Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@shawkins
Copy link
Contributor

@shawkins shawkins commented Feb 6, 2024

closes: #24893

Upstream it seems like they thought the browser compat / wildcard verifier was a mistake, so the Default matches more closely to the strict mode.

Another small issue with this is the spi docs were wrong (or the other logic was) - it was reporting values in lower case, but upper was expected. That was also corrected here.

I can't say for sure if users would be relying upon the specific behavior of either strict or wildcard, so it seems best to start with deprecation. However just having the annoation values as deprecated doesn't give any indication in help that values should not be used - so there's another possible help enhancement and/or an additional log message that should be emitted when the initi logic runs.

@vmuzikar
Copy link
Contributor

@shawkins Thanks for the PR. I remember discussing the rationale for this change somewhere but I can't find it now. Can you please remind me the motivation for it?

@shawkins
Copy link
Contributor Author

@shawkins Thanks for the PR. I remember discussing the rationale for this change somewhere but I can't find it now. Can you please remind me the motivation for it?

Both of the implementing classes have been deprecated in the apache http client.

Copy link
Contributor

@vmuzikar vmuzikar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@shawkins Thanks for the PR!

Could you please also update the Truststore guide to reflect the changes?

Copy link
Contributor

@vmuzikar vmuzikar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@keycloak/core Could you please review as well? It touches core areas.

vmuzikar
vmuzikar previously approved these changes Mar 1, 2024
Copy link
Contributor

@vmuzikar vmuzikar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks, LGTM.

Now we need a review from @keycloak/core.

stianst
stianst previously requested changes Mar 4, 2024
Copy link
Contributor

@stianst stianst left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

24 is now release, so release notes need to be updated to 25

@shawkins
Copy link
Contributor Author

shawkins commented Mar 4, 2024

@stianst moved the migration note

@shawkins shawkins requested a review from stianst March 4, 2024 11:57
vmuzikar
vmuzikar previously approved these changes Mar 5, 2024
Copy link
Contributor

@abstractj abstractj left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@shawkins, whenever you find some time, could you please resolve those conflicts? The changes look good to me, despite the presence of Git conflicts.
Following that, I suggest reaching out to the @keycloak/core-clients and @keycloak/core-iam teams for a review.

@pedroigor @mposolda I understand that your teams have a lot, but can you delegate to someone from your team the review of this PR? The changes proposed here are straightforward to review.

@shawkins
Copy link
Contributor Author

shawkins commented Mar 20, 2024

@shawkins, whenever you find some time, could you please resolve those conflicts? The changes look good to me, despite the presence of Git conflicts.

Thank you for reviewing. It's been updated to resolve the conflicts. Some of these prs are getting a little stale, so unfortunately conflicts creep in eventually - I'll make anything that is getting reviewed is up-to-date.

Following that, I suggest reaching out to the @keycloak/core-clients and @keycloak/core-iam teams for a review.

Ok I'll try again on the core chat.

Copy link
Contributor

@sguilhen sguilhen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @shawkins , changes look good to me!

@pedroigor
Copy link
Contributor

@mposolda I discussed with @shawkins. Although DEFAULT does not behave exactly how the now deprecated settings STRICT and WILDCARD work, I think it is something that we need to adapt due to a long-standing change of direction from the Apache HTTP library in regards to hostname verification.

@vmuzikar
Copy link
Contributor

The comment from @stianst around release notes is now resolved, dismissing the blocking change request.

Going to merge now not to let it stale again. We can address any additional changes as a follow-up if needed.

@vmuzikar vmuzikar dismissed stianst’s stale review March 21, 2024 15:22

The release notes are now resolved

@vmuzikar vmuzikar merged commit 7eab019 into keycloak:main Mar 21, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Refine hostname verification support

6 participants