Browse Source

Don't force realm name when using secret key

Using other realms can be useful, for example, to manage realm users with restricted rights.
pull/236/head
Nikolay Amiantov 3 years ago
committed by GitHub
parent
commit
d0894d4352
No known key found for this signature in database GPG Key ID: 4AEE18F83AFDEB23
  1. 4
      keycloak/keycloak_admin.py

4
keycloak/keycloak_admin.py

@ -1873,7 +1873,7 @@ class KeycloakAdmin:
return r
def get_token(self):
token_realm_name = 'master' if self.client_secret_key else self.user_realm_name or self.realm_name
token_realm_name = self.user_realm_name or self.realm_name
self.keycloak_openid = KeycloakOpenID(server_url=self.server_url, client_id=self.client_id,
realm_name=token_realm_name, verify=self.verify,
client_secret_key=self.client_secret_key,
@ -1938,4 +1938,4 @@ class KeycloakAdmin:
params_path = {"realm-name": self.realm_name, "id": str(user_id) }
data_raw = self.connection.raw_delete(URL_ADMIN_DELETE_USER_ROLE.format(**params_path),
data=json.dumps(payload))
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[204])
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[204])
Loading…
Cancel
Save