keycloak-uncached

Details

diff --git a/connections/jpa-liquibase/src/main/resources/META-INF/jpa-changelog-1.8.0.xml b/connections/jpa-liquibase/src/main/resources/META-INF/jpa-changelog-1.8.0.xml
index 5771c12..5900f8c 100755
--- a/connections/jpa-liquibase/src/main/resources/META-INF/jpa-changelog-1.8.0.xml
+++ b/connections/jpa-liquibase/src/main/resources/META-INF/jpa-changelog-1.8.0.xml
@@ -111,4 +111,14 @@
         </update>
 
     </changeSet>
+
+    <changeSet id="1.8.0-2" author="keycloak">
+        <dropDefaultValue tableName="CREDENTIAL" columnName="ALGORITHM" columnDataType="VARCHAR(36)"/>
+
+        <update tableName="CREDENTIAL">
+            <column name="ALGORITHM" type="VARCHAR(36)" value="pbkdf2" />
+            <where>TYPE in ('password-history', 'password') AND ALGORITHM is 'HmacSHA1'</where>
+        </update>
+    </changeSet>
+
 </databaseChangeLog>
\ No newline at end of file
diff --git a/model/api/src/main/java/org/keycloak/hash/PasswordHashManager.java b/model/api/src/main/java/org/keycloak/hash/PasswordHashManager.java
index 60effdb..329284f 100644
--- a/model/api/src/main/java/org/keycloak/hash/PasswordHashManager.java
+++ b/model/api/src/main/java/org/keycloak/hash/PasswordHashManager.java
@@ -1,5 +1,6 @@
 package org.keycloak.hash;
 
+import org.jboss.logging.Logger;
 import org.keycloak.models.*;
 
 /**
@@ -7,6 +8,8 @@ import org.keycloak.models.*;
  */
 public class PasswordHashManager {
 
+    private static final Logger log = Logger.getLogger(PasswordHashManager.class);
+
     public static UserCredentialValueModel encode(KeycloakSession session, RealmModel realm, String rawPassword) {
         return encode(session, realm.getPasswordPolicy(), rawPassword);
     }
@@ -17,9 +20,10 @@ public class PasswordHashManager {
         if (iterations < 1) {
             iterations = 1;
         }
-        PasswordHashProvider provider = session.getProvider(PasswordHashProvider.class, algorithm);
+        PasswordHashProvider provider = session.getProvider(PasswordHashProvider.class, passwordPolicy.getHashAlgorithm());
         if (provider == null) {
-            throw new RuntimeException("Password hash provider for algorithm " + algorithm + " not found");
+            log.warnv("Could not find hash provider {0} from password policy, using default provider {1}", algorithm, Constants.DEFAULT_HASH_ALGORITHM);
+            provider = session.getProvider(PasswordHashProvider.class, Constants.DEFAULT_HASH_ALGORITHM);
         }
         return provider.encode(rawPassword, iterations);
     }
@@ -31,6 +35,10 @@ public class PasswordHashManager {
     public static boolean verify(KeycloakSession session, PasswordPolicy passwordPolicy, String password, UserCredentialValueModel credential) {
         String algorithm = credential.getAlgorithm() != null ? credential.getAlgorithm() : passwordPolicy.getHashAlgorithm();
         PasswordHashProvider provider = session.getProvider(PasswordHashProvider.class, algorithm);
+        if (provider == null) {
+            log.warnv("Could not find hash provider {0} for password", algorithm);
+            return false;
+        }
         return provider.verify(password, credential);
     }