Skip to content

Conversation

@danielnickels
Copy link
Owner

No description provided.

ryshoooo and others added 30 commits February 10, 2023 08:57
* fix: tests and upgraded deps

* test: use absolute path
Keycloak provides an API endpoint to directly load a group by its path.
This commit changes get_group_by_path to not filter the groups locally
and instead uses the API endpoint.
Co-authored-by: Sebastian Neuser <pzkz@infra.run>
Bumps [markdown-it-py](https://github.com/executablebooks/markdown-it-py) from 2.1.0 to 2.2.0.
- [Release notes](https://github.com/executablebooks/markdown-it-py/releases)
- [Changelog](https://github.com/executablebooks/markdown-it-py/blob/master/CHANGELOG.md)
- [Commits](executablebooks/markdown-it-py@v2.1.0...v2.2.0)

---
updated-dependencies:
- dependency-name: markdown-it-py
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
…so, get_roles() function doesn't exist, instead there is keycloak_admin.get_realm_roles() which already documented. (#276)
This extends the test matrix to use multiple Keycloak versions.
* refactor: Factor our OpenIdConnectionManager class and deprecate old methods

* refactor: Refactor keycloak uma client to use openid connection manager

* fix: Perform token renewal at 90% of lifetime

* refactor: Add optional openid connection constructor param to keycloak admin

* refactor: Remove auto_refresh_token in favour of automatic refresh on expiry

* refactor: move KeycloakOpenIDConnectionManager to a separate file

* docs: uma additions and fixes

* refactor: rename token_renewal_fraction->token_lifetime_fraction

* refactor: shorten KeycloakOpenIDConnectionManager->KeycloakOpenIDConnection

* docs: incorporate review comments
* feat: Add policy delete method

* feat: Added initial access token support
* fix: deprecation warnings in keycloak_admin.py

* fix: Set auto_refresh_token only when needed
* test: fixed tests for new keycloak

* test: make tests compatible with previous keycloak versions
…ncy (#434)

* fix(pyproject.toml): loose requests pgk and remove urllib3 as dependency

* build: update poetry.lock

* revert: everything

* revert: revert-ception
* feat: add tests and logic for deleting client authz resource

* feat: add tests and logic for getting client authz resource

* fix: update return type of get_client_authz_resource from bytes to dict

* fix: update return type of get_client_authz_resources admin method
ryshoooo and others added 30 commits April 8, 2025 19:50
* fix: realm conflict

* test: latest version fix

* chore: update dependencies

* ci: use modern action

* test: generalize for older versions

* test: more cases
…_secrets (#655)

Verified with RHBKv24 and RHBKv26

Fixes: #643
* test: fix tests

* fix: implement hash
* feat: add `get_composite_client_roles_of_role`

* chore: formatting

* chore: more formatting
* chore: ci fixes

* chore: backports
* feat: add pool_maxsize parameter to connection managers

Introduces the `pool_maxsize` parameter to `KeycloakOpenID` and `KeycloakAdmin` classes, allowing control over the underlying connection pool size in the `ConnectionManager`.

Adds corresponding tests to verify the parameter is correctly passed and stored for both synchronous and asynchronous clients.

* feat: apply pool maxsize for async as well

---------

Co-authored-by: Richard Nemeth <ryshoooo@gmail.com>
* feat: implement authz import request

* chore: linting

* chore: fixing docs

---------

Co-authored-by: Richard Nemeth <ryshoooo@gmail.com>
* feat: support PKCE in authorization flow (RFC 7636)

* test: add tests for PKCE flow

* docs: document PKCE usage in OpenID client

* chore: address linting and formatting issues

* test: full e2e pkce test

* test: skip pkce for 22 and below

---------

Co-authored-by: Richard Nemeth <ryshoooo@gmail.com>
…ath` (#676)

This change was introduced in #627

Co-authored-by: Richard Nemeth <ryshoooo@gmail.com>

BREAKING CHANGE: changes the behavior of get_group_by_path to raise an exception in case the path is not found, which is now the definitive new behavior
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.