Re: WSO2 Identity Server 5.4.0 Alpha 9 Released !!!

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view

Re: WSO2 Identity Server 5.4.0 Alpha 9 Released !!!

Hi Devs,

I tried to build the IS 5.4.0 alpha9 and when I build the v5.4.0-alpha9 tag in product-is skipping the tests, I got the following error.

[INFO] ------------------------------------------------------------------------
[INFO] ------------------------------------------------------------------------
[INFO] Total time: 1.215 s
[INFO] Finished at: 2017-11-23T11:33:53+05:30
[INFO] Final Memory: 45M/1237M
[INFO] ------------------------------------------------------------------------
[ERROR] Failed to execute goal org.apache.maven.plugins:maven-remote-resources-plugin:1.5:process (default) on project identity-server-parent: Error finding remote resources manifests: /home/tharindu/Desktop/alpha9/product-is/target/maven-shared-archive-resources/META-INF/NOTICE (No such file or directory) -> [Help 1]
org.apache.maven.lifecycle.LifecycleExecutionException: Failed to execute goal org.apache.maven.plugins:maven-remote-resources-plugin:1.5:process (default) on project identity-server-parent: Error finding remote resources manifests
    at org.apache.maven.lifecycle.internal.MojoExecutor.execute(
    at org.apache.maven.lifecycle.internal.MojoExecutor.execute(
    at org.apache.maven.lifecycle.internal.MojoExecutor.execute(
    at org.apache.maven.lifecycle.internal.LifecycleModuleBuilder.buildProject(
    at org.apache.maven.lifecycle.internal.LifecycleModuleBuilder.buildProject(
    at org.apache.maven.lifecycle.internal.LifecycleStarter.execute(
    at org.apache.maven.DefaultMaven.doExecute(
    at org.apache.maven.DefaultMaven.doExecute(
    at org.apache.maven.DefaultMaven.execute(
    at org.apache.maven.cli.MavenCli.execute(
    at org.apache.maven.cli.MavenCli.doMain(
    at org.apache.maven.cli.MavenCli.main(
    at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
    at sun.reflect.NativeMethodAccessorImpl.invoke(
    at sun.reflect.DelegatingMethodAccessorImpl.invoke(
    at java.lang.reflect.Method.invoke(
    at org.codehaus.plexus.classworlds.launcher.Launcher.launchEnhanced(
    at org.codehaus.plexus.classworlds.launcher.Launcher.launch(
    at org.codehaus.plexus.classworlds.launcher.Launcher.mainWithExitCode(
    at org.codehaus.plexus.classworlds.launcher.Launcher.main(
Caused by: org.apache.maven.plugin.MojoExecutionException: Error finding remote resources manifests
    at org.apache.maven.plugin.resources.remote.ProcessRemoteResourcesMojo.processResourceBundles(
    at org.apache.maven.plugin.resources.remote.ProcessRemoteResourcesMojo.execute(
    at org.apache.maven.plugin.DefaultBuildPluginManager.executeMojo(
    at org.apache.maven.lifecycle.internal.MojoExecutor.execute(
    ... 20 more
Caused by: /home/tharindu/Desktop/alpha9/product-is/target/maven-shared-archive-resources/META-INF/NOTICE (No such file or directory)
    at Method)
    at org.apache.maven.plugin.resources.remote.ProcessRemoteResourcesMojo.processResourceBundles(
    ... 23 more

Java Version

java version "1.8.0_65"

Maven Version
Maven home: /home/tharindu/ProgramFiles/apache-maven-3.3.9
Java version: 1.8.0_65, vendor: Oracle Corporation
OS name: "linux", version: "3.19.0-44-generic", arch: "amd64", family: "unix"

I manually created an empty file for the missing file product-is/target/maven-shared-archive-resources/META-INF/NOTICE and then I could build the pack successfully.


On Thu, Nov 16, 2017 at 11:57 PM, Farasath Ahamed <[hidden email]> wrote:
The WSO2 Identity and Access Management team is pleased to announce the release of WSO2 Identity Server 5.4.0 Alpha 9

You can build the distribution from the source tag following the steps below.

Building from the source
  1. Install Java8 or above
  2. Install Apache Maven 3.x.x(
  3. Get a clone from and checkout to v5.4.0-alpha9 tag or you can directly download the source for the tag from
  4. Run the one of the below maven commands from product-is directory, 
    • mvn clean install (To build the binary and source distributions with the tests)
    • mvn clean install -Dmaven.test.skip=true (To build the binary and source distributions, without running any of the unit/integration tests)
  5. You can find the binary distribution in product-is/modules/distribution/target directory.
Please note that you need to have Java SE Development Kit 1.8 to run the binary distribution.

The following list contains all the features, improvements, and bug fixes available with the WSO2 Identity Server 5.4.0 Alpha 9 release.


  • [IDENTITY-6488] - SAML Error when IDP init login, ACS not sent to


  • [IDENTITY-3355] - Better if only warning is shown for siganture varification failures (not the whole exception)
  • [IDENTITY-4956] - Inconsistency in displaying the subject claim when a domain is set
  • [IDENTITY-4995] - Cannot change the certificate alias for a service provider when there's more than one certificate
  • [IDENTITY-5866] - KeyId hard-coded in DefaultIDTokenBuilder
  • [IDENTITY-5922] - When invoking OAuth2TokenValidationService, updated user roles are not reflected in retrieved claims of the JWT token, till cache timeout or server restart
  • [IDENTITY-5994] - NPE thrown when testing cause of exception in OAuth2Service.issueAccessToken()
  • [IDENTITY-6075] - Receives the Primary-IS admin user info, when calling userinfo endpoint with SAML2 Bearer grant type with SAML federated scenario
  • [IDENTITY-6288] - Move the common code in id token and userinfo, to util
  • [IDENTITY-6327] - List of claims returned in IDToken and Userinfo don't get updated when we update requested claims configuration
  • [IDENTITY-6331] - alg header in JWT token is not valid for IS 5.0.0
  • [IDENTITY-6332] - The “exp” value in the JWT tokens must in RFC7519 compliant format
  • [IDENTITY-6354] - Two confirmation windows coming when updating the user with all existing roles
  • [IDENTITY-6358] - Error when adding workflows in tenant mode for external BPS profiles
  • [IDENTITY-6376] - SAML2 Web SSO Configuration (Federated Authenticator) default Signature Algorithm is set to DSA with SHA1
  • [IDENTITY-6385] - Internal Server Error for Client Credential Grant with openid scope OOB
  • [IDENTITY-6386] - self sign up not working in tenant mode
  • [IDENTITY-6391] - [Service Provider SAML2 Web SSO configuration] Default Value of Certificate Alias should be wso2carbon
  • [IDENTITY-6404] - Error in SAML2 Bear token grant validation for tenant users when "Use tenant domain in local subject identifier" option is unchecked
  • [IDENTITY-6480] - Calling OAuth2ValidationService with a valid token when AuthorizationContextTokenGeneration is enabled throws a back end error
  • [IDENTITY-6496] - A white-space in-between Authorization: Basic and <Base64Encoded(Client_Id:Client_Secret)> leads to a Nullpointer when generating access token using refresh token
  • [IDENTITY-6505] - Invoking user-info endpoint using playground sample fails when using email as the user name
  • [IDENTITY-6558] - SAML2.IsPassiveAuthn=true is not available in
  • [IDENTITY-6581] - Error with SAML Extension Grant Type
  • [IDENTITY-6703] - Bad Grammar in the exception: "SAML Assertion not found in the Response"
  • [IDENTITY-6736] - All the query params in "Additional Query Parameters" of federated oauth/openid connect IDP config is not visible in management console
  • [IDENTITY-6797] - Stack trace of exception displayed in web browser in case of empty SAMLRequest
  • [IDENTITY-6805] - NPE possibility in NTLMAuthenticationGrantHandler
  • [IDENTITY-6895] - Claims not returned properly after SP requested claims updated
  • [IDENTITY-6896] - Oauth2 Revoke endpoint does not validate repeated parameters
  • [IDENTITY-6897] - Claim filtering not handled in UserInfoJWTResponseBuilder
  • [IDENTITY-6898] - Revoke endpoint sends an Unauthorized response when Invalid Authorization header exists, but the token is empty.
  • [IDENTITY-6901] - Validate subjectConfirmationData time limits to fall within the time window given in the Conditions in the saml assertion
  • [IDENTITY-6909] - HTML tags should be closed properly


  • [IDENTITY-2530] - Make refresh tokens optional for SAML2 Bearer grant type
  • [IDENTITY-4980] - Exception during access token generation right after expiration
  • [IDENTITY-5483] - Validate user against given user store and save correct user domain in saml2-bearer grant type.
  • [IDENTITY-5975] - Need to handle errors in oAuth Endpoints
  • [IDENTITY-6224] - Improve logs in controlClaimsFromScope() of SAMLAssertionClaimsCallback class
  • [IDENTITY-6900] - Make subject claim consistent across all grant types

Contribute to WSO2 Identity Server

Mailing Lists

Join our mailing lists and correspond with the developers directly. We also encourage you to take part in discussions related to the product in the architecture mailing list. If you have any questions regarding the product you can use our StackOverflow forum to raise them as well.

Reporting Issues

We encourage you to report issues, improvements, and feature requests regarding WSO2 Identity Server through our public WSO2 Identity Server JIRA.

~ The WSO2 Identity and Access Management Team ~

Farasath Ahamed
Software Engineer, WSO2 Inc.;
Mobile: <a href="tel:%2B94777603866" value="+94713149860" style="font-size:12.8px;color:rgb(17,85,204)" target="_blank">+94777603866
Twitter: @farazath619


Tharindu Edirisinghe
Senior Software Engineer | WSO2 Inc
Platform Security Team
Blog :
mobile : +94 775181586

Dev mailing list
[hidden email]