Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade keycloak-js from 24.0.2 to 24.0.4 #8

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

jookzie
Copy link
Collaborator

@jookzie jookzie commented Jun 24, 2024

This PR was automatically created by Snyk using the credentials of a real user.


![snyk-top-banner](https://github.com/andygongea/OWASP-Benchmark/assets/818805/c518c423-16fe-447e-b67f-ad5a49b5d123)

Snyk has created this PR to upgrade keycloak-js from 24.0.2 to 24.0.4.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 2 versions ahead of your current version.

  • The recommended version was released on 2 months ago.

Release notes
Package name: keycloak-js
  • 24.0.4 - 2024-05-08

    Highlights

    Partial update to user attributes when updating users through the Admin User API is no longer supported

    When updating user attributes through the Admin User API, you cannot execute partial updates when updating the user attributes, including the root attributes like username, email, firstName, and lastName.

    For more details, see the Upgrading Guide.

    Upgrading

    Before upgrading refer to the migration guide for a complete list of changes.

    All resolved issues

    Enhancements

    • #27508 Use new remote-store options in HA guides
    • #28429 Add details to error messages, especially around refresh tokens
    • #28729 Emphasize the need for setting container limit docs
    • #28880 Upgrade to Quarkus 3.8.4 dist/quarkus
    • #29183 Minor corrections to High Availability Guide docs

    Bugs

    • #16345 Unable to delete realm names with invalid URL characters admin/api
    • #22617 kc export fails when using User Federation (LDAP) with file-based Vault enabled import-export
    • #24568 iframe for frontend logout gets blocked if a custom CSP header is used core
    • #24878 NoClassDefFoundError for Apache XML and EAP8 adapter/jee-saml
    • #27021 Workflow failure: Fuse adapter tests ci
    • #27080 Workflow failure: Operator CI - KeycloakTruststoresTests#testTrustroreExists ci
    • #27514 Uncaught server error: java.lang.IllegalArgumentException: Path parameter not provided oidc
    • #28079 Group search does not work in user view admin/ui
    • #28187 Admin UI drag & drop in flow config seems to delete actions admin/ui
    • #28220 Admin API: User PUT operation clears firstname, lastname email fields admin/api
    • #28303 WARN - Event object wasn't available in remote cache after event was received infinispan
    • #28377 Broken lists in import/export server guide docs
    • #28431 Dedicated client scopes always show up when searching admin/ui
    • #28514 Message for searchClientRegistration is missing admin/ui
    • #28666 Accessing a transient (lightweight) user through client session fails in admin-api/-ui admin/ui
    • #28684 "Extend to children" button in authorization group policies is wrongly disabled admin/ui
    • #28911 clients_saml_test.spec.ts fails in main admin/ui
    • #29072 Startup probe should check for existence of an Admin user before returning 200 dist/quarkus
    • #29094 Fix the client name help grammatical error admin/ui
    • #29133 DuplicateEmailValidator causes two DB queries on every login if a user has an email address core
    • #29147 local user login not possible after LDAP connection problem ldap
    • #29154 Update docs to distinguish between product names and CR names docs
    • #29233 Broken link in documentation docs
  • 24.0.3 - 2024-04-16

    Upgrading

    Before upgrading refer to the migration guide for a complete list of changes.

    All resolved issues

    Enhancements

    • #26695 Keycloak and MSAD: enabling account in MSAD does not propagate to Keycloak ldap

    Bugs

    • #24201 Cannot disable LDAP-backed user if importEnabled=false ldap
    • #28100 Failed authentication: java.lang.NullPointerException: Cannot invoke "org.keycloak.models.UserModel.getFederationLink()" because "this.delegate" is null identity-brokering
    • #28248 Update user makes User ID changes when federationLink and LDAP_ID is not set properly admin/api
    • #28335 The false option of the pkceMethod init parameter for the JavaScript adapter is ignored adapter/javascript
    • #28638 Missing permission to read configmaps in `keycloak-operator-role` operator
  • 24.0.2 - 2024-03-24

    Upgrading

    Before upgrading refer to the migration guide for a complete list of changes.

    All resolved issues

    Enhancements

    • #25057 Inconsistent behaviour on getting user permissions using authorization authorization-services
    • #27433 Clarify format of keys in `additionalOptions` field in the Keycloak CR docs
    • #27481 Edit High Availability guide
    • #27484 Edit 23.0 changes part of Upgrading Guide
    • #27632 Integrate downstream Upgrading Guide changes into upstream
    • #27696 Upgrade to Quarkus 3.8.2 dist/quarkus
    • #27867 Corrections to Securing Apps Guide
    • #27871 Upgrade to Infinispan 14.0.26 core
    • #27953 Address feedback to Keycloak Server guide docs
    • #27955 Address term Keycloak in Server Administration Guide docs
    • #28009 Address edits to the Operator Guide
    • #28033 Upgrade Infinispan to 14.0.27.Final
    • #28084 Upgrade to Quarkus 3.8.3 dist/quarkus

    Bugs

    • #14501 Getting failed to initialize js message if consent is rejected by user account/ui
    • #15403 No email send on TOTP/Authenticator app removal core
    • #20637 Reset password flow fails with "Page has expired" error when Kerberos authentication is enabled in the browser flow authentication
    • #22644 Flaky test: org.keycloak.testsuite.forms.BrowserFlowTest#testAlternativeNonInteractiveExecutorInSubflow core
    • #23701 Attribute search does not work with federated users with ldap. admin/ui
    • #23980 Keycloak Operator fails to install realm authentication flow because "flow is null" import-export
    • #25490 Partial export/import is not mentioned in Keycloak's Server Administration Guide docs
    • #25687 A java.lang.NullPointerException occurs when sending a Multipart/form-data request to any file upload interface. admin/api
    • #26396 How do you update a custom user storage provider jar that includes a version number? dist/quarkus
    • #27117 user sessions not accessible in all cluster nodes infinispan
    • #27180 Grant type "urn:ietf:params:oauth:grant-type:uma-ticket" openid-connect/token service endpoint is returning refresh token with invalid Expiration authorization-services
    • #27228 Lowercased "terms_and_conditions" is not migrated in fed_user_required_action table core
    • #27245 Account console does not correctly treat link / unlink account account/ui
    • #27269 mvnw clean install -Pdistribution on Windows deletes necessary files during clean of org.keycloak:keycloak-admin-ui admin/ui
    • #27275 Invalidating offline token is not working from client sessions tab authentication
    • #27366 Social login - test failures with unexpected status code testsuite
    • #27483 Authz-client AuthorizationResource.getPermissions() ClassCastException authorization-services
    • #27504 Cpu and memory sizing typo docs
    • #27529 LegacyUserCredentialManager class not found storage
    • #27540 URL change for liquibase docs docs
    • #27548 Custom Browser Flow not working anymore admin/ui
    • #27573 Release notes from 24.0.0 miss that multi-site active-passive deployments are supported docs
    • #27597 dropping KC_PROXY=edge causes startup error core
    • #27611 Cannot modify realm email settings since keycloak 24 user-profile
    • #27653 Admin tests: Flaky realm_settings_user_profile_enabled test admin/ui
    • #27701 MTLS Cache options should be runtime options, not build time options dist/quarkus
    • #27719 Wrong Welcome page image in the documentation docs
    • #27745 Registration template in login2 is broken login/ui
    • #27761 Snyk workflow failure ci
    • #27779 Broken Migration "MigrateTo24_0_0" core
    • #27780 Fixing downstream documentation build docs
    • #27797 User profile fields cannot be set empty once they have a non-empty value (in Login Theme) user-profile
    • #27820 Account console confusing with WebAuthn account/ui
    • #27841 ES translation causes FreeMarker rendering issues translations
    • #27852 VerifyUserProfile invalidates user cache on every login core
    • #27878 Error when executing refresh grant, with scope param, without offline_access scope specified oidc
    • #27882 Incorrect version of bctls-fips in the docs docs
    • #27892 Truststore handling for the Operator is not documented operator
    • #27894 Multi datasource configuration does not work in Keycloak 24.0.1 dist/quarkus
    • #27900 Performance impact in changed hashing measured wrong authentication
    • #27925 Keycloak docs state that there are http metrics, but they are disabled docs
    • #27954 Hibernate Dialect detection does not work anymore for Oracle DBs storage
    • #27966 🍺 instead of dot: Attributes in account UI are not loaded user-profile
    • #27967 ORA-01450 when updating keycloak 23 -> 24 storage
    • #27981 User Profile: Inconsistent ordering of attributes between account and login themes user-profile
    • #28001 MySQL connector artifact should be ignored dist/quarkus
    • #28012 Keycloak CR Truststore should not have a name operator
    • #28113 WebAuthN registration broken after upgrading to 24.0.1 authentication/webauthn
from keycloak-js GitHub release notes

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

Snyk has created this PR to upgrade keycloak-js from 24.0.2 to 24.0.4.

See this package in npm:
keycloak-js

See this project in Snyk:
https://app.snyk.io/org/jookzie/project/653f8d9a-3fcf-46b3-a78e-34dbcbc9a4bb?utm_source=github&utm_medium=referral&page=upgrade-pr
Copy link

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants