IAM Team, Please note that the following JIRAs have not be fixed per se. According to the comments they have been resolved as "cannot reproduce", "won't fix" or "invalid". But the "Resolution" says "Fixed" which is incorrect. Can we change this and make sure in future we strictly follow proper resolution category. Otherwise this will give a wrong impression when generating stats on public JIRAs.
[1] https://wso2.org/jira/browse/IDENTITY-5943 [2] https://wso2.org/jira/browse/IDENTITY-6126 [3] https://wso2.org/jira/browse/IDENTITY-6235 [4] https://wso2.org/jira/browse/IDENTITY-6243 [5] https://wso2.org/jira/browse/IDENTITY-6282 Regards, Johann. On Wed, Aug 23, 2017 at 11:03 AM, Nuwandi Wickramasinghe <[email protected]> wrote: > WSO2 Identity Server team is pleased to announce the 3rd Milestone of WSO2 > IdentityServer 5.4.0. You can download this distribution from the > following location. > > https://github.com/wso2/product-is/releases/tag/v5.4.0-m3 > > Following list contains all the features, improvements and bug fixes > available with this milestone. > Patch > > - [IDENTITY-6206 <https://wso2.org/jira/browse/IDENTITY-6206>] - ACS > validation failure when using signed passive saml requests > - [IDENTITY-6208 <https://wso2.org/jira/browse/IDENTITY-6208>] - > Possible Connection Leak in RegistryRecoveryDataStore > > Bug > > - [IDENTITY-4663 <https://wso2.org/jira/browse/IDENTITY-4663>] - > Getting a registry indexing error while evaluating a XACML request against > PDP > - [IDENTITY-5549 <https://wso2.org/jira/browse/IDENTITY-5549>] - > Backend error while creating a tenant domain with capital letters in the > name > - [IDENTITY-5938 <https://wso2.org/jira/browse/IDENTITY-5938>] - [NPE] > OAuth2AuthzEndpoint has thrown exception, unwinding now > - [IDENTITY-5943 <https://wso2.org/jira/browse/IDENTITY-5943>] - > [LoadTest] Error while retrieving access token in Authorization Code grant > type > - [IDENTITY-6073 <https://wso2.org/jira/browse/IDENTITY-6073>] - OIDC > logout fails when call back url has a uri fragment > - [IDENTITY-6088 <https://wso2.org/jira/browse/IDENTITY-6088>] - IS > should not return IDTokens without required claims > - [IDENTITY-6099 <https://wso2.org/jira/browse/IDENTITY-6099>] - > Intermittent error when invoking password reset rest api using browser > based client > - [IDENTITY-6117 <https://wso2.org/jira/browse/IDENTITY-6117>] - > Observed a performance degradation due to pre-authentication and > post-authentication event handlers > - [IDENTITY-6126 <https://wso2.org/jira/browse/IDENTITY-6126>] - Style > issue in IS SSO Login page in IE > - [IDENTITY-6158 <https://wso2.org/jira/browse/IDENTITY-6158>] - > Exception thrown when debug logs are disabled > - [IDENTITY-6175 <https://wso2.org/jira/browse/IDENTITY-6175>] - > Improvements for updateAppAndRevokeTokensAndAuthzCodes > - [IDENTITY-6235 <https://wso2.org/jira/browse/IDENTITY-6235>] - > Nullpointer Exception on Requesting Access Token twice for using a custom > grant type. > - [IDENTITY-6237 <https://wso2.org/jira/browse/IDENTITY-6237>] - > PROVIDE MANDATORY DETAILS page does not go away on submit of missing cliams > - [IDENTITY-6241 <https://wso2.org/jira/browse/IDENTITY-6241>] - > Multiple claims mapped to a same local claim > - [IDENTITY-6242 <https://wso2.org/jira/browse/IDENTITY-6242>] - > Internal Server Error on Requesting Access-Token for the Same > 'saml2-bearer' > - [IDENTITY-6243 <https://wso2.org/jira/browse/IDENTITY-6243>] - Error > on requesting access tokens with federated user and primary user where both > users have the same username. > - [IDENTITY-6244 <https://wso2.org/jira/browse/IDENTITY-6244>] - Only > sub is recieving even claims are set for federated users > - [IDENTITY-6247 <https://wso2.org/jira/browse/IDENTITY-6247>] - > Updating multiple user attributes via SCIM2 Patch-Replace does not work > - [IDENTITY-6248 <https://wso2.org/jira/browse/IDENTITY-6248>] - ldap > search filters with objectGUID are not working properly > - [IDENTITY-6251 <https://wso2.org/jira/browse/IDENTITY-6251>] - > [SCIM] ArrayIndexOutofBoundException thrown for invalid authorization > headers > - [IDENTITY-6254 <https://wso2.org/jira/browse/IDENTITY-6254>] - > [SCIM] Error in user creation and retrieval after enabling the config to > allow emails as usernames > - [IDENTITY-6259 <https://wso2.org/jira/browse/IDENTITY-6259>] - When > a user is created email is shown as "User" > - [IDENTITY-6269 <https://wso2.org/jira/browse/IDENTITY-6269>] - > sslHandshakeException in the request to /oauth2/authorize in access token > generation > - [IDENTITY-6271 <https://wso2.org/jira/browse/IDENTITY-6271>] - > Users/{id} PATCH expects the "schemas" attribute to be empty > - [IDENTITY-6273 <https://wso2.org/jira/browse/IDENTITY-6273>] - > UserInfoEndpoint returns local user claims when a local user presents with > federated user name in local userstore > - [IDENTITY-6274 <https://wso2.org/jira/browse/IDENTITY-6274>] - > FrameworkException when an access token is generated with a positive pool > size (Authorization code flow) > - [IDENTITY-6276 <https://wso2.org/jira/browse/IDENTITY-6276>] - > Cannot configure UserInfoUrl for OpenID Connect Federated Authenticator > - [IDENTITY-6278 <https://wso2.org/jira/browse/IDENTITY-6278>] - > Problems in claim mappings for OIDC dialect > - [IDENTITY-6282 <https://wso2.org/jira/browse/IDENTITY-6282>] - NPE > when processing the authorization request for poolsize >0 > > Task > > - [IDENTITY-6261 <https://wso2.org/jira/browse/IDENTITY-6261>] - > Adding capability to add multiple scope validators > - [IDENTITY-6263 <https://wso2.org/jira/browse/IDENTITY-6263>] - > Prevent OAuthServiceComponent instantiating OAuthServerConfiguration > multiple times during startup > - [IDENTITY-6275 <https://wso2.org/jira/browse/IDENTITY-6275>] - > Introduce an extension point for grant handlers at scope validation point > - [IDENTITY-6285 <https://wso2.org/jira/browse/IDENTITY-6285>] - Add > default configuration for ScopeValidators and ScopeHandlers in identity.xml > > Improvement > > - [IDENTITY-6150 <https://wso2.org/jira/browse/IDENTITY-6150>] - > Introduce a new Configuration Property to decide the poolsize for OAuth > Persistence tasks > > > *How To Contribute* > Your feedback is most welcome! > Mailing Lists > Join our mailing list and correspond with the developers directly. > > - Developer List: [email protected] > > <https://mail.google.com/a/wso2.com/mail/?view=cm&fs=1&tf=1&[email protected]> > | Subscribe > > <https://mail.google.com/a/wso2.com/mail/?view=cm&fs=1&tf=1&[email protected]> > | Mail Archive <http://wso2.org/mailarchive/dev/> > - User Forum: StackOverflow > <http://stackoverflow.com/questions/tagged/wso2is> > > Reporting Issues > We encourage you to report issues, improvements and feature requests > regarding WSO2 IdentityServer through public WSO2 Identity Server Runtime > JIRA <https://wso2.org/jira/browse/IDENTITY> and Analytics JIRA > <https://wso2.org/jira/browse/ANLYIS> > > ~ The WSO2 Identity Server Team ~ > -- > > Best Regards, > > Nuwandi Wickramasinghe > > Software Engineer > > WSO2 Inc. > > Web : http://wso2.com > > Mobile : 0719214873 > -- Thanks & Regards, *Johann Dilantha Nallathamby* Senior Lead Solutions Engineer WSO2, Inc. lean.enterprise.middleware Mobile - *+94777776950* Blog - *http://nallaa.wordpress.com <http://nallaa.wordpress.com>*
_______________________________________________ Architecture mailing list [email protected] https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
