Commit Graph

1156 Commits

Author SHA1 Message Date
Thomas Diesler c08ed20f78 [OID4VCI] Add support for user did as subject id (#45008)
closes #45006


Signed-off-by: Thomas Diesler <tdiesler@ibm.com>
2026-01-30 17:29:47 +01:00
Stefan Guilhen c13a1772f8 Adds ability to migrate scheduled workflow resources from one step to another step in the same or different workflow
Closes #45174

Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
2026-01-27 13:46:18 -03:00
mposolda e414050524 Remove AuthorizationDetailsResponse and make AuthorizationDetailsJSONRepresentation as base of RAR processors
closes #45706

Signed-off-by: mposolda <mposolda@gmail.com>
2026-01-26 17:21:45 +01:00
mposolda 76c4263db9 Polishing based on PR review. Fix flaky tests
closes #44961

Signed-off-by: mposolda <mposolda@gmail.com>
2026-01-26 08:45:41 +01:00
mposolda 416a6017c2 Make authorizationDetails processing more generic and not tightly coupled to OID4VCI. Fixes
closes #44961

Signed-off-by: mposolda <mposolda@gmail.com>
2026-01-26 08:45:41 +01:00
Alexander Schwartz e278a2f6fd Changing default clock skew for not-issued-before to 10 seconds
Closes #45620

Signed-off-by: Alexander Schwartz <alexander.schwartz@ibm.com>
2026-01-22 19:11:10 +01:00
vramik 111ba36504 Organization Groups Core Backend & API
Closes #45562

Signed-off-by: vramik <vramik@redhat.com>
2026-01-22 09:39:24 -03:00
Hathoute ea2083ed2c Support for clients in workflows
Signed-off-by: Hathoute <whitesmith.thedj@gmail.com>
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2026-01-21 11:20:30 -03:00
Thomas Diesler d8b74e77ab OID4VCI credentials have invalid subject id value (#45004)
closes #43854


Signed-off-by: Thomas Diesler <tdiesler@ibm.com>
2026-01-15 12:28:30 +01:00
Giuseppe Graziano db1f75a1cf Fix duplicate address claim in IDToken (#45423)
Closes #45250

Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
2026-01-15 08:48:31 +01:00
Stefan Guilhen 75b0a8aa2a When fetching scheduled workflows, return all steps with status completed/pending
Closes #45212

Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
2026-01-13 14:34:13 +01:00
Ricardo Martin 1aa1621eaa Use MIME decoder instead of the default one to replace deprecated Base64 class
Closes #45226

Signed-off-by: rmartinc <rmartinc@redhat.com>
2026-01-09 16:38:09 +01:00
mposolda 29c15d8e8a Creating IdentityProvider with latest java admin-client may fail against Keycloak server 26.4 or older
closes #45257

Signed-off-by: mposolda <mposolda@gmail.com>
2026-01-08 13:40:03 +01:00
Pascal Knüppel dceee1c1fb Fix NullPointer in JWSHeader with x5c header (#45161)
fixes #45160

Signed-off-by: Pascal Knüppel <pascal.knueppel@governikus.de>
2026-01-07 08:35:22 +01:00
Pedro Igor 0d5766f3a8 Allow running scheduled workflows
Closes #44865

Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2026-01-05 13:03:47 -03:00
Stefan Guilhen 66f3868ccf Suppress the step's priority in the returned workflow JSON/YAML
Closes #45075

Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
2025-12-29 10:26:21 -03:00
mposolda 08e96435c8 DefaultCryptoSdJwsTest.shouldValidateAgeSinceIssued_IfJwtIsTooOld() sometimes fails in CI
closes #44971

Signed-off-by: mposolda <mposolda@gmail.com>
2025-12-18 10:59:34 +01:00
Marek Posolda 92314bccc6 More capabilities in SdJwtVP API when creating presentations (#44977)
closes #44976

Signed-off-by: mposolda <mposolda@gmail.com>
2025-12-18 10:58:55 +01:00
forkimenjeckayang ca617d9711 [OID4VCI]: Use Keycloak time utility for OID4VC related timestamps (#44871)
Closes: #44235


Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com>
2025-12-17 14:58:01 +01:00
Awambeng Rodrick a1bffa3ddc Add spec-compliant jwt vc issuer well-known endpoint
- expose /.well-known/jwt-vc-issuer/realms/{realm} and keep legacy route with deprecation headers
- build consumer metadata URL per draft-ietf-oauth-sd-jwt-vc-13 and add realm-path coverage
- add integration test for new path plus deprecation headers on legacy endpoint

Closes #44256

Signed-off-by: Awambeng Rodrick <awambengrodrick@gmail.com>
Signed-off-by: Awambeng <awambengrodrick@gmail.com>
2025-12-16 13:46:06 +01:00
Pascal Knüppel 46e5979b17 [OID4VCI] Handle key_attestation_required in metadata endpoint (#44471)
fixes #43801


Signed-off-by: Pascal Knüppel <pascal.knueppel@governikus.de>
Signed-off-by: Pascal Knüppel <captain.p.goldfish@gmx.de>
Signed-off-by: Captain-P-Goldfish <captain.p.goldfish@gmx.de>
Co-authored-by: Ingrid Kamga <xingridkamga@gmail.com>
2025-12-05 16:00:32 +01:00
Stefan Guilhen b14d00e08f Improve workflow concurrency settings
- allow restarting based on events
 - allow cancelling based on events

Closes #44645

Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
2025-12-05 11:28:18 -03:00
Steve Hawkins 25186278fc fix: consolidating config logic
closes: #42000

Signed-off-by: Steve Hawkins <shawkins@redhat.com>
2025-12-04 14:25:56 -03:00
forkimenjeckayang 4dd68c0316 [OID4VCI] Conformance Test Fixes (#44439)
closes #44659


Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com>
2025-12-04 09:03:38 +01:00
Stefan Guilhen 65ab7f541d Add API method that fetches the scheduled workflow steps for a resource
Closes #43660

Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
2025-12-03 11:09:55 -03:00
Ricardo Martin f91363d12d Improve Public Key Management for JWTAuthorizationGrant identity provider
Closes #44243

Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-12-03 11:45:34 +01:00
mposolda 9c6a6276e4 Polishing of sd-jwt SDK builder related methods
closes #44532

Signed-off-by: mposolda <mposolda@gmail.com>
2025-12-03 11:09:08 +01:00
Pascal Knüppel 9b870d3d8a Fix ClassCastException on mixing AddressMapper with ClaimsMapper (#44457)
closes #44455


Signed-off-by: Pascal Knüppel <pascal.knueppel@governikus.de>
Signed-off-by: Captain-P-Goldfish <captain.p.goldfish@gmx.de>
2025-12-01 14:55:44 +01:00
Stefan Guilhen 3e312d91d8 Ensure null values are not serialized when fetching workflows in YAML format
Closes #44396

Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
2025-12-01 10:45:35 -03:00
Giuseppe Graziano 2b4855ff97 Executor for checking claims in JWT assertions (#44537)
Closes #4443


Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
2025-12-01 11:07:42 +01:00
Thomas Diesler 54bf9206b2 [OID4VCI] Credential Offer must be created by Issuer not Holder (#44255)
closes #44116


Signed-off-by: Thomas Diesler <tdiesler@ibm.com>
2025-11-27 16:07:10 +01:00
mposolda bf23259c0f Removing SdJwtFacade
closes #44525

Signed-off-by: mposolda <mposolda@gmail.com>
2025-11-27 14:19:27 +01:00
Alexis Rico b0b38176f0 Manage Organization Invites
Closes #38809

Signed-off-by: Alexis Rico <sferadev@gmail.com>
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
Co-authored-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-11-27 10:28:52 +01:00
mposolda cbb823bc0e Make sd-jwt key binding verification work with EdDSA keys
closes #44369

Signed-off-by: mposolda <mposolda@gmail.com>
2025-11-26 14:44:29 +01:00
Pascal Knüppel 64d5e1a3d5 [OID4VCI] Redesign SDJwt API and handle keybinding JWT (#44227)
closes #42091


Signed-off-by: Pascal Knüppel <pascal.knueppel@governikus.de>
Signed-off-by: Captain-P-Goldfish <captain.p.goldfish@gmx.de>
Signed-off-by: mposolda <mposolda@gmail.com>
Co-authored-by: mposolda <mposolda@gmail.com>
2025-11-24 11:01:19 +01:00
Stian Thorgersen 2a78bc67d7 Refactoring around federated client authenticator to better handling lookup of IdPs and clients. Also, introducing updates to documentation. (#44325)
Closes #44253
Closes #42987
Closes #44063

Signed-off-by: stianst <stianst@gmail.com>
Co-authored-by: Alexander Schwartz <alexander.schwartz@gmx.net>
2025-11-22 12:53:22 +01:00
Marek Posolda a4c583246d Use the unified constants class for sd-jwt/oid4vc standard data and claims (#44153)
closes #44152

Signed-off-by: mposolda <mposolda@gmail.com>
2025-11-18 10:41:04 +01:00
Stian Thorgersen f6702decc0 JWK Algorithm Key Pair support (#44203)
Closes #44141

Signed-off-by: stianst <stianst@gmail.com>
2025-11-17 07:51:08 +01:00
Stefan Guilhen 3319e8d9b5 Add optional parameter in WorkflowResource.toRepresentation to allow retrieval of the rep without the ids
Closes #44183

Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
2025-11-14 12:20:40 -03:00
Stian Thorgersen a2c1055f8d Proposed import order (#43432)
* Add importOrder to Spotless

Closes #43235

Signed-off-by: stianst <stianst@gmail.com>

* Re-order imports with Spotless

Signed-off-by: stianst <stianst@gmail.com>

---------

Signed-off-by: stianst <stianst@gmail.com>
2025-11-14 09:34:49 +01:00
Stefan Guilhen da7993896d Allow ISO-8601 compatible format for the after field in workflow steps
- aligns the format with what is used in the JPA connection provider pool max lifetime for time-based configurations

Closes #42913

Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
2025-11-12 18:51:49 -03:00
Stefan Guilhen 5ff2e22f18 Fix representation so that workflows can be properly disabled/enabled.
- also removes empty 'with' configurations from the steps when retrieving the workflow.

Closes #44163

Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
2025-11-12 18:51:36 -03:00
Ingrid Kamga ce05241c7f [OID4VCI] Tolerate clock skew in SD-JWT time checks (#43506)
Closes #43456

Signed-off-by: Ingrid Kamga <Ingrid.Kamga@adorsys.com>
2025-11-11 09:02:44 +01:00
Stian Thorgersen d8275fe5df Remove wildcard imports (#44060)
Closes #44059

Signed-off-by: stianst <stianst@gmail.com>
2025-11-10 11:46:05 +01:00
Pedro Igor 33f1dda2cf Processing workflow events asynchronously - Part 1
Closes #42386

Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-11-07 10:57:05 -03:00
Stian Thorgersen b278dbbb3d Allow identity provider configuration without defaults for user authentication (#43963)
Closes #43552

Signed-off-by: stianst <stianst@gmail.com>
2025-11-05 10:13:40 -03:00
Giuseppe Graziano 4b443f04ee JWT Authorization grant idp config (#43841)
Closes #43568

Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
2025-11-04 14:46:14 +01:00
vramik 4d912a9c21 Support for YAML payloads for Admin client for creation of workflows
Closes #43666

Signed-off-by: vramik <vramik@redhat.com>
2025-11-03 13:09:17 -03:00
Ingrid Kamga ea06651da5 [OID4VCI] Ensure openid_credential is one of authorization_details_types_supported on the Authorization Server metadata (#43599)
Closes #43398

Signed-off-by: Ingrid Kamga <Ingrid.Kamga@adorsys.com>
2025-10-31 11:32:24 +01:00
Stian Thorgersen be6a3814fb Add CORS support to OIDC dynamic client registration endpoints (#43625)
Closes #8863

Signed-off-by: stianst <stianst@gmail.com>
2025-10-30 12:12:08 +01:00