-
Notifications
You must be signed in to change notification settings - Fork 324
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added support for OIDC Client 'useRefreshTokens' #573
Added support for OIDC Client 'useRefreshTokens' #573
Conversation
090c316
to
45d21b0
Compare
I just realized that I'm not trying the value. I took exclude_session_state_from_auth_response as blueprint and that's not read either. Wouldn't that cause issues with diff and drift detection? |
Hey @whiskeysierra, thanks for the PR! The reason the tests were failing initially is because the This is important for the import step, which wants read the entire openid client into state so a following So to get this change working correctly, you'll want to remove the test changes that are adding |
I guess you meant I tried that but now I'm hitting:
|
I added: data.Set("use_refresh_tokens", client.Attributes.UseRefreshTokens) |
Yes, thanks 😅 That new error is due to the |
45d21b0
to
abb36f0
Compare
Thanks for the tips - fixed it now. Can you take another look? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks for the contribution!
Thank you! Any plans for a new release?
…On Mon, 9 Aug 2021, 16:54 Michael Parker, ***@***.***> wrote:
Merged #573
<#573> into
master.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#573 (comment)>,
or unsubscribe
</~https://github.com/notifications/unsubscribe-auth/AADI7HJUYQXYGZ63M6U43BLT37TZFANCNFSM5BU25EYA>
.
|
I pushed the |
@phungy Check my screenshot over at #570. It's a different attribute/flag. Seems like your keycloak version doesn't have it yet. I'd assume that adding client attributes is a safe operation and that keycloak ignores unknown ones. But I haven't checked. For newer keycloak versions, which do have support for it, the default value from keycloak is true. (The switch is blue/enabled by default for new OIDC clients.) |
Thanks @whiskeysierra for your feedback. I think I got the answer I am looking for :) |
Fixes #570