{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":3382195,"defaultBranch":"develop","name":"uaa","ownerLogin":"cloudfoundry","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2012-02-07T22:40:55.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/621746?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1718185315.0","currentOid":""},"activityList":{"items":[{"before":"d4db3af003a37e27848c3fd4da23ddaacecbfd43","after":"c401ddf6817ae7e894ae1fba2eb19979b49aeb5d","ref":"refs/heads/fix/githubIdpBearerToken","pushedAt":"2024-06-12T12:17:56.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":"Test fixed\n\nmocked server to expect Bearer token","shortMessageHtmlLink":"Test fixed"}},{"before":null,"after":"d4db3af003a37e27848c3fd4da23ddaacecbfd43","ref":"refs/heads/fix/githubIdpBearerToken","pushedAt":"2024-06-12T09:41:55.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":"fix: user bearer token in oauth2 userinfo flow\n\nWith that Github (created the userinfo lookup) and other\nOAuth2 server are compliant","shortMessageHtmlLink":"fix: user bearer token in oauth2 userinfo flow"}},{"before":"82cd03457acb469e55095ed8c4eb96c6979066c0","after":"2dbae1d63392f85a623af9d85a0810b4a1d60950","ref":"refs/heads/new-saml-0530","pushedAt":"2024-06-11T22:06:29.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"duanemay","name":"Duane May","path":"/duanemay","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/991170?s=80&v=4"},"commit":{"message":"wip: Break up AuthProvider\n\nSigned-off-by: Ivan Protsiuk ","shortMessageHtmlLink":"wip: Break up AuthProvider"}},{"before":"3ad69d61f7620a419d3520224dde2f3a7525905e","after":null,"ref":"refs/heads/fix/supportAuthMethodNone","pushedAt":"2024-06-11T18:09:45.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"}},{"before":"2a45920ad84a6b804f0bb4faef16717ad0ab4269","after":"a4d9a3468fd7ae70e7f5917fbde3bea15bb95115","ref":"refs/heads/develop","pushedAt":"2024-06-11T18:09:45.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":"fix: Support authMethod=none in proxy password grant (#2918)\n\n* fix: Support authMethod=none in proxy password grant\r\n\r\n* Fix definition of authMethod in uaa.yml, which was not taken over\r\n* Check for authMethod=none and allow to omit authentication with password grant\r\n\r\nThere are some OIDC IdPs which support password grant without secret, therefore offer this in proxy mode.\r\n\r\n* test added\r\n\r\n* rebase\r\n\r\n* Error message fixed.\r\n\r\n* Add assert to check for the expected error message","shortMessageHtmlLink":"fix: Support authMethod=none in proxy password grant (#2918)"}},{"before":"07a4a873c57ba017ecbbc0198fe76e98c7a35815","after":"3ad69d61f7620a419d3520224dde2f3a7525905e","ref":"refs/heads/fix/supportAuthMethodNone","pushedAt":"2024-06-11T17:38:14.000Z","pushType":"push","commitsCount":14,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":"Add assert to check for the expected error message","shortMessageHtmlLink":"Add assert to check for the expected error message"}},{"before":"5719f2b23649fb277ad3b434578d4d0780470156","after":"d1a7f221a5fec7a412edbc02a8d4298a5f12e9b0","ref":"refs/heads/gh-pages","pushedAt":"2024-06-11T12:54:43.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jhamon","name":"Jennifer Hamon","path":"/jhamon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1326365?s=80&v=4"},"commit":{"message":"Update API docs","shortMessageHtmlLink":"Update API docs"}},{"before":null,"after":"3777e94c921c48b390a5dd383ae113e4ab2ea1dc","ref":"refs/heads/77.11.0","pushedAt":"2024-06-11T12:38:45.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jhamon","name":"Jennifer Hamon","path":"/jhamon","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1326365?s=80&v=4"},"commit":{"message":"Update UAA image reference in k8s deployment template to 77.11.0","shortMessageHtmlLink":"Update UAA image reference in k8s deployment template to 77.11.0"}},{"before":"911b4ce343b8fa4116e53971711c088bbd352230","after":null,"ref":"refs/heads/feature/omitJwksCache","pushedAt":"2024-06-11T07:48:14.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"}},{"before":"1c0288e73927cb71f577e3ae00d59b2a99f16982","after":"2a45920ad84a6b804f0bb4faef16717ad0ab4269","ref":"refs/heads/develop","pushedAt":"2024-06-11T07:48:13.000Z","pushType":"pr_merge","commitsCount":4,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":"Merge pull request #2920 from cloudfoundry/feature/omitJwksCache\n\nIdentity provider key caching behavior configurable","shortMessageHtmlLink":"Merge pull request #2920 from cloudfoundry/feature/omitJwksCache"}},{"before":"d0119713cfabeca1b63cdf8662c6956fe7d13b27","after":null,"ref":"refs/heads/fix/issue/2917/test","pushedAt":"2024-06-11T07:42:40.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"}},{"before":"2ef412cda2b2a66d348a65dc0eb87a751a9d1a28","after":"1c0288e73927cb71f577e3ae00d59b2a99f16982","ref":"refs/heads/develop","pushedAt":"2024-06-11T07:42:39.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":"IT for testing a fix of issue #2917 (#2922)\n\nTest shows:\r\nSAML OK\r\nOIDC we have an issue","shortMessageHtmlLink":"IT for testing a fix of issue #2917 (#2922)"}},{"before":"099174eef95d49c527d85d40851fc1468fe6d5d1","after":"d0119713cfabeca1b63cdf8662c6956fe7d13b27","ref":"refs/heads/fix/issue/2917/test","pushedAt":"2024-06-11T06:03:51.000Z","pushType":"push","commitsCount":5,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":"Merge branch 'develop' of github.com:cloudfoundry/uaa into fix/issue/2917/test","shortMessageHtmlLink":"Merge branch 'develop' of github.com:cloudfoundry/uaa into fix/issue/…"}},{"before":"c56515600ca3386b28b13623513771835709ebd9","after":null,"ref":"refs/heads/fix/issue/2917/fixPlusTest","pushedAt":"2024-06-11T04:45:13.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"}},{"before":"c865369af3714150f450c3d7611ac7f731dd7caf","after":"2ef412cda2b2a66d348a65dc0eb87a751a9d1a28","ref":"refs/heads/develop","pushedAt":"2024-06-11T04:45:12.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":" Fix issue #2917 (#2923)\n\n* IT for testing a fix of issue #2917\r\n\r\nTest shows:\r\nSAML OK\r\nOIDC we have an issue\r\n\r\n* Fix issue #2917\r\n\r\nPerform shadow user creation (NewUserAuthenticatedEvent)\r\nwithout authorities creation, but rely on event\r\nExternalGroupAuthorizationEvent later.\r\n\r\nIncludes: IT for testing a fix of issue #2917","shortMessageHtmlLink":" Fix issue #2917 (#2923)"}},{"before":"7ede3efe09f3458435cf3e893ffd59fa86078121","after":"911b4ce343b8fa4116e53971711c088bbd352230","ref":"refs/heads/feature/omitJwksCache","pushedAt":"2024-06-10T17:57:40.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"peterhaochen47","name":"Peter Chen","path":"/peterhaochen47","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/14728986?s=80&v=4"},"commit":{"message":"improve doc on config.cacheJwks\n\n- the relationship with tokenKeyUrl/discovery url already explained in\n constraints section, so no need to repeat\n- add some guidance to help user decide which value to pick\n- update config.tokenKeyUrl doc to help user understand that\n the token key and the JWKS are the same concept.","shortMessageHtmlLink":"improve doc on config.cacheJwks"}},{"before":null,"after":"35ca6b9a21168b1802cddc34e29e1c408266dda1","ref":"refs/heads/wip-opensaml-3.2","pushedAt":"2024-06-10T14:57:54.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"duanemay","name":"Duane May","path":"/duanemay","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/991170?s=80&v=4"},"commit":{"message":"wip: Move to OpenSaml 3.2\n\nSigned-off-by: Alicia Yingling ","shortMessageHtmlLink":"wip: Move to OpenSaml 3.2"}},{"before":"6c5b09c9c753eb95f2cfb89f36b6da372cadbf1d","after":"82cd03457acb469e55095ed8c4eb96c6979066c0","ref":"refs/heads/new-saml-0530","pushedAt":"2024-06-10T14:51:34.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"duanemay","name":"Duane May","path":"/duanemay","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/991170?s=80&v=4"},"commit":{"message":"Improve Testing of SAML Request/Response\n\n- Improve Testing of SAML Request/Response with Saml2TestUtils\n- Configure assertionConsumerServiceLocation in one location.\n\n- Attempted move to OpenSaml4AuthenticationProvider\nrequires a shadow dependency on opensaml to remove the need for non-FIPS compliant security provider. Not yet in place\n\nSigned-off-by: Duane May \nSigned-off-by: Alicia Yingling ","shortMessageHtmlLink":"Improve Testing of SAML Request/Response"}},{"before":"b77cecd6d09d04d5b2dc49ae5514a1573ad004ff","after":"3acb204ec1291039d28db6030c7e2d01a7b79c0a","ref":"refs/heads/feature/reject-idz-deletion-if-idp-with-alias-present","pushedAt":"2024-06-10T06:58:21.000Z","pushType":"push","commitsCount":56,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":"Add tests","shortMessageHtmlLink":"Add tests"}},{"before":"004ce43ebfc936cdc98bfe86118e48f1013d2cf3","after":null,"ref":"refs/heads/feature/alias-id-and-alias-zid-for-users","pushedAt":"2024-06-10T05:49:54.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"}},{"before":"0b1b72210cfde164e586f6025ee973e84fb0e840","after":"c865369af3714150f450c3d7611ac7f731dd7caf","ref":"refs/heads/develop","pushedAt":"2024-06-10T05:49:54.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":"Alias ID and Alias ZID for Users (#2663)\n\n* Checkout DB migrations for alias properties of Identity Provider table\r\n\r\n* Add DB migrations for alias properties of users table\r\n\r\n* Add alias properties to ScimUser class\r\n\r\n* Add alias properties to create operations in JdbcScimUserProvisioning\r\n\r\n* Add alias properties to update query in JdbcScimUserProvisioning\r\n\r\n* Add alias properties to deactivate and delete user operations in JdbcScimUserProvisioning\r\n\r\n* Add alias properties to change password query in JdbcScimUserProvisioning\r\n\r\n* Add alias properties to update password change required query in JdbcScimUserProvisioning\r\n\r\n* Fix unit tests\r\n\r\n* Add hasMirroredUser method to ScimUser\r\n\r\n* Improve check for number of updated records in change password handler\r\n\r\n* Add tests for alias property handling in JdbcScimUserProvisioning\r\n\r\n* Fix unit tests\r\n\r\n* Add check whether the password change required flag was also updated for the mirrored user\r\n\r\n* Move validity check of alias properties to separate class\r\n\r\n* Move mirroring handling to separate reusable class\r\n\r\n* Fix unit tests\r\n\r\n* Add javadoc to EntityMirroringHandler\r\n\r\n* Add mirroring handler for ScimUser class\r\n\r\n* Add missing override annotations to JdbcScimUserProvisioning\r\n\r\n* Fix wrong getter call in EntityMirroringHandler\r\n\r\n* Fix access token cache in IdentityProviderEndpointsAliasMockMvcTests\r\n\r\n* Make access token cache in IdentityProviderEndpointsAliasMockMvcTests non-static\r\n\r\n* Add factory method for cloning Approval\r\n\r\n* Add EntityMirroringResult class\r\n\r\n* Add additional validation checks to EntityMirroringHandler\r\n\r\n* Add mirrored entity to return value of EntityMirroringHandler.ensureConsistencyOfMirroredEntity\r\n\r\n* Add mirroring handling to ScimUser create endpoint\r\n\r\n* Add missing constructor parameters to ScimUserEndpoints\r\n\r\n* Make ScimUser.getAliasZid return aliasZid instead of null\r\n\r\n* Change wording from \"mirrored\" to \"alias\"\r\n\r\n* Add tests for IdentityProviderAliasHandler\r\n\r\n* Move unit tests for alias handling to separate class\r\n\r\n* Add further MockMvc tests for Creation/Update of IdPs with alias properties\r\n\r\n* Add tests for read operations\r\n\r\n* Fix IdentityProviderEndpointsTest\r\n\r\n* Fix Flyway migration\r\n\r\n* Remove obsolete IdentityProviderEndpointsAliasTest\r\n\r\n* Fix IdentityProviderAliasHandlerEnsureConsistencyTest\r\n\r\n* Remove obsolete IdentityProviderAliasHandlerTest\r\n\r\n* Add JsonIgnore annotation to EntityWithAlias#getAliasDescription\r\n\r\n* Fix JdbcScimUserProvisioningTests\r\n\r\n* Refactor\r\n\r\n* Remove obsolete IdentityProviderEndpointsTestBase\r\n\r\n* Revert changes to JdbcScimUserProvisioning\r\n\r\n* Add skeleton of ScimUserEndpointsAliasMockMvcTests\r\n\r\n* Introduce superclass for MockMvcTests of endpoints for entities with alias\r\n\r\n* Add alias properties to ScimUser JSON deserialization\r\n\r\n* Add MockMvc tests for ScimUser GET with disabled alias feature\r\n\r\n* Fix JdbcScimUserProvisioningTests\r\n\r\n* Add MockMvc tests for SCIM user create with alias\r\n\r\n* Add more detailed comparison of original and alias user to ScimUserEndpointsAliasMockMvcTests\r\n\r\n* Add 'aliasEntitiesEnabled' flag to ScimUserEndpoints\r\n\r\n* Add alias logic to deletion of SCIM users\r\n\r\n* Add MockMvc test about ignoring dangling reference during deletion\r\n\r\n* Add MockMvc test about also deleting alias user if original is deleted\r\n\r\n* Add MockMvc test about breaking reference to original user in alias user if original is deleted\r\n\r\n* Add MockMvc tests for SCIM user PUT with alias\r\n\r\n* Add MockMvc tests for SCIM User PUT with disabled alias feature\r\n\r\n* Refactor\r\n\r\n* Add MockMvc tests for SCIM user patch\r\n\r\n* Fix assignment of groups and approvals of alias SCIM users\r\n\r\n* Remove obsolete Approval.clone method\r\n\r\n* Add check if alias user only has default groups of alias zone to ScimUserEndpointsAliasMockMvcTests\r\n\r\n* Revert EntityAliasResult\r\n\r\n* Fix missing import\r\n\r\n* Fix unit tests\r\n\r\n* Revert adding retrievePasswordForUser method to ScimUserProvisioning\r\n\r\n* Revert making ScimUSer getters public\r\n\r\n* Remove usages of no longer accessible ScimUser getters\r\n\r\n* Reject user deletion if alias exists and alias feature is disabled\r\n\r\n* Adjust MockMvc tests to new deletion behavior\r\n\r\n* Adjust MockMvc test Update -> AliasFeatureDisabled -> ExistingAlias -> shouldAccept_OnlyAliasPropsSetToNull to new update behavior\r\n\r\n* Adjust MockMvc test Update -> AliasFeatureDisabled -> ExistingAlias -> shouldAccept_AliasPropsSetToNullAndOtherPropsChanged to new update behavior\r\n\r\n* Adjust MockMvc test Update -> AliasFeatureDisabled -> ExistingAlias -> shouldAccept_ShouldIgnoreAliasIdMissingInExistingUser to new update behavior\r\n\r\n* Adjust MockMvc test Update -> AliasFeatureDisabled -> ExistingAlias -> shouldAccept_ShouldIgnoreDanglingRef to new update behavior\r\n\r\n* Improve test case names\r\n\r\n* Remove unused method\r\n\r\n* Remove obsolete tests checking whether alias properties are ignored in SCIM user endpoints\r\n\r\n* Use 400 status code instead of 422 for rejected deletions of SCIM users with alias\r\n\r\n* Adjust endpoint docs for new alias fields\r\n\r\n* Remove obsolete test cases for JdbcScimUserProvisioning\r\n\r\n* Refactor alias handling in ScimUser create endpoint\r\n\r\n* Adjust SCIM operation counters to not count operations performed on alias users\r\n\r\n* Adjust ScimUserEndpointsAliasMockMvcTests.assertIsCorrectAliasPair to ScimUserAliasHandler.cloneEntity method\r\n\r\n* Fix endpoint docs for users delete endpoint\r\n\r\n* Add unit test for ScimUserEndpoints: should throw during creation if alias properties are invalid\r\n\r\n* Add unit test for ScimUserEndpoints: should throw during deletion if user has alias and alias feature disabled\r\n\r\n* Fix integration tests for postgresql\r\n\r\n* Fix unit tests\r\n\r\n* Remove unnecessary sync of approvals and groups from update endpoint\r\n\r\n* Revert \"Remove unnecessary sync of approvals and groups from update endpoint\"\r\n\r\nThis reverts commit e75cff9f3f13b29be8335338baf70fbaf8ab8e61.\r\n\r\n* Add separate class for unit tests related to user alias fields\r\n\r\n* Fix unit tests\r\n\r\n* Move ScimUserEndpointsAliasTests from uaa to server bundle\r\n\r\n* Add unit tests for ScimUser delete with alias\r\n\r\n* Add unit tests for ScimUser update with alias\r\n\r\n* Add unit tests for ScimUser update with alias: alias handler throws exception\r\n\r\n* Add unit tests for ScimUser delete with alias: should ignore dangling reference\r\n\r\n* Add unit tests for ScimUser update with alias: should throw ScimException if aliasHandler.ensureConsistency fails\r\n\r\n* Use EntityAliasFailedException as cause if thrown by alias handler during ScimUser update\r\n\r\n* Adjust endpoint docs for ScimUser create/update: 422 status code if alias creation/update fails\r\n\r\n* Remove deletion of alias IdP from JdbcIdentityProviderProvisioning.deleteByIdentityZone\r\n\r\n* Reject deletion of identity zone if an IdP with alias exists in the zone\r\n\r\n* Add new status code to identity zone deletion documentation\r\n\r\n* Fix ScimUser create: ensure zone ID is set before alias validity check\r\n\r\n* Fix Sonar: remove unnecessary clause in if statement\r\n\r\n* Remove changes from PR#2850\r\n\r\n* Replace value annotation with aliasEntitiesEnabled bean in ScimUserEndpoints constructor\r\n\r\n* Refactor\r\n\r\n* Rework: use transaction and alias handling only when alias flag is enabled\r\n\r\n* Rework: inject transaction template instead of creating it in the constructor of ScimUserEndpoints\r\n\r\n* Fix Sonar: change collect(toList()) to toList()\r\n\r\n* Import statement\r\n\r\norder as before\r\n\r\n---------\r\n\r\nCo-authored-by: d036670 ","shortMessageHtmlLink":"Alias ID and Alias ZID for Users (#2663)"}},{"before":"0e1683bf388dc5a8b84cf092793cb58b9b985d12","after":"004ce43ebfc936cdc98bfe86118e48f1013d2cf3","ref":"refs/heads/feature/alias-id-and-alias-zid-for-users","pushedAt":"2024-06-09T06:39:48.000Z","pushType":"push","commitsCount":6,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":"Merge remote-tracking branch 'refs/remotes/origin/develop' into feature/alias-id-and-alias-zid-for-users","shortMessageHtmlLink":"Merge remote-tracking branch 'refs/remotes/origin/develop' into featu…"}},{"before":"72e4c61093ad13815a5ef53adc63a3beb653956a","after":null,"ref":"refs/heads/fix/zone-creation-fails-when-allowlist-does-not-contain-all-default-groups","pushedAt":"2024-06-09T06:38:09.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"}},{"before":"fb1f873ad3e9b1e0d2324e48f6ea7f1843d920af","after":"0b1b72210cfde164e586f6025ee973e84fb0e840","ref":"refs/heads/develop","pushedAt":"2024-06-09T06:38:09.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":"Fix: Zone creation fails when allow list does not contain all default groups (#2870)\n\n* Add mock mvc test checking whether only those system scopes are created in a zone that are mentioned in the groups allow list\r\n\r\n* Modify zone creation: only create those groups for system scopes that are mentioned in the allow list for groups\r\n\r\n* Add unit test\r\n\r\n* Add checks for response status code to IntegrationTestUtils\r\n\r\n* Fix ScimGroupEndpointsIntegrationTests.relyOnDefaultGroupsShouldAllowedGroupSucceed\r\n\r\n* Fix ScimGroupEndpointsIntegrationTests.changeDefaultGroupsAllowedGroupsUsageShouldSucceed\r\n\r\n* Revert \"Add checks for response status code to IntegrationTestUtils\"\r\n\r\nThis reverts commit 884416db2b0ad88b56d8847893fd99b3cdff1c0b.\r\n\r\n* Fix ScimGroupEndpointsIntegrationTests.changeDefaultGroupsAllowedGroupsUsageShouldSucceed","shortMessageHtmlLink":"Fix: Zone creation fails when allow list does not contain all default…"}},{"before":"0c5b574bf5d57294fde5f7ccf2fcd938fb6a69b7","after":null,"ref":"refs/heads/documentation-for-alias-feature","pushedAt":"2024-06-08T08:26:13.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"}},{"before":"9758bfb11891f8454c3d01e9445db47cfb1e5c90","after":"fb1f873ad3e9b1e0d2324e48f6ea7f1843d920af","ref":"refs/heads/develop","pushedAt":"2024-06-08T08:26:12.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":"Documentation for Alias Feature (#2919)\n\n* Add first draft of alias feature documentation\r\n\r\n* Rework","shortMessageHtmlLink":"Documentation for Alias Feature (#2919)"}},{"before":"b94a96d5cbdfcb323ac4caa88c1a0ad326716b2d","after":"0e1683bf388dc5a8b84cf092793cb58b9b985d12","ref":"refs/heads/feature/alias-id-and-alias-zid-for-users","pushedAt":"2024-06-07T14:35:16.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"adrianhoelzl-sap","name":"Adrian Hölzl","path":"/adrianhoelzl-sap","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/102049638?s=80&v=4"},"commit":{"message":"Fix Sonar: change collect(toList()) to toList()","shortMessageHtmlLink":"Fix Sonar: change collect(toList()) to toList()"}},{"before":"ced0186589d11fbacf82e9789f8e99571ede3fc0","after":"b94a96d5cbdfcb323ac4caa88c1a0ad326716b2d","ref":"refs/heads/feature/alias-id-and-alias-zid-for-users","pushedAt":"2024-06-07T14:32:15.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"adrianhoelzl-sap","name":"Adrian Hölzl","path":"/adrianhoelzl-sap","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/102049638?s=80&v=4"},"commit":{"message":"Rework: inject transaction template instead of creating it in the constructor of ScimUserEndpoints","shortMessageHtmlLink":"Rework: inject transaction template instead of creating it in the con…"}},{"before":null,"after":"c56515600ca3386b28b13623513771835709ebd9","ref":"refs/heads/fix/issue/2917/fixPlusTest","pushedAt":"2024-06-07T14:11:40.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"strehle","name":"Markus Strehle","path":"/strehle","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11627201?s=80&v=4"},"commit":{"message":"Fix issue #2917\n\nPerform shadow user creation (NewUserAuthenticatedEvent)\nwithout authorities creation, but rely on event\nExternalGroupAuthorizationEvent later.\n\nIncludes: IT for testing a fix of issue #2917","shortMessageHtmlLink":"Fix issue #2917"}},{"before":"30df9fcd5835aa07533a4e6514d9c8b7cbe04e9b","after":"ced0186589d11fbacf82e9789f8e99571ede3fc0","ref":"refs/heads/feature/alias-id-and-alias-zid-for-users","pushedAt":"2024-06-07T13:22:28.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"adrianhoelzl-sap","name":"Adrian Hölzl","path":"/adrianhoelzl-sap","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/102049638?s=80&v=4"},"commit":{"message":"Rework: use transaction and alias handling only when alias flag is enabled","shortMessageHtmlLink":"Rework: use transaction and alias handling only when alias flag is en…"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEY0ZCEQA","startCursor":null,"endCursor":null}},"title":"Activity · cloudfoundry/uaa"}