Overview

Request 1146492 accepted

- Update to 3.7.0:
* add KeycloakAdmin.get_idp()
* Update dynamic client using registration access token
* add an optional search criteria to the get_realm_roles function
* added KeycloakAdmin.update_client_authz_resource()
* Implement missing admin method create_client_authz_scope_based_permission()
and create_client_authz_policy()
* Add query to get users group method and permit pagination
* Changes the exchange token API
* do not swap realm for user_realm when logging in with a client service
account
* Fixes `Authorization.load_config` breaking if a scope based permission
is linked with anything other than a role based policy.
* Add get and delete methods for client authz resources
* loose requests pgk and remove urllib3 as dependency
* Check if _s exists in ConnectionManager before deleting it
* deprecation warnings in keycloak_admin.py
* Add UMA policy management and permission tickets
* add initial access token support and policy delete method
* Check if applyPolicies exists in the config
* implement cache clearing API
* get_group_by_path uses Keycloak API to load
* add Keycloak UMA client
* update header if token is given
* init KeycloakAdmin with token
* added default realm roles handlers
* fix testing create_client_authz_scopes parameters
* option for enabling users
* helping functions for disabling users
- Add patch fix-version.patch:

Request History
Steve Kowalik's avatar

StevenK created request

- Update to 3.7.0:
* add KeycloakAdmin.get_idp()
* Update dynamic client using registration access token
* add an optional search criteria to the get_realm_roles function
* added KeycloakAdmin.update_client_authz_resource()
* Implement missing admin method create_client_authz_scope_based_permission()
and create_client_authz_policy()
* Add query to get users group method and permit pagination
* Changes the exchange token API
* do not swap realm for user_realm when logging in with a client service
account
* Fixes `Authorization.load_config` breaking if a scope based permission
is linked with anything other than a role based policy.
* Add get and delete methods for client authz resources
* loose requests pgk and remove urllib3 as dependency
* Check if _s exists in ConnectionManager before deleting it
* deprecation warnings in keycloak_admin.py
* Add UMA policy management and permission tickets
* add initial access token support and policy delete method
* Check if applyPolicies exists in the config
* implement cache clearing API
* get_group_by_path uses Keycloak API to load
* add Keycloak UMA client
* update header if token is given
* init KeycloakAdmin with token
* added default realm roles handlers
* fix testing create_client_authz_scopes parameters
* option for enabling users
* helping functions for disabling users
- Add patch fix-version.patch:


Factory Auto's avatar

factory-auto added opensuse-review-team as a reviewer

Please review sources


Factory Auto's avatar

factory-auto accepted review

Check script succeeded


Saul Goodman's avatar

licensedigger accepted review

ok


Staging Bot's avatar

staging-bot added openSUSE:Factory:Staging:adi:4 as a reviewer

Being evaluated by staging project "openSUSE:Factory:Staging:adi:4"


Staging Bot's avatar

staging-bot accepted review

Picked "openSUSE:Factory:Staging:adi:4"


Dominique Leuenberger's avatar

dimstar accepted review


Ana Guerrero's avatar

anag+factory accepted review

Staging Project openSUSE:Factory:Staging:adi:4 got accepted.


Ana Guerrero's avatar

anag+factory approved review

Staging Project openSUSE:Factory:Staging:adi:4 got accepted.


Ana Guerrero's avatar

anag+factory accepted request

Staging Project openSUSE:Factory:Staging:adi:4 got accepted.

openSUSE Build Service is sponsored by