| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: python313-python-keycloak | Distribution: openSUSE Tumbleweed |
| Version: 7.1.1 | Vendor: openSUSE |
| Release: 1.1 | Build date: Fri Apr 10 15:07:42 2026 |
| Group: Unspecified | Build host: reproducible |
| Size: 1477684 | Source RPM: python-python-keycloak-7.1.1-1.1.src.rpm |
| Packager: https://bugs.opensuse.org | |
| Url: https://github.com/marcospereirampj/python-keycloak | |
| Summary: Python package providing access to the Keycloak API | |
Python package providing access to the Keycloak API
MIT
* Fri Apr 10 2026 Dirk Müller <dmueller@suse.com>
- update to 7.1.1:
* **uma**: set requested resource ids correctly in permission
ticket creation (#702)
* decode token with all keys, added get client certificate info
method (#704)
* do not throw when processing signed userinfo response (#699)
* Fix/python version and ci (#691)
* python version
* this change introduces a very strong typing across the library.
* updated lockfile
* pass along the default connection manager configuration into uma
* dont override transport for httpx
* pass query params in get groups
* removed async property as a dependency
* strong and consistent typing across the library
* changes the behavior of get_group_by_path to raise an exception
in case the path is not found, which is now the definitive new
behavior
* Add PKCE support (RFC 7636) (#670)
* implement authz import request (#685)
* add get_role_composites_by_id method (#680)
* add pool_maxsize parameter to connection managers (#651)
* prevent all httpx deprecation warnings (#666)
* implement endpoints returning the number of members in an
organization (#665)
* add `get_composite_client_roles_of_role` (#660)
* fix tests (#661)
* add pagination support to get realm roles (#659)
* fix/latest version (#654)
* implement client for revoking consents/offline access, with async
and improved testing (#644)
* adds support for keycloak organizations (#642)
* add py.typed marker file (pep-561) (#637)
* more authentication flows and executions methods
* Add functions to get/update realm users profile (#634)
* small bugs, use ruff as linter, added annotations
* retry upon 401
* get_client_all_sessions now supports pagination
* uma extra payload
* user profile metadata parameter for get_user method
* uma extra payload
* check uma permissions with resource ID as well
* get group by path should not raise on 404
* change to mounts (#622)
* Feature parity for `a_decode_token` and `decode_token` (#616)
* make sure to not call sync IO functions inside async functions
* add client scope client-specific role mappings (#605)
* Add optional Nonce parameter to the authorization URL requests
* add scopes to device auth (#599)
* changed sync get user id to async get user in create user async
function (#600)
* Add the max_retries parameter (#598)
* Set client_credentials as grant_type also when x509 certificate
is given (#597)
* add ability to remove composite client roles (#596)
* add matchingUri support for listing resources with wildcards
* allow the use of client certificates in all requests (#584)
* use a_public_key() in a_decode_token() instead of public_key()
* correctly pass query params in a_send_update_account and
a_send_verify_email (#581)
* passing timeout values to ConnectionManager (#578)
* functions for updating resource permissions and getting
associated policies for a permission (#574)
* Async feature (#566)
* changes signatures significantly
* Many attributes removed from the admin class
* Merge pull request #556 from marcospereirampj/release/4.0.0
* re-enable full group hierarchy fetching
* removed dead code, stabilized tests
* removed deprecated functionality
* allows retrieval of realm and client level roles for a user
* lowercase default role name (#547)
* add admin group count (#540)
* fix keycloak_admin.create_user documentation/ typehint (#545)
* improve KeycloakAdmin.get_client_id() performances (#511)
* Allow query parameters for group children (#534)
* incorporate custom headers into default header setup (#533)
* get_groups pagination call was not used #537 (#541)
* use jwcrypto and remove python-jose
* replace python-jose with jwcrypto
* Tue Jan 20 2026 Steve Kowalik <steven.kowalik@suse.com>
- Correct BuildRequires WRT poetry-core vs poetry.
* Fri Jan 10 2025 Steve Kowalik <steven.kowalik@suse.com>
- Correct %doc and %license locations.
* Wed Feb 14 2024 Steve Kowalik <steven.kowalik@suse.com>
- Update to 3.7.0:
* add KeycloakAdmin.get_idp()
* Update dynamic client using registration access token
* add an optional search criteria to the get_realm_roles function
* added KeycloakAdmin.update_client_authz_resource()
* Implement missing admin method create_client_authz_scope_based_permission()
and create_client_authz_policy()
* Add query to get users group method and permit pagination
* Changes the exchange token API
* do not swap realm for user_realm when logging in with a client service
account
* Fixes `Authorization.load_config` breaking if a scope based permission
is linked with anything other than a role based policy.
* Add get and delete methods for client authz resources
* loose requests pgk and remove urllib3 as dependency
* Check if _s exists in ConnectionManager before deleting it
* deprecation warnings in keycloak_admin.py
* Add UMA policy management and permission tickets
* add initial access token support and policy delete method
* Check if applyPolicies exists in the config
* implement cache clearing API
* get_group_by_path uses Keycloak API to load
* add Keycloak UMA client
* update header if token is given
* init KeycloakAdmin with token
* added default realm roles handlers
* fix testing create_client_authz_scopes parameters
* option for enabling users
* helping functions for disabling users
- Add patch fix-version.patch:
* Set a version in pyproject.toml.
- Switch to github tarball.
* Tue Dec 13 2022 Yogalakshmi Arunachalam <yarunachalam@suse.com>
- Update to version v2.6.0 (2022-10-03)
Feat
* attack detection API implementation
- Update to v2.5.0 (2022-08-19)
No changelog
- Update to v2.4.0 (2022-08-19)
Feat
* add client scope-mappings client roles operations
* added missing functionality to include attributes when returning realm roles according to specifications
- Update to v2.3.0 (2022-08-13)
Feat
* Add token_type/scope to token exchange api
- Update to v2.2.0 (2022-08-12)
Feat
* add client scope-mappings realm roles operations
- Update to v2.1.1 (2022-07-19)
Fix
* removed whitespace from urls
Refactor
* applied linting
-Update to v2.1.0 (2022-07-18)
Feat
* add unit tests
* add docstrings
* add functions covering some missing REST API calls
Fix
* linting
* now get_required_action_by_alias now returns None if action does not exist
* moved imports at the top of the file
* remove duplicate function
* applied tox -e docs
* applied flake linting checks
* applied tox linting check
-Update to v2.0.0 (2022-07-17)
BREAKING CHANGE
* Renamed parameter client_name to client_id in get_client_id method
Fix
* check client existence based on clientId
* Sat Apr 30 2022 Matej Cepl <mcepl@suse.com>
- Enable tests
- Clean up the spec file
* Thu Apr 21 2022 Michael Ströder <michael@stroeder.com>
- initial packaging of version 0.27.0
/usr/lib/python3.13/site-packages/keycloak /usr/lib/python3.13/site-packages/keycloak/__init__.py /usr/lib/python3.13/site-packages/keycloak/__pycache__ /usr/lib/python3.13/site-packages/keycloak/__pycache__/__init__.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/__init__.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/_version.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/_version.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/connection.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/connection.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/exceptions.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/exceptions.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/keycloak_admin.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/keycloak_admin.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/keycloak_openid.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/keycloak_openid.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/keycloak_uma.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/keycloak_uma.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/openid_connection.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/openid_connection.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/pkce_utils.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/pkce_utils.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/uma_permissions.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/uma_permissions.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/urls_patterns.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/__pycache__/urls_patterns.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/_version.py /usr/lib/python3.13/site-packages/keycloak/authorization /usr/lib/python3.13/site-packages/keycloak/authorization/__init__.py /usr/lib/python3.13/site-packages/keycloak/authorization/__pycache__ /usr/lib/python3.13/site-packages/keycloak/authorization/__pycache__/__init__.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/authorization/__pycache__/__init__.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/authorization/__pycache__/permission.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/authorization/__pycache__/permission.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/authorization/__pycache__/policy.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/authorization/__pycache__/policy.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/authorization/__pycache__/role.cpython-313.opt-1.pyc /usr/lib/python3.13/site-packages/keycloak/authorization/__pycache__/role.cpython-313.pyc /usr/lib/python3.13/site-packages/keycloak/authorization/permission.py /usr/lib/python3.13/site-packages/keycloak/authorization/policy.py /usr/lib/python3.13/site-packages/keycloak/authorization/role.py /usr/lib/python3.13/site-packages/keycloak/connection.py /usr/lib/python3.13/site-packages/keycloak/exceptions.py /usr/lib/python3.13/site-packages/keycloak/keycloak_admin.py /usr/lib/python3.13/site-packages/keycloak/keycloak_openid.py /usr/lib/python3.13/site-packages/keycloak/keycloak_uma.py /usr/lib/python3.13/site-packages/keycloak/openid_connection.py /usr/lib/python3.13/site-packages/keycloak/pkce_utils.py /usr/lib/python3.13/site-packages/keycloak/py.typed /usr/lib/python3.13/site-packages/keycloak/uma_permissions.py /usr/lib/python3.13/site-packages/keycloak/urls_patterns.py /usr/lib/python3.13/site-packages/python_keycloak-7.1.1.dist-info /usr/lib/python3.13/site-packages/python_keycloak-7.1.1.dist-info/INSTALLER /usr/lib/python3.13/site-packages/python_keycloak-7.1.1.dist-info/METADATA /usr/lib/python3.13/site-packages/python_keycloak-7.1.1.dist-info/RECORD /usr/lib/python3.13/site-packages/python_keycloak-7.1.1.dist-info/REQUESTED /usr/lib/python3.13/site-packages/python_keycloak-7.1.1.dist-info/WHEEL /usr/lib/python3.13/site-packages/python_keycloak-7.1.1.dist-info/licenses /usr/lib/python3.13/site-packages/python_keycloak-7.1.1.dist-info/licenses/LICENSE /usr/share/doc/packages/python313-python-keycloak /usr/share/doc/packages/python313-python-keycloak/CHANGELOG.md /usr/share/doc/packages/python313-python-keycloak/CONTRIBUTING.md /usr/share/doc/packages/python313-python-keycloak/README.md /usr/share/licenses/python313-python-keycloak /usr/share/licenses/python313-python-keycloak/LICENSE
Generated by rpm2html 1.8.1
Fabrice Bellet, Sun Apr 19 22:25:10 2026