Overview
Request 1146492 accepted
- Update to 3.7.0:
* add KeycloakAdmin.get_idp()
* Update dynamic client using registration access token
* add an optional search criteria to the get_realm_roles function
* added KeycloakAdmin.update_client_authz_resource()
* Implement missing admin method create_client_authz_scope_based_permission()
and create_client_authz_policy()
* Add query to get users group method and permit pagination
* Changes the exchange token API
* do not swap realm for user_realm when logging in with a client service
account
* Fixes `Authorization.load_config` breaking if a scope based permission
is linked with anything other than a role based policy.
* Add get and delete methods for client authz resources
* loose requests pgk and remove urllib3 as dependency
* Check if _s exists in ConnectionManager before deleting it
* deprecation warnings in keycloak_admin.py
* Add UMA policy management and permission tickets
* add initial access token support and policy delete method
* Check if applyPolicies exists in the config
* implement cache clearing API
* get_group_by_path uses Keycloak API to load
* add Keycloak UMA client
* update header if token is given
* init KeycloakAdmin with token
* added default realm roles handlers
* fix testing create_client_authz_scopes parameters
* option for enabling users
* helping functions for disabling users
- Add patch fix-version.patch:
Request History
StevenK created request
- Update to 3.7.0:
* add KeycloakAdmin.get_idp()
* Update dynamic client using registration access token
* add an optional search criteria to the get_realm_roles function
* added KeycloakAdmin.update_client_authz_resource()
* Implement missing admin method create_client_authz_scope_based_permission()
and create_client_authz_policy()
* Add query to get users group method and permit pagination
* Changes the exchange token API
* do not swap realm for user_realm when logging in with a client service
account
* Fixes `Authorization.load_config` breaking if a scope based permission
is linked with anything other than a role based policy.
* Add get and delete methods for client authz resources
* loose requests pgk and remove urllib3 as dependency
* Check if _s exists in ConnectionManager before deleting it
* deprecation warnings in keycloak_admin.py
* Add UMA policy management and permission tickets
* add initial access token support and policy delete method
* Check if applyPolicies exists in the config
* implement cache clearing API
* get_group_by_path uses Keycloak API to load
* add Keycloak UMA client
* update header if token is given
* init KeycloakAdmin with token
* added default realm roles handlers
* fix testing create_client_authz_scopes parameters
* option for enabling users
* helping functions for disabling users
- Add patch fix-version.patch:
factory-auto added opensuse-review-team as a reviewer
Please review sources
factory-auto accepted review
Check script succeeded
licensedigger accepted review
ok
staging-bot added openSUSE:Factory:Staging:adi:4 as a reviewer
Being evaluated by staging project "openSUSE:Factory:Staging:adi:4"
staging-bot accepted review
Picked "openSUSE:Factory:Staging:adi:4"
dimstar accepted review
anag+factory accepted review
Staging Project openSUSE:Factory:Staging:adi:4 got accepted.
anag+factory approved review
Staging Project openSUSE:Factory:Staging:adi:4 got accepted.
anag+factory accepted request
Staging Project openSUSE:Factory:Staging:adi:4 got accepted.