Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FIX] Refacto necessary for kc 23 #101

Merged
merged 2 commits into from
Jan 16, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions README.en.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,9 +31,9 @@ This [Keycloak](https://www.keycloak.org) plugin adds an identity provider allow
Starting from version 19 and the use of the new graphical administration interface of Keycloak, it is no longer possible to properly configure this extension via the UI. However, the provided version allows you to maintain the functionality of the plugin if it has been configured in a previous version, with configurations to be done manually in SQL if necessary.
A version is currently under development to restore the configuration of the plugin, which will require breaking changes in the usage of this plugin.

* The version 6.0.0 and above of this plugin is compatible with Keycloak `22.0.0` and higher.
* The version 5.0.0 and above of this plugin is compatible with Keycloak `21.x.y`.
* The version 4.0.0 and above of this plugin is compatible with Keycloak `15.0.0` until `20.0.0`.
* The version 6.1.0 of this plugin is compatible with Keycloak `22.0.0` and higher.
* The version 5.0.0 of this plugin is compatible with Keycloak `21.x.y`.
* The version 4.0.0 of this plugin is compatible with Keycloak `15.0.0` until `20.0.0`.
* The version 2.1 up to 3.0.0 of this plugin is compatible with Keycloak `9.0.2` until `15.0.0`.
* The version 2.0 of this plugin is compatible with Keycloak `8.0.1` until `9.0.2`.

Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ Pour toutes questions sur l'utilisation de cette extension, n'hésitez pas à ou
A partir de la version 19 et de l'usage de la nouvelle interface graphique d'administration de Keycloak, il n'est plus possible de paramétrer correctement cette extension via ihm. Cela étant la version fourni permet de conserver la fonctionalité du plugin s'il a été configuré dans une version précedente, les manipulation de configuration devant se faire manuellement en sql si nécessaire.
Une version est en cours de développement pour rétablir la configuration du plugin, elle nécessitera des changements disruptifs dans l'usage de ce plugin.

- La version 6.0.0 est compatible avec Keycloak `22.0.0` et supérieur.
- La version 6.1.0 est compatible avec Keycloak `22.0.0` et supérieur.
- La version 5.0.0 est compatible avec Keycloak `21.x.y`.
- La version 4.0.0 est compatible avec Keycloak `15.0.0` jusqu'à `20.0.0`.
- La version 2.1 jusqu'à 3.0.0 est compatible avec Keycloak `9.0.2` jusqu'à `15.0.0`.
Expand Down
2 changes: 1 addition & 1 deletion pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@

<groupId>fr.insee.keycloak</groupId>
<artifactId>keycloak-franceconnect</artifactId>
<version>6.0.0-SNAPSHOT</version>
<version>6.1.0-SNAPSHOT</version>

<name>${project.groupId}:${project.artifactId}</name>
<description>France Connect Openid-Connect Provider for Keycloak</description>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@ public T getConfig() {

@Override
public Object callback(RealmModel realm, AuthenticationCallback callback, EventBuilder event) {
return new OIDCEndpoint(callback, realm, event, this ,getConfig());
return new OIDCEndpoint<>(callback, realm, event, this ,getConfig());
}

@Override
Expand Down Expand Up @@ -185,7 +185,7 @@ public BrokeredIdentityContext getFederatedIdentity(String response) {
}
}

protected class OIDCEndpoint extends Endpoint {
protected static class OIDCEndpoint<T extends AbstractBaseProviderConfig> extends Endpoint {

private final T config;

Expand Down