n+ INTERFACE_TO_IMPL.put(MapRoleEntity.class, MapRoleEntityImpl.class);\n// INTERFACE_TO_IMPL.put(MapRootAuthenticationSessionEntity.class, MapRootAuthenticationSessionEntityImpl.class);\n// INTERFACE_TO_IMPL.put(MapUserLoginFailureEntity.class, MapUserLoginFailureEntityImpl.class);\n// INTERFACE_TO_IMPL.put(MapUserEntity.class, MapUserEntityImpl.class);\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Closes #8808 - Convert MapRoleEntity to interface |
339,235 | 02.12.2021 12:31:22 | -3,600 | f64441a54a42a1c69791748a773684851ce13786 | Add dependency on keycloak-client-cli-dist to server-x-dist | [
{
"change_type": "MODIFY",
"old_path": "distribution/server-x-dist/pom.xml",
"new_path": "distribution/server-x-dist/pom.xml",
"diff": "</exclusion>\n</exclusions>\n</dependency>\n+ <dependency>\n+ <groupId>org.keycloak</groupId>\n+ <artifactId>keycloak-client-cli-dist</artifactId>\n+ <type>zip</type>\n+ </dependency>\n</dependencies>\n<build>\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19871 Add dependency on keycloak-client-cli-dist to server-x-dist |
339,202 | 26.11.2021 12:16:06 | -3,600 | a0b9e4f3eb990bed1df4e0ae4c505b55bbf1da84 | Update Arquillian version | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/pom.xml",
"new_path": "testsuite/integration-arquillian/pom.xml",
"diff": "<!--the version of shrinkwrap_resolver should align with the version in arquillian-bom-->\n<shrinkwrap-resolver.version>3.1.4</shrinkwrap-resolver.version>\n<selenium.version>3.14.0</selenium.version>\n- <arquillian-drone.version>2.5.2</arquillian-drone.version>\n+ <arquillian-drone.version>2.5.4</arquillian-drone.version>\n<arquillian-graphene.version>2.3.2</arquillian-graphene.version>\n<arquillian-wildfly-container.version>2.1.1.Final</arquillian-wildfly-container.version>\n<arquillian-wls-container.version>1.0.1.Final</arquillian-wls-container.version>\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/AccessTokenTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/AccessTokenTest.java",
"diff": "@@ -27,7 +27,6 @@ import org.apache.http.client.methods.HttpPost;\nimport org.apache.http.impl.client.CloseableHttpClient;\nimport org.apache.http.impl.client.HttpClientBuilder;\nimport org.apache.http.message.BasicNameValuePair;\n-import org.hamcrest.collection.IsArrayContaining;\nimport org.bouncycastle.jce.provider.BouncyCastleProvider;\nimport org.junit.Assert;\nimport org.junit.Before;\n@@ -98,11 +97,12 @@ import java.util.concurrent.TimeUnit;\nimport static org.hamcrest.Matchers.allOf;\nimport static org.hamcrest.Matchers.greaterThanOrEqualTo;\nimport static org.hamcrest.Matchers.lessThanOrEqualTo;\n+import static org.hamcrest.Matchers.hasItemInArray;\n+import static org.hamcrest.MatcherAssert.assertThat;\nimport static org.junit.Assert.assertEquals;\nimport static org.junit.Assert.assertNotEquals;\nimport static org.junit.Assert.assertNotNull;\nimport static org.junit.Assert.assertNull;\n-import static org.junit.Assert.assertThat;\nimport static org.junit.Assert.assertTrue;\nimport static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;\nimport static org.keycloak.testsuite.admin.ApiUtil.findClientByClientId;\n@@ -1291,7 +1291,7 @@ public class AccessTokenTest extends AbstractKeycloakTest {\n}\nprivate void validateTokenECDSASignature(String expectedAlg) {\n- assertThat(ECDSASignatureProvider.ECDSA.values(), IsArrayContaining.hasItemInArray(ECDSASignatureProvider.ECDSA.valueOf(expectedAlg)));\n+ assertThat(ECDSASignatureProvider.ECDSA.values(), hasItemInArray(ECDSASignatureProvider.ECDSA.valueOf(expectedAlg)));\ntry {\nTokenSignatureUtil.changeRealmTokenSignatureProvider(adminClient, expectedAlg);\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19853 Update Arquillian version |
339,618 | 02.12.2021 11:49:40 | -3,600 | 28673ed4d893dc9ac3bc187dbea6dbdc8ab080cb | Update to Quarkus 2.5.1 | [
{
"change_type": "MODIFY",
"old_path": "distribution/server-x-dist/src/main/content/bin/kc.sh",
"new_path": "distribution/server-x-dist/src/main/content/bin/kc.sh",
"diff": "@@ -63,7 +63,7 @@ done\n# Specify options to pass to the Java VM.\n#\nif [ \"x$JAVA_OPTS\" = \"x\" ]; then\n- JAVA_OPTS=\"-Xms64m -Xmx512m -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Djava.net.preferIPv4Stack=true -Dquarkus-log-max-startup-records=10000\"\n+ JAVA_OPTS=\"-Xms64m -Xmx512m -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Djava.net.preferIPv4Stack=true\"\nelse\necho \"JAVA_OPTS already set in environment; overriding default settings with values: $JAVA_OPTS\"\nfi\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/pom.xml",
"new_path": "quarkus/pom.xml",
"diff": "<properties>\n<!-- Quarkus version -->\n- <quarkus.version>2.4.2.Final</quarkus.version>\n+ <quarkus.version>2.5.1.Final</quarkus.version>\n<!--\nOverride versions based on Quarkus dependencies.\n<jackson.version>2.12.5</jackson.version>\n<jackson.databind.version>${jackson.version}</jackson.databind.version>\n<hibernate.core.version>5.6.1.Final</hibernate.core.version>\n- <mysql.driver.version>8.0.26</mysql.driver.version>\n- <postgresql.version>42.2.24</postgresql.version>\n+ <mysql.driver.version>8.0.27</mysql.driver.version>\n+ <postgresql.version>42.3.1</postgresql.version>\n<microprofile-metrics-api.version>3.0</microprofile-metrics-api.version>\n<wildfly.common.version>1.5.4.Final-format-001</wildfly.common.version>\n<infinispan.version>13.0.0.Final</infinispan.version>\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/command/Build.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/command/Build.java",
"diff": "@@ -47,7 +47,7 @@ import picocli.CommandLine.Mixin;\n},\nfooterHeading = \"Examples:\",\nfooter = \" Optimize the server based on a profile configuration:%n%n\"\n- + \" $ ${PARENT-COMMAND-FULL-NAME:-$PARENTCOMMAND} ${COMMAND-NAME} --profile=prod%n%n\"\n+ + \" $ ${PARENT-COMMAND-FULL-NAME:-$PARENTCOMMAND} --profile=prod ${COMMAND-NAME}%n%n\"\n+ \" Change database settings:%n%n\"\n+ \" $ ${PARENT-COMMAND-FULL-NAME:-$PARENTCOMMAND} ${COMMAND-NAME} --db=postgres [--db-url][--db-username][--db-password]%n%n\"\n+ \" Enable a feature:%n%n\"\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/tests/integration/src/main/java/org/keycloak/it/junit5/extension/CLIResult.java",
"new_path": "quarkus/tests/integration/src/main/java/org/keycloak/it/junit5/extension/CLIResult.java",
"diff": "@@ -61,6 +61,7 @@ public interface CLIResult extends LaunchResult {\nboolean isDistribution();\ndefault void assertStarted() {\n+ assertFalse(getOutput().contains(\"The delayed handler's queue was overrun and log record(s) were lost (Did you forget to configure logging?)\"), () -> \"The standard Output:\\n\" + getOutput() + \"should not contain a warning about log queue overrun.\");\nassertTrue(getOutput().contains(\"Listening on:\"), () -> \"The standard output:\\n\" + getOutput() + \"does include \\\"Listening on:\\\"\");\nassertNotDevMode();\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19832 Update to Quarkus 2.5.1 |
339,185 | 26.10.2021 11:55:53 | -7,200 | 3602873df299a6217a92b343b5931b97836ba317 | Introduce model-entity util methods
Fixes: | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/common/DeepCloner.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/common/DeepCloner.java",
"diff": "@@ -295,6 +295,24 @@ public class DeepCloner {\nreturn res;\n}\n+ /**\n+ * Returns a class type of an instance that would be instantiated by {@link #newInstance(java.lang.Class)} method.\n+ * @param <V> Type (class or a {@code @Root} interface) to create a new instance\n+ * @param clazz Type (class or a {@code @Root} interface) to create a new instance\n+ * @return See description\n+ */\n+ public <V> Class<? extends V> newInstanceType(Class<V> valueType) {\n+ if (valueType == null) {\n+ return null;\n+ }\n+ try {\n+ V v = newInstance(valueType);\n+ return v == null ? null : (Class<? extends V>) v.getClass();\n+ } catch (IllegalStateException ex) {\n+ return null;\n+ }\n+ }\n+\n/**\n* Deeply clones properties from the {@code from} instance to the {@code to} instance.\n* @param <V> Type (class or a {@code @Root} interface) to clone the instance\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/ModelEntityUtil.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+package org.keycloak.models.map.storage;\n+\n+import org.keycloak.authorization.model.PermissionTicket;\n+import org.keycloak.authorization.model.Policy;\n+import org.keycloak.authorization.model.Resource;\n+import org.keycloak.authorization.model.ResourceServer;\n+import org.keycloak.models.AuthenticatedClientSessionModel;\n+import org.keycloak.models.ClientModel;\n+import org.keycloak.models.ClientScopeModel;\n+import org.keycloak.models.GroupModel;\n+import org.keycloak.models.RealmModel;\n+import org.keycloak.models.RoleModel;\n+import org.keycloak.models.UserLoginFailureModel;\n+import org.keycloak.models.UserModel;\n+import org.keycloak.models.UserSessionModel;\n+import org.keycloak.models.map.authSession.MapRootAuthenticationSessionEntity;\n+import org.keycloak.models.map.authorization.entity.MapPermissionTicketEntity;\n+import org.keycloak.models.map.authorization.entity.MapPolicyEntity;\n+import org.keycloak.models.map.authorization.entity.MapResourceEntity;\n+import org.keycloak.models.map.authorization.entity.MapResourceServerEntity;\n+import org.keycloak.models.map.authorization.entity.MapScopeEntity;\n+import org.keycloak.models.map.client.MapClientEntity;\n+import org.keycloak.models.map.clientscope.MapClientScopeEntity;\n+import org.keycloak.models.map.common.AbstractEntity;\n+import org.keycloak.models.map.group.MapGroupEntity;\n+import org.keycloak.models.map.loginFailure.MapUserLoginFailureEntity;\n+import org.keycloak.models.map.realm.MapRealmEntity;\n+import org.keycloak.models.map.role.MapRoleEntity;\n+import org.keycloak.models.map.user.MapUserEntity;\n+import org.keycloak.models.map.userSession.MapAuthenticatedClientSessionEntity;\n+import org.keycloak.models.map.userSession.MapUserSessionEntity;\n+import org.keycloak.sessions.RootAuthenticationSessionModel;\n+import java.util.HashMap;\n+import java.util.Map;\n+import java.util.Map.Entry;\n+import java.util.Set;\n+import java.util.stream.Collectors;\n+\n+/**\n+ * Utility class covering various aspects of relationship between model and entity classes.\n+ * @author hmlnarik\n+ */\n+public class ModelEntityUtil {\n+\n+ private static final Map<Class<?>, String> MODEL_TO_NAME = new HashMap<>();\n+ static {\n+ MODEL_TO_NAME.put(AuthenticatedClientSessionModel.class, \"client-sessions\");\n+ MODEL_TO_NAME.put(ClientScopeModel.class, \"client-scopes\");\n+ MODEL_TO_NAME.put(ClientModel.class, \"clients\");\n+ MODEL_TO_NAME.put(GroupModel.class, \"groups\");\n+ MODEL_TO_NAME.put(RealmModel.class, \"realms\");\n+ MODEL_TO_NAME.put(RoleModel.class, \"roles\");\n+ MODEL_TO_NAME.put(RootAuthenticationSessionModel.class, \"auth-sessions\");\n+ MODEL_TO_NAME.put(UserLoginFailureModel.class, \"user-login-failures\");\n+ MODEL_TO_NAME.put(UserModel.class, \"users\");\n+ MODEL_TO_NAME.put(UserSessionModel.class, \"user-sessions\");\n+\n+ // authz\n+ MODEL_TO_NAME.put(PermissionTicket.class, \"authz-permission-tickets\");\n+ MODEL_TO_NAME.put(Policy.class, \"authz-policies\");\n+ MODEL_TO_NAME.put(ResourceServer.class, \"authz-resource-servers\");\n+ MODEL_TO_NAME.put(Resource.class, \"authz-resources\");\n+ MODEL_TO_NAME.put(org.keycloak.authorization.model.Scope.class, \"authz-scopes\");\n+ }\n+ private static final Map<String, Class<?>> NAME_TO_MODEL = MODEL_TO_NAME.entrySet().stream().collect(Collectors.toMap(Entry::getValue, Entry::getKey));\n+\n+ private static final Map<Class<?>, Class<? extends AbstractEntity>> MODEL_TO_ENTITY_TYPE = new HashMap<>();\n+ static {\n+ MODEL_TO_ENTITY_TYPE.put(AuthenticatedClientSessionModel.class, MapAuthenticatedClientSessionEntity.class);\n+ MODEL_TO_ENTITY_TYPE.put(ClientScopeModel.class, MapClientScopeEntity.class);\n+ MODEL_TO_ENTITY_TYPE.put(ClientModel.class, MapClientEntity.class);\n+ MODEL_TO_ENTITY_TYPE.put(GroupModel.class, MapGroupEntity.class);\n+ MODEL_TO_ENTITY_TYPE.put(RealmModel.class, MapRealmEntity.class);\n+ MODEL_TO_ENTITY_TYPE.put(RoleModel.class, MapRoleEntity.class);\n+ MODEL_TO_ENTITY_TYPE.put(RootAuthenticationSessionModel.class, MapRootAuthenticationSessionEntity.class);\n+ MODEL_TO_ENTITY_TYPE.put(UserLoginFailureModel.class, MapUserLoginFailureEntity.class);\n+ MODEL_TO_ENTITY_TYPE.put(UserModel.class, MapUserEntity.class);\n+ MODEL_TO_ENTITY_TYPE.put(UserSessionModel.class, MapUserSessionEntity.class);\n+\n+ // authz\n+ MODEL_TO_ENTITY_TYPE.put(PermissionTicket.class, MapPermissionTicketEntity.class);\n+ MODEL_TO_ENTITY_TYPE.put(Policy.class, MapPolicyEntity.class);\n+ MODEL_TO_ENTITY_TYPE.put(ResourceServer.class, MapResourceServerEntity.class);\n+ MODEL_TO_ENTITY_TYPE.put(Resource.class, MapResourceEntity.class);\n+ MODEL_TO_ENTITY_TYPE.put(org.keycloak.authorization.model.Scope.class, MapScopeEntity.class);\n+ }\n+ private static final Map<Class<?>, Class<?>> ENTITY_TO_MODEL_TYPE = MODEL_TO_ENTITY_TYPE.entrySet().stream().collect(Collectors.toMap(Entry::getValue, Entry::getKey));\n+\n+ @SuppressWarnings(\"unchecked\")\n+ public static <V extends AbstractEntity, M> Class<V> getEntityType(Class<M> modelClass) {\n+ return (Class<V>) MODEL_TO_ENTITY_TYPE.get(modelClass);\n+ }\n+\n+ @SuppressWarnings(\"unchecked\")\n+ public static <V extends AbstractEntity, M> Class<V> getEntityType(Class<M> modelClass, Class<? extends AbstractEntity> defaultClass) {\n+ return (Class<V>) MODEL_TO_ENTITY_TYPE.getOrDefault(modelClass, defaultClass);\n+ }\n+\n+ @SuppressWarnings(\"unchecked\")\n+ public static <V extends AbstractEntity, M> Class<M> getModelType(Class<V> entityClass) {\n+ return (Class<M>) ENTITY_TO_MODEL_TYPE.get(entityClass);\n+ }\n+\n+ @SuppressWarnings(\"unchecked\")\n+ public static <V extends AbstractEntity, M> Class<M> getModelType(Class<V> entityClass, Class<M> defaultClass) {\n+ return (Class<M>) ENTITY_TO_MODEL_TYPE.getOrDefault(entityClass, defaultClass);\n+ }\n+\n+ public static String getModelName(Class<?> key, String defaultValue) {\n+ return MODEL_TO_NAME.getOrDefault(key, defaultValue);\n+ }\n+\n+ public static String getModelName(Class<?> key) {\n+ return MODEL_TO_NAME.get(key);\n+ }\n+\n+ public static Set<String> getModelNames() {\n+ return NAME_TO_MODEL.keySet();\n+ }\n+\n+ @SuppressWarnings(\"unchecked\")\n+ public static <M> Class<M> getModelClass(String key) {\n+ return (Class<M>) NAME_TO_MODEL.get(key);\n+ }\n+\n+\n+\n+}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorageProviderFactory.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorageProviderFactory.java",
"diff": "@@ -19,43 +19,20 @@ package org.keycloak.models.map.storage.chm;\nimport org.keycloak.models.map.common.StringKeyConvertor;\nimport org.keycloak.component.AmphibianProviderFactory;\nimport org.keycloak.Config.Scope;\n-import org.keycloak.authorization.model.PermissionTicket;\n-import org.keycloak.authorization.model.Policy;\n-import org.keycloak.authorization.model.Resource;\n-import org.keycloak.authorization.model.ResourceServer;\nimport org.keycloak.common.Profile;\nimport org.keycloak.component.ComponentModelScope;\nimport org.keycloak.models.AuthenticatedClientSessionModel;\n-import org.keycloak.models.ClientModel;\n-import org.keycloak.models.ClientScopeModel;\n-import org.keycloak.models.GroupModel;\nimport org.keycloak.models.KeycloakSession;\nimport org.keycloak.models.KeycloakSessionFactory;\n-import org.keycloak.models.RealmModel;\n-import org.keycloak.models.RoleModel;\n-import org.keycloak.models.UserLoginFailureModel;\n-import org.keycloak.models.UserModel;\nimport org.keycloak.models.UserSessionModel;\n-import org.keycloak.models.map.authSession.MapRootAuthenticationSessionEntity;\n-import org.keycloak.models.map.authorization.entity.MapPermissionTicketEntity;\n-import org.keycloak.models.map.authorization.entity.MapPolicyEntity;\n-import org.keycloak.models.map.authorization.entity.MapResourceEntity;\n-import org.keycloak.models.map.authorization.entity.MapResourceServerEntity;\n-import org.keycloak.models.map.authorization.entity.MapScopeEntity;\n-import org.keycloak.models.map.client.MapClientEntity;\nimport org.keycloak.models.map.client.MapClientEntityImpl;\nimport org.keycloak.models.map.client.MapProtocolMapperEntity;\nimport org.keycloak.models.map.client.MapProtocolMapperEntityImpl;\n-import org.keycloak.models.map.clientscope.MapClientScopeEntity;\nimport org.keycloak.models.map.common.AbstractEntity;\nimport org.keycloak.models.map.common.DeepCloner;\nimport org.keycloak.models.map.common.Serialization;\nimport org.keycloak.models.map.common.UpdatableEntity;\n-import org.keycloak.models.map.group.MapGroupEntity;\nimport org.keycloak.models.map.group.MapGroupEntityImpl;\n-import org.keycloak.models.map.loginFailure.MapUserLoginFailureEntity;\n-import org.keycloak.models.map.realm.MapRealmEntity;\n-import org.keycloak.models.map.role.MapRoleEntity;\nimport org.keycloak.models.map.role.MapRoleEntityImpl;\nimport com.fasterxml.jackson.databind.JavaType;\nimport java.io.File;\n@@ -67,18 +44,17 @@ import java.util.concurrent.ConcurrentHashMap;\nimport org.jboss.logging.Logger;\nimport org.keycloak.models.map.storage.MapStorageProvider;\nimport org.keycloak.models.map.storage.MapStorageProviderFactory;\n-import org.keycloak.models.map.userSession.MapAuthenticatedClientSessionEntity;\n-import org.keycloak.models.map.user.MapUserEntity;\n-import org.keycloak.models.map.userSession.MapUserSessionEntity;\n+import org.keycloak.models.map.storage.ModelEntityUtil;\nimport org.keycloak.provider.EnvironmentDependentProviderFactory;\nimport org.keycloak.provider.ProviderConfigProperty;\nimport org.keycloak.models.map.storage.criteria.DefaultModelCriteria;\n-import org.keycloak.sessions.RootAuthenticationSessionModel;\nimport java.util.Collections;\nimport java.util.HashMap;\nimport java.util.LinkedList;\nimport java.util.Map;\n+import static org.keycloak.models.map.storage.ModelEntityUtil.getModelName;\n+import static org.keycloak.models.map.storage.ModelEntityUtil.getModelNames;\nimport static org.keycloak.models.map.storage.QueryParameters.withCriteria;\nimport static org.keycloak.models.map.storage.criteria.DefaultModelCriteria.criteria;\n@@ -110,68 +86,6 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide\n.constructor(MapRoleEntityImpl.class, MapRoleEntityImpl::new)\n.build();\n- public static final Map<Class<?>, String> MODEL_TO_NAME = new HashMap<>();\n- static {\n- MODEL_TO_NAME.put(AuthenticatedClientSessionModel.class, \"client-sessions\");\n- MODEL_TO_NAME.put(ClientScopeModel.class, \"client-scopes\");\n- MODEL_TO_NAME.put(ClientModel.class, \"clients\");\n- MODEL_TO_NAME.put(GroupModel.class, \"groups\");\n- MODEL_TO_NAME.put(RealmModel.class, \"realms\");\n- MODEL_TO_NAME.put(RoleModel.class, \"roles\");\n- MODEL_TO_NAME.put(RootAuthenticationSessionModel.class, \"auth-sessions\");\n- MODEL_TO_NAME.put(UserLoginFailureModel.class, \"user-login-failures\");\n- MODEL_TO_NAME.put(UserModel.class, \"users\");\n- MODEL_TO_NAME.put(UserSessionModel.class, \"user-sessions\");\n-\n- // authz\n- MODEL_TO_NAME.put(PermissionTicket.class, \"authz-permission-tickets\");\n- MODEL_TO_NAME.put(Policy.class, \"authz-policies\");\n- MODEL_TO_NAME.put(ResourceServer.class, \"authz-resource-servers\");\n- MODEL_TO_NAME.put(Resource.class, \"authz-resources\");\n- MODEL_TO_NAME.put(org.keycloak.authorization.model.Scope.class, \"authz-scopes\");\n- }\n-\n- public static final Map<Class<?>, Class<? extends AbstractEntity>> MODEL_TO_VALUE_TYPE = new HashMap<>();\n- static {\n- MODEL_TO_VALUE_TYPE.put(AuthenticatedClientSessionModel.class, MapAuthenticatedClientSessionEntity.class);\n- MODEL_TO_VALUE_TYPE.put(ClientScopeModel.class, MapClientScopeEntity.class);\n- MODEL_TO_VALUE_TYPE.put(ClientModel.class, MapClientEntity.class);\n- MODEL_TO_VALUE_TYPE.put(GroupModel.class, MapGroupEntity.class);\n- MODEL_TO_VALUE_TYPE.put(RealmModel.class, MapRealmEntity.class);\n- MODEL_TO_VALUE_TYPE.put(RoleModel.class, MapRoleEntity.class);\n- MODEL_TO_VALUE_TYPE.put(RootAuthenticationSessionModel.class, MapRootAuthenticationSessionEntity.class);\n- MODEL_TO_VALUE_TYPE.put(UserLoginFailureModel.class, MapUserLoginFailureEntity.class);\n- MODEL_TO_VALUE_TYPE.put(UserModel.class, MapUserEntity.class);\n- MODEL_TO_VALUE_TYPE.put(UserSessionModel.class, MapUserSessionEntity.class);\n-\n- // authz\n- MODEL_TO_VALUE_TYPE.put(PermissionTicket.class, MapPermissionTicketEntity.class);\n- MODEL_TO_VALUE_TYPE.put(Policy.class, MapPolicyEntity.class);\n- MODEL_TO_VALUE_TYPE.put(ResourceServer.class, MapResourceServerEntity.class);\n- MODEL_TO_VALUE_TYPE.put(Resource.class, MapResourceEntity.class);\n- MODEL_TO_VALUE_TYPE.put(org.keycloak.authorization.model.Scope.class, MapScopeEntity.class);\n- }\n-\n- public static final Map<Class<?>, Class<?>> INTERFACE_TO_IMPL = new HashMap<>();\n- static {\n- INTERFACE_TO_IMPL.put(MapClientEntity.class, MapClientEntityImpl.class);\n-// INTERFACE_TO_IMPL.put(MapClientScopeEntity.class, MapClientScopeEntityImpl.class);\n- INTERFACE_TO_IMPL.put(MapGroupEntity.class, MapGroupEntityImpl.class);\n-// INTERFACE_TO_IMPL.put(MapRealmEntity.class, MapRealmEntityImpl.class);\n- INTERFACE_TO_IMPL.put(MapRoleEntity.class, MapRoleEntityImpl.class);\n-// INTERFACE_TO_IMPL.put(MapRootAuthenticationSessionEntity.class, MapRootAuthenticationSessionEntityImpl.class);\n-// INTERFACE_TO_IMPL.put(MapUserLoginFailureEntity.class, MapUserLoginFailureEntityImpl.class);\n-// INTERFACE_TO_IMPL.put(MapUserEntity.class, MapUserEntityImpl.class);\n-// INTERFACE_TO_IMPL.put(MapUserSessionEntity.class, MapUserSessionEntityImpl.class);\n-//\n-// // authz\n-// INTERFACE_TO_IMPL.put(MapPermissionTicketEntity.class, MapPermissionTicketEntityImpl.class);\n-// INTERFACE_TO_IMPL.put(MapPolicyEntity.class, MapPolicyEntityImpl.class);\n-// INTERFACE_TO_IMPL.put(MapResourceServerEntity.class, MapResourceServerEntityImpl.class);\n-// INTERFACE_TO_IMPL.put(MapResourceEntity.class, MapResourceEntityImpl.class);\n-// INTERFACE_TO_IMPL.put(MapScopeEntity.class, MapScopeEntityImpl.class);\n- }\n-\nprivate static final Map<String, StringKeyConvertor> KEY_CONVERTORS = new HashMap<>();\nstatic {\nKEY_CONVERTORS.put(\"uuid\", StringKeyConvertor.UUIDKey.INSTANCE);\n@@ -195,7 +109,7 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide\nfinal String keyType = config.get(\"keyType\", \"uuid\");\ndefaultKeyConvertor = getKeyConvertor(keyType);\n- for (String name : MODEL_TO_NAME.values()) {\n+ for (String name : getModelNames()) {\nkeyConvertors.put(name, getKeyConvertor(config.get(\"keyType.\" + name, keyType)));\n}\n@@ -259,7 +173,7 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide\nprivate <K, V extends AbstractEntity & UpdatableEntity, M> ConcurrentHashMapStorage<K, V, M> loadMap(String mapName,\nClass<M> modelType, EnumSet<Flag> flags) {\nfinal StringKeyConvertor kc = keyConvertors.getOrDefault(mapName, defaultKeyConvertor);\n- Class<?> valueType = MODEL_TO_VALUE_TYPE.get(modelType);\n+ Class<?> valueType = ModelEntityUtil.getEntityType(modelType);\nLOG.debugf(\"Initializing new map storage: %s\", mapName);\nConcurrentHashMapStorage<K, V, M> store;\n@@ -285,7 +199,10 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide\nif (f != null && f.exists()) {\ntry {\nLOG.debugf(\"Restoring contents from %s\", f.getCanonicalPath());\n- Class<?> valueImplType = INTERFACE_TO_IMPL.getOrDefault(valueType, valueType);\n+ Class<?> valueImplType = CLONER.newInstanceType(valueType);\n+ if (valueImplType == null) {\n+ valueImplType = valueType;\n+ }\nJavaType type = Serialization.MAPPER.getTypeFactory().constructCollectionType(LinkedList.class, valueImplType);\nList<V> values = Serialization.MAPPER.readValue(f, type);\n@@ -308,7 +225,7 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide\npublic <K, V extends AbstractEntity & UpdatableEntity, M> ConcurrentHashMapStorage<K, V, M> getStorage(\nClass<M> modelType, Flag... flags) {\nEnumSet<Flag> f = flags == null || flags.length == 0 ? EnumSet.noneOf(Flag.class) : EnumSet.of(flags[0], flags);\n- String name = MODEL_TO_NAME.getOrDefault(modelType, modelType.getSimpleName());\n+ String name = getModelName(modelType, modelType.getSimpleName());\n/* From ConcurrentHashMapStorage.computeIfAbsent javadoc:\n*\n* \"... the computation [...] must not attempt to update any other mappings of this map.\"\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Introduce model-entity util methods
Fixes: #9025 |
339,185 | 06.12.2021 15:55:45 | -3,600 | 95614e8b4022306ffac328b85130403cc157fb18 | Fix NPE for component creation when realm unset but config known
Fixes | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/models/utils/KeycloakModelUtils.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/models/utils/KeycloakModelUtils.java",
"diff": "@@ -306,7 +306,7 @@ public final class KeycloakModelUtils {\nString componentId = config.get(\"componentId\");\nif (realmId == null || componentId == null) {\nrealmId = \"ROOT\";\n- ComponentModel cm = new ScopeComponentModel(providerClass, config, spiName);\n+ ComponentModel cm = new ScopeComponentModel(providerClass, config, spiName, realmId);\nreturn factory.getProviderFactory(providerClass, realmId, cm.getId(), k -> cm);\n} else {\nreturn factory.getProviderFactory(providerClass, realmId, componentId, componentModelGetter(realmId, componentId));\n@@ -318,14 +318,16 @@ public final class KeycloakModelUtils {\nprivate final String componentId;\nprivate final String providerId;\nprivate final String providerType;\n+ private final String realmId;\nprivate final Scope config;\n- public ScopeComponentModel(Class<?> providerClass, Scope baseConfiguration, String spiName) {\n+ public ScopeComponentModel(Class<?> providerClass, Scope baseConfiguration, String spiName, String realmId) {\nfinal String pr = baseConfiguration.get(\"provider\", Config.getProvider(spiName));\nthis.providerId = pr == null ? \"default\" : pr;\nthis.config = baseConfiguration.scope(this.providerId);\n- this.componentId = spiName + \"-\" + this.providerId;\n+ this.componentId = spiName + \"- \" + (realmId == null ? \"\" : \"f:\" + realmId + \":\") + this.providerId;\n+ this.realmId = realmId;\nthis.providerType = providerClass.getName();\n}\n@@ -349,6 +351,11 @@ public final class KeycloakModelUtils {\nreturn componentId;\n}\n+ @Override\n+ public String getParentId() {\n+ return realmId;\n+ }\n+\n@Override\npublic boolean get(String key, boolean defaultValue) {\nreturn config.getBoolean(key, defaultValue);\n@@ -366,7 +373,6 @@ public final class KeycloakModelUtils {\n@Override\npublic String get(String key, String defaultValue) {\n-\nreturn config.get(key, defaultValue);\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/DefaultComponentFactoryProviderFactory.java",
"new_path": "services/src/main/java/org/keycloak/services/DefaultComponentFactoryProviderFactory.java",
"diff": "@@ -143,7 +143,12 @@ public class DefaultComponentFactoryProviderFactory implements ComponentFactoryP\nnewFactory.init(configScope);\nnewFactory.postInit(factory);\n+ if (realmId == null) {\n+ realmId = configScope.getComponentParentId();\n+ }\n+ if (realmId != null) {\ndependentInvalidations.computeIfAbsent(realmId, k -> ConcurrentHashMap.newKeySet()).add(componentId);\n+ }\ndependentInvalidations.computeIfAbsent(newFactory.getClass(), k -> ConcurrentHashMap.newKeySet()).add(componentId);\nreturn newFactory;\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/DefaultKeycloakSession.java",
"new_path": "services/src/main/java/org/keycloak/services/DefaultKeycloakSession.java",
"diff": "@@ -354,15 +354,12 @@ public class DefaultKeycloakSession implements KeycloakSession {\nInteger hash = clazz.hashCode() + componentId.hashCode();\nT provider = (T) providers.get(hash);\nfinal RealmModel realm = getContext().getRealm();\n- if (realm == null) {\n- throw new IllegalArgumentException(\"Realm not set in the context.\");\n- }\n// KEYCLOAK-11890 - Avoid using HashMap.computeIfAbsent() to implement logic in outer if() block below,\n// since per JDK-8071667 the remapping function should not modify the map during computation. While\n// allowed on JDK 1.8, attempt of such a modification throws ConcurrentModificationException with JDK 9+\nif (provider == null) {\n- final String realmId = realm.getId();\n+ final String realmId = realm == null ? null : realm.getId();\nProviderFactory<T> providerFactory = factory.getProviderFactory(clazz, realmId, componentId, modelGetter);\nif (providerFactory != null) {\nprovider = providerFactory.create(this);\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Fix NPE for component creation when realm unset but config known
Fixes #9019 |
339,185 | 06.12.2021 15:56:39 | -3,600 | 2785cab59661f97fa4eb293fe4b5661edbc69654 | Simplify component model overrides
Fixes | [
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/component/ComponentModelScope.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/component/ComponentModelScope.java",
"diff": "@@ -119,4 +119,8 @@ public class ComponentModelScope implements Scope {\nthrow new UnsupportedOperationException(\"Not implemented\");\n}\n+ public ComponentModel getComponentModel() {\n+ return componentConfig;\n+ }\n+\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/component/ComponentModel.java",
"new_path": "server-spi/src/main/java/org/keycloak/component/ComponentModel.java",
"diff": "@@ -85,22 +85,22 @@ public class ComponentModel implements Serializable {\n}\npublic String get(String key, String defaultValue) {\n- String s = config.getFirst(key);\n+ String s = get(key);\nreturn s != null ? s : defaultValue;\n}\npublic int get(String key, int defaultValue) {\n- String s = config.getFirst(key);\n+ String s = get(key);\nreturn s != null ? Integer.parseInt(s) : defaultValue;\n}\npublic long get(String key, long defaultValue) {\n- String s = config.getFirst(key);\n+ String s = get(key);\nreturn s != null ? Long.parseLong(s) : defaultValue;\n}\npublic boolean get(String key, boolean defaultValue) {\n- String s = config.getFirst(key);\n+ String s = get(key);\nreturn s != null ? Boolean.parseBoolean(s) : defaultValue;\n}\n@@ -109,15 +109,15 @@ public class ComponentModel implements Serializable {\n}\npublic void put(String key, int value) {\n- config.putSingle(key, Integer.toString(value));\n+ put(key, Integer.toString(value));\n}\npublic void put(String key, long value) {\n- config.putSingle(key, Long.toString(value));\n+ put(key, Long.toString(value));\n}\npublic void put(String key, boolean value) {\n- config.putSingle(key, Boolean.toString(value));\n+ put(key, Boolean.toString(value));\n}\npublic boolean hasNote(String key) {\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Simplify component model overrides
Fixes #9021 |
339,185 | 07.12.2021 18:06:53 | -3,600 | 654f1f74ff7684fb216893473ceac0930ed09bcb | Refactor StorageId
Fixes | [
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/storage/StorageId.java",
"new_path": "server-spi/src/main/java/org/keycloak/storage/StorageId.java",
"diff": "@@ -21,35 +21,52 @@ import org.keycloak.models.ClientModel;\nimport org.keycloak.models.UserModel;\nimport java.io.Serializable;\n+import java.util.Objects;\n/**\n* @author <a href=\"mailto:[email protected]\">Bill Burke</a>\n* @version $Revision: 1 $\n*/\npublic class StorageId implements Serializable {\n- private String id;\n- private String providerId;\n- private String externalId;\n+ private final String providerId;\n+ private final String externalId;\npublic StorageId(String id) {\n- this.id = id;\nif (!id.startsWith(\"f:\")) {\n+ providerId = null;\nexternalId = id;\n- return;\n- }\n+ } else {\nint providerIndex = id.indexOf(':', 2);\nproviderId = id.substring(2, providerIndex);\nexternalId = id.substring(providerIndex + 1);\n-\n+ }\n}\npublic StorageId(String providerId, String externalId) {\n- this.id = \"f:\" + providerId + \":\" + externalId;\n+ if (providerId != null && providerId.contains(\":\")) {\n+ throw new IllegalArgumentException(\"Provider must not contain a colon (:) character\");\n+ }\nthis.providerId = providerId;\nthis.externalId = externalId;\n}\n+ public boolean isLocal() {\n+ return getProviderId() == null;\n+ }\n+\n+ public String getId() {\n+ return providerId == null ? externalId : (\"f:\" + providerId + \":\" + externalId);\n+ }\n+\n+ public String getProviderId() {\n+ return providerId;\n+ }\n+\n+ public String getExternalId() {\n+ return externalId;\n+ }\n+\n/**\n* generate the id string that should be returned by UserModel.getId()\n*\n@@ -68,40 +85,67 @@ public class StorageId implements Serializable {\nreturn new StorageId(keycloakId).getProviderId();\n}\n+ public static boolean isLocalStorage(String id) {\n+ return new StorageId(id).getProviderId() == null;\n+ }\n-\n+ /**\n+ * @deprecated Use {@link #providerId(String)} instead.\n+ */\npublic static String resolveProviderId(UserModel user) {\n- return new StorageId(user.getId()).getProviderId();\n+ return providerId(user.getId());\n}\n+\n+ /**\n+ * @deprecated Use {@link #isLocalStorage(String)} instead.\n+ */\npublic static boolean isLocalStorage(UserModel user) {\n- return new StorageId(user.getId()).getProviderId() == null;\n- }\n- public static boolean isLocalStorage(String id) {\n- return new StorageId(id).getProviderId() == null;\n+ return isLocalStorage(user.getId());\n}\n+ /**\n+ * @deprecated Use {@link #providerId(String)} instead.\n+ */\npublic static String resolveProviderId(ClientModel client) {\n- return new StorageId(client.getId()).getProviderId();\n+ return providerId(client.getId());\n}\n+\n+ /**\n+ * @deprecated Use {@link #isLocalStorage(String)} instead.\n+ */\npublic static boolean isLocalStorage(ClientModel client) {\n- return new StorageId(client.getId()).getProviderId() == null;\n+ return isLocalStorage(client.getId());\n}\n- public boolean isLocal() {\n- return getProviderId() == null;\n+ @Override\n+ public int hashCode() {\n+ return Objects.hash(providerId, externalId);\n}\n- public String getId() {\n- return id;\n+ @Override\n+ public boolean equals(Object obj) {\n+ if (this == obj) {\n+ return true;\n}\n-\n- public String getProviderId() {\n- return providerId;\n+ if (obj == null) {\n+ return false;\n}\n-\n- public String getExternalId() {\n- return externalId;\n+ if (getClass() != obj.getClass()) {\n+ return false;\n+ }\n+ final StorageId other = (StorageId) obj;\n+ if ( ! Objects.equals(this.providerId, other.providerId)) {\n+ return false;\n+ }\n+ if ( ! Objects.equals(this.externalId, other.externalId)) {\n+ return false;\n+ }\n+ return true;\n}\n+ @Override\n+ public String toString() {\n+ return getId();\n+ }\n}\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "server-spi/src/test/java/org/keycloak/storage/StorageIdTest.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+package org.keycloak.storage;\n+\n+import org.keycloak.component.ComponentModel;\n+import org.junit.Test;\n+import static org.hamcrest.CoreMatchers.equalTo;\n+import static org.hamcrest.CoreMatchers.is;\n+import static org.hamcrest.CoreMatchers.not;\n+import static org.hamcrest.CoreMatchers.notNullValue;\n+import static org.hamcrest.CoreMatchers.nullValue;\n+import static org.hamcrest.MatcherAssert.assertThat;\n+import static org.junit.Assert.assertFalse;\n+import static org.junit.Assert.assertTrue;\n+\n+/**\n+ *\n+ * @author hmlnarik\n+ */\n+public class StorageIdTest {\n+\n+ @Test\n+ public void testStatic() {\n+ final String localId = \"123\";\n+ assertThat(StorageId.externalId(localId), is(\"123\"));\n+ assertThat(StorageId.providerId(localId), nullValue());\n+ assertTrue(StorageId.isLocalStorage(localId));\n+\n+ final String remoteId = \"f:abc:123\";\n+ assertThat(StorageId.externalId(remoteId), is(\"123\"));\n+ assertThat(StorageId.providerId(remoteId), is(\"abc\"));\n+ assertFalse(StorageId.isLocalStorage(remoteId));\n+\n+ final ComponentModel cm = new ComponentModel();\n+ cm.setId(\"localId\");\n+ assertThat(StorageId.keycloakId(cm, localId), is(\"f:localId:123\"));\n+ }\n+\n+ @Test\n+ public void testLocalId() {\n+ StorageId id = new StorageId(\"123\");\n+ assertThat(id, notNullValue());\n+ assertThat(id.getExternalId(), is(\"123\"));\n+ assertThat(id.getProviderId(), nullValue());\n+ assertThat(id.getId(), is(\"123\"));\n+ assertTrue(id.isLocal());\n+ }\n+\n+ @Test\n+ public void testExternalIdString() {\n+ StorageId id = new StorageId(\"f:abc:123\");\n+ assertThat(id, notNullValue());\n+ assertThat(id.getExternalId(), is(\"123\"));\n+ assertThat(id.getProviderId(), is(\"abc\"));\n+ assertThat(id.getId(), is(\"f:abc:123\"));\n+ assertFalse(id.isLocal());\n+ }\n+\n+ @Test\n+ public void testExternalIdTwoStrings() {\n+ StorageId id = new StorageId(\"abc\", \"123\");\n+ assertThat(id, notNullValue());\n+ assertThat(id.getExternalId(), is(\"123\"));\n+ assertThat(id.getProviderId(), is(\"abc\"));\n+ assertThat(id.getId(), is(\"f:abc:123\"));\n+ assertFalse(id.isLocal());\n+ }\n+\n+ @Test\n+ public void testEquals() {\n+ assertThat(new StorageId(\"abc\", \"123\"), equalTo(new StorageId(\"f:abc:123\")));\n+ assertThat(new StorageId(\"abc\", \"123\"), not(equalTo(new StorageId(\"f:abc:1234\"))));\n+ }\n+}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Refactor StorageId
Fixes #9031 |
339,179 | 08.12.2021 12:56:55 | -3,600 | fc237a8b63b3432dd60f2004ee31de351d769545 | Introduce ancestor interface for entities with attributes | [
{
"change_type": "MODIFY",
"old_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/AbstractGenerateEntityImplementationsProcessor.java",
"new_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/AbstractGenerateEntityImplementationsProcessor.java",
"diff": "@@ -47,6 +47,7 @@ import java.util.stream.Stream;\nimport static org.keycloak.models.map.processor.FieldAccessorType.GETTER;\nimport static org.keycloak.models.map.processor.Util.getGenericsDeclaration;\n+import static org.keycloak.models.map.processor.Util.isMapType;\npublic abstract class AbstractGenerateEntityImplementationsProcessor extends AbstractProcessor {\n@@ -157,7 +158,7 @@ public abstract class AbstractGenerateEntityImplementationsProcessor extends Abs\nprotected boolean isKnownCollectionOfImmutableFinalTypes(TypeMirror fieldType) {\nList<TypeMirror> res = getGenericsDeclaration(fieldType);\n- return isCollection(fieldType) && res.stream().allMatch(tm -> isImmutableFinalType(tm) || isKnownCollectionOfImmutableFinalTypes(tm));\n+ return isCollection(fieldType) && res.stream().allMatch(this::isImmutableFinalType);\n}\nprotected boolean isCollection(TypeMirror fieldType) {\n@@ -175,12 +176,24 @@ public abstract class AbstractGenerateEntityImplementationsProcessor extends Abs\n}\nprotected String deepClone(TypeMirror fieldType, String parameterName) {\n- if (isKnownCollectionOfImmutableFinalTypes(fieldType)) {\nTypeElement typeElement = elements.getTypeElement(types.erasure(fieldType).toString());\n+ if (isKnownCollectionOfImmutableFinalTypes(fieldType)) {\nreturn parameterName + \" == null ? null : \" + interfaceToImplementation(typeElement, parameterName);\n- } else {\n- return \"deepClone(\" + parameterName + \")\";\n+ } else if (isMapType(typeElement)) {\n+ List<TypeMirror> mapTypes = getGenericsDeclaration(fieldType);\n+ boolean isKeyImmutable = isImmutableFinalType(mapTypes.get(0));\n+ boolean isValueImmutable = isImmutableFinalType(mapTypes.get(1));\n+\n+ return parameterName + \" == null ? null : \" + parameterName + \".entrySet().stream().collect(\" +\n+ \"java.util.stream.Collectors.toMap(\" +\n+ (isKeyImmutable ? \"java.util.Map.Entry::getKey\" : \"entry -> \" + deepClone(mapTypes.get(0), \"entry.getKey()\")) +\n+ \", \" +\n+ (isValueImmutable ? \"java.util.Map.Entry::getValue\" : \"entry -> \" + deepClone(mapTypes.get(1), \"entry.getValue()\")) +\n+ \", (o1, o2) -> o1\" +\n+ \", java.util.HashMap::new\" +\n+ \"))\";\n}\n+ return \"deepClone(\" + parameterName + \")\";\n}\nprotected boolean isPrimitiveType(TypeMirror fieldType) {\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/common/HotRodTypesUtils.java",
"new_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/common/HotRodTypesUtils.java",
"diff": "@@ -44,6 +44,10 @@ public class HotRodTypesUtils {\nreturn new HotRodPair<>(entry.getKey(), entry.getValue());\n}\n+ public static HotRodAttributeEntity createHotRodAttributeEntityFromMapEntry(Map.Entry<String, List<String>> entry) {\n+ return new HotRodAttributeEntity(entry.getKey(), entry.getValue());\n+ }\n+\npublic static <SetType, KeyType> boolean removeFromSetByMapKey(Set<SetType> set, KeyType key, Function<SetType, KeyType> keyGetter) {\nif (set == null || set.isEmpty()) { return false; }\nreturn set.stream()\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/authorization/adapter/MapResourceAdapter.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/authorization/adapter/MapResourceAdapter.java",
"diff": "@@ -136,7 +136,8 @@ public class MapResourceAdapter extends AbstractResourceModel<MapResourceEntity>\n@Override\npublic String getSingleAttribute(String name) {\n- return entity.getSingleAttribute(name);\n+ List<String> attributeValues = entity.getAttribute(name);\n+ return attributeValues == null || attributeValues.isEmpty() ? null : attributeValues.get(0);\n}\n@Override\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/authorization/entity/MapResourceEntity.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/authorization/entity/MapResourceEntity.java",
"diff": "@@ -19,6 +19,7 @@ package org.keycloak.models.map.authorization.entity;\nimport org.keycloak.models.map.common.AbstractEntity;\n+import org.keycloak.models.map.common.EntityWithAttributes;\nimport org.keycloak.models.map.common.UpdatableEntity;\nimport java.util.HashMap;\nimport java.util.HashSet;\n@@ -27,7 +28,7 @@ import java.util.Map;\nimport java.util.Objects;\nimport java.util.Set;\n-public class MapResourceEntity extends UpdatableEntity.Impl implements AbstractEntity {\n+public class MapResourceEntity extends UpdatableEntity.Impl implements AbstractEntity, EntityWithAttributes {\nprivate String id;\nprivate String name;\n@@ -156,23 +157,29 @@ public class MapResourceEntity extends UpdatableEntity.Impl implements AbstractE\nreturn policyIds;\n}\n+ @Override\npublic Map<String, List<String>> getAttributes() {\nreturn attributes;\n}\n- public List<String> getAttribute(String name) {\n- return attributes.get(name);\n+ @Override\n+ public void setAttributes(Map<String, List<String>> attributes) {\n+ this.updated |= ! Objects.equals(this.attributes, attributes);\n+ this.attributes.clear();\n+ this.attributes.putAll(attributes);\n}\n- public String getSingleAttribute(String name) {\n- List<String> attributeValues = attributes.get(name);\n- return attributeValues == null || attributeValues.isEmpty() ? null : attributeValues.get(0);\n+ @Override\n+ public List<String> getAttribute(String name) {\n+ return attributes.get(name);\n}\n+ @Override\npublic void setAttribute(String name, List<String> value) {\nthis.updated |= !Objects.equals(this.attributes.put(name, value), value);\n}\n+ @Override\npublic void removeAttribute(String name) {\nthis.updated |= this.attributes.remove(name) != null;\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientEntity.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientEntity.java",
"diff": "package org.keycloak.models.map.client;\nimport org.keycloak.models.map.common.AbstractEntity;\n+import org.keycloak.models.map.common.EntityWithAttributes;\nimport org.keycloak.models.map.common.UpdatableEntity;\nimport java.util.Collection;\n-import java.util.List;\nimport java.util.Map;\nimport java.util.Map.Entry;\nimport java.util.Objects;\n@@ -36,7 +36,7 @@ import org.keycloak.models.map.common.DeepCloner;\ninherits = \"org.keycloak.models.map.client.MapClientEntity.AbstractClientEntity\"\n)\[email protected]\n-public interface MapClientEntity extends AbstractEntity, UpdatableEntity {\n+public interface MapClientEntity extends AbstractEntity, UpdatableEntity, EntityWithAttributes {\npublic abstract class AbstractClientEntity extends UpdatableEntity.Impl implements MapClientEntity {\n@@ -87,11 +87,6 @@ public interface MapClientEntity extends AbstractEntity, UpdatableEntity {\nvoid removeWebOrigin(String webOrigin);\nvoid setWebOrigins(Set<String> webOrigins);\n- default List<String> getAttribute(String name) { return getAttributes() == null ? null : getAttributes().get(name); }\n- Map<String, List<String>> getAttributes();\n- void removeAttribute(String name);\n- void setAttribute(String name, List<String> values);\n-\nString getAuthenticationFlowBindingOverride(String binding);\nMap<String, String> getAuthenticationFlowBindingOverrides();\nvoid removeAuthenticationFlowBindingOverride(String binding);\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/clientscope/MapClientScopeEntity.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/clientscope/MapClientScopeEntity.java",
"diff": "@@ -29,9 +29,10 @@ import java.util.stream.Collectors;\nimport java.util.stream.Stream;\nimport org.keycloak.models.ProtocolMapperModel;\nimport org.keycloak.models.map.common.AbstractEntity;\n+import org.keycloak.models.map.common.EntityWithAttributes;\nimport org.keycloak.models.map.common.UpdatableEntity;\n-public class MapClientScopeEntity extends UpdatableEntity.Impl implements AbstractEntity {\n+public class MapClientScopeEntity extends UpdatableEntity.Impl implements AbstractEntity, EntityWithAttributes {\nprivate String id;\nprivate String realmId;\n@@ -94,10 +95,19 @@ public class MapClientScopeEntity extends UpdatableEntity.Impl implements Abstra\nthis.protocol = protocol;\n}\n+ @Override\npublic Map<String, List<String>> getAttributes() {\nreturn attributes;\n}\n+ @Override\n+ public void setAttributes(Map<String, List<String>> attributes) {\n+ this.attributes.clear();\n+ this.attributes.putAll(attributes);\n+ this.updated = true;\n+ }\n+\n+ @Override\npublic void setAttribute(String name, List<String> values) {\nthis.updated |= ! Objects.equals(this.attributes.put(name, values), values);\n}\n@@ -132,10 +142,12 @@ public class MapClientScopeEntity extends UpdatableEntity.Impl implements Abstra\nreturn id == null ? null : protocolMappers.get(id);\n}\n+ @Override\npublic void removeAttribute(String name) {\nthis.updated |= this.attributes.remove(name) != null;\n}\n+ @Override\npublic List<String> getAttribute(String name) {\nreturn attributes.getOrDefault(name, Collections.EMPTY_LIST);\n}\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "model/map/src/main/java/org/keycloak/models/map/common/EntityWithAttributes.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.models.map.common;\n+\n+import java.util.List;\n+import java.util.Map;\n+\n+public interface EntityWithAttributes {\n+ Map<String, List<String>> getAttributes();\n+ void setAttributes(Map<String, List<String>> attributes);\n+ List<String> getAttribute(String name);\n+ void setAttribute(String name, List<String> value);\n+ void removeAttribute(String name);\n+\n+}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/group/MapGroupEntity.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/group/MapGroupEntity.java",
"diff": "@@ -20,17 +20,16 @@ package org.keycloak.models.map.group;\nimport org.keycloak.models.map.annotations.GenerateEntityImplementations;\nimport org.keycloak.models.map.common.AbstractEntity;\nimport org.keycloak.models.map.common.DeepCloner;\n+import org.keycloak.models.map.common.EntityWithAttributes;\nimport org.keycloak.models.map.common.UpdatableEntity;\n-import java.util.List;\n-import java.util.Map;\nimport java.util.Set;\n@GenerateEntityImplementations(\ninherits = \"org.keycloak.models.map.group.MapGroupEntity.AbstractGroupEntity\"\n)\[email protected]\n-public interface MapGroupEntity extends UpdatableEntity, AbstractEntity {\n+public interface MapGroupEntity extends UpdatableEntity, AbstractEntity, EntityWithAttributes {\npublic abstract class AbstractGroupEntity extends UpdatableEntity.Impl implements MapGroupEntity {\n@@ -50,12 +49,6 @@ public interface MapGroupEntity extends UpdatableEntity, AbstractEntity {\n}\n- Map<String, List<String>> getAttributes();\n- void setAttributes(Map<String, List<String>> attributes);\n- List<String> getAttribute(String name);\n- void setAttribute(String name, List<String> value);\n- void removeAttribute(String name);\n-\nString getName();\nvoid setName(String name);\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/realm/MapRealmEntity.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/realm/MapRealmEntity.java",
"diff": "@@ -30,6 +30,7 @@ import org.keycloak.common.util.Time;\nimport org.keycloak.models.ModelDuplicateException;\nimport org.keycloak.models.OTPPolicy;\nimport org.keycloak.models.map.common.AbstractEntity;\n+import org.keycloak.models.map.common.EntityWithAttributes;\nimport org.keycloak.models.map.common.UpdatableEntity;\nimport org.keycloak.models.map.realm.entity.MapAuthenticationExecutionEntity;\nimport org.keycloak.models.map.realm.entity.MapAuthenticationFlowEntity;\n@@ -43,7 +44,7 @@ import org.keycloak.models.map.realm.entity.MapRequiredActionProviderEntity;\nimport org.keycloak.models.map.realm.entity.MapRequiredCredentialEntity;\nimport org.keycloak.models.map.realm.entity.MapWebAuthnPolicyEntity;\n-public class MapRealmEntity extends UpdatableEntity.Impl implements AbstractEntity {\n+public class MapRealmEntity extends UpdatableEntity.Impl implements AbstractEntity, EntityWithAttributes {\nprivate String id;\nprivate String name;\n@@ -669,22 +670,33 @@ public class MapRealmEntity extends UpdatableEntity.Impl implements AbstractEnti\nthis.webAuthnPolicyPasswordless = webAuthnPolicyPasswordless;\n}\n+ @Override\npublic void setAttribute(String name, List<String> values) {\nthis.updated |= ! Objects.equals(this.attributes.put(name, values), values);\n}\n+ @Override\npublic void removeAttribute(String name) {\nthis.updated |= attributes.remove(name) != null;\n}\n+ @Override\npublic List<String> getAttribute(String name) {\nreturn attributes.getOrDefault(name, Collections.EMPTY_LIST);\n}\n+ @Override\npublic Map<String, List<String>> getAttributes() {\nreturn attributes;\n}\n+ @Override\n+ public void setAttributes(Map<String, List<String>> attributes) {\n+ this.attributes.clear();\n+ this.attributes.putAll(attributes);\n+ this.updated = true;\n+ }\n+\npublic void addDefaultClientScope(String scopeId) {\nthis.updated |= this.defaultClientScopes.add(scopeId);\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleEntity.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleEntity.java",
"diff": "@@ -22,13 +22,14 @@ import java.util.Set;\nimport org.keycloak.models.map.annotations.GenerateEntityImplementations;\nimport org.keycloak.models.map.common.AbstractEntity;\nimport org.keycloak.models.map.common.DeepCloner;\n+import org.keycloak.models.map.common.EntityWithAttributes;\nimport org.keycloak.models.map.common.UpdatableEntity;\n@GenerateEntityImplementations(\ninherits = \"org.keycloak.models.map.role.MapRoleEntity.AbstractRoleEntity\"\n)\[email protected]\n-public interface MapRoleEntity extends AbstractEntity, UpdatableEntity {\n+public interface MapRoleEntity extends AbstractEntity, UpdatableEntity, EntityWithAttributes {\npublic abstract class AbstractRoleEntity extends UpdatableEntity.Impl implements MapRoleEntity {\n@@ -76,10 +77,4 @@ public interface MapRoleEntity extends AbstractEntity, UpdatableEntity {\nvoid setCompositeRoles(Set<String> compositeRoles);\nvoid addCompositeRole(String roleId);\nvoid removeCompositeRole(String roleId);\n-\n- Map<String, List<String>> getAttributes();\n- void setAttributes(Map<String, List<String>> attributes);\n- void setAttribute(String name, List<String> values);\n- void removeAttribute(String name);\n-\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/user/MapUserEntity.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/user/MapUserEntity.java",
"diff": "@@ -19,12 +19,12 @@ package org.keycloak.models.map.user;\nimport org.keycloak.models.ModelDuplicateException;\nimport org.keycloak.models.map.common.AbstractEntity;\n+import org.keycloak.models.map.common.EntityWithAttributes;\nimport org.keycloak.models.map.common.UpdatableEntity;\nimport org.keycloak.models.utils.KeycloakModelUtils;\nimport java.util.Collection;\nimport java.util.Collections;\n-import java.util.Comparator;\nimport java.util.HashMap;\nimport java.util.HashSet;\nimport java.util.LinkedList;\n@@ -40,7 +40,7 @@ import java.util.stream.Stream;\n*\n* @author mhajas\n*/\n-public class MapUserEntity extends UpdatableEntity.Impl implements AbstractEntity {\n+public class MapUserEntity extends UpdatableEntity.Impl implements AbstractEntity, EntityWithAttributes {\nprivate String id;\nprivate String realmId;\n@@ -183,19 +183,23 @@ public class MapUserEntity extends UpdatableEntity.Impl implements AbstractEntit\nreturn attributes;\n}\n+ @Override\npublic List<String> getAttribute(String name) {\nreturn attributes.getOrDefault(name, Collections.emptyList());\n}\n+ @Override\npublic void setAttributes(Map<String, List<String>> attributes) {\nthis.updated |= !Objects.equals(this.attributes, attributes);\nthis.attributes = attributes;\n}\n+ @Override\npublic void setAttribute(String name, List<String> value) {\nthis.updated |= !Objects.equals(this.attributes.put(name, value), value);\n}\n+ @Override\npublic void removeAttribute(String name) {\nthis.updated |= this.attributes.remove(name) != null;\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Introduce ancestor interface for entities with attributes |
339,591 | 10.12.2021 20:51:53 | 0 | 38174212f90739e3bc8ec854f28106f1ebdf578c | Fix issue where Patternfly background clashes with Keycloak one | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/keycloak/login/resources/css/login.css",
"new_path": "themes/src/main/resources/theme/keycloak/login/resources/css/login.css",
"diff": "+/* Patternfly CSS places a \"bg-login.jpg\" as the background on this \".login-pf\" class.\n+ This clashes with the \"keycloak-bg.png' background defined on the body below.\n+ Therefore the Patternfly background must be set to none. */\n+.login-pf {\n+ background: none;\n+}\n+\n.login-pf body {\nbackground: url(\"../img/keycloak-bg.png\") no-repeat center center fixed;\nbackground-size: cover;\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Fix issue where Patternfly background clashes with Keycloak one (#8422) |
339,216 | 23.09.2021 13:36:01 | -7,200 | c474e770fe61fb8c0fd52fbdbdf382fa04e3aae0 | Clarify Admin UI Name of NoCookieFlowRedirectAuthenticator
In the Admin UI, the Authenticator was simply called Browser Redirect/Refresh which gives the impression that it is a generic redirector (which would be a cool validator).
This Quick Fix changes the Name to "Browser Redirect for Cookie free authentication" which should bring more clarity. | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/authentication/authenticators/challenge/NoCookieFlowRedirectAuthenticatorFactory.java",
"new_path": "services/src/main/java/org/keycloak/authentication/authenticators/challenge/NoCookieFlowRedirectAuthenticatorFactory.java",
"diff": "@@ -82,7 +82,7 @@ public class NoCookieFlowRedirectAuthenticatorFactory implements AuthenticatorFa\n@Override\npublic String getDisplayType() {\n- return \"Browser Redirect/Refresh\";\n+ return \"Browser Redirect for Cookie free authentication\";\n}\n@Override\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/authentication/InitialFlowsTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/authentication/InitialFlowsTest.java",
"diff": "@@ -195,7 +195,7 @@ public class InitialFlowsTest extends AbstractAuthenticationTest {\naddExecExport(flow, \"Authentication Options\", false, null, true, null, REQUIRED, 20);\nexecs = new LinkedList<>();\n- addExecInfo(execs, \"Browser Redirect/Refresh\", \"no-cookie-redirect\", false, 0, 0, REQUIRED, null, new String[]{REQUIRED});\n+ addExecInfo(execs, \"Browser Redirect for Cookie free authentication\", \"no-cookie-redirect\", false, 0, 0, REQUIRED, null, new String[]{REQUIRED});\naddExecInfo(execs, \"Authentication Options\", null, false, 0, 1, REQUIRED, true, new String[]{REQUIRED, ALTERNATIVE, DISABLED, CONDITIONAL});\naddExecInfo(execs, \"Basic Auth Challenge\", \"basic-auth\", false, 1, 0, REQUIRED, null, new String[]{REQUIRED, ALTERNATIVE, DISABLED});\naddExecInfo(execs, \"Basic Auth Password+OTP\", \"basic-auth-otp\", false, 1, 1, DISABLED, null, new String[]{REQUIRED, ALTERNATIVE, DISABLED});\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/authentication/ProvidersTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/authentication/ProvidersTest.java",
"diff": "@@ -182,7 +182,7 @@ public class ProvidersTest extends AbstractAuthenticationTest {\n\"User reviews and updates profile data retrieved from Identity Provider in the displayed form\");\naddProviderInfo(result, \"idp-username-password-form\", \"Username Password Form for identity provider reauthentication\",\n\"Validates a password from login form. Username may be already known from identity provider authentication\");\n- addProviderInfo(result, \"no-cookie-redirect\", \"Browser Redirect/Refresh\", \"Perform a 302 redirect to get user agent's current URI on authenticate path with an auth_session_id query parameter. This is for client's that do not support cookies.\");\n+ addProviderInfo(result, \"no-cookie-redirect\", \"Browser Redirect for Cookie free authentication\", \"Perform a 302 redirect to get user agent's current URI on authenticate path with an auth_session_id query parameter. This is for client's that do not support cookies.\");\naddProviderInfo(result, \"push-button-authenticator\", \"TEST: Button Login\",\n\"Just press the button to login.\");\naddProviderInfo(result, \"reset-credential-email\", \"Send Reset Email\", \"Send email to user and wait for response.\");\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Clarify Admin UI Name of NoCookieFlowRedirectAuthenticator
In the Admin UI, the Authenticator was simply called Browser Redirect/Refresh which gives the impression that it is a generic redirector (which would be a cool validator).
This Quick Fix changes the Name to "Browser Redirect for Cookie free authentication" which should bring more clarity. |
339,387 | 01.12.2021 12:26:12 | -32,400 | 24e7ab67484ab637b6f43a8e02e2eb3a6e3bf7a8 | 8942 - port in location header is -1 when doing SAML global logout | [
{
"change_type": "MODIFY",
"old_path": "adapters/saml/wildfly-elytron/src/main/java/org/keycloak/adapters/saml/elytron/KeycloakHttpServerAuthenticationMechanism.java",
"new_path": "adapters/saml/wildfly-elytron/src/main/java/org/keycloak/adapters/saml/elytron/KeycloakHttpServerAuthenticationMechanism.java",
"diff": "@@ -173,7 +173,13 @@ class KeycloakHttpServerAuthenticationMechanism implements HttpServerAuthenticat\nString path = uri.getPath();\nString relativePath = exchange.getRequest().getRelativePath();\nString contextPath = path.substring(0, path.indexOf(relativePath));\n- String loc = exchange.getURI().getScheme() + \"://\" + exchange.getURI().getHost() + \":\" + exchange.getURI().getPort() + contextPath + location;\n+ String loc;\n+ int port = uri.getPort();\n+ if (port == -1) {\n+ loc = uri.getScheme() + \"://\" + uri.getHost() + contextPath + location;\n+ } else {\n+ loc = uri.getScheme() + \"://\" + uri.getHost() + \":\" + port + contextPath + location;\n+ }\nexchange.getResponse().setHeader(\"Location\", loc);\n}\nexchange.getResponse().setStatus(HttpServletResponse.SC_FOUND);\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | 8942 - port in location header is -1 when doing SAML global logout |
339,618 | 10.12.2021 16:41:51 | -3,600 | d6abade8720d061a93e9af9e666843b09335f937 | Solves - relocating dependency jars to new location. | [
{
"change_type": "MODIFY",
"old_path": "quarkus/deployment/pom.xml",
"new_path": "quarkus/deployment/pom.xml",
"diff": "</dependency>\n<dependency>\n<groupId>io.quarkus</groupId>\n- <artifactId>quarkus-vertx-web-deployment</artifactId>\n+ <artifactId>quarkus-reactive-routes-deployment</artifactId>\n</dependency>\n<dependency>\n<groupId>io.quarkus</groupId>\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/pom.xml",
"new_path": "quarkus/runtime/pom.xml",
"diff": "</dependency>\n<dependency>\n<groupId>io.quarkus</groupId>\n- <artifactId>quarkus-vertx-web</artifactId>\n+ <artifactId>quarkus-reactive-routes</artifactId>\n</dependency>\n<dependency>\n<groupId>io.quarkus</groupId>\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Solves #9080 - relocating dependency jars to new location. |
339,185 | 06.12.2021 15:39:53 | -3,600 | 8e03942e872c197cec12a814d7bd1e8c126b374a | Enhance available tree operations
Fixes | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/tree/TreeNode.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/tree/TreeNode.java",
"diff": "@@ -19,7 +19,9 @@ package org.keycloak.models.map.storage.tree;\nimport java.util.List;\nimport java.util.Map;\nimport java.util.Optional;\n+import java.util.function.Consumer;\nimport java.util.function.Predicate;\n+import java.util.stream.Stream;\n/**\n* Interface representing a node in a tree that has ID.\n@@ -166,4 +168,29 @@ public interface TreeNode<Self extends TreeNode<? extends Self>> {\n* @return\n*/\nList<Self> getPathToRoot(PathOrientation orientation);\n+\n+ /**\n+ * Returns a stream of the nodes laying on the path from this node (exclusive) to the root of the tree (inclusive).\n+ * @return\n+ */\n+ Stream<Self> getParentsStream();\n+\n+ /**\n+ * Calls the given {@code visitor} on each node laying on the path from this node (exclusive) to the root of the tree (inclusive).\n+ * @param visitor\n+ */\n+ void forEachParent(Consumer<Self> visitor);\n+\n+ /**\n+ * Walks the tree with the given visitor in depth-first search manner.\n+ * @param visitorUponEntry Visitor called upon entry of the node. May be {@code null}, in that case no action is performed.\n+ * @param visitorAfterChildrenVisited Visitor called before exit of the node. May be {@code null}, in that case no action is performed.\n+ */\n+ void walkDfs(Consumer<Self> visitorUponEntry, Consumer<Self> visitorAfterChildrenVisited);\n+\n+ /**\n+ * Walks the tree with the given visitor in breadth-first search manner.\n+ * @param visitor\n+ */\n+ void walkBfs(Consumer<Self> visitor);\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/test/java/org/keycloak/models/map/storage/tree/DefaultTreeNodeTest.java",
"new_path": "model/map/src/test/java/org/keycloak/models/map/storage/tree/DefaultTreeNodeTest.java",
"diff": "@@ -31,6 +31,7 @@ import static org.hamcrest.Matchers.empty;\nimport static org.hamcrest.Matchers.hasKey;\nimport static org.hamcrest.Matchers.hasSize;\nimport static org.hamcrest.Matchers.is;\n+import static org.hamcrest.Matchers.lessThan;\nimport static org.hamcrest.Matchers.not;\nimport static org.hamcrest.Matchers.notNullValue;\n@@ -41,13 +42,16 @@ import static org.hamcrest.Matchers.notNullValue;\npublic class DefaultTreeNodeTest {\nprivate class Node extends DefaultTreeNode<Node> {\n+\npublic Node() {\nsuper(treeProperties);\n}\n+\npublic Node(String id) {\nsuper(treeProperties);\nsetId(id);\n}\n+\npublic Node(Node parent, String id) {\nsuper(treeProperties);\nsetId(id);\n@@ -55,7 +59,7 @@ public class DefaultTreeNodeTest {\n}\n@Override\n- public String toString() {\n+ public String getLabel() {\nreturn this.getId() == null ? \"Node:\" + System.identityHashCode(this) : this.getId();\n}\n}\n@@ -68,6 +72,7 @@ public class DefaultTreeNodeTest {\nprivate static final Integer VALUE_3 = 12345;\npublic Map<String, Object> treeProperties = new HashMap<>();\n+\n{\ntreeProperties.put(KEY_1, VALUE_1);\ntreeProperties.put(KEY_2, VALUE_2);\n@@ -341,11 +346,17 @@ public class DefaultTreeNodeTest {\nNode child1121 = new Node(child112, \"1.1.2.1\");\nList<Node> res = new LinkedList<>();\n- assertThat(root.findFirstDfs(n -> { res.add(n); return false; }), is(Optional.empty()));\n+ assertThat(root.findFirstDfs(n -> {\n+ res.add(n);\n+ return false;\n+ }), is(Optional.empty()));\nassertThat(res, contains(root, child11, child111, child112, child1121, child12, child121, child122, child123));\nres.clear();\n- assertThat(root.findFirstDfs(n -> { res.add(n); return n == child12; }), is(Optional.of(child12)));\n+ assertThat(root.findFirstDfs(n -> {\n+ res.add(n);\n+ return n == child12;\n+ }), is(Optional.of(child12)));\nassertThat(res, contains(root, child11, child111, child112, child1121, child12));\n}\n@@ -365,15 +376,24 @@ public class DefaultTreeNodeTest {\nNode child132 = new Node(child13, \"1.3.2\");\nList<Node> res = new LinkedList<>();\n- assertThat(root.findFirstBottommostDfs(n -> { res.add(n); return false; }), is(Optional.empty()));\n+ assertThat(root.findFirstBottommostDfs(n -> {\n+ res.add(n);\n+ return false;\n+ }), is(Optional.empty()));\nassertThat(res, contains(root, child11, child111, child112, child1121, child12, child121, child122, child123, child13, child131, child132));\nres.clear();\n- assertThat(root.findFirstBottommostDfs(n -> { res.add(n); return n == child12; }), is(Optional.of(child12)));\n+ assertThat(root.findFirstBottommostDfs(n -> {\n+ res.add(n);\n+ return n == child12;\n+ }), is(Optional.of(child12)));\nassertThat(res, contains(root, child11, child111, child112, child1121, child12, child121, child122, child123));\nres.clear();\n- assertThat(root.findFirstBottommostDfs(n -> { res.add(n); return n.getId().startsWith(\"1.1.2\"); }), is(Optional.of(child1121)));\n+ assertThat(root.findFirstBottommostDfs(n -> {\n+ res.add(n);\n+ return n.getId().startsWith(\"1.1.2\");\n+ }), is(Optional.of(child1121)));\nassertThat(res, contains(root, child11, child111, child112, child1121));\n}\n@@ -390,14 +410,82 @@ public class DefaultTreeNodeTest {\nNode child1121 = new Node(child112, \"1.1.2.1\");\nList<Node> res = new LinkedList<>();\n- assertThat(root.findFirstBfs(n -> { res.add(n); return false; }), is(Optional.empty()));\n+ assertThat(root.findFirstBfs(n -> {\n+ res.add(n);\n+ return false;\n+ }), is(Optional.empty()));\nassertThat(res, contains(root, child11, child12, child111, child112, child121, child122, child123, child1121));\nres.clear();\n- assertThat(root.findFirstBfs(n -> { res.add(n); return n == child12; }), is(Optional.of(child12)));\n+ assertThat(root.findFirstBfs(n -> {\n+ res.add(n);\n+ return n == child12;\n+ }), is(Optional.of(child12)));\nassertThat(res, contains(root, child11, child12));\n}\n+ @Test\n+ public void testWalkBfs() {\n+ Node root = new Node(\"1\");\n+ Node child11 = new Node(root, \"1.1\");\n+ Node child12 = new Node(root, \"1.2\");\n+ Node child111 = new Node(child11, \"1.1.1\");\n+ Node child112 = new Node(child11, \"1.1.2\");\n+ Node child121 = new Node(child12, \"1.2.1\");\n+ Node child122 = new Node(child12, \"1.2.2\");\n+ Node child123 = new Node(child12, \"1.2.3\");\n+ Node child1121 = new Node(child112, \"1.1.2.1\");\n+\n+ List<Node> res = new LinkedList<>();\n+ root.walkBfs(res::add);\n+ assertThat(res, contains(root, child11, child12, child111, child112, child121, child122, child123, child1121));\n+ }\n+\n+ @Test\n+ public void testWalkDfs() {\n+ Node root = new Node(\"1\");\n+ Node child11 = new Node(root, \"1.1\");\n+ Node child12 = new Node(root, \"1.2\");\n+ Node child111 = new Node(child11, \"1.1.1\");\n+ Node child112 = new Node(child11, \"1.1.2\");\n+ Node child121 = new Node(child12, \"1.2.1\");\n+ Node child122 = new Node(child12, \"1.2.2\");\n+ Node child123 = new Node(child12, \"1.2.3\");\n+ Node child1121 = new Node(child112, \"1.1.2.1\");\n+\n+ List<Node> uponEntry = new LinkedList<>();\n+ List<Node> afterChildren = new LinkedList<>();\n+ root.walkDfs(uponEntry::add, afterChildren::add);\n+ assertThat(uponEntry, contains(root, child11, child111, child112, child1121, child12, child121, child122, child123));\n+ assertThat(afterChildren, contains(child111, child1121, child112, child11, child121, child122, child123, child12, root));\n+ }\n+\n+ @Test\n+ public void testForEachParent() {\n+ Node root = new Node(\"1\");\n+ Node child11 = new Node(root, \"1.1\");\n+ Node child12 = new Node(root, \"1.2\");\n+ Node child111 = new Node(child11, \"1.1.1\");\n+ Node child112 = new Node(child11, \"1.1.2\");\n+ Node child121 = new Node(child12, \"1.2.1\");\n+ Node child122 = new Node(child12, \"1.2.2\");\n+ Node child123 = new Node(child12, \"1.2.3\");\n+ Node child1121 = new Node(child112, \"1.1.2.1\");\n+\n+ List<Node> res = new LinkedList<>();\n+ res.clear();\n+ root.forEachParent(res::add);\n+ assertThat(res, empty());\n+\n+ res.clear();\n+ child1121.forEachParent(res::add);\n+ assertThat(res, contains(child112, child11, root));\n+\n+ res.clear();\n+ child123.forEachParent(res::add);\n+ assertThat(res, contains(child12, root));\n+ }\n+\n@Test\npublic void testPathToRoot() {\nNode root = new Node(\"1\");\n@@ -419,6 +507,13 @@ public class DefaultTreeNodeTest {\nassertThat(root.getPathToRoot(PathOrientation.BOTTOM_FIRST), contains(root));\n}\n+ @Test\n+ public void testToStringStackOverflow() {\n+ Node n = new Node(\"1\");\n+ n.setNodeProperty(\"prop\", n);\n+ assertThat(n.toString().length(), lessThan(255));\n+ }\n+\nprivate void assertTreeProperties(Node node) {\nassertThat(node.getTreeProperty(KEY_1, String.class), notNullValue());\nassertThat(node.getTreeProperty(KEY_1, Date.class), notNullValue());\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Enhance available tree operations
Fixes #9022 |
339,179 | 30.11.2021 18:06:19 | -3,600 | 5aa9a09b20a7eecde0bbf74a17f51d4f4c2bbbba | Closes - Add Groups HotRod storage | [
{
"change_type": "MODIFY",
"old_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/HotRodMapStorage.java",
"new_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/HotRodMapStorage.java",
"diff": "@@ -111,7 +111,7 @@ public class HotRodMapStorage<K, E extends AbstractHotRodEntity, V extends HotRo\n@Override\npublic Stream<V> read(QueryParameters<M> queryParameters) {\n- IckleQueryMapModelCriteriaBuilder<K, V, M> iqmcb = queryParameters.getModelCriteriaBuilder()\n+ IckleQueryMapModelCriteriaBuilder<E, M> iqmcb = queryParameters.getModelCriteriaBuilder()\n.flashToModelCriteriaBuilder(createCriteriaBuilder());\nString queryString = iqmcb.getIckleQuery();\n@@ -137,7 +137,7 @@ public class HotRodMapStorage<K, E extends AbstractHotRodEntity, V extends HotRo\n@Override\npublic long getCount(QueryParameters<M> queryParameters) {\n- IckleQueryMapModelCriteriaBuilder<K, V, M> iqmcb = queryParameters.getModelCriteriaBuilder()\n+ IckleQueryMapModelCriteriaBuilder<E, M> iqmcb = queryParameters.getModelCriteriaBuilder()\n.flashToModelCriteriaBuilder(createCriteriaBuilder());\nString queryString = iqmcb.getIckleQuery();\n@@ -153,7 +153,7 @@ public class HotRodMapStorage<K, E extends AbstractHotRodEntity, V extends HotRo\n@Override\npublic long delete(QueryParameters<M> queryParameters) {\n- IckleQueryMapModelCriteriaBuilder<K, V, M> iqmcb = queryParameters.getModelCriteriaBuilder()\n+ IckleQueryMapModelCriteriaBuilder<E, M> iqmcb = queryParameters.getModelCriteriaBuilder()\n.flashToModelCriteriaBuilder(createCriteriaBuilder());\nString queryString = \"SELECT id \" + iqmcb.getIckleQuery();\n@@ -183,8 +183,8 @@ public class HotRodMapStorage<K, E extends AbstractHotRodEntity, V extends HotRo\nreturn result.get();\n}\n- public IckleQueryMapModelCriteriaBuilder<K, V, M> createCriteriaBuilder() {\n- return new IckleQueryMapModelCriteriaBuilder<>();\n+ public IckleQueryMapModelCriteriaBuilder<E, M> createCriteriaBuilder() {\n+ return new IckleQueryMapModelCriteriaBuilder<>(storedEntityDescriptor.getEntityTypeClass());\n}\n@Override\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/HotRodMapStorageProviderFactory.java",
"new_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/HotRodMapStorageProviderFactory.java",
"diff": "@@ -22,8 +22,10 @@ import org.keycloak.Config;\nimport org.keycloak.common.Profile;\nimport org.keycloak.component.AmphibianProviderFactory;\nimport org.keycloak.models.ClientModel;\n+import org.keycloak.models.GroupModel;\nimport org.keycloak.models.KeycloakSession;\nimport org.keycloak.models.KeycloakSessionFactory;\n+import org.keycloak.models.map.group.MapGroupEntity;\nimport org.keycloak.models.map.storage.hotRod.client.HotRodClientEntity;\nimport org.keycloak.models.map.storage.hotRod.client.HotRodClientEntityDelegate;\nimport org.keycloak.models.map.storage.hotRod.client.HotRodProtocolMapperEntityDelegate;\n@@ -34,6 +36,8 @@ import org.keycloak.models.map.storage.hotRod.common.HotRodEntityDescriptor;\nimport org.keycloak.models.map.storage.hotRod.connections.HotRodConnectionProvider;\nimport org.keycloak.models.map.storage.MapStorageProvider;\nimport org.keycloak.models.map.storage.MapStorageProviderFactory;\n+import org.keycloak.models.map.storage.hotRod.group.HotRodGroupEntity;\n+import org.keycloak.models.map.storage.hotRod.group.HotRodGroupEntityDelegate;\nimport org.keycloak.provider.EnvironmentDependentProviderFactory;\nimport java.util.HashMap;\n@@ -47,6 +51,7 @@ public class HotRodMapStorageProviderFactory implements AmphibianProviderFactory\nprivate final static DeepCloner CLONER = new DeepCloner.Builder()\n.constructorDC(MapClientEntity.class, HotRodClientEntityDelegate::new)\n.constructor(MapProtocolMapperEntity.class, HotRodProtocolMapperEntityDelegate::new)\n+ .constructor(MapGroupEntity.class, HotRodGroupEntityDelegate::new)\n.build();\npublic static final Map<Class<?>, HotRodEntityDescriptor<?, ?>> ENTITY_DESCRIPTOR_MAP = new HashMap<>();\n@@ -56,6 +61,12 @@ public class HotRodMapStorageProviderFactory implements AmphibianProviderFactory\nnew HotRodEntityDescriptor<>(ClientModel.class,\nHotRodClientEntity.class,\nHotRodClientEntityDelegate::new));\n+\n+ // Groups descriptor\n+ ENTITY_DESCRIPTOR_MAP.put(GroupModel.class,\n+ new HotRodEntityDescriptor<>(GroupModel.class,\n+ HotRodGroupEntity.class,\n+ HotRodGroupEntityDelegate::new));\n}\n@Override\n@@ -95,6 +106,6 @@ public class HotRodMapStorageProviderFactory implements AmphibianProviderFactory\n@Override\npublic String getHelpText() {\n- return \"HotRod client storage\";\n+ return \"HotRod map storage\";\n}\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/IckleQueryMapModelCriteriaBuilder.java",
"new_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/IckleQueryMapModelCriteriaBuilder.java",
"diff": "package org.keycloak.models.map.storage.hotRod;\nimport org.keycloak.models.ClientModel;\n-import org.keycloak.models.map.common.AbstractEntity;\n+import org.keycloak.models.GroupModel;\nimport org.keycloak.models.map.storage.ModelCriteriaBuilder;\n+import org.keycloak.models.map.storage.hotRod.common.AbstractHotRodEntity;\nimport org.keycloak.storage.SearchableModelField;\nimport java.util.Arrays;\n@@ -32,10 +33,12 @@ import java.util.stream.Collectors;\nimport static org.keycloak.models.map.storage.hotRod.IckleQueryOperators.C;\nimport static org.keycloak.models.map.storage.hotRod.IckleQueryOperators.findAvailableNamedParam;\n+import static org.keycloak.models.map.storage.hotRod.common.ProtoSchemaInitializer.HOT_ROD_ENTITY_PACKAGE;\n-public class IckleQueryMapModelCriteriaBuilder<K, V extends AbstractEntity, M> implements ModelCriteriaBuilder<M, IckleQueryMapModelCriteriaBuilder<K, V, M>> {\n+public class IckleQueryMapModelCriteriaBuilder<E extends AbstractHotRodEntity, M> implements ModelCriteriaBuilder<M, IckleQueryMapModelCriteriaBuilder<E, M>> {\nprivate static final int INITIAL_BUILDER_CAPACITY = 250;\n+ private final Class<E> hotRodEntityClass;\nprivate final StringBuilder whereClauseBuilder = new StringBuilder(INITIAL_BUILDER_CAPACITY);\nprivate final Map<String, Object> parameters;\npublic static final Map<SearchableModelField<?>, String> INFINISPAN_NAME_OVERRIDES = new HashMap<>();\n@@ -43,14 +46,19 @@ public class IckleQueryMapModelCriteriaBuilder<K, V extends AbstractEntity, M> i\nstatic {\nINFINISPAN_NAME_OVERRIDES.put(ClientModel.SearchableFields.SCOPE_MAPPING_ROLE, \"scopeMappings\");\nINFINISPAN_NAME_OVERRIDES.put(ClientModel.SearchableFields.ATTRIBUTE, \"attributes\");\n+\n+ INFINISPAN_NAME_OVERRIDES.put(GroupModel.SearchableFields.PARENT_ID, \"parentId\");\n+ INFINISPAN_NAME_OVERRIDES.put(GroupModel.SearchableFields.ASSIGNED_ROLE, \"grantedRoles\");\n}\n- public IckleQueryMapModelCriteriaBuilder(StringBuilder whereClauseBuilder, Map<String, Object> parameters) {\n+ public IckleQueryMapModelCriteriaBuilder(Class<E> hotRodEntityClass, StringBuilder whereClauseBuilder, Map<String, Object> parameters) {\n+ this.hotRodEntityClass = hotRodEntityClass;\nthis.whereClauseBuilder.append(whereClauseBuilder);\nthis.parameters = parameters;\n}\n- public IckleQueryMapModelCriteriaBuilder() {\n+ public IckleQueryMapModelCriteriaBuilder(Class<E> hotRodEntityClass) {\n+ this.hotRodEntityClass = hotRodEntityClass;\nthis.parameters = new HashMap<>();\n}\n@@ -63,7 +71,7 @@ public class IckleQueryMapModelCriteriaBuilder<K, V extends AbstractEntity, M> i\n}\n@Override\n- public IckleQueryMapModelCriteriaBuilder<K, V, M> compare(SearchableModelField<? super M> modelField, Operator op, Object... value) {\n+ public IckleQueryMapModelCriteriaBuilder<E, M> compare(SearchableModelField<? super M> modelField, Operator op, Object... value) {\nStringBuilder newBuilder = new StringBuilder(INITIAL_BUILDER_CAPACITY);\nnewBuilder.append(\"(\");\n@@ -78,17 +86,17 @@ public class IckleQueryMapModelCriteriaBuilder<K, V extends AbstractEntity, M> i\nnewBuilder.append(\")\");\n}\n- return new IckleQueryMapModelCriteriaBuilder<>(newBuilder.append(\")\"), newParameters);\n+ return new IckleQueryMapModelCriteriaBuilder<>(hotRodEntityClass, newBuilder.append(\")\"), newParameters);\n}\n- private StringBuilder joinBuilders(IckleQueryMapModelCriteriaBuilder<K, V, M>[] builders, String delimiter) {\n+ private StringBuilder joinBuilders(IckleQueryMapModelCriteriaBuilder<E, M>[] builders, String delimiter) {\nreturn new StringBuilder(INITIAL_BUILDER_CAPACITY).append(\"(\").append(Arrays.stream(builders)\n.map(IckleQueryMapModelCriteriaBuilder::getWhereClauseBuilder)\n.filter(IckleQueryMapModelCriteriaBuilder::notEmpty)\n.collect(Collectors.joining(delimiter))).append(\")\");\n}\n- private Map<String, Object> joinParameters(IckleQueryMapModelCriteriaBuilder<K, V, M>[] builders) {\n+ private Map<String, Object> joinParameters(IckleQueryMapModelCriteriaBuilder<E, M>[] builders) {\nreturn Arrays.stream(builders)\n.map(IckleQueryMapModelCriteriaBuilder::getParameters)\n.map(Map::entrySet)\n@@ -97,7 +105,7 @@ public class IckleQueryMapModelCriteriaBuilder<K, V extends AbstractEntity, M> i\n}\n@SuppressWarnings(\"unchecked\")\n- private IckleQueryMapModelCriteriaBuilder<K, V, M>[] resolveNamedQueryConflicts(IckleQueryMapModelCriteriaBuilder<K, V, M>[] builders) {\n+ private IckleQueryMapModelCriteriaBuilder<E, M>[] resolveNamedQueryConflicts(IckleQueryMapModelCriteriaBuilder<E, M>[] builders) {\nfinal Set<String> existingKeys = new HashSet<>();\nreturn Arrays.stream(builders).map(builder -> {\n@@ -123,36 +131,36 @@ public class IckleQueryMapModelCriteriaBuilder<K, V extends AbstractEntity, M> i\n}\n}\n- return new IckleQueryMapModelCriteriaBuilder<>(new StringBuilder(newWhereClause), newParameters);\n+ return new IckleQueryMapModelCriteriaBuilder<>(hotRodEntityClass, new StringBuilder(newWhereClause), newParameters);\n}).toArray(IckleQueryMapModelCriteriaBuilder[]::new);\n}\n@Override\n- public IckleQueryMapModelCriteriaBuilder<K, V, M> and(IckleQueryMapModelCriteriaBuilder<K, V, M>... builders) {\n+ public IckleQueryMapModelCriteriaBuilder<E, M> and(IckleQueryMapModelCriteriaBuilder<E, M>... builders) {\nif (builders.length == 0) {\n- return new IckleQueryMapModelCriteriaBuilder<>();\n+ return new IckleQueryMapModelCriteriaBuilder<>(hotRodEntityClass);\n}\nbuilders = resolveNamedQueryConflicts(builders);\n- return new IckleQueryMapModelCriteriaBuilder<>(joinBuilders(builders, \" AND \"),\n+ return new IckleQueryMapModelCriteriaBuilder<>(hotRodEntityClass, joinBuilders(builders, \" AND \"),\njoinParameters(builders));\n}\n@Override\n- public IckleQueryMapModelCriteriaBuilder<K, V, M> or(IckleQueryMapModelCriteriaBuilder<K, V, M>... builders) {\n+ public IckleQueryMapModelCriteriaBuilder<E, M> or(IckleQueryMapModelCriteriaBuilder<E, M>... builders) {\nif (builders.length == 0) {\n- return new IckleQueryMapModelCriteriaBuilder<>();\n+ return new IckleQueryMapModelCriteriaBuilder<>(hotRodEntityClass);\n}\nbuilders = resolveNamedQueryConflicts(builders);\n- return new IckleQueryMapModelCriteriaBuilder<>(joinBuilders(builders, \" OR \"),\n+ return new IckleQueryMapModelCriteriaBuilder<>(hotRodEntityClass, joinBuilders(builders, \" OR \"),\njoinParameters(builders));\n}\n@Override\n- public IckleQueryMapModelCriteriaBuilder<K, V, M> not(IckleQueryMapModelCriteriaBuilder<K, V, M> builder) {\n+ public IckleQueryMapModelCriteriaBuilder<E, M> not(IckleQueryMapModelCriteriaBuilder<E, M> builder) {\nStringBuilder newBuilder = new StringBuilder(INITIAL_BUILDER_CAPACITY);\nStringBuilder originalBuilder = builder.getWhereClauseBuilder();\n@@ -160,7 +168,7 @@ public class IckleQueryMapModelCriteriaBuilder<K, V extends AbstractEntity, M> i\nnewBuilder.append(\"not\").append(originalBuilder);\n}\n- return new IckleQueryMapModelCriteriaBuilder<>(newBuilder, builder.getParameters());\n+ return new IckleQueryMapModelCriteriaBuilder<>(hotRodEntityClass, newBuilder, builder.getParameters());\n}\nprivate StringBuilder getWhereClauseBuilder() {\n@@ -172,7 +180,7 @@ public class IckleQueryMapModelCriteriaBuilder<K, V extends AbstractEntity, M> i\n* @return Ickle query that represents this QueryBuilder\n*/\npublic String getIckleQuery() {\n- return \"FROM org.keycloak.models.map.storage.hotrod.HotRodClientEntity \" + C + ((whereClauseBuilder.length() != 0) ? \" WHERE \" + whereClauseBuilder : \"\");\n+ return \"FROM \" + HOT_ROD_ENTITY_PACKAGE + \".\" + hotRodEntityClass.getSimpleName() + \" \" + C + ((whereClauseBuilder.length() != 0) ? \" WHERE \" + whereClauseBuilder : \"\");\n}\n/**\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/IckleQueryOperators.java",
"new_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/IckleQueryOperators.java",
"diff": "@@ -112,7 +112,7 @@ public class IckleQueryOperators {\noperands = new HashSet<>(Arrays.asList(values));\n}\n- return C + \".\" + modelField + \" IN (\" + operands.stream()\n+ return operands.isEmpty() ? \"false\" : C + \".\" + modelField + \" IN (\" + operands.stream()\n.map(operand -> {\nString namedParam = findAvailableNamedParam(parameters.keySet(), modelField);\nparameters.put(namedParam, operand);\n@@ -149,9 +149,13 @@ public class IckleQueryOperators {\nreturn (modelFieldName, values, parameters) -> {\nif (values.length != 1) throw new RuntimeException(\"Invalid arguments, expected (\" + modelFieldName + \"), got: \" + Arrays.toString(values));\n- String namedParameter = findAvailableNamedParam(parameters.keySet(), modelFieldName);\n+ if (values[0] == null && op.equals(ModelCriteriaBuilder.Operator.EQ)) {\n+ return C + \".\" + modelFieldName + \" IS NULL\";\n+ }\n+ String namedParameter = findAvailableNamedParam(parameters.keySet(), modelFieldName);\nparameters.put(namedParameter, values[0]);\n+\nreturn C + \".\" + modelFieldName + \" \" + IckleQueryOperators.operatorToString(op) + \" :\" + namedParameter;\n};\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/common/ProtoSchemaInitializer.java",
"new_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/common/ProtoSchemaInitializer.java",
"diff": "@@ -22,20 +22,29 @@ import org.infinispan.protostream.annotations.AutoProtoSchemaBuilder;\nimport org.keycloak.models.map.storage.hotRod.client.HotRodAttributeEntity;\nimport org.keycloak.models.map.storage.hotRod.client.HotRodClientEntity;\nimport org.keycloak.models.map.storage.hotRod.client.HotRodProtocolMapperEntity;\n+import org.keycloak.models.map.storage.hotRod.group.HotRodGroupEntity;\n/**\n* @author <a href=\"mailto:[email protected]\">Martin Kanis</a>\n*/\n@AutoProtoSchemaBuilder(\nincludeClasses = {\n- HotRodAttributeEntity.class,\n+ // Clients\nHotRodClientEntity.class,\n+ HotRodAttributeEntity.class,\nHotRodProtocolMapperEntity.class,\n+\n+ // Groups\n+ HotRodGroupEntity.class,\n+\n+ // Common\nHotRodPair.class\n},\nschemaFileName = \"KeycloakHotRodMapStorage.proto\",\nschemaFilePath = \"proto/\",\n- schemaPackageName = \"org.keycloak.models.map.storage.hotrod\")\n+ schemaPackageName = ProtoSchemaInitializer.HOT_ROD_ENTITY_PACKAGE)\npublic interface ProtoSchemaInitializer extends GeneratedSchema {\n+ String HOT_ROD_ENTITY_PACKAGE = \"kc\";\n+\nProtoSchemaInitializer INSTANCE = new ProtoSchemaInitializerImpl();\n}\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/group/HotRodGroupEntity.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.models.map.storage.hotRod.group;\n+\n+import org.infinispan.protostream.annotations.ProtoField;\n+import org.keycloak.models.map.annotations.GenerateHotRodEntityImplementation;\n+import org.keycloak.models.map.common.UpdatableEntity;\n+import org.keycloak.models.map.group.MapGroupEntity;\n+import org.keycloak.models.map.storage.hotRod.client.HotRodAttributeEntity;\n+import org.keycloak.models.map.storage.hotRod.common.AbstractHotRodEntity;\n+import org.keycloak.models.map.storage.hotRod.common.HotRodEntityDelegate;\n+\n+import java.util.Set;\n+\n+@GenerateHotRodEntityImplementation(\n+ implementInterface = \"org.keycloak.models.map.group.MapGroupEntity\",\n+ inherits = \"org.keycloak.models.map.storage.hotRod.group.HotRodGroupEntity.AbstractHotRodGroupEntityDelegate\"\n+)\n+public class HotRodGroupEntity implements AbstractHotRodEntity {\n+\n+ public static abstract class AbstractHotRodGroupEntityDelegate extends UpdatableEntity.Impl implements HotRodEntityDelegate<HotRodGroupEntity>, MapGroupEntity {\n+\n+ @Override\n+ public String getId() {\n+ return getHotRodEntity().id;\n+ }\n+\n+ @Override\n+ public void setId(String id) {\n+ HotRodGroupEntity entity = getHotRodEntity();\n+ if (entity.id != null) throw new IllegalStateException(\"Id cannot be changed\");\n+ entity.id = id;\n+ this.updated |= id != null;\n+ }\n+ }\n+\n+ @ProtoField(number = 1, required = true)\n+ public int entityVersion = 1;\n+\n+ @ProtoField(number = 2, required = true)\n+ public String id;\n+\n+ @ProtoField(number = 3)\n+ public String realmId;\n+\n+ @ProtoField(number = 4)\n+ public String name;\n+\n+ @ProtoField(number = 5)\n+ public String parentId;\n+\n+ @ProtoField(number = 6)\n+ public Set<HotRodAttributeEntity> attributes;\n+\n+ @ProtoField(number = 7)\n+ public Set<String> grantedRoles;\n+}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map-hot-rod/src/main/resources/config/cacheConfig.xml",
"new_path": "model/map-hot-rod/src/main/resources/config/cacheConfig.xml",
"diff": "<distributed-cache name=\"clients\" mode=\"SYNC\">\n<encoding media-type=\"application/x-protostream\"/>\n</distributed-cache>\n+ <distributed-cache name=\"groups\" mode=\"SYNC\">\n+ <encoding media-type=\"application/x-protostream\"/>\n+ </distributed-cache>\n</cache-container>\n</infinispan>\n\\ No newline at end of file\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map-hot-rod/src/main/resources/config/infinispan.xml",
"new_path": "model/map-hot-rod/src/main/resources/config/infinispan.xml",
"diff": "<distributed-cache name=\"clients\" mode=\"SYNC\">\n<encoding media-type=\"application/x-protostream\"/>\n</distributed-cache>\n+ <distributed-cache name=\"groups\" mode=\"SYNC\">\n+ <encoding media-type=\"application/x-protostream\"/>\n+ </distributed-cache>\n</cache-container>\n</infinispan>\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map-hot-rod/src/test/java/org/keycloak/models/map/storage/hotRod/IckleQueryMapModelCriteriaBuilderTest.java",
"new_path": "model/map-hot-rod/src/test/java/org/keycloak/models/map/storage/hotRod/IckleQueryMapModelCriteriaBuilderTest.java",
"diff": "@@ -37,9 +37,9 @@ import static org.keycloak.models.map.storage.criteria.DefaultModelCriteria.crit\npublic class IckleQueryMapModelCriteriaBuilderTest {\n@Test\npublic void testSimpleIckleQuery() {\n- IckleQueryMapModelCriteriaBuilder<String, HotRodClientEntityDelegate, ClientModel> v = new IckleQueryMapModelCriteriaBuilder<>();\n- IckleQueryMapModelCriteriaBuilder<String, HotRodClientEntityDelegate, ClientModel> mcb = v.compare(CLIENT_ID, ModelCriteriaBuilder.Operator.EQ, 3);\n- assertThat(mcb.getIckleQuery(), is(equalTo(\"FROM org.keycloak.models.map.storage.hotrod.HotRodClientEntity c WHERE (c.clientId = :clientId0)\")));\n+ IckleQueryMapModelCriteriaBuilder<HotRodClientEntity, ClientModel> v = new IckleQueryMapModelCriteriaBuilder<>(HotRodClientEntity.class);\n+ IckleQueryMapModelCriteriaBuilder<HotRodClientEntity, ClientModel> mcb = v.compare(CLIENT_ID, ModelCriteriaBuilder.Operator.EQ, 3);\n+ assertThat(mcb.getIckleQuery(), is(equalTo(\"FROM kc.HotRodClientEntity c WHERE (c.clientId = :clientId0)\")));\nassertThat(mcb.getParameters().entrySet(), hasSize(1));\nassertThat(mcb.getParameters(), hasEntry(\"clientId0\", 3));\n@@ -47,7 +47,7 @@ public class IckleQueryMapModelCriteriaBuilderTest {\nmcb = v.compare(CLIENT_ID, ModelCriteriaBuilder.Operator.EQ, 4)\n.compare(ID, ModelCriteriaBuilder.Operator.EQ, 5);\n- assertThat(mcb.getIckleQuery(), is(equalTo(\"FROM org.keycloak.models.map.storage.hotrod.HotRodClientEntity c WHERE ((c.clientId = :clientId0) AND (c.id = :id0))\")));\n+ assertThat(mcb.getIckleQuery(), is(equalTo(\"FROM kc.HotRodClientEntity c WHERE ((c.clientId = :clientId0) AND (c.id = :id0))\")));\nassertThat(mcb.getParameters().entrySet(), hasSize(2));\nassertThat(mcb.getParameters(), allOf(hasEntry(\"clientId0\", 4), hasEntry(\"id0\", 5)));\n}\n@@ -56,16 +56,16 @@ public class IckleQueryMapModelCriteriaBuilderTest {\n@Test\npublic void testSimpleIckleQueryFlashedFromDefault() {\nDefaultModelCriteria<ClientModel> v = criteria();\n- IckleQueryMapModelCriteriaBuilder<String, HotRodClientEntityDelegate, ClientModel> mcb = v.compare(CLIENT_ID, ModelCriteriaBuilder.Operator.EQ, 3).flashToModelCriteriaBuilder(new IckleQueryMapModelCriteriaBuilder<>());\n- assertThat(mcb.getIckleQuery(), is(equalTo(\"FROM org.keycloak.models.map.storage.hotrod.HotRodClientEntity c WHERE (c.clientId = :clientId0)\")));\n+ IckleQueryMapModelCriteriaBuilder<HotRodClientEntity, ClientModel> mcb = v.compare(CLIENT_ID, ModelCriteriaBuilder.Operator.EQ, 3).flashToModelCriteriaBuilder(new IckleQueryMapModelCriteriaBuilder<>(HotRodClientEntity.class));\n+ assertThat(mcb.getIckleQuery(), is(equalTo(\"FROM kc.HotRodClientEntity c WHERE (c.clientId = :clientId0)\")));\nassertThat(mcb.getParameters().entrySet(), hasSize(1));\nassertThat(mcb.getParameters(), hasEntry(\"clientId0\", 3));\nmcb = v.compare(CLIENT_ID, ModelCriteriaBuilder.Operator.EQ, 4)\n- .compare(ID, ModelCriteriaBuilder.Operator.EQ, 5).flashToModelCriteriaBuilder(new IckleQueryMapModelCriteriaBuilder<>());\n+ .compare(ID, ModelCriteriaBuilder.Operator.EQ, 5).flashToModelCriteriaBuilder(new IckleQueryMapModelCriteriaBuilder<>(HotRodClientEntity.class));\n- assertThat(mcb.getIckleQuery(), is(equalTo(\"FROM org.keycloak.models.map.storage.hotrod.HotRodClientEntity c WHERE ((c.clientId = :clientId0) AND (c.id = :id0))\")));\n+ assertThat(mcb.getIckleQuery(), is(equalTo(\"FROM kc.HotRodClientEntity c WHERE ((c.clientId = :clientId0) AND (c.id = :id0))\")));\nassertThat(mcb.getParameters().entrySet(), hasSize(2));\nassertThat(mcb.getParameters(), allOf(hasEntry(\"clientId0\", 4), hasEntry(\"id0\", 5)));\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/pom.xml",
"new_path": "testsuite/integration-arquillian/tests/pom.xml",
"diff": "<configuration>\n<systemPropertyVariables>\n<keycloak.client.map.storage.provider>hotrod</keycloak.client.map.storage.provider>\n+ <keycloak.group.map.storage.provider>hotrod</keycloak.group.map.storage.provider>\n</systemPropertyVariables>\n</configuration>\n</plugin>\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/model/src/main/resources/hotrod/infinispan.xml",
"new_path": "testsuite/model/src/main/resources/hotrod/infinispan.xml",
"diff": "<infinispan>\n<cache-container>\n<transport stack=\"udp\"/>\n-\n<distributed-cache name=\"clients\" mode=\"SYNC\">\n<encoding media-type=\"application/x-protostream\"/>\n</distributed-cache>\n+ <distributed-cache name=\"groups\" mode=\"SYNC\">\n+ <encoding media-type=\"application/x-protostream\"/>\n+ </distributed-cache>\n</cache-container>\n</infinispan>\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Closes #8969 - Add Groups HotRod storage |
339,618 | 13.12.2021 12:41:52 | -3,600 | 21ccf7dd8a8e9f138293496974f4269778f8c4b1 | Fixes 9094: Remove other values for features command. Only preview allowed for now. | [
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/Picocli.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/Picocli.java",
"diff": "@@ -36,6 +36,7 @@ import java.io.File;\nimport java.io.PrintWriter;\nimport java.util.ArrayList;\nimport java.util.Arrays;\n+import java.util.Collections;\nimport java.util.Iterator;\nimport java.util.List;\nimport java.util.Map;\n@@ -305,12 +306,12 @@ public final class Picocli {\n.order(ConfigCategory.FEATURE.getOrder())\n.validate(false);\n- Set<String> featuresExpectedValues = Arrays.stream(Profile.Type.values()).map(type -> type.name().toLowerCase()).collect(Collectors.toSet());\n+ String previewName = Profile.Type.PREVIEW.name().toLowerCase();\nfeatureGroupBuilder.addArg(OptionSpec.builder(new String[] {\"-ft\", \"--features\"})\n- .description(\"Enables a group of features. Possible values are: \" + String.join(\",\", featuresExpectedValues))\n- .paramLabel(\"feature\")\n- .completionCandidates(featuresExpectedValues)\n+ .description(\"Enables all tech preview features.\")\n+ .paramLabel(previewName)\n+ .completionCandidates(Collections.singleton(previewName))\n.parameterConsumer(PropertyMapperParameterConsumer.INSTANCE)\n.type(String.class)\n.build());\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "quarkus/tests/integration/src/test/java/org/keycloak/it/cli/dist/FeaturesDistTest.java",
"diff": "+package org.keycloak.it.cli.dist;\n+\n+import io.quarkus.test.junit.main.Launch;\n+import io.quarkus.test.junit.main.LaunchResult;\n+import org.hamcrest.CoreMatchers;\n+import org.junit.jupiter.api.Test;\n+import org.keycloak.it.junit5.extension.CLIResult;\n+import org.keycloak.it.junit5.extension.DistributionTest;\n+import org.keycloak.quarkus.runtime.cli.command.StartDev;\n+\n+import static org.hamcrest.CoreMatchers.containsString;\n+import static org.hamcrest.MatcherAssert.assertThat;\n+\n+@DistributionTest\n+public class FeaturesDistTest {\n+\n+ @Test\n+ @Launch({StartDev.NAME, \"--features=preview\"})\n+ public void testPreviewFeaturesGetEnabledWhenCliArgIsSet(LaunchResult result) {\n+ CLIResult cliResult = (CLIResult) result;\n+ cliResult.assertStartedDevMode();\n+ assertThat(cliResult.getOutput(), CoreMatchers.allOf(\n+ containsString(\"Preview feature enabled: admin_fine_grained_authz\"),\n+ containsString(\"Preview feature enabled: openshift_integration\"),\n+ containsString(\"Preview feature enabled: scripts\"),\n+ containsString(\"Preview feature enabled: token_exchange\"),\n+ containsString(\"Preview feature enabled: declarative_user_profile\")));\n+ }\n+}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Fixes 9094: Remove other values for features command. Only preview allowed for now. |
339,618 | 14.12.2021 08:17:50 | -3,600 | dad5639b4e6672b1fafac1819a13c6da457e28e0 | WIP: use extra buildstep and configprovider for tests | [
{
"change_type": "MODIFY",
"old_path": "quarkus/deployment/src/main/java/org/keycloak/quarkus/deployment/KeycloakProcessor.java",
"new_path": "quarkus/deployment/src/main/java/org/keycloak/quarkus/deployment/KeycloakProcessor.java",
"diff": "@@ -53,6 +53,8 @@ import java.util.jar.JarFile;\nimport io.quarkus.agroal.spi.JdbcDataSourceBuildItem;\nimport io.quarkus.deployment.IsDevelopment;\n+import io.quarkus.deployment.IsNormal;\n+import io.quarkus.deployment.IsTest;\nimport io.quarkus.deployment.annotations.Consume;\nimport io.quarkus.deployment.builditem.CombinedIndexBuildItem;\nimport io.quarkus.deployment.builditem.GeneratedResourceBuildItem;\n@@ -265,11 +267,16 @@ class KeycloakProcessor {\n*\n* @param configSources\n*/\n- @BuildStep\n+ @BuildStep(onlyIf = IsNormal.class)\nvoid configureConfigSources(BuildProducer<StaticInitConfigSourceProviderBuildItem> configSources) {\nconfigSources.produce(new StaticInitConfigSourceProviderBuildItem(KeycloakConfigSourceProvider.class.getName()));\n}\n+ @BuildStep(onlyIf = IsTest.class)\n+ void prepareTestEnvironment(BuildProducer<StaticInitConfigSourceProviderBuildItem> configSources) {\n+ configSources.produce(new StaticInitConfigSourceProviderBuildItem(\"org.keycloak.quarkus.runtime.configuration.test.TestKeycloakConfigSourceProvider\"));\n+ }\n+\n/**\n* <p>Make the build time configuration available at runtime so that the server can run without having to specify some of\n* the properties again.\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/ConfigArgsConfigSource.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/ConfigArgsConfigSource.java",
"diff": "package org.keycloak.quarkus.runtime.configuration;\nimport static java.util.Arrays.asList;\n-import static org.keycloak.quarkus.runtime.Environment.isTestLaunchMode;\nimport static org.keycloak.quarkus.runtime.cli.Picocli.ARG_SHORT_PREFIX;\nimport static org.keycloak.quarkus.runtime.cli.command.AbstractStartCommand.AUTO_BUILD_OPTION_LONG;\nimport static org.keycloak.quarkus.runtime.cli.command.AbstractStartCommand.AUTO_BUILD_OPTION_SHORT;\n@@ -58,16 +57,13 @@ public class ConfigArgsConfigSource extends PropertiesConfigSource {\nprivate static final ConfigArgsConfigSource INSTANCE = new ConfigArgsConfigSource();\nprivate static List<String> IGNORED_ARGS;\n- private final boolean alwaysParseArgs;\n-\npublic static ConfigArgsConfigSource getInstance() {\nreturn INSTANCE;\n}\n- ConfigArgsConfigSource() {\n+ protected ConfigArgsConfigSource() {\n// higher priority over default Quarkus config sources\nsuper(parseArgument(), \"CliConfigSource\", 500);\n- alwaysParseArgs = isTestLaunchMode();\n}\npublic static void setCliArgs(String[] args) {\n@@ -96,11 +92,6 @@ public class ConfigArgsConfigSource extends PropertiesConfigSource {\n@Override\npublic String getValue(String propertyName) {\nMap<String, String> properties = getProperties();\n-\n- if (alwaysParseArgs) {\n- properties = parseArgument();\n- }\n-\nString value = properties.get(propertyName);\nif (value != null) {\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "quarkus/tests/integration/src/main/java/org/keycloak/quarkus/runtime/configuration/test/TestConfigArgsConfigSource.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.quarkus.runtime.configuration.test;\n+\n+import org.keycloak.quarkus.runtime.configuration.ConfigArgsConfigSource;\n+\n+public class TestConfigArgsConfigSource extends ConfigArgsConfigSource {\n+\n+}\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "quarkus/tests/integration/src/main/java/org/keycloak/quarkus/runtime/configuration/test/TestKeycloakConfigSourceProvider.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.quarkus.runtime.configuration.test;\n+\n+import java.util.HashMap;\n+import java.util.Map;\n+import java.util.function.Function;\n+import java.util.function.Supplier;\n+import java.util.stream.Collectors;\n+import java.util.stream.StreamSupport;\n+import org.eclipse.microprofile.config.spi.ConfigSource;\n+import org.keycloak.quarkus.runtime.configuration.ConfigArgsConfigSource;\n+import org.keycloak.quarkus.runtime.configuration.KeycloakConfigSourceProvider;\n+\n+public class TestKeycloakConfigSourceProvider extends KeycloakConfigSourceProvider {\n+\n+ private static final Map<Class<? extends ConfigSource>, Supplier<? extends ConfigSource>> REPLACEABLE_CONFIG_SOURCES = new HashMap<>();\n+\n+ static {\n+ REPLACEABLE_CONFIG_SOURCES.put(ConfigArgsConfigSource.class, TestConfigArgsConfigSource::new);\n+ }\n+\n+ @Override\n+ public Iterable<ConfigSource> getConfigSources(ClassLoader forClassLoader) {\n+ reload();\n+ return StreamSupport.stream(super.getConfigSources(forClassLoader).spliterator(), false)\n+ .map(new Function<ConfigSource, ConfigSource>() {\n+ @Override\n+ public ConfigSource apply(ConfigSource configSource) {\n+ return REPLACEABLE_CONFIG_SOURCES.getOrDefault(configSource.getClass(), () -> configSource).get();\n+ }\n+ }).collect(Collectors.toList());\n+ }\n+}\n\\ No newline at end of file\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | WIP: use extra buildstep and configprovider for tests |
339,618 | 14.12.2021 11:02:44 | -3,600 | c70dc0e72db733429665588b28fcc750f30f9e3d | Add IsIntegrationTest BuildStep Annotation | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "quarkus/deployment/src/main/java/org/keycloak/quarkus/deployment/IsIntegrationTest.java",
"diff": "+package org.keycloak.quarkus.deployment;\n+\n+import io.quarkus.deployment.IsTest;\n+import io.quarkus.runtime.LaunchMode;\n+\n+import static org.keycloak.quarkus.runtime.Environment.LAUNCH_MODE;\n+\n+public class IsIntegrationTest extends IsTest {\n+\n+ public IsIntegrationTest(LaunchMode launchMode) {\n+ super(launchMode);\n+ }\n+\n+ @Override\n+ public boolean getAsBoolean() {\n+ return super.getAsBoolean() && (System.getProperty(LAUNCH_MODE) != null && System.getProperty(LAUNCH_MODE).equals(\"test\"));\n+ }\n+\n+}\n"
},
{
"change_type": "RENAME",
"old_path": "quarkus/deployment/src/main/java/org/keycloak/quarkus/deployment/isReAugmentation.java",
"new_path": "quarkus/deployment/src/main/java/org/keycloak/quarkus/deployment/IsReAugmentation.java",
"diff": "@@ -20,7 +20,7 @@ package org.keycloak.quarkus.deployment;\nimport java.util.function.BooleanSupplier;\nimport org.keycloak.quarkus.runtime.Environment;\n-public class isReAugmentation implements BooleanSupplier {\n+public class IsReAugmentation implements BooleanSupplier {\n@Override\npublic boolean getAsBoolean() {\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/deployment/src/main/java/org/keycloak/quarkus/deployment/KeycloakProcessor.java",
"new_path": "quarkus/deployment/src/main/java/org/keycloak/quarkus/deployment/KeycloakProcessor.java",
"diff": "@@ -267,12 +267,12 @@ class KeycloakProcessor {\n*\n* @param configSources\n*/\n- @BuildStep(onlyIf = IsNormal.class)\n+ @BuildStep(onlyIfNot = IsIntegrationTest.class )\nvoid configureConfigSources(BuildProducer<StaticInitConfigSourceProviderBuildItem> configSources) {\nconfigSources.produce(new StaticInitConfigSourceProviderBuildItem(KeycloakConfigSourceProvider.class.getName()));\n}\n- @BuildStep(onlyIf = IsTest.class)\n+ @BuildStep(onlyIf = IsIntegrationTest.class)\nvoid prepareTestEnvironment(BuildProducer<StaticInitConfigSourceProviderBuildItem> configSources) {\nconfigSources.produce(new StaticInitConfigSourceProviderBuildItem(\"org.keycloak.quarkus.runtime.configuration.test.TestKeycloakConfigSourceProvider\"));\n}\n@@ -281,7 +281,7 @@ class KeycloakProcessor {\n* <p>Make the build time configuration available at runtime so that the server can run without having to specify some of\n* the properties again.\n*/\n- @BuildStep(onlyIf = isReAugmentation.class)\n+ @BuildStep(onlyIf = IsReAugmentation.class)\nvoid persistBuildTimeProperties(BuildProducer<GeneratedResourceBuildItem> resources) {\nProperties properties = new Properties();\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/deployment/src/test/java/test/org/keycloak/quarkus/services/health/KeycloakReadyHealthCheckTest.java",
"new_path": "quarkus/deployment/src/test/java/test/org/keycloak/quarkus/services/health/KeycloakReadyHealthCheckTest.java",
"diff": "@@ -52,13 +52,4 @@ public class KeycloakReadyHealthCheckTest {\n.statusCode(200)\n.body(Matchers.containsString(\"UP\"));\n}\n-\n- @Test\n- @Disabled // Temporarily disabled. See KEYCLOAK-16382 and https://github.com/quarkusio/quarkus/issues/14705\n- public void testMetricsUp() {\n- given()\n- .when().get(\"/metrics\")\n- .then()\n- .statusCode(200);\n- }\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Add IsIntegrationTest BuildStep Annotation |
339,150 | 15.12.2021 02:10:50 | -25,200 | 04da528b3517a38773c7f3afad1545cd4d1372a9 | fix for UI crash when logged in user has access to
multiple realms and at the same time that user has only limited role
(eg: view-users) which does not allow to see realm details. Crash was
happening on switching the realm. | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/js/controllers/realm.js",
"new_path": "themes/src/main/resources/theme/base/admin/resources/js/controllers/realm.js",
"diff": "@@ -280,7 +280,10 @@ module.controller('RealmDetailCtrl', function($scope, Current, Realm, realm, ser\n}\n}\n$scope.realm = angular.copy(realm);\n+\n+ if ($scope.realm.attributes != null) {\n$scope.realm.attributes['userProfileEnabled'] = $scope.realm.attributes['userProfileEnabled'] == 'true';\n+ }\nvar oldCopy = angular.copy($scope.realm);\n$scope.realmCopy = oldCopy;\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19371 - fix for UI crash when logged in user has access to (#9088)
multiple realms and at the same time that user has only limited role
(eg: view-users) which does not allow to see realm details. Crash was
happening on switching the realm. |
339,198 | 08.12.2021 10:24:07 | -3,600 | cdd5c47ed7cac6f87db17716798889b42d2bf23e | Update french translation for account console | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources-community/theme/keycloak.v2/account/messages/messages_fr.properties",
"new_path": "themes/src/main/resources-community/theme/keycloak.v2/account/messages/messages_fr.properties",
"diff": "@@ -12,9 +12,19 @@ password-display-name=Mot de passe\npassword-help-text=Authentifiez-vous en saisissant votre mot de passe\ncredentialCreatedAt=Cr\\u00e9\\u00e9 le\ntwo-factor=Authentification \\u00e0 Deux Facteurs\n+passwordless=Authentification Sans Mot de Passe\notp-display-name=Application d''authentification\notp-help-text=Entrez un code de v\\u00e9rification \\u00e0 usage unique fourni par l''application d''authentification.\n+webauthn-display-name=Cl\\u00e9 de S\\u00e9curit\\u00e9\n+webauthn-help-text=Utilisez votre cl\\u00e9 de s\\u00e9curit\\u00e9 pour vous authentifier.\n+webauthn-passwordless-display-name=Cl\\u00e9 de S\\u00e9curit\\u00e9\n+webauthn-passwordless-help-text=Utilisez votre cl\\u00e9 de s\\u00e9curit\\u00e9 pour une authentification sans mot de passe.\nnotSetUp={0} non configur\\u00e9(e).\n+remove=Supprimer\n+refreshPage=Rafra\\u00eechir la page\n+client_security-admin-console=Console d''administration de la s\\u00e9curit\\u00e9\n+client_account-console=Console de gestion du compte\n+\n# Device Activity page\nsignedInDevices=Appareils Connect\\u00e9s\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Update french translation for account console |
339,281 | 14.12.2021 17:16:01 | -3,600 | e61da278ba28265c6a0ae0e66e37c515f1e397d1 | When ternary conditional operator uses primitive type it could throw NPE in some cases
Closes | [
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/entities/CachedRealm.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/models/cache/infinispan/entities/CachedRealm.java",
"diff": "@@ -725,17 +725,17 @@ public class CachedRealm extends AbstractExtendableRevisioned {\npublic Integer getAttribute(String name, Integer defaultValue) {\nString v = getAttribute(name);\n- return v != null ? Integer.parseInt(v) : defaultValue;\n+ return v != null ? Integer.valueOf(v) : defaultValue;\n}\npublic Long getAttribute(String name, Long defaultValue) {\nString v = getAttribute(name);\n- return v != null ? Long.parseLong(v) : defaultValue;\n+ return v != null ? Long.valueOf(v) : defaultValue;\n}\npublic Boolean getAttribute(String name, Boolean defaultValue) {\nString v = getAttribute(name);\n- return v != null ? Boolean.parseBoolean(v) : defaultValue;\n+ return v != null ? Boolean.valueOf(v) : defaultValue;\n}\npublic Map<String, String> getAttributes() {\n"
},
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/changes/SessionEntityWrapper.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/models/sessions/infinispan/changes/SessionEntityWrapper.java",
"diff": "@@ -112,7 +112,7 @@ public class SessionEntityWrapper<S extends SessionEntity> {\npublic Integer getLocalMetadataNoteInt(String key) {\nString note = getLocalMetadataNote(key);\n- return note==null ? null : Integer.parseInt(note);\n+ return note==null ? null : Integer.valueOf(note);\n}\npublic void putLocalMetadataNoteInt(String key, int value) {\n"
},
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/test/java/org/keycloak/cluster/infinispan/ConcurrencyJDGCachePutTest.java",
"new_path": "model/infinispan/src/test/java/org/keycloak/cluster/infinispan/ConcurrencyJDGCachePutTest.java",
"diff": "@@ -165,7 +165,7 @@ public class ConcurrencyJDGCachePutTest {\n}\npublic static int getClusterStartupTime(Cache<String, Integer> cache, String cacheKey, EntryInfo wrapper, int myThreadId) {\n- Integer startupTime = myThreadId==1 ? Integer.parseInt(cacheKey.substring(4)) : Integer.parseInt(cacheKey.substring(4)) * 2;\n+ Integer startupTime = myThreadId==1 ? Integer.valueOf(cacheKey.substring(4)) : Integer.valueOf(cacheKey.substring(4)) * 2;\n// Concurrency doesn't work correctly with this\n//Integer existingClusterStartTime = (Integer) cache.putIfAbsent(cacheKey, startupTime);\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/component/ComponentModelScope.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/component/ComponentModelScope.java",
"diff": "@@ -84,7 +84,7 @@ public class ComponentModelScope implements Scope {\n@Override\npublic Integer getInt(String key, Integer defaultValue) {\nfinal String res = componentConfig.get(prefix + key, null);\n- return (res == null) ? origScope.getInt(key, defaultValue) : Integer.parseInt(res);\n+ return (res == null) ? origScope.getInt(key, defaultValue) : Integer.valueOf(res);\n}\n@Override\n@@ -95,7 +95,7 @@ public class ComponentModelScope implements Scope {\n@Override\npublic Long getLong(String key, Long defaultValue) {\nfinal String res = componentConfig.get(prefix + key, null);\n- return (res == null) ? origScope.getLong(key, defaultValue) : Long.parseLong(res);\n+ return (res == null) ? origScope.getLong(key, defaultValue) : Long.valueOf(res);\n}\n@Override\n@@ -106,7 +106,7 @@ public class ComponentModelScope implements Scope {\n@Override\npublic Boolean getBoolean(String key, Boolean defaultValue) {\nfinal String res = componentConfig.get(prefix + key, null);\n- return (res == null) ? origScope.getBoolean(key, defaultValue) : Boolean.parseBoolean(res);\n+ return (res == null) ? origScope.getBoolean(key, defaultValue) : Boolean.valueOf(res);\n}\n@Override\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/policy/DigitsPasswordPolicyProvider.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/policy/DigitsPasswordPolicyProvider.java",
"diff": "@@ -53,7 +53,7 @@ public class DigitsPasswordPolicyProvider implements PasswordPolicyProvider {\n@Override\npublic Object parseConfig(String value) {\n- return value != null ? Integer.parseInt(value) : 1;\n+ return value != null ? Integer.valueOf(value) : Integer.valueOf(1);\n}\n@Override\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/policy/ForceExpiredPasswordPolicyProviderFactory.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/policy/ForceExpiredPasswordPolicyProviderFactory.java",
"diff": "@@ -29,7 +29,7 @@ import org.keycloak.models.UserModel;\n*/\npublic class ForceExpiredPasswordPolicyProviderFactory implements PasswordPolicyProviderFactory, PasswordPolicyProvider {\n- public static final int DEFAULT_VALUE = 365;\n+ public static final Integer DEFAULT_VALUE = 365;\n@Override\npublic PasswordPolicyProvider create(KeycloakSession session) {\n@@ -85,7 +85,7 @@ public class ForceExpiredPasswordPolicyProviderFactory implements PasswordPolicy\n@Override\npublic Object parseConfig(String value) {\n- return value != null ? Integer.parseInt(value) : DEFAULT_VALUE;\n+ return value != null ? Integer.valueOf(value) : DEFAULT_VALUE;\n}\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/component/ComponentModel.java",
"new_path": "server-spi/src/main/java/org/keycloak/component/ComponentModel.java",
"diff": "@@ -91,17 +91,17 @@ public class ComponentModel implements Serializable {\npublic int get(String key, int defaultValue) {\nString s = get(key);\n- return s != null ? Integer.parseInt(s) : defaultValue;\n+ return s != null ? Integer.valueOf(s) : defaultValue;\n}\npublic long get(String key, long defaultValue) {\nString s = get(key);\n- return s != null ? Long.parseLong(s) : defaultValue;\n+ return s != null ? Long.valueOf(s) : defaultValue;\n}\npublic boolean get(String key, boolean defaultValue) {\nString s = get(key);\n- return s != null ? Boolean.parseBoolean(s) : defaultValue;\n+ return s != null ? Boolean.valueOf(s) : defaultValue;\n}\npublic void put(String key, String value) {\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/models/RealmModel.java",
"new_path": "server-spi/src/main/java/org/keycloak/models/RealmModel.java",
"diff": "@@ -143,15 +143,15 @@ public interface RealmModel extends RoleContainerModel {\nString getAttribute(String name);\ndefault Integer getAttribute(String name, Integer defaultValue) {\nString v = getAttribute(name);\n- return v != null ? Integer.parseInt(v) : defaultValue;\n+ return v != null ? Integer.valueOf(v) : defaultValue;\n}\ndefault Long getAttribute(String name, Long defaultValue) {\nString v = getAttribute(name);\n- return v != null ? Long.parseLong(v) : defaultValue;\n+ return v != null ? Long.valueOf(v) : defaultValue;\n}\ndefault Boolean getAttribute(String name, Boolean defaultValue) {\nString v = getAttribute(name);\n- return v != null ? Boolean.parseBoolean(v) : defaultValue;\n+ return v != null ? Boolean.valueOf(v) : defaultValue;\n}\nMap<String, String> getAttributes();\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/policy/PasswordPolicyProvider.java",
"new_path": "server-spi/src/main/java/org/keycloak/policy/PasswordPolicyProvider.java",
"diff": "@@ -35,7 +35,7 @@ public interface PasswordPolicyProvider extends Provider {\ndefault Integer parseInteger(String value, Integer defaultValue) {\ntry {\n- return value != null ? Integer.parseInt(value) : defaultValue;\n+ return value != null ? Integer.valueOf(value) : defaultValue;\n} catch (NumberFormatException e) {\nthrow new PasswordPolicyConfigException(\"Not a valid number\");\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/request/AuthzEndpointQueryStringParser.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/request/AuthzEndpointQueryStringParser.java",
"diff": "@@ -46,7 +46,7 @@ class AuthzEndpointQueryStringParser extends AuthzEndpointRequestParser {\nprotected Integer getIntParameter(String paramName) {\ncheckDuplicated(requestParams, paramName);\nString paramVal = requestParams.getFirst(paramName);\n- return paramVal==null ? null : Integer.parseInt(paramVal);\n+ return paramVal==null ? null : Integer.valueOf(paramVal);\n}\npublic String getInvalidRequestMessage() {\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/request/AuthzEndpointRequestObjectParser.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/endpoints/request/AuthzEndpointRequestObjectParser.java",
"diff": "@@ -81,7 +81,7 @@ public class AuthzEndpointRequestObjectParser extends AuthzEndpointRequestParser\n@Override\nprotected Integer getIntParameter(String paramName) {\nObject val = this.requestParams.get(paramName);\n- return val==null ? null : Integer.parseInt(getParameter(paramName));\n+ return val==null ? null : Integer.valueOf(getParameter(paramName));\n}\n@Override\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/endpoints/request/BackchannelAuthenticationEndpointRequestBodyParser.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/endpoints/request/BackchannelAuthenticationEndpointRequestBodyParser.java",
"diff": "@@ -46,7 +46,7 @@ class BackchannelAuthenticationEndpointRequestBodyParser extends BackchannelAuth\nprotected Integer getIntParameter(String paramName) {\ncheckDuplicated(requestParams, paramName);\nString paramVal = requestParams.getFirst(paramName);\n- return paramVal==null ? null : Integer.parseInt(paramVal);\n+ return paramVal==null ? null : Integer.valueOf(paramVal);\n}\npublic String getInvalidRequestMessage() {\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/endpoints/request/BackchannelAuthenticationEndpointSignedRequestParser.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/endpoints/request/BackchannelAuthenticationEndpointSignedRequestParser.java",
"diff": "@@ -95,7 +95,7 @@ class BackchannelAuthenticationEndpointSignedRequestParser extends BackchannelAu\n@Override\nprotected Integer getIntParameter(String paramName) {\nObject val = this.requestParams.get(paramName);\n- return val==null ? null : Integer.parseInt(getParameter(paramName));\n+ return val==null ? null : Integer.valueOf(getParameter(paramName));\n}\n@Override\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/par/endpoints/request/AuthzEndpointParParser.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/par/endpoints/request/AuthzEndpointParParser.java",
"diff": "@@ -95,7 +95,7 @@ public class AuthzEndpointParParser extends AuthzEndpointRequestParser {\n@Override\nprotected Integer getIntParameter(String paramName) {\nString paramVal = requestParams.get(paramName);\n- return paramVal == null ? null : Integer.parseInt(paramVal);\n+ return paramVal == null ? null : Integer.valueOf(paramVal);\n}\npublic String getInvalidRequestMessage() {\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/util/JsonConfigProvider.java",
"new_path": "services/src/main/java/org/keycloak/services/util/JsonConfigProvider.java",
"diff": "@@ -129,7 +129,7 @@ public class JsonConfigProvider implements Config.ConfigProvider {\n}\nif (n.isTextual()) {\nString v = replaceProperties(n.textValue());\n- return !v.isEmpty() ? Integer.parseInt(v) : defaultValue;\n+ return !v.isEmpty() ? Integer.valueOf(v) : defaultValue;\n} else {\nreturn n.intValue();\n}\n@@ -151,7 +151,7 @@ public class JsonConfigProvider implements Config.ConfigProvider {\n}\nif (n.isTextual()) {\nString v = replaceProperties(n.textValue());\n- return !v.isEmpty() ? Long.parseLong(v) : defaultValue;\n+ return !v.isEmpty() ? Long.valueOf(v) : defaultValue;\n} else {\nreturn n.longValue();\n}\n@@ -173,7 +173,7 @@ public class JsonConfigProvider implements Config.ConfigProvider {\n}\nif (n.isTextual()) {\nString v = replaceProperties(n.textValue());\n- return !v.isEmpty() ? Boolean.parseBoolean(v) : defaultValue;\n+ return !v.isEmpty() ? Boolean.valueOf(v) : defaultValue;\n} else {\nreturn n.booleanValue();\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | When ternary conditional operator uses primitive type it could throw NPE in some cases
Closes #9137 |
339,281 | 14.12.2021 17:59:50 | -3,600 | 848b170a962457d27aeafcc9f37048b7cbba0a6e | Use DeepCloner.Builder().constructorDC in cases when possible
Closes | [
{
"change_type": "MODIFY",
"old_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/HotRodMapStorageProviderFactory.java",
"new_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/HotRodMapStorageProviderFactory.java",
"diff": "@@ -51,7 +51,7 @@ public class HotRodMapStorageProviderFactory implements AmphibianProviderFactory\nprivate final static DeepCloner CLONER = new DeepCloner.Builder()\n.constructorDC(MapClientEntity.class, HotRodClientEntityDelegate::new)\n.constructor(MapProtocolMapperEntity.class, HotRodProtocolMapperEntityDelegate::new)\n- .constructor(MapGroupEntity.class, HotRodGroupEntityDelegate::new)\n+ .constructorDC(MapGroupEntity.class, HotRodGroupEntityDelegate::new)\n.build();\npublic static final Map<Class<?>, HotRodEntityDescriptor<?, ?>> ENTITY_DESCRIPTOR_MAP = new HashMap<>();\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorageProviderFactory.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorageProviderFactory.java",
"diff": "@@ -82,8 +82,8 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide\n.genericCloner(Serialization::from)\n.constructorDC(MapClientEntityImpl.class, MapClientEntityImpl::new)\n.constructor(MapProtocolMapperEntity.class, MapProtocolMapperEntityImpl::new)\n- .constructor(MapGroupEntityImpl.class, MapGroupEntityImpl::new)\n- .constructor(MapRoleEntityImpl.class, MapRoleEntityImpl::new)\n+ .constructorDC(MapGroupEntityImpl.class, MapGroupEntityImpl::new)\n+ .constructorDC(MapRoleEntityImpl.class, MapRoleEntityImpl::new)\n.build();\nprivate static final Map<String, StringKeyConvertor> KEY_CONVERTORS = new HashMap<>();\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Use DeepCloner.Builder().constructorDC in cases when possible
Closes #9141 |
339,281 | 14.12.2021 17:23:07 | -3,600 | b4d720d6152b52417645d5a4a0e176ec3584d49c | Fix DB Migration Script to 13.0.0
Closes | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/custom/JpaUpdate13_0_0_MigrateDefaultRoles.java",
"new_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/custom/JpaUpdate13_0_0_MigrateDefaultRoles.java",
"diff": "@@ -48,26 +48,26 @@ public class JpaUpdate13_0_0_MigrateDefaultRoles extends CustomKeycloakTask {\n// create new default role\nnew InsertStatement(null, null, database.correctObjectName(\"KEYCLOAK_ROLE\", Table.class))\n.addColumnValue(\"ID\", id)\n- .addColumnValue(\"CLIENT_REALM_CONSTRAINT\", entry.getValue())\n+ .addColumnValue(\"CLIENT_REALM_CONSTRAINT\", entry.getKey())\n.addColumnValue(\"CLIENT_ROLE\", Boolean.FALSE)\n.addColumnValue(\"DESCRIPTION\", \"${role_\" + roleName + \"}\")\n.addColumnValue(\"NAME\", roleName)\n- .addColumnValue(\"REALM_ID\", entry.getValue())\n- .addColumnValue(\"REALM\", entry.getValue())\n+ .addColumnValue(\"REALM_ID\", entry.getKey())\n+ .addColumnValue(\"REALM\", entry.getKey())\n);\nstatements.add(\n// assign the role to the realm\nnew UpdateStatement(null, null, database.correctObjectName(\"REALM\", Table.class))\n.addNewColumnValue(\"DEFAULT_ROLE\", id)\n.setWhereClause(\"REALM.ID=?\")\n- .addWhereParameter(entry.getValue())\n+ .addWhereParameter(entry.getKey())\n);\nstatements.add(\n// copy data from REALM_DEFAULT_ROLES to COMPOSITE_ROLE\nnew RawSqlStatement(\"INSERT INTO \" + compositeRoleTable + \" (COMPOSITE, CHILD_ROLE) \" +\n\"SELECT '\" + id + \"', ROLE_ID FROM \" + getTableName(\"REALM_DEFAULT_ROLES\") +\n- \" WHERE REALM_ID = '\" + database.escapeStringForDatabase(entry.getValue()) + \"'\")\n+ \" WHERE REALM_ID = '\" + database.escapeStringForDatabase(entry.getKey()) + \"'\")\n);\nstatements.add(\n// copy data from CLIENT_DEFAULT_ROLES to COMPOSITE_ROLE\n@@ -75,7 +75,7 @@ public class JpaUpdate13_0_0_MigrateDefaultRoles extends CustomKeycloakTask {\n\"SELECT '\" + id + \"', \" + clientDefaultRolesTable + \".ROLE_ID FROM \" +\nclientDefaultRolesTable + \" INNER JOIN \" + clientTable + \" ON \" +\nclientTable + \".ID = \" + clientDefaultRolesTable + \".CLIENT_ID AND \" +\n- clientTable + \".REALM_ID = '\" + database.escapeStringForDatabase(entry.getValue()) + \"'\")\n+ clientTable + \".REALM_ID = '\" + database.escapeStringForDatabase(entry.getKey()) + \"'\")\n);\n}\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Fix DB Migration Script to 13.0.0
Closes #9138 |
339,179 | 15.12.2021 11:43:40 | -3,600 | 5f0b65e85476e414bf3b39d8a730c88fb571ea65 | Fix Cross DC test failures caused by Keycloak not increasing failure counter for blocked users
Closes | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/crossdc/BruteForceCrossDCTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/crossdc/BruteForceCrossDCTest.java",
"diff": "@@ -91,6 +91,8 @@ public class BruteForceCrossDCTest extends AbstractAdminCrossDCTest {\n.bruteForceProtected(true)\n.build();\n+ realmRep.setQuickLoginCheckMilliSeconds(0L); // This is necessary so user is not locked out for too fast consecutive login attempts; when user is locked out failure count stops increasing\n+\nadminClient.realms().create(realmRep);\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/crossdc/SessionsPreloadCrossDCTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/crossdc/SessionsPreloadCrossDCTest.java",
"diff": "@@ -30,6 +30,7 @@ import org.keycloak.testsuite.Assert;\nimport org.keycloak.testsuite.admin.ApiUtil;\nimport org.keycloak.testsuite.arquillian.CrossDCTestEnricher;\nimport org.keycloak.testsuite.arquillian.annotation.InitialDcState;\n+import org.keycloak.testsuite.updaters.RealmAttributeUpdater;\nimport org.keycloak.testsuite.util.OAuthClient;\nimport java.util.Set;\nimport org.hamcrest.Matchers;\n@@ -142,10 +143,11 @@ public class SessionsPreloadCrossDCTest extends AbstractAdminCrossDCTest {\n@Test\npublic void loginFailuresPreloadTest() throws Exception {\n// Enable brute force protector\n- RealmRepresentation realmRep = getAdminClientForStartedNodeInDc(0).realms().realm(\"test\").toRepresentation();\n- realmRep.setBruteForceProtected(true);\n- getAdminClientForStartedNodeInDc(0).realms().realm(\"test\").update(realmRep);\n-\n+ try (RealmAttributeUpdater rau = new RealmAttributeUpdater(getAdminClientForStartedNodeInDc(0).realms().realm(\"test\"))\n+ .updateWith(r -> r.setBruteForceProtected(true))\n+ .updateWith(r -> r.setQuickLoginCheckMilliSeconds(20L)) // This is necessary so user is not locked out for too fast consecutive login attempts; when user is locked out failure count stops increasing\n+ .update()\n+ ) {\nString userId = ApiUtil.findUserByUsername(getAdminClientForStartedNodeInDc(0).realms().realm(\"test\"), \"test-user@localhost\").getId();\nint loginFailuresBefore = (Integer) getAdminClientForStartedNodeInDc(0).realm(\"test\").attackDetection().bruteForceUserStatus(userId).get(\"numFailures\");\n@@ -176,11 +178,7 @@ public class SessionsPreloadCrossDCTest extends AbstractAdminCrossDCTest {\n// On DC2 sessions were preloaded from remoteCache\nAssert.assertTrue(getTestingClientForStartedNodeInDc(1).testing().cache(InfinispanConnectionProvider.WORK_CACHE_NAME).contains(\"distributed::remoteCacheLoad::loginFailures\"));\n-\n- // Disable brute force protector\n- realmRep = getAdminClientForStartedNodeInDc(0).realms().realm(\"test\").toRepresentation();\n- realmRep.setBruteForceProtected(true);\n- getAdminClientForStartedNodeInDc(0).realms().realm(\"test\").update(realmRep);\n+ }\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Fix Cross DC test failures caused by Keycloak not increasing failure counter for blocked users
Closes #9157 |
339,281 | 14.12.2021 12:38:33 | -3,600 | 44184ab0cbdea09aca14e718b5334a797855c0f0 | MapRoleProvider uses ILIKE operator when EQ operator should be used
Closes | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleProvider.java",
"diff": "@@ -200,7 +200,7 @@ public class MapRoleProvider implements RoleProvider {\nDefaultModelCriteria<RoleModel> mcb = criteria();\nmcb = mcb.compare(SearchableFields.REALM_ID, Operator.EQ, realm.getId())\n- .compare(SearchableFields.NAME, Operator.ILIKE, name);\n+ .compare(SearchableFields.NAME, Operator.EQ, name);\nString roleId = tx.read(withCriteria(mcb))\n.map(entityToAdapterFunc(realm))\n@@ -221,7 +221,7 @@ public class MapRoleProvider implements RoleProvider {\nDefaultModelCriteria<RoleModel> mcb = criteria();\nmcb = mcb.compare(SearchableFields.REALM_ID, Operator.EQ, client.getRealm().getId())\n.compare(SearchableFields.CLIENT_ID, Operator.EQ, client.getId())\n- .compare(SearchableFields.NAME, Operator.ILIKE, name);\n+ .compare(SearchableFields.NAME, Operator.EQ, name);\nString roleId = tx.read(withCriteria(mcb))\n.map(entityToAdapterFunc(client.getRealm()))\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | MapRoleProvider uses ILIKE operator when EQ operator should be used
Closes #9130 |
339,618 | 16.12.2021 13:49:06 | -3,600 | 68271ba486b70272cb3fc1e4a60309bee63cea0c | Solves Issue Update to 2.5.3 and small typo fix | [
{
"change_type": "MODIFY",
"old_path": "pom.xml",
"new_path": "pom.xml",
"diff": "<packaging>pom</packaging>\n<properties>\n- <quarkus.version>2.5.2.Final</quarkus.version>\n+ <quarkus.version>2.5.3.Final</quarkus.version>\n<!--\nPerforming a Wildfly upgrade? Run the:\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/command/Tools.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/command/Tools.java",
"diff": "@@ -20,7 +20,7 @@ package org.keycloak.quarkus.runtime.cli.command;\nimport picocli.CommandLine.Command;\n@Command(name = \"tools\",\n- description = \"%nUtilities for use and interaction with the server.\",\n+ description = \"Utilities for use and interaction with the server.\",\nsubcommands = {Completion.class})\npublic class Tools {\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/tests/integration/src/main/java/org/keycloak/it/junit5/extension/CLIResult.java",
"new_path": "quarkus/tests/integration/src/main/java/org/keycloak/it/junit5/extension/CLIResult.java",
"diff": "@@ -53,12 +53,12 @@ public interface CLIResult extends LaunchResult {\ndefault void assertNotDevMode() {\nassertFalse(getOutput().contains(\"Running the server in dev mode.\"),\n- () -> \"The standard output:\\n\" + getOutput() + \"does include the Start Dev output\");\n+ () -> \"The standard output:\\n\" + getOutput() + \"\\ndoes include the Start Dev output\");\n}\ndefault void assertStartedDevMode() {\nassertTrue(getOutput().contains(\"Running the server in dev mode.\"),\n- () -> \"The standard output:\\n\" + getOutput() + \"doesn't include the Start Dev output\");\n+ () -> \"The standard output:\\n\" + getOutput() + \"\\ndoesn't include the Start Dev output\");\n}\ndefault void assertError(String msg) {\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testDefaultToHelp.approved.txt",
"new_path": "quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testDefaultToHelp.approved.txt",
"diff": "Binary files a/quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testDefaultToHelp.approved.txt and b/quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testDefaultToHelp.approved.txt differ\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testHelp.approved.txt",
"new_path": "quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testHelp.approved.txt",
"diff": "Binary files a/quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testHelp.approved.txt and b/quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testHelp.approved.txt differ\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testHelpShort.approved.txt",
"new_path": "quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testHelpShort.approved.txt",
"diff": "Binary files a/quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testHelpShort.approved.txt and b/quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testHelpShort.approved.txt differ\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Solves Issue [#9186] Update to 2.5.3 and small typo fix |
339,579 | 16.12.2021 12:22:09 | -3,600 | b03269440cd55861339197e98bfaa7bdf2ef39fa | add JAVA_OPTS_APPEND option from legacy to X (resolves | [
{
"change_type": "MODIFY",
"old_path": "distribution/server-x-dist/src/main/content/bin/kc.bat",
"new_path": "distribution/server-x-dist/src/main/content/bin/kc.bat",
"diff": "@@ -72,6 +72,11 @@ if not \"x%JAVA_OPTS%\" == \"x\" (\nset \"JAVA_OPTS=-Xms64m -Xmx512m -XX:MetaspaceSize=96M -XX:MaxMetaspaceSize=256m -Djava.net.preferIPv4Stack=true\"\n)\n+if not \"x%JAVA_OPTS_APPEND%\" == \"x\" (\n+ echo \"Appending additional Java properties to JAVA_OPTS: %JAVA_OPTS_APPEND%\"\n+ set \"JAVA_OPTS=%JAVA_OPTS% %JAVA_OPTS_APPEND%\"\n+)\n+\nif NOT \"x%DEBUG%\" == \"x\" (\nset \"DEBUG_MODE=%DEBUG%\n)\n"
},
{
"change_type": "MODIFY",
"old_path": "distribution/server-x-dist/src/main/content/bin/kc.sh",
"new_path": "distribution/server-x-dist/src/main/content/bin/kc.sh",
"diff": "@@ -68,6 +68,11 @@ else\necho \"JAVA_OPTS already set in environment; overriding default settings with values: $JAVA_OPTS\"\nfi\n+if [ \"x$JAVA_OPTS_APPEND\" != \"x\" ]; then\n+ echo \"Appending additional Java properties to JAVA_OPTS: $JAVA_OPTS_APPEND\"\n+ JAVA_OPTS=\"$JAVA_OPTS $JAVA_OPTS_APPEND\"\n+fi\n+\n# Set debug settings if not already set\nif [ \"$DEBUG_MODE\" = \"true\" ]; then\nDEBUG_OPT=`echo $JAVA_OPTS | $GREP \"\\-agentlib:jdwp\"`\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | add JAVA_OPTS_APPEND option from legacy to X (resolves #9188) |
339,179 | 17.12.2021 13:53:00 | -3,600 | 30cef7aa68d1e3d24b69c7d971e73387c34dc5fd | Fix app-server addHttpListener failure | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/AppServerTestEnricher.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/AppServerTestEnricher.java",
"diff": "@@ -58,7 +58,7 @@ import java.util.Set;\nimport java.util.concurrent.TimeoutException;\nimport java.util.stream.Collectors;\n-import static org.keycloak.testsuite.arquillian.ServerTestEnricherUtil.addHttpsListener;\n+import static org.keycloak.testsuite.arquillian.ServerTestEnricherUtil.addHttpsListenerAppServer;\nimport static org.keycloak.testsuite.arquillian.ServerTestEnricherUtil.reloadOrRestartTimeoutClient;\nimport static org.keycloak.testsuite.arquillian.ServerTestEnricherUtil.removeHttpsListener;\nimport static org.keycloak.testsuite.util.ServerURLs.getAppServerContextRoot;\n@@ -250,7 +250,7 @@ public class AppServerTestEnricher {\n}\n} else {\nremoveHttpsListener(client, administration);\n- addHttpsListener(client);\n+ addHttpsListenerAppServer(client);\n}\nreloadOrRestartTimeoutClient(administration);\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/ServerTestEnricherUtil.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/ServerTestEnricherUtil.java",
"diff": "package org.keycloak.testsuite.arquillian;\nimport org.jboss.logging.Logger;\n+import org.wildfly.extras.creaper.commands.undertow.AddUndertowListener;\nimport org.wildfly.extras.creaper.commands.undertow.RemoveUndertowListener;\n+import org.wildfly.extras.creaper.commands.undertow.SslVerifyClient;\nimport org.wildfly.extras.creaper.commands.undertow.UndertowListenerType;\nimport org.wildfly.extras.creaper.core.CommandFailedException;\nimport org.wildfly.extras.creaper.core.online.OnlineManagementClient;\n@@ -60,6 +62,23 @@ public class ServerTestEnricherUtil {\n}\n}\n+ /**\n+ * Add Undertow HTTPS listener for Wildfly 23\n+ */\n+ public static boolean addHttpsListenerAppServer(OnlineManagementClient client) {\n+ try {\n+ LOG.debug(\"Add Undertow HTTPS listener 'https'\");\n+ client.apply(new AddUndertowListener.HttpsBuilder(\"https\", \"default-server\", \"https\")\n+ .securityRealm(\"UndertowRealm\")\n+ .verifyClient(SslVerifyClient.REQUESTED)\n+ .build());\n+ return true;\n+ } catch (CommandFailedException e) {\n+ LOG.warn(\"Cannot add HTTPS listener 'https'\");\n+ return false;\n+ }\n+ }\n+\n/**\n* Restart client after timeout for reloading\n*/\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Fix app-server addHttpListener failure |
339,235 | 20.12.2021 10:51:15 | -3,600 | c6e1ab2d5652fce5b1d7f8b87305c6d9046f9a13 | Bump PAT used for admin-ui | [
{
"change_type": "MODIFY",
"old_path": "themes/pom.xml",
"new_path": "themes/pom.xml",
"diff": "<repository>\n<id>github</id>\n<!-- Do not decode the PAT below, as it will force Github to revoke it. -->\n- <url>https://keycloak-packages:g[email protected]/keycloak/keycloak-admin-ui</url>\n+ <url>https://keycloak-packages:g[email protected]/keycloak/keycloak-admin-ui</url>\n<releases>\n<enabled>false</enabled>\n</releases>\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Bump PAT used for admin-ui |
339,281 | 15.12.2021 14:28:03 | -3,600 | 009ca27a387146ac24e0f82a8e2919af5fe026b4 | Make JsonbType generic
Closes | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "model/map-jpa/src/main/java/org/keycloak/models/map/storage/jpa/hibernate/jsonb/JpaEntityMigration.java",
"diff": "+/*\n+ * Copyright 2021 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+package org.keycloak.models.map.storage.jpa.hibernate.jsonb;\n+\n+import com.fasterxml.jackson.databind.node.ObjectNode;\n+import java.util.HashMap;\n+import java.util.List;\n+import java.util.Map;\n+import java.util.function.BiFunction;\n+import java.util.function.Function;\n+import org.keycloak.models.map.storage.jpa.client.JpaClientMapStorage;\n+import org.keycloak.models.map.storage.jpa.client.entity.JpaClientMetadata;\n+import org.keycloak.models.map.storage.jpa.hibernate.jsonb.migration.JpaClientMigration;\n+\n+public class JpaEntityMigration {\n+\n+ static final Map<Class<?>, BiFunction<ObjectNode, Integer, ObjectNode>> MIGRATIONS = new HashMap<>();\n+ static {\n+ MIGRATIONS.put(JpaClientMetadata.class, (tree, entityVersion) -> migrateTreeTo(entityVersion, JpaClientMapStorage.SUPPORTED_VERSION, tree, JpaClientMigration.MIGRATORS));\n+ }\n+\n+ private static ObjectNode migrateTreeTo(int entityVersion, Integer supportedVersion, ObjectNode node, List<Function<ObjectNode, ObjectNode>> migrators) {\n+ if (entityVersion > supportedVersion + 1) throw new IllegalArgumentException(\"Incompatible entity version: \" + entityVersion + \", supportedVersion: \" + supportedVersion);\n+\n+ if (entityVersion < supportedVersion) {\n+ while (entityVersion < supportedVersion) {\n+ Function<ObjectNode, ObjectNode> migrator = migrators.get(entityVersion);\n+ if (migrator != null) {\n+ node = migrator.apply(node);\n+ }\n+ entityVersion++;\n+ }\n+ }\n+ return node;\n+ }\n+\n+}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map-jpa/src/main/java/org/keycloak/models/map/storage/jpa/hibernate/jsonb/JsonbType.java",
"new_path": "model/map-jpa/src/main/java/org/keycloak/models/map/storage/jpa/hibernate/jsonb/JsonbType.java",
"diff": "@@ -36,6 +36,7 @@ import java.sql.Types;\nimport java.util.List;\nimport java.util.Map;\nimport java.util.Objects;\n+import java.util.Properties;\nimport org.hibernate.HibernateException;\nimport org.hibernate.type.AbstractSingleColumnStandardBasicType;\nimport org.hibernate.type.descriptor.ValueBinder;\n@@ -47,17 +48,17 @@ import org.hibernate.type.descriptor.java.MutableMutabilityPlan;\nimport org.hibernate.type.descriptor.sql.BasicBinder;\nimport org.hibernate.type.descriptor.sql.BasicExtractor;\nimport org.hibernate.type.descriptor.sql.SqlTypeDescriptor;\n-import org.keycloak.models.map.client.MapClientEntity;\n+import org.hibernate.usertype.DynamicParameterizedType;\nimport org.keycloak.models.map.client.MapProtocolMapperEntity;\nimport org.keycloak.models.map.client.MapProtocolMapperEntityImpl;\nimport org.keycloak.models.map.common.DeepCloner;\n+import org.keycloak.models.map.common.EntityWithAttributes;\nimport org.keycloak.models.map.common.Serialization.IgnoreUpdatedMixIn;\nimport org.keycloak.models.map.common.Serialization.IgnoredTypeMixIn;\nimport org.keycloak.models.map.common.UpdatableEntity;\n-import org.keycloak.models.map.storage.jpa.client.entity.JpaClientMetadata;\n-import org.keycloak.models.map.storage.jpa.client.JpaClientMapStorage;\n+import static org.keycloak.models.map.storage.jpa.hibernate.jsonb.JpaEntityMigration.MIGRATIONS;\n-public class JsonbType extends AbstractSingleColumnStandardBasicType<Object> {\n+public class JsonbType extends AbstractSingleColumnStandardBasicType<Object> implements DynamicParameterizedType {\npublic static final JsonbType INSTANCE = new JsonbType();\npublic static final ObjectMapper MAPPER = new ObjectMapper()\n@@ -70,15 +71,20 @@ public class JsonbType extends AbstractSingleColumnStandardBasicType<Object> {\n.registerModule(new SimpleModule().addAbstractTypeMapping(MapProtocolMapperEntity.class, MapProtocolMapperEntityImpl.class))\n.addMixIn(UpdatableEntity.class, IgnoreUpdatedMixIn.class)\n.addMixIn(DeepCloner.class, IgnoredTypeMixIn.class)\n- .addMixIn(MapClientEntity.class, IgnoredClientFieldsMixIn.class);\n+ .addMixIn(EntityWithAttributes.class, IgnoredMetadataFieldsMixIn.class);\n- abstract class IgnoredClientFieldsMixIn {\n+ abstract class IgnoredMetadataFieldsMixIn {\n@JsonIgnore public abstract String getId();\n@JsonIgnore public abstract Map<String, List<String>> getAttributes();\n}\npublic JsonbType() {\n- super(JsonbSqlTypeDescriptor.INSTANCE, JsonbJavaTypeDescriptor.INSTANCE);\n+ super(JsonbSqlTypeDescriptor.INSTANCE, new JsonbJavaTypeDescriptor());\n+ }\n+\n+ @Override\n+ public void setParameterValues(Properties parameters) {\n+ ((JsonbJavaTypeDescriptor) getJavaTypeDescriptor()).setParameterValues(parameters);\n}\n@Override\n@@ -148,9 +154,14 @@ public class JsonbType extends AbstractSingleColumnStandardBasicType<Object> {\n}\n}\n- private static class JsonbJavaTypeDescriptor extends AbstractTypeDescriptor<Object> {\n+ private static class JsonbJavaTypeDescriptor extends AbstractTypeDescriptor<Object> implements DynamicParameterizedType {\n- private static final JsonbJavaTypeDescriptor INSTANCE = new JsonbJavaTypeDescriptor();\n+ private Class valueType;\n+\n+ @Override\n+ public void setParameterValues(Properties parameters) {\n+ valueType = ((ParameterType) parameters.get(PARAMETER_TYPE)).getReturnedClass();\n+ }\npublic JsonbJavaTypeDescriptor() {\nsuper(Object.class, new MutableMutabilityPlan<Object>() {\n@@ -166,26 +177,29 @@ public class JsonbType extends AbstractSingleColumnStandardBasicType<Object> {\n}\n@Override\n+ @SuppressWarnings(\"unchecked\")\npublic Object fromString(String json) {\ntry {\nObjectNode tree = MAPPER.readValue(json, ObjectNode.class);\nJsonNode ev = tree.get(\"entityVersion\");\nif (ev == null || ! ev.isInt()) throw new IllegalArgumentException(\"unable to read entity version from \" + json);\n- int entityVersion = ev.asInt();\n+ Integer entityVersion = ev.asInt();\n- if (entityVersion > JpaClientMapStorage.SUPPORTED_VERSION + 1) throw new IllegalArgumentException(\"Incompatible entity version: \" + entityVersion + \", supportedVersion: \" + JpaClientMapStorage.SUPPORTED_VERSION);\n+ tree = migrate(tree, entityVersion);\n- if (entityVersion < JpaClientMapStorage.SUPPORTED_VERSION) {\n- tree = JpaClientMigration.migrateTreeTo(entityVersion, JpaClientMapStorage.SUPPORTED_VERSION, tree);\n- }\n- return MAPPER.treeToValue(tree, JpaClientMetadata.class);\n+ return MAPPER.treeToValue(tree, valueType);\n} catch (IOException e) {\nthrow new HibernateException(\"unable to read\", e);\n}\n}\n+ private ObjectNode migrate(ObjectNode tree, Integer entityVersion) {\n+ return MIGRATIONS.getOrDefault(valueType, (node, version) -> node).apply(tree, entityVersion);\n+ }\n+\n@Override\n+ @SuppressWarnings(\"unchecked\")\npublic <X> X unwrap(Object value, Class<X> type, WrapperOptions options) {\nif (value == null) return null;\n"
},
{
"change_type": "RENAME",
"old_path": "model/map-jpa/src/main/java/org/keycloak/models/map/storage/jpa/hibernate/jsonb/JpaClientMigration.java",
"new_path": "model/map-jpa/src/main/java/org/keycloak/models/map/storage/jpa/hibernate/jsonb/migration/JpaClientMigration.java",
"diff": "* See the License for the specific language governing permissions and\n* limitations under the License.\n*/\n-package org.keycloak.models.map.storage.jpa.hibernate.jsonb;\n+package org.keycloak.models.map.storage.jpa.hibernate.jsonb.migration;\nimport com.fasterxml.jackson.databind.node.ObjectNode;\nimport java.util.Arrays;\n@@ -23,19 +23,7 @@ import java.util.function.Function;\npublic class JpaClientMigration {\n- private static final List<Function<ObjectNode, ObjectNode>> MIGRATORS = Arrays.asList(\n+ public static final List<Function<ObjectNode, ObjectNode>> MIGRATORS = Arrays.asList(\no -> o // no migration yet\n);\n-\n- public static ObjectNode migrateTreeTo(int currentVersion, int targetVersion, ObjectNode node) {\n- while (currentVersion < targetVersion) {\n- Function<ObjectNode, ObjectNode> migrator = MIGRATORS.get(currentVersion);\n- if (migrator != null) {\n- node = migrator.apply(node);\n- }\n- currentVersion++;\n- }\n- return node;\n- }\n-\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Make JsonbType generic
Closes #9165 |
339,672 | 23.11.2021 14:37:43 | 18,000 | f201760a4abd1913f1a0caf09445f56fe0e422c1 | Fixed "does not exists" language | [
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/KcOidcFirstBrokerLoginDetectExistingUserTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/KcOidcFirstBrokerLoginDetectExistingUserTest.java",
"diff": "@@ -107,7 +107,7 @@ public class KcOidcFirstBrokerLoginDetectExistingUserTest extends AbstractInitia\nloginPage.assertCurrent(bc.consumerRealmName());\n- assertEquals(\"User \" + username + \" authenticated with identity provider \" + bc.getIDPAlias() + \" does not exists. Please contact your administrator.\", loginPage.getInstruction());\n+ assertEquals(\"User \" + username + \" authenticated with identity provider \" + bc.getIDPAlias() + \" does not exist. Please contact your administrator.\", loginPage.getInstruction());\n}\n@Test\n"
},
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/login/messages/messages_en.properties",
"new_path": "themes/src/main/resources/theme/base/login/messages/messages_en.properties",
"diff": "@@ -243,7 +243,7 @@ usernameExistsMessage=Username already exists.\nemailExistsMessage=Email already exists.\nfederatedIdentityExistsMessage=User with {0} {1} already exists. Please login to account management to link the account.\n-federatedIdentityUnavailableMessage=User {0} authenticated with identity provider {1} does not exists. Please contact your administrator.\n+federatedIdentityUnavailableMessage=User {0} authenticated with identity provider {1} does not exist. Please contact your administrator.\nconfirmLinkIdpTitle=Account already exists\nfederatedIdentityConfirmLinkMessage=User with {0} {1} already exists. How do you want to continue?\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Fixed #8892 "does not exists" language |
339,179 | 20.12.2021 16:04:56 | -3,600 | 96b2669a00dc1396138f863bbc11aa0b0aa3f0b6 | Refactoring of constructors for generated entities | [
{
"change_type": "MODIFY",
"old_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/AbstractGenerateEntityImplementationsProcessor.java",
"new_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/AbstractGenerateEntityImplementationsProcessor.java",
"diff": "@@ -50,6 +50,7 @@ import javax.lang.model.SourceVersion;\nimport static org.keycloak.models.map.processor.FieldAccessorType.GETTER;\nimport static org.keycloak.models.map.processor.Util.getGenericsDeclaration;\nimport static org.keycloak.models.map.processor.Util.isMapType;\n+import static org.keycloak.models.map.processor.Util.singularToPlural;\n@SupportedSourceVersion(SourceVersion.RELEASE_8)\npublic abstract class AbstractGenerateEntityImplementationsProcessor extends AbstractProcessor {\n@@ -123,11 +124,11 @@ public abstract class AbstractGenerateEntityImplementationsProcessor extends Abs\n// Merge plurals with singulars\nmethodsPerAttribute.keySet().stream()\n- .filter(key -> methodsPerAttribute.containsKey(key + \"s\"))\n+ .filter(key -> methodsPerAttribute.containsKey(singularToPlural(key)))\n.collect(Collectors.toSet())\n.forEach(key -> {\nHashSet<ExecutableElement> removed = methodsPerAttribute.remove(key);\n- methodsPerAttribute.get(key + \"s\").addAll(removed);\n+ methodsPerAttribute.get(singularToPlural(key)).addAll(removed);\n});\nreturn methodsPerAttribute;\n"
},
{
"change_type": "MODIFY",
"old_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/FieldAccessorType.java",
"new_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/FieldAccessorType.java",
"diff": "@@ -26,6 +26,7 @@ import javax.lang.model.element.Name;\nimport javax.lang.model.type.TypeMirror;\nimport javax.lang.model.util.Types;\nimport static org.keycloak.models.map.processor.Util.getGenericsDeclaration;\n+import static org.keycloak.models.map.processor.Util.pluralToSingular;\n/**\n*\n@@ -52,7 +53,7 @@ enum FieldAccessorType {\nCOLLECTION_ADD {\n@Override\npublic boolean is(ExecutableElement method, String fieldName, Types types, TypeMirror fieldType) {\n- String fieldNameSingular = fieldName.endsWith(\"s\") ? fieldName.substring(0, fieldName.length() - 1) : fieldName;\n+ String fieldNameSingular = pluralToSingular(fieldName);\nString methodName = \"add\" + fieldNameSingular;\nList<TypeMirror> res = getGenericsDeclaration(fieldType);\nreturn Objects.equals(methodName, method.getSimpleName().toString())\n@@ -63,7 +64,7 @@ enum FieldAccessorType {\nCOLLECTION_DELETE {\n@Override\npublic boolean is(ExecutableElement method, String fieldName, Types types, TypeMirror fieldType) {\n- String fieldNameSingular = fieldName.endsWith(\"s\") ? fieldName.substring(0, fieldName.length() - 1) : fieldName;\n+ String fieldNameSingular = pluralToSingular(fieldName);\nString removeFromCollection = \"remove\" + fieldNameSingular;\nList<TypeMirror> res = getGenericsDeclaration(fieldType);\nreturn Objects.equals(removeFromCollection, method.getSimpleName().toString())\n@@ -74,7 +75,7 @@ enum FieldAccessorType {\nMAP_ADD {\n@Override\npublic boolean is(ExecutableElement method, String fieldName, Types types, TypeMirror fieldType) {\n- String fieldNameSingular = fieldName.endsWith(\"s\") ? fieldName.substring(0, fieldName.length() - 1) : fieldName;\n+ String fieldNameSingular = pluralToSingular(fieldName);\nString methodName = \"set\" + fieldNameSingular;\nList<TypeMirror> res = getGenericsDeclaration(fieldType);\nreturn Objects.equals(methodName, method.getSimpleName().toString())\n@@ -86,7 +87,7 @@ enum FieldAccessorType {\nMAP_GET {\n@Override\npublic boolean is(ExecutableElement method, String fieldName, Types types, TypeMirror fieldType) {\n- String fieldNameSingular = fieldName.endsWith(\"s\") ? fieldName.substring(0, fieldName.length() - 1) : fieldName;\n+ String fieldNameSingular = pluralToSingular(fieldName);\nString methodName = \"get\" + fieldNameSingular;\nList<TypeMirror> res = getGenericsDeclaration(fieldType);\nreturn Objects.equals(methodName, method.getSimpleName().toString())\n"
},
{
"change_type": "MODIFY",
"old_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/GenerateEntityImplementationsProcessor.java",
"new_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/GenerateEntityImplementationsProcessor.java",
"diff": "@@ -265,6 +265,7 @@ public class GenerateEntityImplementationsProcessor extends AbstractGenerateEnti\nboolean needsDeepClone = fieldGetters(methodsPerAttribute)\n.map(ExecutableElement::getReturnType)\n.anyMatch(fieldType -> ! isKnownCollectionOfImmutableFinalTypes(fieldType) && ! isImmutableFinalType(fieldType));\n+ boolean usingGeneratedCloner = ! hasDeepClone && needsDeepClone;\nJavaFileObject file = processingEnv.getFiler().createSourceFile(mapImplClassName);\ntry (PrintWriter pw = new PrintWriterNoJavaLang(file.openWriter())) {\n@@ -283,27 +284,25 @@ public class GenerateEntityImplementationsProcessor extends AbstractGenerateEnti\n.map(ExecutableElement.class::cast)\n.filter((ExecutableElement ee) -> ee.getKind() == ElementKind.CONSTRUCTOR)\n.forEach((ExecutableElement ee) -> {\n- if (hasDeepClone || ! needsDeepClone) {\n- pw.println(\" \"\n- + ee.getModifiers().stream().map(Object::toString).collect(Collectors.joining(\" \"))\n- + \" \" + mapSimpleClassName + \"(\" + methodParameters(ee.getParameters()) + \") { super(\" + ee.getParameters() + \"); }\"\n- );\n- } else if (needsDeepClone) {\n+ // Create constructor and initialize cloner to DUMB_CLONER if necessary\n+ if (usingGeneratedCloner) {\npw.println(\" /**\");\npw.println(\" * @deprecated This constructor uses a {@link DeepCloner#DUMB_CLONER} that does not clone anything. Use {@link #\" + mapSimpleClassName + \"(DeepCloner)} variant instead\");\npw.println(\" */\");\n+ }\npw.println(\" \"\n+ ee.getModifiers().stream().map(Object::toString).collect(Collectors.joining(\" \"))\n- + \" \"\n- + mapSimpleClassName + \"(\" + methodParameters(ee.getParameters()) + \") { this(DeepCloner.DUMB_CLONER\" + (ee.getParameters().isEmpty() ? \"\" : \", \") + ee.getParameters() + \"); }\"\n+ + \" \" + mapSimpleClassName + \"(\" + methodParameters(ee.getParameters()) + \") {\"\n);\n+ pw.println(\" super(\" + ee.getParameters() + \");\");\n+ if (usingGeneratedCloner) pw.println(\" this.cloner = DeepCloner.DUMB_CLONER;\");\n+ pw.println(\" }\");\n+ });\n+\npw.println(\" \"\n- + ee.getModifiers().stream().map(Object::toString).collect(Collectors.joining(\" \"))\n- + \" \"\n- + mapSimpleClassName + \"(DeepCloner cloner\" + (ee.getParameters().isEmpty() ? \"\" : \", \") + methodParameters(ee.getParameters()) + \") { super(\" + ee.getParameters() + \"); this.cloner = cloner; }\"\n+ + \"public \"\n+ + mapSimpleClassName + \"(DeepCloner cloner) { super(); \" + (!usingGeneratedCloner ? \"\" : \"this.cloner = cloner;\") + \"}\"\n);\n- }\n- });\n// equals, hashCode, toString\npw.println(\" @Override public boolean equals(Object o) {\");\n@@ -339,7 +338,7 @@ public class GenerateEntityImplementationsProcessor extends AbstractGenerateEnti\npw.println(\" }\");\n// deepClone\n- if (! hasDeepClone && needsDeepClone) {\n+ if (usingGeneratedCloner) {\npw.println(\" private final DeepCloner cloner;\");\npw.println(\" public <V> V deepClone(V obj) {\");\npw.println(\" return cloner.from(obj);\");\n@@ -363,7 +362,7 @@ public class GenerateEntityImplementationsProcessor extends AbstractGenerateEnti\nif (parentMethod.isPresent()) {\nprocessingEnv.getMessager().printMessage(Kind.OTHER, \"Method \" + method + \" is declared in a parent class.\", method);\n- } else if (fat != FieldAccessorType.UNKNOWN && ! printMethodBody(pw, fat, method, \"f\" + me.getKey(), fieldType)) {\n+ } else if (fat == FieldAccessorType.UNKNOWN || ! printMethodBody(pw, fat, method, \"f\" + me.getKey(), fieldType)) {\nprocessingEnv.getMessager().printMessage(Kind.WARNING, \"Could not determine desired semantics of method from its signature\", method);\n}\n}\n@@ -446,10 +445,12 @@ public class GenerateEntityImplementationsProcessor extends AbstractGenerateEnti\npw.println(\" }\");\nreturn true;\ncase COLLECTION_DELETE:\n+ boolean needsReturn = method.getReturnType().getKind() != TypeKind.VOID;\npw.println(\" @SuppressWarnings(\\\"unchecked\\\") @Override public \" + method.getReturnType() + \" \" + method.getSimpleName() + \"(\" + firstParameterType + \" p0) {\");\n- pw.println(\" if (\" + fieldName + \" == null) { return; }\");\n+ pw.println(\" if (\" + fieldName + \" == null) { return\" + (needsReturn ? \" false\" : \"\") + \"; }\");\npw.println(\" boolean removed = \" + fieldName + \".remove(p0)\" + (\"java.util.Map\".equals(typeElement.getQualifiedName().toString()) ? \" != null\" : \"\") + \";\");\npw.println(\" updated |= removed;\");\n+ if (needsReturn) pw.println(\" return removed;\");\npw.println(\" }\");\nreturn true;\ncase MAP_ADD:\n"
},
{
"change_type": "MODIFY",
"old_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/GenerateHotRodEntityImplementationsProcessor.java",
"new_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/GenerateHotRodEntityImplementationsProcessor.java",
"diff": "@@ -104,6 +104,7 @@ public class GenerateHotRodEntityImplementationsProcessor extends AbstractGenera\nboolean needsDeepClone = fieldGetters(methodsPerAttribute)\n.map(ExecutableElement::getReturnType)\n.anyMatch(fieldType -> ! isKnownCollectionOfImmutableFinalTypes(fieldType) && ! isImmutableFinalType(fieldType));\n+ boolean usingGeneratedCloner = ! hasDeepClone && needsDeepClone;\nboolean hasId = methodsPerAttribute.containsKey(\"Id\") || allMembers.stream().anyMatch(el -> \"getId\".equals(el.getSimpleName().toString()));\nJavaFileObject file = processingEnv.getFiler().createSourceFile(hotRodImplClassName);\n@@ -132,45 +133,43 @@ public class GenerateHotRodEntityImplementationsProcessor extends AbstractGenera\n.map(ExecutableElement.class::cast)\n.filter((ExecutableElement ee) -> ee.getKind() == ElementKind.CONSTRUCTOR)\n.forEach((ExecutableElement ee) -> {\n- if (hasDeepClone || ! needsDeepClone) {\n- pw.println(\" \"\n- + ee.getModifiers().stream().map(Object::toString).collect(Collectors.joining(\" \"))\n- + \" \" + hotRodSimpleClassName + \"(\" + methodParameters(ee.getParameters()) + \") {\"\n- );\n- pw.println(\" super(\" + ee.getParameters() + \");\");\n- pw.println(\" this.\" + ENTITY_VARIABLE + \" = new \" + className + \"();\");\n- pw.println(\" }\");\n- } else if (needsDeepClone) {\n+ // Create constructor and initialize cloner to DUMB_CLONER if necessary\n+ if (usingGeneratedCloner) {\npw.println(\" /**\");\npw.println(\" * @deprecated This constructor uses a {@link DeepCloner#DUMB_CLONER} that does not clone anything. Use {@link #\" + hotRodSimpleClassName + \"(DeepCloner)} variant instead\");\npw.println(\" */\");\n+ }\npw.println(\" \"\n+ ee.getModifiers().stream().map(Object::toString).collect(Collectors.joining(\" \"))\n- + \" \"\n- + hotRodSimpleClassName + \"(\" + methodParameters(ee.getParameters()) + \") { this(DeepCloner.DUMB_CLONER\" + (ee.getParameters().isEmpty() ? \"\" : \", \") + ee.getParameters() + \"); }\"\n- );\n- pw.println(\" \"\n- + ee.getModifiers().stream().map(Object::toString).collect(Collectors.joining(\" \"))\n- + \" \"\n- + hotRodSimpleClassName + \"(DeepCloner cloner\" + (ee.getParameters().isEmpty() ? \"\" : \", \") + methodParameters(ee.getParameters()) + \") {\"\n+ + \" \" + hotRodSimpleClassName + \"(\" + methodParameters(ee.getParameters()) + \") {\"\n);\npw.println(\" super(\" + ee.getParameters() + \");\");\n- pw.println(\" this.cloner = cloner;\");\n+ if (usingGeneratedCloner) pw.println(\" this.cloner = DeepCloner.DUMB_CLONER;\");\npw.println(\" this.\" + ENTITY_VARIABLE + \" = new \" + className + \"();\");\npw.println(\" }\");\n- }\n});\n// Add constructor for setting HotRodEntity\n+ if (usingGeneratedCloner) {\n+ pw.println(\" /**\");\n+ pw.println(\" * @deprecated This constructor uses a {@link DeepCloner#DUMB_CLONER} that does not clone anything. Use {@link #\" + hotRodSimpleClassName + \"(DeepCloner)} variant instead\");\n+ pw.println(\" */\");\n+ }\npw.println(\" \" +\n\"public \" + hotRodSimpleClassName + \"(\" + className + \" \" + ENTITY_VARIABLE + \") {\"\n);\npw.println(\" this.\" + ENTITY_VARIABLE + \" = \" + ENTITY_VARIABLE + \";\");\n- if (! hasDeepClone && needsDeepClone) {\n+ if (usingGeneratedCloner) {\npw.println(\" this.cloner = DeepCloner.DUMB_CLONER;\");\n}\npw.println(\" }\");\n+ pw.println(\" public \" + hotRodSimpleClassName + \"(DeepCloner cloner) {\");\n+ pw.println(\" super();\");\n+ pw.println(\" this.\" + ENTITY_VARIABLE + \" = new \" + className + \"();\");\n+ if (usingGeneratedCloner) pw.println(\" this.cloner = cloner;\");\n+ pw.println(\" }\");\n+\n// equals, hashCode, toString\npw.println(\" @Override public boolean equals(Object o) {\");\npw.println(\" if (o == this) return true; \");\n"
},
{
"change_type": "MODIFY",
"old_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/Util.java",
"new_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/Util.java",
"diff": "@@ -99,4 +99,11 @@ public class Util {\n.findAny();\n}\n+ public static String singularToPlural(String word) {\n+ return word.endsWith(\"y\") ? word.substring(0, word.length() -1) + \"ies\" : word + \"s\";\n+ }\n+\n+ public static String pluralToSingular(String word) {\n+ return word.endsWith(\"ies\") ? word.substring(0, word.length() - 3) + \"y\" : word.endsWith(\"s\") ? word.substring(0, word.length() - 1) : word;\n+ }\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/HotRodMapStorageProviderFactory.java",
"new_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/HotRodMapStorageProviderFactory.java",
"diff": "@@ -49,9 +49,9 @@ public class HotRodMapStorageProviderFactory implements AmphibianProviderFactory\nprivate static final Logger LOG = Logger.getLogger(HotRodMapStorageProviderFactory.class);\nprivate final static DeepCloner CLONER = new DeepCloner.Builder()\n- .constructorDC(MapClientEntity.class, HotRodClientEntityDelegate::new)\n+ .constructor(MapClientEntity.class, HotRodClientEntityDelegate::new)\n.constructor(MapProtocolMapperEntity.class, HotRodProtocolMapperEntityDelegate::new)\n- .constructorDC(MapGroupEntity.class, HotRodGroupEntityDelegate::new)\n+ .constructor(MapGroupEntity.class, HotRodGroupEntityDelegate::new)\n.build();\npublic static final Map<Class<?>, HotRodEntityDescriptor<?, ?>> ENTITY_DESCRIPTOR_MAP = new HashMap<>();\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map-jpa/src/main/java/org/keycloak/models/map/storage/jpa/client/entity/JpaClientEntity.java",
"new_path": "model/map-jpa/src/main/java/org/keycloak/models/map/storage/jpa/client/entity/JpaClientEntity.java",
"diff": "@@ -42,6 +42,8 @@ import org.hibernate.annotations.TypeDefs;\nimport org.keycloak.models.map.client.MapClientEntity.AbstractClientEntity;\nimport org.keycloak.models.map.client.MapProtocolMapperEntity;\nimport static org.keycloak.models.map.storage.jpa.client.JpaClientMapStorage.SUPPORTED_VERSION;\n+\n+import org.keycloak.models.map.common.DeepCloner;\nimport org.keycloak.models.map.storage.jpa.hibernate.jsonb.JsonbType;\n@Entity\n@@ -87,6 +89,10 @@ public class JpaClientEntity extends AbstractClientEntity implements Serializabl\nthis.metadata = new JpaClientMetadata();\n}\n+ public JpaClientEntity(DeepCloner cloner) {\n+ this.metadata = new JpaClientMetadata(cloner);\n+ }\n+\n/**\n* Used by hibernate when calling cb.construct from read(QueryParameters) method.\n* It is used to select client without metadata(json) field.\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map-jpa/src/main/java/org/keycloak/models/map/storage/jpa/client/entity/JpaClientMetadata.java",
"new_path": "model/map-jpa/src/main/java/org/keycloak/models/map/storage/jpa/client/entity/JpaClientMetadata.java",
"diff": "@@ -18,9 +18,18 @@ package org.keycloak.models.map.storage.jpa.client.entity;\nimport java.io.Serializable;\nimport org.keycloak.models.map.client.MapClientEntityImpl;\n+import org.keycloak.models.map.common.DeepCloner;\npublic class JpaClientMetadata extends MapClientEntityImpl implements Serializable {\n+ public JpaClientMetadata(DeepCloner cloner) {\n+ super(cloner);\n+ }\n+\n+ public JpaClientMetadata() {\n+ super();\n+ }\n+\nprivate Integer entityVersion;\npublic Integer getEntityVersion() {\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/common/DeepCloner.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/common/DeepCloner.java",
"diff": "@@ -111,7 +111,6 @@ public class DeepCloner {\n* Builder for the {@code DeepCloner} helper class.\n*/\npublic static class Builder {\n- private final Map<Class<?>, Supplier<?>> parameterlessConstructors = new HashMap<>();\nprivate final Map<Class<?>, Function<DeepCloner, ?>> constructors = new HashMap<>();\nprivate final Map<Class<?>, Cloner<?>> clonersWithId = new HashMap<>(org.keycloak.models.map.common.AutogeneratedCloners.CLONERS_WITH_ID);\nprivate final Map<Class<?>, Cloner<?>> clonersWithoutId = new HashMap<>(org.keycloak.models.map.common.AutogeneratedCloners.CLONERS_WITHOUT_ID);\n@@ -124,7 +123,7 @@ public class DeepCloner {\n* @return\n*/\npublic DeepCloner build() {\n- return new DeepCloner(parameterlessConstructors, constructors, delegateCreators, entityFieldDelegateCreators, clonersWithId, clonersWithoutId, genericCloner);\n+ return new DeepCloner(constructors, delegateCreators, entityFieldDelegateCreators, clonersWithId, clonersWithoutId, genericCloner);\n}\nprivate <V> void forThisClassAndAllMarkedParentsAndInterfaces(Class<V> rootClazz, Consumer<Class<?>> action) {\n@@ -149,22 +148,6 @@ public class DeepCloner {\n}\n}\n- /**\n- * Adds a method, often a constructor, that instantiates a record of type {@code V}.\n- *\n- * @param <V> Class or interface that would be instantiated by the given methods\n- * @param clazz Class or interface that would be instantiated by the given methods\n- * @param constructorNoParameters Parameterless function that creates a new instance of class {@code V}.\n- * If {@code null}, parameterless constructor is not available.\n- * @return This builder.\n- */\n- public <V> Builder constructor(Class<V> clazz, Supplier<? extends V> constructorNoParameters) {\n- if (constructorNoParameters != null) {\n- forThisClassAndAllMarkedParentsAndInterfaces(clazz, cl -> this.parameterlessConstructors.put(cl, constructorNoParameters));\n- }\n- return this;\n- }\n-\n/**\n* Adds a method, often a constructor, that instantiates a record of type {@code V}.\n*\n@@ -174,7 +157,7 @@ public class DeepCloner {\n* If {@code null}, such a single-parameter constructor is not available.\n* @return This builder.\n*/\n- public <V> Builder constructorDC(Class<V> clazz, Function<DeepCloner, ? extends V> constructor) {\n+ public <V> Builder constructor(Class<V> clazz, Function<DeepCloner, ? extends V> constructor) {\nif (constructor != null) {\nforThisClassAndAllMarkedParentsAndInterfaces(clazz, cl -> this.constructors.put(cl, constructor));\n}\n@@ -267,7 +250,6 @@ public class DeepCloner {\nprivate static final Logger LOG = Logger.getLogger(DeepCloner.class);\n- private final Map<Class<?>, Supplier<?>> parameterlessConstructors;\nprivate final Map<Class<?>, Function<DeepCloner, ?>> constructors;\nprivate final Map<Class<?>, Cloner<?>> clonersWithId;\nprivate final Map<Class<?>, Cloner<?>> clonersWithoutId;\n@@ -276,14 +258,12 @@ public class DeepCloner {\nprivate final Cloner<?> genericCloner;\nprivate final Map<Class<?>, Object> emptyInstances = new HashMap<>(AutogeneratedCloners.EMPTY_INSTANCES);\n- private DeepCloner(Map<Class<?>, Supplier<?>> parameterlessConstructors,\n- Map<Class<?>, Function<DeepCloner, ?>> constructors,\n+ private DeepCloner(Map<Class<?>, Function<DeepCloner, ?>> constructors,\nMap<Class<?>, DelegateCreator<?>> delegateCreators,\nMap<Class<?>, EntityFieldDelegateCreator<?>> entityFieldDelegateCreators,\nMap<Class<?>, Cloner<?>> clonersWithId,\nMap<Class<?>, Cloner<?>> clonersWithoutId,\nCloner<?> genericCloner) {\n- this.parameterlessConstructors = parameterlessConstructors;\nthis.constructors = constructors;\nthis.clonersWithId = clonersWithId;\nthis.clonersWithoutId = clonersWithoutId;\n@@ -377,17 +357,11 @@ public class DeepCloner {\n@SuppressWarnings(\"unchecked\")\nFunction<DeepCloner, V> c = (Function<DeepCloner, V>) getFromClassRespectingHierarchy(this.constructors, clazz);\nif (c == null) {\n- @SuppressWarnings(\"unchecked\")\n- Supplier<V> s = (Supplier<V>) getFromClassRespectingHierarchy(this.parameterlessConstructors, clazz);\n- if (s == null) {\ntry {\nres = clazz.newInstance();\n} catch (InstantiationException | IllegalAccessException ex) {\nres = null;\n}\n- } else {\n- res = s.get();\n- }\n} else {\nres = c.apply(this);\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorageProviderFactory.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorageProviderFactory.java",
"diff": "@@ -80,10 +80,10 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide\nprivate final static DeepCloner CLONER = new DeepCloner.Builder()\n.genericCloner(Serialization::from)\n- .constructorDC(MapClientEntityImpl.class, MapClientEntityImpl::new)\n+ .constructor(MapClientEntityImpl.class, MapClientEntityImpl::new)\n.constructor(MapProtocolMapperEntity.class, MapProtocolMapperEntityImpl::new)\n- .constructorDC(MapGroupEntityImpl.class, MapGroupEntityImpl::new)\n- .constructorDC(MapRoleEntityImpl.class, MapRoleEntityImpl::new)\n+ .constructor(MapGroupEntityImpl.class, MapGroupEntityImpl::new)\n+ .constructor(MapRoleEntityImpl.class, MapRoleEntityImpl::new)\n.build();\nprivate static final Map<String, StringKeyConvertor> KEY_CONVERTORS = new HashMap<>();\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/test/java/org/keycloak/models/map/client/MapClientEntityClonerTest.java",
"new_path": "model/map/src/test/java/org/keycloak/models/map/client/MapClientEntityClonerTest.java",
"diff": "@@ -38,7 +38,7 @@ import static org.keycloak.models.map.common.DeepCloner.DUMB_CLONER;\npublic class MapClientEntityClonerTest {\nprivate final static DeepCloner CLONER = new DeepCloner.Builder()\n- .constructorDC(MapClientEntityImpl.class, MapClientEntityImpl::new)\n+ .constructor(MapClientEntityImpl.class, MapClientEntityImpl::new)\n.constructor(MapProtocolMapperEntity.class, MapProtocolMapperEntityImpl::new)\n.build();\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Refactoring of constructors for generated entities |
339,696 | 05.01.2022 12:23:46 | -3,600 | 80873ea4b9dc1ce6d60f16c8ffc2db20b40f662f | Allow changing the session id on login in Tomcat adapter | [
{
"change_type": "MODIFY",
"old_path": "adapters/oidc/tomcat/tomcat/src/main/java/org/keycloak/adapters/tomcat/KeycloakAuthenticatorValve.java",
"new_path": "adapters/oidc/tomcat/tomcat/src/main/java/org/keycloak/adapters/tomcat/KeycloakAuthenticatorValve.java",
"diff": "@@ -110,4 +110,9 @@ public class KeycloakAuthenticatorValve extends AbstractKeycloakAuthenticatorVal\nprotected AbstractAuthenticatedActionsValve createAuthenticatedActionsValve(AdapterDeploymentContext deploymentContext, Valve next, Container container) {\nreturn new AuthenticatedActionsValve(deploymentContext, next, container);\n}\n+\n+ @Override\n+ protected CatalinaRequestAuthenticator createRequestAuthenticator(Request request, CatalinaHttpFacade facade, KeycloakDeployment deployment, AdapterTokenStore tokenStore) {\n+ return new TomcatRequestAuthenticator(deployment, tokenStore, facade, request, createPrincipalFactory());\n+ }\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Allow changing the session id on login in Tomcat adapter |
339,550 | 06.01.2022 04:04:50 | -32,400 | baad104673e07da52b9a44575ce277e61be389b1 | change "look ahead window" to "look around window"
Closes | [
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"new_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"diff": "@@ -1332,7 +1332,9 @@ otp-hash-algorithm.tooltip=What hashing algorithm should be used to generate the\nnumber-of-digits=Number of Digits\notp.number-of-digits.tooltip=How many digits should the OTP have?\nlook-ahead-window=Look Ahead Window\n-otp.look-ahead-window.tooltip=How far ahead should the server look just in case the token generator and server are out of time sync or counter sync?\n+otp.look-ahead-window.tooltip=How far ahead should the server look just in case the token generator and server are out of counter sync?\n+look-around-window=Look Around Window\n+otp.look-around-window.tooltip=How far should the server look around just in case the token generator and server are out of time sync?\ninitial-counter=Initial Counter\notp.initial-counter.tooltip=What should the initial counter value be?\notp-token-period=OTP Token Period\n"
},
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/partials/otp-policy.html",
"new_path": "themes/src/main/resources/theme/base/admin/resources/partials/otp-policy.html",
"diff": "<kc-tooltip>{{:: 'otp.number-of-digits.tooltip' | translate}}</kc-tooltip>\n</div>\n- <div class=\"form-group\">\n+ <div class=\"form-group\" data-ng-if=\"realm.otpPolicyType == 'hotp'\">\n<label class=\"col-md-2 control-label\" for=\"lookAhead\">{{:: 'look-ahead-window' | translate}}</label>\n<div class=\"col-md-6\">\n- <input class=\"form-control\" type=\"number\" required min=\"0\" max=\"120\" id=\"lookAhead\" name=\"lookAhead\" data-ng-model=\"realm.otpPolicyLookAheadWindow\" autofocus>\n+ <input class=\"form-control\" type=\"number\" data-ng-required=\"realm.otpPolicyType == 'hotp'\" min=\"0\" max=\"120\" id=\"lookAhead\" name=\"lookAhead\" data-ng-model=\"realm.otpPolicyLookAheadWindow\">\n</div>\n<kc-tooltip>{{:: 'otp.look-ahead-window.tooltip' | translate}}</kc-tooltip>\n</div>\n+ <div class=\"form-group\" data-ng-if=\"realm.otpPolicyType == 'totp'\">\n+ <label class=\"col-md-2 control-label\" for=\"lookAhead\">{{:: 'look-around-window' | translate}}</label>\n+ <div class=\"col-md-6\">\n+ <input class=\"form-control\" type=\"number\" data-ng-required=\"realm.otpPolicyType == 'totp'\" min=\"0\" max=\"120\" id=\"lookAround\" name=\"lookAround\" data-ng-model=\"realm.otpPolicyLookAheadWindow\">\n+ </div>\n+ <kc-tooltip>{{:: 'otp.look-around-window.tooltip' | translate}}</kc-tooltip>\n+ </div>\n+\n<div class=\"form-group\" data-ng-if=\"realm.otpPolicyType == 'hotp'\">\n<label class=\"col-md-2 control-label\" for=\"counter\">{{:: 'initial-counter' | translate}}</label>\n<div class=\"col-md-6\">\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-18880 change "look ahead window" to "look around window" (#9341)
Closes #9340 |
339,618 | 17.12.2021 08:10:04 | -3,600 | 1cebd79f1c454235622ba0cb3c8195a38a9a1856 | Solves - Initial version for proxy documentation | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "docs/guides/src/GENERATE-DOCS.md",
"diff": "+To generate the docs, we use a maven plugin that transforms the guides from FreeMarker enabled AsciiDoc to pure AsciiDoc. This includes linking the options from the Configuration to expose them to FreeMarker templates.\n+\n+FreeMarker macros are used heavily here to keep consistency throughout the guides, and to make the guides themselves as slim as possible.\n+\n+To help debugging, for now use the `DocsBuildDebugUtil.java` which has a main method that allows running this step outside of Maven.\n+\n+To build the guides, run:\n+```\n+cd docs\n+mvn clean install\n+```\n+After that you will have the following artifacts:\n+\n+- `docs/guides/target/generated-guides`: pure asciidoc generated versions of the guides\n+- `docs/guides/target/generated-docs/index.html`: all guides in a single html file generated with asciidoc maven plugins.\n+\n+_Note:_ The layout primarily serves as an example for now and is not how we will eventually present the documentation.\n\\ No newline at end of file\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "docs/guides/src/main/server/proxy.adoc",
"diff": "+<#import \"/templates/guide.adoc\" as tmpl>\n+<#import \"/templates/kc.adoc\" as kc>\n+<#import \"/templates/options.adoc\" as opts>\n+\n+<@tmpl.guide\n+title=\"Configuring Keycloak to run behind a reverse proxy\"\n+summary=\"Understand how to configure Keycloak when using a reverse proxy\"\n+includedOptions=\"proxy proxy.*\">\n+\n+It is pretty common nowadays to use a reverse proxy in distributed environments. If you want to use Keycloak together with such a proxy, you can use different proxy modes depending on the proxy and TLS termination in your specific environment:\n+\n+The `none` mode disables proxy support. It is the default mode.\n+\n+The `edge` mode enables communication through HTTP between the proxy and Keycloak. This mode is suitable for deployments with a highly secure internal network where the reverse proxy keeps a secure connection (HTTP over TLS) with clients while communicating with Keycloak using HTTP.\n+\n+The `reencrypt` mode requires communication through HTTPS between the proxy and Keycloak. This mode is suitable for deployments where internal communication between the reverse proxy and Keycloak should also be protected, and different keys and certificates are used on the reverse proxy as well as on Keycloak.\n+\n+The `passthrough` mode enables communication through HTTP or HTTPS between the proxy and Keycloak. This mode is suitable for deployments where the reverse proxy is not terminating TLS, but only forwarding the requests to the Keycloak server so that secure connections between the server and clients are based on the keys and certificates used by the Keycloak server itself.\n+\n+Selecting the reverse proxy mode is done at runtime via:\n+\n+<@kc.all parameters=\"--proxy <mode>\"/>\n+\n+Please make sure your reverse proxy is configured correctly. To do so, please:\n+\n+* Configure your reverse proxy to properly set X-Forwarded-For and X-Forwarded-Proto HTTP headers.\n+\n+* Configure your reverse proxy to preserve the original 'Host' HTTP header.\n+\n+Please consult the documentation of your specific reverse proxy on how to set these headers.\n+\n+_Note_: Take extra precautions to ensure that the X-Forwarded-For header is set by your reverse proxy. If it is not configured correctly, rogue clients can set this header themselves and trick Keycloak into thinking the client is connecting from a different IP address than it actually does. This may become really important if you are doing any black or white listing of IP addresses.\n+\n+Valid options for the proxy mode include:\n+\n+<@opts.expectedValues option=\"proxy\"/>\n+\n+</@tmpl.guide>\n\\ No newline at end of file\n"
},
{
"change_type": "MODIFY",
"old_path": "docs/guides/src/main/templates/kc.adoc",
"new_path": "docs/guides/src/main/templates/kc.adoc",
"diff": "@@ -11,3 +11,10 @@ bin/kc.[sh|bat] build ${parameters}\nbin/kc.[sh|bat] start ${parameters}\n----\n</#macro>\n+\n+<#macro all parameters>\n+[source,bash]\n+----\n+bin/kc.[sh|bat] [build|start|start-dev] ${parameters}\n+----\n+</#macro>\n\\ No newline at end of file\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Solves [#9206] - Initial version for proxy documentation |
339,500 | 23.12.2021 14:18:37 | -3,600 | 9d5355b7adbb24d131093cd0e45a15252b7d1fbe | Upgrade Infinispan to 12.1.7.Final | [
{
"change_type": "MODIFY",
"old_path": "model/infinispan/src/main/java/org/keycloak/connections/infinispan/DefaultInfinispanConnectionProviderFactory.java",
"new_path": "model/infinispan/src/main/java/org/keycloak/connections/infinispan/DefaultInfinispanConnectionProviderFactory.java",
"diff": "@@ -384,6 +384,10 @@ public class DefaultInfinispanConnectionProviderFactory implements InfinispanCon\nString jdgServer = config.get(\"remoteStoreHost\", \"localhost\");\nInteger jdgPort = config.getInt(\"remoteStorePort\", 11222);\n+ // After upgrade to Infinispan 12.1.7.Final it's required that both remote store and embedded cache use\n+ // the same key media type to allow segmentation. Also, the number of segments in an embedded cache needs to match number of segments in the remote store.\n+ boolean segmented = config.getBoolean(\"segmented\", false);\n+\nbuilder.persistence()\n.passivation(false)\n.addStore(RemoteStoreConfigurationBuilder.class)\n@@ -393,6 +397,7 @@ public class DefaultInfinispanConnectionProviderFactory implements InfinispanCon\n.preload(false)\n.shared(true)\n.remoteCacheName(cacheName)\n+ .segmented(segmented)\n.rawValues(true)\n.forceReturnValues(false)\n.marshaller(KeycloakHotRodMarshallerFactory.class.getName())\n@@ -408,6 +413,10 @@ public class DefaultInfinispanConnectionProviderFactory implements InfinispanCon\nString jdgServer = config.get(\"remoteStoreHost\", \"localhost\");\nInteger jdgPort = config.getInt(\"remoteStorePort\", 11222);\n+ // After upgrade to Infinispan 12.1.7.Final it's required that both remote store and embedded cache use\n+ // the same key media type to allow segmentation. Also, the number of segments in an embedded cache needs to match number of segments in the remote store.\n+ boolean segmented = config.getBoolean(\"segmented\", false);\n+\nbuilder.persistence()\n.passivation(false)\n.addStore(RemoteStoreConfigurationBuilder.class)\n@@ -417,6 +426,7 @@ public class DefaultInfinispanConnectionProviderFactory implements InfinispanCon\n.preload(true)\n.shared(true)\n.remoteCacheName(InfinispanConnectionProvider.ACTION_TOKEN_CACHE)\n+ .segmented(segmented)\n.rawValues(true)\n.forceReturnValues(false)\n.marshaller(KeycloakHotRodMarshallerFactory.class.getName())\n"
},
{
"change_type": "MODIFY",
"old_path": "pom.xml",
"new_path": "pom.xml",
"diff": "<jakarta.persistence.version>2.2.3</jakarta.persistence.version>\n<hibernate.core.version>5.3.20.Final</hibernate.core.version>\n<hibernate.c3p0.version>5.3.20.Final</hibernate.c3p0.version>\n- <infinispan.version>11.0.9.Final</infinispan.version>\n- <infinispan.protostream.processor.version>4.3.4.Final</infinispan.protostream.processor.version>\n+ <infinispan.version>12.1.7.Final</infinispan.version>\n+ <infinispan.protostream.processor.version>4.4.1.Final</infinispan.protostream.processor.version>\n<javax.annotation-api.version>1.3.2</javax.annotation-api.version>\n<jackson.version>2.12.1</jackson.version>\n<jackson.databind.version>${jackson.version}</jackson.databind.version>\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Upgrade Infinispan to 12.1.7.Final |
339,410 | 07.01.2022 09:38:51 | -3,600 | 9b18688ce2f19ab95bd2dce2e271dcf4e9efb7fe | fixes regex pattern is now pre-compiled | [
{
"change_type": "MODIFY",
"old_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/IckleQueryOperators.java",
"new_path": "model/map-hot-rod/src/main/java/org/keycloak/models/map/storage/hotRod/IckleQueryOperators.java",
"diff": "@@ -26,6 +26,7 @@ import java.util.HashMap;\nimport java.util.HashSet;\nimport java.util.Map;\nimport java.util.Set;\n+import java.util.regex.Pattern;\nimport java.util.stream.Collectors;\nimport java.util.stream.IntStream;\nimport java.util.stream.Stream;\n@@ -35,10 +36,10 @@ import java.util.stream.Stream;\n* <p/>\n* For example,\n* <p/>\n- * for operator {@link ModelCriteriaBuilder.Operator.EQ} we concatenate left operand and right operand with equal sign:\n+ * for operator {@link ModelCriteriaBuilder.Operator#EQ} we concatenate left operand and right operand with equal sign:\n* {@code fieldName = :parameterName}\n* <p/>\n- * however, for operator {@link ModelCriteriaBuilder.Operator.EXISTS} we add following:\n+ * however, for operator {@link ModelCriteriaBuilder.Operator#EXISTS} we add following:\n* <p/>\n* {@code fieldName IS NOT NULL AND fieldName IS NOT EMPTY\"}.\n*\n@@ -46,7 +47,7 @@ import java.util.stream.Stream;\n* corresponding value is then saved into {@code Map<String, Object>} that is passed to each {@link ExpressionCombinator}.\n*/\npublic class IckleQueryOperators {\n- private static final String UNWANTED_CHARACTERS_REGEX = \"[^a-zA-Z\\\\d]\";\n+ private static final Pattern UNWANTED_CHARACTERS_REGEX = Pattern.compile(\"[^a-zA-Z\\\\d]\");\npublic static final String C = \"c\";\nprivate static final Map<ModelCriteriaBuilder.Operator, String> OPERATOR_TO_STRING = new HashMap<>();\nprivate static final Map<ModelCriteriaBuilder.Operator, ExpressionCombinator> OPERATOR_TO_EXPRESSION_COMBINATORS = new HashMap<>();\n@@ -123,14 +124,18 @@ public class IckleQueryOperators {\n}\nprivate static String removeForbiddenCharactersFromNamedParameter(String name) {\n- return name.replaceAll(UNWANTED_CHARACTERS_REGEX, \"\");\n+ return UNWANTED_CHARACTERS_REGEX.matcher(name).replaceAll( \"\");\n}\n/**\n* Maps {@code namePrefix} to next available parameter name. For example, if {@code namePrefix == \"id\"}\n* and {@code existingNames} set already contains {@code id0} and {@code id1} it returns {@code id2}.\n+ * Any character that is not an alphanumeric will be stripped, so that it works for prefixes like\n+ * {@code \"attributes.name\"} as well.\n*\n- * This method is used for computing available names for name query parameters\n+ * This method is used for computing available names for name query parameters.\n+ * Instead of creating generic named parameters that would be hard to debug and read by humans, it creates readable\n+ * named parameters from the prefix.\n*\n* @param existingNames set of parameter names that are already used in this Ickle query\n* @param namePrefix name of the parameter\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "model/map-hot-rod/src/test/java/org/keycloak/models/map/storage/hotRod/IckleQueryOperatorsTest.java",
"diff": "+package org.keycloak.models.map.storage.hotRod;\n+\n+import org.hamcrest.Matchers;\n+import org.junit.Test;\n+\n+import java.util.HashSet;\n+import java.util.Set;\n+\n+import static org.hamcrest.MatcherAssert.assertThat;\n+\n+public class IckleQueryOperatorsTest {\n+\n+ @Test\n+ public void testFindAvailableNamedParamSimple() {\n+ Set<String> existingNames = new HashSet<>();\n+\n+ String param = IckleQueryOperators.findAvailableNamedParam(existingNames, \"clientId\");\n+\n+ assertThat(\"should create the first ID\", param, Matchers.equalTo(\"clientId0\"));\n+ }\n+\n+ @Test\n+ public void testFindAvailableNamedParamAlreadyExists() {\n+ Set<String> existingNames = new HashSet<>();\n+ existingNames.add(\"clientId0\");\n+\n+ String param = IckleQueryOperators.findAvailableNamedParam(existingNames, \"clientId\");\n+\n+ assertThat(\"should create the next ID as clientId0 is already taken\", param, Matchers.equalTo(\"clientId1\"));\n+ }\n+\n+ @Test\n+ public void testFindAvailableNamedParamIllegalCharacterInPrefix() {\n+ Set<String> existingNames = new HashSet<>();\n+ existingNames.add(\"clientid0\");\n+\n+ String param = IckleQueryOperators.findAvailableNamedParam(existingNames, \"client.id\");\n+\n+ assertThat(\"should remove non-characters and non-numbers from the ID\", param, Matchers.equalTo(\"clientid1\"));\n+ }\n+\n+}\n\\ No newline at end of file\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | fixes #9427 regex pattern is now pre-compiled |
339,179 | 07.01.2022 10:04:49 | -3,600 | ab9413b48c742fefc3cbfa3422ea077354921135 | Store user nested entities in Set instead of Map | [
{
"change_type": "MODIFY",
"old_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/GenerateEntityImplementationsProcessor.java",
"new_path": "model/build-processor/src/main/java/org/keycloak/models/map/processor/GenerateEntityImplementationsProcessor.java",
"diff": "@@ -59,7 +59,7 @@ import javax.lang.model.type.TypeKind;\n@SupportedSourceVersion(SourceVersion.RELEASE_8)\npublic class GenerateEntityImplementationsProcessor extends AbstractGenerateEntityImplementationsProcessor {\n- private final Collection<String> autogenerated = new TreeSet<>();\n+ private static final Collection<String> autogenerated = new TreeSet<>();\nprivate final Generator[] generators = new Generator[] {\nnew ClonerGenerator(),\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/MapFieldPredicates.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/MapFieldPredicates.java",
"diff": "@@ -279,7 +279,7 @@ public class MapFieldPredicates {\nString providerId = ensureEqSingleValue(UserModel.SearchableFields.CONSENT_CLIENT_FEDERATION_LINK, \"provider_id\", op, values);\nString providerIdS = new StorageId((String) providerId, \"\").getId();\nFunction<MapUserEntity, ?> getter;\n- getter = ue -> Optional.ofNullable(ue.getUserConsents()).orElseGet(Collections::emptyMap).values().stream().map(MapUserConsentEntity::getClientId).anyMatch(v -> v != null && v.startsWith(providerIdS));\n+ getter = ue -> Optional.ofNullable(ue.getUserConsents()).orElseGet(Collections::emptySet).stream().map(MapUserConsentEntity::getClientId).anyMatch(v -> v != null && v.startsWith(providerIdS));\nreturn mcb.fieldCompare(Boolean.TRUE::equals, getter);\n}\n@@ -445,7 +445,7 @@ public class MapFieldPredicates {\nprivate static MapModelCriteriaBuilder<Object, MapUserEntity, UserModel> checkUserClientConsent(MapModelCriteriaBuilder<Object, MapUserEntity, UserModel> mcb, Operator op, Object[] values) {\nString clientIdS = ensureEqSingleValue(UserModel.SearchableFields.CONSENT_FOR_CLIENT, \"client_id\", op, values);\nFunction<MapUserEntity, ?> getter;\n- getter = ue -> ue.getUserConsent(clientIdS);\n+ getter = ue -> ue.getUserConsent(clientIdS).orElse(null);\nreturn mcb.fieldCompare(Operator.EXISTS, getter, null);\n}\n@@ -453,7 +453,7 @@ public class MapFieldPredicates {\nprivate static MapModelCriteriaBuilder<Object, MapUserEntity, UserModel> checkUserConsentsWithClientScope(MapModelCriteriaBuilder<Object, MapUserEntity, UserModel> mcb, Operator op, Object[] values) {\nString clientScopeIdS = ensureEqSingleValue(UserModel.SearchableFields.CONSENT_FOR_CLIENT, \"client_scope_id\", op, values);\nFunction<MapUserEntity, ?> getter;\n- getter = ue -> Optional.ofNullable(ue.getUserConsents()).orElseGet(Collections::emptyMap).values().stream().anyMatch(consent -> Optional.ofNullable(consent.getGrantedClientScopesIds()).orElseGet(Collections::emptySet).contains(clientScopeIdS));\n+ getter = ue -> Optional.ofNullable(ue.getUserConsents()).orElseGet(Collections::emptySet).stream().anyMatch(consent -> Optional.ofNullable(consent.getGrantedClientScopesIds()).orElseGet(Collections::emptySet).contains(clientScopeIdS));\nreturn mcb.fieldCompare(Boolean.TRUE::equals, getter);\n}\n@@ -469,15 +469,15 @@ public class MapFieldPredicates {\nfinal Object idpAlias = values[0];\nFunction<MapUserEntity, ?> getter;\nif (values.length == 1) {\n- getter = ue -> Optional.ofNullable(ue.getFederatedIdentities()).orElseGet(Collections::emptyMap).values().stream()\n+ getter = ue -> Optional.ofNullable(ue.getFederatedIdentities()).orElseGet(Collections::emptySet).stream()\n.anyMatch(aue -> Objects.equals(idpAlias, aue.getIdentityProvider()));\n} else if (idpAlias == null) {\nfinal Object idpUserId = values[1];\n- getter = ue -> Optional.ofNullable(ue.getFederatedIdentities()).orElseGet(Collections::emptyMap).values().stream()\n+ getter = ue -> Optional.ofNullable(ue.getFederatedIdentities()).orElseGet(Collections::emptySet).stream()\n.anyMatch(aue -> Objects.equals(idpUserId, aue.getUserId()));\n} else {\nfinal Object idpUserId = values[1];\n- getter = ue -> Optional.ofNullable(ue.getFederatedIdentities()).orElseGet(Collections::emptyMap).values().stream()\n+ getter = ue -> Optional.ofNullable(ue.getFederatedIdentities()).orElseGet(Collections::emptySet).stream()\n.anyMatch(aue -> Objects.equals(idpAlias, aue.getIdentityProvider()) && Objects.equals(idpUserId, aue.getUserId()));\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/user/MapUserCredentialEntity.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/user/MapUserCredentialEntity.java",
"diff": "@@ -29,8 +29,6 @@ import java.util.Comparator;\[email protected]\npublic interface MapUserCredentialEntity extends UpdatableEntity {\n- Comparator<MapUserCredentialEntity> ORDER_BY_PRIORITY = Comparator.comparing(MapUserCredentialEntity::getPriority);\n-\npublic static MapUserCredentialEntity fromModel(CredentialModel model) {\nMapUserCredentialEntity credentialEntity = new MapUserCredentialEntityImpl();\nString id = model.getId() == null ? KeycloakModelUtils.generateId() : model.getId();\n@@ -72,7 +70,4 @@ public interface MapUserCredentialEntity extends UpdatableEntity {\nString getCredentialData();\nvoid setCredentialData(String credentialData);\n-\n- Integer getPriority();\n- void setPriority(Integer priority);\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/user/MapUserEntity.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/user/MapUserEntity.java",
"diff": "package org.keycloak.models.map.user;\n+import org.jboss.logging.Logger;\nimport org.keycloak.models.map.annotations.GenerateEntityImplementations;\nimport org.keycloak.models.map.annotations.IgnoreForEntityImplementationGenerator;\nimport org.keycloak.models.map.common.AbstractEntity;\n@@ -26,12 +27,11 @@ import org.keycloak.models.map.common.UpdatableEntity;\nimport org.keycloak.models.utils.KeycloakModelUtils;\nimport java.util.Collections;\n-import java.util.Comparator;\nimport java.util.List;\nimport java.util.Map;\n+import java.util.Objects;\nimport java.util.Optional;\nimport java.util.Set;\n-import java.util.stream.Stream;\n@GenerateEntityImplementations(\ninherits = \"org.keycloak.models.map.user.MapUserEntity.AbstractUserEntity\"\n@@ -41,22 +41,23 @@ public interface MapUserEntity extends UpdatableEntity, AbstractEntity, EntityWi\npublic abstract class AbstractUserEntity extends UpdatableEntity.Impl implements MapUserEntity {\n+ private static final Logger LOG = Logger.getLogger(MapUserProvider.class);\nprivate String id;\n@Override\npublic boolean isUpdated() {\nreturn this.updated\n- || Optional.ofNullable(getUserConsents()).orElseGet(Collections::emptyMap).values().stream().anyMatch(MapUserConsentEntity::isUpdated)\n- || Optional.ofNullable(getCredentials()).orElseGet(Collections::emptyMap).values().stream().anyMatch(MapUserCredentialEntity::isUpdated)\n- || Optional.ofNullable(getFederatedIdentities()).orElseGet(Collections::emptyMap).values().stream().anyMatch(MapUserFederatedIdentityEntity::isUpdated);\n+ || Optional.ofNullable(getUserConsents()).orElseGet(Collections::emptySet).stream().anyMatch(MapUserConsentEntity::isUpdated)\n+ || Optional.ofNullable(getCredentials()).orElseGet(Collections::emptyList).stream().anyMatch(MapUserCredentialEntity::isUpdated)\n+ || Optional.ofNullable(getFederatedIdentities()).orElseGet(Collections::emptySet).stream().anyMatch(MapUserFederatedIdentityEntity::isUpdated);\n}\n@Override\npublic void clearUpdatedFlag() {\nthis.updated = false;\n- Optional.ofNullable(getUserConsents()).orElseGet(Collections::emptyMap).values().forEach(UpdatableEntity::clearUpdatedFlag);\n- Optional.ofNullable(getCredentials()).orElseGet(Collections::emptyMap).values().forEach(UpdatableEntity::clearUpdatedFlag);\n- Optional.ofNullable(getFederatedIdentities()).orElseGet(Collections::emptyMap).values().forEach(UpdatableEntity::clearUpdatedFlag);\n+ Optional.ofNullable(getUserConsents()).orElseGet(Collections::emptySet).forEach(UpdatableEntity::clearUpdatedFlag);\n+ Optional.ofNullable(getCredentials()).orElseGet(Collections::emptyList).forEach(UpdatableEntity::clearUpdatedFlag);\n+ Optional.ofNullable(getFederatedIdentities()).orElseGet(Collections::emptySet).forEach(UpdatableEntity::clearUpdatedFlag);\n}\n@@ -77,6 +78,97 @@ public interface MapUserEntity extends UpdatableEntity, AbstractEntity, EntityWi\nthis.setEmail(email);\nthis.setEmailConstraint(email == null || duplicateEmailsAllowed ? KeycloakModelUtils.generateId() : email);\n}\n+\n+ @Override\n+ public Optional<MapUserConsentEntity> getUserConsent(String clientId) {\n+ Set<MapUserConsentEntity> ucs = getUserConsents();\n+ if (ucs == null || ucs.isEmpty()) return Optional.empty();\n+\n+ return ucs.stream().filter(uc -> Objects.equals(uc.getClientId(), clientId)).findFirst();\n+ }\n+\n+ @Override\n+ public Boolean removeUserConsent(String clientId) {\n+ Set<MapUserConsentEntity> consents = getUserConsents();\n+ boolean removed = consents != null && consents.removeIf(uc -> Objects.equals(uc.getClientId(), clientId));\n+ this.updated |= removed;\n+ return removed;\n+ }\n+\n+ @Override\n+ public Optional<MapUserCredentialEntity> getCredential(String id) {\n+ List<MapUserCredentialEntity> uce = getCredentials();\n+ if (uce == null || uce.isEmpty()) return Optional.empty();\n+\n+ return uce.stream().filter(uc -> Objects.equals(uc.getId(), id)).findFirst();\n+ }\n+\n+ @Override\n+ public Boolean removeCredential(String id) {\n+ List<MapUserCredentialEntity> credentials = getCredentials();\n+ boolean removed = credentials != null && credentials.removeIf(c -> Objects.equals(c.getId(), id));\n+ this.updated |= removed;\n+ return removed;\n+ }\n+\n+ @Override\n+ public Boolean moveCredential(String credentialId, String newPreviousCredentialId) {\n+ // 1 - Get all credentials from the entity.\n+ List<MapUserCredentialEntity> credentialsList = getCredentials();\n+\n+ // 2 - Find indexes of our and newPrevious credential\n+ int ourCredentialIndex = -1;\n+ int newPreviousCredentialIndex = -1;\n+ MapUserCredentialEntity ourCredential = null;\n+ int i = 0;\n+ for (MapUserCredentialEntity credential : credentialsList) {\n+ if (credentialId.equals(credential.getId())) {\n+ ourCredentialIndex = i;\n+ ourCredential = credential;\n+ } else if(newPreviousCredentialId != null && newPreviousCredentialId.equals(credential.getId())) {\n+ newPreviousCredentialIndex = i;\n+ }\n+ i++;\n+ }\n+\n+ if (ourCredentialIndex == -1) {\n+ LOG.warnf(\"Not found credential with id [%s] of user [%s]\", credentialId, getUsername());\n+ return false;\n+ }\n+\n+ if (newPreviousCredentialId != null && newPreviousCredentialIndex == -1) {\n+ LOG.warnf(\"Can't move up credential with id [%s] of user [%s]\", credentialId, getUsername());\n+ return false;\n+ }\n+\n+ // 3 - Compute index where we move our credential\n+ int toMoveIndex = newPreviousCredentialId==null ? 0 : newPreviousCredentialIndex + 1;\n+\n+ // 4 - Insert our credential to new position, remove it from the old position\n+ if (toMoveIndex == ourCredentialIndex) return true;\n+ credentialsList.add(toMoveIndex, ourCredential);\n+ int indexToRemove = toMoveIndex < ourCredentialIndex ? ourCredentialIndex + 1 : ourCredentialIndex;\n+ credentialsList.remove(indexToRemove);\n+\n+ this.updated = true;\n+ return true;\n+ }\n+\n+ @Override\n+ public Optional<MapUserFederatedIdentityEntity> getFederatedIdentity(String identityProviderId) {\n+ Set<MapUserFederatedIdentityEntity> fes = getFederatedIdentities();\n+ if (fes == null || fes.isEmpty()) return Optional.empty();\n+\n+ return fes.stream().filter(fi -> Objects.equals(fi.getIdentityProvider(), identityProviderId)).findFirst();\n+ }\n+\n+ @Override\n+ public Boolean removeFederatedIdentity(String identityProviderId) {\n+ Set<MapUserFederatedIdentityEntity> federatedIdentities = getFederatedIdentities();\n+ boolean removed = federatedIdentities != null && federatedIdentities.removeIf(fi -> Objects.equals(fi.getIdentityProvider(), identityProviderId));\n+ this.updated |= removed;\n+ return removed;\n+ }\n}\nString getRealmId();\n@@ -119,20 +211,27 @@ public interface MapUserEntity extends UpdatableEntity, AbstractEntity, EntityWi\nvoid addRequiredAction(String requiredAction);\nvoid removeRequiredAction(String requiredAction);\n- Map<String, MapUserCredentialEntity> getCredentials();\n- void setCredential(String id, MapUserCredentialEntity credentialEntity);\n- Boolean removeCredential(String credentialId);\n- MapUserCredentialEntity getCredential(String id);\n-\n- Map<String, MapUserFederatedIdentityEntity> getFederatedIdentities();\n- void setFederatedIdentities(Map<String, MapUserFederatedIdentityEntity> federatedIdentities);\n- void setFederatedIdentity(String id, MapUserFederatedIdentityEntity federatedIdentity);\n- MapUserFederatedIdentityEntity getFederatedIdentity(String federatedIdentity);\n- Boolean removeFederatedIdentity(String providerId);\n-\n- Map<String, MapUserConsentEntity> getUserConsents();\n- MapUserConsentEntity getUserConsent(String clientId);\n- void setUserConsent(String id, MapUserConsentEntity userConsentEntity);\n+ List<MapUserCredentialEntity> getCredentials();\n+ Optional<MapUserCredentialEntity> getCredential(String id);\n+ void setCredentials(List<MapUserCredentialEntity> credentials);\n+ void addCredential(MapUserCredentialEntity credentialEntity);\n+ Boolean removeCredential(MapUserCredentialEntity credentialEntity);\n+ Boolean removeCredential(String id);\n+ @IgnoreForEntityImplementationGenerator\n+ Boolean moveCredential(String credentialId, String newPreviousCredentialId);\n+\n+ Set<MapUserFederatedIdentityEntity> getFederatedIdentities();\n+ Optional<MapUserFederatedIdentityEntity> getFederatedIdentity(String identityProviderId);\n+ void setFederatedIdentities(Set<MapUserFederatedIdentityEntity> federatedIdentities);\n+ void addFederatedIdentity(MapUserFederatedIdentityEntity federatedIdentity);\n+ Boolean removeFederatedIdentity(MapUserFederatedIdentityEntity providerId);\n+ Boolean removeFederatedIdentity(String identityProviderId);\n+\n+ Set<MapUserConsentEntity> getUserConsents();\n+ Optional<MapUserConsentEntity> getUserConsent(String clientId);\n+ void setUserConsents(Set<MapUserConsentEntity> userConsentEntity);\n+ void addUserConsent(MapUserConsentEntity userConsentEntity);\n+ Boolean removeUserConsent(MapUserConsentEntity userConsentEntity);\nBoolean removeUserConsent(String clientId);\nSet<String> getGroupsMembership();\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/user/MapUserProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/user/MapUserProvider.java",
"diff": "@@ -51,11 +51,9 @@ import org.keycloak.storage.UserStorageProvider;\nimport org.keycloak.storage.client.ClientStorageProvider;\nimport java.util.Collection;\n-import java.util.Comparator;\nimport java.util.EnumMap;\nimport java.util.HashMap;\nimport java.util.HashSet;\n-import java.util.LinkedList;\nimport java.util.List;\nimport java.util.Map;\nimport java.util.Objects;\n@@ -79,8 +77,6 @@ import static org.keycloak.models.map.storage.criteria.DefaultModelCriteria.crit\npublic class MapUserProvider implements UserProvider.Streams, UserCredentialStore.Streams {\n- // Typical priority difference between 2 credentials\n- public static final int PRIORITY_DIFFERENCE = 10;\nprivate static final Logger LOG = Logger.getLogger(MapUserProvider.class);\nprivate final KeycloakSession session;\nfinal MapKeycloakTransaction<MapUserEntity, UserModel> tx;\n@@ -145,7 +141,7 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\ngetEntityById(realm, user.getId())\n.ifPresent(userEntity ->\n- userEntity.setFederatedIdentity(socialLink.getIdentityProvider(), MapUserFederatedIdentityEntity.fromModel(socialLink)));\n+ userEntity.addFederatedIdentity(MapUserFederatedIdentityEntity.fromModel(socialLink)));\n}\n@Override\n@@ -175,7 +171,12 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\npublic void updateFederatedIdentity(RealmModel realm, UserModel federatedUser, FederatedIdentityModel federatedIdentityModel) {\nLOG.tracef(\"updateFederatedIdentity(%s, %s, %s)%s\", realm, federatedUser.getId(), federatedIdentityModel.getIdentityProvider(), getShortStackTrace());\ngetEntityById(realm, federatedUser.getId())\n- .ifPresent(entity -> entity.setFederatedIdentity(federatedIdentityModel.getIdentityProvider(), MapUserFederatedIdentityEntity.fromModel(federatedIdentityModel)));\n+ .flatMap(u -> u.getFederatedIdentity(federatedIdentityModel.getIdentityProvider()))\n+ .ifPresent(fi -> {\n+ fi.setUserId(federatedIdentityModel.getUserId());\n+ fi.setUserName(federatedIdentityModel.getUserName());\n+ fi.setToken(federatedIdentityModel.getToken());\n+ });\n}\n@Override\n@@ -183,7 +184,6 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\nLOG.tracef(\"getFederatedIdentitiesStream(%s, %s)%s\", realm, user.getId(), getShortStackTrace());\nreturn getEntityById(realm, user.getId())\n.map(MapUserEntity::getFederatedIdentities)\n- .map(Map::values)\n.map(Collection::stream)\n.orElseGet(Stream::empty)\n.map(MapUserFederatedIdentityEntity::toModel);\n@@ -193,7 +193,7 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\npublic FederatedIdentityModel getFederatedIdentity(RealmModel realm, UserModel user, String socialProvider) {\nLOG.tracef(\"getFederatedIdentity(%s, %s, %s)%s\", realm, user.getId(), socialProvider, getShortStackTrace());\nreturn getEntityById(realm, user.getId())\n- .map(userEntity -> userEntity.getFederatedIdentity(socialProvider))\n+ .flatMap(userEntity -> userEntity.getFederatedIdentity(socialProvider))\n.map(MapUserFederatedIdentityEntity::toModel)\n.orElse(null);\n}\n@@ -225,14 +225,14 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\nLOG.tracef(\"addConsent(%s, %s, %s)%s\", realm, userId, consent, getShortStackTrace());\ngetEntityByIdOrThrow(realm, userId)\n- .setUserConsent(consent.getClient().getId(), MapUserConsentEntity.fromModel(consent));\n+ .addUserConsent(MapUserConsentEntity.fromModel(consent));\n}\n@Override\npublic UserConsentModel getConsentByClient(RealmModel realm, String userId, String clientInternalId) {\nLOG.tracef(\"getConsentByClient(%s, %s, %s)%s\", realm, userId, clientInternalId, getShortStackTrace());\nreturn getEntityById(realm, userId)\n- .map(userEntity -> userEntity.getUserConsent(clientInternalId))\n+ .flatMap(userEntity -> userEntity.getUserConsent(clientInternalId))\n.map(consent -> MapUserConsentEntity.toModel(realm, consent))\n.orElse(null);\n}\n@@ -242,9 +242,8 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\nLOG.tracef(\"getConsentByClientStream(%s, %s)%s\", realm, userId, getShortStackTrace());\nreturn getEntityById(realm, userId)\n.map(MapUserEntity::getUserConsents)\n- .map(Map::values)\n.map(Collection::stream)\n- .orElse(Stream.empty())\n+ .orElseGet(Stream::empty)\n.map(consent -> MapUserConsentEntity.toModel(realm, consent));\n}\n@@ -253,10 +252,8 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\nLOG.tracef(\"updateConsent(%s, %s, %s)%s\", realm, userId, consent, getShortStackTrace());\nMapUserEntity user = getEntityByIdOrThrow(realm, userId);\n- MapUserConsentEntity userConsentEntity = user.getUserConsent(consent.getClient().getId());\n- if (userConsentEntity == null) {\n- throw new ModelException(\"Consent not found for client [\" + consent.getClient().getId() + \"] and user [\" + userId + \"]\");\n- }\n+ MapUserConsentEntity userConsentEntity = user.getUserConsent(consent.getClient().getId())\n+ .orElseThrow(() -> new ModelException(\"Consent not found for client [\" + consent.getClient().getId() + \"] and user [\" + userId + \"]\"));\nuserConsentEntity.setGrantedClientScopesIds(\nconsent.getGrantedClientScopes().stream()\n@@ -447,7 +444,6 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\ntry (Stream<MapUserEntity> s = tx.read(withCriteria(mcb))) {\ns.map(MapUserEntity::getUserConsents)\n.filter(Objects::nonNull)\n- .map(Map::values)\n.flatMap(Collection::stream)\n.forEach(consent -> consent.removeGrantedClientScopesId(clientScopeId));\n}\n@@ -474,9 +470,9 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\nprivate Consumer<MapUserEntity> removeConsentsForExternalClient(String idPrefix) {\nreturn userEntity -> {\n- Map<String, MapUserConsentEntity> userConsents = userEntity.getUserConsents();\n+ Set<MapUserConsentEntity> userConsents = userEntity.getUserConsents();\nif (userConsents == null || userConsents.isEmpty()) return;\n- List<String> consentClientIds = userConsents.values().stream()\n+ List<String> consentClientIds = userConsents.stream()\n.map(MapUserConsentEntity::getClientId)\n.filter(clientId -> clientId != null && clientId.startsWith(idPrefix))\n.collect(Collectors.toList());\n@@ -756,16 +752,13 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\n}\nprivate Consumer<MapUserEntity> updateCredential(CredentialModel credentialModel) {\n- return user -> {\n- MapUserCredentialEntity credentialEntity = user.getCredential(credentialModel.getId());\n- if (credentialEntity == null) return;\n-\n- credentialEntity.setCreatedDate(credentialModel.getCreatedDate());\n- credentialEntity.setUserLabel(credentialModel.getUserLabel());\n- credentialEntity.setType(credentialModel.getType());\n- credentialEntity.setSecretData(credentialModel.getSecretData());\n- credentialEntity.setCredentialData(credentialModel.getCredentialData());\n- };\n+ return user -> user.getCredential(credentialModel.getId()).ifPresent(c -> {\n+ c.setCreatedDate(credentialModel.getCreatedDate());\n+ c.setUserLabel(credentialModel.getUserLabel());\n+ c.setType(credentialModel.getType());\n+ c.setSecretData(credentialModel.getSecretData());\n+ c.setCredentialData(credentialModel.getCredentialData());\n+ });\n}\n@Override\n@@ -774,19 +767,11 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\nMapUserEntity userEntity = getEntityByIdOrThrow(realm, user.getId());\nMapUserCredentialEntity credentialEntity = MapUserCredentialEntity.fromModel(cred);\n- if (userEntity.getCredential(cred.getId()) != null) {\n+ if (userEntity.getCredential(cred.getId()).isPresent()) {\nthrow new ModelDuplicateException(\"A CredentialModel with given id already exists\");\n}\n- Map<String, MapUserCredentialEntity> credentials = userEntity.getCredentials();\n- int priority = PRIORITY_DIFFERENCE;\n-\n- if (credentials != null && !credentials.isEmpty()) {\n- priority = credentials.values().stream().max(MapUserCredentialEntity.ORDER_BY_PRIORITY).map(MapUserCredentialEntity::getPriority).orElse(0) + PRIORITY_DIFFERENCE;\n- }\n-\n- credentialEntity.setPriority(priority);\n- userEntity.setCredential(credentialEntity.getId(), credentialEntity);\n+ userEntity.addCredential(credentialEntity);\nreturn MapUserCredentialEntity.toModel(credentialEntity);\n}\n@@ -806,7 +791,7 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\npublic CredentialModel getStoredCredentialById(RealmModel realm, UserModel user, String id) {\nLOG.tracef(\"getStoredCredentialById(%s, %s, %s)%s\", realm, user.getId(), id, getShortStackTrace());\nreturn getEntityById(realm, user.getId())\n- .map(mapUserEntity -> mapUserEntity.getCredential(id))\n+ .flatMap(mapUserEntity -> mapUserEntity.getCredential(id))\n.map(MapUserCredentialEntity::toModel)\n.orElse(null);\n}\n@@ -817,10 +802,8 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\nreturn getEntityById(realm, user.getId())\n.map(MapUserEntity::getCredentials)\n- .map(Map::values)\n.map(Collection::stream)\n.orElseGet(Stream::empty)\n- .sorted(MapUserCredentialEntity.ORDER_BY_PRIORITY)\n.map(MapUserCredentialEntity::toModel);\n}\n@@ -841,60 +824,8 @@ public class MapUserProvider implements UserProvider.Streams, UserCredentialStor\n@Override\npublic boolean moveCredentialTo(RealmModel realm, UserModel user, String id, String newPreviousCredentialId) {\n-\n- MapUserEntity userEntity = getEntityByIdOrThrow(realm, user.getId());\n-\n- // 1 - Create new list and move everything to it.\n- Map<String, MapUserCredentialEntity> credentialEntityMap = userEntity.getCredentials();\n- List<MapUserCredentialEntity> newList = credentialEntityMap == null ? new LinkedList<>()\n- : credentialEntityMap.values().stream()\n- .sorted(MapUserCredentialEntity.ORDER_BY_PRIORITY)\n- .collect(Collectors.toList());\n-\n- // 2 - Find indexes of our and newPrevious credential\n- int ourCredentialIndex = -1;\n- int newPreviousCredentialIndex = -1;\n- MapUserCredentialEntity ourCredential = null;\n- int i = 0;\n- for (MapUserCredentialEntity credential : newList) {\n- if (id.equals(credential.getId())) {\n- ourCredentialIndex = i;\n- ourCredential = credential;\n- } else if(newPreviousCredentialId != null && newPreviousCredentialId.equals(credential.getId())) {\n- newPreviousCredentialIndex = i;\n- }\n- i++;\n- }\n-\n- if (ourCredentialIndex == -1) {\n- LOG.warnf(\"Not found credential with id [%s] of user [%s]\", id, user.getUsername());\n- return false;\n- }\n-\n- if (newPreviousCredentialId != null && newPreviousCredentialIndex == -1) {\n- LOG.warnf(\"Can't move up credential with id [%s] of user [%s]\", id, user.getUsername());\n- return false;\n- }\n-\n- // 3 - Compute index where we move our credential\n- int toMoveIndex = newPreviousCredentialId==null ? 0 : newPreviousCredentialIndex + 1;\n-\n- // 4 - Insert our credential to new position, remove it from the old position\n- newList.add(toMoveIndex, ourCredential);\n- int indexToRemove = toMoveIndex < ourCredentialIndex ? ourCredentialIndex + 1 : ourCredentialIndex;\n- newList.remove(indexToRemove);\n-\n- // 5 - newList contains credentials in requested order now. Iterate through whole list and change priorities accordingly.\n- int expectedPriority = 0;\n- for (MapUserCredentialEntity credential : newList) {\n- expectedPriority += PRIORITY_DIFFERENCE;\n- if (credential.getPriority() != expectedPriority) {\n- credential.setPriority(expectedPriority);\n-\n- LOG.tracef(\"Priority of credential [%s] of user [%s] changed to [%d]\", credential.getId(), user.getUsername(), expectedPriority);\n- }\n- }\n- return true;\n+ LOG.tracef(\"moveCredentialTo(%s, %s, %s, %s)%s\", realm, user, id, newPreviousCredentialId, getShortStackTrace());\n+ return getEntityByIdOrThrow(realm, user.getId()).moveCredential(id, newPreviousCredentialId);\n}\n@Override\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "model/map/src/test/java/org/keycloak/models/map/user/MapUserEntityImplCredentialsOrderTest.java",
"diff": "+/*\n+ * Copyright 2022 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.models.map.user;\n+\n+import org.junit.Before;\n+import org.junit.Test;\n+import org.hamcrest.Matchers;\n+\n+import static org.hamcrest.CoreMatchers.is;\n+import static org.hamcrest.MatcherAssert.assertThat;\n+\n+import org.keycloak.models.map.common.DeepCloner;\n+\n+import java.util.List;\n+import java.util.stream.Collectors;\n+\n+public class MapUserEntityImplCredentialsOrderTest {\n+\n+ private MapUserEntity user;\n+ private final static DeepCloner CLONER = new DeepCloner.Builder()\n+ .constructor(MapUserCredentialEntityImpl.class, MapUserCredentialEntityImpl::new)\n+ .build();\n+\n+ @Before\n+ public void init() {\n+ user = new MapUserEntityImpl(CLONER);\n+\n+ for (int i = 1; i <= 5; i++) {\n+ MapUserCredentialEntity credentialModel = new MapUserCredentialEntityImpl();\n+ credentialModel.setId(Integer.toString(i));\n+\n+ user.addCredential(credentialModel);\n+ }\n+\n+ user.clearUpdatedFlag();\n+ }\n+\n+ private void assertOrder(Integer... ids) {\n+ List<Integer> currentList = user.getCredentials().stream().map(entity -> Integer.valueOf(entity.getId())).collect(Collectors.toList());\n+ assertThat(currentList, Matchers.contains(ids));\n+ }\n+\n+ @Test\n+ public void testCorrectOrder() {\n+ assertOrder(1, 2, 3, 4, 5);\n+ }\n+\n+ @Test\n+ public void testMoveToZero() {\n+ user.moveCredential(\"3\", null);\n+ assertOrder(3, 1, 2, 4, 5);\n+ assertThat(user.isUpdated(), is(true));\n+ }\n+\n+ @Test\n+ public void testMoveBack() {\n+ user.moveCredential(\"4\", \"1\");\n+ assertOrder(1, 4, 2, 3, 5);\n+ assertThat(user.isUpdated(), is(true));\n+ }\n+\n+ @Test\n+ public void testMoveForward() {\n+ user.moveCredential(\"2\", \"4\");\n+ assertOrder(1, 3, 4, 2, 5);\n+ assertThat(user.isUpdated(), is(true));\n+ }\n+\n+ @Test\n+ public void testSamePosition() {\n+ user.moveCredential(\"2\", \"1\");\n+ assertOrder(1, 2, 3, 4, 5);\n+ assertThat(user.isUpdated(), is(false));\n+ }\n+\n+ @Test\n+ public void testSamePositionZero() {\n+ user.moveCredential(\"1\", null);\n+ assertOrder(1, 2, 3, 4, 5);\n+ assertThat(user.isUpdated(), is(false));\n+ }\n+}\n\\ No newline at end of file\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Store user nested entities in Set instead of Map |
339,465 | 11.01.2022 11:19:15 | -3,600 | 8f221bb21ea625b5799f2693e6f58bfa637603bf | Validation for CIBA binding_message parameter
closes | [
{
"change_type": "MODIFY",
"old_path": "core/src/main/java/org/keycloak/OAuthErrorException.java",
"new_path": "core/src/main/java/org/keycloak/OAuthErrorException.java",
"diff": "@@ -53,6 +53,9 @@ public class OAuthErrorException extends Exception {\npublic static final String SLOW_DOWN = \"slow_down\";\npublic static final String EXPIRED_TOKEN = \"expired_token\";\n+ // CIBA\n+ public static final String INVALID_BINDING_MESSAGE = \"invalid_binding_message\";\n+\n// Others\npublic static final String INVALID_CLIENT = \"invalid_client\";\npublic static final String INVALID_GRANT = \"invalid_grant\";\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/endpoints/BackchannelAuthenticationEndpoint.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/ciba/endpoints/BackchannelAuthenticationEndpoint.java",
"diff": "@@ -54,6 +54,7 @@ import javax.ws.rs.core.Response;\nimport java.util.Collections;\nimport java.util.Optional;\n+import java.util.regex.Pattern;\nimport static org.keycloak.protocol.oidc.OIDCLoginProtocol.ID_TOKEN_HINT;\nimport static org.keycloak.protocol.oidc.OIDCLoginProtocol.LOGIN_HINT_PARAM;\n@@ -62,6 +63,8 @@ public class BackchannelAuthenticationEndpoint extends AbstractCibaEndpoint {\nprivate final RealmModel realm;\n+ private static final Pattern BINDING_MESSAGE_VALIDATION = Pattern.compile(\"^[a-zA-Z0-9-._+/!?#]{1,50}$\");\n+\npublic BackchannelAuthenticationEndpoint(KeycloakSession session, EventBuilder event) {\nsuper(session, event);\nthis.realm = session.getContext().getRealm();\n@@ -172,7 +175,10 @@ public class BackchannelAuthenticationEndpoint extends AbstractCibaEndpoint {\nrequest.setScope(scope);\n// optional parameters\n- if (endpointRequest.getBindingMessage() != null) request.setBindingMessage(endpointRequest.getBindingMessage());\n+ if (endpointRequest.getBindingMessage() != null) {\n+ validateBindingMessage(endpointRequest.getBindingMessage());\n+ request.setBindingMessage(endpointRequest.getBindingMessage());\n+ }\nif (endpointRequest.getAcr() != null) request.setAcrValues(endpointRequest.getAcr());\nCibaConfig policy = realm.getCibaPolicy();\n@@ -228,6 +234,13 @@ public class BackchannelAuthenticationEndpoint extends AbstractCibaEndpoint {\n}\n}\n+ protected void validateBindingMessage(String bindingMessage) {\n+ if (!BINDING_MESSAGE_VALIDATION.matcher(bindingMessage).matches()) {\n+ throw new ErrorResponseException(OAuthErrorException.INVALID_BINDING_MESSAGE, \"the binding_message value has to be max 50 characters in length and must contain only basic plain-text characters without spaces\",\n+ Response.Status.BAD_REQUEST);\n+ }\n+ }\n+\nprivate UserModel resolveUser(BackchannelAuthenticationEndpointRequest endpointRequest, String authRequestedUserHint) {\nCIBALoginUserResolver resolver = session.getProvider(CIBALoginUserResolver.class);\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Validation for CIBA binding_message parameter (#9470)
closes #9469 |
339,618 | 11.01.2022 12:05:41 | -3,600 | 4436fb3a18dd1779e9b7e196aa7395fea1687184 | Fixes outdated Readme
also changes the general readme and the themes folders readme, bc invoking the shell-script without arguments leads to help now instead of starting
Closes | [
{
"change_type": "MODIFY",
"old_path": "distribution/server-x-dist/src/main/README.md",
"new_path": "distribution/server-x-dist/src/main/README.md",
"diff": "Keycloak.X\n==========\n-To run on Linux/Unix:\n+To get help configuring Keycloak via the CLI, run:\n+\n+on Linux/Unix:\n$ bin/kc.sh\n-To run on Windows:\n+on Windows:\n$ bin\\kc.bat\n+To try Keycloak out in development mode, run:\n+\n+on Linux/Unix:\n+\n+ $ bin/kc.sh start-dev\n+\n+on Windows:\n+\n+ $ bin\\kc.bat start-dev\n+\nAfter the server boots, open http://localhost:8080 in your web browser. The welcome page will indicate that the server is running.\nTo get started, check the [Server Administration Guide](https://www.keycloak.org/docs/latest/server_admin).\n\\ No newline at end of file\n"
},
{
"change_type": "MODIFY",
"old_path": "distribution/server-x-dist/src/main/content/providers/README.md",
"new_path": "distribution/server-x-dist/src/main/content/providers/README.md",
"diff": "Installing Custom Providers\n===========================\n-You should add to this directory your custom provider JAR files.\n+Add your custom provider JAR files in this directory.\n-Once you have your providers in this directory you should run the following command to complete the installation:\n+Once you have your providers in this directory, run the following command to complete the installation:\n```\n-${kc.home.dir}/bin/kc.sh config\n+${kc.home.dir}/bin/kc.sh build\n```\n\\ No newline at end of file\n"
},
{
"change_type": "MODIFY",
"old_path": "distribution/server-x-dist/src/main/content/themes/README.md",
"new_path": "distribution/server-x-dist/src/main/content/themes/README.md",
"diff": "@@ -4,10 +4,10 @@ Creating Themes\nThemes are used to configure the look and feel of login pages and the account management console.\nCustom themes packaged in a JAR file should be deployed to the `${kc.home.dir}/providers` directory and you should run\n-the `config` command to install them prior to running the server.\n+the `build` command to install them prior to running the server.\n-You should also be able to create your custom themes in this directory, directly. Themes within this directory do not require\n-the `config` command to install them.\n+You are also able to create your custom themes in this directory, directly. Themes within this directory do not require\n+the `build` command to install them.\nWhen running the server in development mode, themes are not cached so that you can easily work on them without any need to restart\nthe server when making changes.\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Fixes outdated Readme
also changes the general readme and the themes folders readme, bc invoking the shell-script without arguments leads to help now instead of starting
Closes #9501 |
339,618 | 11.01.2022 19:11:59 | -3,600 | fe506bceaa2530703bb47a09065738c4aa228e4a | Change config ordinals and simpler keycloak.properties file
Closes | [
{
"change_type": "MODIFY",
"old_path": "distribution/server-x-dist/assembly.xml",
"new_path": "distribution/server-x-dist/assembly.xml",
"diff": "<source>target/keycloak-quarkus-server/cache-ispn.xml</source>\n<outputDirectory>conf</outputDirectory>\n</file>\n- <file>\n- <source>../../quarkus/runtime/src/main/resources/META-INF/keycloak.properties</source>\n- <outputDirectory>conf</outputDirectory>\n- </file>\n</files>\n</assembly>\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "distribution/server-x-dist/src/main/content/conf/keycloak.properties",
"diff": "+# Basic settings for running in production. Change accordingly before deploying the server.\n+# Database\n+#%prod.db=postgres\n+#%prod.db.username=keycloak\n+#%prod.db.password=password\n+#%prod.db.url=jdbc:postgresql://localhost/keycloak\n+# Observability\n+#%prod.metrics.enabled=true\n+# HTTP\n+#%prod.spi.hostname.frontend-url=https://localhost:8443\n+#%prod.https.certificate.file=${kc.home.dir}conf/server.crt.pem\n+#%prod.https.certificate.key-file=${kc.home.dir}conf/server.key.pem\n+#%prod.proxy=reencrypt\n+#%prod.hostname=myhostname\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/Environment.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/Environment.java",
"diff": "package org.keycloak.quarkus.runtime;\nimport static org.keycloak.quarkus.runtime.configuration.Configuration.getBuildTimeProperty;\n+import static org.keycloak.quarkus.runtime.configuration.Configuration.getConfig;\nimport java.io.File;\nimport java.io.FilenameFilter;\n@@ -108,6 +109,13 @@ public final class Environment {\nSystem.setProperty(ProfileManager.QUARKUS_TEST_PROFILE_PROP, profile);\n}\n}\n+ public static String getCurrentOrPersistedProfile() {\n+ String profile = getProfile();\n+ if(profile == null) {\n+ profile = getConfig().getRawValue(PROFILE);\n+ }\n+ return profile;\n+ }\npublic static String getProfileOrDefault(String defaultProfile) {\nString profile = getProfile();\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/command/ShowConfig.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/cli/command/ShowConfig.java",
"diff": "package org.keycloak.quarkus.runtime.cli.command;\n-import static org.keycloak.quarkus.runtime.configuration.Configuration.getBuildTimeProperty;\n+import static org.keycloak.quarkus.runtime.Environment.getCurrentOrPersistedProfile;\nimport static org.keycloak.quarkus.runtime.configuration.Configuration.getConfigValue;\nimport static org.keycloak.quarkus.runtime.configuration.Configuration.getPropertyNames;\nimport static org.keycloak.quarkus.runtime.configuration.mappers.PropertyMappers.canonicalFormat;\n@@ -33,7 +33,6 @@ import java.util.stream.StreamSupport;\nimport org.keycloak.quarkus.runtime.configuration.MicroProfileConfigProvider;\nimport org.keycloak.quarkus.runtime.configuration.PersistedConfigSource;\n-import org.keycloak.quarkus.runtime.Environment;\nimport io.quarkus.runtime.Quarkus;\nimport io.smallrye.config.ConfigValue;\n@@ -59,7 +58,7 @@ public final class ShowConfig extends AbstractCommand implements Runnable {\nif (configArgs != null) {\nMap<String, Set<String>> properties = getPropertiesByGroup();\n- String profile = getProfile();\n+ String profile = getCurrentOrPersistedProfile();\nprintRunTimeConfig(properties, profile);\n@@ -83,6 +82,7 @@ public final class ShowConfig extends AbstractCommand implements Runnable {\nspec.commandLine().getOut().printf(\"Current Profile: %s%n\", profile == null ? \"none\" : profile);\nspec.commandLine().getOut().println(\"Runtime Configuration:\");\n+\nproperties.get(MicroProfileConfigProvider.NS_KEYCLOAK).stream().sorted()\n.filter(name -> {\nString canonicalFormat = canonicalFormat(name);\n@@ -115,16 +115,6 @@ public final class ShowConfig extends AbstractCommand implements Runnable {\n}\n}\n- private static String getProfile() {\n- String profile = Environment.getProfile();\n-\n- if (profile == null) {\n- return getBuildTimeProperty(\"quarkus.profile\").orElse(null);\n- }\n-\n- return profile;\n- }\n-\nprivate static Map<String, Set<String>> getPropertiesByGroup() {\nMap<String, Set<String>> properties = StreamSupport\n.stream(getPropertyNames().spliterator(), false)\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/ConfigArgsConfigSource.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/ConfigArgsConfigSource.java",
"diff": "@@ -62,8 +62,7 @@ public class ConfigArgsConfigSource extends PropertiesConfigSource {\n}\nprotected ConfigArgsConfigSource() {\n- // higher priority over default Quarkus config sources\n- super(parseArgument(), \"CliConfigSource\", 500);\n+ super(parseArgument(), \"CliConfigSource\", 600);\n}\npublic static void setCliArgs(String[] args) {\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/KcEnvConfigSource.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/KcEnvConfigSource.java",
"diff": "@@ -27,6 +27,10 @@ import io.smallrye.config.EnvConfigSource;\npublic class KcEnvConfigSource extends EnvConfigSource {\n+ public KcEnvConfigSource() {\n+ super(buildProperties(), 500);\n+ }\n+\nprivate static Map<String, String> buildProperties() {\nMap<String, String> properties = new HashMap<>();\n@@ -40,10 +44,7 @@ public class KcEnvConfigSource extends EnvConfigSource {\nreturn properties;\n}\n- public KcEnvConfigSource() {\n- super(buildProperties(), 350);\n- }\n-\n+ @Override\npublic String getName() {\nreturn \"KcEnvVarConfigSource\";\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/KeycloakPropertiesConfigSource.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/KeycloakPropertiesConfigSource.java",
"diff": "@@ -68,7 +68,7 @@ public class KeycloakPropertiesConfigSource extends AbstractLocationConfigSource\n@Override\npublic List<ConfigSource> getConfigSources(final ClassLoader classLoader) {\n- return loadConfigSources(\"META-INF/keycloak.properties\", 240, classLoader);\n+ return loadConfigSources(\"META-INF/keycloak.properties\", 150, classLoader);\n}\n@Override\n@@ -104,7 +104,7 @@ public class KeycloakPropertiesConfigSource extends AbstractLocationConfigSource\nreturn Collections.emptyList();\n}\n- return loadConfigSources(configFile.toUri().toString(), 250, classLoader);\n+ return loadConfigSources(configFile.toUri().toString(), 450, classLoader);\n}\n@Override\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/MicroProfileConfigProvider.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/MicroProfileConfigProvider.java",
"diff": "@@ -32,7 +32,6 @@ public class MicroProfileConfigProvider implements Config.ConfigProvider {\npublic static final String NS_KEYCLOAK = \"kc\";\npublic static final String NS_KEYCLOAK_PREFIX = NS_KEYCLOAK + \".\";\npublic static final String NS_QUARKUS = \"quarkus\";\n- public static final String NS_QUARKUS_PREFIX = NS_QUARKUS + \".\";\nprivate final org.eclipse.microprofile.config.Config config;\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/PersistedConfigSource.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/PersistedConfigSource.java",
"diff": "@@ -44,7 +44,7 @@ public final class PersistedConfigSource extends PropertiesConfigSource {\nprivate static final PersistedConfigSource INSTANCE = new PersistedConfigSource();\nprivate PersistedConfigSource() {\n- super(readProperties(), \"\", 300);\n+ super(readProperties(), \"\", 200);\n}\npublic static PersistedConfigSource getInstance() {\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/SysPropConfigSource.java",
"new_path": "quarkus/runtime/src/main/java/org/keycloak/quarkus/runtime/configuration/SysPropConfigSource.java",
"diff": "@@ -60,6 +60,6 @@ public class SysPropConfigSource implements ConfigSource {\n@Override\npublic int getOrdinal() {\n- return 400;\n+ return 550;\n}\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/runtime/src/main/resources/META-INF/keycloak.properties",
"new_path": "quarkus/runtime/src/main/resources/META-INF/keycloak.properties",
"diff": "@@ -9,21 +9,6 @@ http.enabled=false\n# Metrics and healthcheck are disabled by default\nmetrics.enabled=false\n-# Basic settings for running in production. Change accordingly before deploying the server.\n-# Database\n-#%prod.db=postgres\n-#%prod.db.username=keycloak\n-#%prod.db.password=password\n-#%prod.db.url=jdbc:postgresql://localhost/keycloak\n-# Observability\n-#%prod.metrics.enabled=true\n-# HTTP\n-#%prod.spi.hostname.frontend-url=https://localhost:8443\n-#%prod.https.certificate.file=${kc.home.dir}conf/server.crt.pem\n-#%prod.https.certificate.key-file=${kc.home.dir}conf/server.key.pem\n-#%prod.proxy=reencrypt\n-#%prod.hostname=myhostname\n-\n# Default, and insecure, and non-production grade configuration for the development profile\n%dev.http.enabled=true\n%dev.hostname.strict=false\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Change config ordinals and simpler keycloak.properties file
Closes #9473 |
339,421 | 12.01.2022 09:22:01 | -3,600 | 93419a1797d0e24fc149a26f3cbac2e919d4245a | check if values to set is not null
Closes | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/models/jpa/UserAdapter.java",
"new_path": "model/jpa/src/main/java/org/keycloak/models/jpa/UserAdapter.java",
"diff": "@@ -175,10 +175,12 @@ public class UserAdapter implements UserModel.Streams, JpaModel<UserEntity> {\n}\n// Remove all existing\nremoveAttribute(name);\n+ if (values != null) {\nfor (Iterator<String> it = values.stream().filter(Objects::nonNull).iterator(); it.hasNext();) {\npersistAttributeValue(name, it.next());\n}\n}\n+ }\nprivate void persistAttributeValue(String name, String value) {\nUserAttributeEntity attr = new UserAttributeEntity();\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19289 check if values to set is not null (#8426)
Closes #9529 |
339,425 | 12.01.2022 14:27:24 | -3,600 | 8ea09d38168c22937363cf77a07f9de5dc7b48b0 | [fixes - Let users configure Dynamic Client Scopes | [
{
"change_type": "MODIFY",
"old_path": "common/src/main/java/org/keycloak/common/Profile.java",
"new_path": "common/src/main/java/org/keycloak/common/Profile.java",
"diff": "@@ -64,7 +64,8 @@ public class Profile {\nCIBA(Type.DEFAULT),\nMAP_STORAGE(Type.EXPERIMENTAL),\nPAR(Type.DEFAULT),\n- DECLARATIVE_USER_PROFILE(Type.PREVIEW);\n+ DECLARATIVE_USER_PROFILE(Type.PREVIEW),\n+ DYNAMIC_SCOPES(Type.EXPERIMENTAL);\nprivate final Type typeProject;\nprivate final Type typeProduct;\n"
},
{
"change_type": "MODIFY",
"old_path": "common/src/test/java/org/keycloak/common/ProfileTest.java",
"new_path": "common/src/test/java/org/keycloak/common/ProfileTest.java",
"diff": "@@ -21,7 +21,7 @@ public class ProfileTest {\n@Test\npublic void checkDefaultsKeycloak() {\nAssert.assertEquals(\"community\", Profile.getName());\n- assertEquals(Profile.getDisabledFeatures(), Profile.Feature.ADMIN_FINE_GRAINED_AUTHZ, Profile.Feature.ADMIN2, Profile.Feature.DOCKER, Profile.Feature.SCRIPTS, Profile.Feature.TOKEN_EXCHANGE, Profile.Feature.OPENSHIFT_INTEGRATION, Profile.Feature.UPLOAD_SCRIPTS, Profile.Feature.MAP_STORAGE, Profile.Feature.DECLARATIVE_USER_PROFILE);\n+ assertEquals(Profile.getDisabledFeatures(), Profile.Feature.ADMIN_FINE_GRAINED_AUTHZ, Profile.Feature.DYNAMIC_SCOPES, Profile.Feature.ADMIN2, Profile.Feature.DOCKER, Profile.Feature.SCRIPTS, Profile.Feature.TOKEN_EXCHANGE, Profile.Feature.OPENSHIFT_INTEGRATION, Profile.Feature.UPLOAD_SCRIPTS, Profile.Feature.MAP_STORAGE, Profile.Feature.DECLARATIVE_USER_PROFILE);\nassertEquals(Profile.getPreviewFeatures(), Profile.Feature.ADMIN_FINE_GRAINED_AUTHZ, Profile.Feature.SCRIPTS, Profile.Feature.TOKEN_EXCHANGE, Profile.Feature.OPENSHIFT_INTEGRATION, Profile.Feature.DECLARATIVE_USER_PROFILE);\nassertEquals(Profile.getDeprecatedFeatures(), Profile.Feature.UPLOAD_SCRIPTS);\n@@ -37,7 +37,7 @@ public class ProfileTest {\nProfile.init();\nAssert.assertEquals(\"product\", Profile.getName());\n- assertEquals(Profile.getDisabledFeatures(), Profile.Feature.ADMIN_FINE_GRAINED_AUTHZ, Profile.Feature.ADMIN2, Profile.Feature.DOCKER, Profile.Feature.SCRIPTS, Profile.Feature.TOKEN_EXCHANGE, Profile.Feature.OPENSHIFT_INTEGRATION, Profile.Feature.UPLOAD_SCRIPTS, Profile.Feature.WEB_AUTHN, Profile.Feature.MAP_STORAGE, Profile.Feature.DECLARATIVE_USER_PROFILE);\n+ assertEquals(Profile.getDisabledFeatures(), Profile.Feature.ADMIN_FINE_GRAINED_AUTHZ, Profile.Feature.DYNAMIC_SCOPES, Profile.Feature.ADMIN2, Profile.Feature.DOCKER, Profile.Feature.SCRIPTS, Profile.Feature.TOKEN_EXCHANGE, Profile.Feature.OPENSHIFT_INTEGRATION, Profile.Feature.UPLOAD_SCRIPTS, Profile.Feature.WEB_AUTHN, Profile.Feature.MAP_STORAGE, Profile.Feature.DECLARATIVE_USER_PROFILE);\nassertEquals(Profile.getPreviewFeatures(), Profile.Feature.ADMIN_FINE_GRAINED_AUTHZ, Profile.Feature.SCRIPTS, Profile.Feature.TOKEN_EXCHANGE, Profile.Feature.OPENSHIFT_INTEGRATION, Profile.Feature.WEB_AUTHN, Profile.Feature.DECLARATIVE_USER_PROFILE);\nassertEquals(Profile.getDeprecatedFeatures(), Profile.Feature.UPLOAD_SCRIPTS);\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testBuildHelp.approved.txt",
"new_path": "quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testBuildHelp.approved.txt",
"diff": "Binary files a/quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testBuildHelp.approved.txt and b/quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testBuildHelp.approved.txt differ\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testBuildHelpAll.approved.txt",
"new_path": "quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testBuildHelpAll.approved.txt",
"diff": "Binary files a/quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testBuildHelpAll.approved.txt and b/quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testBuildHelpAll.approved.txt differ\n"
},
{
"change_type": "MODIFY",
"old_path": "quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testStartDevHelpAll.approved.txt",
"new_path": "quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testStartDevHelpAll.approved.txt",
"diff": "Binary files a/quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testStartDevHelpAll.approved.txt and b/quarkus/tests/integration/src/test/resources/org/keycloak/it/cli/approvals/cli/help/HelpCommandTest.testStartDevHelpAll.approved.txt differ\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/models/delegate/ClientModelLazyDelegate.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/models/delegate/ClientModelLazyDelegate.java",
"diff": "@@ -508,6 +508,21 @@ public class ClientModelLazyDelegate implements ClientModel {\ngetDelegate().setIncludeInTokenScope(includeInTokenScope);\n}\n+ @Override\n+ public boolean isDynamicScope() {\n+ return getDelegate().isDynamicScope();\n+ }\n+\n+ @Override\n+ public void setIsDynamicScope(boolean isDynamicScope) {\n+ getDelegate().setIsDynamicScope(isDynamicScope);\n+ }\n+\n+ @Override\n+ public String getDynamicScopeRegexp() {\n+ return getDelegate().getDynamicScopeRegexp();\n+ }\n+\n@Override\npublic Set<RoleModel> getScopeMappings() {\nreturn getDelegate().getScopeMappings();\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/models/ClientScopeModel.java",
"new_path": "server-spi/src/main/java/org/keycloak/models/ClientScopeModel.java",
"diff": "package org.keycloak.models;\nimport java.util.Map;\n+import java.util.Optional;\nimport org.keycloak.common.util.ObjectUtil;\nimport org.keycloak.provider.ProviderEvent;\n@@ -67,6 +68,8 @@ public interface ClientScopeModel extends ProtocolMapperContainerModel, ScopeCon\nString CONSENT_SCREEN_TEXT = \"consent.screen.text\";\nString GUI_ORDER = \"gui.order\";\nString INCLUDE_IN_TOKEN_SCOPE = \"include.in.token.scope\";\n+ String IS_DYNAMIC_SCOPE = \"is.dynamic.scope\";\n+ String DYNAMIC_SCOPE_REGEXP = \"dynamic.scope.regexp\";\ndefault boolean isDisplayOnConsentScreen() {\nString displayVal = getAttribute(DISPLAY_ON_CONSENT_SCREEN);\n@@ -107,4 +110,16 @@ public interface ClientScopeModel extends ProtocolMapperContainerModel, ScopeCon\ndefault void setIncludeInTokenScope(boolean includeInTokenScope) {\nsetAttribute(INCLUDE_IN_TOKEN_SCOPE, String.valueOf(includeInTokenScope));\n}\n+\n+ default boolean isDynamicScope() {\n+ return Optional.ofNullable(getAttribute(IS_DYNAMIC_SCOPE)).isPresent();\n+ }\n+\n+ default void setIsDynamicScope(boolean isDynamicScope) {\n+ setAttribute(IS_DYNAMIC_SCOPE, String.valueOf(isDynamicScope));\n+ }\n+\n+ default String getDynamicScopeRegexp() {\n+ return getAttribute(DYNAMIC_SCOPE_REGEXP);\n+ }\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/admin/ClientScopeResource.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/admin/ClientScopeResource.java",
"diff": "@@ -19,6 +19,8 @@ package org.keycloak.services.resources.admin;\nimport org.jboss.logging.Logger;\nimport org.jboss.resteasy.annotations.cache.NoCache;\nimport org.jboss.resteasy.spi.ResteasyProviderFactory;\n+import org.keycloak.common.Profile;\n+import org.keycloak.events.Errors;\nimport org.keycloak.events.admin.OperationType;\nimport org.keycloak.events.admin.ResourceType;\nimport org.keycloak.models.ClientScopeModel;\n@@ -29,7 +31,9 @@ import org.keycloak.models.RealmModel;\nimport org.keycloak.models.utils.ModelToRepresentation;\nimport org.keycloak.models.utils.RepresentationToModel;\nimport org.keycloak.representations.idm.ClientScopeRepresentation;\n+import org.keycloak.saml.common.util.StringUtil;\nimport org.keycloak.services.ErrorResponse;\n+import org.keycloak.services.ErrorResponseException;\nimport org.keycloak.services.resources.admin.permissions.AdminPermissionEvaluator;\nimport javax.ws.rs.Consumes;\n@@ -41,6 +45,10 @@ import javax.ws.rs.Produces;\nimport javax.ws.rs.core.MediaType;\nimport javax.ws.rs.core.Response;\n+import java.util.Map;\n+import java.util.Optional;\n+import java.util.regex.Pattern;\n+\n/**\n* Base resource class for managing one particular client of a realm.\n@@ -56,6 +64,7 @@ public class ClientScopeResource {\nprivate AdminEventBuilder adminEvent;\nprotected ClientScopeModel clientScope;\nprotected KeycloakSession session;\n+ protected static Pattern dynamicScreenPattern = Pattern.compile(\"[^\\\\s\\\\*]*\\\\*{1}[^\\\\s\\\\*]*\");\npublic ClientScopeResource(RealmModel realm, AdminPermissionEvaluator auth, ClientScopeModel clientScope, KeycloakSession session, AdminEventBuilder adminEvent) {\nthis.realm = realm;\n@@ -96,7 +105,7 @@ public class ClientScopeResource {\n@Consumes(MediaType.APPLICATION_JSON)\npublic Response update(final ClientScopeRepresentation rep) {\nauth.clients().requireManageClientScopes();\n-\n+ validateDynamicClientScope(rep);\ntry {\nRepresentationToModel.updateClientScope(rep, clientScope);\nadminEvent.operation(OperationType.UPDATE).resourcePath(session.getContext().getUri()).representation(rep).success();\n@@ -143,4 +152,41 @@ public class ClientScopeResource {\nreturn ErrorResponse.error(me.getMessage(), Response.Status.BAD_REQUEST);\n}\n}\n+\n+ /**\n+ * Performs some validation based on attributes combinations and format.\n+ * Validations differ based on whether the DYNAMIC_SCOPES feature is enabled or not\n+ * @param clientScope\n+ * @throws ErrorResponseException\n+ */\n+ public static void validateDynamicClientScope(ClientScopeRepresentation clientScope) throws ErrorResponseException {\n+ if(clientScope.getAttributes() == null) {\n+ return;\n+ }\n+ boolean isDynamic = Boolean.parseBoolean(clientScope.getAttributes().get(ClientScopeModel.IS_DYNAMIC_SCOPE));\n+ String regexp = clientScope.getAttributes().get(ClientScopeModel.DYNAMIC_SCOPE_REGEXP);\n+ if(Profile.isFeatureEnabled(Profile.Feature.DYNAMIC_SCOPES)) {\n+ // if the scope is dynamic but the regexp is empty, it's not considered valid\n+ if(isDynamic && StringUtil.isNullOrEmpty(regexp)) {\n+ throw new ErrorResponseException(ErrorResponse.error(\"Dynamic scope regexp must not be null or empty\", Response.Status.BAD_REQUEST));\n+ }\n+ // Always validate the dynamic scope regexp to avoid inserting a wrong value even when the feature is disabled\n+ if(!StringUtil.isNullOrEmpty(regexp) && !dynamicScreenPattern.matcher(regexp).matches()) {\n+ throw new ErrorResponseException(ErrorResponse.error(String.format(\"Invalid format for the Dynamic Scope regexp %1s\", regexp), Response.Status.BAD_REQUEST));\n+ }\n+ } else {\n+ // if the value is not null or empty we won't accept the request as the feature is disabled\n+ Optional.ofNullable(regexp).ifPresent(s -> {\n+ if(!s.isEmpty()) {\n+ throw new ErrorResponseException(ErrorResponse.error(String.format(\"Unexpected value \\\"%1s\\\" for attribute %2s in ClientScope\",\n+ regexp, ClientScopeModel.DYNAMIC_SCOPE_REGEXP), Response.Status.BAD_REQUEST));\n+ }\n+ });\n+ // If isDynamic is true, we won't accept the request as the feature is disabled\n+ if(isDynamic) {\n+ throw new ErrorResponseException(ErrorResponse.error(String.format(\"Unexpected value \\\"%1s\\\" for attribute %2s in ClientScope\",\n+ isDynamic, ClientScopeModel.IS_DYNAMIC_SCOPE), Response.Status.BAD_REQUEST));\n+ }\n+ }\n+ }\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/services/resources/admin/ClientScopesResource.java",
"new_path": "services/src/main/java/org/keycloak/services/resources/admin/ClientScopesResource.java",
"diff": "@@ -94,7 +94,7 @@ public class ClientScopesResource {\n@NoCache\npublic Response createClientScope(ClientScopeRepresentation rep) {\nauth.clients().requireManageClientScopes();\n-\n+ ClientScopeResource.validateDynamicClientScope(rep);\ntry {\nClientScopeModel clientModel = RepresentationToModel.createClientScope(session, realm, rep);\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/client/ClientScopeTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/client/ClientScopeTest.java",
"diff": "@@ -24,10 +24,12 @@ import org.keycloak.admin.client.resource.ClientScopesResource;\nimport org.keycloak.admin.client.resource.ProtocolMappersResource;\nimport org.keycloak.admin.client.resource.RealmResource;\nimport org.keycloak.admin.client.resource.RoleMappingResource;\n+import org.keycloak.common.Profile;\nimport org.keycloak.common.util.ObjectUtil;\nimport org.keycloak.events.admin.OperationType;\nimport org.keycloak.events.admin.ResourceType;\nimport org.keycloak.models.AccountRoles;\n+import org.keycloak.models.ClientScopeModel;\nimport org.keycloak.models.Constants;\nimport org.keycloak.protocol.oidc.OIDCLoginProtocol;\nimport org.keycloak.protocol.saml.SamlProtocol;\n@@ -38,15 +40,19 @@ import org.keycloak.representations.idm.MappingsRepresentation;\nimport org.keycloak.representations.idm.ProtocolMapperRepresentation;\nimport org.keycloak.representations.idm.RoleRepresentation;\nimport org.keycloak.testsuite.admin.ApiUtil;\n+import org.keycloak.testsuite.arquillian.annotation.DisableFeature;\n+import org.keycloak.testsuite.arquillian.annotation.EnableFeature;\nimport org.keycloak.testsuite.util.AdminEventPaths;\nimport org.keycloak.testsuite.util.ClientBuilder;\nimport org.keycloak.testsuite.util.Matchers;\nimport org.keycloak.testsuite.util.RoleBuilder;\n+import org.keycloak.util.JsonSerialization;\nimport javax.ws.rs.ClientErrorException;\nimport javax.ws.rs.NotFoundException;\nimport javax.ws.rs.core.Response;\nimport javax.ws.rs.core.Response.Status;\n+import java.io.IOException;\nimport java.util.Collections;\nimport java.util.HashMap;\nimport java.util.List;\n@@ -58,6 +64,7 @@ import static org.junit.Assert.assertEquals;\nimport static org.junit.Assert.assertFalse;\nimport static org.junit.Assert.assertThat;\nimport static org.junit.Assert.assertTrue;\n+import static org.junit.Assert.fail;\nimport static org.keycloak.testsuite.Assert.assertNames;\n/**\n@@ -653,6 +660,99 @@ public class ClientScopeTest extends AbstractClientTest {\ntestRealmResource().clients().get(clientUuid).update(clientRep);\n}\n+ @Test\n+ @EnableFeature(value = Profile.Feature.DYNAMIC_SCOPES, skipRestart = true)\n+ public void testCreateValidDynamicScope() {\n+ ClientScopeRepresentation scopeRep = new ClientScopeRepresentation();\n+ scopeRep.setName(\"dynamic-scope-def\");\n+ scopeRep.setProtocol(\"openid-connect\");\n+ scopeRep.setAttributes(new HashMap<String, String>(){{\n+ put(ClientScopeModel.IS_DYNAMIC_SCOPE, \"true\");\n+ put(ClientScopeModel.DYNAMIC_SCOPE_REGEXP, \"dynamic-scope-def:*\");\n+ }});\n+ String scopeDefId = createClientScope(scopeRep);\n+ getCleanup().addClientScopeId(scopeDefId);\n+\n+ // Assert updated attributes\n+ scopeRep = clientScopes().get(scopeDefId).toRepresentation();\n+ assertEquals(\"dynamic-scope-def\", scopeRep.getName());\n+ assertEquals(\"true\", scopeRep.getAttributes().get(ClientScopeModel.IS_DYNAMIC_SCOPE));\n+ assertEquals(\"dynamic-scope-def:*\", scopeRep.getAttributes().get(ClientScopeModel.DYNAMIC_SCOPE_REGEXP));\n+ }\n+\n+ @Test\n+ @EnableFeature(value = Profile.Feature.DYNAMIC_SCOPES, skipRestart = true)\n+ public void testCreateNonDynamicScopeWithFeatureEnabled() {\n+ ClientScopeRepresentation scopeRep = new ClientScopeRepresentation();\n+ scopeRep.setName(\"non-dynamic-scope-def\");\n+ scopeRep.setProtocol(\"openid-connect\");\n+ scopeRep.setAttributes(new HashMap<String, String>(){{\n+ put(ClientScopeModel.IS_DYNAMIC_SCOPE, \"false\");\n+ put(ClientScopeModel.DYNAMIC_SCOPE_REGEXP, \"\");\n+ }});\n+ String scopeDefId = createClientScope(scopeRep);\n+ getCleanup().addClientScopeId(scopeDefId);\n+\n+ // Assert updated attributes\n+ scopeRep = clientScopes().get(scopeDefId).toRepresentation();\n+ assertEquals(\"non-dynamic-scope-def\", scopeRep.getName());\n+ assertEquals(\"false\", scopeRep.getAttributes().get(ClientScopeModel.IS_DYNAMIC_SCOPE));\n+ assertEquals(\"\", scopeRep.getAttributes().get(ClientScopeModel.DYNAMIC_SCOPE_REGEXP));\n+ }\n+\n+ @Test\n+ @DisableFeature(value = Profile.Feature.DYNAMIC_SCOPES, skipRestart = true)\n+ public void testCreateDynamicScopeWithFeatureDisabledAndIsDynamicScopeTrue() {\n+ ClientScopeRepresentation scopeRep = new ClientScopeRepresentation();\n+ scopeRep.setName(\"non-dynamic-scope-def2\");\n+ scopeRep.setProtocol(\"openid-connect\");\n+ scopeRep.setAttributes(new HashMap<String, String>(){{\n+ put(ClientScopeModel.IS_DYNAMIC_SCOPE, \"true\");\n+ put(ClientScopeModel.DYNAMIC_SCOPE_REGEXP, \"\");\n+ }});\n+ handleExpectedCreateFailure(scopeRep, 400, \"Unexpected value \\\"true\\\" for attribute is.dynamic.scope in ClientScope\");\n+ }\n+\n+ @Test\n+ @DisableFeature(value = Profile.Feature.DYNAMIC_SCOPES, skipRestart = true)\n+ public void testCreateDynamicScopeWithFeatureDisabledAndNonEmptyDynamicScopeRegexp() {\n+ ClientScopeRepresentation scopeRep = new ClientScopeRepresentation();\n+ scopeRep.setName(\"non-dynamic-scope-def3\");\n+ scopeRep.setProtocol(\"openid-connect\");\n+ scopeRep.setAttributes(new HashMap<String, String>(){{\n+ put(ClientScopeModel.IS_DYNAMIC_SCOPE, \"false\");\n+ put(ClientScopeModel.DYNAMIC_SCOPE_REGEXP, \"not-empty\");\n+ }});\n+ handleExpectedCreateFailure(scopeRep, 400, \"Unexpected value \\\"not-empty\\\" for attribute dynamic.scope.regexp in ClientScope\");\n+ }\n+\n+ @Test\n+ @EnableFeature(value = Profile.Feature.DYNAMIC_SCOPES, skipRestart = true)\n+ public void testCreateInvalidRegexpDynamicScope() {\n+ ClientScopeRepresentation scopeRep = new ClientScopeRepresentation();\n+ scopeRep.setName(\"dynamic-scope-def4\");\n+ scopeRep.setProtocol(\"openid-connect\");\n+ scopeRep.setAttributes(new HashMap<String, String>(){{\n+ put(ClientScopeModel.IS_DYNAMIC_SCOPE, \"true\");\n+ put(ClientScopeModel.DYNAMIC_SCOPE_REGEXP, \"dynamic-scope-def:*:*\");\n+ }});\n+ handleExpectedCreateFailure(scopeRep, 400, \"Invalid format for the Dynamic Scope regexp dynamic-scope-def:*:*\");\n+ }\n+\n+ private void handleExpectedCreateFailure(ClientScopeRepresentation scopeRep, int expectedErrorCode, String expectedErrorMessage) {\n+ try(Response resp = clientScopes().create(scopeRep)) {\n+ Assert.assertEquals(expectedErrorCode, resp.getStatus());\n+ String respBody = resp.readEntity(String.class);\n+ Map<String, String> responseJson = null;\n+ try {\n+ responseJson = JsonSerialization.readValue(respBody, Map.class);\n+ Assert.assertEquals(expectedErrorMessage, responseJson.get(\"errorMessage\"));\n+ } catch (IOException e) {\n+ fail(\"Failed to extract the errorMessage from a CreateScope Response\");\n+ }\n+ }\n+ }\n+\nprivate ClientScopesResource clientScopes() {\nreturn testRealmResource().clientScopes();\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"new_path": "themes/src/main/resources/theme/base/admin/messages/admin-messages_en.properties",
"diff": "@@ -1163,6 +1163,10 @@ client-scope.gui-order=GUI order\nclient-scope.gui-order.tooltip=Specify order of the provider in GUI (such as in Consent page) as integer\nclient-scope.include-in-token-scope=Include In Token Scope\nclient-scope.include-in-token-scope.tooltip=If on, the name of this client scope will be added to the access token property 'scope' as well as to the Token Introspection Endpoint response. If off, this client scope will be omitted from the token and from the Token Introspection Endpoint response.\n+client-scope.is-dynamic-scope=Dynamic Scope\n+client-scope.is-dynamic-scope.tooltip=If on, this scope will be considered a Dynamic Scope, which will be comprised of a static and a variable portion.\n+client-scope.dynamic-scope-regexp=Dynamic Scope Format\n+client-scope.dynamic-scope-regexp.tooltip=This is the regular expression that the system will use to extract the scope name and variable.\nadd-user-federation-provider=Add user federation provider\nadd-user-storage-provider=Add user storage provider\n"
},
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/js/controllers/clients.js",
"new_path": "themes/src/main/resources/theme/base/admin/resources/js/controllers/clients.js",
"diff": "@@ -3262,6 +3262,20 @@ module.controller('ClientScopeDetailCtrl', function($scope, realm, clientScope,\n$scope.displayOnConsentScreen = true;\n}\n+ if(serverInfo.featureEnabled(\"DYNAMIC_SCOPES\")) {\n+ if ($scope.clientScope.attributes[\"is.dynamic.scope\"]) {\n+ if ($scope.clientScope.attributes[\"is.dynamic.scope\"] === \"true\") {\n+ $scope.isDynamicScope = true;\n+ } else {\n+ $scope.isDynamicScope = false;\n+ }\n+ } else {\n+ $scope.isDynamicScope = false;\n+ }\n+\n+ $scope.clientScope.attributes[\"dynamic.scope.regexp\"] = $scope.clientScope.name + \":*\";\n+ }\n+\nif ($scope.clientScope.attributes[\"include.in.token.scope\"]) {\nif ($scope.clientScope.attributes[\"include.in.token.scope\"] == \"true\") {\n$scope.includeInTokenScope = true;\n@@ -3320,6 +3334,14 @@ module.controller('ClientScopeDetailCtrl', function($scope, realm, clientScope,\n$scope.clientScope.attributes[\"display.on.consent.screen\"] = \"false\";\n}\n+ if(serverInfo.featureEnabled(\"DYNAMIC_SCOPES\")) {\n+ if ($scope.isDynamicScope === true) {\n+ $scope.clientScope.attributes[\"is.dynamic.scope\"] = \"true\";\n+ } else {\n+ $scope.clientScope.attributes[\"is.dynamic.scope\"] = \"false\";\n+ }\n+ }\n+\nif ($scope.includeInTokenScope == true) {\n$scope.clientScope.attributes[\"include.in.token.scope\"] = \"true\";\n} else {\n"
},
{
"change_type": "MODIFY",
"old_path": "themes/src/main/resources/theme/base/admin/resources/partials/client-scope-detail.html",
"new_path": "themes/src/main/resources/theme/base/admin/resources/partials/client-scope-detail.html",
"diff": "</div>\n<kc-tooltip>{{:: 'client-scope.name.tooltip' | translate}}</kc-tooltip>\n</div>\n+ <div class=\"form-group clearfix block\" data-ng-show=\"serverInfo.featureEnabled('DYNAMIC_SCOPES') && protocol === 'openid-connect'\">\n+ <label class=\"col-md-2 control-label\" for=\"isDynamicScope\">{{:: 'client-scope.is-dynamic-scope' | translate}}</label>\n+ <div class=\"col-sm-6\">\n+ <input ng-model=\"isDynamicScope\" ng-click=\"switchChange()\" name=\"isDynamicScope\" id=\"isDynamicScope\" onoffswitch on-text=\"{{:: 'onText' | translate}}\" off-text=\"{{:: 'offText' | translate}}\"/>\n+ </div>\n+ <kc-tooltip>{{:: 'client-scope.is-dynamic-scope.tooltip' | translate}}</kc-tooltip>\n+ </div>\n+ <div class=\"form-group\" data-ng-show=\"protocol === 'openid-connect' && isDynamicScope && serverInfo.featureEnabled('DYNAMIC_SCOPES')\">\n+ <label class=\"col-md-2 control-label\" for=\"dynamicScopeRegExp\">{{:: 'client-scope.dynamic-scope-regexp' | translate}} <span class=\"required\">*</span></label>\n+ <div class=\"col-sm-6\">\n+ <input class=\"form-control\" ng-readonly=\"true\" type=\"text\"\n+ ng-value=\"(isDynamicScope && serverInfo.featureEnabled('DYNAMIC_SCOPES')) ? clientScope.attributes['dynamic.scope.regexp'] = clientScope.name+':*' : ''\"\n+ id=\"dynamicScopeRegExp\" name=\"dynamicScopeRegExp\"\n+ data-ng-model=\"clientScope.attributes['dynamic.scope.regexp']\" autofocus ng-disabled=\"!isDynamicScope\"\n+ ng-required=\"isDynamicScope\">\n+ </div>\n+ <kc-tooltip>{{:: 'client-scope.dynamic-scope-regexp.tooltip' | translate}}</kc-tooltip>\n+ </div>\n<div class=\"form-group\">\n<label class=\"col-md-2 control-label\" for=\"description\">{{:: 'description' | translate}} </label>\n<div class=\"col-sm-6\">\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | [fixes #9222] - Let users configure Dynamic Client Scopes (#9327) |
339,487 | 10.01.2022 17:42:36 | 10,800 | 2fd1593abfb2f81268ab68218fc2b2e1598366c0 | Set order of LiquibaseDBLockProviderFactory to 1
makes it the default provider when no provider is explicitly configured
avoid NPE at server startup when other providers are present and none is set as default | [
{
"change_type": "MODIFY",
"old_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/lock/LiquibaseDBLockProviderFactory.java",
"new_path": "model/jpa/src/main/java/org/keycloak/connections/jpa/updater/liquibase/lock/LiquibaseDBLockProviderFactory.java",
"diff": "@@ -30,6 +30,7 @@ import org.keycloak.models.dblock.DBLockProviderFactory;\npublic class LiquibaseDBLockProviderFactory implements DBLockProviderFactory {\nprivate static final Logger logger = Logger.getLogger(LiquibaseDBLockProviderFactory.class);\n+ public static final int PROVIDER_PRIORITY = 1;\nprivate long lockWaitTimeoutMillis;\n@@ -68,4 +69,9 @@ public class LiquibaseDBLockProviderFactory implements DBLockProviderFactory {\npublic String getId() {\nreturn \"jpa\";\n}\n+\n+ @Override\n+ public int order() {\n+ return PROVIDER_PRIORITY;\n+ }\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Set order of LiquibaseDBLockProviderFactory to 1
- makes it the default provider when no provider is explicitly configured
- avoid NPE at server startup when other providers are present and none is set as default |
339,138 | 13.01.2022 18:47:15 | -10,800 | 02d544b57be7c9b67a91e93732eb463f1cdd45e3 | Multiple warnings caused by typed varargs in TokenVerifier | [
{
"change_type": "MODIFY",
"old_path": "core/src/main/java/org/keycloak/TokenVerifier.java",
"new_path": "core/src/main/java/org/keycloak/TokenVerifier.java",
"diff": "@@ -224,7 +224,7 @@ public class TokenVerifier<T extends JsonWebToken> {\n* @return\n*/\npublic static <T extends JsonWebToken> TokenVerifier<T> create(String tokenString, Class<T> clazz) {\n- return new TokenVerifier(tokenString, clazz);\n+ return new TokenVerifier<>(tokenString, clazz);\n}\n/**\n@@ -237,7 +237,7 @@ public class TokenVerifier<T extends JsonWebToken> {\n* @return\n*/\npublic static <T extends JsonWebToken> TokenVerifier<T> createWithoutSignature(T token) {\n- return new TokenVerifier(token);\n+ return new TokenVerifier<>(token);\n}\n/**\n@@ -271,6 +271,7 @@ public class TokenVerifier<T extends JsonWebToken> {\nchecks.remove(check);\n}\n+ @SuppressWarnings(\"unchecked\")\nprivate <P extends Predicate<? super T>> TokenVerifier<T> replaceCheck(Class<? extends Predicate<?>> checkClass, boolean active, P... predicate) {\nremoveCheck(checkClass);\nif (active) {\n@@ -279,6 +280,7 @@ public class TokenVerifier<T extends JsonWebToken> {\nreturn this;\n}\n+ @SuppressWarnings(\"unchecked\")\nprivate <P extends Predicate<? super T>> TokenVerifier<T> replaceCheck(Predicate<? super T> check, boolean active, P... predicate) {\nremoveCheck(check);\nif (active) {\n@@ -292,7 +294,8 @@ public class TokenVerifier<T extends JsonWebToken> {\n* @param checks\n* @return\n*/\n- public TokenVerifier<T> withChecks(Predicate<? super T>... checks) {\n+ @SafeVarargs\n+ public final TokenVerifier<T> withChecks(Predicate<? super T>... checks) {\nif (checks != null) {\nthis.checks.addAll(Arrays.asList(checks));\n}\n@@ -509,6 +512,7 @@ public class TokenVerifier<T extends JsonWebToken> {\n* @param predicates\n* @return\n*/\n+ @SafeVarargs\npublic static <T extends JsonWebToken> Predicate<T> alternative(final Predicate<? super T>... predicates) {\nreturn new Predicate<T>() {\n@Override\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | #9555 Multiple warnings caused by typed varargs in TokenVerifier |
339,156 | 23.09.2021 14:29:33 | -10,800 | db0b36460f39e9ea2cf80bef20ff2838c0987a73 | correct getGroupsCountByNameContaining of MapGroupProvider | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/group/MapGroupProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/group/MapGroupProvider.java",
"diff": "@@ -128,11 +128,7 @@ public class MapGroupProvider implements GroupProvider {\n@Override\npublic Long getGroupsCountByNameContaining(RealmModel realm, String search) {\n- DefaultModelCriteria<GroupModel> mcb = criteria();\n- mcb = mcb.compare(SearchableFields.REALM_ID, Operator.EQ, realm.getId())\n- .compare(SearchableFields.NAME, Operator.ILIKE, \"%\" + search + \"%\");\n-\n- return tx.getCount(withCriteria(mcb));\n+ return searchForGroupByNameStream(realm, search, null, null).count();\n}\n@Override\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi/src/main/java/org/keycloak/models/GroupProvider.java",
"new_path": "server-spi/src/main/java/org/keycloak/models/GroupProvider.java",
"diff": "@@ -124,7 +124,7 @@ public interface GroupProvider extends Provider, GroupLookupProvider {\nLong getGroupsCount(RealmModel realm, Boolean onlyTopGroups);\n/**\n- * Returns number of groups with the given string in name for the given realm.\n+ * Returns the number of top level groups containing groups with the given string in name for the given realm.\n*\n* @param realm Realm.\n* @param search Case insensitive string which will be searched for.\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/group/GroupTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/group/GroupTest.java",
"diff": "package org.keycloak.testsuite.admin.group;\nimport com.google.common.collect.Comparators;\n+import org.hamcrest.Matchers;\nimport org.junit.Assert;\nimport org.junit.Assume;\nimport org.junit.Test;\n@@ -62,6 +63,8 @@ import java.util.LinkedList;\nimport java.util.List;\nimport java.util.Map;\nimport java.util.UUID;\n+import java.util.stream.Collectors;\n+\nimport javax.ws.rs.ClientErrorException;\nimport javax.ws.rs.core.Response.Status;\nimport static org.hamcrest.Matchers.*;\n@@ -1117,6 +1120,18 @@ public class GroupTest extends AbstractGroupTest {\nassertEquals(new Long(allGroups.size()), realm.groups().count(true).get(\"count\"));\nassertEquals(new Long(allGroups.size() + 1), realm.groups().count(false).get(\"count\"));\n+ //add another subgroup\n+ GroupRepresentation level2Group2 = new GroupRepresentation();\n+ level2Group2.setName(\"group111111\");\n+ realm.groups().group(firstGroupId).subGroup(level2Group2);\n+ //search and count for group with string group11 -> return 2 top level group, group11 and group0 having subgroups group1111 and group111111\n+ search = realm.groups().groups(\"group11\",0,10);\n+ assertEquals(2, search.size());\n+ GroupRepresentation group0 = search.stream().filter(group -> \"group0\".equals(group.getName())).findAny().orElseGet(null);\n+ assertNotNull(group0);\n+ assertEquals(2,group0.getSubGroups().size());\n+ assertThat(group0.getSubGroups().stream().map(GroupRepresentation::getName).collect(Collectors.toList()), Matchers.containsInAnyOrder(\"group1111\", \"group111111\"));\n+ assertEquals(new Long(search.size()), realm.groups().count(\"group11\").get(\"count\"));\n}\n@Test\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | KEYCLOAK-19148 correct getGroupsCountByNameContaining of MapGroupProvider |
339,618 | 17.01.2022 12:45:06 | -3,600 | 99e7208f36e2dfbc5d9e79c239dc4253d50d6019 | new title, summary and headlines for proxy guide
Closes | [
{
"change_type": "MODIFY",
"old_path": "docs/guides/src/main/server/proxy.adoc",
"new_path": "docs/guides/src/main/server/proxy.adoc",
"diff": "<#import \"/templates/options.adoc\" as opts>\n<@tmpl.guide\n-title=\"Configuring Keycloak to run behind a reverse proxy\"\n-summary=\"Understand how to configure Keycloak when using a reverse proxy\"\n+title=\"Configuring a reverse proxy\"\n+summary=\"Learn how to configure Keycloak together with a reverse proxy, api gateway or load balancer.\"\npriority=20\nincludedOptions=\"proxy proxy.*\">\n-It is pretty common nowadays to use a reverse proxy in distributed environments. If you want to use Keycloak together with such a proxy, you can use different proxy modes depending on the proxy and TLS termination in your specific environment:\n+It is pretty common nowadays to use a reverse proxy in distributed environments. If you want to use Keycloak together with such a proxy, you can use different proxy modes depending on the TLS termination in your specific environment:\n+== Available proxy modes\nThe `none` mode disables proxy support. It is the default mode.\nThe `edge` mode enables communication through HTTP between the proxy and Keycloak. This mode is suitable for deployments with a highly secure internal network where the reverse proxy keeps a secure connection (HTTP over TLS) with clients while communicating with Keycloak using HTTP.\n@@ -18,22 +19,20 @@ The `reencrypt` mode requires communication through HTTPS between the proxy and\nThe `passthrough` mode enables communication through HTTP or HTTPS between the proxy and Keycloak. This mode is suitable for deployments where the reverse proxy is not terminating TLS, but only forwarding the requests to the Keycloak server so that secure connections between the server and clients are based on the keys and certificates used by the Keycloak server itself.\n-Selecting the reverse proxy mode is done at runtime via:\n+== Configure the proxy mode in Keycloak\n+To select the proxy mode, run:\n-<@kc.all parameters=\"--proxy <mode>\"/>\n+<@kc.start parameters=\"--proxy <mode>\"/>\n-Please make sure your reverse proxy is configured correctly. To do so, please:\n+== Configure the reverse proxy\n+Make sure your reverse proxy is configured correctly. To do so, please:\n-* Configure your reverse proxy to properly set X-Forwarded-For and X-Forwarded-Proto HTTP headers.\n+* Properly set X-Forwarded-For and X-Forwarded-Proto HTTP headers.\n-* Configure your reverse proxy to preserve the original 'Host' HTTP header.\n+* Preserve the original 'Host' HTTP header.\n-Please consult the documentation of your specific reverse proxy on how to set these headers.\n+Please consult the documentation of your reverse proxy on how to set these headers.\n-_Note_: Take extra precautions to ensure that the X-Forwarded-For header is set by your reverse proxy. If it is not configured correctly, rogue clients can set this header themselves and trick Keycloak into thinking the client is connecting from a different IP address than it actually does. This may become really important if you are doing any black or white listing of IP addresses.\n-\n-Valid options for the proxy mode include:\n-\n-<@opts.expectedValues option=\"proxy\"/>\n+Take extra precautions to ensure that the X-Forwarded-For header is set by your reverse proxy. If it is not configured correctly, rogue clients can set this header themselves and trick Keycloak into thinking the client is connecting from a different IP address than it actually does. This may become really important if you are doing any black or white listing of IP addresses.\n</@tmpl.guide>\n"
},
{
"change_type": "MODIFY",
"old_path": "docs/guides/src/main/templates/kc.adoc",
"new_path": "docs/guides/src/main/templates/kc.adoc",
"diff": "@@ -11,10 +11,3 @@ bin/kc.[sh|bat] build ${parameters}\nbin/kc.[sh|bat] start ${parameters}\n----\n</#macro>\n\\ No newline at end of file\n-\n-<#macro all parameters>\n-[source,bash]\n-----\n-bin/kc.[sh|bat] [build|start|start-dev] ${parameters}\n-----\n-</#macro>\n\\ No newline at end of file\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | new title, summary and headlines for proxy guide (#9572)
Closes #9570 |
339,618 | 18.01.2022 10:51:43 | -3,600 | d451ae0ab753d0404520d32706019fff78167c00 | Guide for enabling HTTPS/TLS
Initial version of the guide for enabling TLS/HTTPS for Quarkus based Keycloak
Closes | [
{
"change_type": "ADD",
"old_path": null,
"new_path": "docs/guides/src/main/server/enabletls.adoc",
"diff": "+<#import \"/templates/guide.adoc\" as tmpl>\n+<#import \"/templates/kc.adoc\" as kc>\n+\n+<@tmpl.guide\n+title=\"Configure TLS\"\n+summary=\"Learn how to configure Keycloak's https certificates for in- and outgoing requests as well as mTLS.\"\n+includedOptions=\"https.* http.enabled\">\n+\n+Transport Layer Security (short: TLS) is crucial to exchange data over a secured channel. For production environments, you should never expose Keycloak endpoints through HTTP, as sensitive data is at the core of what Keycloak exchanges with other applications. In this guide you will learn how to configure Keycloak to use HTTPS/TLS.\n+\n+== Configure TLS in Keycloak\n+Keycloak can be configured to load the needed certificate infrastructure using files in PEM format or from a Java KeyStore. When both alternatives are set up, the PEM files takes precedence over the Java KeyStores.\n+\n+=== Providing certificates in PEM format\n+When you use a pair of matching certificate / private key files in PEM format, configure Keycloak to use them by running:\n+\n+<@kc.start parameters=\"--https-certificate-file=/path/to/certfile.pem --https-certificate-key-file=/path/to/keyfile.pem\"/>\n+\n+Keycloak creates a keystore out of these files in memory and uses this keystore afterwards.\n+\n+=== Providing a Java KeyStore\n+When no keystore file is configured explicitly, but `http.enabled` is set to false, Keycloak looks for a `conf/server.keystore` file by default.\n+\n+As an alternative, you can use an existing keystore by running:\n+<@kc.start parameters=\"--https-key-store-file=/path/to/existing-keystore-file\"/>\n+\n+==== Setting the KeyStore password\n+You can set a secure password for your keystore using the `https.key-store.password` option:\n+<@kc.start parameters=\"--https-key-store-password=<value>\"/>\n+If no password is set, the default password `password` is used.\n+\n+== Configure TLS protocols\n+By default, Keycloak does not enable deprecated TLS protocols. In situations where clients only support deprecated protocols, first consider upgrading the client, but as a temporary work-around you can enable deprecated protocols with:\n+\n+<@kc.start parameters=\"--https-protocols=<protocol>[,<protocol>]\"/>\n+\n+To also allow TLSv1.2, use for example `kc.sh start --http-protocols=TLSv1.3,TLSv1.2`.\n+\n+== Switch the HTTPS port\n+Keycloak listens for HTTPS traffic on port `8443` by default. To change this port, use:\n+<@kc.start parameters=\"--https-port=<port>\"/>\n+\n+== Using a truststore\n+Keycloak uses a truststore to store certificates to verify clients that are communicating with Keycloak, e.g. to use mutualTLS, certificate-bound tokens or X.509 authentication. This truststore is used for outgoing https requests as well as mTLS requests.\n+\n+You can configure the location of this truststore by running:\n+<@kc.start parameters=\"--https-trust-store-file=/path/to/file\"/>\n+\n+=== Setting the truststore password\n+You can set a secure password for your truststore using the `https.trust-store.password` option:\n+<@kc.start parameters=\"--https.trust-store.password=<value>\"/>\n+If no password is set, the default password `password` is used.\n+\n+== Securing credentials\n+We recommend to not set any password in plaintext via the CLI or in `conf/keycloak.properties`, but instead using good practices such as using a vault / mounted secret. Please refer to the Vault Guide / Production deployment guide for more advice.\n+\n+</@tmpl.guide>\n\\ No newline at end of file\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Guide for enabling HTTPS/TLS (#9536)
Initial version of the guide for enabling TLS/HTTPS for Quarkus based Keycloak
Closes #9458 |
339,281 | 16.01.2022 16:49:20 | -3,600 | 22bcdcb63020e4d99bf03d802e8798793e3e400e | MapRoleProvider could return also client roles when searching for realm roles
Closes | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/role/MapRoleProvider.java",
"diff": "@@ -70,6 +70,7 @@ public class MapRoleProvider implements RoleProvider {\nentity.setId(id);\nentity.setRealmId(realm.getId());\nentity.setName(name);\n+ entity.setClientRole(false);\nif (tx.read(entity.getId()) != null) {\nthrow new ModelDuplicateException(\"Role exists: \" + id);\n}\n@@ -200,6 +201,7 @@ public class MapRoleProvider implements RoleProvider {\nDefaultModelCriteria<RoleModel> mcb = criteria();\nmcb = mcb.compare(SearchableFields.REALM_ID, Operator.EQ, realm.getId())\n+ .compare(SearchableFields.IS_CLIENT_ROLE, Operator.NE, true)\n.compare(SearchableFields.NAME, Operator.EQ, name);\nString roleId = tx.read(withCriteria(mcb))\n@@ -254,6 +256,7 @@ public class MapRoleProvider implements RoleProvider {\n}\nDefaultModelCriteria<RoleModel> mcb = criteria();\nmcb = mcb.compare(SearchableFields.REALM_ID, Operator.EQ, realm.getId())\n+ .compare(SearchableFields.IS_CLIENT_ROLE, Operator.NE, true)\n.or(\nmcb.compare(SearchableFields.NAME, Operator.ILIKE, \"%\" + search + \"%\"),\nmcb.compare(SearchableFields.DESCRIPTION, Operator.ILIKE, \"%\" + search + \"%\")\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/realm/RealmRolesTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/realm/RealmRolesTest.java",
"diff": "@@ -371,6 +371,12 @@ public class RealmRolesTest extends AbstractAdminTest {\nassertThat(expectedMembers, containsInAnyOrder(\"test-role-member\", \"test-role-member2\"));\n}\n+ // issue #9587\n+ @Test\n+ public void testSearchForRealmRoles() {\n+ resource.list(\"role-\", true).stream().forEach(role -> assertThat(\"There is client role '\" + role.getName() + \"' among realm roles.\", role.getClientRole(), is(false)));\n+ }\n+\n@Test\npublic void testSearchForRoles() {\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | MapRoleProvider could return also client roles when searching for realm roles
Closes #9587 |
339,156 | 18.01.2022 16:16:31 | -7,200 | 0c9ab32cf4dc116c9134effd40d86f3351e6da32 | Fix scope bug in device authorization request
Closes | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/device/endpoints/DeviceEndpoint.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/grants/device/endpoints/DeviceEndpoint.java",
"diff": "@@ -295,7 +295,7 @@ public class DeviceEndpoint extends AuthorizationEndpointBase implements RealmRe\nprivate Response processVerification(OAuth2DeviceCodeModel deviceCode, String userCode) {\nClientModel client = realm.getClientByClientId(deviceCode.getClientId());\n- AuthenticationSessionModel authenticationSession = createAuthenticationSession(client);\n+ AuthenticationSessionModel authenticationSession = createAuthenticationSession(client, deviceCode.getScope());\n// Verification OK\nauthenticationSession.setClientNote(DeviceGrantType.OAUTH2_DEVICE_VERIFIED_USER_CODE, userCode);\n@@ -383,13 +383,15 @@ public class DeviceEndpoint extends AuthorizationEndpointBase implements RealmRe\nreturn client;\n}\n- protected AuthenticationSessionModel createAuthenticationSession(ClientModel client) {\n+ protected AuthenticationSessionModel createAuthenticationSession(ClientModel client, String scope) {\nAuthenticationSessionModel authenticationSession = super.createAuthenticationSession(client, null);\nauthenticationSession.setProtocol(OIDCLoginProtocol.LOGIN_PROTOCOL);\nauthenticationSession.setAction(AuthenticationSessionModel.Action.AUTHENTICATE.name());\nauthenticationSession.setClientNote(OIDCLoginProtocol.ISSUER,\nUrls.realmIssuer(session.getContext().getUri().getBaseUri(), realm.getName()));\n+ if ( scope != null)\n+ authenticationSession.setClientNote(OIDCLoginProtocol.SCOPE_PARAM, scope);\nreturn authenticationSession;\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/OAuth2DeviceAuthorizationGrantTest.java",
"new_path": "testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/OAuth2DeviceAuthorizationGrantTest.java",
"diff": "@@ -33,6 +33,7 @@ import org.keycloak.models.utils.KeycloakModelUtils;\nimport org.keycloak.protocol.oidc.OIDCAdvancedConfigWrapper;\nimport org.keycloak.protocol.oidc.OIDCConfigAttributes;\nimport org.keycloak.representations.AccessToken;\n+import org.keycloak.representations.UserInfo;\nimport org.keycloak.representations.idm.ClientRepresentation;\nimport org.keycloak.representations.idm.RealmRepresentation;\nimport org.keycloak.representations.idm.UserRepresentation;\n@@ -109,6 +110,7 @@ public class OAuth2DeviceAuthorizationGrantTest extends AbstractKeycloakTest {\n.username(\"device-login\")\n.email(\"device-login@localhost\")\n.password(\"password\")\n+ .addAttribute(\"phoneNumber\",\"211211211\")\n.build();\nrealm.user(user);\n@@ -202,6 +204,56 @@ public class OAuth2DeviceAuthorizationGrantTest extends AbstractKeycloakTest {\nassertNotNull(token);\n}\n+ @Test\n+ public void testPublicClientOptionalScope() throws Exception {\n+ // Device Authorization Request from device - check giving optional scope phone\n+ oauth.realm(REALM_NAME);\n+ oauth.clientId(DEVICE_APP_PUBLIC);\n+ OAuthClient.DeviceAuthorizationResponse response = null;\n+ try {\n+ oauth.scope(\"phone\");\n+ response = oauth.doDeviceAuthorizationRequest(DEVICE_APP_PUBLIC, null);\n+ } finally {\n+ oauth.scope(null);\n+ }\n+\n+ Assert.assertEquals(200, response.getStatusCode());\n+ assertNotNull(response.getDeviceCode());\n+ assertNotNull(response.getUserCode());\n+ assertNotNull(response.getVerificationUri());\n+ assertNotNull(response.getVerificationUriComplete());\n+ Assert.assertEquals(60, response.getExpiresIn());\n+ Assert.assertEquals(5, response.getInterval());\n+\n+ openVerificationPage(response.getVerificationUriComplete());\n+\n+ // Do Login\n+ oauth.fillLoginForm(\"device-login\", \"password\");\n+\n+ // Consent\n+ grantPage.assertCurrent();\n+ grantPage.assertGrants(OAuthGrantPage.PROFILE_CONSENT_TEXT, OAuthGrantPage.EMAIL_CONSENT_TEXT, OAuthGrantPage.ROLES_CONSENT_TEXT, OAuthGrantPage.PHONE_CONSENT_TEXT);\n+ grantPage.accept();\n+\n+ // Token request from device\n+ OAuthClient.AccessTokenResponse tokenResponse = oauth.doDeviceTokenRequest(DEVICE_APP_PUBLIC, null, response.getDeviceCode());\n+\n+ Assert.assertEquals(200, tokenResponse.getStatusCode());\n+\n+ String tokenString = tokenResponse.getAccessToken();\n+ assertNotNull(tokenString);\n+ AccessToken token = oauth.verifyToken(tokenString);\n+\n+ assertNotNull(token);\n+\n+ UserInfo userInfo = oauth.doUserInfoRequest(tokenString);\n+ assertNotNull(userInfo);\n+ //UserInfo consists preferredUsername, email( required scopes) and phoneNumber(given optional scope)\n+ Assert.assertEquals(\"device-login\", userInfo.getPreferredUsername());\n+ Assert.assertEquals(\"device-login@localhost\", userInfo.getEmail());\n+ Assert.assertEquals(\"211211211\", userInfo.getPhoneNumber());\n+ }\n+\n@Test\npublic void testPublicClientCustomConsent() throws Exception {\n// Device Authorization Request from device\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Fix scope bug in device authorization request
Closes #9617 |
339,281 | 13.01.2022 10:30:43 | -3,600 | 61fbb2fb2eaa14006b761392d2e1cdd924ee62ea | JPA-Map storage might loose writes due to missing locking mechanism
Closes | [
{
"change_type": "MODIFY",
"old_path": "model/map-jpa/src/main/java/org/keycloak/models/map/storage/jpa/client/entity/JpaClientEntity.java",
"new_path": "model/map-jpa/src/main/java/org/keycloak/models/map/storage/jpa/client/entity/JpaClientEntity.java",
"diff": "@@ -36,6 +36,7 @@ import javax.persistence.FetchType;\nimport javax.persistence.Id;\nimport javax.persistence.OneToMany;\nimport javax.persistence.Table;\n+import javax.persistence.Version;\nimport org.hibernate.annotations.Type;\nimport org.hibernate.annotations.TypeDef;\nimport org.hibernate.annotations.TypeDefs;\n@@ -54,6 +55,11 @@ public class JpaClientEntity extends AbstractClientEntity implements Serializabl\n@Column\nprivate UUID id;\n+ //used for implicit optimistic locking\n+ @Version\n+ @Column\n+ private int version;\n+\n@Type(type = \"jsonb\")\n@Column(columnDefinition = \"jsonb\")\nprivate final JpaClientMetadata metadata;\n@@ -131,6 +137,10 @@ public class JpaClientEntity extends AbstractClientEntity implements Serializabl\nmetadata.setEntityVersion(entityVersion);\n}\n+ public int getVersion() {\n+ return version;\n+ }\n+\n@Override\npublic String getId() {\nreturn id == null ? null : id.toString();\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map-jpa/src/main/resources/META-INF/clients/jpa-clients-changelog-1.xml",
"new_path": "model/map-jpa/src/main/resources/META-INF/clients/jpa-clients-changelog-1.xml",
"diff": "@@ -29,6 +29,9 @@ limitations under the License.\n<column name=\"id\" type=\"UUID\">\n<constraints primaryKey=\"true\" nullable=\"false\"/>\n</column>\n+ <column name=\"version\" type=\"INTEGER\" defaultValueNumeric=\"0\">\n+ <constraints nullable=\"false\"/>\n+ </column>\n<column name=\"metadata\" type=\"json\"/>\n</createTable>\n<ext:addGeneratedColumn tableName=\"client\">\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | JPA-Map storage might loose writes due to missing locking mechanism
Closes #9411 |
339,185 | 19.01.2022 22:21:57 | -3,600 | 2877482e40c8ce776412404c5d9de2c1463809b4 | Limit time for running model tests
Workaround for | [
{
"change_type": "MODIFY",
"old_path": "testsuite/model/test-all-profiles.sh",
"new_path": "testsuite/model/test-all-profiles.sh",
"diff": "@@ -15,9 +15,10 @@ for I in `perl -ne 'print \"$1\\n\" if (m,<id>([^<]+)</id>,)' pom.xml`; do\necho \"========\"\necho \"======== Profile $I\"\necho \"========\"\n- mvn -B test \"-P$I\" \"$@\"\n- EXIT_CODE=$[$EXIT_CODE + $?]\n+ mvn -B -Dsurefire.timeout=600 test \"-P$I\" \"$@\" 2>&1 | tee /tmp/surefire.out\n+ EXIT_CODE=$[$EXIT_CODE + ${PIPESTATUS[0]}]\nmv target/surefire-reports \"target/surefire-reports-$I\"\n+ perl -ne \"print '::error::| $I | Timed out.' . \\\"\\n\\\" if (/There was a timeout in the fork/)\" /tmp/surefire.out\ndone\n## If the jacoco file is present, generate reports in each of the model projects\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Limit time for running model tests
Workaround for #9648 |
339,465 | 20.01.2022 09:35:33 | -3,600 | 3dd97f3f2f85ac604b9200491561de7c0b46b55a | Fix migration test
Closes | [
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/authentication/AuthenticatorUtil.java",
"new_path": "services/src/main/java/org/keycloak/authentication/AuthenticatorUtil.java",
"diff": "package org.keycloak.authentication;\n+import org.keycloak.models.AuthenticatedClientSessionModel;\nimport org.keycloak.models.Constants;\nimport org.keycloak.sessions.AuthenticationSessionModel;\n+import org.keycloak.sessions.CommonClientSessionModel;\npublic class AuthenticatorUtil {\n@@ -40,4 +42,9 @@ public class AuthenticatorUtil {\nreturn AuthenticatorUtil.getRequestedLevelOfAuthentication(authSession)\n<= AuthenticatorUtil.getCurrentLevelOfAuthentication(authSession);\n}\n+\n+ public static int getCurrentLevelOfAuthentication(AuthenticatedClientSessionModel clientSession) {\n+ String clientSessionLoaNote = clientSession.getNote(Constants.LEVEL_OF_AUTHENTICATION);\n+ return clientSessionLoaNote == null ? Constants.NO_LOA : Integer.parseInt(clientSessionLoaNote);\n+ }\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "services/src/main/java/org/keycloak/protocol/oidc/TokenManager.java",
"new_path": "services/src/main/java/org/keycloak/protocol/oidc/TokenManager.java",
"diff": "@@ -854,7 +854,7 @@ public class TokenManager {\n}\nprivate String getAcr(AuthenticatedClientSessionModel clientSession) {\n- int loa = Integer.parseInt(clientSession.getNote(Constants.LEVEL_OF_AUTHENTICATION));\n+ int loa = AuthenticatorUtil.getCurrentLevelOfAuthentication(clientSession);\nif (loa < Constants.MINIMUM_LOA) {\nloa = AuthenticationManager.isSSOAuthentication(clientSession) ? 0 : 1;\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Fix migration test
Closes #9550 |
339,376 | 20.01.2022 08:33:56 | 28,800 | a6acc89bf3dc59493772365f8aa6a0c3a9e36d6f | Update LDAPOperationManager.java
Update LDAPOperationManager.java
Closes | [
{
"change_type": "MODIFY",
"old_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/idm/store/ldap/LDAPOperationManager.java",
"new_path": "federation/ldap/src/main/java/org/keycloak/storage/ldap/idm/store/ldap/LDAPOperationManager.java",
"diff": "@@ -530,6 +530,13 @@ public class LDAPOperationManager {\n}\nthrow ae;\n+ } catch(RuntimeException re){\n+ if (logger.isDebugEnabled()) {\n+ logger.debugf(re, \"LDAP Connection TimeOut for DN [%s]\", dn);\n+ }\n+\n+ throw re;\n+\n} catch (Exception e) {\nlogger.errorf(e, \"Unexpected exception when validating password of DN [%s]\", dn);\nthrow new AuthenticationException(\"Unexpected exception when validating password of user\");\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Update LDAPOperationManager.java (#9561)
Update LDAPOperationManager.java
Closes #9560 |
339,198 | 23.12.2021 11:18:52 | -3,600 | bdb7cf9b96aeedc08f0cf8e5b8cc05251996cb41 | Quarkus relational database setup documentation error
Closes | [
{
"change_type": "MODIFY",
"old_path": "docs/guides/src/main/server/db.adoc",
"new_path": "docs/guides/src/main/server/db.adoc",
"diff": "@@ -23,5 +23,5 @@ Valid options for database vendors include:\nOnce configured you can easily connect to the database with:\n-<@kc.start parameters=\"--db-host <hostname> --db-schema <schema> --db-user <username> --db-password <password>\"/>\n+<@kc.start parameters=\"--db-url-host <hostname> --db-schema <schema> --db-username <username> --db-password <password>\"/>\n</@tmpl.guide>\n\\ No newline at end of file\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Quarkus relational database setup documentation error
Closes #9324 |
339,281 | 20.01.2022 12:41:38 | -3,600 | 873a44459a28c32acb543556bfdbadaf798e6956 | Convert MapClientScopeEntity to interface
Closes | [
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientAdapter.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/client/MapClientAdapter.java",
"diff": "@@ -39,8 +39,11 @@ import java.util.stream.Stream;\n*/\npublic abstract class MapClientAdapter extends AbstractClientModel<MapClientEntity> implements ClientModel {\n+ private final MapProtocolMapperUtils pmUtils;\n+\npublic MapClientAdapter(KeycloakSession session, RealmModel realm, MapClientEntity entity) {\nsuper(session, realm, entity);\n+ pmUtils = MapProtocolMapperUtils.instanceFor(safeGetProtocol());\n}\n@Override\n@@ -503,35 +506,15 @@ public abstract class MapClientAdapter extends AbstractClientModel<MapClientEnti\n/*************** Protocol mappers ****************/\n- private static MapProtocolMapperEntity fromModel(ProtocolMapperModel model) {\n- MapProtocolMapperEntity res = new MapProtocolMapperEntityImpl();\n- res.setId(model.getId());\n- res.setName(model.getName());\n- res.setProtocolMapper(model.getProtocolMapper());\n- res.setConfig(model.getConfig());\n- return res;\n- }\n-\n- private ProtocolMapperModel toModel(MapProtocolMapperEntity entity) {\n- ProtocolMapperModel res = new ProtocolMapperModel();\n- res.setId(entity.getId());\n- res.setName(entity.getName());\n- res.setProtocolMapper(entity.getProtocolMapper());\n- res.setConfig(entity.getConfig());\n-\n- res.setProtocol(safeGetProtocol());\n- return res;\n+ private String safeGetProtocol() {\n+ return entity.getProtocol() == null ? \"openid-connect\" : entity.getProtocol();\n}\n@Override\npublic Stream<ProtocolMapperModel> getProtocolMappersStream() {\nfinal Map<String, MapProtocolMapperEntity> protocolMappers = entity.getProtocolMappers();\nreturn protocolMappers == null ? Stream.empty() : protocolMappers.values().stream().distinct()\n- .map(this::toModel);\n- }\n-\n- private String safeGetProtocol() {\n- return entity.getProtocol() == null ? \"openid-connect\" : entity.getProtocol();\n+ .map(pmUtils::toModel);\n}\n@Override\n@@ -540,7 +523,7 @@ public abstract class MapClientAdapter extends AbstractClientModel<MapClientEnti\nreturn null;\n}\n- MapProtocolMapperEntity pm = fromModel(model);\n+ MapProtocolMapperEntity pm = MapProtocolMapperUtils.fromModel(model);\nif (pm.getId() == null) {\nString id = KeycloakModelUtils.generateId();\npm.setId(id);\n@@ -550,7 +533,7 @@ public abstract class MapClientAdapter extends AbstractClientModel<MapClientEnti\n}\nentity.setProtocolMapper(pm.getId(), pm);\n- return toModel(pm);\n+ return pmUtils.toModel(pm);\n}\n@Override\n@@ -565,14 +548,14 @@ public abstract class MapClientAdapter extends AbstractClientModel<MapClientEnti\npublic void updateProtocolMapper(ProtocolMapperModel mapping) {\nfinal String id = mapping == null ? null : mapping.getId();\nif (id != null) {\n- entity.setProtocolMapper(id, fromModel(mapping));\n+ entity.setProtocolMapper(id, MapProtocolMapperUtils.fromModel(mapping));\n}\n}\n@Override\npublic ProtocolMapperModel getProtocolMapperById(String id) {\nMapProtocolMapperEntity protocolMapper = entity.getProtocolMapper(id);\n- return protocolMapper == null ? null : toModel(protocolMapper);\n+ return protocolMapper == null ? null : pmUtils.toModel(protocolMapper);\n}\n@Override\n@@ -583,7 +566,7 @@ public abstract class MapClientAdapter extends AbstractClientModel<MapClientEnti\n}\nreturn protocolMappers == null ? null : protocolMappers.values().stream()\n.filter(pm -> Objects.equals(pm.getName(), name))\n- .map(this::toModel)\n+ .map(pmUtils::toModel)\n.findAny()\n.orElse(null);\n}\n"
},
{
"change_type": "ADD",
"old_path": null,
"new_path": "model/map/src/main/java/org/keycloak/models/map/client/MapProtocolMapperUtils.java",
"diff": "+/*\n+ * Copyright 2022 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+package org.keycloak.models.map.client;\n+\n+import java.util.HashMap;\n+import java.util.Objects;\n+import java.util.concurrent.ConcurrentHashMap;\n+import java.util.concurrent.ConcurrentMap;\n+import org.keycloak.models.ProtocolMapperModel;\n+\n+public class MapProtocolMapperUtils {\n+\n+ private final String protocol;\n+ private static final ConcurrentMap<String, MapProtocolMapperUtils> INSTANCES = new ConcurrentHashMap<>();\n+\n+ private MapProtocolMapperUtils(String protocol) {\n+ this.protocol = protocol;\n+ }\n+\n+ public static MapProtocolMapperUtils instanceFor(String protocol) {\n+ Objects.requireNonNull(protocol);\n+ return INSTANCES.computeIfAbsent(protocol, MapProtocolMapperUtils::new);\n+ }\n+\n+ public static MapProtocolMapperEntity fromModel(ProtocolMapperModel model) {\n+ MapProtocolMapperEntity res = new MapProtocolMapperEntityImpl();\n+ res.setId(model.getId());\n+ res.setName(model.getName());\n+ res.setProtocolMapper(model.getProtocolMapper());\n+ res.setConfig(model.getConfig());\n+ return res;\n+ }\n+\n+ public ProtocolMapperModel toModel(MapProtocolMapperEntity entity) {\n+ ProtocolMapperModel res = new ProtocolMapperModel();\n+ res.setId(entity.getId());\n+ res.setName(entity.getName());\n+ res.setProtocolMapper(entity.getProtocolMapper());\n+ res.setConfig(entity.getConfig());\n+\n+ res.setProtocol(protocol);\n+ return res;\n+ }\n+\n+}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/clientscope/MapClientScopeAdapter.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/clientscope/MapClientScopeAdapter.java",
"diff": "*/\npackage org.keycloak.models.map.clientscope;\n+import java.util.Collection;\nimport java.util.Collections;\nimport java.util.HashMap;\nimport java.util.List;\nimport java.util.Map;\nimport java.util.Objects;\n+import java.util.Set;\nimport java.util.stream.Collectors;\nimport java.util.stream.Stream;\nimport org.keycloak.models.ClientScopeModel;\n@@ -28,13 +30,18 @@ import org.keycloak.models.KeycloakSession;\nimport org.keycloak.models.ProtocolMapperModel;\nimport org.keycloak.models.RealmModel;\nimport org.keycloak.models.RoleModel;\n+import org.keycloak.models.map.client.MapProtocolMapperEntity;\n+import org.keycloak.models.map.client.MapProtocolMapperUtils;\nimport org.keycloak.models.utils.KeycloakModelUtils;\nimport org.keycloak.models.utils.RoleUtils;\npublic class MapClientScopeAdapter extends AbstractClientScopeModel<MapClientScopeEntity> implements ClientScopeModel {\n+ private final MapProtocolMapperUtils pmUtils;\n+\npublic MapClientScopeAdapter(KeycloakSession session, RealmModel realm, MapClientScopeEntity entity) {\nsuper(session, realm, entity);\n+ pmUtils = MapProtocolMapperUtils.instanceFor(safeGetProtocol());\n}\n@Override\n@@ -72,8 +79,21 @@ public class MapClientScopeAdapter extends AbstractClientScopeModel<MapClientSco\nentity.setProtocol(protocol);\n}\n+ @Override\n+ public RealmModel getRealm() {\n+ return realm;\n+ }\n+\n@Override\npublic void setAttribute(String name, String value) {\n+// TODO: https://github.com/keycloak/keycloak/issues/9741\n+// boolean valueUndefined = value == null || \"\".equals(value.trim());\n+//\n+// if (valueUndefined) {\n+// removeAttribute(name);\n+// return;\n+// }\n+\nentity.setAttribute(name, Collections.singletonList(value));\n}\n@@ -85,13 +105,15 @@ public class MapClientScopeAdapter extends AbstractClientScopeModel<MapClientSco\n@Override\npublic String getAttribute(String name) {\nList<String> attribute = entity.getAttribute(name);\n- if (attribute.isEmpty()) return null;\n+ if (attribute == null || attribute.isEmpty()) return null;\nreturn attribute.get(0);\n}\n@Override\npublic Map<String, String> getAttributes() {\n- return entity.getAttributes().entrySet().stream().collect(Collectors.toMap(Map.Entry::getKey,\n+ final Map<String, List<String>> attributes = entity.getAttributes();\n+ final Map<String, List<String>> a = attributes == null ? Collections.emptyMap() : attributes;\n+ return a.entrySet().stream().collect(Collectors.toMap(Map.Entry::getKey,\nentry -> {\nif (entry.getValue().isEmpty()) return null;\nreturn entry.getValue().get(0);\n@@ -99,14 +121,16 @@ public class MapClientScopeAdapter extends AbstractClientScopeModel<MapClientSco\n);\n}\n- @Override\n- public RealmModel getRealm() {\n- return realm;\n+ /*************** Protocol mappers ****************/\n+\n+ private String safeGetProtocol() {\n+ return entity.getProtocol() == null ? \"openid-connect\" : entity.getProtocol();\n}\n@Override\npublic Stream<ProtocolMapperModel> getProtocolMappersStream() {\n- return entity.getProtocolMappers().distinct();\n+ final Set<MapProtocolMapperEntity> protocolMappers = entity.getProtocolMappers();\n+ return protocolMappers == null ? Stream.empty() : protocolMappers.stream().distinct().map(pmUtils::toModel);\n}\n@Override\n@@ -115,19 +139,17 @@ public class MapClientScopeAdapter extends AbstractClientScopeModel<MapClientSco\nreturn null;\n}\n- ProtocolMapperModel pm = new ProtocolMapperModel();\n- pm.setId(KeycloakModelUtils.generateId());\n- pm.setName(model.getName());\n- pm.setProtocol(model.getProtocol());\n- pm.setProtocolMapper(model.getProtocolMapper());\n-\n- if (model.getConfig() != null) {\n- pm.setConfig(new HashMap<>(model.getConfig()));\n- } else {\n+ MapProtocolMapperEntity pm = MapProtocolMapperUtils.fromModel(model);\n+ if (pm.getId() == null) {\n+ String id = KeycloakModelUtils.generateId();\n+ pm.setId(id);\n+ }\n+ if (model.getConfig() == null) {\npm.setConfig(new HashMap<>());\n}\n- return entity.addProtocolMapper(pm);\n+ entity.addProtocolMapper(pm);\n+ return pmUtils.toModel(pm);\n}\n@Override\n@@ -142,26 +164,37 @@ public class MapClientScopeAdapter extends AbstractClientScopeModel<MapClientSco\npublic void updateProtocolMapper(ProtocolMapperModel mapping) {\nfinal String id = mapping == null ? null : mapping.getId();\nif (id != null) {\n- entity.updateProtocolMapper(id, mapping);\n+ entity.getProtocolMapper(id).ifPresent((pmEntity) -> {\n+ entity.removeProtocolMapper(id);\n+ addProtocolMapper(mapping);\n+ });\n}\n}\n@Override\npublic ProtocolMapperModel getProtocolMapperById(String id) {\n- return entity.getProtocolMapperById(id);\n+ return entity.getProtocolMapper(id).map(pmUtils::toModel).orElse(null);\n}\n@Override\npublic ProtocolMapperModel getProtocolMapperByName(String protocol, String name) {\n- return entity.getProtocolMappers()\n- .filter(pm -> Objects.equals(pm.getProtocol(), protocol) && Objects.equals(pm.getName(), name))\n+ final Set<MapProtocolMapperEntity> protocolMappers = entity.getProtocolMappers();\n+ if (! Objects.equals(protocol, safeGetProtocol())) {\n+ return null;\n+ }\n+ return protocolMappers == null ? null : protocolMappers.stream()\n+ .filter(pm -> Objects.equals(pm.getName(), name))\n+ .map(pmUtils::toModel)\n.findAny()\n.orElse(null);\n}\n+ /*************** Scopes mappings ****************/\n+\n@Override\npublic Stream<RoleModel> getScopeMappingsStream() {\n- return this.entity.getScopeMappings()\n+ final Collection<String> scopeMappings = this.entity.getScopeMappings();\n+ return scopeMappings == null ? Stream.empty() : scopeMappings.stream()\n.map(realm::getRoleById)\n.filter(Objects::nonNull);\n}\n@@ -183,7 +216,7 @@ public class MapClientScopeAdapter extends AbstractClientScopeModel<MapClientSco\npublic void deleteScopeMapping(RoleModel role) {\nfinal String id = role == null ? null : role.getId();\nif (id != null) {\n- this.entity.deleteScopeMapping(id);\n+ this.entity.removeScopeMapping(id);\n}\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/clientscope/MapClientScopeEntity.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/clientscope/MapClientScopeEntity.java",
"diff": "package org.keycloak.models.map.clientscope;\nimport java.util.Collection;\n-import java.util.Collections;\n-import java.util.HashMap;\n-import java.util.LinkedHashSet;\n-import java.util.List;\n-import java.util.Map;\nimport java.util.Objects;\n+import java.util.Optional;\nimport java.util.Set;\n-import java.util.function.Function;\n-import java.util.stream.Collectors;\n-import java.util.stream.Stream;\n-import org.keycloak.models.ProtocolMapperModel;\n+import org.keycloak.models.map.annotations.GenerateEntityImplementations;\n+import org.keycloak.models.map.client.MapProtocolMapperEntity;\nimport org.keycloak.models.map.common.AbstractEntity;\n+import org.keycloak.models.map.common.DeepCloner;\nimport org.keycloak.models.map.common.EntityWithAttributes;\nimport org.keycloak.models.map.common.UpdatableEntity;\n-public class MapClientScopeEntity extends UpdatableEntity.Impl implements AbstractEntity, EntityWithAttributes {\n+@GenerateEntityImplementations(\n+ inherits = \"org.keycloak.models.map.clientscope.MapClientScopeEntity.AbstractClientScopeEntity\"\n+)\[email protected]\n+public interface MapClientScopeEntity extends AbstractEntity, UpdatableEntity, EntityWithAttributes {\n- private String id;\n- private String realmId;\n-\n- private String name;\n- private String protocol;\n- private String description;\n-\n- private final Set<String> scopeMappings = new LinkedHashSet<>();\n- private final Map<String, ProtocolMapperModel> protocolMappers = new HashMap<>();\n- private final Map<String, List<String>> attributes = new HashMap<>();\n-\n- /**\n- * Flag signalizing that any of the setters has been meaningfully used.\n- */\n-\n- public MapClientScopeEntity() {}\n+ public abstract class AbstractClientScopeEntity extends UpdatableEntity.Impl implements MapClientScopeEntity {\n- public MapClientScopeEntity(String id, String realmId) {\n- this.id = id;\n- this.realmId = realmId;\n- }\n+ private String id;\n@Override\npublic String getId() {\n@@ -68,111 +49,43 @@ public class MapClientScopeEntity extends UpdatableEntity.Impl implements Abstra\nthis.updated |= id != null;\n}\n- public String getName() {\n- return name;\n- }\n-\n- public void setName(String name) {\n- this.updated |= ! Objects.equals(this.name, name);\n- this.name = name;\n- }\n-\n- public String getDescription() {\n- return description;\n- }\n-\n- public void setDescription(String description) {\n- this.updated |= ! Objects.equals(this.description, description);\n- this.description = description;\n- }\n-\n- public String getProtocol() {\n- return protocol;\n- }\n-\n- public void setProtocol(String protocol) {\n- this.updated |= ! Objects.equals(this.protocol, protocol);\n- this.protocol = protocol;\n- }\n-\n@Override\n- public Map<String, List<String>> getAttributes() {\n- return attributes;\n- }\n+ public Optional<MapProtocolMapperEntity> getProtocolMapper(String id) {\n+ Set<MapProtocolMapperEntity> mappers = getProtocolMappers();\n+ if (mappers == null || mappers.isEmpty()) return Optional.empty();\n- @Override\n- public void setAttributes(Map<String, List<String>> attributes) {\n- this.attributes.clear();\n- this.attributes.putAll(attributes);\n- this.updated = true;\n+ return mappers.stream().filter(m -> Objects.equals(m.getId(), id)).findFirst();\n}\n@Override\n- public void setAttribute(String name, List<String> values) {\n- this.updated |= ! Objects.equals(this.attributes.put(name, values), values);\n+ public void removeProtocolMapper(String id) {\n+ Set<MapProtocolMapperEntity> mappers = getProtocolMappers();\n+ this.updated |= mappers != null && mappers.removeIf(m -> Objects.equals(m.getId(), id));\n}\n-\n- public ProtocolMapperModel addProtocolMapper(ProtocolMapperModel model) {\n- Objects.requireNonNull(model.getId(), \"protocolMapper.id\");\n- updated = true;\n- this.protocolMappers.put(model.getId(), model);\n- return model;\n}\n- public Stream<ProtocolMapperModel> getProtocolMappers() {\n- return protocolMappers.values().stream();\n- }\n+ String getName();\n- public void updateProtocolMapper(String id, ProtocolMapperModel mapping) {\n- updated = true;\n- protocolMappers.put(id, mapping);\n- }\n+ String getDescription();\n- public void removeProtocolMapper(String id) {\n- updated |= protocolMappers.remove(id) != null;\n- }\n+ String getProtocol();\n- public void setProtocolMappers(Collection<ProtocolMapperModel> protocolMappers) {\n- this.updated |= ! Objects.equals(this.protocolMappers, protocolMappers);\n- this.protocolMappers.clear();\n- this.protocolMappers.putAll(protocolMappers.stream().collect(Collectors.toMap(ProtocolMapperModel::getId, Function.identity())));\n- }\n+ String getRealmId();\n- public ProtocolMapperModel getProtocolMapperById(String id) {\n- return id == null ? null : protocolMappers.get(id);\n- }\n+ void setName(String name);\n- @Override\n- public void removeAttribute(String name) {\n- this.updated |= this.attributes.remove(name) != null;\n- }\n+ void setDescription(String description);\n- @Override\n- public List<String> getAttribute(String name) {\n- return attributes.getOrDefault(name, Collections.EMPTY_LIST);\n- }\n-\n- public String getRealmId() {\n- return this.realmId;\n- }\n-\n- public void setRealmId(String realmId) {\n- this.updated |= !Objects.equals(this.realmId, realmId);\n- this.realmId = realmId;\n- }\n+ void setProtocol(String protocol);\n- public Stream<String> getScopeMappings() {\n- return scopeMappings.stream();\n- }\n+ void setRealmId(String realmId);\n- public void addScopeMapping(String id) {\n- if (id != null) {\n- updated = true;\n- scopeMappings.add(id);\n- }\n- }\n+ Optional<MapProtocolMapperEntity> getProtocolMapper(String id);\n+ Set<MapProtocolMapperEntity> getProtocolMappers();\n+ void addProtocolMapper(MapProtocolMapperEntity mapping);\n+ void removeProtocolMapper(String id);\n- public void deleteScopeMapping(String id) {\n- updated |= scopeMappings.remove(id);\n- }\n+ void addScopeMapping(String id);\n+ void removeScopeMapping(String id);\n+ Collection<String> getScopeMappings();\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/clientscope/MapClientScopeProvider.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/clientscope/MapClientScopeProvider.java",
"diff": "@@ -77,7 +77,6 @@ public class MapClientScopeProvider implements ClientScopeProvider {\n@Override\npublic ClientScopeModel addClientScope(RealmModel realm, String id, String name) {\n- // Check Db constraint: @UniqueConstraint(columnNames = {\"REALM_ID\", \"NAME\"})\nDefaultModelCriteria<ClientScopeModel> mcb = criteria();\nmcb = mcb.compare(SearchableFields.REALM_ID, Operator.EQ, realm.getId())\n.compare(SearchableFields.NAME, Operator.EQ, name);\n@@ -86,13 +85,17 @@ public class MapClientScopeProvider implements ClientScopeProvider {\nthrow new ModelDuplicateException(\"Client scope with name '\" + name + \"' in realm \" + realm.getName());\n}\n- LOG.tracef(\"addClientScope(%s, %s, %s)%s\", realm, id, name, getShortStackTrace());\n-\n- MapClientScopeEntity entity = new MapClientScopeEntity(id, realm.getId());\n- entity.setName(KeycloakModelUtils.convertClientScopeName(name));\nif (id != null && tx.read(id) != null) {\nthrow new ModelDuplicateException(\"Client scope exists: \" + id);\n}\n+\n+ LOG.tracef(\"addClientScope(%s, %s, %s)%s\", realm, id, name, getShortStackTrace());\n+\n+ MapClientScopeEntity entity = new MapClientScopeEntityImpl();\n+ entity.setId(id);\n+ entity.setRealmId(realm.getId());\n+ entity.setName(KeycloakModelUtils.convertClientScopeName(name));\n+\nentity = tx.create(entity);\nreturn entityToAdapterFunc(realm).apply(entity);\n}\n"
},
{
"change_type": "MODIFY",
"old_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorageProviderFactory.java",
"new_path": "model/map/src/main/java/org/keycloak/models/map/storage/chm/ConcurrentHashMapStorageProviderFactory.java",
"diff": "@@ -28,6 +28,7 @@ import org.keycloak.models.UserSessionModel;\nimport org.keycloak.models.map.client.MapClientEntityImpl;\nimport org.keycloak.models.map.client.MapProtocolMapperEntity;\nimport org.keycloak.models.map.client.MapProtocolMapperEntityImpl;\n+import org.keycloak.models.map.clientscope.MapClientScopeEntityImpl;\nimport org.keycloak.models.map.common.AbstractEntity;\nimport org.keycloak.models.map.common.DeepCloner;\nimport org.keycloak.models.map.common.Serialization;\n@@ -44,12 +45,9 @@ import java.util.concurrent.ConcurrentHashMap;\nimport org.jboss.logging.Logger;\nimport org.keycloak.models.map.storage.MapStorageProvider;\nimport org.keycloak.models.map.storage.MapStorageProviderFactory;\n-import org.keycloak.models.map.user.MapUserConsentEntity;\nimport org.keycloak.models.map.user.MapUserConsentEntityImpl;\n-import org.keycloak.models.map.user.MapUserCredentialEntity;\nimport org.keycloak.models.map.user.MapUserCredentialEntityImpl;\nimport org.keycloak.models.map.user.MapUserEntityImpl;\n-import org.keycloak.models.map.user.MapUserFederatedIdentityEntity;\nimport org.keycloak.models.map.user.MapUserFederatedIdentityEntityImpl;\nimport org.keycloak.models.map.storage.ModelEntityUtil;\nimport org.keycloak.provider.EnvironmentDependentProviderFactory;\n@@ -95,6 +93,7 @@ public class ConcurrentHashMapStorageProviderFactory implements AmphibianProvide\n.constructor(MapUserCredentialEntityImpl.class, MapUserCredentialEntityImpl::new)\n.constructor(MapUserFederatedIdentityEntityImpl.class, MapUserFederatedIdentityEntityImpl::new)\n.constructor(MapUserConsentEntityImpl.class, MapUserConsentEntityImpl::new)\n+ .constructor(MapClientScopeEntityImpl.class, MapClientScopeEntityImpl::new)\n.build();\nprivate static final Map<String, StringKeyConvertor> KEY_CONVERTORS = new HashMap<>();\n"
},
{
"change_type": "MODIFY",
"old_path": "server-spi-private/src/main/java/org/keycloak/migration/migrators/MigrationUtils.java",
"new_path": "server-spi-private/src/main/java/org/keycloak/migration/migrators/MigrationUtils.java",
"diff": "package org.keycloak.migration.migrators;\n+import java.util.stream.Collectors;\nimport org.keycloak.Config;\nimport org.keycloak.OAuth2Constants;\nimport org.keycloak.OAuthErrorException;\n@@ -70,6 +71,7 @@ public class MigrationUtils {\nclient.getProtocolMappersStream()\n.filter(mapper -> !mapper.getConfig().containsKey(\"userinfo.token.claim\") && mapper.getConfig().containsKey(\"id.token.claim\"))\n.peek(mapper -> mapper.getConfig().put(\"userinfo.token.claim\", mapper.getConfig().get(\"id.token.claim\")))\n+ .collect(Collectors.toSet()).stream() // to avoid ConcurrentModificationException\n.forEach(client::updateProtocolMapper);\n}\n"
}
] | Java | Apache License 2.0 | keycloak/keycloak | Convert MapClientScopeEntity to interface
Closes #9657 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.