JetBrains-Research/commit-chronicle · Datasets at Fast360
{
// 获取包含Hugging Face文本的span元素
const spans = link.querySelectorAll('span.whitespace-nowrap, span.hidden.whitespace-nowrap');
spans.forEach(span => {
if (span.textContent && span.textContent.trim().match(/Hugging\s*Face/i)) {
span.textContent = 'AI快站';
}
});
});
// 替换logo图片的alt属性
document.querySelectorAll('img[alt*="Hugging"], img[alt*="Face"]').forEach(img => {
if (img.alt.match(/Hugging\s*Face/i)) {
img.alt = 'AI快站 logo';
}
});
}
// 替换导航栏中的链接
function replaceNavigationLinks() {
// 已替换标记,防止重复运行
if (window._navLinksReplaced) {
return;
}
// 已经替换过的链接集合,防止重复替换
const replacedLinks = new Set();
// 只在导航栏区域查找和替换链接
const headerArea = document.querySelector('header') || document.querySelector('nav');
if (!headerArea) {
return;
}
// 在导航区域内查找链接
const navLinks = headerArea.querySelectorAll('a');
navLinks.forEach(link => {
// 如果已经替换过,跳过
if (replacedLinks.has(link)) return;
const linkText = link.textContent.trim();
const linkHref = link.getAttribute('href') || '';
// 替换Spaces链接 - 仅替换一次
if (
(linkHref.includes('/spaces') || linkHref === '/spaces' ||
linkText === 'Spaces' || linkText.match(/^s*Spacess*$/i)) &&
linkText !== 'OCR模型免费转Markdown' &&
linkText !== 'OCR模型免费转Markdown'
) {
link.textContent = 'OCR模型免费转Markdown';
link.href = 'https://fast360.xyz';
link.setAttribute('target', '_blank');
link.setAttribute('rel', 'noopener noreferrer');
replacedLinks.add(link);
}
// 删除Posts链接
else if (
(linkHref.includes('/posts') || linkHref === '/posts' ||
linkText === 'Posts' || linkText.match(/^s*Postss*$/i))
) {
if (link.parentNode) {
link.parentNode.removeChild(link);
}
replacedLinks.add(link);
}
// 替换Docs链接 - 仅替换一次
else if (
(linkHref.includes('/docs') || linkHref === '/docs' ||
linkText === 'Docs' || linkText.match(/^s*Docss*$/i)) &&
linkText !== '模型下载攻略'
) {
link.textContent = '模型下载攻略';
link.href = '/';
replacedLinks.add(link);
}
// 删除Enterprise链接
else if (
(linkHref.includes('/enterprise') || linkHref === '/enterprise' ||
linkText === 'Enterprise' || linkText.match(/^s*Enterprises*$/i))
) {
if (link.parentNode) {
link.parentNode.removeChild(link);
}
replacedLinks.add(link);
}
});
// 查找可能嵌套的Spaces和Posts文本
const textNodes = [];
function findTextNodes(element) {
if (element.nodeType === Node.TEXT_NODE) {
const text = element.textContent.trim();
if (text === 'Spaces' || text === 'Posts' || text === 'Enterprise') {
textNodes.push(element);
}
} else {
for (const child of element.childNodes) {
findTextNodes(child);
}
}
}
// 只在导航区域内查找文本节点
findTextNodes(headerArea);
// 替换找到的文本节点
textNodes.forEach(node => {
const text = node.textContent.trim();
if (text === 'Spaces') {
node.textContent = node.textContent.replace(/Spaces/g, 'OCR模型免费转Markdown');
} else if (text === 'Posts') {
// 删除Posts文本节点
if (node.parentNode) {
node.parentNode.removeChild(node);
}
} else if (text === 'Enterprise') {
// 删除Enterprise文本节点
if (node.parentNode) {
node.parentNode.removeChild(node);
}
}
});
// 标记已替换完成
window._navLinksReplaced = true;
}
// 替换代码区域中的域名
function replaceCodeDomains() {
// 特别处理span.hljs-string和span.njs-string元素
document.querySelectorAll('span.hljs-string, span.njs-string, span[class*="hljs-string"], span[class*="njs-string"]').forEach(span => {
if (span.textContent && span.textContent.includes('huggingface.co')) {
span.textContent = span.textContent.replace(/huggingface.co/g, 'aifasthub.com');
}
});
// 替换hljs-string类的span中的域名(移除多余的转义符号)
document.querySelectorAll('span.hljs-string, span[class*="hljs-string"]').forEach(span => {
if (span.textContent && span.textContent.includes('huggingface.co')) {
span.textContent = span.textContent.replace(/huggingface.co/g, 'aifasthub.com');
}
});
// 替换pre和code标签中包含git clone命令的域名
document.querySelectorAll('pre, code').forEach(element => {
if (element.textContent && element.textContent.includes('git clone')) {
const text = element.innerHTML;
if (text.includes('huggingface.co')) {
element.innerHTML = text.replace(/huggingface.co/g, 'aifasthub.com');
}
}
});
// 处理特定的命令行示例
document.querySelectorAll('pre, code').forEach(element => {
const text = element.innerHTML;
if (text.includes('huggingface.co')) {
// 针对git clone命令的专门处理
if (text.includes('git clone') || text.includes('GIT_LFS_SKIP_SMUDGE=1')) {
element.innerHTML = text.replace(/huggingface.co/g, 'aifasthub.com');
}
}
});
// 特别处理模型下载页面上的代码片段
document.querySelectorAll('.flex.border-t, .svelte_hydrator, .inline-block').forEach(container => {
const content = container.innerHTML;
if (content && content.includes('huggingface.co')) {
container.innerHTML = content.replace(/huggingface.co/g, 'aifasthub.com');
}
});
// 特别处理模型仓库克隆对话框中的代码片段
try {
// 查找包含"Clone this model repository"标题的对话框
const cloneDialog = document.querySelector('.svelte_hydration_boundary, [data-target="MainHeader"]');
if (cloneDialog) {
// 查找对话框中所有的代码片段和命令示例
const codeElements = cloneDialog.querySelectorAll('pre, code, span');
codeElements.forEach(element => {
if (element.textContent && element.textContent.includes('huggingface.co')) {
if (element.innerHTML.includes('huggingface.co')) {
element.innerHTML = element.innerHTML.replace(/huggingface.co/g, 'aifasthub.com');
} else {
element.textContent = element.textContent.replace(/huggingface.co/g, 'aifasthub.com');
}
}
});
}
// 更精确地定位克隆命令中的域名
document.querySelectorAll('[data-target]').forEach(container => {
const codeBlocks = container.querySelectorAll('pre, code, span.hljs-string');
codeBlocks.forEach(block => {
if (block.textContent && block.textContent.includes('huggingface.co')) {
if (block.innerHTML.includes('huggingface.co')) {
block.innerHTML = block.innerHTML.replace(/huggingface.co/g, 'aifasthub.com');
} else {
block.textContent = block.textContent.replace(/huggingface.co/g, 'aifasthub.com');
}
}
});
});
} catch (e) {
// 错误处理但不打印日志
}
}
// 当DOM加载完成后执行替换
if (document.readyState === 'loading') {
document.addEventListener('DOMContentLoaded', () => {
replaceHeaderBranding();
replaceNavigationLinks();
replaceCodeDomains();
// 只在必要时执行替换 - 3秒后再次检查
setTimeout(() => {
if (!window._navLinksReplaced) {
console.log('[Client] 3秒后重新检查导航链接');
replaceNavigationLinks();
}
}, 3000);
});
} else {
replaceHeaderBranding();
replaceNavigationLinks();
replaceCodeDomains();
// 只在必要时执行替换 - 3秒后再次检查
setTimeout(() => {
if (!window._navLinksReplaced) {
console.log('[Client] 3秒后重新检查导航链接');
replaceNavigationLinks();
}
}, 3000);
}
// 增加一个MutationObserver来处理可能的动态元素加载
const observer = new MutationObserver(mutations => {
// 检查是否导航区域有变化
const hasNavChanges = mutations.some(mutation => {
// 检查是否存在header或nav元素变化
return Array.from(mutation.addedNodes).some(node => {
if (node.nodeType === Node.ELEMENT_NODE) {
// 检查是否是导航元素或其子元素
if (node.tagName === 'HEADER' || node.tagName === 'NAV' ||
node.querySelector('header, nav')) {
return true;
}
// 检查是否在导航元素内部
let parent = node.parentElement;
while (parent) {
if (parent.tagName === 'HEADER' || parent.tagName === 'NAV') {
return true;
}
parent = parent.parentElement;
}
}
return false;
});
});
// 只在导航区域有变化时执行替换
if (hasNavChanges) {
// 重置替换状态,允许再次替换
window._navLinksReplaced = false;
replaceHeaderBranding();
replaceNavigationLinks();
}
});
// 开始观察document.body的变化,包括子节点
if (document.body) {
observer.observe(document.body, { childList: true, subtree: true });
} else {
document.addEventListener('DOMContentLoaded', () => {
observer.observe(document.body, { childList: true, subtree: true });
});
}
})();
\"));\n- break;\n- default:\nwaitUntilElement(By.xpath(\"//body\")).text().contains(FORBIDDEN_TEXT);\n}\n}\n-}\n"}],"string":"[\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/adapter/servlet/AbstractDemoFilterServletAdapterTest.java\",\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/adapter/servlet/AbstractDemoFilterServletAdapterTest.java\",\n \"diff\": \"@@ -20,6 +20,13 @@ public abstract class AbstractDemoFilterServletAdapterTest extends AbstractDemoS\\n}\\n+ @Test\\n+ @Override\\n+ @Ignore\\n+ public void testAuthenticatedWithCustomSessionConfig() {\\n+\\n+ }\\n+\\n@Test\\n@Override\\n@Ignore\\n\"\n },\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/adapter/servlet/AbstractSAMLFilterServletAdapterTest.java\",\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/adapter/servlet/AbstractSAMLFilterServletAdapterTest.java\",\n \"diff\": \"@@ -38,8 +38,6 @@ public abstract class AbstractSAMLFilterServletAdapterTest extends AbstractSAMLS\\ntestRealmLoginPage.form().login(bburkeUser);\\nemployee2ServletPage.checkRolesEndPoint(true);\\nemployee2ServletPage.logout();\\n-\\n- forbiddenIfNotAuthenticated = false;\\n}\\n@After\\n@@ -72,7 +70,7 @@ public abstract class AbstractSAMLFilterServletAdapterTest extends AbstractSAMLS\\n@Test\\n@Override\\n@Ignore\\n- public void testErrorHandling() {\\n+ public void testErrorHandlingUnsigned() {\\n}\\n}\\n\"\n },\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/adapter/servlet/AbstractSAMLServletsAdapterTest.java\",\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/adapter/servlet/AbstractSAMLServletsAdapterTest.java\",\n \"diff\": \"@@ -802,7 +802,7 @@ public abstract class AbstractSAMLServletsAdapterTest extends AbstractServletsAd\\nassertCurrentUrlStartsWith(testRealmSAMLPostLoginPage);\\ntestRealmSAMLPostLoginPage.form().login(\\\"bburke\\\", \\\"password\\\");\\n- waitUntilElement(By.xpath(\\\"//body\\\")).text().contains(\\\"Error info: SamlAuthenticationError [reason=INVALID_SIGNATURE, status=null]\\\");\\n+ waitUntilElement(By.xpath(\\\"//body\\\")).text().contains(\\\"Error info: SamlAuthenticationError [reason=INVALID_SIGNATURE\\\");\\nassertEquals(driver.getCurrentUrl(), badAssertionSalesPostSigPage + \\\"/saml\\\");\\n}\\n@@ -812,30 +812,28 @@ public abstract class AbstractSAMLServletsAdapterTest extends AbstractServletsAd\\nassertCurrentUrlStartsWith(testRealmSAMLPostLoginPage);\\ntestRealmSAMLPostLoginPage.form().login(\\\"bburke\\\", \\\"password\\\");\\n- waitUntilElement(By.xpath(\\\"//body\\\")).text().contains(\\\"Error info: SamlAuthenticationError [reason=INVALID_SIGNATURE, status=null]\\\");\\n+ waitUntilElement(By.xpath(\\\"//body\\\")).text().contains(\\\"Error info: SamlAuthenticationError [reason=INVALID_SIGNATURE\\\");\\nassertEquals(driver.getCurrentUrl(), missingAssertionSigPage + \\\"/saml\\\");\\n}\\n@Test\\n- public void testErrorHandling() throws Exception {\\n+ public void testErrorHandlingUnsigned() throws Exception {\\nClient client = ClientBuilder.newClient();\\n// make sure\\n- Response response = client.target(employeeSigServletPage.toString()).request().get();\\n+ Response response = client.target(employeeServletPage.toString()).request().get();\\nresponse.close();\\nSAML2ErrorResponseBuilder builder = new SAML2ErrorResponseBuilder()\\n- .destination(employeeSigServletPage.toString() + \\\"/saml\\\")\\n+ .destination(employeeServletPage.toString() + \\\"/saml\\\")\\n.issuer(\\\"http://localhost:\\\" + System.getProperty(\\\"auth.server.http.port\\\", \\\"8180\\\") + \\\"/realms/demo\\\")\\n.status(JBossSAMLURIConstants.STATUS_REQUEST_DENIED.get());\\nBaseSAML2BindingBuilder binding = new BaseSAML2BindingBuilder()\\n.relayState(null);\\nDocument document = builder.buildDocument();\\n- URI uri = binding.redirectBinding(document).generateURI(employeeSigServletPage.toString() + \\\"/saml\\\", false);\\n+ URI uri = binding.redirectBinding(document).generateURI(employeeServletPage.toString() + \\\"/saml\\\", false);\\nresponse = client.target(uri).request().get();\\nString errorPage = response.readEntity(String.class);\\nresponse.close();\\n- Assert.assertTrue(errorPage.contains(\\\"Error info: SamlAuthenticationError [reason=ERROR_STATUS\\\"));\\n- Assert.assertFalse(errorPage.contains(\\\"status=null\\\"));\\n- client.close();\\n+ Assert.assertEquals(403, response.getStatus());\\n}\\n@Test\\n@@ -1003,14 +1001,6 @@ public abstract class AbstractSAMLServletsAdapterTest extends AbstractServletsAd\\n}\\nprivate void assertOnForbiddenPage() {\\n- switch (System.getProperty(\\\"app.server\\\")) {\\n- case \\\"eap6\\\":\\n- waitUntilElement(By.xpath(\\\"//body\\\")).text().not().contains(\\\"principal=\\\");\\n- String source = driver.getPageSource();\\n- assertTrue(source.isEmpty() || source.contains(\\\"
\\\"));\\n- break;\\n- default:\\nwaitUntilElement(By.xpath(\\\"//body\\\")).text().contains(FORBIDDEN_TEXT);\\n}\\n}\\n-}\\n\"\n }\n]"},"language":{"kind":"string","value":"Java"},"license":{"kind":"string","value":"Apache License 2.0"},"repo":{"kind":"string","value":"keycloak/keycloak"},"original_message":{"kind":"string","value":"KEYCLOAK-4281 Fix tests for SAML adapters in Arquillian TS"}}},{"rowIdx":2263,"cells":{"author":{"kind":"number","value":339465,"string":"339,465"},"date":{"kind":"string","value":"26.01.2017 09:48:29"},"timezone":{"kind":"number","value":-3600,"string":"-3,600"},"hash":{"kind":"string","value":"a8e2c8ef3126f17d58b3c3afda30068fa80a0b59"},"message":{"kind":"string","value":"Remove LegacyImportTest as the legacy JSON export/import tested with MigrationTest"},"mods":{"kind":"list like","value":[{"change_type":"DELETE","old_path":"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/AbstractExportImportTest.java","new_path":null,"diff":"-/*\n- * Copyright 2016 Red Hat, Inc. and/or its affiliates\n- * and other contributors as indicated by the @author tags.\n- *\n- * Licensed under the Apache License, Version 2.0 (the \"License\");\n- * you may not use this file except in compliance with the License.\n- * You may obtain a copy of the License at\n- *\n- * http://www.apache.org/licenses/LICENSE-2.0\n- *\n- * Unless required by applicable law or agreed to in writing, software\n- * distributed under the License is distributed on an \"AS IS\" BASIS,\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n- * See the License for the specific language governing permissions and\n- * limitations under the License.\n- */\n-\n-package org.keycloak.testsuite.exportimport;\n-\n-import org.jboss.arquillian.container.spi.Container;\n-import org.jboss.arquillian.container.spi.client.container.LifecycleException;\n-import org.keycloak.exportimport.ExportImportConfig;\n-import org.keycloak.testsuite.AbstractKeycloakTest;\n-\n-import java.util.HashSet;\n-import java.util.Properties;\n-import java.util.Set;\n-\n-/**\n- * @author Marek Posolda\n- */\n-public abstract class AbstractExportImportTest extends AbstractKeycloakTest {\n-\n-\n- public void clearExportImportProperties() {\n- // Clear export/import properties after test\n- Properties systemProps = System.getProperties();\n- Set propsToRemove = new HashSet();\n-\n- for (Object key : systemProps.keySet()) {\n- if (key.toString().startsWith(ExportImportConfig.PREFIX)) {\n- propsToRemove.add(key.toString());\n- }\n- }\n-\n- for (String propToRemove : propsToRemove) {\n- systemProps.remove(propToRemove);\n- }\n- }\n-\n-\n- public void restartServer() throws LifecycleException {\n- Container arqContainer = suiteContext.getAuthServerInfo().getArquillianContainer();\n- arqContainer.stop();\n- arqContainer.start();\n- }\n-}\n"},{"change_type":"MODIFY","old_path":"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/ExportImportTest.java","new_path":"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/ExportImportTest.java","diff":"@@ -29,13 +29,18 @@ import org.keycloak.representations.idm.ComponentRepresentation;\nimport org.keycloak.representations.idm.KeysMetadataRepresentation;\nimport org.keycloak.representations.idm.RealmRepresentation;\nimport org.keycloak.representations.idm.UserRepresentation;\n+import org.keycloak.testsuite.AbstractKeycloakTest;\nimport org.keycloak.testsuite.Assert;\nimport org.keycloak.testsuite.util.UserBuilder;\nimport java.io.File;\nimport java.net.URL;\n+import java.util.HashSet;\nimport java.util.List;\nimport java.util.Map;\n+import java.util.Properties;\n+import java.util.Set;\n+\nimport static org.junit.Assert.assertEquals;\nimport static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;\n@@ -45,7 +50,7 @@ import static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;\n* @author Marek Posolda\n* @author Stan Silvert ssilvert@redhat.com (C) 2016 Red Hat Inc.\n*/\n-public class ExportImportTest extends AbstractExportImportTest {\n+public class ExportImportTest extends AbstractKeycloakTest {\n@Override\npublic void addTestRealms(List testRealms) {\n@@ -257,5 +262,21 @@ public class ExportImportTest extends AbstractExportImportTest {\n}\n}\n+ private void clearExportImportProperties() {\n+ // Clear export/import properties after test\n+ Properties systemProps = System.getProperties();\n+ Set propsToRemove = new HashSet();\n+\n+ for (Object key : systemProps.keySet()) {\n+ if (key.toString().startsWith(ExportImportConfig.PREFIX)) {\n+ propsToRemove.add(key.toString());\n+ }\n+ }\n+\n+ for (String propToRemove : propsToRemove) {\n+ systemProps.remove(propToRemove);\n+ }\n+ }\n+\n}\n"},{"change_type":"DELETE","old_path":"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/LegacyImportTest.java","new_path":null,"diff":"-/*\n- * Copyright 2016 Red Hat, Inc. and/or its affiliates\n- * and other contributors as indicated by the @author tags.\n- *\n- * Licensed under the Apache License, Version 2.0 (the \"License\");\n- * you may not use this file except in compliance with the License.\n- * You may obtain a copy of the License at\n- *\n- * http://www.apache.org/licenses/LICENSE-2.0\n- *\n- * Unless required by applicable law or agreed to in writing, software\n- * distributed under the License is distributed on an \"AS IS\" BASIS,\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n- * See the License for the specific language governing permissions and\n- * limitations under the License.\n- */\n-\n-package org.keycloak.testsuite.exportimport;\n-\n-import org.jboss.arquillian.container.spi.client.container.LifecycleException;\n-import org.junit.After;\n-import org.junit.Assert;\n-import org.junit.Test;\n-import org.keycloak.Config;\n-import org.keycloak.admin.client.resource.ClientResource;\n-import org.keycloak.exportimport.ExportImportConfig;\n-import org.keycloak.exportimport.singlefile.SingleFileExportProviderFactory;\n-import org.keycloak.models.AdminRoles;\n-import org.keycloak.models.ImpersonationConstants;\n-import org.keycloak.protocol.oidc.OIDCLoginProtocol;\n-import org.keycloak.protocol.oidc.OIDCLoginProtocolFactory;\n-import org.keycloak.representations.idm.ProtocolMapperRepresentation;\n-import org.keycloak.representations.idm.RealmRepresentation;\n-import org.keycloak.representations.idm.RoleRepresentation;\n-\n-import java.io.File;\n-import java.net.URL;\n-import java.util.Collection;\n-import java.util.List;\n-import java.util.Set;\n-import org.keycloak.admin.client.resource.RealmResource;\n-import org.keycloak.exportimport.Strategy;\n-import static org.keycloak.testsuite.Assert.assertNames;\n-import static org.keycloak.testsuite.migration.MigrationTest.MIGRATION;\n-\n-/**\n- * Test importing JSON files exported from previous adminClient versions\n- *\n- * @author Marek Posolda\n- */\n-public class LegacyImportTest extends AbstractExportImportTest {\n-\n- @After\n- public void after() {\n- clearExportImportProperties();\n- }\n-\n-\n- @Override\n- public void addTestRealms(List testRealms) {\n- }\n-\n- @Test\n- public void testLegacyImport(String version) {\n- String file = \"/migration-test/migration-realm-1.9.8.Final.json\";\n-\n- URL url = LegacyImportTest.class.getResource(file);\n- String targetFilePath = new File(url.getFile()).getAbsolutePath();\n- testingClient.testing().exportImport().setFile(targetFilePath);\n- testingClient.testing().exportImport().setProvider(SingleFileExportProviderFactory.PROVIDER_ID);\n- testingClient.testing().exportImport().setAction(ExportImportConfig.ACTION_IMPORT);\n- testingClient.testing().exportImport().setRealmName(MIGRATION);\n- testingClient.testing().exportImport().setStrategy(Strategy.IGNORE_EXISTING);\n-\n- try {\n- testingClient.testing().exportImport().runImport();\n-\n- RealmResource imported = adminClient.realm(MIGRATION);\n-\n- assertNames(imported.roles().list(), \"offline_access\", \"uma_authorization\", \"migration-test-realm-role\");\n- assertNames(imported.clients().findAll(), \"account\", \"admin-cli\", \"broker\", \"migration-test-client\", \"realm-management\", \"security-admin-console\");\n- String id = imported.clients().findByClientId(\"migration-test-client\").get(0).getId();\n- assertNames(imported.clients().get(id).roles().list(), \"migration-test-client-role\");\n- assertNames(imported.users().search(\"\", 0, 5), \"migration-test-user\");\n- assertNames(imported.groups().groups(), \"migration-test-group\");\n- } finally {\n- removeRealm(MIGRATION);\n- }\n- }\n-\n- //KEYCLOAK-1982\n- @Test\n- public void importFrom11() throws LifecycleException {\n- URL url = LegacyImportTest.class.getResource(\"/exportimport-test/kc11-exported-realm.json\");\n- String targetFilePath = new File(url.getFile()).getAbsolutePath();\n- testingClient.testing().exportImport().setFile(targetFilePath);\n- testingClient.testing().exportImport().setProvider(SingleFileExportProviderFactory.PROVIDER_ID);\n- testingClient.testing().exportImport().setAction(ExportImportConfig.ACTION_IMPORT);\n-\n- try {\n- testingClient.testing().exportImport().runImport();\n-\n- // Assert \"locale\" mapper available in security-admin-console client\n- ClientResource foo11AdminConsoleClient = adminClient.realm(\"foo11\").clients().get(\"a9ca4217-74a8-4658-92c8-c2f9ed48a474\");\n- assertLocaleMapperPresent(foo11AdminConsoleClient);\n-\n- // Assert \"realm-management\" role correctly set and contains all admin roles.\n- ClientResource foo11RealmManagementClient = adminClient.realm(\"foo11\").clients().get(\"c7a9cf59-feeb-44a4-a467-e008e157efa2\");\n- List roles = foo11RealmManagementClient.roles().list();\n- assertRolesAvailable(roles);\n-\n- // Assert all admin roles are also available as composites of \"realm-admin\"\n- Set realmAdminComposites = foo11RealmManagementClient.roles().get(AdminRoles.REALM_ADMIN).getRoleComposites();\n- assertRolesAvailable(realmAdminComposites);\n-\n- // Assert all admin roles are also available as composites of \"admin\" role\n- Set masterAdminComposites = adminClient.realm(Config.getAdminRealm()).roles().get(AdminRoles.ADMIN).getRoleComposites();\n- assertRolesAvailable(masterAdminComposites);\n- } finally {\n- removeRealm(\"foo11\");\n- }\n- }\n-\n-\n- private void assertLocaleMapperPresent(ClientResource client) {\n- List protMappers = client.getProtocolMappers().getMappersPerProtocol(OIDCLoginProtocol.LOGIN_PROTOCOL);\n- for (ProtocolMapperRepresentation protMapper : protMappers) {\n- if (protMapper.getName().equals(OIDCLoginProtocolFactory.LOCALE)) {\n- return;\n- }\n- }\n-\n- Assert.fail(\"Locale mapper not found for client\");\n- }\n-\n-\n- private void assertRolesAvailable(Collection roles) {\n- assertRoleAvailable(roles, AdminRoles.VIEW_IDENTITY_PROVIDERS);\n- assertRoleAvailable(roles, AdminRoles.MANAGE_IDENTITY_PROVIDERS);\n- assertRoleAvailable(roles, AdminRoles.CREATE_CLIENT);\n- assertRoleAvailable(roles, ImpersonationConstants.IMPERSONATION_ROLE);\n- }\n-\n-\n- private RoleRepresentation assertRoleAvailable(Collection roles, String roleName) {\n- for (RoleRepresentation role : roles) {\n- if (role.getName().equals(roleName)) {\n- return role;\n- }\n- }\n-\n- Assert.fail(\"Role \" + roleName + \" not found\");\n- return null;\n- }\n-}\n"}],"string":"[\n {\n \"change_type\": \"DELETE\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/AbstractExportImportTest.java\",\n \"new_path\": null,\n \"diff\": \"-/*\\n- * Copyright 2016 Red Hat, Inc. and/or its affiliates\\n- * and other contributors as indicated by the @author tags.\\n- *\\n- * Licensed under the Apache License, Version 2.0 (the \\\"License\\\");\\n- * you may not use this file except in compliance with the License.\\n- * You may obtain a copy of the License at\\n- *\\n- * http://www.apache.org/licenses/LICENSE-2.0\\n- *\\n- * Unless required by applicable law or agreed to in writing, software\\n- * distributed under the License is distributed on an \\\"AS IS\\\" BASIS,\\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\\n- * See the License for the specific language governing permissions and\\n- * limitations under the License.\\n- */\\n-\\n-package org.keycloak.testsuite.exportimport;\\n-\\n-import org.jboss.arquillian.container.spi.Container;\\n-import org.jboss.arquillian.container.spi.client.container.LifecycleException;\\n-import org.keycloak.exportimport.ExportImportConfig;\\n-import org.keycloak.testsuite.AbstractKeycloakTest;\\n-\\n-import java.util.HashSet;\\n-import java.util.Properties;\\n-import java.util.Set;\\n-\\n-/**\\n- * @author Marek Posolda\\n- */\\n-public abstract class AbstractExportImportTest extends AbstractKeycloakTest {\\n-\\n-\\n- public void clearExportImportProperties() {\\n- // Clear export/import properties after test\\n- Properties systemProps = System.getProperties();\\n- Set propsToRemove = new HashSet();\\n-\\n- for (Object key : systemProps.keySet()) {\\n- if (key.toString().startsWith(ExportImportConfig.PREFIX)) {\\n- propsToRemove.add(key.toString());\\n- }\\n- }\\n-\\n- for (String propToRemove : propsToRemove) {\\n- systemProps.remove(propToRemove);\\n- }\\n- }\\n-\\n-\\n- public void restartServer() throws LifecycleException {\\n- Container arqContainer = suiteContext.getAuthServerInfo().getArquillianContainer();\\n- arqContainer.stop();\\n- arqContainer.start();\\n- }\\n-}\\n\"\n },\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/ExportImportTest.java\",\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/ExportImportTest.java\",\n \"diff\": \"@@ -29,13 +29,18 @@ import org.keycloak.representations.idm.ComponentRepresentation;\\nimport org.keycloak.representations.idm.KeysMetadataRepresentation;\\nimport org.keycloak.representations.idm.RealmRepresentation;\\nimport org.keycloak.representations.idm.UserRepresentation;\\n+import org.keycloak.testsuite.AbstractKeycloakTest;\\nimport org.keycloak.testsuite.Assert;\\nimport org.keycloak.testsuite.util.UserBuilder;\\nimport java.io.File;\\nimport java.net.URL;\\n+import java.util.HashSet;\\nimport java.util.List;\\nimport java.util.Map;\\n+import java.util.Properties;\\n+import java.util.Set;\\n+\\nimport static org.junit.Assert.assertEquals;\\nimport static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;\\n@@ -45,7 +50,7 @@ import static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;\\n* @author Marek Posolda\\n* @author Stan Silvert ssilvert@redhat.com (C) 2016 Red Hat Inc.\\n*/\\n-public class ExportImportTest extends AbstractExportImportTest {\\n+public class ExportImportTest extends AbstractKeycloakTest {\\n@Override\\npublic void addTestRealms(List testRealms) {\\n@@ -257,5 +262,21 @@ public class ExportImportTest extends AbstractExportImportTest {\\n}\\n}\\n+ private void clearExportImportProperties() {\\n+ // Clear export/import properties after test\\n+ Properties systemProps = System.getProperties();\\n+ Set propsToRemove = new HashSet();\\n+\\n+ for (Object key : systemProps.keySet()) {\\n+ if (key.toString().startsWith(ExportImportConfig.PREFIX)) {\\n+ propsToRemove.add(key.toString());\\n+ }\\n+ }\\n+\\n+ for (String propToRemove : propsToRemove) {\\n+ systemProps.remove(propToRemove);\\n+ }\\n+ }\\n+\\n}\\n\"\n },\n {\n \"change_type\": \"DELETE\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/LegacyImportTest.java\",\n \"new_path\": null,\n \"diff\": \"-/*\\n- * Copyright 2016 Red Hat, Inc. and/or its affiliates\\n- * and other contributors as indicated by the @author tags.\\n- *\\n- * Licensed under the Apache License, Version 2.0 (the \\\"License\\\");\\n- * you may not use this file except in compliance with the License.\\n- * You may obtain a copy of the License at\\n- *\\n- * http://www.apache.org/licenses/LICENSE-2.0\\n- *\\n- * Unless required by applicable law or agreed to in writing, software\\n- * distributed under the License is distributed on an \\\"AS IS\\\" BASIS,\\n- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\\n- * See the License for the specific language governing permissions and\\n- * limitations under the License.\\n- */\\n-\\n-package org.keycloak.testsuite.exportimport;\\n-\\n-import org.jboss.arquillian.container.spi.client.container.LifecycleException;\\n-import org.junit.After;\\n-import org.junit.Assert;\\n-import org.junit.Test;\\n-import org.keycloak.Config;\\n-import org.keycloak.admin.client.resource.ClientResource;\\n-import org.keycloak.exportimport.ExportImportConfig;\\n-import org.keycloak.exportimport.singlefile.SingleFileExportProviderFactory;\\n-import org.keycloak.models.AdminRoles;\\n-import org.keycloak.models.ImpersonationConstants;\\n-import org.keycloak.protocol.oidc.OIDCLoginProtocol;\\n-import org.keycloak.protocol.oidc.OIDCLoginProtocolFactory;\\n-import org.keycloak.representations.idm.ProtocolMapperRepresentation;\\n-import org.keycloak.representations.idm.RealmRepresentation;\\n-import org.keycloak.representations.idm.RoleRepresentation;\\n-\\n-import java.io.File;\\n-import java.net.URL;\\n-import java.util.Collection;\\n-import java.util.List;\\n-import java.util.Set;\\n-import org.keycloak.admin.client.resource.RealmResource;\\n-import org.keycloak.exportimport.Strategy;\\n-import static org.keycloak.testsuite.Assert.assertNames;\\n-import static org.keycloak.testsuite.migration.MigrationTest.MIGRATION;\\n-\\n-/**\\n- * Test importing JSON files exported from previous adminClient versions\\n- *\\n- * @author Marek Posolda\\n- */\\n-public class LegacyImportTest extends AbstractExportImportTest {\\n-\\n- @After\\n- public void after() {\\n- clearExportImportProperties();\\n- }\\n-\\n-\\n- @Override\\n- public void addTestRealms(List testRealms) {\\n- }\\n-\\n- @Test\\n- public void testLegacyImport(String version) {\\n- String file = \\\"/migration-test/migration-realm-1.9.8.Final.json\\\";\\n-\\n- URL url = LegacyImportTest.class.getResource(file);\\n- String targetFilePath = new File(url.getFile()).getAbsolutePath();\\n- testingClient.testing().exportImport().setFile(targetFilePath);\\n- testingClient.testing().exportImport().setProvider(SingleFileExportProviderFactory.PROVIDER_ID);\\n- testingClient.testing().exportImport().setAction(ExportImportConfig.ACTION_IMPORT);\\n- testingClient.testing().exportImport().setRealmName(MIGRATION);\\n- testingClient.testing().exportImport().setStrategy(Strategy.IGNORE_EXISTING);\\n-\\n- try {\\n- testingClient.testing().exportImport().runImport();\\n-\\n- RealmResource imported = adminClient.realm(MIGRATION);\\n-\\n- assertNames(imported.roles().list(), \\\"offline_access\\\", \\\"uma_authorization\\\", \\\"migration-test-realm-role\\\");\\n- assertNames(imported.clients().findAll(), \\\"account\\\", \\\"admin-cli\\\", \\\"broker\\\", \\\"migration-test-client\\\", \\\"realm-management\\\", \\\"security-admin-console\\\");\\n- String id = imported.clients().findByClientId(\\\"migration-test-client\\\").get(0).getId();\\n- assertNames(imported.clients().get(id).roles().list(), \\\"migration-test-client-role\\\");\\n- assertNames(imported.users().search(\\\"\\\", 0, 5), \\\"migration-test-user\\\");\\n- assertNames(imported.groups().groups(), \\\"migration-test-group\\\");\\n- } finally {\\n- removeRealm(MIGRATION);\\n- }\\n- }\\n-\\n- //KEYCLOAK-1982\\n- @Test\\n- public void importFrom11() throws LifecycleException {\\n- URL url = LegacyImportTest.class.getResource(\\\"/exportimport-test/kc11-exported-realm.json\\\");\\n- String targetFilePath = new File(url.getFile()).getAbsolutePath();\\n- testingClient.testing().exportImport().setFile(targetFilePath);\\n- testingClient.testing().exportImport().setProvider(SingleFileExportProviderFactory.PROVIDER_ID);\\n- testingClient.testing().exportImport().setAction(ExportImportConfig.ACTION_IMPORT);\\n-\\n- try {\\n- testingClient.testing().exportImport().runImport();\\n-\\n- // Assert \\\"locale\\\" mapper available in security-admin-console client\\n- ClientResource foo11AdminConsoleClient = adminClient.realm(\\\"foo11\\\").clients().get(\\\"a9ca4217-74a8-4658-92c8-c2f9ed48a474\\\");\\n- assertLocaleMapperPresent(foo11AdminConsoleClient);\\n-\\n- // Assert \\\"realm-management\\\" role correctly set and contains all admin roles.\\n- ClientResource foo11RealmManagementClient = adminClient.realm(\\\"foo11\\\").clients().get(\\\"c7a9cf59-feeb-44a4-a467-e008e157efa2\\\");\\n- List roles = foo11RealmManagementClient.roles().list();\\n- assertRolesAvailable(roles);\\n-\\n- // Assert all admin roles are also available as composites of \\\"realm-admin\\\"\\n- Set realmAdminComposites = foo11RealmManagementClient.roles().get(AdminRoles.REALM_ADMIN).getRoleComposites();\\n- assertRolesAvailable(realmAdminComposites);\\n-\\n- // Assert all admin roles are also available as composites of \\\"admin\\\" role\\n- Set masterAdminComposites = adminClient.realm(Config.getAdminRealm()).roles().get(AdminRoles.ADMIN).getRoleComposites();\\n- assertRolesAvailable(masterAdminComposites);\\n- } finally {\\n- removeRealm(\\\"foo11\\\");\\n- }\\n- }\\n-\\n-\\n- private void assertLocaleMapperPresent(ClientResource client) {\\n- List protMappers = client.getProtocolMappers().getMappersPerProtocol(OIDCLoginProtocol.LOGIN_PROTOCOL);\\n- for (ProtocolMapperRepresentation protMapper : protMappers) {\\n- if (protMapper.getName().equals(OIDCLoginProtocolFactory.LOCALE)) {\\n- return;\\n- }\\n- }\\n-\\n- Assert.fail(\\\"Locale mapper not found for client\\\");\\n- }\\n-\\n-\\n- private void assertRolesAvailable(Collection roles) {\\n- assertRoleAvailable(roles, AdminRoles.VIEW_IDENTITY_PROVIDERS);\\n- assertRoleAvailable(roles, AdminRoles.MANAGE_IDENTITY_PROVIDERS);\\n- assertRoleAvailable(roles, AdminRoles.CREATE_CLIENT);\\n- assertRoleAvailable(roles, ImpersonationConstants.IMPERSONATION_ROLE);\\n- }\\n-\\n-\\n- private RoleRepresentation assertRoleAvailable(Collection roles, String roleName) {\\n- for (RoleRepresentation role : roles) {\\n- if (role.getName().equals(roleName)) {\\n- return role;\\n- }\\n- }\\n-\\n- Assert.fail(\\\"Role \\\" + roleName + \\\" not found\\\");\\n- return null;\\n- }\\n-}\\n\"\n }\n]"},"language":{"kind":"string","value":"Java"},"license":{"kind":"string","value":"Apache License 2.0"},"repo":{"kind":"string","value":"keycloak/keycloak"},"original_message":{"kind":"string","value":"KEYCLOAK-2813 Remove LegacyImportTest as the legacy JSON export/import tested with MigrationTest"}}},{"rowIdx":2264,"cells":{"author":{"kind":"number","value":339465,"string":"339,465"},"date":{"kind":"string","value":"26.01.2017 17:19:03"},"timezone":{"kind":"number","value":-3600,"string":"-3,600"},"hash":{"kind":"string","value":"42ad8aec64761e0ee4df4f1e3788a8c6603a51cd"},"message":{"kind":"string","value":"Migration test for offline tokens"},"mods":{"kind":"list like","value":[{"change_type":"MODIFY","old_path":"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/AuthServerTestEnricher.java","new_path":"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/AuthServerTestEnricher.java","diff":"@@ -164,13 +164,20 @@ public class AuthServerTestEnricher {\nreturn authServerInfo;\n}\n- public void startMigratedContainer(@Observes(precedence = 2) StartSuiteContainers event) {\n+ public void startMigratedContainer(@Observes(precedence = 3) StartSuiteContainers event) {\nif (suiteContext.isAuthServerMigrationEnabled()) {\nlog.info(\"\\n\\n### Starting keycloak \" + System.getProperty(\"migrated.auth.server.version\", \"- previous\") + \" ###\\n\\n\");\nstartContainerEvent.fire(new StartContainer(suiteContext.getMigratedAuthServerInfo().getArquillianContainer()));\n}\n}\n+ public void runPreMigrationTask(@Observes(precedence = 2) StartSuiteContainers event) {\n+ if (suiteContext.isAuthServerMigrationEnabled()) {\n+ log.info(\"\\n\\n### Run preMigration task on keycloak \" + System.getProperty(\"migrated.auth.server.version\", \"- previous\") + \" ###\\n\\n\");\n+ suiteContext.getMigrationContext().runPreMigrationTask();\n+ }\n+ }\n+\npublic void stopMigratedContainer(@Observes(precedence = 1) StartSuiteContainers event) {\nif (suiteContext.isAuthServerMigrationEnabled()) {\nlog.info(\"## STOP old container: \" + suiteContext.getMigratedAuthServerInfo().getQualifier());\n"},{"change_type":"MODIFY","old_path":"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/SuiteContext.java","new_path":"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/SuiteContext.java","diff":"@@ -22,6 +22,8 @@ import java.util.List;\nimport java.util.Map;\nimport java.util.Set;\n+import org.keycloak.testsuite.arquillian.migration.MigrationContext;\n+\nimport static org.keycloak.testsuite.util.MailServerConfiguration.FROM;\nimport static org.keycloak.testsuite.util.MailServerConfiguration.HOST;\nimport static org.keycloak.testsuite.util.MailServerConfiguration.PORT;\n@@ -38,6 +40,7 @@ public final class SuiteContext {\nprivate final List authServerBackendsInfo = new ArrayList<>();\nprivate ContainerInfo migratedAuthServerInfo;\n+ private final MigrationContext migrationContext = new MigrationContext();\nprivate boolean adminPasswordUpdated;\nprivate final Map smtpServer = new HashMap<>();\n@@ -78,6 +81,10 @@ public final class SuiteContext {\nreturn migratedAuthServerInfo;\n}\n+ public MigrationContext getMigrationContext() {\n+ return migrationContext;\n+ }\n+\npublic void setMigratedAuthServerInfo(ContainerInfo migratedAuthServerInfo) {\nthis.migratedAuthServerInfo = migratedAuthServerInfo;\n}\n"},{"change_type":"ADD","old_path":null,"new_path":"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/migration/MigrationContext.java","diff":"+/*\n+ * Copyright 2016 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.testsuite.arquillian.migration;\n+\n+import org.jboss.logging.Logger;\n+import org.keycloak.OAuth2Constants;\n+import org.keycloak.testsuite.util.OAuthClient;\n+\n+/**\n+ * @author Marek Posolda\n+ */\n+public class MigrationContext {\n+\n+ public static final Logger logger = Logger.getLogger(MigrationContext.class);\n+\n+ private String offlineToken;\n+\n+ public String getOfflineToken() {\n+ return offlineToken;\n+ }\n+\n+\n+ // Do some actions on the old container\n+ public void runPreMigrationTask() {\n+ requestOfflineToken();\n+ }\n+\n+ private void requestOfflineToken() {\n+ logger.info(\"Requesting offline token on the old container\");\n+ try {\n+ OAuthClient oauth = new OAuthClient();\n+ oauth.init(null, null);\n+ oauth.scope(OAuth2Constants.OFFLINE_ACCESS);\n+ oauth.realm(\"Migration\");\n+ oauth.clientId(\"migration-test-client\");\n+ OAuthClient.AccessTokenResponse tokenResponse = oauth.doGrantAccessTokenRequest(\"b2c07929-69e3-44c6-8d7f-76939000b3e4\", \"migration-test-user\", \"admin\");\n+ offlineToken = tokenResponse.getRefreshToken();\n+ } catch (Exception e) {\n+ throw new RuntimeException(e);\n+ }\n+ }\n+\n+}\n"},{"change_type":"MODIFY","old_path":"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/migration/MigrationTest.java","new_path":"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/migration/MigrationTest.java","diff":"@@ -35,6 +35,7 @@ import org.keycloak.models.Constants;\nimport org.keycloak.models.LDAPConstants;\nimport org.keycloak.models.UserModel;\nimport org.keycloak.models.utils.DefaultAuthenticationFlows;\n+import org.keycloak.representations.AccessToken;\nimport org.keycloak.representations.idm.AuthenticationExecutionExportRepresentation;\nimport org.keycloak.representations.idm.AuthenticationFlowRepresentation;\nimport org.keycloak.representations.idm.ClientRepresentation;\n@@ -47,7 +48,9 @@ import org.keycloak.representations.idm.RoleRepresentation;\nimport org.keycloak.representations.idm.authorization.PolicyRepresentation;\nimport org.keycloak.storage.UserStorageProvider;\nimport org.keycloak.testsuite.AbstractKeycloakTest;\n+import org.keycloak.testsuite.Assert;\nimport org.keycloak.testsuite.arquillian.migration.Migration;\n+import org.keycloak.testsuite.util.OAuthClient;\nimport static org.keycloak.testsuite.Assert.assertEquals;\nimport static org.keycloak.testsuite.Assert.assertFalse;\n@@ -104,6 +107,7 @@ public class MigrationTest extends AbstractKeycloakTest {\ntestMigrationTo2_2_0();\ntestMigrationTo2_3_0();\ntestMigrationTo2_5_0();\n+ testMigrationTo2_5_1();\n}\n@Test\n@@ -169,6 +173,10 @@ public class MigrationTest extends AbstractKeycloakTest {\ntestDuplicateEmailSupport(masterRealm, migrationRealm);\n}\n+ private void testMigrationTo2_5_1() {\n+ testOfflineTokenLogin();\n+ }\n+\nprivate void testExtractRealmKeys(RealmResource masterRealm, RealmResource migrationRealm) {\nlog.info(\"testing extract realm keys\");\nString expectedMasterRealmKey = \"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\";\n@@ -337,4 +345,16 @@ public class MigrationTest extends AbstractKeycloakTest {\nassertFalse(\"DuplicateEmailsAllowed should be disabled.\", rep.isDuplicateEmailsAllowed());\n}\n}\n+\n+ private void testOfflineTokenLogin() {\n+ log.info(\"test login with old offline token\");\n+ String oldOfflineToken = suiteContext.getMigrationContext().getOfflineToken();\n+ Assert.assertNotNull(oldOfflineToken);\n+\n+ oauth.realm(MIGRATION);\n+ oauth.clientId(\"migration-test-client\");\n+ OAuthClient.AccessTokenResponse response = oauth.doRefreshTokenRequest(oldOfflineToken, \"b2c07929-69e3-44c6-8d7f-76939000b3e4\");\n+ AccessToken accessToken = oauth.verifyToken(response.getAccessToken());\n+ assertEquals(\"migration-test-user\", accessToken.getPreferredUsername());\n+ }\n}\n"},{"change_type":"DELETE","old_path":"testsuite/integration-arquillian/tests/base/src/test/resources/exportimport-test/kc11-exported-realm.json","new_path":null,"diff":"-{\n- \"id\" : \"14e6923c-f5fb-44aa-8982-35d4976c56c5\",\n- \"realm\" : \"foo11\",\n- \"notBefore\" : 0,\n- \"accessTokenLifespan\" : 300,\n- \"ssoSessionIdleTimeout\" : 1800,\n- \"ssoSessionMaxLifespan\" : 36000,\n- \"accessCodeLifespan\" : 60,\n- \"accessCodeLifespanUserAction\" : 300,\n- \"enabled\" : true,\n- \"sslRequired\" : \"external\",\n- \"passwordCredentialGrantAllowed\" : false,\n- \"registrationAllowed\" : false,\n- \"rememberMe\" : false,\n- \"verifyEmail\" : false,\n- \"resetPasswordAllowed\" : false,\n- \"social\" : false,\n- \"updateProfileOnInitialSocialLogin\" : false,\n- \"bruteForceProtected\" : false,\n- \"maxFailureWaitSeconds\" : 900,\n- \"minimumQuickLoginWaitSeconds\" : 60,\n- \"waitIncrementSeconds\" : 60,\n- \"quickLoginCheckMilliSeconds\" : 1000,\n- \"maxDeltaTimeSeconds\" : 43200,\n- \"failureFactor\" : 30,\n- \"privateKey\" : \"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\",\n- \"publicKey\" : \"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC05JPgp3F/lxuKMmf6TNs5YtumvoFL88eQ9UPhYn768CHc/PDNRBu3VN8GxwgbkUEX/I5s+nTWo8bKJAxdDyGRlAYItanJxH5iCe152cuEAY0kkHunDvsgAKx7snUztYJ7kC1b+B8I+9a6D0yXwwAZMHlOvF+QXKIiDzB8Cvww+QIDAQAB\",\n- \"certificate\" : \"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\",\n- \"codeSecret\" : \"0af1be0b-2fdb-4037-9e6a-1e3370bf9f15\",\n- \"roles\" : {\n- \"application\" : {\n- \"realm-management\" : [ {\n- \"id\" : \"eaaf02b4-a38e-4fca-8689-a4ace644c7d9\",\n- \"name\" : \"manage-applications\",\n- \"composite\" : false\n- }, {\n- \"id\" : \"ce48589c-1459-4b75-ac99-45fd9255e562\",\n- \"name\" : \"manage-events\",\n- \"composite\" : false\n- }, {\n- \"id\" : \"ac30d420-da49-4ac6-83f8-2a6be5b5435d\",\n- \"name\" : \"view-users\",\n- \"composite\" : false\n- }, {\n- \"id\" : \"6f465ced-4722-4059-8300-104a68d5fd98\",\n- \"name\" : \"view-realm\",\n- \"composite\" : false\n- }, {\n- \"id\" : \"0f3060f4-2097-4e8b-8852-b8b27be11b6b\",\n- \"name\" : \"view-events\",\n- \"composite\" : false\n- }, {\n- \"id\" : \"1ceb312c-a5ae-4199-b567-81bef7d9103f\",\n- \"name\" : \"manage-realm\",\n- \"composite\" : false\n- }, {\n- \"id\" : \"d36d799b-0fa1-48eb-8b45-3bfc1eab817e\",\n- \"name\" : \"view-applications\",\n- \"composite\" : false\n- }, {\n- \"id\" : \"7d04fc11-2d52-4aca-9f79-e3d1782e4eef\",\n- \"name\" : \"manage-clients\",\n- \"composite\" : false\n- }, {\n- \"id\" : \"1c233305-6941-407f-8058-dfdf40f7d87f\",\n- \"name\" : \"realm-admin\",\n- \"composite\" : true,\n- \"composites\" : {\n- \"application\" : {\n- \"realm-management\" : [ \"manage-applications\", \"manage-events\", \"view-users\", \"view-realm\", \"view-events\", \"manage-realm\", \"view-applications\", \"manage-clients\", \"view-clients\", \"manage-users\" ]\n- }\n- }\n- }, {\n- \"id\" : \"29fe8dc9-ec74-42bf-b11a-3592aa205612\",\n- \"name\" : \"view-clients\",\n- \"composite\" : false\n- }, {\n- \"id\" : \"ac0059d0-bbe5-4247-ab82-5d408a1e9e19\",\n- \"name\" : \"manage-users\",\n- \"composite\" : false\n- } ],\n- \"security-admin-console\" : [ ],\n- \"account\" : [ {\n- \"id\" : \"44d8d987-62e4-4235-afd8-c0f7e7c5c280\",\n- \"name\" : \"view-profile\",\n- \"composite\" : false\n- }, {\n- \"id\" : \"03c1c19b-1732-488d-afc6-b5962e1d5fcd\",\n- \"name\" : \"manage-account\",\n- \"composite\" : false\n- } ]\n- }\n- },\n- \"requiredCredentials\" : [ \"password\" ],\n- \"users\" : [ {\n- \"id\" : \"2de2f04e-ff3b-4c22-b98d-6e3689bb2108\",\n- \"username\" : \"john11\",\n- \"enabled\" : true,\n- \"totp\" : false,\n- \"emailVerified\" : false,\n- \"email\" : \"john11@email.cz\",\n- \"credentials\" : [ {\n- \"type\" : \"password\",\n- \"hashedSaltedValue\" : \"2iUgsRh4EU4OV1nucya5UGCtQ34g/dpF8S1fKR77SsC0MrGpb1IKW7VOxGrooaQdxyzwFl48wXy68QFlkk6BcQ==\",\n- \"salt\" : \"rkzFU40mN8yVa7agq3SXMA==\",\n- \"hashIterations\" : 1,\n- \"temporary\" : false\n- } ],\n- \"requiredActions\" : [ ],\n- \"applicationRoles\" : {\n- \"realm-management\" : [ \"manage-applications\" ],\n- \"account\" : [ \"view-profile\", \"manage-account\" ]\n- }\n- } ],\n- \"applicationScopeMappings\" : {\n- \"realm-management\" : [ {\n- \"client\" : \"security-admin-console\",\n- \"roles\" : [ \"realm-admin\" ]\n- } ]\n- },\n- \"applications\" : [ {\n- \"id\" : \"c7a9cf59-feeb-44a4-a467-e008e157efa2\",\n- \"name\" : \"realm-management\",\n- \"surrogateAuthRequired\" : false,\n- \"enabled\" : true,\n- \"secret\" : \"1bceb96f-9abe-4a8a-9d76-5989e87a981e\",\n- \"redirectUris\" : [ ],\n- \"webOrigins\" : [ ],\n- \"claims\" : {\n- \"name\" : true,\n- \"username\" : true,\n- \"profile\" : true,\n- \"picture\" : true,\n- \"website\" : true,\n- \"email\" : true,\n- \"gender\" : true,\n- \"locale\" : true,\n- \"address\" : true,\n- \"phone\" : true\n- },\n- \"notBefore\" : 0,\n- \"bearerOnly\" : true,\n- \"publicClient\" : false,\n- \"attributes\" : { },\n- \"fullScopeAllowed\" : false,\n- \"nodeReRegistrationTimeout\" : 0\n- }, {\n- \"id\" : \"0715aa1a-0b7d-4594-a315-741205441910\",\n- \"name\" : \"account\",\n- \"baseUrl\" : \"/auth/realms/foo11/account\",\n- \"surrogateAuthRequired\" : false,\n- \"enabled\" : true,\n- \"secret\" : \"c7378e28-201c-4fd0-8482-ad5ea78adc51\",\n- \"defaultRoles\" : [ \"view-profile\", \"manage-account\" ],\n- \"redirectUris\" : [ \"/auth/realms/foo11/account/*\" ],\n- \"webOrigins\" : [ ],\n- \"claims\" : {\n- \"name\" : true,\n- \"username\" : true,\n- \"profile\" : true,\n- \"picture\" : true,\n- \"website\" : true,\n- \"email\" : true,\n- \"gender\" : true,\n- \"locale\" : true,\n- \"address\" : true,\n- \"phone\" : true\n- },\n- \"notBefore\" : 0,\n- \"bearerOnly\" : false,\n- \"publicClient\" : false,\n- \"attributes\" : { },\n- \"fullScopeAllowed\" : false,\n- \"nodeReRegistrationTimeout\" : 0\n- }, {\n- \"id\" : \"a9ca4217-74a8-4658-92c8-c2f9ed48a474\",\n- \"name\" : \"security-admin-console\",\n- \"baseUrl\" : \"/auth/admin/foo11/console/index.html\",\n- \"surrogateAuthRequired\" : false,\n- \"enabled\" : true,\n- \"secret\" : \"a5fd322f-6d2b-463c-b2af-bbc56f772462\",\n- \"redirectUris\" : [ \"/auth/admin/foo11/console/*\" ],\n- \"webOrigins\" : [ ],\n- \"claims\" : {\n- \"name\" : true,\n- \"username\" : true,\n- \"profile\" : true,\n- \"picture\" : true,\n- \"website\" : true,\n- \"email\" : true,\n- \"gender\" : true,\n- \"locale\" : true,\n- \"address\" : true,\n- \"phone\" : true\n- },\n- \"notBefore\" : 0,\n- \"bearerOnly\" : false,\n- \"publicClient\" : true,\n- \"attributes\" : { },\n- \"fullScopeAllowed\" : false,\n- \"nodeReRegistrationTimeout\" : 0\n- } ],\n- \"oauthClients\" : [ ],\n- \"browserSecurityHeaders\" : {\n- \"xFrameOptions\" : \"SAMEORIGIN\",\n- \"contentSecurityPolicy\" : \"frame-src 'self'\"\n- },\n- \"socialProviders\" : { },\n- \"smtpServer\" : { },\n- \"eventsEnabled\" : false,\n- \"eventsListeners\" : [ ]\n-}\n\\ No newline at end of file\n"},{"change_type":"MODIFY","old_path":"testsuite/integration-arquillian/tests/base/src/test/resources/log4j.properties","new_path":"testsuite/integration-arquillian/tests/base/src/test/resources/log4j.properties","diff":"@@ -23,7 +23,7 @@ log4j.appender.keycloak.layout.ConversionPattern=%d{HH:mm:ss,SSS} %-5p [%c] %m%n\nlog4j.appender.testsuite=org.apache.log4j.ConsoleAppender\nlog4j.appender.testsuite.layout=org.apache.log4j.PatternLayout\n-log4j.appender.testsuite.layout.ConversionPattern=%d{HH:mm:ss,SSS} %-5p %m%n\n+log4j.appender.testsuite.layout.ConversionPattern=%d{HH:mm:ss,SSS} %-5p [%C{1}] %m%n\nlog4j.logger.org.keycloak=off, keycloak\n"},{"change_type":"MODIFY","old_path":"testsuite/integration-arquillian/tests/base/src/test/resources/migration-test/migration-realm-1.9.8.Final.json","new_path":"testsuite/integration-arquillian/tests/base/src/test/resources/migration-test/migration-realm-1.9.8.Final.json","diff":"\"enabled\" : true,\n\"totp\" : false,\n\"emailVerified\" : false,\n- \"credentials\" : [ ],\n+ \"credentials\" : [ {\n+ \"type\" : \"password\",\n+ \"hashedSaltedValue\" : \"Y71bKP3V5cvqiPGxPspDCQRraGbJD4IGxjYOez4QdubTYpoFjYb2wdC+pRoXskBvOaCYQcGzMa3SatDrFlBm9Q==\",\n+ \"salt\" : \"o6D0KTKeFVejy00RhKZxvQ==\",\n+ \"hashIterations\" : 20000,\n+ \"counter\" : 0,\n+ \"algorithm\" : \"pbkdf2\",\n+ \"digits\" : 0,\n+ \"createdDate\" : 1476260086000\n+ } ],\n\"requiredActions\" : [ ],\n\"realmRoles\" : [ \"offline_access\" ],\n\"clientRoles\" : {\n\"implicitFlowEnabled\" : false,\n\"directAccessGrantsEnabled\" : true,\n\"serviceAccountsEnabled\" : false,\n- \"publicClient\" : true,\n+ \"publicClient\" : false,\n\"frontchannelLogout\" : false,\n\"protocol\" : \"openid-connect\",\n\"attributes\" : { },\n"}],"string":"[\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/AuthServerTestEnricher.java\",\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/AuthServerTestEnricher.java\",\n \"diff\": \"@@ -164,13 +164,20 @@ public class AuthServerTestEnricher {\\nreturn authServerInfo;\\n}\\n- public void startMigratedContainer(@Observes(precedence = 2) StartSuiteContainers event) {\\n+ public void startMigratedContainer(@Observes(precedence = 3) StartSuiteContainers event) {\\nif (suiteContext.isAuthServerMigrationEnabled()) {\\nlog.info(\\\"\\\\n\\\\n### Starting keycloak \\\" + System.getProperty(\\\"migrated.auth.server.version\\\", \\\"- previous\\\") + \\\" ###\\\\n\\\\n\\\");\\nstartContainerEvent.fire(new StartContainer(suiteContext.getMigratedAuthServerInfo().getArquillianContainer()));\\n}\\n}\\n+ public void runPreMigrationTask(@Observes(precedence = 2) StartSuiteContainers event) {\\n+ if (suiteContext.isAuthServerMigrationEnabled()) {\\n+ log.info(\\\"\\\\n\\\\n### Run preMigration task on keycloak \\\" + System.getProperty(\\\"migrated.auth.server.version\\\", \\\"- previous\\\") + \\\" ###\\\\n\\\\n\\\");\\n+ suiteContext.getMigrationContext().runPreMigrationTask();\\n+ }\\n+ }\\n+\\npublic void stopMigratedContainer(@Observes(precedence = 1) StartSuiteContainers event) {\\nif (suiteContext.isAuthServerMigrationEnabled()) {\\nlog.info(\\\"## STOP old container: \\\" + suiteContext.getMigratedAuthServerInfo().getQualifier());\\n\"\n },\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/SuiteContext.java\",\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/SuiteContext.java\",\n \"diff\": \"@@ -22,6 +22,8 @@ import java.util.List;\\nimport java.util.Map;\\nimport java.util.Set;\\n+import org.keycloak.testsuite.arquillian.migration.MigrationContext;\\n+\\nimport static org.keycloak.testsuite.util.MailServerConfiguration.FROM;\\nimport static org.keycloak.testsuite.util.MailServerConfiguration.HOST;\\nimport static org.keycloak.testsuite.util.MailServerConfiguration.PORT;\\n@@ -38,6 +40,7 @@ public final class SuiteContext {\\nprivate final List authServerBackendsInfo = new ArrayList<>();\\nprivate ContainerInfo migratedAuthServerInfo;\\n+ private final MigrationContext migrationContext = new MigrationContext();\\nprivate boolean adminPasswordUpdated;\\nprivate final Map smtpServer = new HashMap<>();\\n@@ -78,6 +81,10 @@ public final class SuiteContext {\\nreturn migratedAuthServerInfo;\\n}\\n+ public MigrationContext getMigrationContext() {\\n+ return migrationContext;\\n+ }\\n+\\npublic void setMigratedAuthServerInfo(ContainerInfo migratedAuthServerInfo) {\\nthis.migratedAuthServerInfo = migratedAuthServerInfo;\\n}\\n\"\n },\n {\n \"change_type\": \"ADD\",\n \"old_path\": null,\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/migration/MigrationContext.java\",\n \"diff\": \"+/*\\n+ * Copyright 2016 Red Hat, Inc. and/or its affiliates\\n+ * and other contributors as indicated by the @author tags.\\n+ *\\n+ * Licensed under the Apache License, Version 2.0 (the \\\"License\\\");\\n+ * you may not use this file except in compliance with the License.\\n+ * You may obtain a copy of the License at\\n+ *\\n+ * http://www.apache.org/licenses/LICENSE-2.0\\n+ *\\n+ * Unless required by applicable law or agreed to in writing, software\\n+ * distributed under the License is distributed on an \\\"AS IS\\\" BASIS,\\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\\n+ * See the License for the specific language governing permissions and\\n+ * limitations under the License.\\n+ */\\n+\\n+package org.keycloak.testsuite.arquillian.migration;\\n+\\n+import org.jboss.logging.Logger;\\n+import org.keycloak.OAuth2Constants;\\n+import org.keycloak.testsuite.util.OAuthClient;\\n+\\n+/**\\n+ * @author Marek Posolda\\n+ */\\n+public class MigrationContext {\\n+\\n+ public static final Logger logger = Logger.getLogger(MigrationContext.class);\\n+\\n+ private String offlineToken;\\n+\\n+ public String getOfflineToken() {\\n+ return offlineToken;\\n+ }\\n+\\n+\\n+ // Do some actions on the old container\\n+ public void runPreMigrationTask() {\\n+ requestOfflineToken();\\n+ }\\n+\\n+ private void requestOfflineToken() {\\n+ logger.info(\\\"Requesting offline token on the old container\\\");\\n+ try {\\n+ OAuthClient oauth = new OAuthClient();\\n+ oauth.init(null, null);\\n+ oauth.scope(OAuth2Constants.OFFLINE_ACCESS);\\n+ oauth.realm(\\\"Migration\\\");\\n+ oauth.clientId(\\\"migration-test-client\\\");\\n+ OAuthClient.AccessTokenResponse tokenResponse = oauth.doGrantAccessTokenRequest(\\\"b2c07929-69e3-44c6-8d7f-76939000b3e4\\\", \\\"migration-test-user\\\", \\\"admin\\\");\\n+ offlineToken = tokenResponse.getRefreshToken();\\n+ } catch (Exception e) {\\n+ throw new RuntimeException(e);\\n+ }\\n+ }\\n+\\n+}\\n\"\n },\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/migration/MigrationTest.java\",\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/migration/MigrationTest.java\",\n \"diff\": \"@@ -35,6 +35,7 @@ import org.keycloak.models.Constants;\\nimport org.keycloak.models.LDAPConstants;\\nimport org.keycloak.models.UserModel;\\nimport org.keycloak.models.utils.DefaultAuthenticationFlows;\\n+import org.keycloak.representations.AccessToken;\\nimport org.keycloak.representations.idm.AuthenticationExecutionExportRepresentation;\\nimport org.keycloak.representations.idm.AuthenticationFlowRepresentation;\\nimport org.keycloak.representations.idm.ClientRepresentation;\\n@@ -47,7 +48,9 @@ import org.keycloak.representations.idm.RoleRepresentation;\\nimport org.keycloak.representations.idm.authorization.PolicyRepresentation;\\nimport org.keycloak.storage.UserStorageProvider;\\nimport org.keycloak.testsuite.AbstractKeycloakTest;\\n+import org.keycloak.testsuite.Assert;\\nimport org.keycloak.testsuite.arquillian.migration.Migration;\\n+import org.keycloak.testsuite.util.OAuthClient;\\nimport static org.keycloak.testsuite.Assert.assertEquals;\\nimport static org.keycloak.testsuite.Assert.assertFalse;\\n@@ -104,6 +107,7 @@ public class MigrationTest extends AbstractKeycloakTest {\\ntestMigrationTo2_2_0();\\ntestMigrationTo2_3_0();\\ntestMigrationTo2_5_0();\\n+ testMigrationTo2_5_1();\\n}\\n@Test\\n@@ -169,6 +173,10 @@ public class MigrationTest extends AbstractKeycloakTest {\\ntestDuplicateEmailSupport(masterRealm, migrationRealm);\\n}\\n+ private void testMigrationTo2_5_1() {\\n+ testOfflineTokenLogin();\\n+ }\\n+\\nprivate void testExtractRealmKeys(RealmResource masterRealm, RealmResource migrationRealm) {\\nlog.info(\\\"testing extract realm keys\\\");\\nString expectedMasterRealmKey = \\\"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\\\";\\n@@ -337,4 +345,16 @@ public class MigrationTest extends AbstractKeycloakTest {\\nassertFalse(\\\"DuplicateEmailsAllowed should be disabled.\\\", rep.isDuplicateEmailsAllowed());\\n}\\n}\\n+\\n+ private void testOfflineTokenLogin() {\\n+ log.info(\\\"test login with old offline token\\\");\\n+ String oldOfflineToken = suiteContext.getMigrationContext().getOfflineToken();\\n+ Assert.assertNotNull(oldOfflineToken);\\n+\\n+ oauth.realm(MIGRATION);\\n+ oauth.clientId(\\\"migration-test-client\\\");\\n+ OAuthClient.AccessTokenResponse response = oauth.doRefreshTokenRequest(oldOfflineToken, \\\"b2c07929-69e3-44c6-8d7f-76939000b3e4\\\");\\n+ AccessToken accessToken = oauth.verifyToken(response.getAccessToken());\\n+ assertEquals(\\\"migration-test-user\\\", accessToken.getPreferredUsername());\\n+ }\\n}\\n\"\n },\n {\n \"change_type\": \"DELETE\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/test/resources/exportimport-test/kc11-exported-realm.json\",\n \"new_path\": null,\n \"diff\": \"-{\\n- \\\"id\\\" : \\\"14e6923c-f5fb-44aa-8982-35d4976c56c5\\\",\\n- \\\"realm\\\" : \\\"foo11\\\",\\n- \\\"notBefore\\\" : 0,\\n- \\\"accessTokenLifespan\\\" : 300,\\n- \\\"ssoSessionIdleTimeout\\\" : 1800,\\n- \\\"ssoSessionMaxLifespan\\\" : 36000,\\n- \\\"accessCodeLifespan\\\" : 60,\\n- \\\"accessCodeLifespanUserAction\\\" : 300,\\n- \\\"enabled\\\" : true,\\n- \\\"sslRequired\\\" : \\\"external\\\",\\n- \\\"passwordCredentialGrantAllowed\\\" : false,\\n- \\\"registrationAllowed\\\" : false,\\n- \\\"rememberMe\\\" : false,\\n- \\\"verifyEmail\\\" : false,\\n- \\\"resetPasswordAllowed\\\" : false,\\n- \\\"social\\\" : false,\\n- \\\"updateProfileOnInitialSocialLogin\\\" : false,\\n- \\\"bruteForceProtected\\\" : false,\\n- \\\"maxFailureWaitSeconds\\\" : 900,\\n- \\\"minimumQuickLoginWaitSeconds\\\" : 60,\\n- \\\"waitIncrementSeconds\\\" : 60,\\n- \\\"quickLoginCheckMilliSeconds\\\" : 1000,\\n- \\\"maxDeltaTimeSeconds\\\" : 43200,\\n- \\\"failureFactor\\\" : 30,\\n- \\\"privateKey\\\" : \\\"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\\\",\\n- \\\"publicKey\\\" : \\\"MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC05JPgp3F/lxuKMmf6TNs5YtumvoFL88eQ9UPhYn768CHc/PDNRBu3VN8GxwgbkUEX/I5s+nTWo8bKJAxdDyGRlAYItanJxH5iCe152cuEAY0kkHunDvsgAKx7snUztYJ7kC1b+B8I+9a6D0yXwwAZMHlOvF+QXKIiDzB8Cvww+QIDAQAB\\\",\\n- \\\"certificate\\\" : \\\"MIIBkzCB/QIGAVPnGn2KMA0GCSqGSIb3DQEBCwUAMBAxDjAMBgNVBAMTBWZvbzExMB4XDTE2MDQwNTE1NDQ0NloXDTI2MDQwNTE1NDYyNlowEDEOMAwGA1UEAxMFZm9vMTEwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALTkk+CncX+XG4oyZ/pM2zli26a+gUvzx5D1Q+FifvrwIdz88M1EG7dU3wbHCBuRQRf8jmz6dNajxsokDF0PIZGUBgi1qcnEfmIJ7XnZy4QBjSSQe6cO+yAArHuydTO1gnuQLVv4Hwj71roPTJfDABkweU68X5BcoiIPMHwK/DD5AgMBAAEwDQYJKoZIhvcNAQELBQADgYEAsB4JWLBGFIaPAJAnZ8BMGuVoQhNtRxUD4htX/enKpuiQM3u0Nw4sFotJG8xvnxucJheCB8DpvIcAVmaARqLJ0bvfJ4wbP70cWd3iCvxoiiXtjpSQy/0rOTeGiYcnnwZC+ffpOzTGe4OoPdYymjrmubeIyRrF+ijmH2n2Rn4ELXw=\\\",\\n- \\\"codeSecret\\\" : \\\"0af1be0b-2fdb-4037-9e6a-1e3370bf9f15\\\",\\n- \\\"roles\\\" : {\\n- \\\"application\\\" : {\\n- \\\"realm-management\\\" : [ {\\n- \\\"id\\\" : \\\"eaaf02b4-a38e-4fca-8689-a4ace644c7d9\\\",\\n- \\\"name\\\" : \\\"manage-applications\\\",\\n- \\\"composite\\\" : false\\n- }, {\\n- \\\"id\\\" : \\\"ce48589c-1459-4b75-ac99-45fd9255e562\\\",\\n- \\\"name\\\" : \\\"manage-events\\\",\\n- \\\"composite\\\" : false\\n- }, {\\n- \\\"id\\\" : \\\"ac30d420-da49-4ac6-83f8-2a6be5b5435d\\\",\\n- \\\"name\\\" : \\\"view-users\\\",\\n- \\\"composite\\\" : false\\n- }, {\\n- \\\"id\\\" : \\\"6f465ced-4722-4059-8300-104a68d5fd98\\\",\\n- \\\"name\\\" : \\\"view-realm\\\",\\n- \\\"composite\\\" : false\\n- }, {\\n- \\\"id\\\" : \\\"0f3060f4-2097-4e8b-8852-b8b27be11b6b\\\",\\n- \\\"name\\\" : \\\"view-events\\\",\\n- \\\"composite\\\" : false\\n- }, {\\n- \\\"id\\\" : \\\"1ceb312c-a5ae-4199-b567-81bef7d9103f\\\",\\n- \\\"name\\\" : \\\"manage-realm\\\",\\n- \\\"composite\\\" : false\\n- }, {\\n- \\\"id\\\" : \\\"d36d799b-0fa1-48eb-8b45-3bfc1eab817e\\\",\\n- \\\"name\\\" : \\\"view-applications\\\",\\n- \\\"composite\\\" : false\\n- }, {\\n- \\\"id\\\" : \\\"7d04fc11-2d52-4aca-9f79-e3d1782e4eef\\\",\\n- \\\"name\\\" : \\\"manage-clients\\\",\\n- \\\"composite\\\" : false\\n- }, {\\n- \\\"id\\\" : \\\"1c233305-6941-407f-8058-dfdf40f7d87f\\\",\\n- \\\"name\\\" : \\\"realm-admin\\\",\\n- \\\"composite\\\" : true,\\n- \\\"composites\\\" : {\\n- \\\"application\\\" : {\\n- \\\"realm-management\\\" : [ \\\"manage-applications\\\", \\\"manage-events\\\", \\\"view-users\\\", \\\"view-realm\\\", \\\"view-events\\\", \\\"manage-realm\\\", \\\"view-applications\\\", \\\"manage-clients\\\", \\\"view-clients\\\", \\\"manage-users\\\" ]\\n- }\\n- }\\n- }, {\\n- \\\"id\\\" : \\\"29fe8dc9-ec74-42bf-b11a-3592aa205612\\\",\\n- \\\"name\\\" : \\\"view-clients\\\",\\n- \\\"composite\\\" : false\\n- }, {\\n- \\\"id\\\" : \\\"ac0059d0-bbe5-4247-ab82-5d408a1e9e19\\\",\\n- \\\"name\\\" : \\\"manage-users\\\",\\n- \\\"composite\\\" : false\\n- } ],\\n- \\\"security-admin-console\\\" : [ ],\\n- \\\"account\\\" : [ {\\n- \\\"id\\\" : \\\"44d8d987-62e4-4235-afd8-c0f7e7c5c280\\\",\\n- \\\"name\\\" : \\\"view-profile\\\",\\n- \\\"composite\\\" : false\\n- }, {\\n- \\\"id\\\" : \\\"03c1c19b-1732-488d-afc6-b5962e1d5fcd\\\",\\n- \\\"name\\\" : \\\"manage-account\\\",\\n- \\\"composite\\\" : false\\n- } ]\\n- }\\n- },\\n- \\\"requiredCredentials\\\" : [ \\\"password\\\" ],\\n- \\\"users\\\" : [ {\\n- \\\"id\\\" : \\\"2de2f04e-ff3b-4c22-b98d-6e3689bb2108\\\",\\n- \\\"username\\\" : \\\"john11\\\",\\n- \\\"enabled\\\" : true,\\n- \\\"totp\\\" : false,\\n- \\\"emailVerified\\\" : false,\\n- \\\"email\\\" : \\\"john11@email.cz\\\",\\n- \\\"credentials\\\" : [ {\\n- \\\"type\\\" : \\\"password\\\",\\n- \\\"hashedSaltedValue\\\" : \\\"2iUgsRh4EU4OV1nucya5UGCtQ34g/dpF8S1fKR77SsC0MrGpb1IKW7VOxGrooaQdxyzwFl48wXy68QFlkk6BcQ==\\\",\\n- \\\"salt\\\" : \\\"rkzFU40mN8yVa7agq3SXMA==\\\",\\n- \\\"hashIterations\\\" : 1,\\n- \\\"temporary\\\" : false\\n- } ],\\n- \\\"requiredActions\\\" : [ ],\\n- \\\"applicationRoles\\\" : {\\n- \\\"realm-management\\\" : [ \\\"manage-applications\\\" ],\\n- \\\"account\\\" : [ \\\"view-profile\\\", \\\"manage-account\\\" ]\\n- }\\n- } ],\\n- \\\"applicationScopeMappings\\\" : {\\n- \\\"realm-management\\\" : [ {\\n- \\\"client\\\" : \\\"security-admin-console\\\",\\n- \\\"roles\\\" : [ \\\"realm-admin\\\" ]\\n- } ]\\n- },\\n- \\\"applications\\\" : [ {\\n- \\\"id\\\" : \\\"c7a9cf59-feeb-44a4-a467-e008e157efa2\\\",\\n- \\\"name\\\" : \\\"realm-management\\\",\\n- \\\"surrogateAuthRequired\\\" : false,\\n- \\\"enabled\\\" : true,\\n- \\\"secret\\\" : \\\"1bceb96f-9abe-4a8a-9d76-5989e87a981e\\\",\\n- \\\"redirectUris\\\" : [ ],\\n- \\\"webOrigins\\\" : [ ],\\n- \\\"claims\\\" : {\\n- \\\"name\\\" : true,\\n- \\\"username\\\" : true,\\n- \\\"profile\\\" : true,\\n- \\\"picture\\\" : true,\\n- \\\"website\\\" : true,\\n- \\\"email\\\" : true,\\n- \\\"gender\\\" : true,\\n- \\\"locale\\\" : true,\\n- \\\"address\\\" : true,\\n- \\\"phone\\\" : true\\n- },\\n- \\\"notBefore\\\" : 0,\\n- \\\"bearerOnly\\\" : true,\\n- \\\"publicClient\\\" : false,\\n- \\\"attributes\\\" : { },\\n- \\\"fullScopeAllowed\\\" : false,\\n- \\\"nodeReRegistrationTimeout\\\" : 0\\n- }, {\\n- \\\"id\\\" : \\\"0715aa1a-0b7d-4594-a315-741205441910\\\",\\n- \\\"name\\\" : \\\"account\\\",\\n- \\\"baseUrl\\\" : \\\"/auth/realms/foo11/account\\\",\\n- \\\"surrogateAuthRequired\\\" : false,\\n- \\\"enabled\\\" : true,\\n- \\\"secret\\\" : \\\"c7378e28-201c-4fd0-8482-ad5ea78adc51\\\",\\n- \\\"defaultRoles\\\" : [ \\\"view-profile\\\", \\\"manage-account\\\" ],\\n- \\\"redirectUris\\\" : [ \\\"/auth/realms/foo11/account/*\\\" ],\\n- \\\"webOrigins\\\" : [ ],\\n- \\\"claims\\\" : {\\n- \\\"name\\\" : true,\\n- \\\"username\\\" : true,\\n- \\\"profile\\\" : true,\\n- \\\"picture\\\" : true,\\n- \\\"website\\\" : true,\\n- \\\"email\\\" : true,\\n- \\\"gender\\\" : true,\\n- \\\"locale\\\" : true,\\n- \\\"address\\\" : true,\\n- \\\"phone\\\" : true\\n- },\\n- \\\"notBefore\\\" : 0,\\n- \\\"bearerOnly\\\" : false,\\n- \\\"publicClient\\\" : false,\\n- \\\"attributes\\\" : { },\\n- \\\"fullScopeAllowed\\\" : false,\\n- \\\"nodeReRegistrationTimeout\\\" : 0\\n- }, {\\n- \\\"id\\\" : \\\"a9ca4217-74a8-4658-92c8-c2f9ed48a474\\\",\\n- \\\"name\\\" : \\\"security-admin-console\\\",\\n- \\\"baseUrl\\\" : \\\"/auth/admin/foo11/console/index.html\\\",\\n- \\\"surrogateAuthRequired\\\" : false,\\n- \\\"enabled\\\" : true,\\n- \\\"secret\\\" : \\\"a5fd322f-6d2b-463c-b2af-bbc56f772462\\\",\\n- \\\"redirectUris\\\" : [ \\\"/auth/admin/foo11/console/*\\\" ],\\n- \\\"webOrigins\\\" : [ ],\\n- \\\"claims\\\" : {\\n- \\\"name\\\" : true,\\n- \\\"username\\\" : true,\\n- \\\"profile\\\" : true,\\n- \\\"picture\\\" : true,\\n- \\\"website\\\" : true,\\n- \\\"email\\\" : true,\\n- \\\"gender\\\" : true,\\n- \\\"locale\\\" : true,\\n- \\\"address\\\" : true,\\n- \\\"phone\\\" : true\\n- },\\n- \\\"notBefore\\\" : 0,\\n- \\\"bearerOnly\\\" : false,\\n- \\\"publicClient\\\" : true,\\n- \\\"attributes\\\" : { },\\n- \\\"fullScopeAllowed\\\" : false,\\n- \\\"nodeReRegistrationTimeout\\\" : 0\\n- } ],\\n- \\\"oauthClients\\\" : [ ],\\n- \\\"browserSecurityHeaders\\\" : {\\n- \\\"xFrameOptions\\\" : \\\"SAMEORIGIN\\\",\\n- \\\"contentSecurityPolicy\\\" : \\\"frame-src 'self'\\\"\\n- },\\n- \\\"socialProviders\\\" : { },\\n- \\\"smtpServer\\\" : { },\\n- \\\"eventsEnabled\\\" : false,\\n- \\\"eventsListeners\\\" : [ ]\\n-}\\n\\\\ No newline at end of file\\n\"\n },\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/test/resources/log4j.properties\",\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/test/resources/log4j.properties\",\n \"diff\": \"@@ -23,7 +23,7 @@ log4j.appender.keycloak.layout.ConversionPattern=%d{HH:mm:ss,SSS} %-5p [%c] %m%n\\nlog4j.appender.testsuite=org.apache.log4j.ConsoleAppender\\nlog4j.appender.testsuite.layout=org.apache.log4j.PatternLayout\\n-log4j.appender.testsuite.layout.ConversionPattern=%d{HH:mm:ss,SSS} %-5p %m%n\\n+log4j.appender.testsuite.layout.ConversionPattern=%d{HH:mm:ss,SSS} %-5p [%C{1}] %m%n\\nlog4j.logger.org.keycloak=off, keycloak\\n\"\n },\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/test/resources/migration-test/migration-realm-1.9.8.Final.json\",\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/test/resources/migration-test/migration-realm-1.9.8.Final.json\",\n \"diff\": \"\\\"enabled\\\" : true,\\n\\\"totp\\\" : false,\\n\\\"emailVerified\\\" : false,\\n- \\\"credentials\\\" : [ ],\\n+ \\\"credentials\\\" : [ {\\n+ \\\"type\\\" : \\\"password\\\",\\n+ \\\"hashedSaltedValue\\\" : \\\"Y71bKP3V5cvqiPGxPspDCQRraGbJD4IGxjYOez4QdubTYpoFjYb2wdC+pRoXskBvOaCYQcGzMa3SatDrFlBm9Q==\\\",\\n+ \\\"salt\\\" : \\\"o6D0KTKeFVejy00RhKZxvQ==\\\",\\n+ \\\"hashIterations\\\" : 20000,\\n+ \\\"counter\\\" : 0,\\n+ \\\"algorithm\\\" : \\\"pbkdf2\\\",\\n+ \\\"digits\\\" : 0,\\n+ \\\"createdDate\\\" : 1476260086000\\n+ } ],\\n\\\"requiredActions\\\" : [ ],\\n\\\"realmRoles\\\" : [ \\\"offline_access\\\" ],\\n\\\"clientRoles\\\" : {\\n\\\"implicitFlowEnabled\\\" : false,\\n\\\"directAccessGrantsEnabled\\\" : true,\\n\\\"serviceAccountsEnabled\\\" : false,\\n- \\\"publicClient\\\" : true,\\n+ \\\"publicClient\\\" : false,\\n\\\"frontchannelLogout\\\" : false,\\n\\\"protocol\\\" : \\\"openid-connect\\\",\\n\\\"attributes\\\" : { },\\n\"\n }\n]"},"language":{"kind":"string","value":"Java"},"license":{"kind":"string","value":"Apache License 2.0"},"repo":{"kind":"string","value":"keycloak/keycloak"},"original_message":{"kind":"string","value":"KEYCLOAK-4271 Migration test for offline tokens"}}},{"rowIdx":2265,"cells":{"author":{"kind":"number","value":339473,"string":"339,473"},"date":{"kind":"string","value":"26.01.2017 17:04:22"},"timezone":{"kind":"number","value":-3600,"string":"-3,600"},"hash":{"kind":"string","value":"3e13ffda655f621bf06e62184bcbebf6a44dd2be"},"message":{"kind":"string","value":"Upgrade and unify Aesh version to 0.66.12"},"mods":{"kind":"list like","value":[{"change_type":"MODIFY","old_path":"integration/client-cli/pom.xml","new_path":"integration/client-cli/pom.xml","diff":"keycloak-client-cli-parent\npom\n- \n- \n- \n- org.jboss.aesh\n- aesh\n- 0.66.10\n- \n- \n- \n-\n\nclient-registration-cli\nadmin-cli\n"},{"change_type":"MODIFY","old_path":"pom.xml","new_path":"pom.xml","diff":"7.2.0.Final\n10.0.0.Final\n- 0.66.4\n+ 0.66.12\n4.5\n4.4.1\n0.6\n"},{"change_type":"MODIFY","old_path":"wildfly/adduser/src/main/java/org/keycloak/wildfly/adduser/AddUser.java","new_path":"wildfly/adduser/src/main/java/org/keycloak/wildfly/adduser/AddUser.java","diff":"@@ -40,7 +40,6 @@ import java.io.Console;\nimport java.io.File;\nimport java.io.FileInputStream;\nimport java.io.FileOutputStream;\n-import java.io.IOException;\nimport java.lang.reflect.Method;\nimport java.util.HashMap;\nimport java.util.LinkedList;\n@@ -276,7 +275,7 @@ public class AddUser {\nprivate boolean help;\n@Override\n- public CommandResult execute(CommandInvocation commandInvocation) throws IOException, InterruptedException {\n+ public CommandResult execute(CommandInvocation commandInvocation) throws InterruptedException {\nreturn CommandResult.SUCCESS;\n}\n"}],"string":"[\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"integration/client-cli/pom.xml\",\n \"new_path\": \"integration/client-cli/pom.xml\",\n \"diff\": \"keycloak-client-cli-parent\\npom\\n- \\n- \\n- \\n- org.jboss.aesh\\n- aesh\\n- 0.66.10\\n- \\n- \\n- \\n-\\n\\nclient-registration-cli\\nadmin-cli\\n\"\n },\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"pom.xml\",\n \"new_path\": \"pom.xml\",\n \"diff\": \"7.2.0.Final\\n10.0.0.Final\\n- 0.66.4\\n+ 0.66.12\\n4.5\\n4.4.1\\n0.6\\n\"\n },\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"wildfly/adduser/src/main/java/org/keycloak/wildfly/adduser/AddUser.java\",\n \"new_path\": \"wildfly/adduser/src/main/java/org/keycloak/wildfly/adduser/AddUser.java\",\n \"diff\": \"@@ -40,7 +40,6 @@ import java.io.Console;\\nimport java.io.File;\\nimport java.io.FileInputStream;\\nimport java.io.FileOutputStream;\\n-import java.io.IOException;\\nimport java.lang.reflect.Method;\\nimport java.util.HashMap;\\nimport java.util.LinkedList;\\n@@ -276,7 +275,7 @@ public class AddUser {\\nprivate boolean help;\\n@Override\\n- public CommandResult execute(CommandInvocation commandInvocation) throws IOException, InterruptedException {\\n+ public CommandResult execute(CommandInvocation commandInvocation) throws InterruptedException {\\nreturn CommandResult.SUCCESS;\\n}\\n\"\n }\n]"},"language":{"kind":"string","value":"Java"},"license":{"kind":"string","value":"Apache License 2.0"},"repo":{"kind":"string","value":"keycloak/keycloak"},"original_message":{"kind":"string","value":"KEYCLOAK-4324 Upgrade and unify Aesh version to 0.66.12"}}},{"rowIdx":2266,"cells":{"author":{"kind":"number","value":339465,"string":"339,465"},"date":{"kind":"string","value":"26.01.2017 21:32:15"},"timezone":{"kind":"number","value":-3600,"string":"-3,600"},"hash":{"kind":"string","value":"265522a2e33c1a9591a5878bd3941c53ba45c834"},"message":{"kind":"string","value":"Adapter tests for examples fail in Wildfly/EAP6"},"mods":{"kind":"list like","value":[{"change_type":"MODIFY","old_path":"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/KeycloakArquillianExtension.java","new_path":"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/KeycloakArquillianExtension.java","diff":"package org.keycloak.testsuite.arquillian;\nimport org.jboss.arquillian.container.spi.client.container.DeployableContainer;\n+import org.jboss.arquillian.container.osgi.OSGiApplicationArchiveProcessor;\nimport org.jboss.arquillian.container.test.impl.enricher.resource.URLResourceProvider;\nimport org.jboss.arquillian.container.test.spi.client.deployment.ApplicationArchiveProcessor;\nimport org.jboss.arquillian.container.test.spi.client.deployment.DeploymentScenarioGenerator;\n@@ -63,7 +64,8 @@ public class KeycloakArquillianExtension implements LoadableExtension {\nbuilder\n.override(ResourceProvider.class, URLResourceProvider.class, URLProvider.class)\n.override(ResourceProvider.class, CustomizableURLResourceProvider.class, URLProvider.class)\n- .override(ResourceProvider.class, ContainerCustomizableURLResourceProvider.class, URLProvider.class);\n+ .override(ResourceProvider.class, ContainerCustomizableURLResourceProvider.class, URLProvider.class)\n+ .override(ApplicationArchiveProcessor.class, OSGiApplicationArchiveProcessor.class, KeycloakOSGiApplicationArchiveProcessor.class);\n}\n"},{"change_type":"ADD","old_path":null,"new_path":"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/KeycloakOSGiApplicationArchiveProcessor.java","diff":"+/*\n+ * Copyright 2016 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+\n+package org.keycloak.testsuite.arquillian;\n+\n+import org.jboss.arquillian.container.osgi.OSGiApplicationArchiveProcessor;\n+import org.jboss.arquillian.test.spi.TestClass;\n+import org.jboss.logging.Logger;\n+import org.jboss.shrinkwrap.api.Archive;\n+\n+/**\n+ * @author Marek Posolda\n+ */\n+public class KeycloakOSGiApplicationArchiveProcessor extends OSGiApplicationArchiveProcessor {\n+\n+ private static final Logger log = Logger.getLogger(KeycloakOSGiApplicationArchiveProcessor.class);\n+\n+ // We want to ignore OSGI for exampleAdapter tests\n+ @Override\n+ public void process(Archive> appArchive, TestClass testClass) {\n+ Class> clazz = testClass.getJavaClass();\n+ boolean isExampleAdapterTest = isExampleAdapterTest(clazz);\n+\n+ if (isExampleAdapterTest) {\n+ log.infof(\"Ignore OSGiApplicationArchiveProcessor for test %s\", clazz.getName());\n+ } else {\n+ super.process(appArchive, testClass);\n+ }\n+ }\n+\n+ public static boolean isExampleAdapterTest(Class> clazz) {\n+ Class> parent = clazz;\n+ while (true) {\n+ parent = parent.getSuperclass();\n+ if (parent == null) {\n+ return false;\n+ } else if (parent.getName().equals(\"org.keycloak.testsuite.adapter.AbstractExampleAdapterTest\")) {\n+ return true;\n+ }\n+ }\n+ }\n+}\n"}],"string":"[\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/KeycloakArquillianExtension.java\",\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/KeycloakArquillianExtension.java\",\n \"diff\": \"package org.keycloak.testsuite.arquillian;\\nimport org.jboss.arquillian.container.spi.client.container.DeployableContainer;\\n+import org.jboss.arquillian.container.osgi.OSGiApplicationArchiveProcessor;\\nimport org.jboss.arquillian.container.test.impl.enricher.resource.URLResourceProvider;\\nimport org.jboss.arquillian.container.test.spi.client.deployment.ApplicationArchiveProcessor;\\nimport org.jboss.arquillian.container.test.spi.client.deployment.DeploymentScenarioGenerator;\\n@@ -63,7 +64,8 @@ public class KeycloakArquillianExtension implements LoadableExtension {\\nbuilder\\n.override(ResourceProvider.class, URLResourceProvider.class, URLProvider.class)\\n.override(ResourceProvider.class, CustomizableURLResourceProvider.class, URLProvider.class)\\n- .override(ResourceProvider.class, ContainerCustomizableURLResourceProvider.class, URLProvider.class);\\n+ .override(ResourceProvider.class, ContainerCustomizableURLResourceProvider.class, URLProvider.class)\\n+ .override(ApplicationArchiveProcessor.class, OSGiApplicationArchiveProcessor.class, KeycloakOSGiApplicationArchiveProcessor.class);\\n}\\n\"\n },\n {\n \"change_type\": \"ADD\",\n \"old_path\": null,\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/arquillian/KeycloakOSGiApplicationArchiveProcessor.java\",\n \"diff\": \"+/*\\n+ * Copyright 2016 Red Hat, Inc. and/or its affiliates\\n+ * and other contributors as indicated by the @author tags.\\n+ *\\n+ * Licensed under the Apache License, Version 2.0 (the \\\"License\\\");\\n+ * you may not use this file except in compliance with the License.\\n+ * You may obtain a copy of the License at\\n+ *\\n+ * http://www.apache.org/licenses/LICENSE-2.0\\n+ *\\n+ * Unless required by applicable law or agreed to in writing, software\\n+ * distributed under the License is distributed on an \\\"AS IS\\\" BASIS,\\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\\n+ * See the License for the specific language governing permissions and\\n+ * limitations under the License.\\n+ */\\n+\\n+package org.keycloak.testsuite.arquillian;\\n+\\n+import org.jboss.arquillian.container.osgi.OSGiApplicationArchiveProcessor;\\n+import org.jboss.arquillian.test.spi.TestClass;\\n+import org.jboss.logging.Logger;\\n+import org.jboss.shrinkwrap.api.Archive;\\n+\\n+/**\\n+ * @author Marek Posolda\\n+ */\\n+public class KeycloakOSGiApplicationArchiveProcessor extends OSGiApplicationArchiveProcessor {\\n+\\n+ private static final Logger log = Logger.getLogger(KeycloakOSGiApplicationArchiveProcessor.class);\\n+\\n+ // We want to ignore OSGI for exampleAdapter tests\\n+ @Override\\n+ public void process(Archive> appArchive, TestClass testClass) {\\n+ Class> clazz = testClass.getJavaClass();\\n+ boolean isExampleAdapterTest = isExampleAdapterTest(clazz);\\n+\\n+ if (isExampleAdapterTest) {\\n+ log.infof(\\\"Ignore OSGiApplicationArchiveProcessor for test %s\\\", clazz.getName());\\n+ } else {\\n+ super.process(appArchive, testClass);\\n+ }\\n+ }\\n+\\n+ public static boolean isExampleAdapterTest(Class> clazz) {\\n+ Class> parent = clazz;\\n+ while (true) {\\n+ parent = parent.getSuperclass();\\n+ if (parent == null) {\\n+ return false;\\n+ } else if (parent.getName().equals(\\\"org.keycloak.testsuite.adapter.AbstractExampleAdapterTest\\\")) {\\n+ return true;\\n+ }\\n+ }\\n+ }\\n+}\\n\"\n }\n]"},"language":{"kind":"string","value":"Java"},"license":{"kind":"string","value":"Apache License 2.0"},"repo":{"kind":"string","value":"keycloak/keycloak"},"original_message":{"kind":"string","value":"KEYCLOAK-4285 Adapter tests for examples fail in Wildfly/EAP6"}}},{"rowIdx":2267,"cells":{"author":{"kind":"number","value":339309,"string":"339,309"},"date":{"kind":"string","value":"27.01.2017 17:37:08"},"timezone":{"kind":"number","value":18000,"string":"18,000"},"hash":{"kind":"string","value":"bb77ab4a812c87b5faa25383a637c034321da0b1"},"message":{"kind":"string","value":"account link tests"},"mods":{"kind":"list like","value":[{"change_type":"ADD","old_path":null,"new_path":"testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/java/org/keycloak/testsuite/federation/PassThroughFederatedUserStorageProvider.java","diff":"+/*\n+ * Copyright 2016 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+package org.keycloak.testsuite.federation;\n+\n+import org.keycloak.component.ComponentModel;\n+import org.keycloak.credential.CredentialInput;\n+import org.keycloak.credential.CredentialInputUpdater;\n+import org.keycloak.credential.CredentialInputValidator;\n+import org.keycloak.credential.CredentialModel;\n+import org.keycloak.models.KeycloakSession;\n+import org.keycloak.models.RealmModel;\n+import org.keycloak.models.UserCredentialModel;\n+import org.keycloak.models.UserModel;\n+import org.keycloak.storage.StorageId;\n+import org.keycloak.storage.UserStorageProvider;\n+import org.keycloak.storage.adapter.AbstractUserAdapterFederatedStorage;\n+import org.keycloak.storage.user.UserLookupProvider;\n+\n+import java.util.Collections;\n+import java.util.List;\n+import java.util.Set;\n+\n+/**\n+ * Provides one user where everything is stored in user federated storage\n+ *\n+ * @author Bill Burke\n+ * @version $Revision: 1 $\n+ */\n+public class PassThroughFederatedUserStorageProvider implements\n+ UserStorageProvider,\n+ UserLookupProvider,\n+ CredentialInputValidator,\n+ CredentialInputUpdater\n+{\n+\n+ public static final Set CREDENTIAL_TYPES = Collections.singleton(UserCredentialModel.PASSWORD);\n+ public static final String PASSTHROUGH_USERNAME = \"passthrough\";\n+ public static final String INITIAL_PASSWORD = \"secret\";\n+ private KeycloakSession session;\n+ private ComponentModel component;\n+\n+ public PassThroughFederatedUserStorageProvider(KeycloakSession session, ComponentModel component) {\n+ this.session = session;\n+ this.component = component;\n+ }\n+\n+ public Set getSupportedCredentialTypes() {\n+ return CREDENTIAL_TYPES;\n+ }\n+\n+ @Override\n+ public boolean supportsCredentialType(String credentialType) {\n+ return getSupportedCredentialTypes().contains(credentialType);\n+ }\n+\n+ @Override\n+ public boolean isConfiguredFor(RealmModel realm, UserModel user, String credentialType) {\n+ if (!CredentialModel.PASSWORD.equals(credentialType)) return false;\n+ return true;\n+ }\n+\n+ @Override\n+ public boolean isValid(RealmModel realm, UserModel user, CredentialInput input) {\n+ UserCredentialModel password = (UserCredentialModel)input;\n+ if (password.getType().equals(UserCredentialModel.PASSWORD)) {\n+ if (INITIAL_PASSWORD.equals(password.getValue())) {\n+ return true;\n+ }\n+ List existing = session.userFederatedStorage().getStoredCredentialsByType(realm, user.getId(), \"CLEAR_TEXT_PASSWORD\");\n+ if (existing.isEmpty()) return false;\n+ return existing.get(0).getConfig().getFirst(\"VALUE\").equals(password.getValue());\n+ }\n+ return false;\n+ }\n+\n+ @Override\n+ public boolean updateCredential(RealmModel realm, UserModel user, CredentialInput input) {\n+ // testing federated credential attributes\n+ UserCredentialModel password = (UserCredentialModel)input;\n+ if (password.getType().equals(UserCredentialModel.PASSWORD)) {\n+ List existing = session.userFederatedStorage().getStoredCredentialsByType(realm, user.getId(), \"CLEAR_TEXT_PASSWORD\");\n+ if (existing.isEmpty()) {\n+ CredentialModel model = new CredentialModel();\n+ model.setType(\"CLEAR_TEXT_PASSWORD\");\n+ model.getConfig().putSingle(\"VALUE\", password.getValue());\n+ session.userFederatedStorage().createCredential(realm, user.getId(), model);\n+ } else {\n+ CredentialModel model = existing.get(0);\n+ model.setType(\"CLEAR_TEXT_PASSWORD\");\n+ model.getConfig().putSingle(\"VALUE\", password.getValue());\n+ session.userFederatedStorage().updateCredential(realm, user.getId(), model);\n+\n+ }\n+ return true;\n+ }\n+ return false;\n+ }\n+\n+ @Override\n+ public void disableCredentialType(RealmModel realm, UserModel user, String credentialType) {\n+ List existing = session.userFederatedStorage().getStoredCredentialsByType(realm, user.getId(), \"CLEAR_TEXT_PASSWORD\");\n+ for (CredentialModel model : existing) {\n+ session.userFederatedStorage().removeStoredCredential(realm, user.getId(), model.getId());\n+ }\n+ }\n+\n+ @Override\n+ public Set getDisableableCredentialTypes(RealmModel realm, UserModel user) {\n+ return CREDENTIAL_TYPES;\n+ }\n+\n+ @Override\n+ public void close() {\n+\n+ }\n+\n+ @Override\n+ public UserModel getUserById(String id, RealmModel realm) {\n+ if (!StorageId.externalId(id).equals(PASSTHROUGH_USERNAME)) return null;\n+ return getUserModel(realm);\n+ }\n+\n+ @Override\n+ public UserModel getUserByUsername(String username, RealmModel realm) {\n+ if (!PASSTHROUGH_USERNAME.equals(username)) return null;\n+\n+ return getUserModel(realm);\n+ }\n+\n+ @Override\n+ public UserModel getUserByEmail(String email, RealmModel realm) {\n+ List list = session.userFederatedStorage().getUsersByUserAttribute(realm, AbstractUserAdapterFederatedStorage.EMAIL_ATTRIBUTE, email);\n+ for (String user : list) {\n+ StorageId storageId = new StorageId(user);\n+ if (!storageId.getExternalId().equals(PASSTHROUGH_USERNAME)) continue;\n+ if (!storageId.getProviderId().equals(component.getId())) continue;\n+ return getUserModel(realm);\n+\n+ }\n+ return null;\n+ }\n+\n+ private UserModel getUserModel(final RealmModel realm) {\n+ return new AbstractUserAdapterFederatedStorage(session, realm, component) {\n+ @Override\n+ public String getUsername() {\n+ return PASSTHROUGH_USERNAME;\n+ }\n+\n+ @Override\n+ public void setUsername(String username) {\n+\n+ }\n+ };\n+ }\n+}\n"},{"change_type":"ADD","old_path":null,"new_path":"testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/java/org/keycloak/testsuite/federation/PassThroughFederatedUserStorageProviderFactory.java","diff":"+/*\n+ * Copyright 2016 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+package org.keycloak.testsuite.federation;\n+\n+import org.keycloak.component.ComponentModel;\n+import org.keycloak.models.KeycloakSession;\n+import org.keycloak.storage.UserStorageProviderFactory;\n+\n+/**\n+ * @author Bill Burke\n+ * @version $Revision: 1 $\n+ */\n+public class PassThroughFederatedUserStorageProviderFactory implements UserStorageProviderFactory {\n+\n+ public static final String PROVIDER_ID = \"pass-through-federated\";\n+\n+ @Override\n+ public PassThroughFederatedUserStorageProvider create(KeycloakSession session, ComponentModel model) {\n+ return new PassThroughFederatedUserStorageProvider(session, model);\n+ }\n+\n+ @Override\n+ public String getId() {\n+ return PROVIDER_ID;\n+ }\n+}\n"},{"change_type":"MODIFY","old_path":"testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/resources/META-INF/services/org.keycloak.storage.UserStorageProviderFactory","new_path":"testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/resources/META-INF/services/org.keycloak.storage.UserStorageProviderFactory","diff":"org.keycloak.testsuite.federation.DummyUserFederationProviderFactory\n+org.keycloak.testsuite.federation.PassThroughFederatedUserStorageProviderFactory\n\\ No newline at end of file\n"},{"change_type":"ADD","old_path":null,"new_path":"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/AccountLinkTest.java","diff":"+/*\n+ * Copyright 2016 Red Hat, Inc. and/or its affiliates\n+ * and other contributors as indicated by the @author tags.\n+ *\n+ * Licensed under the Apache License, Version 2.0 (the \"License\");\n+ * you may not use this file except in compliance with the License.\n+ * You may obtain a copy of the License at\n+ *\n+ * http://www.apache.org/licenses/LICENSE-2.0\n+ *\n+ * Unless required by applicable law or agreed to in writing, software\n+ * distributed under the License is distributed on an \"AS IS\" BASIS,\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\n+ * See the License for the specific language governing permissions and\n+ * limitations under the License.\n+ */\n+package org.keycloak.testsuite.broker;\n+\n+import org.jboss.arquillian.graphene.page.Page;\n+import org.junit.Before;\n+import org.junit.Test;\n+import org.keycloak.admin.client.resource.RealmResource;\n+import org.keycloak.common.util.MultivaluedHashMap;\n+import org.keycloak.models.IdentityProviderModel;\n+import org.keycloak.representations.idm.ComponentRepresentation;\n+import org.keycloak.representations.idm.IdentityProviderRepresentation;\n+import org.keycloak.representations.idm.RealmRepresentation;\n+import org.keycloak.representations.idm.UserRepresentation;\n+import org.keycloak.storage.UserStorageProvider;\n+import org.keycloak.testsuite.AbstractKeycloakTest;\n+import org.keycloak.testsuite.federation.PassThroughFederatedUserStorageProvider;\n+import org.keycloak.testsuite.federation.PassThroughFederatedUserStorageProviderFactory;\n+import org.keycloak.testsuite.pages.AccountFederatedIdentityPage;\n+import org.keycloak.testsuite.pages.LoginPage;\n+import org.keycloak.testsuite.pages.UpdateAccountInformationPage;\n+\n+import java.util.List;\n+\n+import static org.junit.Assert.assertTrue;\n+import static org.keycloak.testsuite.admin.ApiUtil.createUserAndResetPasswordWithAdminClient;\n+import static org.keycloak.testsuite.admin.ApiUtil.createUserWithAdminClient;\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.REALM_PROV_NAME;\n+\n+/**\n+ * @author Bill Burke\n+ * @version $Revision: 1 $\n+ */\n+public class AccountLinkTest extends AbstractKeycloakTest {\n+ public static final String CHILD_IDP = \"child\";\n+ public static final String PARENT_IDP = \"parent-idp\";\n+ public static final String PARENT_USERNAME = \"parent\";\n+\n+ @Page\n+ protected AccountFederatedIdentityPage accountFederatedIdentityPage;\n+\n+ @Page\n+ protected UpdateAccountInformationPage profilePage;\n+\n+ @Page\n+ protected LoginPage loginPage;\n+\n+ @Override\n+ public void addTestRealms(List testRealms) {\n+ RealmRepresentation realm = new RealmRepresentation();\n+ realm.setRealm(CHILD_IDP);\n+ realm.setEnabled(true);\n+ testRealms.add(realm);\n+\n+ realm = new RealmRepresentation();\n+ realm.setRealm(PARENT_IDP);\n+ realm.setEnabled(true);\n+\n+ testRealms.add(realm);\n+\n+ }\n+\n+ @Before\n+ public void addIdpUser() {\n+ RealmResource realm = adminClient.realms().realm(PARENT_IDP);\n+ UserRepresentation user = new UserRepresentation();\n+ user.setUsername(PARENT_USERNAME);\n+ user.setEnabled(true);\n+ String userId = createUserAndResetPasswordWithAdminClient(realm, user, \"password\");\n+\n+ }\n+\n+ @Before\n+ public void addChildUser() {\n+ RealmResource realm = adminClient.realms().realm(CHILD_IDP);\n+ UserRepresentation user = new UserRepresentation();\n+ user.setUsername(\"child\");\n+ user.setEnabled(true);\n+ String userId = createUserAndResetPasswordWithAdminClient(realm, user, \"password\");\n+\n+ }\n+\n+ @Before\n+ public void setupUserStorageProvider() {\n+ ComponentRepresentation provider = new ComponentRepresentation();\n+ provider.setName(\"passthrough\");\n+ provider.setProviderId(PassThroughFederatedUserStorageProviderFactory.PROVIDER_ID);\n+ provider.setProviderType(UserStorageProvider.class.getName());\n+ provider.setConfig(new MultivaluedHashMap<>());\n+ provider.getConfig().putSingle(\"priority\", Integer.toString(1));\n+\n+ RealmResource realm = adminClient.realms().realm(CHILD_IDP);\n+ realm.components().add(provider);\n+\n+\n+\n+\n+ }\n+\n+ @Before\n+ public void createBroker() {\n+ createParentChild();\n+ }\n+\n+ public void createParentChild() {\n+ BrokerTestTools.createKcOidcBroker(adminClient, CHILD_IDP, PARENT_IDP, suiteContext);\n+ }\n+\n+ @Test\n+ public void testAccountLink() {\n+ String childUsername = \"child\";\n+ String childPassword = \"password\";\n+ String childIdp = CHILD_IDP;\n+\n+ testAccountLink(childUsername, childPassword, childIdp);\n+\n+ }\n+\n+ @Test\n+ public void testAccountLinkWithUserStorageProvider() {\n+ String childUsername = PassThroughFederatedUserStorageProvider.PASSTHROUGH_USERNAME;\n+ String childPassword = PassThroughFederatedUserStorageProvider.INITIAL_PASSWORD;\n+ String childIdp = CHILD_IDP;\n+\n+ testAccountLink(childUsername, childPassword, childIdp);\n+\n+ }\n+\n+ protected void testAccountLink(String childUsername, String childPassword, String childIdp) {\n+ accountFederatedIdentityPage.realm(childIdp);\n+ accountFederatedIdentityPage.open();\n+ loginPage.isCurrent();\n+ loginPage.login(childUsername, childPassword);\n+ assertTrue(accountFederatedIdentityPage.isCurrent());\n+\n+ accountFederatedIdentityPage.clickAddProvider(PARENT_IDP);\n+\n+ this.loginPage.isCurrent();\n+ loginPage.login(PARENT_USERNAME, \"password\");\n+\n+ // Assert identity linked in account management\n+ assertTrue(accountFederatedIdentityPage.isCurrent());\n+ assertTrue(driver.getPageSource().contains(\"id=\\\"remove-\" + PARENT_IDP + \"\\\"\"));\n+\n+ // Logout from account management\n+ accountFederatedIdentityPage.logout();\n+\n+ // Assert I am logged immediately to account management due to previously linked \"test-user\" identity\n+ loginPage.isCurrent();\n+ loginPage.clickSocial(PARENT_IDP);\n+ loginPage.login(PARENT_USERNAME, \"password\");\n+ System.out.println(driver.getCurrentUrl());\n+ System.out.println(\"--------------------------------\");\n+ System.out.println(driver.getPageSource());\n+ assertTrue(accountFederatedIdentityPage.isCurrent());\n+ assertTrue(driver.getPageSource().contains(\"id=\\\"remove-\" + PARENT_IDP + \"\\\"\"));\n+\n+ // Unlink my \"test-user\"\n+ accountFederatedIdentityPage.clickRemoveProvider(PARENT_IDP);\n+ assertTrue(driver.getPageSource().contains(\"id=\\\"add-\" + PARENT_IDP + \"\\\"\"));\n+\n+\n+ // Logout from account management\n+ accountFederatedIdentityPage.logout();\n+\n+ this.loginPage.clickSocial(PARENT_IDP);\n+ this.loginPage.login(PARENT_USERNAME, \"password\");\n+ this.profilePage.assertCurrent();\n+ }\n+\n+\n+}\n"},{"change_type":"MODIFY","old_path":"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/BrokerTestTools.java","new_path":"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/BrokerTestTools.java","diff":"package org.keycloak.testsuite.broker;\n+import org.keycloak.admin.client.Keycloak;\n+import org.keycloak.representations.idm.ClientRepresentation;\nimport org.keycloak.representations.idm.IdentityProviderRepresentation;\nimport org.keycloak.testsuite.arquillian.SuiteContext;\nimport java.io.UnsupportedEncodingException;\nimport java.net.URLEncoder;\n+import java.util.Collections;\nimport java.util.List;\n+import java.util.Map;\n+\nimport org.openqa.selenium.By;\nimport org.openqa.selenium.WebDriver;\nimport org.openqa.selenium.WebElement;\nimport org.openqa.selenium.support.ui.ExpectedCondition;\nimport org.openqa.selenium.support.ui.WebDriverWait;\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.CLIENT_ID;\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.CLIENT_SECRET;\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.IDP_OIDC_ALIAS;\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.IDP_OIDC_PROVIDER_ID;\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.REALM_CONS_NAME;\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.REALM_PROV_NAME;\n+\n/**\n*\n* @author hmlnarik\n@@ -62,4 +74,43 @@ public class BrokerTestTools {\nreturn result;\n}\n+\n+ /**\n+ * Expects a child idp and parent idp running on same Keycloak instance. Links the two with non-signature checks.\n+ *\n+ * @param adminClient\n+ * @param childRealm\n+ * @param idpRealm\n+ * @param suiteContext\n+ */\n+ public static void createKcOidcBroker(Keycloak adminClient, String childRealm, String idpRealm, SuiteContext suiteContext) {\n+ IdentityProviderRepresentation idp = createIdentityProvider(idpRealm, IDP_OIDC_PROVIDER_ID);\n+ Map config = idp.getConfig();\n+\n+ config.put(\"clientId\", childRealm);\n+ config.put(\"clientSecret\", childRealm);\n+ config.put(\"prompt\", \"login\");\n+ config.put(\"authorizationUrl\", getAuthRoot(suiteContext) + \"/auth/realms/\" + idpRealm + \"/protocol/openid-connect/auth\");\n+ config.put(\"tokenUrl\", getAuthRoot(suiteContext) + \"/auth/realms/\" + idpRealm + \"/protocol/openid-connect/token\");\n+ config.put(\"logoutUrl\", getAuthRoot(suiteContext) + \"/auth/realms/\" + idpRealm + \"/protocol/openid-connect/logout\");\n+ config.put(\"userInfoUrl\", getAuthRoot(suiteContext) + \"/auth/realms/\" + idpRealm + \"/protocol/openid-connect/userinfo\");\n+ config.put(\"backchannelSupported\", \"true\");\n+ adminClient.realm(childRealm).identityProviders().create(idp);\n+\n+ ClientRepresentation client = new ClientRepresentation();\n+ client.setClientId(childRealm);\n+ client.setName(childRealm);\n+ client.setSecret(childRealm);\n+ client.setEnabled(true);\n+\n+ client.setRedirectUris(Collections.singletonList(getAuthRoot(suiteContext) +\n+ \"/auth/realms/\" + childRealm + \"/broker/\" + idpRealm + \"/endpoint/*\"));\n+\n+ client.setAdminUrl(getAuthRoot(suiteContext) +\n+ \"/auth/realms/\" + childRealm + \"/broker/\" + idpRealm + \"/endpoint\");\n+ adminClient.realm(idpRealm).clients().create(client);\n+\n+\n+\n+ }\n}\n"}],"string":"[\n {\n \"change_type\": \"ADD\",\n \"old_path\": null,\n \"new_path\": \"testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/java/org/keycloak/testsuite/federation/PassThroughFederatedUserStorageProvider.java\",\n \"diff\": \"+/*\\n+ * Copyright 2016 Red Hat, Inc. and/or its affiliates\\n+ * and other contributors as indicated by the @author tags.\\n+ *\\n+ * Licensed under the Apache License, Version 2.0 (the \\\"License\\\");\\n+ * you may not use this file except in compliance with the License.\\n+ * You may obtain a copy of the License at\\n+ *\\n+ * http://www.apache.org/licenses/LICENSE-2.0\\n+ *\\n+ * Unless required by applicable law or agreed to in writing, software\\n+ * distributed under the License is distributed on an \\\"AS IS\\\" BASIS,\\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\\n+ * See the License for the specific language governing permissions and\\n+ * limitations under the License.\\n+ */\\n+package org.keycloak.testsuite.federation;\\n+\\n+import org.keycloak.component.ComponentModel;\\n+import org.keycloak.credential.CredentialInput;\\n+import org.keycloak.credential.CredentialInputUpdater;\\n+import org.keycloak.credential.CredentialInputValidator;\\n+import org.keycloak.credential.CredentialModel;\\n+import org.keycloak.models.KeycloakSession;\\n+import org.keycloak.models.RealmModel;\\n+import org.keycloak.models.UserCredentialModel;\\n+import org.keycloak.models.UserModel;\\n+import org.keycloak.storage.StorageId;\\n+import org.keycloak.storage.UserStorageProvider;\\n+import org.keycloak.storage.adapter.AbstractUserAdapterFederatedStorage;\\n+import org.keycloak.storage.user.UserLookupProvider;\\n+\\n+import java.util.Collections;\\n+import java.util.List;\\n+import java.util.Set;\\n+\\n+/**\\n+ * Provides one user where everything is stored in user federated storage\\n+ *\\n+ * @author Bill Burke\\n+ * @version $Revision: 1 $\\n+ */\\n+public class PassThroughFederatedUserStorageProvider implements\\n+ UserStorageProvider,\\n+ UserLookupProvider,\\n+ CredentialInputValidator,\\n+ CredentialInputUpdater\\n+{\\n+\\n+ public static final Set CREDENTIAL_TYPES = Collections.singleton(UserCredentialModel.PASSWORD);\\n+ public static final String PASSTHROUGH_USERNAME = \\\"passthrough\\\";\\n+ public static final String INITIAL_PASSWORD = \\\"secret\\\";\\n+ private KeycloakSession session;\\n+ private ComponentModel component;\\n+\\n+ public PassThroughFederatedUserStorageProvider(KeycloakSession session, ComponentModel component) {\\n+ this.session = session;\\n+ this.component = component;\\n+ }\\n+\\n+ public Set getSupportedCredentialTypes() {\\n+ return CREDENTIAL_TYPES;\\n+ }\\n+\\n+ @Override\\n+ public boolean supportsCredentialType(String credentialType) {\\n+ return getSupportedCredentialTypes().contains(credentialType);\\n+ }\\n+\\n+ @Override\\n+ public boolean isConfiguredFor(RealmModel realm, UserModel user, String credentialType) {\\n+ if (!CredentialModel.PASSWORD.equals(credentialType)) return false;\\n+ return true;\\n+ }\\n+\\n+ @Override\\n+ public boolean isValid(RealmModel realm, UserModel user, CredentialInput input) {\\n+ UserCredentialModel password = (UserCredentialModel)input;\\n+ if (password.getType().equals(UserCredentialModel.PASSWORD)) {\\n+ if (INITIAL_PASSWORD.equals(password.getValue())) {\\n+ return true;\\n+ }\\n+ List existing = session.userFederatedStorage().getStoredCredentialsByType(realm, user.getId(), \\\"CLEAR_TEXT_PASSWORD\\\");\\n+ if (existing.isEmpty()) return false;\\n+ return existing.get(0).getConfig().getFirst(\\\"VALUE\\\").equals(password.getValue());\\n+ }\\n+ return false;\\n+ }\\n+\\n+ @Override\\n+ public boolean updateCredential(RealmModel realm, UserModel user, CredentialInput input) {\\n+ // testing federated credential attributes\\n+ UserCredentialModel password = (UserCredentialModel)input;\\n+ if (password.getType().equals(UserCredentialModel.PASSWORD)) {\\n+ List existing = session.userFederatedStorage().getStoredCredentialsByType(realm, user.getId(), \\\"CLEAR_TEXT_PASSWORD\\\");\\n+ if (existing.isEmpty()) {\\n+ CredentialModel model = new CredentialModel();\\n+ model.setType(\\\"CLEAR_TEXT_PASSWORD\\\");\\n+ model.getConfig().putSingle(\\\"VALUE\\\", password.getValue());\\n+ session.userFederatedStorage().createCredential(realm, user.getId(), model);\\n+ } else {\\n+ CredentialModel model = existing.get(0);\\n+ model.setType(\\\"CLEAR_TEXT_PASSWORD\\\");\\n+ model.getConfig().putSingle(\\\"VALUE\\\", password.getValue());\\n+ session.userFederatedStorage().updateCredential(realm, user.getId(), model);\\n+\\n+ }\\n+ return true;\\n+ }\\n+ return false;\\n+ }\\n+\\n+ @Override\\n+ public void disableCredentialType(RealmModel realm, UserModel user, String credentialType) {\\n+ List existing = session.userFederatedStorage().getStoredCredentialsByType(realm, user.getId(), \\\"CLEAR_TEXT_PASSWORD\\\");\\n+ for (CredentialModel model : existing) {\\n+ session.userFederatedStorage().removeStoredCredential(realm, user.getId(), model.getId());\\n+ }\\n+ }\\n+\\n+ @Override\\n+ public Set getDisableableCredentialTypes(RealmModel realm, UserModel user) {\\n+ return CREDENTIAL_TYPES;\\n+ }\\n+\\n+ @Override\\n+ public void close() {\\n+\\n+ }\\n+\\n+ @Override\\n+ public UserModel getUserById(String id, RealmModel realm) {\\n+ if (!StorageId.externalId(id).equals(PASSTHROUGH_USERNAME)) return null;\\n+ return getUserModel(realm);\\n+ }\\n+\\n+ @Override\\n+ public UserModel getUserByUsername(String username, RealmModel realm) {\\n+ if (!PASSTHROUGH_USERNAME.equals(username)) return null;\\n+\\n+ return getUserModel(realm);\\n+ }\\n+\\n+ @Override\\n+ public UserModel getUserByEmail(String email, RealmModel realm) {\\n+ List list = session.userFederatedStorage().getUsersByUserAttribute(realm, AbstractUserAdapterFederatedStorage.EMAIL_ATTRIBUTE, email);\\n+ for (String user : list) {\\n+ StorageId storageId = new StorageId(user);\\n+ if (!storageId.getExternalId().equals(PASSTHROUGH_USERNAME)) continue;\\n+ if (!storageId.getProviderId().equals(component.getId())) continue;\\n+ return getUserModel(realm);\\n+\\n+ }\\n+ return null;\\n+ }\\n+\\n+ private UserModel getUserModel(final RealmModel realm) {\\n+ return new AbstractUserAdapterFederatedStorage(session, realm, component) {\\n+ @Override\\n+ public String getUsername() {\\n+ return PASSTHROUGH_USERNAME;\\n+ }\\n+\\n+ @Override\\n+ public void setUsername(String username) {\\n+\\n+ }\\n+ };\\n+ }\\n+}\\n\"\n },\n {\n \"change_type\": \"ADD\",\n \"old_path\": null,\n \"new_path\": \"testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/java/org/keycloak/testsuite/federation/PassThroughFederatedUserStorageProviderFactory.java\",\n \"diff\": \"+/*\\n+ * Copyright 2016 Red Hat, Inc. and/or its affiliates\\n+ * and other contributors as indicated by the @author tags.\\n+ *\\n+ * Licensed under the Apache License, Version 2.0 (the \\\"License\\\");\\n+ * you may not use this file except in compliance with the License.\\n+ * You may obtain a copy of the License at\\n+ *\\n+ * http://www.apache.org/licenses/LICENSE-2.0\\n+ *\\n+ * Unless required by applicable law or agreed to in writing, software\\n+ * distributed under the License is distributed on an \\\"AS IS\\\" BASIS,\\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\\n+ * See the License for the specific language governing permissions and\\n+ * limitations under the License.\\n+ */\\n+package org.keycloak.testsuite.federation;\\n+\\n+import org.keycloak.component.ComponentModel;\\n+import org.keycloak.models.KeycloakSession;\\n+import org.keycloak.storage.UserStorageProviderFactory;\\n+\\n+/**\\n+ * @author Bill Burke\\n+ * @version $Revision: 1 $\\n+ */\\n+public class PassThroughFederatedUserStorageProviderFactory implements UserStorageProviderFactory {\\n+\\n+ public static final String PROVIDER_ID = \\\"pass-through-federated\\\";\\n+\\n+ @Override\\n+ public PassThroughFederatedUserStorageProvider create(KeycloakSession session, ComponentModel model) {\\n+ return new PassThroughFederatedUserStorageProvider(session, model);\\n+ }\\n+\\n+ @Override\\n+ public String getId() {\\n+ return PROVIDER_ID;\\n+ }\\n+}\\n\"\n },\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/resources/META-INF/services/org.keycloak.storage.UserStorageProviderFactory\",\n \"new_path\": \"testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/resources/META-INF/services/org.keycloak.storage.UserStorageProviderFactory\",\n \"diff\": \"org.keycloak.testsuite.federation.DummyUserFederationProviderFactory\\n+org.keycloak.testsuite.federation.PassThroughFederatedUserStorageProviderFactory\\n\\\\ No newline at end of file\\n\"\n },\n {\n \"change_type\": \"ADD\",\n \"old_path\": null,\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/AccountLinkTest.java\",\n \"diff\": \"+/*\\n+ * Copyright 2016 Red Hat, Inc. and/or its affiliates\\n+ * and other contributors as indicated by the @author tags.\\n+ *\\n+ * Licensed under the Apache License, Version 2.0 (the \\\"License\\\");\\n+ * you may not use this file except in compliance with the License.\\n+ * You may obtain a copy of the License at\\n+ *\\n+ * http://www.apache.org/licenses/LICENSE-2.0\\n+ *\\n+ * Unless required by applicable law or agreed to in writing, software\\n+ * distributed under the License is distributed on an \\\"AS IS\\\" BASIS,\\n+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\\n+ * See the License for the specific language governing permissions and\\n+ * limitations under the License.\\n+ */\\n+package org.keycloak.testsuite.broker;\\n+\\n+import org.jboss.arquillian.graphene.page.Page;\\n+import org.junit.Before;\\n+import org.junit.Test;\\n+import org.keycloak.admin.client.resource.RealmResource;\\n+import org.keycloak.common.util.MultivaluedHashMap;\\n+import org.keycloak.models.IdentityProviderModel;\\n+import org.keycloak.representations.idm.ComponentRepresentation;\\n+import org.keycloak.representations.idm.IdentityProviderRepresentation;\\n+import org.keycloak.representations.idm.RealmRepresentation;\\n+import org.keycloak.representations.idm.UserRepresentation;\\n+import org.keycloak.storage.UserStorageProvider;\\n+import org.keycloak.testsuite.AbstractKeycloakTest;\\n+import org.keycloak.testsuite.federation.PassThroughFederatedUserStorageProvider;\\n+import org.keycloak.testsuite.federation.PassThroughFederatedUserStorageProviderFactory;\\n+import org.keycloak.testsuite.pages.AccountFederatedIdentityPage;\\n+import org.keycloak.testsuite.pages.LoginPage;\\n+import org.keycloak.testsuite.pages.UpdateAccountInformationPage;\\n+\\n+import java.util.List;\\n+\\n+import static org.junit.Assert.assertTrue;\\n+import static org.keycloak.testsuite.admin.ApiUtil.createUserAndResetPasswordWithAdminClient;\\n+import static org.keycloak.testsuite.admin.ApiUtil.createUserWithAdminClient;\\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.REALM_PROV_NAME;\\n+\\n+/**\\n+ * @author Bill Burke\\n+ * @version $Revision: 1 $\\n+ */\\n+public class AccountLinkTest extends AbstractKeycloakTest {\\n+ public static final String CHILD_IDP = \\\"child\\\";\\n+ public static final String PARENT_IDP = \\\"parent-idp\\\";\\n+ public static final String PARENT_USERNAME = \\\"parent\\\";\\n+\\n+ @Page\\n+ protected AccountFederatedIdentityPage accountFederatedIdentityPage;\\n+\\n+ @Page\\n+ protected UpdateAccountInformationPage profilePage;\\n+\\n+ @Page\\n+ protected LoginPage loginPage;\\n+\\n+ @Override\\n+ public void addTestRealms(List testRealms) {\\n+ RealmRepresentation realm = new RealmRepresentation();\\n+ realm.setRealm(CHILD_IDP);\\n+ realm.setEnabled(true);\\n+ testRealms.add(realm);\\n+\\n+ realm = new RealmRepresentation();\\n+ realm.setRealm(PARENT_IDP);\\n+ realm.setEnabled(true);\\n+\\n+ testRealms.add(realm);\\n+\\n+ }\\n+\\n+ @Before\\n+ public void addIdpUser() {\\n+ RealmResource realm = adminClient.realms().realm(PARENT_IDP);\\n+ UserRepresentation user = new UserRepresentation();\\n+ user.setUsername(PARENT_USERNAME);\\n+ user.setEnabled(true);\\n+ String userId = createUserAndResetPasswordWithAdminClient(realm, user, \\\"password\\\");\\n+\\n+ }\\n+\\n+ @Before\\n+ public void addChildUser() {\\n+ RealmResource realm = adminClient.realms().realm(CHILD_IDP);\\n+ UserRepresentation user = new UserRepresentation();\\n+ user.setUsername(\\\"child\\\");\\n+ user.setEnabled(true);\\n+ String userId = createUserAndResetPasswordWithAdminClient(realm, user, \\\"password\\\");\\n+\\n+ }\\n+\\n+ @Before\\n+ public void setupUserStorageProvider() {\\n+ ComponentRepresentation provider = new ComponentRepresentation();\\n+ provider.setName(\\\"passthrough\\\");\\n+ provider.setProviderId(PassThroughFederatedUserStorageProviderFactory.PROVIDER_ID);\\n+ provider.setProviderType(UserStorageProvider.class.getName());\\n+ provider.setConfig(new MultivaluedHashMap<>());\\n+ provider.getConfig().putSingle(\\\"priority\\\", Integer.toString(1));\\n+\\n+ RealmResource realm = adminClient.realms().realm(CHILD_IDP);\\n+ realm.components().add(provider);\\n+\\n+\\n+\\n+\\n+ }\\n+\\n+ @Before\\n+ public void createBroker() {\\n+ createParentChild();\\n+ }\\n+\\n+ public void createParentChild() {\\n+ BrokerTestTools.createKcOidcBroker(adminClient, CHILD_IDP, PARENT_IDP, suiteContext);\\n+ }\\n+\\n+ @Test\\n+ public void testAccountLink() {\\n+ String childUsername = \\\"child\\\";\\n+ String childPassword = \\\"password\\\";\\n+ String childIdp = CHILD_IDP;\\n+\\n+ testAccountLink(childUsername, childPassword, childIdp);\\n+\\n+ }\\n+\\n+ @Test\\n+ public void testAccountLinkWithUserStorageProvider() {\\n+ String childUsername = PassThroughFederatedUserStorageProvider.PASSTHROUGH_USERNAME;\\n+ String childPassword = PassThroughFederatedUserStorageProvider.INITIAL_PASSWORD;\\n+ String childIdp = CHILD_IDP;\\n+\\n+ testAccountLink(childUsername, childPassword, childIdp);\\n+\\n+ }\\n+\\n+ protected void testAccountLink(String childUsername, String childPassword, String childIdp) {\\n+ accountFederatedIdentityPage.realm(childIdp);\\n+ accountFederatedIdentityPage.open();\\n+ loginPage.isCurrent();\\n+ loginPage.login(childUsername, childPassword);\\n+ assertTrue(accountFederatedIdentityPage.isCurrent());\\n+\\n+ accountFederatedIdentityPage.clickAddProvider(PARENT_IDP);\\n+\\n+ this.loginPage.isCurrent();\\n+ loginPage.login(PARENT_USERNAME, \\\"password\\\");\\n+\\n+ // Assert identity linked in account management\\n+ assertTrue(accountFederatedIdentityPage.isCurrent());\\n+ assertTrue(driver.getPageSource().contains(\\\"id=\\\\\\\"remove-\\\" + PARENT_IDP + \\\"\\\\\\\"\\\"));\\n+\\n+ // Logout from account management\\n+ accountFederatedIdentityPage.logout();\\n+\\n+ // Assert I am logged immediately to account management due to previously linked \\\"test-user\\\" identity\\n+ loginPage.isCurrent();\\n+ loginPage.clickSocial(PARENT_IDP);\\n+ loginPage.login(PARENT_USERNAME, \\\"password\\\");\\n+ System.out.println(driver.getCurrentUrl());\\n+ System.out.println(\\\"--------------------------------\\\");\\n+ System.out.println(driver.getPageSource());\\n+ assertTrue(accountFederatedIdentityPage.isCurrent());\\n+ assertTrue(driver.getPageSource().contains(\\\"id=\\\\\\\"remove-\\\" + PARENT_IDP + \\\"\\\\\\\"\\\"));\\n+\\n+ // Unlink my \\\"test-user\\\"\\n+ accountFederatedIdentityPage.clickRemoveProvider(PARENT_IDP);\\n+ assertTrue(driver.getPageSource().contains(\\\"id=\\\\\\\"add-\\\" + PARENT_IDP + \\\"\\\\\\\"\\\"));\\n+\\n+\\n+ // Logout from account management\\n+ accountFederatedIdentityPage.logout();\\n+\\n+ this.loginPage.clickSocial(PARENT_IDP);\\n+ this.loginPage.login(PARENT_USERNAME, \\\"password\\\");\\n+ this.profilePage.assertCurrent();\\n+ }\\n+\\n+\\n+}\\n\"\n },\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/BrokerTestTools.java\",\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/broker/BrokerTestTools.java\",\n \"diff\": \"package org.keycloak.testsuite.broker;\\n+import org.keycloak.admin.client.Keycloak;\\n+import org.keycloak.representations.idm.ClientRepresentation;\\nimport org.keycloak.representations.idm.IdentityProviderRepresentation;\\nimport org.keycloak.testsuite.arquillian.SuiteContext;\\nimport java.io.UnsupportedEncodingException;\\nimport java.net.URLEncoder;\\n+import java.util.Collections;\\nimport java.util.List;\\n+import java.util.Map;\\n+\\nimport org.openqa.selenium.By;\\nimport org.openqa.selenium.WebDriver;\\nimport org.openqa.selenium.WebElement;\\nimport org.openqa.selenium.support.ui.ExpectedCondition;\\nimport org.openqa.selenium.support.ui.WebDriverWait;\\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.CLIENT_ID;\\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.CLIENT_SECRET;\\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.IDP_OIDC_ALIAS;\\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.IDP_OIDC_PROVIDER_ID;\\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.REALM_CONS_NAME;\\n+import static org.keycloak.testsuite.broker.BrokerTestConstants.REALM_PROV_NAME;\\n+\\n/**\\n*\\n* @author hmlnarik\\n@@ -62,4 +74,43 @@ public class BrokerTestTools {\\nreturn result;\\n}\\n+\\n+ /**\\n+ * Expects a child idp and parent idp running on same Keycloak instance. Links the two with non-signature checks.\\n+ *\\n+ * @param adminClient\\n+ * @param childRealm\\n+ * @param idpRealm\\n+ * @param suiteContext\\n+ */\\n+ public static void createKcOidcBroker(Keycloak adminClient, String childRealm, String idpRealm, SuiteContext suiteContext) {\\n+ IdentityProviderRepresentation idp = createIdentityProvider(idpRealm, IDP_OIDC_PROVIDER_ID);\\n+ Map config = idp.getConfig();\\n+\\n+ config.put(\\\"clientId\\\", childRealm);\\n+ config.put(\\\"clientSecret\\\", childRealm);\\n+ config.put(\\\"prompt\\\", \\\"login\\\");\\n+ config.put(\\\"authorizationUrl\\\", getAuthRoot(suiteContext) + \\\"/auth/realms/\\\" + idpRealm + \\\"/protocol/openid-connect/auth\\\");\\n+ config.put(\\\"tokenUrl\\\", getAuthRoot(suiteContext) + \\\"/auth/realms/\\\" + idpRealm + \\\"/protocol/openid-connect/token\\\");\\n+ config.put(\\\"logoutUrl\\\", getAuthRoot(suiteContext) + \\\"/auth/realms/\\\" + idpRealm + \\\"/protocol/openid-connect/logout\\\");\\n+ config.put(\\\"userInfoUrl\\\", getAuthRoot(suiteContext) + \\\"/auth/realms/\\\" + idpRealm + \\\"/protocol/openid-connect/userinfo\\\");\\n+ config.put(\\\"backchannelSupported\\\", \\\"true\\\");\\n+ adminClient.realm(childRealm).identityProviders().create(idp);\\n+\\n+ ClientRepresentation client = new ClientRepresentation();\\n+ client.setClientId(childRealm);\\n+ client.setName(childRealm);\\n+ client.setSecret(childRealm);\\n+ client.setEnabled(true);\\n+\\n+ client.setRedirectUris(Collections.singletonList(getAuthRoot(suiteContext) +\\n+ \\\"/auth/realms/\\\" + childRealm + \\\"/broker/\\\" + idpRealm + \\\"/endpoint/*\\\"));\\n+\\n+ client.setAdminUrl(getAuthRoot(suiteContext) +\\n+ \\\"/auth/realms/\\\" + childRealm + \\\"/broker/\\\" + idpRealm + \\\"/endpoint\\\");\\n+ adminClient.realm(idpRealm).clients().create(client);\\n+\\n+\\n+\\n+ }\\n}\\n\"\n }\n]"},"language":{"kind":"string","value":"Java"},"license":{"kind":"string","value":"Apache License 2.0"},"repo":{"kind":"string","value":"keycloak/keycloak"},"original_message":{"kind":"string","value":"account link tests"}}},{"rowIdx":2268,"cells":{"author":{"kind":"number","value":339185,"string":"339,185"},"date":{"kind":"string","value":"30.01.2017 10:52:17"},"timezone":{"kind":"number","value":-3600,"string":"-3,600"},"hash":{"kind":"string","value":"4d362fe9ca5f275b6c0046e8ed2efd5af03ff88e"},"message":{"kind":"string","value":"Fix for OIDCProtocolMappersTest on mariadb"},"mods":{"kind":"list like","value":[{"change_type":"MODIFY","old_path":"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/OIDCProtocolMappersTest.java","new_path":"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/OIDCProtocolMappersTest.java","diff":"@@ -154,7 +154,7 @@ public class OIDCProtocolMappersTest extends AbstractKeycloakTest {\nObject firstDepartment = idToken.getOtherClaims().get(\"firstDepartment\");\nassertThat(firstDepartment, instanceOf(String.class));\n- assertThat(firstDepartment, is(\"finance\")); // Has to be the first item\n+ assertThat(firstDepartment, anyOf(is(\"finance\"), is(\"development\"))); // Has to be the first item\nAccessToken accessToken = oauth.verifyToken(response.getAccessToken());\nassertEquals(accessToken.getName(), \"Tom Brady\");\n"}],"string":"[\n {\n \"change_type\": \"MODIFY\",\n \"old_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/OIDCProtocolMappersTest.java\",\n \"new_path\": \"testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/OIDCProtocolMappersTest.java\",\n \"diff\": \"@@ -154,7 +154,7 @@ public class OIDCProtocolMappersTest extends AbstractKeycloakTest {\\nObject firstDepartment = idToken.getOtherClaims().get(\\\"firstDepartment\\\");\\nassertThat(firstDepartment, instanceOf(String.class));\\n- assertThat(firstDepartment, is(\\\"finance\\\")); // Has to be the first item\\n+ assertThat(firstDepartment, anyOf(is(\\\"finance\\\"), is(\\\"development\\\"))); // Has to be the first item\\nAccessToken accessToken = oauth.verifyToken(response.getAccessToken());\\nassertEquals(accessToken.getName(), \\\"Tom Brady\\\");\\n\"\n }\n]"},"language":{"kind":"string","value":"Java"},"license":{"kind":"string","value":"Apache License 2.0"},"repo":{"kind":"string","value":"keycloak/keycloak"},"original_message":{"kind":"string","value":"KEYCLOAK-4191 Fix for OIDCProtocolMappersTest on mariadb"}}},{"rowIdx":2269,"cells":{"author":{"kind":"number","value":339185,"string":"339,185"},"date":{"kind":"string","value":"30.01.2017 11:40:48"},"timezone":{"kind":"number","value":-3600,"string":"-3,600"},"hash":{"kind":"string","value":"ad0630d04f50fdc9920b6dfc7be51fa57650532b"},"message":{"kind":"string","value":"Fix NPE when not providing KeyInfo element in IdP initiated SSO SAML"},"mods":{"kind":"list like","value":[{"change_type":"MODIFY","old_path":"saml-core/src/main/java/org/keycloak/saml/processing/api/util/KeyInfoTools.java","new_path":"saml-core/src/main/java/org/keycloak/saml/processing/api/util/KeyInfoTools.java","diff":"@@ -35,6 +35,9 @@ public class KeyInfoTools {\n* @return The object or {@code null} if not found.\n*/\npublic static T getContent(Iterable