You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+9Lines changed: 9 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,3 +1,12 @@
1
+
## [3.0.1] - 2025-02-01
2
+
### Features
3
+
- The controller path mappings are now configurable.
4
+
5
+
### Fixes
6
+
- Fixed the bug where the schema.sql file was in a location that caused it to be automatically executed, it has now been migrated from the resources to the db-scripts directory.
7
+
8
+
9
+
1
10
## [3.0.0] - 2025-01-12
2
11
### Features
3
12
- Converted project from a simple framework to a Maven library with a separate demo app (#136).
Copy file name to clipboardExpand all lines: README.md
+10-5Lines changed: 10 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,6 +41,7 @@ The framework provides support for the following features:
41
41
- Database-backed user store using Spring JPA.
42
42
- SSO support for Google
43
43
- SSO support for Facebook
44
+
- SSO support for Keycloak
44
45
- Configuration options to control anonymous access, whitelist URIs, and protect specific URIs requiring a logged-in user session.
45
46
- CSRF protection enabled by default, with example jQuery AJAX calls passing the CSRF token from the Thymeleaf page context.
46
47
- Audit event framework for recording and logging security events, customizable to store audit events in a database or publish them via a REST API.
@@ -54,7 +55,7 @@ The framework provides support for the following features:
54
55
This Framework is now available as a library on Maven Central. You can add it to your Gradle project by adding the following dependency to your `build.gradle` file:
Or to your Maven project by adding it to your `pom.xml` file:
@@ -63,7 +64,7 @@ Or to your Maven project by adding it to your `pom.xml` file:
63
64
<dependency>
64
65
<groupId>com.digitalsanctuary</groupId>
65
66
<artifactId>ds-spring-user-framework</artifactId>
66
-
<version>3.0.0</version>
67
+
<version>3.0.1</version>
67
68
</dependency>
68
69
```
69
70
@@ -91,7 +92,7 @@ If you set your JPA Hibernate ddl-auto property to "create" it will create the t
91
92
If you are not using automatic schema updates or Flyway, you can set up your database manually using the provided `schema.sql` file:
92
93
93
94
```bash
94
-
mysql -u username -p database_name <src/main/resources/schema.sql
95
+
mysql -u username -p database_name <db-scripts/mariadb-schema.sql
95
96
```
96
97
97
98
Flyway support will be coming soon. This will allow you to automatically update your database schema as you deploy new versions of your application.
@@ -102,7 +103,7 @@ The framework sends emails for verification links, forgot password flow, etc...
102
103
103
104
104
105
### SSO OAuth2 with Google and Facebook
105
-
The framework supports SSO OAuth2 with Googleand Facebook. To enable this you need to configure the client id and secret for each provider. This is done in the application.yml (or application.properties) file using the [Spring Security OAuth2 properties](https://docs.spring.io/spring-security/reference/servlet/oauth2/login/core.html). You can see the example configuration in the Demo Project's `application.yml` file.
106
+
The framework supports SSO OAuth2 with Google, Facebook and Keycloak. To enable this you need to configure the client id and secret for each provider. This is done in the application.yml (or application.properties) file using the [Spring Security OAuth2 properties](https://docs.spring.io/spring-security/reference/servlet/oauth2/login/core.html). You can see the example configuration in the Demo Project's `application.yml` file.
For public OAuth you will need a public hostname and HTTPS enabled. You can use ngrok or Cloudflare tunnels to create a public hostname and tunnel to your local machine during development. You can then use the ngrok hostname in your Googleand Facebook developer console configuration.
130
+
For public OAuth you will need a public hostname and HTTPS enabled. You can use ngrok or Cloudflare tunnels to create a public hostname and tunnel to your local machine during development. You can then use the ngrok hostname in your Google, Facebook and Keycloak developer console configuration.
0 commit comments