Skip to content

Commit ed1bce0

Browse files
author
jbossorg-bot
committed
Published latest aggregated blog posts
1 parent 67b2fe5 commit ed1bce0

20 files changed

+111
-111
lines changed

src/content/posts-aggregator/1.json

+5-5
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
2-
"title": "Quarkus 3.19.3 - Maintenance release",
3-
"link": "https://quarkus.io/blog/quarkus-3-19-3-released/",
2+
"title": "Quarkus & Red Hat's evolving middleware strategy",
3+
"link": "https://quarkus.io/blog/quarkus-redhat-strategy/",
44
"author": [
55
{
6-
"name": "Guillaume Smet",
6+
"name": "Max Rydahl Andersen",
77
"avatar": null
88
}
99
],
10-
"date": "2025-03-12T00:00:00.000Z",
10+
"date": "2025-03-13T00:00:00.000Z",
1111
"feed_title": "Quarkus",
12-
"content": "We released Quarkus 3.19.3, the second (we skipped 3.19.0) maintenance release for our 3.19 release train. We also released two candidate releases: * Quarkus 3.20.0.CR1 LTS - it is going to be our next LTS, it is based on 3.19 * Quarkus 3.21.0.CR1 - a regular minor release with new features UPDATE To update to Quarkus 3.19, we recommend updating to the latest version of the Quarkus CLI and run: quarkus update Note that quarkus update can update your applications from any version of Quarkus (including 2.x) to Quarkus 3.19. For more information about the adjustments you need to make to your applications, please refer to the . FULL CHANGELOG You can get the full changelog of on GitHub. COME JOIN US We value your feedback a lot so please report bugs, ask for improvements… Let’s build something great together! If you are a Quarkus user or just curious, don’t be shy and join our welcoming community: * provide feedback on ; * craft some code and ; * discuss with us on and on the ; * ask your questions on ."
12+
"content": "Over the past weeks, we’ve received questions about the that Red Hat’s Middleware engineering and product teams, which include Quarkus, are moving to IBM. We want to take this opportunity to acknowledge this change while reaffirming what has always been true: Quarkus is an open-source project driven by a global community of contributors, spanning companies, individuals, and open-source enthusiasts. From its inception, Quarkus has been shaped by real-world adoption across industries, with companies , leveraging Quarkus’s unmatched performance and developer joy in the Java ecosystem. We recently celebrated our , a testament to the strength of this diverse and thriving community. Speaking as Quarkus contributors employed by Red Hat and soon IBM, we love our project and intend to keep making it awesome. IBM and Red Hat have clearly communicated that the current and future contributions to Quarkus are a key component of the middleware strategy. IBM has already been an active contributor to Quarkus, and we look forward to increased contribution - alongside the many other individuals and companies who contribute, innovate, and drive Quarkus forward. Additionally, Quarkus is already on the path to becoming part of an open-source foundation, further ensuring its long-term independence and success as a truly community-driven project. The move to the foundation and the Red Hat/IBM move could look suspicious timing-wise, but the two are unrelated. We described our reasons in a [previous blog post](/blog/quarkus-in-a-foundation/), but if anything, this announcement reaffirms the importance of a foundation-hosted project for its stability. To our contributors and users: your involvement has always been what makes Quarkus thrive. Keep building, experimenting, and shaping the future of Java with us. -- The Quarkus Team"
1313
}

src/content/posts-aggregator/10.json

+6-7
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,13 @@
11
{
2-
"title": "Keycloak 26.1.3 released",
3-
"link": "https://www.keycloak.org/2025/02/keycloak-2613-released",
2+
"title": "WildFly and Red Hat's middleware strategy",
3+
"link": "https://wildfly.org//news/2025/03/05/WildFly_and_Red_Hat_strategy/",
44
"author": [
55
{
6-
"name": null,
6+
"name": "Brian Stansberry",
77
"avatar": null
88
}
99
],
10-
"date": "2025-02-28T00:00:00.000Z",
11-
"feed_title": "Keycloak Blog",
12-
"feed_avatar": "https://www.gravatar.com/avatar/87fe00619f08c241da8dfb23d907ffa2?s=50",
13-
"content": "To download the release go to . HIGHLIGHTS SEND RESET EMAIL FORCE LOGIN AGAIN FOR FEDERATED USERS AFTER RESET CREDENTIALS In a new configuration option was added to the reset-credential-email (Send Reset Email) authenticator to allow changing the default behavior after the reset credentials flow. Now the option force-login (Force login after reset) is adding a third configuration value only-federated, which means that the force login is true for federated users and false for the internal database users. The new behavior is now the default. This way all users managed by user federation providers, whose implementation can be not so tightly integrated with Keycloak, are forced to login again after the reset credentials flow to avoid any issue. This change in behavior is due to the secure by default policy. For more information, see . UPGRADING Before upgrading refer to for a complete list of changes. ALL RESOLVED ISSUES BUGS * Invalid migration export for empty database core * Redirect after linking account account/ui * Viewing user events requires `view-realm`-role admin/ui * Keycloak user attribute key broken in Keycloak 26.1.0 admin/ui * When linking IDP to an organization hide on login sets as off admin/ui * SAML2 Client Signing Keys Config does not accept PEM import admin/ui * Comboxes do not display selected option after reset admin/ui * MeterFilter is configured after a Meter has been registered dist/quarkus * CVE-2025-0736 Error during JGroups channel creation may reveal secure information * Admin console: unable to edit user profile attribute either on the form or the JSON editor. admin/ui * CI fails with \"Problem creating zip: Execution exception: Java heap space\" ci * Error on import of a public key (pem) authentication * Customized quarkus.properties for MySQL cause \"Unable to find the JDBC driver (org.h2.Driver)\",The server fails to start. storage * Wrong organization claim assignment in JWT access token organizations * Change default value for force-login option in reset-credential-email authentication * Login form can be used to determine which email addresses / usernames are in the system login/ui * Problems changing pre-defined user profile attributes admin/ui * Upgrade to latest JGroups patch version * CVE-2024-47072 - XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream * Password policies like NoUsername consider case-sensitivity authentication * External Link Test failing docs * Property Name Casing Mismatch in ProtocolMapperUtils saml"
10+
"date": "2025-03-05T00:00:00.000Z",
11+
"feed_title": "WildFly",
12+
"content": "Hi, Red Hat announced significant changes to its middleware strategy last month, and I wanted to give the WildFly community some context about those changes and how they affect WildFly. The Red Hat announcement can be found on the Red Hat blog: Some key points there are: * Red Hat’s Middleware and Integration Engineering and Products teams are moving to IBM in May 2025. * Red Hat will continue to sell and support its Middleware and Integration offerings as they do today; this will not be impacted. * All transitioning Red Hat technology will remain open source and continue to follow an upstream-first development model. Red Hat has sponsored the WildFly project (fka JBoss AS) since 2006, when it bought JBoss, Inc. Now, Red Hat’s participation in and support for WildFly is being transferred to IBM. WildFly has a vibrant, healthy community with different kinds of contributions from people from various companies all over the world. Still, it’s undoubtedly the case that the bulk of our code contributions come from Red Hat employees working on the middleware product teams that are moving to IBM. However, I don’t expect this change to have a significant impact on the WildFly project, beyond the inevitable temporary disruption as the people who are moving focus some of their energy on the move. WildFly is the upstream project for Red Hat’s JBoss Enterprise Application Platform (EAP) product. EAP will continue to be sold and supported through Red Hat, and will continue to be developed following an upstream-first development model. That model means that features and fixes for EAP will land first in WildFly’s main branch or in the main branches of the components integrated into WildFly. IBM and Red Hat leaders have clearly stated that current and future contributions to WildFly are a key component of their middleware strategy. So, we’ll continue to work on behalf of the WildFly community, striving to improve WildFly. Some things we’ll be doing: * We’ll have another soon. Watch this space for more details! * We’re hard at work on WildFly 36, with its final release expected around April 10. * After that, we move on to WildFly 37, which is expected in July. We intend to continue producing feature releases quarterly, followed by a bug fix release about a month later. * Work continues on EE 11 support in WildFly Preview and eventually in standard WildFly. * We’ll continue to innovate outside of the Jakarta and MicroProfile areas, including and . * We’ll continue to keep up with advancements in Java SE, with an aspiration of having each WildFly feature release run well on the latest SE release available when it comes out, and being able to recommend the latest LTS SE release as the preferred option as soon as possible after it comes out. Last month, I posted about . I intend to continue with this process. Note that our interest in moving to an open source foundation was not triggered by Red Hat’s strategy change. We’d been thinking about a move to a foundation since well before we learned about the move to IBM. Personally, I’ll be sorry to leave Red Hat, which has been a fantastic place to work. Back in 2006, I was sorry to leave JBoss, Inc for the much bigger Red Hat, too, but it worked out very well. I think combining forces with Java teams at IBM makes a lot of sense and will be good for the middleware projects and products. There’s a lot of growth and innovation potential in the middleware technologies we offer and I’m looking forward to being part of a larger team excited about and focused on that potential. Best regards, Brian Stansberry WildFly Project Lead"
1413
}

src/content/posts-aggregator/11.json

+7-6
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,14 @@
11
{
2-
"title": "CVE fixes - February 2025",
3-
"link": "https://quarkus.io/blog/cve-fixes-feb-2025/",
2+
"title": "Keycloak 26.1.3 released",
3+
"link": "https://www.keycloak.org/2025/02/keycloak-2613-released",
44
"author": [
55
{
6-
"name": "Guillaume Smet",
6+
"name": null,
77
"avatar": null
88
}
99
],
10-
"date": "2025-02-27T00:00:00.000Z",
11-
"feed_title": "Quarkus",
12-
"content": "Today, we released CVE fixes releases for Quarkus 3.8 LTS and 3.15 LTS to address several CVEs. If you are using these versions and the mentioned components, the update is recommended. These CVEs are already fixed in Quarkus 3.19.1, so if you are using a non-LTS version, please upgrade to Quarkus 3.19.1 (or to the closest LTS version if you are using an old version). We addressed the following CVEs: * - Upstream Netty (only for 3.15) * - Quarkus REST - Using field injection for request-scoped elements in REST resources not marked with the request scope could lead to concurrency issues. * (embargo will be lifted soon) - WebAuthn - The callback endpoint was enabled by default. It now requires to be . * (not published yet) - RESTEasy Classic - RESTEasy Classic endpoints may be affected by memory leaks. If you are exposing REST endpoints publicly using the quarkus-resteasy extension, the update is highly recommended. Quarkus REST is NOT affected by this CVE. COME JOIN US We value your feedback a lot so please report bugs, ask for improvements… Let’s build something great together! If you are a Quarkus user or just curious, don’t be shy and join our welcoming community: * provide feedback on ; * craft some code and ; * discuss with us on and on the ; * ask your questions on ."
10+
"date": "2025-02-28T00:00:00.000Z",
11+
"feed_title": "Keycloak Blog",
12+
"feed_avatar": "https://www.gravatar.com/avatar/87fe00619f08c241da8dfb23d907ffa2?s=50",
13+
"content": "To download the release go to . HIGHLIGHTS SEND RESET EMAIL FORCE LOGIN AGAIN FOR FEDERATED USERS AFTER RESET CREDENTIALS In a new configuration option was added to the reset-credential-email (Send Reset Email) authenticator to allow changing the default behavior after the reset credentials flow. Now the option force-login (Force login after reset) is adding a third configuration value only-federated, which means that the force login is true for federated users and false for the internal database users. The new behavior is now the default. This way all users managed by user federation providers, whose implementation can be not so tightly integrated with Keycloak, are forced to login again after the reset credentials flow to avoid any issue. This change in behavior is due to the secure by default policy. For more information, see . UPGRADING Before upgrading refer to for a complete list of changes. ALL RESOLVED ISSUES BUGS * Invalid migration export for empty database core * Redirect after linking account account/ui * Viewing user events requires `view-realm`-role admin/ui * Keycloak user attribute key broken in Keycloak 26.1.0 admin/ui * When linking IDP to an organization hide on login sets as off admin/ui * SAML2 Client Signing Keys Config does not accept PEM import admin/ui * Comboxes do not display selected option after reset admin/ui * MeterFilter is configured after a Meter has been registered dist/quarkus * CVE-2025-0736 Error during JGroups channel creation may reveal secure information * Admin console: unable to edit user profile attribute either on the form or the JSON editor. admin/ui * CI fails with \"Problem creating zip: Execution exception: Java heap space\" ci * Error on import of a public key (pem) authentication * Customized quarkus.properties for MySQL cause \"Unable to find the JDBC driver (org.h2.Driver)\",The server fails to start. storage * Wrong organization claim assignment in JWT access token organizations * Change default value for force-login option in reset-credential-email authentication * Login form can be used to determine which email addresses / usernames are in the system login/ui * Problems changing pre-defined user profile attributes admin/ui * Upgrade to latest JGroups patch version * CVE-2024-47072 - XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream * Password policies like NoUsername consider case-sensitivity authentication * External Link Test failing docs * Property Name Casing Mismatch in ProtocolMapperUtils saml"
1314
}

0 commit comments

Comments
 (0)