From f03871bdb6ab74e7fc0da3356587ee5e16b0004d Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Tue, 23 Jul 2024 09:37:20 +0200 Subject: [PATCH 01/16] Extend and adjust build for self-hosted runner. --- .github/workflows/test.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/workflows/test.yml b/.github/workflows/test.yml index ccfcc1324..cb039648d 100644 --- a/.github/workflows/test.yml +++ b/.github/workflows/test.yml @@ -9,8 +9,8 @@ on: jobs: verify: - runs-on: ubuntu-latest -# runs-on: self-hosted +# runs-on: ubuntu-latest + runs-on: self-hosted steps: - name: Checkout Code uses: actions/checkout@v3 @@ -74,7 +74,7 @@ jobs: keycloak: # we have to use a custom docker image for these tests, since it's not possible to provide command-line args # to a service container. see https://github.com/actions/runner/issues/2139 - image: mrparkers/keycloak-dev:${{ matrix.keycloak-version }} + image: markusqvestseidl/keycloak-dev:${{ matrix.keycloak-version }} ports: - 8080:8080 env: From bbc68a145597b4e2bdd44d8d22f5519fed9acc67 Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Tue, 23 Jul 2024 09:48:38 +0200 Subject: [PATCH 02/16] Extend and adjust build for self-hosted runner. --- .github/workflows/test.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/test.yml b/.github/workflows/test.yml index cb039648d..b35b1a214 100644 --- a/.github/workflows/test.yml +++ b/.github/workflows/test.yml @@ -57,7 +57,7 @@ jobs: (needs.verify.outputs.code-files-changed || startsWith(github.ref, 'refs/tags/v')) needs: - verify - runs-on: ubuntu-latest + runs-on: self-hosted strategy: matrix: keycloak-version: From 795b3a24e22543f3a2dd8de6ba59b07726c74b9a Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Tue, 23 Jul 2024 10:53:13 +0200 Subject: [PATCH 03/16] Extend and adjust build for self-hosted runner. --- makefile | 4 ++-- provider/resource_keycloak_default_roles.go | 7 +++++++ scripts/create-terraform-client.sh | 2 ++ 3 files changed, 11 insertions(+), 2 deletions(-) diff --git a/makefile b/makefile index 54c4062cd..faba800cc 100644 --- a/makefile +++ b/makefile @@ -30,8 +30,8 @@ test: fmtcheck vet go test $(TEST) testacc: fmtcheck vet - go test -v github.com/mrparkers/terraform-provider-keycloak/keycloak - TF_ACC=1 CHECKPOINT_DISABLE=1 go test -v -timeout 60m -parallel 4 github.com/mrparkers/terraform-provider-keycloak/provider $(TESTARGS) + go test -v github.com/qvest-digital/terraform-provider-keycloak/keycloak + TF_ACC=1 CHECKPOINT_DISABLE=1 go test -v -timeout 60m -parallel 4 github.com/qvest-digital/terraform-provider-keycloak/provider $(TESTARGS) fmtcheck: lineCount=$(shell gofmt -l -s $(GOFMT_FILES) | wc -l | tr -d ' ') && exit $$lineCount diff --git a/provider/resource_keycloak_default_roles.go b/provider/resource_keycloak_default_roles.go index 30f8e0fa6..f399a250f 100644 --- a/provider/resource_keycloak_default_roles.go +++ b/provider/resource_keycloak_default_roles.go @@ -103,6 +103,13 @@ func resourceKeycloakDefaultRolesReconcile(ctx context.Context, data *schema.Res return diag.FromErr(err) } + if realm == nil { + return diag.Diagnostics{{ + Severity: diag.Error, + Summary: "realm not found: " + defaultRoles.RealmId, + }} + } + data.SetId(realm.DefaultRole.Id) composites, err := keycloakClient.GetDefaultRoles(ctx, defaultRoles.RealmId, realm.DefaultRole.Id) diff --git a/scripts/create-terraform-client.sh b/scripts/create-terraform-client.sh index e32239c79..a11d686ef 100755 --- a/scripts/create-terraform-client.sh +++ b/scripts/create-terraform-client.sh @@ -1,5 +1,7 @@ #!/usr/bin/env bash +set -e + KEYCLOAK_URL="http://localhost:8080" KEYCLOAK_USER="keycloak" KEYCLOAK_PASSWORD="password" From b3469845e2df7c3f60b31a6f9ac351d2a27bed66 Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Tue, 23 Jul 2024 11:03:00 +0200 Subject: [PATCH 04/16] Extend and adjust build for self-hosted runner. --- go.mod | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/go.mod b/go.mod index aaf5fae2e..76570982a 100644 --- a/go.mod +++ b/go.mod @@ -1,4 +1,4 @@ -module github.com/mrparkers/terraform-provider-keycloak +module github.com/qvest-digital/terraform-provider-keycloak require ( github.com/hashicorp/errwrap v1.0.0 From c3b238e07c8a5a35ad6e33bcc386e778832d4d25 Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Tue, 23 Jul 2024 11:08:14 +0200 Subject: [PATCH 05/16] Updated package name and references. --- .github/workflows/release.yml | 2 +- CHANGELOG.md | 544 +++++++++--------- README.md | 8 +- docs/resources/custom_user_federation.md | 2 +- docs/resources/group_permissions.md | 2 +- docs/resources/user.md | 4 +- docs/resources/users_permissions.md | 2 +- keycloak/extra_config.go | 2 +- keycloak/identity_provider.go | 2 +- keycloak/openid_client.go | 2 +- keycloak/openid_client_scope.go | 2 +- keycloak/realm.go | 2 +- keycloak/saml_client.go | 2 +- keycloak/saml_client_scope.go | 2 +- main.go | 2 +- ...ource_keycloak_authentication_execution.go | 2 +- ...ata_source_keycloak_authentication_flow.go | 2 +- ...e_keycloak_client_description_converter.go | 2 +- provider/data_source_keycloak_group.go | 2 +- .../data_source_keycloak_openid_client.go | 2 +- ...loak_openid_client_authorization_policy.go | 2 +- ...ata_source_keycloak_openid_client_scope.go | 2 +- ...loak_openid_client_service_account_user.go | 2 +- provider/data_source_keycloak_realm.go | 2 +- provider/data_source_keycloak_realm_keys.go | 2 +- provider/data_source_keycloak_role.go | 2 +- provider/data_source_keycloak_saml_client.go | 2 +- ...cloak_saml_client_installation_provider.go | 2 +- provider/data_source_keycloak_user.go | 2 +- .../data_source_keycloak_user_realm_roles.go | 2 +- .../generic_keycloak_identity_provider.go | 2 +- ...neric_keycloak_identity_provider_mapper.go | 2 +- provider/permissions.go | 2 +- provider/provider.go | 2 +- provider/provider_test.go | 2 +- ...ibute_importer_identity_provider_mapper.go | 2 +- ..._importer_identity_provider_mapper_test.go | 2 +- ...ribute_to_role_identity_provider_mapper.go | 2 +- ...e_to_role_identity_provider_mapper_test.go | 2 +- ...source_keycloak_authentication_bindings.go | 2 +- ...ource_keycloak_authentication_execution.go | 2 +- ...eycloak_authentication_execution_config.go | 2 +- ...ak_authentication_execution_config_test.go | 2 +- ..._keycloak_authentication_execution_test.go | 2 +- .../resource_keycloak_authentication_flow.go | 2 +- ...ource_keycloak_authentication_flow_test.go | 2 +- ...esource_keycloak_authentication_subflow.go | 2 +- ...ce_keycloak_authentication_subflow_test.go | 2 +- ...eycloak_custom_identity_provider_mapper.go | 2 +- ...ak_custom_identity_provider_mapper_test.go | 2 +- ...esource_keycloak_custom_user_federation.go | 2 +- ...ce_keycloak_custom_user_federation_test.go | 2 +- provider/resource_keycloak_default_groups.go | 2 +- .../resource_keycloak_default_groups_test.go | 2 +- provider/resource_keycloak_default_roles.go | 2 +- .../resource_keycloak_default_roles_test.go | 2 +- ...keycloak_generic_client_protocol_mapper.go | 2 +- ...oak_generic_client_protocol_mapper_test.go | 2 +- ...eycloak_generic_client_role_mapper_test.go | 2 +- ...source_keycloak_generic_protocol_mapper.go | 2 +- ...e_keycloak_generic_protocol_mapper_test.go | 2 +- .../resource_keycloak_generic_role_mapper.go | 2 +- ...ource_keycloak_generic_role_mapper_test.go | 2 +- provider/resource_keycloak_group.go | 2 +- .../resource_keycloak_group_memberships.go | 2 +- ...esource_keycloak_group_memberships_test.go | 2 +- .../resource_keycloak_group_permissions.go | 2 +- ...esource_keycloak_group_permissions_test.go | 2 +- provider/resource_keycloak_group_roles.go | 2 +- .../resource_keycloak_group_roles_test.go | 2 +- provider/resource_keycloak_group_test.go | 2 +- ...oded_attribute_identity_provider_mapper.go | 2 +- ...attribute_identity_provider_mapper_test.go | 2 +- ...hardcoded_role_identity_provider_mapper.go | 2 +- ...oded_role_identity_provider_mapper_test.go | 2 +- ...rovider_token_exchange_scope_permission.go | 2 +- ...er_token_exchange_scope_permission_test.go | 2 +- .../resource_keycloak_ldap_custom_mapper.go | 2 +- ...source_keycloak_ldap_custom_mapper_test.go | 2 +- ...resource_keycloak_ldap_full_name_mapper.go | 2 +- ...rce_keycloak_ldap_full_name_mapper_test.go | 2 +- .../resource_keycloak_ldap_group_mapper.go | 2 +- ...esource_keycloak_ldap_group_mapper_test.go | 2 +- ...eycloak_ldap_hardcoded_attribute_mapper.go | 2 +- ...ak_ldap_hardcoded_attribute_mapper_test.go | 2 +- ...ce_keycloak_ldap_hardcoded_group_mapper.go | 2 +- ...ycloak_ldap_hardcoded_group_mapper_test.go | 2 +- ...rce_keycloak_ldap_hardcoded_role_mapper.go | 2 +- ...eycloak_ldap_hardcoded_role_mapper_test.go | 2 +- ...ap_msad_lds_user_account_control_mapper.go | 2 +- ...ad_lds_user_account_control_mapper_test.go | 2 +- ...k_ldap_msad_user_account_control_mapper.go | 2 +- ...p_msad_user_account_control_mapper_test.go | 2 +- .../resource_keycloak_ldap_role_mapper.go | 2 +- ...resource_keycloak_ldap_role_mapper_test.go | 2 +- ...rce_keycloak_ldap_user_attribute_mapper.go | 2 +- ...eycloak_ldap_user_attribute_mapper_test.go | 2 +- .../resource_keycloak_ldap_user_federation.go | 2 +- ...urce_keycloak_ldap_user_federation_test.go | 2 +- ..._keycloak_oidc_google_identity_provider.go | 4 +- ...loak_oidc_google_identity_provider_test.go | 2 +- ...esource_keycloak_oidc_identity_provider.go | 4 +- ...ce_keycloak_oidc_identity_provider_test.go | 2 +- ...eycloak_openid_audience_protocol_mapper.go | 2 +- ...ak_openid_audience_protocol_mapper_test.go | 2 +- ...openid_audience_resolve_protocol_mapper.go | 2 +- ...d_audience_resolve_protocol_mapper_test.go | 2 +- provider/resource_keycloak_openid_client.go | 4 +- ...d_client_authorization_aggregate_policy.go | 2 +- ...ent_authorization_aggregate_policy_test.go | 2 +- ...enid_client_authorization_client_policy.go | 2 +- ...client_authorization_client_policy_test.go | 2 +- ...penid_client_authorization_group_policy.go | 2 +- ..._client_authorization_group_policy_test.go | 2 +- ...k_openid_client_authorization_js_policy.go | 2 +- ...nid_client_authorization_js_policy_test.go | 2 +- ..._openid_client_authorization_permission.go | 2 +- ...id_client_authorization_permission_test.go | 2 +- ...ak_openid_client_authorization_resource.go | 2 +- ...enid_client_authorization_resource_test.go | 2 +- ...openid_client_authorization_role_policy.go | 2 +- ...d_client_authorization_role_policy_test.go | 2 +- ...cloak_openid_client_authorization_scope.go | 2 +- ..._openid_client_authorization_scope_test.go | 2 +- ...openid_client_authorization_time_policy.go | 2 +- ...d_client_authorization_time_policy_test.go | 2 +- ...openid_client_authorization_user_policy.go | 2 +- ...d_client_authorization_user_policy_test.go | 2 +- ...e_keycloak_openid_client_default_scopes.go | 2 +- ...cloak_openid_client_default_scopes_test.go | 2 +- ..._keycloak_openid_client_optional_scopes.go | 2 +- ...loak_openid_client_optional_scopes_test.go | 2 +- ...urce_keycloak_openid_client_permissions.go | 2 +- ...keycloak_openid_client_permissions_test.go | 2 +- .../resource_keycloak_openid_client_scope.go | 4 +- ...ource_keycloak_openid_client_scope_test.go | 4 +- ...penid_client_service_account_realm_role.go | 2 +- ..._client_service_account_realm_role_test.go | 2 +- ...loak_openid_client_service_account_role.go | 2 +- ...openid_client_service_account_role_test.go | 2 +- .../resource_keycloak_openid_client_test.go | 4 +- ...ycloak_openid_full_name_protocol_mapper.go | 2 +- ...k_openid_full_name_protocol_mapper_test.go | 2 +- ...openid_group_membership_protocol_mapper.go | 2 +- ...d_group_membership_protocol_mapper_test.go | 2 +- ..._openid_hardcoded_claim_protocol_mapper.go | 2 +- ...id_hardcoded_claim_protocol_mapper_test.go | 2 +- ...k_openid_hardcoded_role_protocol_mapper.go | 2 +- ...nid_hardcoded_role_protocol_mapper_test.go | 2 +- ..._keycloak_openid_script_protocol_mapper.go | 2 +- ...loak_openid_script_protocol_mapper_test.go | 2 +- ...k_openid_user_attribute_protocol_mapper.go | 2 +- ...nid_user_attribute_protocol_mapper_test.go | 2 +- ...openid_user_client_role_protocol_mapper.go | 2 +- ...d_user_client_role_protocol_mapper_test.go | 2 +- ...ak_openid_user_property_protocol_mapper.go | 2 +- ...enid_user_property_protocol_mapper_test.go | 2 +- ..._openid_user_realm_role_protocol_mapper.go | 2 +- ...id_user_realm_role_protocol_mapper_test.go | 2 +- ...penid_user_session_note_protocol_mapper.go | 2 +- ..._user_session_note_protocol_mapper_test.go | 2 +- provider/resource_keycloak_realm.go | 4 +- provider/resource_keycloak_realm_events.go | 2 +- .../resource_keycloak_realm_events_test.go | 2 +- ...e_keycloak_realm_keystore_aes_generated.go | 2 +- ...cloak_realm_keystore_aes_generated_test.go | 2 +- ...keycloak_realm_keystore_ecdsa_generated.go | 2 +- ...oak_realm_keystore_ecdsa_generated_test.go | 2 +- ..._keycloak_realm_keystore_hmac_generated.go | 2 +- ...loak_realm_keystore_hmac_generated_test.go | 2 +- ...e_keycloak_realm_keystore_java_keystore.go | 2 +- ...cloak_realm_keystore_java_kyestore_test.go | 2 +- .../resource_keycloak_realm_keystore_rsa.go | 2 +- ...e_keycloak_realm_keystore_rsa_generated.go | 2 +- ...cloak_realm_keystore_rsa_generated_test.go | 2 +- ...source_keycloak_realm_keystore_rsa_test.go | 2 +- provider/resource_keycloak_realm_test.go | 2 +- .../resource_keycloak_realm_user_profile.go | 2 +- ...source_keycloak_realm_user_profile_test.go | 2 +- provider/resource_keycloak_required_action.go | 2 +- provider/resource_keycloak_role.go | 2 +- provider/resource_keycloak_role_test.go | 2 +- provider/resource_keycloak_saml_client.go | 4 +- ...rce_keycloak_saml_client_default_scopes.go | 2 +- ...eycloak_saml_client_default_scopes_test.go | 2 +- .../resource_keycloak_saml_client_scope.go | 2 +- ...esource_keycloak_saml_client_scope_test.go | 2 +- .../resource_keycloak_saml_client_test.go | 4 +- ...esource_keycloak_saml_identity_provider.go | 4 +- ...ce_keycloak_saml_identity_provider_test.go | 4 +- ...ce_keycloak_saml_script_protocol_mapper.go | 2 +- ...ycloak_saml_script_protocol_mapper_test.go | 2 +- ...oak_saml_user_attribute_protocol_mapper.go | 2 +- ...aml_user_attribute_protocol_mapper_test.go | 2 +- ...loak_saml_user_property_protocol_mapper.go | 2 +- ...saml_user_property_protocol_mapper_test.go | 2 +- provider/resource_keycloak_user.go | 2 +- provider/resource_keycloak_user_groups.go | 2 +- .../resource_keycloak_user_groups_test.go | 2 +- provider/resource_keycloak_user_roles.go | 2 +- provider/resource_keycloak_user_roles_test.go | 2 +- ...plate_importer_identity_provider_mapper.go | 2 +- ..._importer_identity_provider_mapper_test.go | 2 +- provider/resource_keycloak_user_test.go | 2 +- .../resource_keycloak_users_permissions.go | 2 +- ...esource_keycloak_users_permissions_test.go | 2 +- provider/role_mapping_helpers.go | 2 +- provider/test_utils.go | 2 +- provider/utils.go | 2 +- 209 files changed, 495 insertions(+), 495 deletions(-) diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 60ade7da2..38020213a 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -52,7 +52,7 @@ jobs: releaseDate=$(date '+%B-%-d-%Y' | tr '[:upper:]' '[:lower:]') releaseVersion=$(echo ${{ steps.get_tag_name.outputs.TAG }} | tr -d '.') tmp=$(mktemp -d) - echo "[Release Notes](https://github.com/mrparkers/terraform-provider-keycloak/blob/master/CHANGELOG.md#${releaseVersion}-${releaseDate})" > ${tmp}/release-notes.md + echo "[Release Notes](https://github.com/qvest-digital/terraform-provider-keycloak/blob/master/CHANGELOG.md#${releaseVersion}-${releaseDate})" > ${tmp}/release-notes.md cat ${tmp}/release-notes.md echo ::set-output name=NOTES::${tmp}/release-notes.md diff --git a/CHANGELOG.md b/CHANGELOG.md index abd4ff4d6..659576b91 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -2,20 +2,20 @@ FEATURES: -- new resource: `keycloak_ldap_custom_mapper` ([#863](https://github.com/mrparkers/terraform-provider-keycloak/pull/863)) +- new resource: `keycloak_ldap_custom_mapper` ([#863](https://github.com/qvest-digital/terraform-provider-keycloak/pull/863)) IMPROVEMENTS: -- add `provider_id` attribute to `keycloak_realm_keystore_rsa` resource ([#858](https://github.com/mrparkers/terraform-provider-keycloak/pull/858)) -- compute `extra_config` for client data sources ([#885](https://github.com/mrparkers/terraform-provider-keycloak/pull/885)) -- support updated RedHat SSO version strings ([#903](https://github.com/mrparkers/terraform-provider-keycloak/pull/903)) -- add `required_actions` attribute to `keycloak_user` resource ([#867](https://github.com/mrparkers/terraform-provider-keycloak/pull/867)) -- allow use of custom client authenticator types ([#845](https://github.com/mrparkers/terraform-provider-keycloak/pull/845)) -- allow users to set `referrer_policy` header within `security_defenses` for `keycloak_realm` resource ([#879](https://github.com/mrparkers/terraform-provider-keycloak/pull/879)) +- add `provider_id` attribute to `keycloak_realm_keystore_rsa` resource ([#858](https://github.com/qvest-digital/terraform-provider-keycloak/pull/858)) +- compute `extra_config` for client data sources ([#885](https://github.com/qvest-digital/terraform-provider-keycloak/pull/885)) +- support updated RedHat SSO version strings ([#903](https://github.com/qvest-digital/terraform-provider-keycloak/pull/903)) +- add `required_actions` attribute to `keycloak_user` resource ([#867](https://github.com/qvest-digital/terraform-provider-keycloak/pull/867)) +- allow use of custom client authenticator types ([#845](https://github.com/qvest-digital/terraform-provider-keycloak/pull/845)) +- allow users to set `referrer_policy` header within `security_defenses` for `keycloak_realm` resource ([#879](https://github.com/qvest-digital/terraform-provider-keycloak/pull/879)) BUG FIXES: -- set the correct value for `identityProviderMapper` when using keycloak-oidc identity provider ([#850](https://github.com/mrparkers/terraform-provider-keycloak/pull/850)) +- set the correct value for `identityProviderMapper` when using keycloak-oidc identity provider ([#850](https://github.com/qvest-digital/terraform-provider-keycloak/pull/850)) Huge thanks to all the individuals who have contributed towards this release: @@ -34,7 +34,7 @@ Huge thanks to all the individuals who have contributed towards this release: BUG FIXES: -- avoid validation errors during plan for missing realm and openid client resources ([#841](https://github.com/mrparkers/terraform-provider-keycloak/pull/841)) +- avoid validation errors during plan for missing realm and openid client resources ([#841](https://github.com/qvest-digital/terraform-provider-keycloak/pull/841)) Huge thanks to all the individuals who have contributed towards this release: @@ -44,13 +44,13 @@ Huge thanks to all the individuals who have contributed towards this release: IMPROVEMENTS: -- update supported Keycloak versions ([#828](https://github.com/mrparkers/terraform-provider-keycloak/pull/828)) -- update to go 1.19 ([#848](https://github.com/mrparkers/terraform-provider-keycloak/pull/848)) -- add new `login_hint` attribute for `keycloak_saml_identity_provider` resource ([#830](https://github.com/mrparkers/terraform-provider-keycloak/pull/830)) +- update supported Keycloak versions ([#828](https://github.com/qvest-digital/terraform-provider-keycloak/pull/828)) +- update to go 1.19 ([#848](https://github.com/qvest-digital/terraform-provider-keycloak/pull/848)) +- add new `login_hint` attribute for `keycloak_saml_identity_provider` resource ([#830](https://github.com/qvest-digital/terraform-provider-keycloak/pull/830)) BUG FIXES: -- avoid inserting authenticator execution configs with empty strings as ID ([#840](https://github.com/mrparkers/terraform-provider-keycloak/pull/840)) +- avoid inserting authenticator execution configs with empty strings as ID ([#840](https://github.com/qvest-digital/terraform-provider-keycloak/pull/840)) Huge thanks to all the individuals who have contributed towards this release: @@ -63,15 +63,15 @@ Huge thanks to all the individuals who have contributed towards this release: IMPROVEMENTS: -- allow the `internal_id` attribute for the `keycloak_realm` resource to be set during apply instead of read-only ([#807](https://github.com/mrparkers/terraform-provider-keycloak/pull/807)) -- allow for multivalue attributes in `extra_config` attribute for `keycloak_custom_user_federation` resource ([#761](https://github.com/mrparkers/terraform-provider-keycloak/pull/761)) +- allow the `internal_id` attribute for the `keycloak_realm` resource to be set during apply instead of read-only ([#807](https://github.com/qvest-digital/terraform-provider-keycloak/pull/807)) +- allow for multivalue attributes in `extra_config` attribute for `keycloak_custom_user_federation` resource ([#761](https://github.com/qvest-digital/terraform-provider-keycloak/pull/761)) BUG FIXES: -- allow users with backslashes in their name to be assigned to groups via `keycloak_group_memberships` resource ([#778](https://github.com/mrparkers/terraform-provider-keycloak/pull/778)) -- correctly set `nameIDPolicyFormat` when updating value in `extra_config` in `keycloak_saml_identity_provider` resource ([#793](https://github.com/mrparkers/terraform-provider-keycloak/pull/793)) -- treat empty attributes as nil values when importing `keycloak_ldap_user_federation` resource ([#784](https://github.com/mrparkers/terraform-provider-keycloak/pull/784)) -- treat empty attributes as nil values when importing `keycloak_custom_user_federation` resource ([#809](https://github.com/mrparkers/terraform-provider-keycloak/pull/809)) +- allow users with backslashes in their name to be assigned to groups via `keycloak_group_memberships` resource ([#778](https://github.com/qvest-digital/terraform-provider-keycloak/pull/778)) +- correctly set `nameIDPolicyFormat` when updating value in `extra_config` in `keycloak_saml_identity_provider` resource ([#793](https://github.com/qvest-digital/terraform-provider-keycloak/pull/793)) +- treat empty attributes as nil values when importing `keycloak_ldap_user_federation` resource ([#784](https://github.com/qvest-digital/terraform-provider-keycloak/pull/784)) +- treat empty attributes as nil values when importing `keycloak_custom_user_federation` resource ([#809](https://github.com/qvest-digital/terraform-provider-keycloak/pull/809)) Huge thanks to all the individuals who have contributed towards this release: @@ -86,33 +86,33 @@ Huge thanks to all the individuals who have contributed towards this release: IMPROVEMENTS: -- add `IMPORT` mode to `keycloak_ldap_role_mapper` resource ([#768](https://github.com/mrparkers/terraform-provider-keycloak/pull/768)) -- add `RSA_SHA256_MGF1` and `RSA_SHA512_MGF1` signature algorithms to `keycloak_saml_client` resource ([#757](https://github.com/mrparkers/terraform-provider-keycloak/pull/757)) -- add `valid_post_logout_redirect_uris` attribute to `keycloak_openid_client` resource ([#777](https://github.com/mrparkers/terraform-provider-keycloak/pull/777)) +- add `IMPORT` mode to `keycloak_ldap_role_mapper` resource ([#768](https://github.com/qvest-digital/terraform-provider-keycloak/pull/768)) +- add `RSA_SHA256_MGF1` and `RSA_SHA512_MGF1` signature algorithms to `keycloak_saml_client` resource ([#757](https://github.com/qvest-digital/terraform-provider-keycloak/pull/757)) +- add `valid_post_logout_redirect_uris` attribute to `keycloak_openid_client` resource ([#777](https://github.com/qvest-digital/terraform-provider-keycloak/pull/777)) BUG FIXES: -- fix incorrect import ID for `keycloak_openid_client_authorization_*` resources ([#763](https://github.com/mrparkers/terraform-provider-keycloak/pull/763)) -- fix payload used during deletion of `keycloak_generic_role_mapper` resource to prevent more mappers from unintentionally being removed ([#772](https://github.com/mrparkers/terraform-provider-keycloak/pull/772)) +- fix incorrect import ID for `keycloak_openid_client_authorization_*` resources ([#763](https://github.com/qvest-digital/terraform-provider-keycloak/pull/763)) +- fix payload used during deletion of `keycloak_generic_role_mapper` resource to prevent more mappers from unintentionally being removed ([#772](https://github.com/qvest-digital/terraform-provider-keycloak/pull/772)) ## v4.0.1 (October 13, 2022) BUG FIXES: -- restored the default value for the `client_authenticator_type` attribute within the `keycloak_openid_client` resource ([#755](https://github.com/mrparkers/terraform-provider-keycloak/pull/755)) +- restored the default value for the `client_authenticator_type` attribute within the `keycloak_openid_client` resource ([#755](https://github.com/qvest-digital/terraform-provider-keycloak/pull/755)) ## v4.0.0 (October 10, 2022) BREAKING CHANGES: -- updated the default value of the `base_path` provider attribute, it is now an empty string ([#733](https://github.com/mrparkers/terraform-provider-keycloak/pull/733)) +- updated the default value of the `base_path` provider attribute, it is now an empty string ([#733](https://github.com/qvest-digital/terraform-provider-keycloak/pull/733)) - this change was made due to the Quarkus distribution of Keycloak removing the `/auth` context from API urls. if you are currently using the Quarkus version of Keycloak, you no longer need to specify the `base_path` provider attribute as an empty string. if you are currently using the legacy version of Keycloak, you will need to add the `base_path` provider attribute and set it to `/auth`. - renamed resources: - - `keycloak_generic_client_protocol_mapper` has been renamed to `keycloak_generic_protocol_mapper` ([#742](https://github.com/mrparkers/terraform-provider-keycloak/pull/742)) - - `keycloak_generic_client_role_mapper` has been renamed to `keycloak_generic_role_mapper`. ([#748](https://github.com/mrparkers/terraform-provider-keycloak/pull/748)) + - `keycloak_generic_client_protocol_mapper` has been renamed to `keycloak_generic_protocol_mapper` ([#742](https://github.com/qvest-digital/terraform-provider-keycloak/pull/742)) + - `keycloak_generic_client_role_mapper` has been renamed to `keycloak_generic_role_mapper`. ([#748](https://github.com/qvest-digital/terraform-provider-keycloak/pull/748)) - the old versions of these resources will remain functional until the next major release, but they will display a deprecation warning whenever they are used. - to migrate to these new resources, you can follow these steps: @@ -122,18 +122,18 @@ BREAKING CHANGES: FEATURES: -- new resource: `keycloak_ldap_hardcoded_attribute_mapper` ([#725](https://github.com/mrparkers/terraform-provider-keycloak/pull/725)) -- new data source: `keycloak_openid_client_scope` ([#743](https://github.com/mrparkers/terraform-provider-keycloak/pull/743)) +- new resource: `keycloak_ldap_hardcoded_attribute_mapper` ([#725](https://github.com/qvest-digital/terraform-provider-keycloak/pull/725)) +- new data source: `keycloak_openid_client_scope` ([#743](https://github.com/qvest-digital/terraform-provider-keycloak/pull/743)) IMPROVEMENTS: -- add `red_hat_sso` provider attribute which can be set to `true` if you're using RedHat SSO. this helps the provider understand which version of Keycloak is being used ([#721](https://github.com/mrparkers/terraform-provider-keycloak/pull/721)) -- support json encoded validation config for `keycloak_realm_user_profile` resource ([#705](https://github.com/mrparkers/terraform-provider-keycloak/pull/705)) -- update go version to 1.18, update several dependencies, update supported Keycloak versions to include v19 ([#733](https://github.com/mrparkers/terraform-provider-keycloak/pull/733)) -- add `attribute_default_value` and `is_binary_attribute` attributes to `keycloak_ldap_user_attribute_mapper` resource ([#735](https://github.com/mrparkers/terraform-provider-keycloak/pull/735)) -- update `keycloak_ldap_user_federation` resource to add support for deleting default mappers that are normally created by Keycloak ([#744](https://github.com/mrparkers/terraform-provider-keycloak/pull/744)) -- add `issuer` attribute to `keycloak_oidc_identity_provider` resource ([#746](https://github.com/mrparkers/terraform-provider-keycloak/pull/746)) -- update `keycloak_openid_client` resource to add support for importing Keycloak-created clients without needing to run `terraform import` ([#747](https://github.com/mrparkers/terraform-provider-keycloak/pull/747)) +- add `red_hat_sso` provider attribute which can be set to `true` if you're using RedHat SSO. this helps the provider understand which version of Keycloak is being used ([#721](https://github.com/qvest-digital/terraform-provider-keycloak/pull/721)) +- support json encoded validation config for `keycloak_realm_user_profile` resource ([#705](https://github.com/qvest-digital/terraform-provider-keycloak/pull/705)) +- update go version to 1.18, update several dependencies, update supported Keycloak versions to include v19 ([#733](https://github.com/qvest-digital/terraform-provider-keycloak/pull/733)) +- add `attribute_default_value` and `is_binary_attribute` attributes to `keycloak_ldap_user_attribute_mapper` resource ([#735](https://github.com/qvest-digital/terraform-provider-keycloak/pull/735)) +- update `keycloak_ldap_user_federation` resource to add support for deleting default mappers that are normally created by Keycloak ([#744](https://github.com/qvest-digital/terraform-provider-keycloak/pull/744)) +- add `issuer` attribute to `keycloak_oidc_identity_provider` resource ([#746](https://github.com/qvest-digital/terraform-provider-keycloak/pull/746)) +- update `keycloak_openid_client` resource to add support for importing Keycloak-created clients without needing to run `terraform import` ([#747](https://github.com/qvest-digital/terraform-provider-keycloak/pull/747)) Huge thanks to all the individuals who have contributed towards this release: @@ -149,8 +149,8 @@ Huge thanks to all the individuals who have contributed towards this release: IMPROVEMENTS: -- add authn context attributes for `keycloak_saml_identity_provider` resource ([#703](https://github.com/mrparkers/terraform-provider-keycloak/pull/703)) -- add `resource_type` attribute for `keycloak_openid_client_authorization_permission` resource ([#702](https://github.com/mrparkers/terraform-provider-keycloak/pull/702)) +- add authn context attributes for `keycloak_saml_identity_provider` resource ([#703](https://github.com/qvest-digital/terraform-provider-keycloak/pull/703)) +- add `resource_type` attribute for `keycloak_openid_client_authorization_permission` resource ([#702](https://github.com/qvest-digital/terraform-provider-keycloak/pull/702)) Huge thanks to all the individuals who have contributed towards this release: @@ -162,19 +162,19 @@ Huge thanks to all the individuals who have contributed towards this release: BUG FIXES: -- update usage of component API for `keycloak_ldap_user_federation` and `keycloak_custom_user_federation` resources ([#707](https://github.com/mrparkers/terraform-provider-keycloak/pull/707)) +- update usage of component API for `keycloak_ldap_user_federation` and `keycloak_custom_user_federation` resources ([#707](https://github.com/qvest-digital/terraform-provider-keycloak/pull/707)) - this fixes an issue that prevented these resources from being used within the `master` realm. ## v3.9.0 (June 23, 2022) IMPROVEMENTS: -- improve import error messages for several resources ([#691](https://github.com/mrparkers/terraform-provider-keycloak/pull/691)) -- allow usage of environment variable to configure base API path ([#695](https://github.com/mrparkers/terraform-provider-keycloak/pull/695)) +- improve import error messages for several resources ([#691](https://github.com/qvest-digital/terraform-provider-keycloak/pull/691)) +- allow usage of environment variable to configure base API path ([#695](https://github.com/qvest-digital/terraform-provider-keycloak/pull/695)) BUG FIXES: -- use realm name instead of internal ID for authentication bindings ([#687](https://github.com/mrparkers/terraform-provider-keycloak/pull/687)) +- use realm name instead of internal ID for authentication bindings ([#687](https://github.com/qvest-digital/terraform-provider-keycloak/pull/687)) Huge thanks to all the individuals who have contributed towards this release: @@ -191,17 +191,17 @@ BUG FIXES: FEATURES: -- new resource: `keycloak_realm_user_profile` ([#658](https://github.com/mrparkers/terraform-provider-keycloak/pull/658)) -- new resource: `keycloak_authentication_bindings` ([#668](https://github.com/mrparkers/terraform-provider-keycloak/pull/668)) +- new resource: `keycloak_realm_user_profile` ([#658](https://github.com/qvest-digital/terraform-provider-keycloak/pull/658)) +- new resource: `keycloak_authentication_bindings` ([#668](https://github.com/qvest-digital/terraform-provider-keycloak/pull/668)) IMPROVEMENTS: -- support custom provider ID in `keycloak_saml_identity_provider` resource ([#656](https://github.com/mrparkers/terraform-provider-keycloak/pull/656)) -- support sync settings in `keycloak_custom_user_federation` resource ([#663](https://github.com/mrparkers/terraform-provider-keycloak/pull/663)) -- support Transient NameID format for `keycloak_saml_identity_provider` resource ([#661](https://github.com/mrparkers/terraform-provider-keycloak/pull/661)) -- update all resources to use new terraform lifecycles with context support ([#675](https://github.com/mrparkers/terraform-provider-keycloak/pull/675)) -- support use-refresh-tokens for client credentials in `keycloak_openid_client` resource ([#678](https://github.com/mrparkers/terraform-provider-keycloak/pull/678)) -- support `client_session_idle_timeout` and `client_session_max_lifespan` arguments in `keycloak_realm` resource ([#653](https://github.com/mrparkers/terraform-provider-keycloak/pull/653)) +- support custom provider ID in `keycloak_saml_identity_provider` resource ([#656](https://github.com/qvest-digital/terraform-provider-keycloak/pull/656)) +- support sync settings in `keycloak_custom_user_federation` resource ([#663](https://github.com/qvest-digital/terraform-provider-keycloak/pull/663)) +- support Transient NameID format for `keycloak_saml_identity_provider` resource ([#661](https://github.com/qvest-digital/terraform-provider-keycloak/pull/661)) +- update all resources to use new terraform lifecycles with context support ([#675](https://github.com/qvest-digital/terraform-provider-keycloak/pull/675)) +- support use-refresh-tokens for client credentials in `keycloak_openid_client` resource ([#678](https://github.com/qvest-digital/terraform-provider-keycloak/pull/678)) +- support `client_session_idle_timeout` and `client_session_max_lifespan` arguments in `keycloak_realm` resource ([#653](https://github.com/qvest-digital/terraform-provider-keycloak/pull/653)) Huge thanks to all the individuals who have contributed towards this release: @@ -218,17 +218,17 @@ Huge thanks to all the individuals who have contributed towards this release: IMPROVEMENTS: -- add support for the oauth2 device authorization grant ([#578](https://github.com/mrparkers/terraform-provider-keycloak/pull/578)) -- add `client_authenticator_type` attribute to `keycloak_openid_client` resource ([#627](https://github.com/mrparkers/terraform-provider-keycloak/pull/627)) -- add missing documentation for `keycloak_user_template_importer_identity_provider_mapper` resource ([#635](https://github.com/mrparkers/terraform-provider-keycloak/pull/635)) -- add attributes for customizing consent screen for `keycloak_openid_client` resource ([#646](https://github.com/mrparkers/terraform-provider-keycloak/pull/646)) -- upgrade to the latest version of the `terraform-plugin-sdk` ([#644](https://github.com/mrparkers/terraform-provider-keycloak/pull/644)) -- add attributes for configuring frontchannel logout on `keycloak_openid_client` resource ([#644](https://github.com/mrparkers/terraform-provider-keycloak/pull/644)) -- bump supported keycloak versions ([#650](https://github.com/mrparkers/terraform-provider-keycloak/pull/650)) +- add support for the oauth2 device authorization grant ([#578](https://github.com/qvest-digital/terraform-provider-keycloak/pull/578)) +- add `client_authenticator_type` attribute to `keycloak_openid_client` resource ([#627](https://github.com/qvest-digital/terraform-provider-keycloak/pull/627)) +- add missing documentation for `keycloak_user_template_importer_identity_provider_mapper` resource ([#635](https://github.com/qvest-digital/terraform-provider-keycloak/pull/635)) +- add attributes for customizing consent screen for `keycloak_openid_client` resource ([#646](https://github.com/qvest-digital/terraform-provider-keycloak/pull/646)) +- upgrade to the latest version of the `terraform-plugin-sdk` ([#644](https://github.com/qvest-digital/terraform-provider-keycloak/pull/644)) +- add attributes for configuring frontchannel logout on `keycloak_openid_client` resource ([#644](https://github.com/qvest-digital/terraform-provider-keycloak/pull/644)) +- bump supported keycloak versions ([#650](https://github.com/qvest-digital/terraform-provider-keycloak/pull/650)) BUG FIXES: -- fix keycloak version check for `keycloak_default_roles` resource ([#637](https://github.com/mrparkers/terraform-provider-keycloak/pull/637)) +- fix keycloak version check for `keycloak_default_roles` resource ([#637](https://github.com/qvest-digital/terraform-provider-keycloak/pull/637)) Huge thanks to all the individuals who have contributed towards this release: @@ -241,12 +241,12 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -- new resource: `keycloak_group_permissions` ([#617](https://github.com/mrparkers/terraform-provider-keycloak/pull/617)) +- new resource: `keycloak_group_permissions` ([#617](https://github.com/qvest-digital/terraform-provider-keycloak/pull/617)) BUG FIXES: -- `xml_sign_key_info_key_name_transformer` attribute for `keycloak_saml_identity_provider` resource used incorrect spelling, causing it to not be set correctly ([#614](https://github.com/mrparkers/terraform-provider-keycloak/pull/614)) -- when querying protocol mappers from the Keycloak API, treat quoted boolean attributes as `false` when receiving an empty string. this should fix issues when importing protocol mappers that were created by Keycloak ([#622](https://github.com/mrparkers/terraform-provider-keycloak/pull/622)) +- `xml_sign_key_info_key_name_transformer` attribute for `keycloak_saml_identity_provider` resource used incorrect spelling, causing it to not be set correctly ([#614](https://github.com/qvest-digital/terraform-provider-keycloak/pull/614)) +- when querying protocol mappers from the Keycloak API, treat quoted boolean attributes as `false` when receiving an empty string. this should fix issues when importing protocol mappers that were created by Keycloak ([#622](https://github.com/qvest-digital/terraform-provider-keycloak/pull/622)) Huge thanks to all the individuals who have contributed towards this release: @@ -257,26 +257,26 @@ Huge thanks to all the individuals who have contributed towards this release: BUG FIXES: -- remove `defaultRole` from realm JSON before sending requests to Keycloak to fix compatibility with Keycloak versions older than v13 ([#612](https://github.com/mrparkers/terraform-provider-keycloak/pull/612)) +- remove `defaultRole` from realm JSON before sending requests to Keycloak to fix compatibility with Keycloak versions older than v13 ([#612](https://github.com/qvest-digital/terraform-provider-keycloak/pull/612)) ## v3.5.0 (October 13, 2021) FEATURES: -- new resource: `keycloak_default_roles` ([#599](https://github.com/mrparkers/terraform-provider-keycloak/pull/599)) -- new resources: `keycloak_realm_keystore_aes_generated`, `keycloak_realm_keystore_ecdsa_generated`, `keycloak_realm_keystore_hmac_generated`, `keycloak_realm_keystore_java_keystore`, `keycloak_realm_keystore_rsa`, and `keycloak_realm_keystore_rsa_generated` ([#582](https://github.com/mrparkers/terraform-provider-keycloak/pull/582)) -- new resource: `keycloak_openid_audience_resolve_protocol_mapper` ([#606](https://github.com/mrparkers/terraform-provider-keycloak/pull/606)) +- new resource: `keycloak_default_roles` ([#599](https://github.com/qvest-digital/terraform-provider-keycloak/pull/599)) +- new resources: `keycloak_realm_keystore_aes_generated`, `keycloak_realm_keystore_ecdsa_generated`, `keycloak_realm_keystore_hmac_generated`, `keycloak_realm_keystore_java_keystore`, `keycloak_realm_keystore_rsa`, and `keycloak_realm_keystore_rsa_generated` ([#582](https://github.com/qvest-digital/terraform-provider-keycloak/pull/582)) +- new resource: `keycloak_openid_audience_resolve_protocol_mapper` ([#606](https://github.com/qvest-digital/terraform-provider-keycloak/pull/606)) IMPROVEMENTS: -- add `start_tls` and `use_password_modify_extended_op` attributes to `keycloak_ldap_user_federation` resource ([#601](https://github.com/mrparkers/terraform-provider-keycloak/pull/601)) -- `keycloak_openid_client_default_scopes` and `keycloak_openid_client_optional_scopes` resources will now completely reconcile assigned scopes on create ([#594](https://github.com/mrparkers/terraform-provider-keycloak/pull/594)) - - this means that creating these resources will now remove default / optional scopes that are not specified within the resource configuration. see [#498](https://github.com/mrparkers/terraform-provider-keycloak/issues/498) for more context. +- add `start_tls` and `use_password_modify_extended_op` attributes to `keycloak_ldap_user_federation` resource ([#601](https://github.com/qvest-digital/terraform-provider-keycloak/pull/601)) +- `keycloak_openid_client_default_scopes` and `keycloak_openid_client_optional_scopes` resources will now completely reconcile assigned scopes on create ([#594](https://github.com/qvest-digital/terraform-provider-keycloak/pull/594)) + - this means that creating these resources will now remove default / optional scopes that are not specified within the resource configuration. see [#498](https://github.com/qvest-digital/terraform-provider-keycloak/issues/498) for more context. BUG FIXES: -- allow all `extra_config` attributes for `keycloak_custom_identity_provider_mapper` resource ([#607](https://github.com/mrparkers/terraform-provider-keycloak/pull/607)) -- `backchannel_logout_session_required` and `backchannel_logout_revoke_offline_sessions` attributes for `keycloak_openid_client` resource were swapped ([#600](https://github.com/mrparkers/terraform-provider-keycloak/pull/600)) +- allow all `extra_config` attributes for `keycloak_custom_identity_provider_mapper` resource ([#607](https://github.com/qvest-digital/terraform-provider-keycloak/pull/607)) +- `backchannel_logout_session_required` and `backchannel_logout_revoke_offline_sessions` attributes for `keycloak_openid_client` resource were swapped ([#600](https://github.com/qvest-digital/terraform-provider-keycloak/pull/600)) Huge thanks to all the individuals who have contributed towards this release: @@ -288,31 +288,31 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -- add backchannel support for `keycloak_openid_client` resource ([#583](https://github.com/mrparkers/terraform-provider-keycloak/pull/583)) -- add support for `extra_config` for `keycloak_openid_client` resource ([#579](https://github.com/mrparkers/terraform-provider-keycloak/pull/579)) -- add support for `extra_config` for `keycloak_saml_client` resource ([#589](https://github.com/mrparkers/terraform-provider-keycloak/pull/589)) -- add `signature_key_name` attribute to `keycloak_saml_client` resource ([#588](https://github.com/mrparkers/terraform-provider-keycloak/pull/588)) -- add `login_theme` attribute to `keycloak_saml_client` resource ([#590](https://github.com/mrparkers/terraform-provider-keycloak/pull/590)) -- new data source: `keycloak_user_realm_roles` ([#596](https://github.com/mrparkers/terraform-provider-keycloak/pull/596)) -- add OTP policy attributes to `keycloak_realm` resource ([#585](https://github.com/mrparkers/terraform-provider-keycloak/pull/585)) -- add computed attributes `encryption_certificate_sha1`, `signing_certificate_sha1`, and `signing_private_key_sha1` for `keycloak_saml_client` resource ([#589](https://github.com/mrparkers/terraform-provider-keycloak/pull/589)) +- add backchannel support for `keycloak_openid_client` resource ([#583](https://github.com/qvest-digital/terraform-provider-keycloak/pull/583)) +- add support for `extra_config` for `keycloak_openid_client` resource ([#579](https://github.com/qvest-digital/terraform-provider-keycloak/pull/579)) +- add support for `extra_config` for `keycloak_saml_client` resource ([#589](https://github.com/qvest-digital/terraform-provider-keycloak/pull/589)) +- add `signature_key_name` attribute to `keycloak_saml_client` resource ([#588](https://github.com/qvest-digital/terraform-provider-keycloak/pull/588)) +- add `login_theme` attribute to `keycloak_saml_client` resource ([#590](https://github.com/qvest-digital/terraform-provider-keycloak/pull/590)) +- new data source: `keycloak_user_realm_roles` ([#596](https://github.com/qvest-digital/terraform-provider-keycloak/pull/596)) +- add OTP policy attributes to `keycloak_realm` resource ([#585](https://github.com/qvest-digital/terraform-provider-keycloak/pull/585)) +- add computed attributes `encryption_certificate_sha1`, `signing_certificate_sha1`, and `signing_private_key_sha1` for `keycloak_saml_client` resource ([#589](https://github.com/qvest-digital/terraform-provider-keycloak/pull/589)) IMPROVEMENTS: -- the behavior of the `extra_config` attribute among all resources that support it has been standardized ([#584](https://github.com/mrparkers/terraform-provider-keycloak/pull/584)) ([#589](https://github.com/mrparkers/terraform-provider-keycloak/pull/589)) +- the behavior of the `extra_config` attribute among all resources that support it has been standardized ([#584](https://github.com/qvest-digital/terraform-provider-keycloak/pull/584)) ([#589](https://github.com/qvest-digital/terraform-provider-keycloak/pull/589)) - validation has been added to ensure that `extra_config` can't be used to override values that are supported by that particular resource's top level schema - `extra_config` will no longer contain "computed" attributes, meaning that attributes not supplied by the user will not be written back to `extra_config` - attributes that have been removed from `extra_config` will be sent back to the Keycloak API as an empty string. this appears to be the only way to "unset" these on the Keycloak server - REMINDER: `extra_config` should only be used to support custom attributes, or attributes that are not yet officially supported by this provider. future releases of this provider could cause breaking changes for users using `extra_config`. please use this attribute carefully, especially when upgrading to newer versions of the provider. -- request / response bodies to / from the Keycloak API will be properly formatted when `TF_LOG` is set to `DEBUG` ([#589](https://github.com/mrparkers/terraform-provider-keycloak/pull/589)) -- the list of officially supported Keycloak versions has been updated to 13.x, 14.x, and 15.x ([#589](https://github.com/mrparkers/terraform-provider-keycloak/pull/589)). older versions may still work, but they will no longer be tested against in CI. +- request / response bodies to / from the Keycloak API will be properly formatted when `TF_LOG` is set to `DEBUG` ([#589](https://github.com/qvest-digital/terraform-provider-keycloak/pull/589)) +- the list of officially supported Keycloak versions has been updated to 13.x, 14.x, and 15.x ([#589](https://github.com/qvest-digital/terraform-provider-keycloak/pull/589)). older versions may still work, but they will no longer be tested against in CI. - the behavior of the `keycloak_saml_client` attributes `encryption_certificate`, `signing_certificate`, and `signing_private_key` has been changed. - previously, it was meant to be possible to unset these attributes by setting them to an empty string. this was meant to remove the certs / keys on the Keycloak server. however, this never really worked correctly, so this behavior has been removed. - these values will now be autogenerated by Keycloak when omitted. BUG FIXES: -- fix possible crash when using `keycloak_users_permissions` resource ([#591](https://github.com/mrparkers/terraform-provider-keycloak/pull/591)) +- fix possible crash when using `keycloak_users_permissions` resource ([#591](https://github.com/qvest-digital/terraform-provider-keycloak/pull/591)) Huge thanks to all the individuals who have contributed towards this release: @@ -327,7 +327,7 @@ Huge thanks to all the individuals who have contributed towards this release: IMPROVEMENTS: -- add `use_refresh_tokens` attribute to `keycloak_openid_client` resource ([#573](https://github.com/mrparkers/terraform-provider-keycloak/pull/573)) +- add `use_refresh_tokens` attribute to `keycloak_openid_client` resource ([#573](https://github.com/qvest-digital/terraform-provider-keycloak/pull/573)) Huge thanks to all the individuals who have contributed towards this release: @@ -337,8 +337,8 @@ Huge thanks to all the individuals who have contributed towards this release: BUG FIXES: -- re-add previously removed `LOAD_ROLES_BY_MEMBER_ATTRIBUTE_RECURSIVELY` role retrieval strategy for the `keycloak_ldap_role_mapper` resource ([#560](https://github.com/mrparkers/terraform-provider-keycloak/pull/560)) -- perform initial login during version check if needed. this fixes a potential panic within the `keycloak_ldap_group_mapper` resource ([#564](https://github.com/mrparkers/terraform-provider-keycloak/pull/564)) +- re-add previously removed `LOAD_ROLES_BY_MEMBER_ATTRIBUTE_RECURSIVELY` role retrieval strategy for the `keycloak_ldap_role_mapper` resource ([#560](https://github.com/qvest-digital/terraform-provider-keycloak/pull/560)) +- perform initial login during version check if needed. this fixes a potential panic within the `keycloak_ldap_group_mapper` resource ([#564](https://github.com/qvest-digital/terraform-provider-keycloak/pull/564)) Huge thanks to all the individuals who have contributed towards this release: @@ -349,14 +349,14 @@ Huge thanks to all the individuals who have contributed towards this release: IMPROVEMENTS: -- stopped throwing an error for missing provider credentials when `initial_login` is set to `false`. this should help with scenarios where Keycloak itself is being created by Terraform (such as with the `helm_release` resource) ([#552](https://github.com/mrparkers/terraform-provider-keycloak/pull/552)) -- upgrade to go v1.16, bump terraform plugin SDK ([#551](https://github.com/mrparkers/terraform-provider-keycloak/pull/551)) +- stopped throwing an error for missing provider credentials when `initial_login` is set to `false`. this should help with scenarios where Keycloak itself is being created by Terraform (such as with the `helm_release` resource) ([#552](https://github.com/qvest-digital/terraform-provider-keycloak/pull/552)) +- upgrade to go v1.16, bump terraform plugin SDK ([#551](https://github.com/qvest-digital/terraform-provider-keycloak/pull/551)) - this enables builds for previously unsupported platforms, such as `darwin_arm64` - this should fix any potential issues with using this provider with Terraform v1.0.1 BUG FIXES: -- fix possible panic when creating identity provider mappers ([#556](https://github.com/mrparkers/terraform-provider-keycloak/pull/556)) +- fix possible panic when creating identity provider mappers ([#556](https://github.com/qvest-digital/terraform-provider-keycloak/pull/556)) Huge thanks to all the individuals who have contributed towards this release: @@ -374,16 +374,16 @@ instead. FEATURES: -- new resource: `keycloak_custom_identity_provider_mapper` ([#515](https://github.com/mrparkers/terraform-provider-keycloak/pull/515)) -- new data source: `keycloak_client_description_converter` ([#518](https://github.com/mrparkers/terraform-provider-keycloak/pull/518)) +- new resource: `keycloak_custom_identity_provider_mapper` ([#515](https://github.com/qvest-digital/terraform-provider-keycloak/pull/515)) +- new data source: `keycloak_client_description_converter` ([#518](https://github.com/qvest-digital/terraform-provider-keycloak/pull/518)) IMPROVEMENTS: -- use pagination for `keycloak_group_memberships` resource ([#527](https://github.com/mrparkers/terraform-provider-keycloak/pull/527)) +- use pagination for `keycloak_group_memberships` resource ([#527](https://github.com/qvest-digital/terraform-provider-keycloak/pull/527)) BUG FIXES: -- handle deleted role when removing role assignment from `keycloak_group_roles` resource ([#538](https://github.com/mrparkers/terraform-provider-keycloak/pull/538)) +- handle deleted role when removing role assignment from `keycloak_group_roles` resource ([#538](https://github.com/qvest-digital/terraform-provider-keycloak/pull/538)) Huge thanks to all the individuals who have contributed towards this release: @@ -397,39 +397,39 @@ Huge thanks to all the individuals who have contributed towards this release: BUG FIXES: -- add validation for `extra_config` attribute for identity providers to prevent conflicts with the top-level identity provider schema ([#523](https://github.com/mrparkers/terraform-provider-keycloak/pull/523)) +- add validation for `extra_config` attribute for identity providers to prevent conflicts with the top-level identity provider schema ([#523](https://github.com/qvest-digital/terraform-provider-keycloak/pull/523)) - note: this may cause errors with existing provider configuration that uses this attribute. however, any provider configuration that breaks here was most likely not working in the first place. -- fix definition of roles in `keycloak_openid_client_role_policy` resource to use a set instead of a list ([#524](https://github.com/mrparkers/terraform-provider-keycloak/pull/524)) +- fix definition of roles in `keycloak_openid_client_role_policy` resource to use a set instead of a list ([#524](https://github.com/qvest-digital/terraform-provider-keycloak/pull/524)) ## v3.0.0 (April 12, 2021) BREAKING CHANGES: -- add a new required `entity_id` attribute for `keycloak_saml_identity_provider` resource ([#512](https://github.com/mrparkers/terraform-provider-keycloak/pull/512)) -- removed attributes that were deprecated in v2.0.0 ([#514](https://github.com/mrparkers/terraform-provider-keycloak/pull/514)) +- add a new required `entity_id` attribute for `keycloak_saml_identity_provider` resource ([#512](https://github.com/qvest-digital/terraform-provider-keycloak/pull/512)) +- removed attributes that were deprecated in v2.0.0 ([#514](https://github.com/qvest-digital/terraform-provider-keycloak/pull/514)) - `keycloak_openid_user_session_note_protocol_mapper` resource: remove `session_note_label` attribute - `keycloak_user` data source: remove `federated_identities` attribute - `keycloak_ldap_user_federation` resource: remove `cache_policy` attribute FEATURES: -- new data source: `keycloak_authentication_flow` ([#486](https://github.com/mrparkers/terraform-provider-keycloak/pull/486)) -- new resource: `keycloak_user_groups` ([#505](https://github.com/mrparkers/terraform-provider-keycloak/pull/505)) +- new data source: `keycloak_authentication_flow` ([#486](https://github.com/qvest-digital/terraform-provider-keycloak/pull/486)) +- new resource: `keycloak_user_groups` ([#505](https://github.com/qvest-digital/terraform-provider-keycloak/pull/505)) IMPROVEMENTS: -- support multivalue attributes for users, groups and roles ([#499](https://github.com/mrparkers/terraform-provider-keycloak/pull/499)) -- add `trust_email` attribute to `keycloak_ldap_user_federation` resource ([#267](https://github.com/mrparkers/terraform-provider-keycloak/pull/267)) -- add `principal_type`, `principal_attribute`, `gui_order`, and `sync_mode` attributes to `keycloak_saml_identity_provider` resource ([#508](https://github.com/mrparkers/terraform-provider-keycloak/pull/508)) -- allows non-authoritative usage of `keycloak_group_roles` resource via `exhaustive` attribute ([#501](https://github.com/mrparkers/terraform-provider-keycloak/pull/501)) -- allows non-authoritative usage of `keycloak_user_roles` resource via `exhaustive` attribute ([#513](https://github.com/mrparkers/terraform-provider-keycloak/pull/513)) -- add ability to set additional request headers as provider config ([#507](https://github.com/mrparkers/terraform-provider-keycloak/pull/507)) +- support multivalue attributes for users, groups and roles ([#499](https://github.com/qvest-digital/terraform-provider-keycloak/pull/499)) +- add `trust_email` attribute to `keycloak_ldap_user_federation` resource ([#267](https://github.com/qvest-digital/terraform-provider-keycloak/pull/267)) +- add `principal_type`, `principal_attribute`, `gui_order`, and `sync_mode` attributes to `keycloak_saml_identity_provider` resource ([#508](https://github.com/qvest-digital/terraform-provider-keycloak/pull/508)) +- allows non-authoritative usage of `keycloak_group_roles` resource via `exhaustive` attribute ([#501](https://github.com/qvest-digital/terraform-provider-keycloak/pull/501)) +- allows non-authoritative usage of `keycloak_user_roles` resource via `exhaustive` attribute ([#513](https://github.com/qvest-digital/terraform-provider-keycloak/pull/513)) +- add ability to set additional request headers as provider config ([#507](https://github.com/qvest-digital/terraform-provider-keycloak/pull/507)) BUG FIXES: -- fixed marshalling of `false` value in Keycloak API attributes that use quoted booleans ([#495](https://github.com/mrparkers/terraform-provider-keycloak/pull/495)) -- handle group not found for `keycloak_group_roles` resource ([#497](https://github.com/mrparkers/terraform-provider-keycloak/pull/497)) -- fix `keycloak_attribute_importer_identity_provider_mapper` and `keycloak_user_template_importer_identity_provider_mapper` resources for usage with Facebook/Google ([#482](https://github.com/mrparkers/terraform-provider-keycloak/pull/482)) +- fixed marshalling of `false` value in Keycloak API attributes that use quoted booleans ([#495](https://github.com/qvest-digital/terraform-provider-keycloak/pull/495)) +- handle group not found for `keycloak_group_roles` resource ([#497](https://github.com/qvest-digital/terraform-provider-keycloak/pull/497)) +- fix `keycloak_attribute_importer_identity_provider_mapper` and `keycloak_user_template_importer_identity_provider_mapper` resources for usage with Facebook/Google ([#482](https://github.com/qvest-digital/terraform-provider-keycloak/pull/482)) Huge thanks to all the individuals who have contributed towards this release: @@ -448,15 +448,15 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -- new resource: `keycloak_saml_script_protocol_mapper` ([#473](https://github.com/mrparkers/terraform-provider-keycloak/pull/473)) +- new resource: `keycloak_saml_script_protocol_mapper` ([#473](https://github.com/qvest-digital/terraform-provider-keycloak/pull/473)) IMPROVEMENTS: -- support custom attributes in `keycloak_role` resource ([#475](https://github.com/mrparkers/terraform-provider-keycloak/pull/475)) +- support custom attributes in `keycloak_role` resource ([#475](https://github.com/qvest-digital/terraform-provider-keycloak/pull/475)) BUG FIXES: -- remove mutex usage in keycloak client, which in some cases resulted in deadlock when retrieving tokens from Keycloak ([#489](https://github.com/mrparkers/terraform-provider-keycloak/pull/489)) +- remove mutex usage in keycloak client, which in some cases resulted in deadlock when retrieving tokens from Keycloak ([#489](https://github.com/qvest-digital/terraform-provider-keycloak/pull/489)) Huge thanks to all the individuals who have contributed towards this release: @@ -468,18 +468,18 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -- add new `keycloak_realm` attributes for handling default client scopes ([#464](https://github.com/mrparkers/terraform-provider-keycloak/pull/464)) -- new data source: `keycloak_saml_client` ([#468](https://github.com/mrparkers/terraform-provider-keycloak/pull/468)) +- add new `keycloak_realm` attributes for handling default client scopes ([#464](https://github.com/qvest-digital/terraform-provider-keycloak/pull/464)) +- new data source: `keycloak_saml_client` ([#468](https://github.com/qvest-digital/terraform-provider-keycloak/pull/468)) IMPROVEMENTS: -- revised the configuration for the custom user federation example ([#425](https://github.com/mrparkers/terraform-provider-keycloak/pull/425)) -- increased the default http client timeout to 15 seconds ([#469](https://github.com/mrparkers/terraform-provider-keycloak/pull/469)) +- revised the configuration for the custom user federation example ([#425](https://github.com/qvest-digital/terraform-provider-keycloak/pull/425)) +- increased the default http client timeout to 15 seconds ([#469](https://github.com/qvest-digital/terraform-provider-keycloak/pull/469)) BUG FIXES: -- fix panic when using `keycloak_user` data source with invalid username ([#460](https://github.com/mrparkers/terraform-provider-keycloak/pull/460)) -- fix version handling with RedHat SSO ([#462](https://github.com/mrparkers/terraform-provider-keycloak/pull/462)) +- fix panic when using `keycloak_user` data source with invalid username ([#460](https://github.com/qvest-digital/terraform-provider-keycloak/pull/460)) +- fix version handling with RedHat SSO ([#462](https://github.com/qvest-digital/terraform-provider-keycloak/pull/462)) Huge thanks to all the individuals who have contributed towards this release: @@ -490,25 +490,25 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -- new resource: `keycloak_openid_client_permissions` ([#364](https://github.com/mrparkers/terraform-provider-keycloak/pull/364)) -- new resource: `keycloak_users_permissions` ([#400](https://github.com/mrparkers/terraform-provider-keycloak/pull/400)) -- new resource: `keycloak_openid_client_script_protocol_mapper` ([#453](https://github.com/mrparkers/terraform-provider-keycloak/pull/453)) +- new resource: `keycloak_openid_client_permissions` ([#364](https://github.com/qvest-digital/terraform-provider-keycloak/pull/364)) +- new resource: `keycloak_users_permissions` ([#400](https://github.com/qvest-digital/terraform-provider-keycloak/pull/400)) +- new resource: `keycloak_openid_client_script_protocol_mapper` ([#453](https://github.com/qvest-digital/terraform-provider-keycloak/pull/453)) IMPROVEMENTS: -- add `authorization.decision_strategy` attribute to `keycloak_openid_client` resource ([#392](https://github.com/mrparkers/terraform-provider-keycloak/pull/392)) -- support `IMPORT` mode for `keycloak_ldap_group_mapper` resource ([#397](https://github.com/mrparkers/terraform-provider-keycloak/pull/397)) -- add client session length attributes to `keycloak_openid_client` resource ([#415](https://github.com/mrparkers/terraform-provider-keycloak/pull/415)) -- update to go 1.5 ([#445](https://github.com/mrparkers/terraform-provider-keycloak/pull/360)) -- add `groups_path` attribute to `keycloak_ldap_group_mapper` resource ([#436](https://github.com/mrparkers/terraform-provider-keycloak/pull/436)) -- add `authentication_flow_binding_overrides` attribute to `keycloak_saml_client` resource ([#448](https://github.com/mrparkers/terraform-provider-keycloak/pull/448)) +- add `authorization.decision_strategy` attribute to `keycloak_openid_client` resource ([#392](https://github.com/qvest-digital/terraform-provider-keycloak/pull/392)) +- support `IMPORT` mode for `keycloak_ldap_group_mapper` resource ([#397](https://github.com/qvest-digital/terraform-provider-keycloak/pull/397)) +- add client session length attributes to `keycloak_openid_client` resource ([#415](https://github.com/qvest-digital/terraform-provider-keycloak/pull/415)) +- update to go 1.5 ([#445](https://github.com/qvest-digital/terraform-provider-keycloak/pull/360)) +- add `groups_path` attribute to `keycloak_ldap_group_mapper` resource ([#436](https://github.com/qvest-digital/terraform-provider-keycloak/pull/436)) +- add `authentication_flow_binding_overrides` attribute to `keycloak_saml_client` resource ([#448](https://github.com/qvest-digital/terraform-provider-keycloak/pull/448)) BUG FIXES: -- fix inconsistent plan when enabling service account in `keycloak_openid_client` resource ([#437](https://github.com/mrparkers/terraform-provider-keycloak/pull/437)) -- fix import for `keycloak_openid_client_service_account_realm_role` resource ([#441](https://github.com/mrparkers/terraform-provider-keycloak/pull/441)) -- remove unneeded validation checks for registration attributes for `keycloak_realm` resource ([#438](https://github.com/mrparkers/terraform-provider-keycloak/pull/438)) -- allow commas in `config` attribute for `keycloak_custom_user_federation` resource ([#455](https://github.com/mrparkers/terraform-provider-keycloak/pull/455)) +- fix inconsistent plan when enabling service account in `keycloak_openid_client` resource ([#437](https://github.com/qvest-digital/terraform-provider-keycloak/pull/437)) +- fix import for `keycloak_openid_client_service_account_realm_role` resource ([#441](https://github.com/qvest-digital/terraform-provider-keycloak/pull/441)) +- remove unneeded validation checks for registration attributes for `keycloak_realm` resource ([#438](https://github.com/qvest-digital/terraform-provider-keycloak/pull/438)) +- allow commas in `config` attribute for `keycloak_custom_user_federation` resource ([#455](https://github.com/qvest-digital/terraform-provider-keycloak/pull/455)) Huge thanks to all the individuals who have contributed towards this release: @@ -526,41 +526,41 @@ Huge thanks to all the individuals who have contributed towards this release: BREAKING CHANGES: -- migrate to v2 of the terraform-plugin-sdk, which [drops support for Terraform 0.11 and below](https://www.terraform.io/docs/extend/guides/v2-upgrade-guide.html#dropped-support-for-terraform-0-11-and-below) ([#369](https://github.com/mrparkers/terraform-provider-keycloak/pull/369)) +- migrate to v2 of the terraform-plugin-sdk, which [drops support for Terraform 0.11 and below](https://www.terraform.io/docs/extend/guides/v2-upgrade-guide.html#dropped-support-for-terraform-0-11-and-below) ([#369](https://github.com/qvest-digital/terraform-provider-keycloak/pull/369)) DEPRECATIONS: -- the `cache_policy` attribute within the `keycloak_ldap_user_federation` resource has been deprecated in favor of a new `cache` attribute ([#376](https://github.com/mrparkers/terraform-provider-keycloak/pull/376)) -- the `federated_identities` computed attribute within the `keycloak_user` data source has been deprecated in favor of a new `federated_identity` computed attribute ([1b6284c](https://github.com/mrparkers/terraform-provider-keycloak/commit/1b6284c70dbdb67f42fafe16abeb681541d06cbf)) -- the `session_note_label` attribute within the `keycloak_openid_user_session_note_protocol_mapper` resource has been deprecated in favor of a new `session_note` attribute ([#365](https://github.com/mrparkers/terraform-provider-keycloak/pull/365)) +- the `cache_policy` attribute within the `keycloak_ldap_user_federation` resource has been deprecated in favor of a new `cache` attribute ([#376](https://github.com/qvest-digital/terraform-provider-keycloak/pull/376)) +- the `federated_identities` computed attribute within the `keycloak_user` data source has been deprecated in favor of a new `federated_identity` computed attribute ([1b6284c](https://github.com/qvest-digital/terraform-provider-keycloak/commit/1b6284c70dbdb67f42fafe16abeb681541d06cbf)) +- the `session_note_label` attribute within the `keycloak_openid_user_session_note_protocol_mapper` resource has been deprecated in favor of a new `session_note` attribute ([#365](https://github.com/qvest-digital/terraform-provider-keycloak/pull/365)) FEATURES: - this provider can now be installed automatically with Terraform 0.13 via the Terraform registry: https://registry.terraform.io/providers/mrparkers/keycloak/latest -- new data source: `keycloak_user` ([#360](https://github.com/mrparkers/terraform-provider-keycloak/pull/360)) -- new data source: `keycloak_authentication_execution` ([#360](https://github.com/mrparkers/terraform-provider-keycloak/pull/360)) +- new data source: `keycloak_user` ([#360](https://github.com/qvest-digital/terraform-provider-keycloak/pull/360)) +- new data source: `keycloak_authentication_execution` ([#360](https://github.com/qvest-digital/terraform-provider-keycloak/pull/360)) IMPROVEMENTS: -- add remember me timeout attributes to `keycloak_realm` resource ([#374](https://github.com/mrparkers/terraform-provider-keycloak/pull/374)) -- add `offline_session_max_lifespan_enabled` attribute to `keycloak_realm` resource ([#377](https://github.com/mrparkers/terraform-provider-keycloak/pull/377)) -- add `web_authn_policy` and `web_authn_passwordless_policy` attributes to `keycloak_realm` resource ([#356](https://github.com/mrparkers/terraform-provider-keycloak/pull/356)) +- add remember me timeout attributes to `keycloak_realm` resource ([#374](https://github.com/qvest-digital/terraform-provider-keycloak/pull/374)) +- add `offline_session_max_lifespan_enabled` attribute to `keycloak_realm` resource ([#377](https://github.com/qvest-digital/terraform-provider-keycloak/pull/377)) +- add `web_authn_policy` and `web_authn_passwordless_policy` attributes to `keycloak_realm` resource ([#356](https://github.com/qvest-digital/terraform-provider-keycloak/pull/356)) BUG FIXES: -- fix `keycloak_group` data source to support more than one returned group ([#351](https://github.com/mrparkers/terraform-provider-keycloak/pull/351)) -- fix import syntax for `keycloak_openid_client_*_policy` resources ([#367](https://github.com/mrparkers/terraform-provider-keycloak/pull/367)) -- fix `parent_id` attribute not being set when importing `keycloak_group` resource ([#372](https://github.com/mrparkers/terraform-provider-keycloak/pull/372)) -- automatically register an unregistered required action when using the `keycloak_required_action` resource ([#385](https://github.com/mrparkers/terraform-provider-keycloak/pull/385)) -- fix `keycloak_openid_user_session_note_protocol_mapper` resource API call to correctly set the session note ([#365](https://github.com/mrparkers/terraform-provider-keycloak/pull/365)) -- add missing attributes for `keycloak_group` data source ([#369](https://github.com/mrparkers/terraform-provider-keycloak/pull/369)) -- add missing attributes for `keycloak_openid_client_service_account_user` data source ([#369](https://github.com/mrparkers/terraform-provider-keycloak/pull/369)) -- add missing attributes for `keycloak_realm` data source ([#369](https://github.com/mrparkers/terraform-provider-keycloak/pull/369)) -- fix `config` attribute for `keycloak_custom_user_federation` resource ([#369](https://github.com/mrparkers/terraform-provider-keycloak/pull/369)) -- fix `kerberos` attribute for `keycloak_ldap_user_federation` resource ([#369](https://github.com/mrparkers/terraform-provider-keycloak/pull/369)) -- add missing `disable_user_info` attribute for `keycloak_oidc_identity_provider` resource ([#369](https://github.com/mrparkers/terraform-provider-keycloak/pull/369)) -- fix empty `path` sub-attribute under `groups` attribute within `keycloak_openid_client_authorization_group_policy` resource ([#369](https://github.com/mrparkers/terraform-provider-keycloak/pull/369)) -- fix `role` attribute for `keycloak_openid_client_authorization_role_policy` resource ([#369](https://github.com/mrparkers/terraform-provider-keycloak/pull/369)) +- fix `keycloak_group` data source to support more than one returned group ([#351](https://github.com/qvest-digital/terraform-provider-keycloak/pull/351)) +- fix import syntax for `keycloak_openid_client_*_policy` resources ([#367](https://github.com/qvest-digital/terraform-provider-keycloak/pull/367)) +- fix `parent_id` attribute not being set when importing `keycloak_group` resource ([#372](https://github.com/qvest-digital/terraform-provider-keycloak/pull/372)) +- automatically register an unregistered required action when using the `keycloak_required_action` resource ([#385](https://github.com/qvest-digital/terraform-provider-keycloak/pull/385)) +- fix `keycloak_openid_user_session_note_protocol_mapper` resource API call to correctly set the session note ([#365](https://github.com/qvest-digital/terraform-provider-keycloak/pull/365)) +- add missing attributes for `keycloak_group` data source ([#369](https://github.com/qvest-digital/terraform-provider-keycloak/pull/369)) +- add missing attributes for `keycloak_openid_client_service_account_user` data source ([#369](https://github.com/qvest-digital/terraform-provider-keycloak/pull/369)) +- add missing attributes for `keycloak_realm` data source ([#369](https://github.com/qvest-digital/terraform-provider-keycloak/pull/369)) +- fix `config` attribute for `keycloak_custom_user_federation` resource ([#369](https://github.com/qvest-digital/terraform-provider-keycloak/pull/369)) +- fix `kerberos` attribute for `keycloak_ldap_user_federation` resource ([#369](https://github.com/qvest-digital/terraform-provider-keycloak/pull/369)) +- add missing `disable_user_info` attribute for `keycloak_oidc_identity_provider` resource ([#369](https://github.com/qvest-digital/terraform-provider-keycloak/pull/369)) +- fix empty `path` sub-attribute under `groups` attribute within `keycloak_openid_client_authorization_group_policy` resource ([#369](https://github.com/qvest-digital/terraform-provider-keycloak/pull/369)) +- fix `role` attribute for `keycloak_openid_client_authorization_role_policy` resource ([#369](https://github.com/qvest-digital/terraform-provider-keycloak/pull/369)) Huge thanks to all the individuals who have contributed towards this release: @@ -578,26 +578,26 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -- new resource: `keycloak_user_roles` ([#315](https://github.com/mrparkers/terraform-provider-keycloak/pull/315)) -- new resource: `keycloak_identity_provider_token_exchange_scope_permission` ([#318](https://github.com/mrparkers/terraform-provider-keycloak/pull/318)) -- new resources: `keycloak_saml_client_scope`, `keycloak_saml_client_default_scopes` ([#320](https://github.com/mrparkers/terraform-provider-keycloak/pull/320)) +- new resource: `keycloak_user_roles` ([#315](https://github.com/qvest-digital/terraform-provider-keycloak/pull/315)) +- new resource: `keycloak_identity_provider_token_exchange_scope_permission` ([#318](https://github.com/qvest-digital/terraform-provider-keycloak/pull/318)) +- new resources: `keycloak_saml_client_scope`, `keycloak_saml_client_default_scopes` ([#320](https://github.com/qvest-digital/terraform-provider-keycloak/pull/320)) IMPROVEMENTS: -- add `default_signature_algorithm` attribute for `keycloak_realm` resource ([#282](https://github.com/mrparkers/terraform-provider-keycloak/pull/282)) -- add `parent_id` attribute to `keycloak_custom_user_federation` resource ([#325](https://github.com/mrparkers/terraform-provider-keycloak/pull/325)) -- add `extra_config` attribute to identity provider mapper resources ([#316](https://github.com/mrparkers/terraform-provider-keycloak/pull/316)) -- add `include_in_token_scope` and `gui_order` attributes to `keycloak_openid_client_scope` resource ([#320](https://github.com/mrparkers/terraform-provider-keycloak/pull/320)) -- add `base_path` provider attribute, improve login error messages ([#332](https://github.com/mrparkers/terraform-provider-keycloak/pull/332)) -- add encryption attributes to `keycloak_saml_client` resource ([#342](https://github.com/mrparkers/terraform-provider-keycloak/pull/342)) -- add `signature_algorithm` attribute to `keycloak_saml_client` resource ([#345](https://github.com/mrparkers/terraform-provider-keycloak/pull/345)) +- add `default_signature_algorithm` attribute for `keycloak_realm` resource ([#282](https://github.com/qvest-digital/terraform-provider-keycloak/pull/282)) +- add `parent_id` attribute to `keycloak_custom_user_federation` resource ([#325](https://github.com/qvest-digital/terraform-provider-keycloak/pull/325)) +- add `extra_config` attribute to identity provider mapper resources ([#316](https://github.com/qvest-digital/terraform-provider-keycloak/pull/316)) +- add `include_in_token_scope` and `gui_order` attributes to `keycloak_openid_client_scope` resource ([#320](https://github.com/qvest-digital/terraform-provider-keycloak/pull/320)) +- add `base_path` provider attribute, improve login error messages ([#332](https://github.com/qvest-digital/terraform-provider-keycloak/pull/332)) +- add encryption attributes to `keycloak_saml_client` resource ([#342](https://github.com/qvest-digital/terraform-provider-keycloak/pull/342)) +- add `signature_algorithm` attribute to `keycloak_saml_client` resource ([#345](https://github.com/qvest-digital/terraform-provider-keycloak/pull/345)) BUG FIXES: -- fix import for `keycloak_openid_client_service_account_role` resource ([#314](https://github.com/mrparkers/terraform-provider-keycloak/pull/314)) -- fix realm role support for `keycloak_generic_client_role_mapper` resource ([#316](https://github.com/mrparkers/terraform-provider-keycloak/pull/316)) -- fix `keycloak_group` data source to support nested groups ([#334](https://github.com/mrparkers/terraform-provider-keycloak/pull/334)) -- fix `keycloak_group` data source / resource to support group names with backslash character ([#337](https://github.com/mrparkers/terraform-provider-keycloak/pull/337)) +- fix import for `keycloak_openid_client_service_account_role` resource ([#314](https://github.com/qvest-digital/terraform-provider-keycloak/pull/314)) +- fix realm role support for `keycloak_generic_client_role_mapper` resource ([#316](https://github.com/qvest-digital/terraform-provider-keycloak/pull/316)) +- fix `keycloak_group` data source to support nested groups ([#334](https://github.com/qvest-digital/terraform-provider-keycloak/pull/334)) +- fix `keycloak_group` data source / resource to support group names with backslash character ([#337](https://github.com/qvest-digital/terraform-provider-keycloak/pull/337)) Huge thanks to all the individuals who have contributed towards this release: @@ -617,25 +617,25 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -- new resource: `keycloak_openid_user_client_role_protocol_mapper` ([#299](https://github.com/mrparkers/terraform-provider-keycloak/pull/299)) -- new resource: `keycloak_openid_user_session_note_protocol_mapper` ([#309](https://github.com/mrparkers/terraform-provider-keycloak/pull/309)) +- new resource: `keycloak_openid_user_client_role_protocol_mapper` ([#299](https://github.com/qvest-digital/terraform-provider-keycloak/pull/299)) +- new resource: `keycloak_openid_user_session_note_protocol_mapper` ([#309](https://github.com/qvest-digital/terraform-provider-keycloak/pull/309)) IMPROVEMENTS: -- add `login_theme` attribute to `keycloak_openid_client` resource ([#278](https://github.com/mrparkers/terraform-provider-keycloak/pull/278)) -- add `aggregate_attributes` attribute to `keycloak_openid_user_attribute_protocol_mapper` resource ([#272](https://github.com/mrparkers/terraform-provider-keycloak/pull/272)) -- add `user_managed_access` attribute to `keycloak_realm` resource ([#275](https://github.com/mrparkers/terraform-provider-keycloak/pull/275)) -- support deployed JavaScript policies for `keycloak_openid_client_js_policy` resource ([#275](https://github.com/mrparkers/terraform-provider-keycloak/pull/275)) -- add `internal_id` computed attribute to `keycloak_realm` resource and data source ([#270](https://github.com/mrparkers/terraform-provider-keycloak/pull/270)) -- surface Keycloak API errors to users during `terraform plan` and `terraform apply` ([#304](https://github.com/mrparkers/terraform-provider-keycloak/pull/304)) -- add `kerberos` configuration for `keycloak_ldap_user_federation` resource ([#290](https://github.com/mrparkers/terraform-provider-keycloak/pull/290)) -- test all major versions of Keycloak in CI ([#294](https://github.com/mrparkers/terraform-provider-keycloak/pull/294)) -- add import support for `keycloak_generic_client_role_mapper` resource ([#310](https://github.com/mrparkers/terraform-provider-keycloak/pull/310)) -- use terraform-plugin-sdk user agent string in http client ([#311](https://github.com/mrparkers/terraform-provider-keycloak/pull/311)) +- add `login_theme` attribute to `keycloak_openid_client` resource ([#278](https://github.com/qvest-digital/terraform-provider-keycloak/pull/278)) +- add `aggregate_attributes` attribute to `keycloak_openid_user_attribute_protocol_mapper` resource ([#272](https://github.com/qvest-digital/terraform-provider-keycloak/pull/272)) +- add `user_managed_access` attribute to `keycloak_realm` resource ([#275](https://github.com/qvest-digital/terraform-provider-keycloak/pull/275)) +- support deployed JavaScript policies for `keycloak_openid_client_js_policy` resource ([#275](https://github.com/qvest-digital/terraform-provider-keycloak/pull/275)) +- add `internal_id` computed attribute to `keycloak_realm` resource and data source ([#270](https://github.com/qvest-digital/terraform-provider-keycloak/pull/270)) +- surface Keycloak API errors to users during `terraform plan` and `terraform apply` ([#304](https://github.com/qvest-digital/terraform-provider-keycloak/pull/304)) +- add `kerberos` configuration for `keycloak_ldap_user_federation` resource ([#290](https://github.com/qvest-digital/terraform-provider-keycloak/pull/290)) +- test all major versions of Keycloak in CI ([#294](https://github.com/qvest-digital/terraform-provider-keycloak/pull/294)) +- add import support for `keycloak_generic_client_role_mapper` resource ([#310](https://github.com/qvest-digital/terraform-provider-keycloak/pull/310)) +- use terraform-plugin-sdk user agent string in http client ([#311](https://github.com/qvest-digital/terraform-provider-keycloak/pull/311)) BUG FIXES: -- fix: mark `group_id` attribute as required for `keycloak_group_roles` resource ([#292](https://github.com/mrparkers/terraform-provider-keycloak/pull/292)) +- fix: mark `group_id` attribute as required for `keycloak_group_roles` resource ([#292](https://github.com/qvest-digital/terraform-provider-keycloak/pull/292)) Huge thanks to all the individuals who have contributed towards this release: @@ -657,24 +657,24 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -* new resource: `keycloak_ldap_hardcoded_group_mapper` ([#264](https://github.com/mrparkers/terraform-provider-keycloak/pull/264)) -* new data source: `keycloak_saml_client_installation_provider` ([#263](https://github.com/mrparkers/terraform-provider-keycloak/pull/263)) -* new resource: `keycloak_ldap_role_mapper` ([#265](https://github.com/mrparkers/terraform-provider-keycloak/pull/265)) +* new resource: `keycloak_ldap_hardcoded_group_mapper` ([#264](https://github.com/qvest-digital/terraform-provider-keycloak/pull/264)) +* new data source: `keycloak_saml_client_installation_provider` ([#263](https://github.com/qvest-digital/terraform-provider-keycloak/pull/263)) +* new resource: `keycloak_ldap_role_mapper` ([#265](https://github.com/qvest-digital/terraform-provider-keycloak/pull/265)) IMPROVEMENTS: -* add `tls_insecure_skip_verify` provider attribute ([#237](https://github.com/mrparkers/terraform-provider-keycloak/pull/237)) -* add `client_scope_id` attribute to `keycloak_generic_client_role_mapper` resource ([#253](https://github.com/mrparkers/terraform-provider-keycloak/pull/253)) -* add `email_verified` attribute to `keycloak_user` resource ([#256](https://github.com/mrparkers/terraform-provider-keycloak/pull/256)) -* add `JSON` as a valid `claim_value_type` for openid protocol mapper resources ([#260](https://github.com/mrparkers/terraform-provider-keycloak/pull/260)) -* add `force_name_id_format` attribute to `keycloak_saml_client` resource ([#261](https://github.com/mrparkers/terraform-provider-keycloak/pull/261)) -* add `consent_required` and `authentication_flow_binding_overrides` attributes for `keycloak_openid_client` resource ([#262](https://github.com/mrparkers/terraform-provider-keycloak/pull/262)) -* add `root_url` attribute to `keycloak_openid_client` resource ([#248](https://github.com/mrparkers/terraform-provider-keycloak/pull/248)) -* add federated identity support for `keycloak_user` resource ([#274](https://github.com/mrparkers/terraform-provider-keycloak/pull/274)) +* add `tls_insecure_skip_verify` provider attribute ([#237](https://github.com/qvest-digital/terraform-provider-keycloak/pull/237)) +* add `client_scope_id` attribute to `keycloak_generic_client_role_mapper` resource ([#253](https://github.com/qvest-digital/terraform-provider-keycloak/pull/253)) +* add `email_verified` attribute to `keycloak_user` resource ([#256](https://github.com/qvest-digital/terraform-provider-keycloak/pull/256)) +* add `JSON` as a valid `claim_value_type` for openid protocol mapper resources ([#260](https://github.com/qvest-digital/terraform-provider-keycloak/pull/260)) +* add `force_name_id_format` attribute to `keycloak_saml_client` resource ([#261](https://github.com/qvest-digital/terraform-provider-keycloak/pull/261)) +* add `consent_required` and `authentication_flow_binding_overrides` attributes for `keycloak_openid_client` resource ([#262](https://github.com/qvest-digital/terraform-provider-keycloak/pull/262)) +* add `root_url` attribute to `keycloak_openid_client` resource ([#248](https://github.com/qvest-digital/terraform-provider-keycloak/pull/248)) +* add federated identity support for `keycloak_user` resource ([#274](https://github.com/qvest-digital/terraform-provider-keycloak/pull/274)) BUG FIXES: -* correctly handle manually deleted clients when refreshing a `keycloak_openid_client_default_scopes` resource ([#252](https://github.com/mrparkers/terraform-provider-keycloak/pull/252)) +* correctly handle manually deleted clients when refreshing a `keycloak_openid_client_default_scopes` resource ([#252](https://github.com/qvest-digital/terraform-provider-keycloak/pull/252)) * correctly handle manually deleted clients when refreshing a `keycloak_openid_client_optional_scopes` resource Huge thanks to all the individuals who have contributed towards this release: @@ -702,19 +702,19 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -* new resources: `keycloak_authentication_flow`, `keycloak_authentication_subflow`, `keycloak_authentication_execution` ([#215](https://github.com/mrparkers/terraform-provider-keycloak/pull/215)) -* new resource: `keycloak_authentication_execution_config` ([#241](https://github.com/mrparkers/terraform-provider-keycloak/pull/241)) -* new resource: `keycloak_oidc_google_identity_provider` ([#240](https://github.com/mrparkers/terraform-provider-keycloak/pull/240)) -* new resource: `keycloak_ldap_msad_user_account_control_mapper` ([#244](https://github.com/mrparkers/terraform-provider-keycloak/pull/244)) -* new resources: `keycloak_openid_client_group_policy`, `keycloak_openid_client_role_policy`, `keycloak_openid_client_aggregate_policy`, `keycloak_openid_client_js_policy`, `keycloak_openid_client_time_policy`, `keycloak_openid_client_user_policy`, `keycloak_openid_client_client_policy` ([#246](https://github.com/mrparkers/terraform-provider-keycloak/pull/246)) -* new resource: `keycloak_generic_client_role_mapper` ([#242](https://github.com/mrparkers/terraform-provider-keycloak/pull/242)) +* new resources: `keycloak_authentication_flow`, `keycloak_authentication_subflow`, `keycloak_authentication_execution` ([#215](https://github.com/qvest-digital/terraform-provider-keycloak/pull/215)) +* new resource: `keycloak_authentication_execution_config` ([#241](https://github.com/qvest-digital/terraform-provider-keycloak/pull/241)) +* new resource: `keycloak_oidc_google_identity_provider` ([#240](https://github.com/qvest-digital/terraform-provider-keycloak/pull/240)) +* new resource: `keycloak_ldap_msad_user_account_control_mapper` ([#244](https://github.com/qvest-digital/terraform-provider-keycloak/pull/244)) +* new resources: `keycloak_openid_client_group_policy`, `keycloak_openid_client_role_policy`, `keycloak_openid_client_aggregate_policy`, `keycloak_openid_client_js_policy`, `keycloak_openid_client_time_policy`, `keycloak_openid_client_user_policy`, `keycloak_openid_client_client_policy` ([#246](https://github.com/qvest-digital/terraform-provider-keycloak/pull/246)) +* new resource: `keycloak_generic_client_role_mapper` ([#242](https://github.com/qvest-digital/terraform-provider-keycloak/pull/242)) IMPROVEMENTS: -* add `client_scope_id` attribute to `keycloak_generic_client_protocol_mapper` resource ([#229](https://github.com/mrparkers/terraform-provider-keycloak/pull/229)) -* add `root_ca_certificate` attribute to provider config ([#227](https://github.com/mrparkers/terraform-provider-keycloak/pull/227)) -* add `scopes` attribute to `keycloak_openid_client_authorization_permission` resource ([#220](https://github.com/mrparkers/terraform-provider-keycloak/pull/220)) -* add `access_token_lifespan` attribute to `keycloak_openid_client` resource ([#233](https://github.com/mrparkers/terraform-provider-keycloak/pull/233)) +* add `client_scope_id` attribute to `keycloak_generic_client_protocol_mapper` resource ([#229](https://github.com/qvest-digital/terraform-provider-keycloak/pull/229)) +* add `root_ca_certificate` attribute to provider config ([#227](https://github.com/qvest-digital/terraform-provider-keycloak/pull/227)) +* add `scopes` attribute to `keycloak_openid_client_authorization_permission` resource ([#220](https://github.com/qvest-digital/terraform-provider-keycloak/pull/220)) +* add `access_token_lifespan` attribute to `keycloak_openid_client` resource ([#233](https://github.com/qvest-digital/terraform-provider-keycloak/pull/233)) Huge thanks to all the individuals who have contributed towards this release: @@ -732,21 +732,21 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -* new resource: `keycloak_realm_events` ([#211](https://github.com/mrparkers/terraform-provider-keycloak/pull/211)) -* new resource: `resource_keycloak_openid_client_service_account_role` ([#202](https://github.com/mrparkers/terraform-provider-keycloak/pull/202)) +* new resource: `keycloak_realm_events` ([#211](https://github.com/qvest-digital/terraform-provider-keycloak/pull/211)) +* new resource: `resource_keycloak_openid_client_service_account_role` ([#202](https://github.com/qvest-digital/terraform-provider-keycloak/pull/202)) IMPROVEMENTS: -* add base_url attribute to `keycloak_openid_client` resource ([#201](https://github.com/mrparkers/terraform-provider-keycloak/pull/201)) -* allow configuration of the client timeout by an environment variable ([#206](https://github.com/mrparkers/terraform-provider-keycloak/pull/206)) -* add consent_required attribute to `keycloak_openid_client` resource ([#207](https://github.com/mrparkers/terraform-provider-keycloak/pull/207)) -* add admin_url attribute to `keycloak_openid_client` resource ([#203](https://github.com/mrparkers/terraform-provider-keycloak/pull/203)) -* add display_name_html attribute to `keycloak_realm` resource and data source ([#209](https://github.com/mrparkers/terraform-provider-keycloak/pull/209)) -* switch to terraform-plugin-sdk ([#214](https://github.com/mrparkers/terraform-provider-keycloak/pull/214)) +* add base_url attribute to `keycloak_openid_client` resource ([#201](https://github.com/qvest-digital/terraform-provider-keycloak/pull/201)) +* allow configuration of the client timeout by an environment variable ([#206](https://github.com/qvest-digital/terraform-provider-keycloak/pull/206)) +* add consent_required attribute to `keycloak_openid_client` resource ([#207](https://github.com/qvest-digital/terraform-provider-keycloak/pull/207)) +* add admin_url attribute to `keycloak_openid_client` resource ([#203](https://github.com/qvest-digital/terraform-provider-keycloak/pull/203)) +* add display_name_html attribute to `keycloak_realm` resource and data source ([#209](https://github.com/qvest-digital/terraform-provider-keycloak/pull/209)) +* switch to terraform-plugin-sdk ([#214](https://github.com/qvest-digital/terraform-provider-keycloak/pull/214)) BUG FIXES: -* URL encode role names to allow for special characters ([#213](https://github.com/mrparkers/terraform-provider-keycloak/pull/213)) +* URL encode role names to allow for special characters ([#213](https://github.com/qvest-digital/terraform-provider-keycloak/pull/213)) Huge thanks to all the individuals who have contributed towards this release: @@ -760,14 +760,14 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -* new resource: `keycloak_ldap_hardcoded_role_mapper` ([#195](https://github.com/mrparkers/terraform-provider-keycloak/pull/195)) +* new resource: `keycloak_ldap_hardcoded_role_mapper` ([#195](https://github.com/qvest-digital/terraform-provider-keycloak/pull/195)) IMPROVEMENTS: -* add `full_scope_allowed` attribute to `keycloak_openid_client` resource ([#193](https://github.com/mrparkers/terraform-provider-keycloak/pull/193)) -* add `exclude_session_state_from_auth_response` attribute to `keycloak_openid_client` resource ([#191](https://github.com/mrparkers/terraform-provider-keycloak/pull/191)) -* allow empty value for `pkce_code_challenge_method` attribute on `keycloak_openid_client` resource ([#198](https://github.com/mrparkers/terraform-provider-keycloak/pull/198)) -* support attributes for `keycloak_group` resource ([#199](https://github.com/mrparkers/terraform-provider-keycloak/pull/199)) +* add `full_scope_allowed` attribute to `keycloak_openid_client` resource ([#193](https://github.com/qvest-digital/terraform-provider-keycloak/pull/193)) +* add `exclude_session_state_from_auth_response` attribute to `keycloak_openid_client` resource ([#191](https://github.com/qvest-digital/terraform-provider-keycloak/pull/191)) +* allow empty value for `pkce_code_challenge_method` attribute on `keycloak_openid_client` resource ([#198](https://github.com/qvest-digital/terraform-provider-keycloak/pull/198)) +* support attributes for `keycloak_group` resource ([#199](https://github.com/qvest-digital/terraform-provider-keycloak/pull/199)) Huge thanks to all the individuals who have contributed towards this release: @@ -781,14 +781,14 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -* add `keycloak_openid_client_service_account_user` data source ([#181](https://github.com/mrparkers/terraform-provider-keycloak/pull/181)) -* add `keycloak_group` data source ([#185](https://github.com/mrparkers/terraform-provider-keycloak/pull/185)) +* add `keycloak_openid_client_service_account_user` data source ([#181](https://github.com/qvest-digital/terraform-provider-keycloak/pull/181)) +* add `keycloak_group` data source ([#185](https://github.com/qvest-digital/terraform-provider-keycloak/pull/185)) IMPROVEMENTS: -* support Keycloak v8.0.0 ([#183](https://github.com/mrparkers/terraform-provider-keycloak/pull/183)) -* new functionality for `keycloak_realm`: brute_force_detection, ssl_required, and custom attributes ([#183](https://github.com/mrparkers/terraform-provider-keycloak/pull/183)) -* allow you to prevent refresh token reuse with a new `revoke_refresh_token` attribute for the `keycloak_realm` resource ([#183](https://github.com/mrparkers/terraform-provider-keycloak/pull/183)) +* support Keycloak v8.0.0 ([#183](https://github.com/qvest-digital/terraform-provider-keycloak/pull/183)) +* new functionality for `keycloak_realm`: brute_force_detection, ssl_required, and custom attributes ([#183](https://github.com/qvest-digital/terraform-provider-keycloak/pull/183)) +* allow you to prevent refresh token reuse with a new `revoke_refresh_token` attribute for the `keycloak_realm` resource ([#183](https://github.com/qvest-digital/terraform-provider-keycloak/pull/183)) * **note: please refer to the [docs](https://mrparkers.github.io/terraform-provider-keycloak/resources/keycloak_realm/#tokens) for the new configuration values if you currently use `refresh_token_max_reuse`** Huge thanks to all the individuals who have contributed towards this release: @@ -801,7 +801,7 @@ Huge thanks to all the individuals who have contributed towards this release: BUG FIXES: -* fix: update Keycloak API call to handle groups with more than 100 members ([#179](https://github.com/mrparkers/terraform-provider-keycloak/pull/179)) +* fix: update Keycloak API call to handle groups with more than 100 members ([#179](https://github.com/qvest-digital/terraform-provider-keycloak/pull/179)) Huge thanks to all the individuals who have contributed towards this release: @@ -812,7 +812,7 @@ Huge thanks to all the individuals who have contributed towards this release: BUG FIXES: -* correctly handle Keycloak role names that contain a forward slash ([#175](https://github.com/mrparkers/terraform-provider-keycloak/pull/175)) +* correctly handle Keycloak role names that contain a forward slash ([#175](https://github.com/qvest-digital/terraform-provider-keycloak/pull/175)) Huge thanks to all the individuals who have contributed towards this release: @@ -822,7 +822,7 @@ Huge thanks to all the individuals who have contributed towards this release: IMPROVEMENTS: -* use cookiejar for Keycloak API requests ([#173](https://github.com/mrparkers/terraform-provider-keycloak/pull/173)) +* use cookiejar for Keycloak API requests ([#173](https://github.com/qvest-digital/terraform-provider-keycloak/pull/173)) Huge thanks to all the individuals who have contributed towards this release: @@ -832,12 +832,12 @@ Huge thanks to all the individuals who have contributed towards this release: IMPROVEMENTS: -* add `pkce_code_challenge_method` attribute for `keycloak_openid_client` resource ([#170](https://github.com/mrparkers/terraform-provider-keycloak/pull/170)) +* add `pkce_code_challenge_method` attribute for `keycloak_openid_client` resource ([#170](https://github.com/qvest-digital/terraform-provider-keycloak/pull/170)) BUG FIXES: -* always use valid client secret for `keycloak_oidc_identity_provider` resource ([#171](https://github.com/mrparkers/terraform-provider-keycloak/pull/171)) -* fix state issues for `keycloak_openid_client_service_account_role` resource ([#171](https://github.com/mrparkers/terraform-provider-keycloak/pull/171)) +* always use valid client secret for `keycloak_oidc_identity_provider` resource ([#171](https://github.com/qvest-digital/terraform-provider-keycloak/pull/171)) +* fix state issues for `keycloak_openid_client_service_account_role` resource ([#171](https://github.com/qvest-digital/terraform-provider-keycloak/pull/171)) Huge thanks to all the individuals who have contributed towards this release: @@ -848,8 +848,8 @@ Huge thanks to all the individuals who have contributed towards this release: BUG FIXES: -* fix required attribute for `keycloak_realm` data source ([#166](https://github.com/mrparkers/terraform-provider-keycloak/pull/166)) -* automatically retry role deletion if the first attempt fails ([#168](https://github.com/mrparkers/terraform-provider-keycloak/pull/168)) +* fix required attribute for `keycloak_realm` data source ([#166](https://github.com/qvest-digital/terraform-provider-keycloak/pull/166)) +* automatically retry role deletion if the first attempt fails ([#168](https://github.com/qvest-digital/terraform-provider-keycloak/pull/168)) Huge thanks to all the individuals who have contributed towards this release: @@ -859,17 +859,17 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -* new resource: `keycloak_openid_user_realm_role_protocol_mapper` ([#159](https://github.com/mrparkers/terraform-provider-keycloak/pull/159)) -* new data source: `keycloak_realm` ([#160](https://github.com/mrparkers/terraform-provider-keycloak/pull/160)) +* new resource: `keycloak_openid_user_realm_role_protocol_mapper` ([#159](https://github.com/qvest-digital/terraform-provider-keycloak/pull/159)) +* new data source: `keycloak_realm` ([#160](https://github.com/qvest-digital/terraform-provider-keycloak/pull/160)) IMPROVEMENTS: -* added `timeout` provider attribute ([#155](https://github.com/mrparkers/terraform-provider-keycloak/pull/155)) -* always export `serviceAccountId` for `keycloak_openid_client` resource ([#162](https://github.com/mrparkers/terraform-provider-keycloak/pull/162)) +* added `timeout` provider attribute ([#155](https://github.com/qvest-digital/terraform-provider-keycloak/pull/155)) +* always export `serviceAccountId` for `keycloak_openid_client` resource ([#162](https://github.com/qvest-digital/terraform-provider-keycloak/pull/162)) BUG FIXES: -* fix default value for `reset_credentials_flow` attribute in `keycloak_realm` resource ([#158](https://github.com/mrparkers/terraform-provider-keycloak/pull/158)) +* fix default value for `reset_credentials_flow` attribute in `keycloak_realm` resource ([#158](https://github.com/qvest-digital/terraform-provider-keycloak/pull/158)) Huge thanks to all the individuals who have contributed towards this release: @@ -882,28 +882,28 @@ Huge thanks to all the individuals who have contributed towards this release: ## 1.10.0 (September 6, 2019) -note: this release contains a [bug](https://github.com/mrparkers/terraform-provider-keycloak/issues/156) in the `keycloak_realm` resource that incorrectly sets the default attribute for `reset_credentials_flow` to `"registration"`. Please ensure that you set this attribute manually to override the incorrect default until a future release fixes this issue. +note: this release contains a [bug](https://github.com/qvest-digital/terraform-provider-keycloak/issues/156) in the `keycloak_realm` resource that incorrectly sets the default attribute for `reset_credentials_flow` to `"registration"`. Please ensure that you set this attribute manually to override the incorrect default until a future release fixes this issue. FEATURES: -* new resource: `keycloak_required_action` ([#131](https://github.com/mrparkers/terraform-provider-keycloak/pull/131)) -* new resource: `keycloak_default_groups` ([#146](https://github.com/mrparkers/terraform-provider-keycloak/pull/146)) -* new resources: `keycloak_role`, `keycloak_group_roles`, `keycloak_openid_hardcoded_role_protocol_mapper` ([#143](https://github.com/mrparkers/terraform-provider-keycloak/pull/143)) -* new data source: `keycloak_role` ([#143](https://github.com/mrparkers/terraform-provider-keycloak/pull/143)) +* new resource: `keycloak_required_action` ([#131](https://github.com/qvest-digital/terraform-provider-keycloak/pull/131)) +* new resource: `keycloak_default_groups` ([#146](https://github.com/qvest-digital/terraform-provider-keycloak/pull/146)) +* new resources: `keycloak_role`, `keycloak_group_roles`, `keycloak_openid_hardcoded_role_protocol_mapper` ([#143](https://github.com/qvest-digital/terraform-provider-keycloak/pull/143)) +* new data source: `keycloak_role` ([#143](https://github.com/qvest-digital/terraform-provider-keycloak/pull/143)) IMPROVEMENTS: -* add `security_defences` attribute to `keycloak_realm` resource ([#130](https://github.com/mrparkers/terraform-provider-keycloak/pull/130)) -* support custom config for `keycloak_custom_user_federation` resource ([#134](https://github.com/mrparkers/terraform-provider-keycloak/pull/134)) -* add `initial_login` provider attribute to optionally avoid requests during provider setup ([#136](https://github.com/mrparkers/terraform-provider-keycloak/pull/136)) -* support custom config for `keycloak_oidc_identity_provider` resource ([#137](https://github.com/mrparkers/terraform-provider-keycloak/pull/137)) -* add `password_policy` attribute for `keycloak_realm` resource ([#139](https://github.com/mrparkers/terraform-provider-keycloak/pull/139)) -* add flow binding attributes for `keycloak_realm` resource ([#140](https://github.com/mrparkers/terraform-provider-keycloak/pull/140)) +* add `security_defences` attribute to `keycloak_realm` resource ([#130](https://github.com/qvest-digital/terraform-provider-keycloak/pull/130)) +* support custom config for `keycloak_custom_user_federation` resource ([#134](https://github.com/qvest-digital/terraform-provider-keycloak/pull/134)) +* add `initial_login` provider attribute to optionally avoid requests during provider setup ([#136](https://github.com/qvest-digital/terraform-provider-keycloak/pull/136)) +* support custom config for `keycloak_oidc_identity_provider` resource ([#137](https://github.com/qvest-digital/terraform-provider-keycloak/pull/137)) +* add `password_policy` attribute for `keycloak_realm` resource ([#139](https://github.com/qvest-digital/terraform-provider-keycloak/pull/139)) +* add flow binding attributes for `keycloak_realm` resource ([#140](https://github.com/qvest-digital/terraform-provider-keycloak/pull/140)) BUG FIXES: -* fix user attributes to handle attributes longer than 255 characters ([#132](https://github.com/mrparkers/terraform-provider-keycloak/pull/132)) -* fix import for `keycloak_oidc_identity_provider` ([#142](https://github.com/mrparkers/terraform-provider-keycloak/pull/142)) +* fix user attributes to handle attributes longer than 255 characters ([#132](https://github.com/qvest-digital/terraform-provider-keycloak/pull/132)) +* fix import for `keycloak_oidc_identity_provider` ([#142](https://github.com/qvest-digital/terraform-provider-keycloak/pull/142)) Huge thanks to all the individuals who have contributed towards this release: @@ -919,16 +919,16 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -* add `full_scope_allowed` attribute to `keycloak_saml_client` resource ([#118](https://github.com/mrparkers/terraform-provider-keycloak/pull/118)) -* add `internationalization` attribute to `keycloak_realm` resource ([#124](https://github.com/mrparkers/terraform-provider-keycloak/pull/124)) -* add `smtp_server` attribute to `keycloak_realm` resource ([#122](https://github.com/mrparkers/terraform-provider-keycloak/pull/122)) +* add `full_scope_allowed` attribute to `keycloak_saml_client` resource ([#118](https://github.com/qvest-digital/terraform-provider-keycloak/pull/118)) +* add `internationalization` attribute to `keycloak_realm` resource ([#124](https://github.com/qvest-digital/terraform-provider-keycloak/pull/124)) +* add `smtp_server` attribute to `keycloak_realm` resource ([#122](https://github.com/qvest-digital/terraform-provider-keycloak/pull/122)) IMPROVEMENTS: -* allow the provider to use a confidential client with the password grant ([#114](https://github.com/mrparkers/terraform-provider-keycloak/pull/114)) -* update Terraform SDK to 0.12.1 ([#120](https://github.com/mrparkers/terraform-provider-keycloak/pull/120)) -* bump dependency versions for custom user federation example ([#121](https://github.com/mrparkers/terraform-provider-keycloak/pull/121)) -* add static binary to release for use within Alpine Docker iamges ([#129](https://github.com/mrparkers/terraform-provider-keycloak/pull/129)) +* allow the provider to use a confidential client with the password grant ([#114](https://github.com/qvest-digital/terraform-provider-keycloak/pull/114)) +* update Terraform SDK to 0.12.1 ([#120](https://github.com/qvest-digital/terraform-provider-keycloak/pull/120)) +* bump dependency versions for custom user federation example ([#121](https://github.com/qvest-digital/terraform-provider-keycloak/pull/121)) +* add static binary to release for use within Alpine Docker iamges ([#129](https://github.com/qvest-digital/terraform-provider-keycloak/pull/129)) Huge thanks to all the individuals who have contributed towards this release: @@ -941,16 +941,16 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -* new resources: `keycloak_openid_client_authorization_resource`, `keycloak_openid_client_authorization_scope`, `keycloak_openid_client_authorization_permission`, `keycloak_openid_client_service_account_role` ([#104](https://github.com/mrparkers/terraform-provider-keycloak/pull/104)) +* new resources: `keycloak_openid_client_authorization_resource`, `keycloak_openid_client_authorization_scope`, `keycloak_openid_client_authorization_permission`, `keycloak_openid_client_service_account_role` ([#104](https://github.com/qvest-digital/terraform-provider-keycloak/pull/104)) - note: docs for these resources will be released at a later date. for now, please refer to the source files. -* new data sources: keycloak_openid_client, keycloak_openid_client_authorization_policy ([#104](https://github.com/mrparkers/terraform-provider-keycloak/pull/104)) +* new data sources: keycloak_openid_client, keycloak_openid_client_authorization_policy ([#104](https://github.com/qvest-digital/terraform-provider-keycloak/pull/104)) - note: docs for these data sources will be released at a later date. for now, please refer to the source files. IMPROVEMENTS: -* chore: update provider SDK to 0.12 ([#107](https://github.com/mrparkers/terraform-provider-keycloak/pull/107)) -* chore: support Keycloak v6.0.1 ([#106](https://github.com/mrparkers/terraform-provider-keycloak/pull/106)) -* chore: renames provider resource/data files ([#105](https://github.com/mrparkers/terraform-provider-keycloak/pull/105)) +* chore: update provider SDK to 0.12 ([#107](https://github.com/qvest-digital/terraform-provider-keycloak/pull/107)) +* chore: support Keycloak v6.0.1 ([#106](https://github.com/qvest-digital/terraform-provider-keycloak/pull/106)) +* chore: renames provider resource/data files ([#105](https://github.com/qvest-digital/terraform-provider-keycloak/pull/105)) Huge thanks to all the individuals who have contributed towards this release: @@ -961,12 +961,12 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -* new resources: `keycloak_identity_provider` and mappers ([#92](https://github.com/mrparkers/terraform-provider-keycloak/pull/92)) +* new resources: `keycloak_identity_provider` and mappers ([#92](https://github.com/qvest-digital/terraform-provider-keycloak/pull/92)) - note: docs for these resources will be released at a later date. for now, please refer to the source files. IMPROVEMENTS: -* new attributes added for `keycloak_saml_client` resource ([#103](https://github.com/mrparkers/terraform-provider-keycloak/pull/103)) +* new attributes added for `keycloak_saml_client` resource ([#103](https://github.com/qvest-digital/terraform-provider-keycloak/pull/103)) Huge thanks to all the individuals who have contributed towards this release: @@ -977,22 +977,22 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -* new resource: `keycloak_openid_client_optional_scopes` ([#96](https://github.com/mrparkers/terraform-provider-keycloak/pull/96)) -* new resource: `keycloak_openid_audience_protocol_mapper` ([#97](https://github.com/mrparkers/terraform-provider-keycloak/pull/97)) +* new resource: `keycloak_openid_client_optional_scopes` ([#96](https://github.com/qvest-digital/terraform-provider-keycloak/pull/96)) +* new resource: `keycloak_openid_audience_protocol_mapper` ([#97](https://github.com/qvest-digital/terraform-provider-keycloak/pull/97)) ## 1.5.0 (February 22, 2019) FEATURES: -* add support for non-master realms and resource owner password grant for Keycloak authentication ([#88](https://github.com/mrparkers/terraform-provider-keycloak/pull/88)) +* add support for non-master realms and resource owner password grant for Keycloak authentication ([#88](https://github.com/qvest-digital/terraform-provider-keycloak/pull/88)) IMPROVEMENTS: -* support Keycloak v4.8.3.Final and Terraform v0.11.11 ([#93](https://github.com/mrparkers/terraform-provider-keycloak/pull/93)) +* support Keycloak v4.8.3.Final and Terraform v0.11.11 ([#93](https://github.com/qvest-digital/terraform-provider-keycloak/pull/93)) BUG FIXES: -* handle 404 errors when reading a group for group memberships ([#95](https://github.com/mrparkers/terraform-provider-keycloak/pull/95)) +* handle 404 errors when reading a group for group memberships ([#95](https://github.com/qvest-digital/terraform-provider-keycloak/pull/95)) Huge thanks to all the individuals who have contributed towards this release: @@ -1002,34 +1002,34 @@ Huge thanks to all the individuals who have contributed towards this release: FEATURES: -* new resource: `keycloak_saml_user_property_protocol_mapper` ([#85](https://github.com/mrparkers/terraform-provider-keycloak/pull/85)) +* new resource: `keycloak_saml_user_property_protocol_mapper` ([#85](https://github.com/qvest-digital/terraform-provider-keycloak/pull/85)) ## 1.3.0 (January 25, 2019) FEATURES: -* new resource: `keycloak_saml_user_attribute_protocol_mapper` ([#84](https://github.com/mrparkers/terraform-provider-keycloak/pull/84)) +* new resource: `keycloak_saml_user_attribute_protocol_mapper` ([#84](https://github.com/qvest-digital/terraform-provider-keycloak/pull/84)) ## 1.2.0 (January 24, 2019) FEATURES: -* new resource: `keycloak_saml_client` ([#82](https://github.com/mrparkers/terraform-provider-keycloak/pull/82)) +* new resource: `keycloak_saml_client` ([#82](https://github.com/qvest-digital/terraform-provider-keycloak/pull/82)) IMPROVEMENTS: -* add validation for usernames to ensure they are always lowercase ([#83](https://github.com/mrparkers/terraform-provider-keycloak/pull/83)) +* add validation for usernames to ensure they are always lowercase ([#83](https://github.com/qvest-digital/terraform-provider-keycloak/pull/83)) ## 1.1.0 (January 7, 2019) IMPROVEMENTS: -* openid_client: add web_origins attribute ([#81](https://github.com/mrparkers/terraform-provider-keycloak/pull/81)) -* user: add initial_password attribute ([#77](https://github.com/mrparkers/terraform-provider-keycloak/pull/77)) +* openid_client: add web_origins attribute ([#81](https://github.com/qvest-digital/terraform-provider-keycloak/pull/81)) +* user: add initial_password attribute ([#77](https://github.com/qvest-digital/terraform-provider-keycloak/pull/77)) BUG FIXES: -* ldap mappers: don't assume component fields are returned by Keycloak API ([#80](https://github.com/mrparkers/terraform-provider-keycloak/pull/80)) +* ldap mappers: don't assume component fields are returned by Keycloak API ([#80](https://github.com/qvest-digital/terraform-provider-keycloak/pull/80)) Huge thanks to all the individuals who have contributed towards this release: diff --git a/README.md b/README.md index f511e2352..940a69b12 100644 --- a/README.md +++ b/README.md @@ -47,14 +47,14 @@ The following versions are used when running acceptance tests in CI: ## Releases This provider uses [GoReleaser](https://goreleaser.com/) to build and publish releases. Each release published to GitHub -contains binary files for Linux, macOS (darwin), and Windows, as configured within the [`.goreleaser.yml`](https://github.com/mrparkers/terraform-provider-keycloak/blob/master/.goreleaser.yml) +contains binary files for Linux, macOS (darwin), and Windows, as configured within the [`.goreleaser.yml`](https://github.com/qvest-digital/terraform-provider-keycloak/blob/master/.goreleaser.yml) file. Each release also contains a `terraform-provider-keycloak_${RELEASE_VERSION}_SHA256SUMS` file, accompanied by a signature created by a PGP key with the fingerprint `C508 6791 5E11 6CD2`. This key can be found on my Keybase account at https://keybase.io/mrparkers. -You can find the list of releases [here](https://github.com/mrparkers/terraform-provider-keycloak/releases). -You can find the changelog for each version [here](https://github.com/mrparkers/terraform-provider-keycloak/blob/master/CHANGELOG.md). +You can find the list of releases [here](https://github.com/qvest-digital/terraform-provider-keycloak/releases). +You can find the changelog for each version [here](https://github.com/qvest-digital/terraform-provider-keycloak/blob/master/CHANGELOG.md). Note: Prior to v2.0.0, a statically linked build for use within Alpine linux was included with each release. This is no longer done due to [GoReleaser not supporting CGO](https://goreleaser.com/limitations/cgo/). Instead of using a statically linked, @@ -94,4 +94,4 @@ make testacc ## License -[MIT](https://github.com/mrparkers/terraform-provider-keycloak/blob/master/LICENSE) +[MIT](https://github.com/qvest-digital/terraform-provider-keycloak/blob/master/LICENSE) diff --git a/docs/resources/custom_user_federation.md b/docs/resources/custom_user_federation.md index 850450b94..697ab5df3 100644 --- a/docs/resources/custom_user_federation.md +++ b/docs/resources/custom_user_federation.md @@ -7,7 +7,7 @@ page_title: "keycloak_custom_user_federation Resource" Allows for creating and managing custom user federation providers within Keycloak. A custom user federation provider is an implementation of Keycloak's [User Storage SPI](https://www.keycloak.org/docs/4.2/server_development/index.html#_user-storage-spi). -An example of this implementation can be found [here](https://github.com/mrparkers/terraform-provider-keycloak/tree/master/custom-user-federation-example). +An example of this implementation can be found [here](https://github.com/qvest-digital/terraform-provider-keycloak/tree/master/custom-user-federation-example). ## Example Usage diff --git a/docs/resources/group_permissions.md b/docs/resources/group_permissions.md index 1ced4818e..5ea24cb7f 100644 --- a/docs/resources/group_permissions.md +++ b/docs/resources/group_permissions.md @@ -8,7 +8,7 @@ Allows you to manage all group Scope Based Permissions https://www.keycloak.org/ This is part of a preview Keycloak feature: `admin_fine_grained_authz` (see https://www.keycloak.org/docs/latest/server_admin/#_fine_grain_permissions). This feature can be enabled with the Keycloak option `-Dkeycloak.profile.feature.admin_fine_grained_authz=enabled`. See the -example [`docker-compose.yml`](https://github.com/mrparkers/terraform-provider-keycloak/blob/898094df6b3e01c3404981ce7ca268142d6ff0e5/docker-compose.yml#L21) file for an example. +example [`docker-compose.yml`](https://github.com/qvest-digital/terraform-provider-keycloak/blob/898094df6b3e01c3404981ce7ca268142d6ff0e5/docker-compose.yml#L21) file for an example. When enabling Roles Permissions, Keycloak does several things automatically: 1. Enable Authorization on built-in `realm-management` client (if not already enabled). diff --git a/docs/resources/user.md b/docs/resources/user.md index a5601cb0d..1184f4c50 100644 --- a/docs/resources/user.md +++ b/docs/resources/user.md @@ -62,8 +62,8 @@ resource "keycloak_user" "user_with_initial_password" { - `first_name` - (Optional) The user's first name. - `last_name` - (Optional) The user's last name. - `attributes` - (Optional) A map representing attributes for the user. In order to add multivalue attributes, use `##` to seperate the values. Max length for each value is 255 chars -- `required_actions` - (Optional) A list of required user actions. -- `federated_identity` - (Optional) When specified, the user will be linked to a federated identity provider. Refer to the [federated user example](https://github.com/mrparkers/terraform-provider-keycloak/blob/master/example/federated_user_example.tf) for more details. +- `required_actions` - (Optional) A list of required user actions. +- `federated_identity` - (Optional) When specified, the user will be linked to a federated identity provider. Refer to the [federated user example](https://github.com/qvest-digital/terraform-provider-keycloak/blob/master/example/federated_user_example.tf) for more details. - `identity_provider` - (Required) The name of the identity provider - `user_id` - (Required) The ID of the user defined in the identity provider - `user_name` - (Required) The user name of the user defined in the identity provider diff --git a/docs/resources/users_permissions.md b/docs/resources/users_permissions.md index 506fa7e1c..3a0e54e4b 100644 --- a/docs/resources/users_permissions.md +++ b/docs/resources/users_permissions.md @@ -8,7 +8,7 @@ Allows you to manage fine-grained permissions for all users in a realm: https:// This is part of a preview Keycloak feature: `admin_fine_grained_authz` (see https://www.keycloak.org/docs/latest/server_admin/#_fine_grain_permissions). This feature can be enabled with the Keycloak option `-Dkeycloak.profile.feature.admin_fine_grained_authz=enabled`. See the -example [`docker-compose.yml`](https://github.com/mrparkers/terraform-provider-keycloak/blob/898094df6b3e01c3404981ce7ca268142d6ff0e5/docker-compose.yml#L21) file for an example. +example [`docker-compose.yml`](https://github.com/qvest-digital/terraform-provider-keycloak/blob/898094df6b3e01c3404981ce7ca268142d6ff0e5/docker-compose.yml#L21) file for an example. When enabling fine-grained permissions for users, Keycloak does several things automatically: 1. Enable Authorization on built-in `realm-management` client (if not already enabled). diff --git a/keycloak/extra_config.go b/keycloak/extra_config.go index 953955d18..5660736cc 100644 --- a/keycloak/extra_config.go +++ b/keycloak/extra_config.go @@ -2,7 +2,7 @@ package keycloak import ( "encoding/json" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" "reflect" "strconv" "strings" diff --git a/keycloak/identity_provider.go b/keycloak/identity_provider.go index 0c9b45251..650d2bc86 100644 --- a/keycloak/identity_provider.go +++ b/keycloak/identity_provider.go @@ -3,7 +3,7 @@ package keycloak import ( "context" "fmt" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" "reflect" ) diff --git a/keycloak/openid_client.go b/keycloak/openid_client.go index e2a37df27..aa36891b9 100644 --- a/keycloak/openid_client.go +++ b/keycloak/openid_client.go @@ -3,7 +3,7 @@ package keycloak import ( "context" "fmt" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" "reflect" ) diff --git a/keycloak/openid_client_scope.go b/keycloak/openid_client_scope.go index e760f5013..4df915a90 100644 --- a/keycloak/openid_client_scope.go +++ b/keycloak/openid_client_scope.go @@ -3,7 +3,7 @@ package keycloak import ( "context" "fmt" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" ) type OpenidClientScope struct { diff --git a/keycloak/realm.go b/keycloak/realm.go index 6afdf82ee..384415357 100644 --- a/keycloak/realm.go +++ b/keycloak/realm.go @@ -3,7 +3,7 @@ package keycloak import ( "context" "fmt" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" "strings" ) diff --git a/keycloak/saml_client.go b/keycloak/saml_client.go index c62731afb..7dfaed8a8 100644 --- a/keycloak/saml_client.go +++ b/keycloak/saml_client.go @@ -3,7 +3,7 @@ package keycloak import ( "context" "fmt" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" "reflect" ) diff --git a/keycloak/saml_client_scope.go b/keycloak/saml_client_scope.go index ef86c3952..10a116589 100644 --- a/keycloak/saml_client_scope.go +++ b/keycloak/saml_client_scope.go @@ -3,7 +3,7 @@ package keycloak import ( "context" "fmt" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" ) type SamlClientScope struct { diff --git a/main.go b/main.go index e8544827e..53a5fcbf6 100644 --- a/main.go +++ b/main.go @@ -3,7 +3,7 @@ package main import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/plugin" - "github.com/mrparkers/terraform-provider-keycloak/provider" + "github.com/qvest-digital/terraform-provider-keycloak/provider" ) func main() { diff --git a/provider/data_source_keycloak_authentication_execution.go b/provider/data_source_keycloak_authentication_execution.go index b0db979cf..a133f3f26 100644 --- a/provider/data_source_keycloak_authentication_execution.go +++ b/provider/data_source_keycloak_authentication_execution.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakAuthenticationExecution() *schema.Resource { diff --git a/provider/data_source_keycloak_authentication_flow.go b/provider/data_source_keycloak_authentication_flow.go index ea15b54dd..f9e5312e4 100644 --- a/provider/data_source_keycloak_authentication_flow.go +++ b/provider/data_source_keycloak_authentication_flow.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakAuthenticationFlow() *schema.Resource { diff --git a/provider/data_source_keycloak_client_description_converter.go b/provider/data_source_keycloak_client_description_converter.go index 7c177f5f2..cf54ce2b4 100644 --- a/provider/data_source_keycloak_client_description_converter.go +++ b/provider/data_source_keycloak_client_description_converter.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakClientDescriptionConverter() *schema.Resource { diff --git a/provider/data_source_keycloak_group.go b/provider/data_source_keycloak_group.go index 86427d054..839b61f51 100644 --- a/provider/data_source_keycloak_group.go +++ b/provider/data_source_keycloak_group.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakGroup() *schema.Resource { diff --git a/provider/data_source_keycloak_openid_client.go b/provider/data_source_keycloak_openid_client.go index b248c5f56..6e1779727 100644 --- a/provider/data_source_keycloak_openid_client.go +++ b/provider/data_source_keycloak_openid_client.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakOpenidClient() *schema.Resource { diff --git a/provider/data_source_keycloak_openid_client_authorization_policy.go b/provider/data_source_keycloak_openid_client_authorization_policy.go index 380cce9ef..185beab66 100644 --- a/provider/data_source_keycloak_openid_client_authorization_policy.go +++ b/provider/data_source_keycloak_openid_client_authorization_policy.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakOpenidClientAuthorizationPolicy() *schema.Resource { diff --git a/provider/data_source_keycloak_openid_client_scope.go b/provider/data_source_keycloak_openid_client_scope.go index b6e607bac..a22aa5da5 100644 --- a/provider/data_source_keycloak_openid_client_scope.go +++ b/provider/data_source_keycloak_openid_client_scope.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakOpenidClientScope() *schema.Resource { diff --git a/provider/data_source_keycloak_openid_client_service_account_user.go b/provider/data_source_keycloak_openid_client_service_account_user.go index 35fa3c2a3..e1759481e 100644 --- a/provider/data_source_keycloak_openid_client_service_account_user.go +++ b/provider/data_source_keycloak_openid_client_service_account_user.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakOpenidClientServiceAccountUser() *schema.Resource { diff --git a/provider/data_source_keycloak_realm.go b/provider/data_source_keycloak_realm.go index 569885080..5b00e32a8 100644 --- a/provider/data_source_keycloak_realm.go +++ b/provider/data_source_keycloak_realm.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakRealm() *schema.Resource { diff --git a/provider/data_source_keycloak_realm_keys.go b/provider/data_source_keycloak_realm_keys.go index 46de28b54..bbf05f00f 100644 --- a/provider/data_source_keycloak_realm_keys.go +++ b/provider/data_source_keycloak_realm_keys.go @@ -6,7 +6,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakRealmKeys() *schema.Resource { diff --git a/provider/data_source_keycloak_role.go b/provider/data_source_keycloak_role.go index d6e53084b..1e5f2affb 100644 --- a/provider/data_source_keycloak_role.go +++ b/provider/data_source_keycloak_role.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakRole() *schema.Resource { diff --git a/provider/data_source_keycloak_saml_client.go b/provider/data_source_keycloak_saml_client.go index c614eb69f..6eebb871d 100644 --- a/provider/data_source_keycloak_saml_client.go +++ b/provider/data_source_keycloak_saml_client.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakSamlClient() *schema.Resource { diff --git a/provider/data_source_keycloak_saml_client_installation_provider.go b/provider/data_source_keycloak_saml_client_installation_provider.go index 53b47e9f6..a26fc1f6c 100644 --- a/provider/data_source_keycloak_saml_client_installation_provider.go +++ b/provider/data_source_keycloak_saml_client_installation_provider.go @@ -6,7 +6,7 @@ import ( "encoding/base64" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakSamlClientInstallationProvider() *schema.Resource { diff --git a/provider/data_source_keycloak_user.go b/provider/data_source_keycloak_user.go index 7e9f4884d..5f274e6d6 100644 --- a/provider/data_source_keycloak_user.go +++ b/provider/data_source_keycloak_user.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakUser() *schema.Resource { diff --git a/provider/data_source_keycloak_user_realm_roles.go b/provider/data_source_keycloak_user_realm_roles.go index a3734fa7f..1e6a0791e 100644 --- a/provider/data_source_keycloak_user_realm_roles.go +++ b/provider/data_source_keycloak_user_realm_roles.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func dataSourceKeycloakUserRealmRoles() *schema.Resource { diff --git a/provider/generic_keycloak_identity_provider.go b/provider/generic_keycloak_identity_provider.go index bcc7b3862..aa74c9c68 100644 --- a/provider/generic_keycloak_identity_provider.go +++ b/provider/generic_keycloak_identity_provider.go @@ -6,7 +6,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "reflect" "strings" ) diff --git a/provider/generic_keycloak_identity_provider_mapper.go b/provider/generic_keycloak_identity_provider_mapper.go index c5fb3310c..5974ce01f 100644 --- a/provider/generic_keycloak_identity_provider_mapper.go +++ b/provider/generic_keycloak_identity_provider_mapper.go @@ -7,7 +7,7 @@ import ( "strings" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) type identityProviderMapperDataGetterFunc func(ctx context.Context, data *schema.ResourceData, meta interface{}) (*keycloak.IdentityProviderMapper, error) diff --git a/provider/permissions.go b/provider/permissions.go index cdbf379bb..fd18a9e2b 100644 --- a/provider/permissions.go +++ b/provider/permissions.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func setOpenidClientScopePermissionPolicy(ctx context.Context, keycloakClient *keycloak.KeycloakClient, realmId string, realmManagementClientId string, authorizationPermissionId string, scopeDataSet *schema.Set) error { diff --git a/provider/provider.go b/provider/provider.go index 00e08e889..65551e90b 100644 --- a/provider/provider.go +++ b/provider/provider.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/meta" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func KeycloakProvider(client *keycloak.KeycloakClient) *schema.Provider { diff --git a/provider/provider_test.go b/provider/provider_test.go index 04c45eb4c..ff039b998 100644 --- a/provider/provider_test.go +++ b/provider/provider_test.go @@ -6,7 +6,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/meta" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "os" "testing" ) diff --git a/provider/resource_keycloak_attribute_importer_identity_provider_mapper.go b/provider/resource_keycloak_attribute_importer_identity_provider_mapper.go index d2b4b9826..012a04ef1 100644 --- a/provider/resource_keycloak_attribute_importer_identity_provider_mapper.go +++ b/provider/resource_keycloak_attribute_importer_identity_provider_mapper.go @@ -5,7 +5,7 @@ import ( "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakAttributeImporterIdentityProviderMapper() *schema.Resource { diff --git a/provider/resource_keycloak_attribute_importer_identity_provider_mapper_test.go b/provider/resource_keycloak_attribute_importer_identity_provider_mapper_test.go index ab6467edb..a157e27ec 100644 --- a/provider/resource_keycloak_attribute_importer_identity_provider_mapper_test.go +++ b/provider/resource_keycloak_attribute_importer_identity_provider_mapper_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakAttributeImporterIdentityProviderMapper_basic(t *testing.T) { diff --git a/provider/resource_keycloak_attribute_to_role_identity_provider_mapper.go b/provider/resource_keycloak_attribute_to_role_identity_provider_mapper.go index 9da79d4b8..72756b6d7 100644 --- a/provider/resource_keycloak_attribute_to_role_identity_provider_mapper.go +++ b/provider/resource_keycloak_attribute_to_role_identity_provider_mapper.go @@ -5,7 +5,7 @@ import ( "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakAttributeToRoleIdentityProviderMapper() *schema.Resource { diff --git a/provider/resource_keycloak_attribute_to_role_identity_provider_mapper_test.go b/provider/resource_keycloak_attribute_to_role_identity_provider_mapper_test.go index 97dcaa41d..361543afd 100644 --- a/provider/resource_keycloak_attribute_to_role_identity_provider_mapper_test.go +++ b/provider/resource_keycloak_attribute_to_role_identity_provider_mapper_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakAttributeToRoleIdentityProviderMapper_basic(t *testing.T) { diff --git a/provider/resource_keycloak_authentication_bindings.go b/provider/resource_keycloak_authentication_bindings.go index 80d3fcdbd..123b3aec3 100644 --- a/provider/resource_keycloak_authentication_bindings.go +++ b/provider/resource_keycloak_authentication_bindings.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakAuthenticationBindings() *schema.Resource { diff --git a/provider/resource_keycloak_authentication_execution.go b/provider/resource_keycloak_authentication_execution.go index 59a3d21ba..6532afae2 100644 --- a/provider/resource_keycloak_authentication_execution.go +++ b/provider/resource_keycloak_authentication_execution.go @@ -9,7 +9,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakAuthenticationExecution() *schema.Resource { diff --git a/provider/resource_keycloak_authentication_execution_config.go b/provider/resource_keycloak_authentication_execution_config.go index a02cef399..9bc54e661 100644 --- a/provider/resource_keycloak_authentication_execution_config.go +++ b/provider/resource_keycloak_authentication_execution_config.go @@ -8,7 +8,7 @@ import ( "strings" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakAuthenticationExecutionConfig() *schema.Resource { diff --git a/provider/resource_keycloak_authentication_execution_config_test.go b/provider/resource_keycloak_authentication_execution_config_test.go index 34d20d64c..87d98396c 100644 --- a/provider/resource_keycloak_authentication_execution_config_test.go +++ b/provider/resource_keycloak_authentication_execution_config_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakAuthenticationExecutionConfig_basic(t *testing.T) { diff --git a/provider/resource_keycloak_authentication_execution_test.go b/provider/resource_keycloak_authentication_execution_test.go index b4f3d4a41..3248086b0 100644 --- a/provider/resource_keycloak_authentication_execution_test.go +++ b/provider/resource_keycloak_authentication_execution_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakAuthenticationExecution_basic(t *testing.T) { diff --git a/provider/resource_keycloak_authentication_flow.go b/provider/resource_keycloak_authentication_flow.go index 8dba589d6..1d26a216a 100644 --- a/provider/resource_keycloak_authentication_flow.go +++ b/provider/resource_keycloak_authentication_flow.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" ) diff --git a/provider/resource_keycloak_authentication_flow_test.go b/provider/resource_keycloak_authentication_flow_test.go index 5b62c16ec..0ef1590e8 100644 --- a/provider/resource_keycloak_authentication_flow_test.go +++ b/provider/resource_keycloak_authentication_flow_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "testing" ) diff --git a/provider/resource_keycloak_authentication_subflow.go b/provider/resource_keycloak_authentication_subflow.go index d9e5728e6..e741253a4 100644 --- a/provider/resource_keycloak_authentication_subflow.go +++ b/provider/resource_keycloak_authentication_subflow.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" ) diff --git a/provider/resource_keycloak_authentication_subflow_test.go b/provider/resource_keycloak_authentication_subflow_test.go index 3b5438ced..e85ef72ee 100644 --- a/provider/resource_keycloak_authentication_subflow_test.go +++ b/provider/resource_keycloak_authentication_subflow_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "testing" ) diff --git a/provider/resource_keycloak_custom_identity_provider_mapper.go b/provider/resource_keycloak_custom_identity_provider_mapper.go index 9161dcdee..87b188ffa 100644 --- a/provider/resource_keycloak_custom_identity_provider_mapper.go +++ b/provider/resource_keycloak_custom_identity_provider_mapper.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakCustomIdentityProviderMapper() *schema.Resource { diff --git a/provider/resource_keycloak_custom_identity_provider_mapper_test.go b/provider/resource_keycloak_custom_identity_provider_mapper_test.go index 95a966ad5..c5847f7da 100644 --- a/provider/resource_keycloak_custom_identity_provider_mapper_test.go +++ b/provider/resource_keycloak_custom_identity_provider_mapper_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakCustomIdentityProviderMapper_basic(t *testing.T) { diff --git a/provider/resource_keycloak_custom_user_federation.go b/provider/resource_keycloak_custom_user_federation.go index 1a1be2b2d..5fe4fa02c 100644 --- a/provider/resource_keycloak_custom_user_federation.go +++ b/provider/resource_keycloak_custom_user_federation.go @@ -10,7 +10,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakCustomUserFederation() *schema.Resource { diff --git a/provider/resource_keycloak_custom_user_federation_test.go b/provider/resource_keycloak_custom_user_federation_test.go index 61f42113f..149fb82f4 100644 --- a/provider/resource_keycloak_custom_user_federation_test.go +++ b/provider/resource_keycloak_custom_user_federation_test.go @@ -8,7 +8,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakCustomUserFederation_basic(t *testing.T) { diff --git a/provider/resource_keycloak_default_groups.go b/provider/resource_keycloak_default_groups.go index a8287fe8f..2528e336b 100644 --- a/provider/resource_keycloak_default_groups.go +++ b/provider/resource_keycloak_default_groups.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakDefaultGroups() *schema.Resource { diff --git a/provider/resource_keycloak_default_groups_test.go b/provider/resource_keycloak_default_groups_test.go index 48ba862d1..56c4961b8 100644 --- a/provider/resource_keycloak_default_groups_test.go +++ b/provider/resource_keycloak_default_groups_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakDefaultGroups_basic(t *testing.T) { diff --git a/provider/resource_keycloak_default_roles.go b/provider/resource_keycloak_default_roles.go index f399a250f..08b255692 100644 --- a/provider/resource_keycloak_default_roles.go +++ b/provider/resource_keycloak_default_roles.go @@ -8,7 +8,7 @@ import ( "strings" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakDefaultRoles() *schema.Resource { diff --git a/provider/resource_keycloak_default_roles_test.go b/provider/resource_keycloak_default_roles_test.go index 56ad76aef..8943b1770 100644 --- a/provider/resource_keycloak_default_roles_test.go +++ b/provider/resource_keycloak_default_roles_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "testing" ) diff --git a/provider/resource_keycloak_generic_client_protocol_mapper.go b/provider/resource_keycloak_generic_client_protocol_mapper.go index 076305b67..824b3d19e 100644 --- a/provider/resource_keycloak_generic_client_protocol_mapper.go +++ b/provider/resource_keycloak_generic_client_protocol_mapper.go @@ -6,7 +6,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakGenericClientProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_generic_client_protocol_mapper_test.go b/provider/resource_keycloak_generic_client_protocol_mapper_test.go index e42a70b1f..96360fafb 100644 --- a/provider/resource_keycloak_generic_client_protocol_mapper_test.go +++ b/provider/resource_keycloak_generic_client_protocol_mapper_test.go @@ -4,7 +4,7 @@ import ( "fmt" "testing" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" diff --git a/provider/resource_keycloak_generic_client_role_mapper_test.go b/provider/resource_keycloak_generic_client_role_mapper_test.go index 8a373ab1e..ef7d27cfc 100644 --- a/provider/resource_keycloak_generic_client_role_mapper_test.go +++ b/provider/resource_keycloak_generic_client_role_mapper_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakGenericClientRoleMapper_basic(t *testing.T) { diff --git a/provider/resource_keycloak_generic_protocol_mapper.go b/provider/resource_keycloak_generic_protocol_mapper.go index c6e26d35b..428f50d1d 100644 --- a/provider/resource_keycloak_generic_protocol_mapper.go +++ b/provider/resource_keycloak_generic_protocol_mapper.go @@ -6,7 +6,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakGenericProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_generic_protocol_mapper_test.go b/provider/resource_keycloak_generic_protocol_mapper_test.go index 81cbec373..cc419bdab 100644 --- a/provider/resource_keycloak_generic_protocol_mapper_test.go +++ b/provider/resource_keycloak_generic_protocol_mapper_test.go @@ -4,7 +4,7 @@ import ( "fmt" "testing" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" diff --git a/provider/resource_keycloak_generic_role_mapper.go b/provider/resource_keycloak_generic_role_mapper.go index 46e037bbd..b151159b5 100644 --- a/provider/resource_keycloak_generic_role_mapper.go +++ b/provider/resource_keycloak_generic_role_mapper.go @@ -7,7 +7,7 @@ import ( "strings" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakGenericRoleMapper() *schema.Resource { diff --git a/provider/resource_keycloak_generic_role_mapper_test.go b/provider/resource_keycloak_generic_role_mapper_test.go index f60ef07ff..56503f581 100644 --- a/provider/resource_keycloak_generic_role_mapper_test.go +++ b/provider/resource_keycloak_generic_role_mapper_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakGenericRoleMapper_basic(t *testing.T) { diff --git a/provider/resource_keycloak_group.go b/provider/resource_keycloak_group.go index 32d2e8be8..4f4c39e06 100644 --- a/provider/resource_keycloak_group.go +++ b/provider/resource_keycloak_group.go @@ -8,7 +8,7 @@ import ( "strings" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakGroup() *schema.Resource { diff --git a/provider/resource_keycloak_group_memberships.go b/provider/resource_keycloak_group_memberships.go index ca27880a5..a48e40d8c 100644 --- a/provider/resource_keycloak_group_memberships.go +++ b/provider/resource_keycloak_group_memberships.go @@ -6,7 +6,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakGroupMemberships() *schema.Resource { diff --git a/provider/resource_keycloak_group_memberships_test.go b/provider/resource_keycloak_group_memberships_test.go index bea358eb8..d20d4e40b 100644 --- a/provider/resource_keycloak_group_memberships_test.go +++ b/provider/resource_keycloak_group_memberships_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "strings" "testing" diff --git a/provider/resource_keycloak_group_permissions.go b/provider/resource_keycloak_group_permissions.go index b223b5b42..8314a04e8 100644 --- a/provider/resource_keycloak_group_permissions.go +++ b/provider/resource_keycloak_group_permissions.go @@ -8,7 +8,7 @@ import ( "strings" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakGroupPermissions() *schema.Resource { diff --git a/provider/resource_keycloak_group_permissions_test.go b/provider/resource_keycloak_group_permissions_test.go index 0345c18f1..d92659f1e 100644 --- a/provider/resource_keycloak_group_permissions_test.go +++ b/provider/resource_keycloak_group_permissions_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakGroupPermission_basic(t *testing.T) { diff --git a/provider/resource_keycloak_group_roles.go b/provider/resource_keycloak_group_roles.go index 8932ae9bb..0d4beace5 100644 --- a/provider/resource_keycloak_group_roles.go +++ b/provider/resource_keycloak_group_roles.go @@ -6,7 +6,7 @@ import ( "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" ) diff --git a/provider/resource_keycloak_group_roles_test.go b/provider/resource_keycloak_group_roles_test.go index 794b5bf44..89bb8b902 100644 --- a/provider/resource_keycloak_group_roles_test.go +++ b/provider/resource_keycloak_group_roles_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_group_test.go b/provider/resource_keycloak_group_test.go index 549a0f461..7d0512489 100644 --- a/provider/resource_keycloak_group_test.go +++ b/provider/resource_keycloak_group_test.go @@ -8,7 +8,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakGroup_basic(t *testing.T) { diff --git a/provider/resource_keycloak_hardcoded_attribute_identity_provider_mapper.go b/provider/resource_keycloak_hardcoded_attribute_identity_provider_mapper.go index 20f91c0cd..02d26bd37 100644 --- a/provider/resource_keycloak_hardcoded_attribute_identity_provider_mapper.go +++ b/provider/resource_keycloak_hardcoded_attribute_identity_provider_mapper.go @@ -4,7 +4,7 @@ import ( "context" "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakHardcodedAttributeIdentityProviderMapper() *schema.Resource { diff --git a/provider/resource_keycloak_hardcoded_attribute_identity_provider_mapper_test.go b/provider/resource_keycloak_hardcoded_attribute_identity_provider_mapper_test.go index e60cf3cf6..4ecb159a6 100644 --- a/provider/resource_keycloak_hardcoded_attribute_identity_provider_mapper_test.go +++ b/provider/resource_keycloak_hardcoded_attribute_identity_provider_mapper_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakHardcodedAttributeIdentityProviderMapper_basic(t *testing.T) { diff --git a/provider/resource_keycloak_hardcoded_role_identity_provider_mapper.go b/provider/resource_keycloak_hardcoded_role_identity_provider_mapper.go index 667b502a5..7c9902b4e 100644 --- a/provider/resource_keycloak_hardcoded_role_identity_provider_mapper.go +++ b/provider/resource_keycloak_hardcoded_role_identity_provider_mapper.go @@ -3,7 +3,7 @@ package provider import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakHardcodedRoleIdentityProviderMapper() *schema.Resource { diff --git a/provider/resource_keycloak_hardcoded_role_identity_provider_mapper_test.go b/provider/resource_keycloak_hardcoded_role_identity_provider_mapper_test.go index 087ab9f0b..93b842b34 100644 --- a/provider/resource_keycloak_hardcoded_role_identity_provider_mapper_test.go +++ b/provider/resource_keycloak_hardcoded_role_identity_provider_mapper_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakHardcodedRoleIdentityProviderMapper_basic(t *testing.T) { diff --git a/provider/resource_keycloak_identity_provider_token_exchange_scope_permission.go b/provider/resource_keycloak_identity_provider_token_exchange_scope_permission.go index a5ee268c9..9c98582ee 100644 --- a/provider/resource_keycloak_identity_provider_token_exchange_scope_permission.go +++ b/provider/resource_keycloak_identity_provider_token_exchange_scope_permission.go @@ -9,7 +9,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "math/rand" "strings" ) diff --git a/provider/resource_keycloak_identity_provider_token_exchange_scope_permission_test.go b/provider/resource_keycloak_identity_provider_token_exchange_scope_permission_test.go index e77cb4d12..19a9abb17 100644 --- a/provider/resource_keycloak_identity_provider_token_exchange_scope_permission_test.go +++ b/provider/resource_keycloak_identity_provider_token_exchange_scope_permission_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_ldap_custom_mapper.go b/provider/resource_keycloak_ldap_custom_mapper.go index a1a275053..a8fb87fb8 100644 --- a/provider/resource_keycloak_ldap_custom_mapper.go +++ b/provider/resource_keycloak_ldap_custom_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakLdapCustomMapper() *schema.Resource { diff --git a/provider/resource_keycloak_ldap_custom_mapper_test.go b/provider/resource_keycloak_ldap_custom_mapper_test.go index a72fa1dd0..be39ffbac 100644 --- a/provider/resource_keycloak_ldap_custom_mapper_test.go +++ b/provider/resource_keycloak_ldap_custom_mapper_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakLdapCustomMapper_basic(t *testing.T) { diff --git a/provider/resource_keycloak_ldap_full_name_mapper.go b/provider/resource_keycloak_ldap_full_name_mapper.go index 4715a465f..636795ca3 100644 --- a/provider/resource_keycloak_ldap_full_name_mapper.go +++ b/provider/resource_keycloak_ldap_full_name_mapper.go @@ -5,7 +5,7 @@ import ( "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" ) diff --git a/provider/resource_keycloak_ldap_full_name_mapper_test.go b/provider/resource_keycloak_ldap_full_name_mapper_test.go index d82037973..a0fed8034 100644 --- a/provider/resource_keycloak_ldap_full_name_mapper_test.go +++ b/provider/resource_keycloak_ldap_full_name_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_ldap_group_mapper.go b/provider/resource_keycloak_ldap_group_mapper.go index 1cb35ae7b..22ae99fe0 100644 --- a/provider/resource_keycloak_ldap_group_mapper.go +++ b/provider/resource_keycloak_ldap_group_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" ) diff --git a/provider/resource_keycloak_ldap_group_mapper_test.go b/provider/resource_keycloak_ldap_group_mapper_test.go index c3a6eb4f3..4760cda95 100644 --- a/provider/resource_keycloak_ldap_group_mapper_test.go +++ b/provider/resource_keycloak_ldap_group_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_ldap_hardcoded_attribute_mapper.go b/provider/resource_keycloak_ldap_hardcoded_attribute_mapper.go index 2f495c284..a8e3e53a7 100644 --- a/provider/resource_keycloak_ldap_hardcoded_attribute_mapper.go +++ b/provider/resource_keycloak_ldap_hardcoded_attribute_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakLdapHardcodedAttributeMapper() *schema.Resource { diff --git a/provider/resource_keycloak_ldap_hardcoded_attribute_mapper_test.go b/provider/resource_keycloak_ldap_hardcoded_attribute_mapper_test.go index f5aefbfc4..364c97ef4 100644 --- a/provider/resource_keycloak_ldap_hardcoded_attribute_mapper_test.go +++ b/provider/resource_keycloak_ldap_hardcoded_attribute_mapper_test.go @@ -8,7 +8,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakLdapHardcodedAttributeMapper_basic(t *testing.T) { diff --git a/provider/resource_keycloak_ldap_hardcoded_group_mapper.go b/provider/resource_keycloak_ldap_hardcoded_group_mapper.go index 7464c3046..558296e5d 100644 --- a/provider/resource_keycloak_ldap_hardcoded_group_mapper.go +++ b/provider/resource_keycloak_ldap_hardcoded_group_mapper.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakLdapHardcodedGroupMapper() *schema.Resource { diff --git a/provider/resource_keycloak_ldap_hardcoded_group_mapper_test.go b/provider/resource_keycloak_ldap_hardcoded_group_mapper_test.go index f6cdd93aa..2693a3aa4 100644 --- a/provider/resource_keycloak_ldap_hardcoded_group_mapper_test.go +++ b/provider/resource_keycloak_ldap_hardcoded_group_mapper_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakLdapHardcodedGroupMapper_basic(t *testing.T) { diff --git a/provider/resource_keycloak_ldap_hardcoded_role_mapper.go b/provider/resource_keycloak_ldap_hardcoded_role_mapper.go index 627a77118..69a961415 100644 --- a/provider/resource_keycloak_ldap_hardcoded_role_mapper.go +++ b/provider/resource_keycloak_ldap_hardcoded_role_mapper.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakLdapHardcodedRoleMapper() *schema.Resource { diff --git a/provider/resource_keycloak_ldap_hardcoded_role_mapper_test.go b/provider/resource_keycloak_ldap_hardcoded_role_mapper_test.go index 91ae9b8fd..fe0cd5e1e 100644 --- a/provider/resource_keycloak_ldap_hardcoded_role_mapper_test.go +++ b/provider/resource_keycloak_ldap_hardcoded_role_mapper_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakLdapHardcodedRoleMapper_basic(t *testing.T) { diff --git a/provider/resource_keycloak_ldap_msad_lds_user_account_control_mapper.go b/provider/resource_keycloak_ldap_msad_lds_user_account_control_mapper.go index f8dc5febc..9482878f5 100644 --- a/provider/resource_keycloak_ldap_msad_lds_user_account_control_mapper.go +++ b/provider/resource_keycloak_ldap_msad_lds_user_account_control_mapper.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakLdapMsadLdsUserAccountControlMapper() *schema.Resource { diff --git a/provider/resource_keycloak_ldap_msad_lds_user_account_control_mapper_test.go b/provider/resource_keycloak_ldap_msad_lds_user_account_control_mapper_test.go index efe7d1f85..a40bbb142 100644 --- a/provider/resource_keycloak_ldap_msad_lds_user_account_control_mapper_test.go +++ b/provider/resource_keycloak_ldap_msad_lds_user_account_control_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "testing" ) diff --git a/provider/resource_keycloak_ldap_msad_user_account_control_mapper.go b/provider/resource_keycloak_ldap_msad_user_account_control_mapper.go index ec85023d4..2cdbbf50a 100644 --- a/provider/resource_keycloak_ldap_msad_user_account_control_mapper.go +++ b/provider/resource_keycloak_ldap_msad_user_account_control_mapper.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakLdapMsadUserAccountControlMapper() *schema.Resource { diff --git a/provider/resource_keycloak_ldap_msad_user_account_control_mapper_test.go b/provider/resource_keycloak_ldap_msad_user_account_control_mapper_test.go index 4b27b65d2..217a24a6b 100644 --- a/provider/resource_keycloak_ldap_msad_user_account_control_mapper_test.go +++ b/provider/resource_keycloak_ldap_msad_user_account_control_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "testing" ) diff --git a/provider/resource_keycloak_ldap_role_mapper.go b/provider/resource_keycloak_ldap_role_mapper.go index 87c334711..d521fb37a 100644 --- a/provider/resource_keycloak_ldap_role_mapper.go +++ b/provider/resource_keycloak_ldap_role_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" ) diff --git a/provider/resource_keycloak_ldap_role_mapper_test.go b/provider/resource_keycloak_ldap_role_mapper_test.go index 938717f50..ef59146ec 100644 --- a/provider/resource_keycloak_ldap_role_mapper_test.go +++ b/provider/resource_keycloak_ldap_role_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_ldap_user_attribute_mapper.go b/provider/resource_keycloak_ldap_user_attribute_mapper.go index ea22d3431..2856a29d1 100644 --- a/provider/resource_keycloak_ldap_user_attribute_mapper.go +++ b/provider/resource_keycloak_ldap_user_attribute_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakLdapUserAttributeMapper() *schema.Resource { diff --git a/provider/resource_keycloak_ldap_user_attribute_mapper_test.go b/provider/resource_keycloak_ldap_user_attribute_mapper_test.go index 0e46e681b..221dcf387 100644 --- a/provider/resource_keycloak_ldap_user_attribute_mapper_test.go +++ b/provider/resource_keycloak_ldap_user_attribute_mapper_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakLdapUserAttributeMapper_basic(t *testing.T) { diff --git a/provider/resource_keycloak_ldap_user_federation.go b/provider/resource_keycloak_ldap_user_federation.go index fb6e0da1c..a6294ed05 100644 --- a/provider/resource_keycloak_ldap_user_federation.go +++ b/provider/resource_keycloak_ldap_user_federation.go @@ -9,7 +9,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) var ( diff --git a/provider/resource_keycloak_ldap_user_federation_test.go b/provider/resource_keycloak_ldap_user_federation_test.go index 035493bcc..a247a4c66 100644 --- a/provider/resource_keycloak_ldap_user_federation_test.go +++ b/provider/resource_keycloak_ldap_user_federation_test.go @@ -9,7 +9,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakLdapUserFederation_basic(t *testing.T) { diff --git a/provider/resource_keycloak_oidc_google_identity_provider.go b/provider/resource_keycloak_oidc_google_identity_provider.go index 7831e513d..e4ed1932d 100644 --- a/provider/resource_keycloak_oidc_google_identity_provider.go +++ b/provider/resource_keycloak_oidc_google_identity_provider.go @@ -3,8 +3,8 @@ package provider import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/imdario/mergo" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" ) func resourceKeycloakOidcGoogleIdentityProvider() *schema.Resource { diff --git a/provider/resource_keycloak_oidc_google_identity_provider_test.go b/provider/resource_keycloak_oidc_google_identity_provider_test.go index 63c55f9fd..279c2fe82 100644 --- a/provider/resource_keycloak_oidc_google_identity_provider_test.go +++ b/provider/resource_keycloak_oidc_google_identity_provider_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "strconv" "testing" diff --git a/provider/resource_keycloak_oidc_identity_provider.go b/provider/resource_keycloak_oidc_identity_provider.go index 0e6e36c3f..937193fad 100644 --- a/provider/resource_keycloak_oidc_identity_provider.go +++ b/provider/resource_keycloak_oidc_identity_provider.go @@ -3,8 +3,8 @@ package provider import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/imdario/mergo" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" ) func resourceKeycloakOidcIdentityProvider() *schema.Resource { diff --git a/provider/resource_keycloak_oidc_identity_provider_test.go b/provider/resource_keycloak_oidc_identity_provider_test.go index 1cb7520e0..388c0cdd7 100644 --- a/provider/resource_keycloak_oidc_identity_provider_test.go +++ b/provider/resource_keycloak_oidc_identity_provider_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "strconv" "testing" diff --git a/provider/resource_keycloak_openid_audience_protocol_mapper.go b/provider/resource_keycloak_openid_audience_protocol_mapper.go index 6e7d96a78..b92c1d4c6 100644 --- a/provider/resource_keycloak_openid_audience_protocol_mapper.go +++ b/provider/resource_keycloak_openid_audience_protocol_mapper.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenIdAudienceProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_openid_audience_protocol_mapper_test.go b/provider/resource_keycloak_openid_audience_protocol_mapper_test.go index c663a3cb9..44e283674 100644 --- a/provider/resource_keycloak_openid_audience_protocol_mapper_test.go +++ b/provider/resource_keycloak_openid_audience_protocol_mapper_test.go @@ -8,7 +8,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenIdAudienceProtocolMapper_basicClient(t *testing.T) { diff --git a/provider/resource_keycloak_openid_audience_resolve_protocol_mapper.go b/provider/resource_keycloak_openid_audience_resolve_protocol_mapper.go index bdff85784..d2e9d2f2e 100644 --- a/provider/resource_keycloak_openid_audience_resolve_protocol_mapper.go +++ b/provider/resource_keycloak_openid_audience_resolve_protocol_mapper.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenIdAudienceResolveProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_openid_audience_resolve_protocol_mapper_test.go b/provider/resource_keycloak_openid_audience_resolve_protocol_mapper_test.go index a0295bbfb..5d34606dd 100644 --- a/provider/resource_keycloak_openid_audience_resolve_protocol_mapper_test.go +++ b/provider/resource_keycloak_openid_audience_resolve_protocol_mapper_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenIdAudienceResolveProtocolMapper_basicClient(t *testing.T) { diff --git a/provider/resource_keycloak_openid_client.go b/provider/resource_keycloak_openid_client.go index 06a9be69c..eea2f7bd3 100644 --- a/provider/resource_keycloak_openid_client.go +++ b/provider/resource_keycloak_openid_client.go @@ -5,7 +5,7 @@ import ( "errors" "fmt" "github.com/imdario/mergo" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" "reflect" "strings" @@ -14,7 +14,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/customdiff" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) var ( diff --git a/provider/resource_keycloak_openid_client_authorization_aggregate_policy.go b/provider/resource_keycloak_openid_client_authorization_aggregate_policy.go index 21e52ac1f..cbc9aa035 100644 --- a/provider/resource_keycloak_openid_client_authorization_aggregate_policy.go +++ b/provider/resource_keycloak_openid_client_authorization_aggregate_policy.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenidClientAuthorizationAggregatePolicy() *schema.Resource { diff --git a/provider/resource_keycloak_openid_client_authorization_aggregate_policy_test.go b/provider/resource_keycloak_openid_client_authorization_aggregate_policy_test.go index 295680dc9..aaaab7fde 100644 --- a/provider/resource_keycloak_openid_client_authorization_aggregate_policy_test.go +++ b/provider/resource_keycloak_openid_client_authorization_aggregate_policy_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenidClientAuthorizationAggregatePolicy(t *testing.T) { diff --git a/provider/resource_keycloak_openid_client_authorization_client_policy.go b/provider/resource_keycloak_openid_client_authorization_client_policy.go index a0b6a2b5e..696d6add1 100644 --- a/provider/resource_keycloak_openid_client_authorization_client_policy.go +++ b/provider/resource_keycloak_openid_client_authorization_client_policy.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenidClientAuthorizationClientPolicy() *schema.Resource { diff --git a/provider/resource_keycloak_openid_client_authorization_client_policy_test.go b/provider/resource_keycloak_openid_client_authorization_client_policy_test.go index 6ddcfa3d2..e2c424286 100644 --- a/provider/resource_keycloak_openid_client_authorization_client_policy_test.go +++ b/provider/resource_keycloak_openid_client_authorization_client_policy_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenidClientAuthorizationClientPolicy(t *testing.T) { diff --git a/provider/resource_keycloak_openid_client_authorization_group_policy.go b/provider/resource_keycloak_openid_client_authorization_group_policy.go index 5d2bb543e..1d7c9924e 100644 --- a/provider/resource_keycloak_openid_client_authorization_group_policy.go +++ b/provider/resource_keycloak_openid_client_authorization_group_policy.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenidClientAuthorizationGroupPolicy() *schema.Resource { diff --git a/provider/resource_keycloak_openid_client_authorization_group_policy_test.go b/provider/resource_keycloak_openid_client_authorization_group_policy_test.go index 9536fc110..bf95d50e8 100644 --- a/provider/resource_keycloak_openid_client_authorization_group_policy_test.go +++ b/provider/resource_keycloak_openid_client_authorization_group_policy_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenidClientAuthorizationGroupPolicy(t *testing.T) { diff --git a/provider/resource_keycloak_openid_client_authorization_js_policy.go b/provider/resource_keycloak_openid_client_authorization_js_policy.go index 69547528b..a5f8a142d 100644 --- a/provider/resource_keycloak_openid_client_authorization_js_policy.go +++ b/provider/resource_keycloak_openid_client_authorization_js_policy.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenidClientAuthorizationJSPolicy() *schema.Resource { diff --git a/provider/resource_keycloak_openid_client_authorization_js_policy_test.go b/provider/resource_keycloak_openid_client_authorization_js_policy_test.go index 2db81860d..a9aa64151 100644 --- a/provider/resource_keycloak_openid_client_authorization_js_policy_test.go +++ b/provider/resource_keycloak_openid_client_authorization_js_policy_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenidClientAuthorizationJSPolicy(t *testing.T) { diff --git a/provider/resource_keycloak_openid_client_authorization_permission.go b/provider/resource_keycloak_openid_client_authorization_permission.go index fc7046671..eae314107 100644 --- a/provider/resource_keycloak_openid_client_authorization_permission.go +++ b/provider/resource_keycloak_openid_client_authorization_permission.go @@ -9,7 +9,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) var ( diff --git a/provider/resource_keycloak_openid_client_authorization_permission_test.go b/provider/resource_keycloak_openid_client_authorization_permission_test.go index 7bb0a2df6..ce852bc21 100644 --- a/provider/resource_keycloak_openid_client_authorization_permission_test.go +++ b/provider/resource_keycloak_openid_client_authorization_permission_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenidClientAuthorizationPermission_basic(t *testing.T) { diff --git a/provider/resource_keycloak_openid_client_authorization_resource.go b/provider/resource_keycloak_openid_client_authorization_resource.go index 150b45bef..1fe026326 100644 --- a/provider/resource_keycloak_openid_client_authorization_resource.go +++ b/provider/resource_keycloak_openid_client_authorization_resource.go @@ -5,7 +5,7 @@ import ( "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" ) diff --git a/provider/resource_keycloak_openid_client_authorization_resource_test.go b/provider/resource_keycloak_openid_client_authorization_resource_test.go index f34221253..f34139392 100644 --- a/provider/resource_keycloak_openid_client_authorization_resource_test.go +++ b/provider/resource_keycloak_openid_client_authorization_resource_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "testing" ) diff --git a/provider/resource_keycloak_openid_client_authorization_role_policy.go b/provider/resource_keycloak_openid_client_authorization_role_policy.go index 064b5ca0b..95a8d7ae3 100644 --- a/provider/resource_keycloak_openid_client_authorization_role_policy.go +++ b/provider/resource_keycloak_openid_client_authorization_role_policy.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenidClientAuthorizationRolePolicy() *schema.Resource { diff --git a/provider/resource_keycloak_openid_client_authorization_role_policy_test.go b/provider/resource_keycloak_openid_client_authorization_role_policy_test.go index 9ca1e33f4..b4c431939 100644 --- a/provider/resource_keycloak_openid_client_authorization_role_policy_test.go +++ b/provider/resource_keycloak_openid_client_authorization_role_policy_test.go @@ -8,7 +8,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenidClientAuthorizationRolePolicy_basic(t *testing.T) { diff --git a/provider/resource_keycloak_openid_client_authorization_scope.go b/provider/resource_keycloak_openid_client_authorization_scope.go index 4e50f4fc7..056eba4bb 100644 --- a/provider/resource_keycloak_openid_client_authorization_scope.go +++ b/provider/resource_keycloak_openid_client_authorization_scope.go @@ -5,7 +5,7 @@ import ( "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" ) diff --git a/provider/resource_keycloak_openid_client_authorization_scope_test.go b/provider/resource_keycloak_openid_client_authorization_scope_test.go index d089d771e..e4b229f90 100644 --- a/provider/resource_keycloak_openid_client_authorization_scope_test.go +++ b/provider/resource_keycloak_openid_client_authorization_scope_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "testing" ) diff --git a/provider/resource_keycloak_openid_client_authorization_time_policy.go b/provider/resource_keycloak_openid_client_authorization_time_policy.go index 51e69e174..ed0ffcda9 100644 --- a/provider/resource_keycloak_openid_client_authorization_time_policy.go +++ b/provider/resource_keycloak_openid_client_authorization_time_policy.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenidClientAuthorizationTimePolicy() *schema.Resource { diff --git a/provider/resource_keycloak_openid_client_authorization_time_policy_test.go b/provider/resource_keycloak_openid_client_authorization_time_policy_test.go index e63648359..cabff7d0b 100644 --- a/provider/resource_keycloak_openid_client_authorization_time_policy_test.go +++ b/provider/resource_keycloak_openid_client_authorization_time_policy_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenidClientAuthorizationTimePolicy(t *testing.T) { diff --git a/provider/resource_keycloak_openid_client_authorization_user_policy.go b/provider/resource_keycloak_openid_client_authorization_user_policy.go index 64cc0b129..b3f05ae8c 100644 --- a/provider/resource_keycloak_openid_client_authorization_user_policy.go +++ b/provider/resource_keycloak_openid_client_authorization_user_policy.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenidClientAuthorizationUserPolicy() *schema.Resource { diff --git a/provider/resource_keycloak_openid_client_authorization_user_policy_test.go b/provider/resource_keycloak_openid_client_authorization_user_policy_test.go index 6c7be7bd6..012575d82 100644 --- a/provider/resource_keycloak_openid_client_authorization_user_policy_test.go +++ b/provider/resource_keycloak_openid_client_authorization_user_policy_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenidClientAuthorizationUserPolicy(t *testing.T) { diff --git a/provider/resource_keycloak_openid_client_default_scopes.go b/provider/resource_keycloak_openid_client_default_scopes.go index 7829c207c..8da75d486 100644 --- a/provider/resource_keycloak_openid_client_default_scopes.go +++ b/provider/resource_keycloak_openid_client_default_scopes.go @@ -6,7 +6,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenidClientDefaultScopes() *schema.Resource { diff --git a/provider/resource_keycloak_openid_client_default_scopes_test.go b/provider/resource_keycloak_openid_client_default_scopes_test.go index c7b121e21..d00c60d0e 100644 --- a/provider/resource_keycloak_openid_client_default_scopes_test.go +++ b/provider/resource_keycloak_openid_client_default_scopes_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "strings" "testing" diff --git a/provider/resource_keycloak_openid_client_optional_scopes.go b/provider/resource_keycloak_openid_client_optional_scopes.go index b84b78f02..d9a0a1b05 100644 --- a/provider/resource_keycloak_openid_client_optional_scopes.go +++ b/provider/resource_keycloak_openid_client_optional_scopes.go @@ -6,7 +6,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenidClientOptionalScopes() *schema.Resource { diff --git a/provider/resource_keycloak_openid_client_optional_scopes_test.go b/provider/resource_keycloak_openid_client_optional_scopes_test.go index 5ed09f045..8b1b1b3e7 100644 --- a/provider/resource_keycloak_openid_client_optional_scopes_test.go +++ b/provider/resource_keycloak_openid_client_optional_scopes_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "strings" "testing" diff --git a/provider/resource_keycloak_openid_client_permissions.go b/provider/resource_keycloak_openid_client_permissions.go index d34832c0a..3f066064d 100644 --- a/provider/resource_keycloak_openid_client_permissions.go +++ b/provider/resource_keycloak_openid_client_permissions.go @@ -8,7 +8,7 @@ import ( "strings" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenidClientPermissions() *schema.Resource { diff --git a/provider/resource_keycloak_openid_client_permissions_test.go b/provider/resource_keycloak_openid_client_permissions_test.go index 77de326a7..d34d16f5c 100644 --- a/provider/resource_keycloak_openid_client_permissions_test.go +++ b/provider/resource_keycloak_openid_client_permissions_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenidClientPermission_basic(t *testing.T) { diff --git a/provider/resource_keycloak_openid_client_scope.go b/provider/resource_keycloak_openid_client_scope.go index acd41fff9..60de71670 100644 --- a/provider/resource_keycloak_openid_client_scope.go +++ b/provider/resource_keycloak_openid_client_scope.go @@ -4,12 +4,12 @@ import ( "context" "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" "strconv" "strings" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenidClientScope() *schema.Resource { diff --git a/provider/resource_keycloak_openid_client_scope_test.go b/provider/resource_keycloak_openid_client_scope_test.go index 9c92da911..4c65ec6b2 100644 --- a/provider/resource_keycloak_openid_client_scope_test.go +++ b/provider/resource_keycloak_openid_client_scope_test.go @@ -2,14 +2,14 @@ package provider import ( "fmt" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" "strconv" "testing" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakClientScope_basic(t *testing.T) { diff --git a/provider/resource_keycloak_openid_client_service_account_realm_role.go b/provider/resource_keycloak_openid_client_service_account_realm_role.go index d19ca8a88..d327f32ab 100644 --- a/provider/resource_keycloak_openid_client_service_account_realm_role.go +++ b/provider/resource_keycloak_openid_client_service_account_realm_role.go @@ -5,7 +5,7 @@ import ( "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" ) diff --git a/provider/resource_keycloak_openid_client_service_account_realm_role_test.go b/provider/resource_keycloak_openid_client_service_account_realm_role_test.go index 6d2f73d3a..06e6f0ff2 100644 --- a/provider/resource_keycloak_openid_client_service_account_realm_role_test.go +++ b/provider/resource_keycloak_openid_client_service_account_realm_role_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" "testing" ) diff --git a/provider/resource_keycloak_openid_client_service_account_role.go b/provider/resource_keycloak_openid_client_service_account_role.go index 36ef9df76..ba56aa5e4 100644 --- a/provider/resource_keycloak_openid_client_service_account_role.go +++ b/provider/resource_keycloak_openid_client_service_account_role.go @@ -5,7 +5,7 @@ import ( "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" ) diff --git a/provider/resource_keycloak_openid_client_service_account_role_test.go b/provider/resource_keycloak_openid_client_service_account_role_test.go index dccea2fb5..26697c0c3 100644 --- a/provider/resource_keycloak_openid_client_service_account_role_test.go +++ b/provider/resource_keycloak_openid_client_service_account_role_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" "testing" ) diff --git a/provider/resource_keycloak_openid_client_test.go b/provider/resource_keycloak_openid_client_test.go index a0ad143dc..b1a6c55f6 100644 --- a/provider/resource_keycloak_openid_client_test.go +++ b/provider/resource_keycloak_openid_client_test.go @@ -2,7 +2,7 @@ package provider import ( "fmt" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" "regexp" "strings" "testing" @@ -10,7 +10,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenidClient_basic(t *testing.T) { diff --git a/provider/resource_keycloak_openid_full_name_protocol_mapper.go b/provider/resource_keycloak_openid_full_name_protocol_mapper.go index 448ff6286..19032a19e 100644 --- a/provider/resource_keycloak_openid_full_name_protocol_mapper.go +++ b/provider/resource_keycloak_openid_full_name_protocol_mapper.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenIdFullNameProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_openid_full_name_protocol_mapper_test.go b/provider/resource_keycloak_openid_full_name_protocol_mapper_test.go index f31fb561d..9eaf90f22 100644 --- a/provider/resource_keycloak_openid_full_name_protocol_mapper_test.go +++ b/provider/resource_keycloak_openid_full_name_protocol_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "testing" ) diff --git a/provider/resource_keycloak_openid_group_membership_protocol_mapper.go b/provider/resource_keycloak_openid_group_membership_protocol_mapper.go index 79d126abd..c99c36461 100644 --- a/provider/resource_keycloak_openid_group_membership_protocol_mapper.go +++ b/provider/resource_keycloak_openid_group_membership_protocol_mapper.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenIdGroupMembershipProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_openid_group_membership_protocol_mapper_test.go b/provider/resource_keycloak_openid_group_membership_protocol_mapper_test.go index 73e728ec3..f65ed984a 100644 --- a/provider/resource_keycloak_openid_group_membership_protocol_mapper_test.go +++ b/provider/resource_keycloak_openid_group_membership_protocol_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "testing" ) diff --git a/provider/resource_keycloak_openid_hardcoded_claim_protocol_mapper.go b/provider/resource_keycloak_openid_hardcoded_claim_protocol_mapper.go index e05e99ada..a4dce0689 100644 --- a/provider/resource_keycloak_openid_hardcoded_claim_protocol_mapper.go +++ b/provider/resource_keycloak_openid_hardcoded_claim_protocol_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenIdHardcodedClaimProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_openid_hardcoded_claim_protocol_mapper_test.go b/provider/resource_keycloak_openid_hardcoded_claim_protocol_mapper_test.go index 0d573f07a..9ae51dec6 100644 --- a/provider/resource_keycloak_openid_hardcoded_claim_protocol_mapper_test.go +++ b/provider/resource_keycloak_openid_hardcoded_claim_protocol_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_openid_hardcoded_role_protocol_mapper.go b/provider/resource_keycloak_openid_hardcoded_role_protocol_mapper.go index af00ee1fe..3d514452d 100644 --- a/provider/resource_keycloak_openid_hardcoded_role_protocol_mapper.go +++ b/provider/resource_keycloak_openid_hardcoded_role_protocol_mapper.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenIdHardcodedRoleProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_openid_hardcoded_role_protocol_mapper_test.go b/provider/resource_keycloak_openid_hardcoded_role_protocol_mapper_test.go index ade4eb48e..ecbe8dc41 100644 --- a/provider/resource_keycloak_openid_hardcoded_role_protocol_mapper_test.go +++ b/provider/resource_keycloak_openid_hardcoded_role_protocol_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "testing" ) diff --git a/provider/resource_keycloak_openid_script_protocol_mapper.go b/provider/resource_keycloak_openid_script_protocol_mapper.go index af99f79b4..99bb58495 100644 --- a/provider/resource_keycloak_openid_script_protocol_mapper.go +++ b/provider/resource_keycloak_openid_script_protocol_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenIdScriptProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_openid_script_protocol_mapper_test.go b/provider/resource_keycloak_openid_script_protocol_mapper_test.go index c8f171fa9..68be15b7c 100644 --- a/provider/resource_keycloak_openid_script_protocol_mapper_test.go +++ b/provider/resource_keycloak_openid_script_protocol_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_openid_user_attribute_protocol_mapper.go b/provider/resource_keycloak_openid_user_attribute_protocol_mapper.go index 6878c63b6..3fb2c7ad7 100644 --- a/provider/resource_keycloak_openid_user_attribute_protocol_mapper.go +++ b/provider/resource_keycloak_openid_user_attribute_protocol_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenIdUserAttributeProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_openid_user_attribute_protocol_mapper_test.go b/provider/resource_keycloak_openid_user_attribute_protocol_mapper_test.go index 49c06e059..ab5be9a2d 100644 --- a/provider/resource_keycloak_openid_user_attribute_protocol_mapper_test.go +++ b/provider/resource_keycloak_openid_user_attribute_protocol_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_openid_user_client_role_protocol_mapper.go b/provider/resource_keycloak_openid_user_client_role_protocol_mapper.go index 294912182..50a8102f2 100644 --- a/provider/resource_keycloak_openid_user_client_role_protocol_mapper.go +++ b/provider/resource_keycloak_openid_user_client_role_protocol_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenIdUserClientRoleProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_openid_user_client_role_protocol_mapper_test.go b/provider/resource_keycloak_openid_user_client_role_protocol_mapper_test.go index e93a6a4f5..5e8ad3ffb 100644 --- a/provider/resource_keycloak_openid_user_client_role_protocol_mapper_test.go +++ b/provider/resource_keycloak_openid_user_client_role_protocol_mapper_test.go @@ -8,7 +8,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenIdUserClientRoleProtocolMapper_basicClient(t *testing.T) { diff --git a/provider/resource_keycloak_openid_user_property_protocol_mapper.go b/provider/resource_keycloak_openid_user_property_protocol_mapper.go index 4fd68a36b..fe70f0735 100644 --- a/provider/resource_keycloak_openid_user_property_protocol_mapper.go +++ b/provider/resource_keycloak_openid_user_property_protocol_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenIdUserPropertyProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_openid_user_property_protocol_mapper_test.go b/provider/resource_keycloak_openid_user_property_protocol_mapper_test.go index 8be1fb423..5af855c43 100644 --- a/provider/resource_keycloak_openid_user_property_protocol_mapper_test.go +++ b/provider/resource_keycloak_openid_user_property_protocol_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_openid_user_realm_role_protocol_mapper.go b/provider/resource_keycloak_openid_user_realm_role_protocol_mapper.go index f5457dff0..b7ad3c25b 100644 --- a/provider/resource_keycloak_openid_user_realm_role_protocol_mapper.go +++ b/provider/resource_keycloak_openid_user_realm_role_protocol_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenIdUserRealmRoleProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_openid_user_realm_role_protocol_mapper_test.go b/provider/resource_keycloak_openid_user_realm_role_protocol_mapper_test.go index 0a49f0091..371bda969 100644 --- a/provider/resource_keycloak_openid_user_realm_role_protocol_mapper_test.go +++ b/provider/resource_keycloak_openid_user_realm_role_protocol_mapper_test.go @@ -8,7 +8,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenIdUserRealmRoleProtocolMapper_basicClient(t *testing.T) { diff --git a/provider/resource_keycloak_openid_user_session_note_protocol_mapper.go b/provider/resource_keycloak_openid_user_session_note_protocol_mapper.go index 7af3c42c7..f2dbd4303 100644 --- a/provider/resource_keycloak_openid_user_session_note_protocol_mapper.go +++ b/provider/resource_keycloak_openid_user_session_note_protocol_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakOpenIdUserSessionNoteProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_openid_user_session_note_protocol_mapper_test.go b/provider/resource_keycloak_openid_user_session_note_protocol_mapper_test.go index f1bd03362..cd568c938 100644 --- a/provider/resource_keycloak_openid_user_session_note_protocol_mapper_test.go +++ b/provider/resource_keycloak_openid_user_session_note_protocol_mapper_test.go @@ -8,7 +8,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakOpenIdUserSessionNoteProtocolMapper_basicClient(t *testing.T) { diff --git a/provider/resource_keycloak_realm.go b/provider/resource_keycloak_realm.go index cec86560b..b165f876d 100644 --- a/provider/resource_keycloak_realm.go +++ b/provider/resource_keycloak_realm.go @@ -5,8 +5,8 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" ) var ( diff --git a/provider/resource_keycloak_realm_events.go b/provider/resource_keycloak_realm_events.go index 602e3de1b..1173c4d04 100644 --- a/provider/resource_keycloak_realm_events.go +++ b/provider/resource_keycloak_realm_events.go @@ -4,7 +4,7 @@ import ( "context" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakRealmEvents() *schema.Resource { diff --git a/provider/resource_keycloak_realm_events_test.go b/provider/resource_keycloak_realm_events_test.go index 7d1f7a182..39f722b57 100644 --- a/provider/resource_keycloak_realm_events_test.go +++ b/provider/resource_keycloak_realm_events_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "testing" ) diff --git a/provider/resource_keycloak_realm_keystore_aes_generated.go b/provider/resource_keycloak_realm_keystore_aes_generated.go index 2adc6b5cf..2e74d0fd3 100644 --- a/provider/resource_keycloak_realm_keystore_aes_generated.go +++ b/provider/resource_keycloak_realm_keystore_aes_generated.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) var ( diff --git a/provider/resource_keycloak_realm_keystore_aes_generated_test.go b/provider/resource_keycloak_realm_keystore_aes_generated_test.go index 2ae7c1815..6bb0bdb34 100644 --- a/provider/resource_keycloak_realm_keystore_aes_generated_test.go +++ b/provider/resource_keycloak_realm_keystore_aes_generated_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "strconv" "testing" diff --git a/provider/resource_keycloak_realm_keystore_ecdsa_generated.go b/provider/resource_keycloak_realm_keystore_ecdsa_generated.go index 1ee3022a1..f034d0835 100644 --- a/provider/resource_keycloak_realm_keystore_ecdsa_generated.go +++ b/provider/resource_keycloak_realm_keystore_ecdsa_generated.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) var ( diff --git a/provider/resource_keycloak_realm_keystore_ecdsa_generated_test.go b/provider/resource_keycloak_realm_keystore_ecdsa_generated_test.go index 9acf7ec59..4851bc9b1 100644 --- a/provider/resource_keycloak_realm_keystore_ecdsa_generated_test.go +++ b/provider/resource_keycloak_realm_keystore_ecdsa_generated_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "strconv" "testing" diff --git a/provider/resource_keycloak_realm_keystore_hmac_generated.go b/provider/resource_keycloak_realm_keystore_hmac_generated.go index 607095b67..c61c819d1 100644 --- a/provider/resource_keycloak_realm_keystore_hmac_generated.go +++ b/provider/resource_keycloak_realm_keystore_hmac_generated.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) var ( diff --git a/provider/resource_keycloak_realm_keystore_hmac_generated_test.go b/provider/resource_keycloak_realm_keystore_hmac_generated_test.go index f14e6d1a8..9d07ee2f3 100644 --- a/provider/resource_keycloak_realm_keystore_hmac_generated_test.go +++ b/provider/resource_keycloak_realm_keystore_hmac_generated_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "strconv" "testing" diff --git a/provider/resource_keycloak_realm_keystore_java_keystore.go b/provider/resource_keycloak_realm_keystore_java_keystore.go index 9fb37b882..0fb006a48 100644 --- a/provider/resource_keycloak_realm_keystore_java_keystore.go +++ b/provider/resource_keycloak_realm_keystore_java_keystore.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) var ( diff --git a/provider/resource_keycloak_realm_keystore_java_kyestore_test.go b/provider/resource_keycloak_realm_keystore_java_kyestore_test.go index dd3d5d5cb..f7afec4ea 100644 --- a/provider/resource_keycloak_realm_keystore_java_kyestore_test.go +++ b/provider/resource_keycloak_realm_keystore_java_kyestore_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "strconv" "testing" diff --git a/provider/resource_keycloak_realm_keystore_rsa.go b/provider/resource_keycloak_realm_keystore_rsa.go index 5c1e5f803..a1ae318f1 100644 --- a/provider/resource_keycloak_realm_keystore_rsa.go +++ b/provider/resource_keycloak_realm_keystore_rsa.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) var ( diff --git a/provider/resource_keycloak_realm_keystore_rsa_generated.go b/provider/resource_keycloak_realm_keystore_rsa_generated.go index 0b230d4ea..05184c1ac 100644 --- a/provider/resource_keycloak_realm_keystore_rsa_generated.go +++ b/provider/resource_keycloak_realm_keystore_rsa_generated.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) var ( diff --git a/provider/resource_keycloak_realm_keystore_rsa_generated_test.go b/provider/resource_keycloak_realm_keystore_rsa_generated_test.go index ed9e3f959..c5736993f 100644 --- a/provider/resource_keycloak_realm_keystore_rsa_generated_test.go +++ b/provider/resource_keycloak_realm_keystore_rsa_generated_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "strconv" "testing" diff --git a/provider/resource_keycloak_realm_keystore_rsa_test.go b/provider/resource_keycloak_realm_keystore_rsa_test.go index a17519d86..25a5876ee 100644 --- a/provider/resource_keycloak_realm_keystore_rsa_test.go +++ b/provider/resource_keycloak_realm_keystore_rsa_test.go @@ -10,7 +10,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "log" "math/big" "regexp" diff --git a/provider/resource_keycloak_realm_test.go b/provider/resource_keycloak_realm_test.go index 78b0b5d21..27a530127 100644 --- a/provider/resource_keycloak_realm_test.go +++ b/provider/resource_keycloak_realm_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_realm_user_profile.go b/provider/resource_keycloak_realm_user_profile.go index b8ab597de..90a452c32 100644 --- a/provider/resource_keycloak_realm_user_profile.go +++ b/provider/resource_keycloak_realm_user_profile.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakRealmUserProfile() *schema.Resource { diff --git a/provider/resource_keycloak_realm_user_profile_test.go b/provider/resource_keycloak_realm_user_profile_test.go index 116e39dd3..8ee3fc085 100644 --- a/provider/resource_keycloak_realm_user_profile_test.go +++ b/provider/resource_keycloak_realm_user_profile_test.go @@ -13,7 +13,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakRealmUserProfile_featureDisabled(t *testing.T) { diff --git a/provider/resource_keycloak_required_action.go b/provider/resource_keycloak_required_action.go index c6c751496..185832d2e 100644 --- a/provider/resource_keycloak_required_action.go +++ b/provider/resource_keycloak_required_action.go @@ -6,7 +6,7 @@ import ( "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" ) diff --git a/provider/resource_keycloak_role.go b/provider/resource_keycloak_role.go index 7fa1fd7e7..8c4da0afe 100644 --- a/provider/resource_keycloak_role.go +++ b/provider/resource_keycloak_role.go @@ -8,7 +8,7 @@ import ( "strings" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakRole() *schema.Resource { diff --git a/provider/resource_keycloak_role_test.go b/provider/resource_keycloak_role_test.go index 942474465..2b4828281 100644 --- a/provider/resource_keycloak_role_test.go +++ b/provider/resource_keycloak_role_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" "testing" ) diff --git a/provider/resource_keycloak_saml_client.go b/provider/resource_keycloak_saml_client.go index 9a629ff7d..57e7508c6 100644 --- a/provider/resource_keycloak_saml_client.go +++ b/provider/resource_keycloak_saml_client.go @@ -9,13 +9,13 @@ import ( "fmt" "github.com/hashicorp/terraform-plugin-log/tflog" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" "reflect" "strings" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) var ( diff --git a/provider/resource_keycloak_saml_client_default_scopes.go b/provider/resource_keycloak_saml_client_default_scopes.go index f589b1bd9..dd327cbfd 100644 --- a/provider/resource_keycloak_saml_client_default_scopes.go +++ b/provider/resource_keycloak_saml_client_default_scopes.go @@ -6,7 +6,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakSamlClientDefaultScopes() *schema.Resource { diff --git a/provider/resource_keycloak_saml_client_default_scopes_test.go b/provider/resource_keycloak_saml_client_default_scopes_test.go index 043f612f1..38ce04d6a 100644 --- a/provider/resource_keycloak_saml_client_default_scopes_test.go +++ b/provider/resource_keycloak_saml_client_default_scopes_test.go @@ -9,7 +9,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) // All saml clients in Keycloak will automatically have these scopes listed as "default client scopes". diff --git a/provider/resource_keycloak_saml_client_scope.go b/provider/resource_keycloak_saml_client_scope.go index f00aada73..002cedd53 100644 --- a/provider/resource_keycloak_saml_client_scope.go +++ b/provider/resource_keycloak_saml_client_scope.go @@ -9,7 +9,7 @@ import ( "strings" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakSamlClientScope() *schema.Resource { diff --git a/provider/resource_keycloak_saml_client_scope_test.go b/provider/resource_keycloak_saml_client_scope_test.go index 13b8ca548..e98aee60a 100644 --- a/provider/resource_keycloak_saml_client_scope_test.go +++ b/provider/resource_keycloak_saml_client_scope_test.go @@ -8,7 +8,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakSamlClientScope_basic(t *testing.T) { diff --git a/provider/resource_keycloak_saml_client_test.go b/provider/resource_keycloak_saml_client_test.go index d791b79ca..31f6bc43c 100644 --- a/provider/resource_keycloak_saml_client_test.go +++ b/provider/resource_keycloak_saml_client_test.go @@ -2,7 +2,7 @@ package provider import ( "fmt" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" "regexp" "strings" "testing" @@ -10,7 +10,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakSamlClient_basic(t *testing.T) { diff --git a/provider/resource_keycloak_saml_identity_provider.go b/provider/resource_keycloak_saml_identity_provider.go index 8ba06f9dd..27a4f254f 100644 --- a/provider/resource_keycloak_saml_identity_provider.go +++ b/provider/resource_keycloak_saml_identity_provider.go @@ -4,8 +4,8 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" "github.com/imdario/mergo" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" ) var nameIdPolicyFormats = map[string]string{ diff --git a/provider/resource_keycloak_saml_identity_provider_test.go b/provider/resource_keycloak_saml_identity_provider_test.go index da302e628..5555bd3d9 100644 --- a/provider/resource_keycloak_saml_identity_provider_test.go +++ b/provider/resource_keycloak_saml_identity_provider_test.go @@ -2,7 +2,7 @@ package provider import ( "fmt" - "github.com/mrparkers/terraform-provider-keycloak/keycloak/types" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" "regexp" "strconv" "testing" @@ -10,7 +10,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakSamlIdentityProvider_basic(t *testing.T) { diff --git a/provider/resource_keycloak_saml_script_protocol_mapper.go b/provider/resource_keycloak_saml_script_protocol_mapper.go index cac881ab2..a78219814 100644 --- a/provider/resource_keycloak_saml_script_protocol_mapper.go +++ b/provider/resource_keycloak_saml_script_protocol_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakSamlScriptProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_saml_script_protocol_mapper_test.go b/provider/resource_keycloak_saml_script_protocol_mapper_test.go index e2be6df56..81be1dda5 100644 --- a/provider/resource_keycloak_saml_script_protocol_mapper_test.go +++ b/provider/resource_keycloak_saml_script_protocol_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "testing" ) diff --git a/provider/resource_keycloak_saml_user_attribute_protocol_mapper.go b/provider/resource_keycloak_saml_user_attribute_protocol_mapper.go index b2e26dbeb..f807b55df 100644 --- a/provider/resource_keycloak_saml_user_attribute_protocol_mapper.go +++ b/provider/resource_keycloak_saml_user_attribute_protocol_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) var keycloakSamlUserAttributeProtocolMapperNameFormats = []string{"Basic", "URI Reference", "Unspecified"} diff --git a/provider/resource_keycloak_saml_user_attribute_protocol_mapper_test.go b/provider/resource_keycloak_saml_user_attribute_protocol_mapper_test.go index a0e759a7f..4131a2d30 100644 --- a/provider/resource_keycloak_saml_user_attribute_protocol_mapper_test.go +++ b/provider/resource_keycloak_saml_user_attribute_protocol_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_saml_user_property_protocol_mapper.go b/provider/resource_keycloak_saml_user_property_protocol_mapper.go index 7fec08cf1..4cc6785a9 100644 --- a/provider/resource_keycloak_saml_user_property_protocol_mapper.go +++ b/provider/resource_keycloak_saml_user_property_protocol_mapper.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakSamlUserPropertyProtocolMapper() *schema.Resource { diff --git a/provider/resource_keycloak_saml_user_property_protocol_mapper_test.go b/provider/resource_keycloak_saml_user_property_protocol_mapper_test.go index 1e935ddbb..c0b0ba77e 100644 --- a/provider/resource_keycloak_saml_user_property_protocol_mapper_test.go +++ b/provider/resource_keycloak_saml_user_property_protocol_mapper_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_user.go b/provider/resource_keycloak_user.go index da04cd264..b0559aab9 100644 --- a/provider/resource_keycloak_user.go +++ b/provider/resource_keycloak_user.go @@ -8,7 +8,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) const MULTIVALUE_ATTRIBUTE_SEPARATOR = "##" diff --git a/provider/resource_keycloak_user_groups.go b/provider/resource_keycloak_user_groups.go index ee22bbc44..5088c2ce0 100644 --- a/provider/resource_keycloak_user_groups.go +++ b/provider/resource_keycloak_user_groups.go @@ -6,7 +6,7 @@ import ( "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" ) diff --git a/provider/resource_keycloak_user_groups_test.go b/provider/resource_keycloak_user_groups_test.go index ce2413be2..a7f527e0e 100644 --- a/provider/resource_keycloak_user_groups_test.go +++ b/provider/resource_keycloak_user_groups_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_user_roles.go b/provider/resource_keycloak_user_roles.go index a651ae01e..df6d51046 100644 --- a/provider/resource_keycloak_user_roles.go +++ b/provider/resource_keycloak_user_roles.go @@ -6,7 +6,7 @@ import ( "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "strings" ) diff --git a/provider/resource_keycloak_user_roles_test.go b/provider/resource_keycloak_user_roles_test.go index bec6e194b..b384bbb91 100644 --- a/provider/resource_keycloak_user_roles_test.go +++ b/provider/resource_keycloak_user_roles_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "regexp" "testing" ) diff --git a/provider/resource_keycloak_user_template_importer_identity_provider_mapper.go b/provider/resource_keycloak_user_template_importer_identity_provider_mapper.go index d315bd353..56d01e1dd 100644 --- a/provider/resource_keycloak_user_template_importer_identity_provider_mapper.go +++ b/provider/resource_keycloak_user_template_importer_identity_provider_mapper.go @@ -5,7 +5,7 @@ import ( "fmt" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakUserTemplateImporterIdentityProviderMapper() *schema.Resource { diff --git a/provider/resource_keycloak_user_template_importer_identity_provider_mapper_test.go b/provider/resource_keycloak_user_template_importer_identity_provider_mapper_test.go index 48102cde3..321fe890b 100644 --- a/provider/resource_keycloak_user_template_importer_identity_provider_mapper_test.go +++ b/provider/resource_keycloak_user_template_importer_identity_provider_mapper_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakUserTemplateIdentityProviderMapper_basic(t *testing.T) { diff --git a/provider/resource_keycloak_user_test.go b/provider/resource_keycloak_user_test.go index d8cbe5e27..a7061bf19 100644 --- a/provider/resource_keycloak_user_test.go +++ b/provider/resource_keycloak_user_test.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "io/ioutil" "net/http" "net/url" diff --git a/provider/resource_keycloak_users_permissions.go b/provider/resource_keycloak_users_permissions.go index 8d9f09e90..178392881 100644 --- a/provider/resource_keycloak_users_permissions.go +++ b/provider/resource_keycloak_users_permissions.go @@ -5,7 +5,7 @@ import ( "github.com/hashicorp/terraform-plugin-log/tflog" "github.com/hashicorp/terraform-plugin-sdk/v2/diag" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func resourceKeycloakUsersPermissions() *schema.Resource { diff --git a/provider/resource_keycloak_users_permissions_test.go b/provider/resource_keycloak_users_permissions_test.go index df174c463..4986c0078 100644 --- a/provider/resource_keycloak_users_permissions_test.go +++ b/provider/resource_keycloak_users_permissions_test.go @@ -7,7 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func TestAccKeycloakUsersPermission_basic(t *testing.T) { diff --git a/provider/role_mapping_helpers.go b/provider/role_mapping_helpers.go index b29bbe1ce..03bb7ee44 100644 --- a/provider/role_mapping_helpers.go +++ b/provider/role_mapping_helpers.go @@ -2,7 +2,7 @@ package provider import ( "context" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) // a struct that represents the "desired" state configured via terraform diff --git a/provider/test_utils.go b/provider/test_utils.go index fc1abca92..fd971aa99 100644 --- a/provider/test_utils.go +++ b/provider/test_utils.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" "github.com/hashicorp/terraform-plugin-sdk/v2/terraform" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func randomBool() bool { diff --git a/provider/utils.go b/provider/utils.go index d5501cec5..bc508e60f 100644 --- a/provider/utils.go +++ b/provider/utils.go @@ -7,7 +7,7 @@ import ( "time" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" - "github.com/mrparkers/terraform-provider-keycloak/keycloak" + "github.com/qvest-digital/terraform-provider-keycloak/keycloak" ) func keys(data map[string]string) []string { From 50a84fb061f375d1bab274d307c180d405f46de5 Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Tue, 23 Jul 2024 11:18:07 +0200 Subject: [PATCH 06/16] Updated package name and references. --- provider/resource_keycloak_default_roles.go | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/provider/resource_keycloak_default_roles.go b/provider/resource_keycloak_default_roles.go index 08b255692..1794a2498 100644 --- a/provider/resource_keycloak_default_roles.go +++ b/provider/resource_keycloak_default_roles.go @@ -109,6 +109,13 @@ func resourceKeycloakDefaultRolesReconcile(ctx context.Context, data *schema.Res Summary: "realm not found: " + defaultRoles.RealmId, }} } + if realm.DefaultRole == nil || realm.DefaultRole.Id == "" { + return diag.Diagnostics{{ + Severity: diag.Error, + Summary: "realm does not have a default role", + }} + + } data.SetId(realm.DefaultRole.Id) From 915c95bb14c89c738131e82c1378c929c4297b01 Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Tue, 23 Jul 2024 11:38:50 +0200 Subject: [PATCH 07/16] Make sure that the client is correctly configured --- scripts/create-terraform-client.sh | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/scripts/create-terraform-client.sh b/scripts/create-terraform-client.sh index a11d686ef..727ffba1c 100755 --- a/scripts/create-terraform-client.sh +++ b/scripts/create-terraform-client.sh @@ -1,6 +1,6 @@ #!/usr/bin/env bash -set -e +set -xe KEYCLOAK_URL="http://localhost:8080" KEYCLOAK_USER="keycloak" @@ -21,7 +21,7 @@ accessToken=$( ) function post() { - curl --fail \ + curl -s -v --fail \ -H "Authorization: bearer ${accessToken}" \ -H "Content-Type: application/json" \ -d "${2}" \ @@ -29,7 +29,7 @@ function post() { } function put() { - curl --fail \ + curl -s -v --fail \ -X PUT \ -H "Authorization: bearer ${accessToken}" \ -H "Content-Type: application/json" \ @@ -38,7 +38,7 @@ function put() { } function get() { - curl --fail --silent \ + curl -v --fail --silent \ -H "Authorization: bearer ${accessToken}" \ -H "Content-Type: application/json" \ "${KEYCLOAK_URL}/admin${1}" From 75c7a13dacf5484185f16630e3c4ab8380bf677f Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Tue, 23 Jul 2024 11:51:48 +0200 Subject: [PATCH 08/16] Make sure that the client is correctly configured --- scripts/create-terraform-client.sh | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/scripts/create-terraform-client.sh b/scripts/create-terraform-client.sh index 727ffba1c..045ab3b7d 100755 --- a/scripts/create-terraform-client.sh +++ b/scripts/create-terraform-client.sh @@ -21,7 +21,7 @@ accessToken=$( ) function post() { - curl -s -v --fail \ + curl -s --fail \ -H "Authorization: bearer ${accessToken}" \ -H "Content-Type: application/json" \ -d "${2}" \ @@ -29,7 +29,7 @@ function post() { } function put() { - curl -s -v --fail \ + curl -s --fail \ -X PUT \ -H "Authorization: bearer ${accessToken}" \ -H "Content-Type: application/json" \ @@ -38,7 +38,7 @@ function put() { } function get() { - curl -v --fail --silent \ + curl --fail --silent \ -H "Authorization: bearer ${accessToken}" \ -H "Content-Type: application/json" \ "${KEYCLOAK_URL}/admin${1}" From 96832055e435213c8cac4924fb09762d4499d94f Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Thu, 1 Aug 2024 09:08:14 +0200 Subject: [PATCH 09/16] Test improvements. --- README.md | 2 +- docker-compose.yml | 4 ++-- provider/provider_test.go | 6 +++++- 3 files changed, 8 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 940a69b12..a7c796434 100644 --- a/README.md +++ b/README.md @@ -13,7 +13,7 @@ This provider can be installed automatically using Terraform >=0.13 by using the terraform { required_providers { keycloak = { - source = "mrparkers/keycloak" + source = "qvest-digital/keycloak" version = ">= 4.0.0" } } diff --git a/docker-compose.yml b/docker-compose.yml index d05dfe5c2..923852495 100644 --- a/docker-compose.yml +++ b/docker-compose.yml @@ -38,6 +38,6 @@ services: - 8080:8080 # Enable for remote java debugging # - 8787:8787 - volumes: +# volumes: # Make the custom-user-federation-example extension available to Keycloak. The :z option is required and tells Docker that the volume content will be shared between containers. - - ./custom-user-federation-example/build/libs/custom-user-federation-example.jar:/opt/jboss/keycloak/standalone/deployments/custom-user-federation-example.jar:z +# - ./custom-user-federation-example/build/libs/custom-user-federation-example.jar:/opt/jboss/keycloak/standalone/deployments/custom-user-federation-example.jar:z diff --git a/provider/provider_test.go b/provider/provider_test.go index ff039b998..c154bd28b 100644 --- a/provider/provider_test.go +++ b/provider/provider_test.go @@ -29,9 +29,13 @@ var requiredEnvironmentVariables = []string{ func init() { testCtx = context.Background() userAgent := fmt.Sprintf("HashiCorp Terraform/%s (+https://www.terraform.io) Terraform Plugin SDK/%s", schema.Provider{}.TerraformVersion, meta.SDKVersionString()) - keycloakClient, _ = keycloak.NewKeycloakClient(testCtx, os.Getenv("KEYCLOAK_URL"), "", os.Getenv("KEYCLOAK_CLIENT_ID"), os.Getenv("KEYCLOAK_CLIENT_SECRET"), os.Getenv("KEYCLOAK_REALM"), "", "", true, 5, "", false, userAgent, false, map[string]string{ + var err error + keycloakClient, err = keycloak.NewKeycloakClient(testCtx, os.Getenv("KEYCLOAK_URL"), "", os.Getenv("KEYCLOAK_CLIENT_ID"), os.Getenv("KEYCLOAK_CLIENT_SECRET"), os.Getenv("KEYCLOAK_REALM"), "", "", true, 5, "", false, userAgent, false, map[string]string{ "foo": "bar", }) + if err != nil { + panic(err) + } testAccProvider = KeycloakProvider(keycloakClient) testAccProviderFactories = map[string]func() (*schema.Provider, error){ "keycloak": func() (*schema.Provider, error) { From cfae38e7714786a3253b9ed2ed4e9257677d0623 Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Thu, 1 Aug 2024 10:13:39 +0200 Subject: [PATCH 10/16] Test improvements. --- makefile | 8 ++++---- provider/resource_keycloak_realm_events_test.go | 1 + 2 files changed, 5 insertions(+), 4 deletions(-) diff --git a/makefile b/makefile index faba800cc..b40e6e6e0 100644 --- a/makefile +++ b/makefile @@ -10,10 +10,10 @@ build: CGO_ENABLED=0 go build -trimpath -ldflags "-s -w -X main.version=$(VERSION)" -o terraform-provider-keycloak_$(VERSION) build-example: build - mkdir -p example/.terraform/plugins/terraform.local/mrparkers/keycloak/4.0.0/$(GOOS)_$(GOARCH) - mkdir -p example/terraform.d/plugins/terraform.local/mrparkers/keycloak/4.0.0/$(GOOS)_$(GOARCH) - cp terraform-provider-keycloak_* example/.terraform/plugins/terraform.local/mrparkers/keycloak/4.0.0/$(GOOS)_$(GOARCH)/ - cp terraform-provider-keycloak_* example/terraform.d/plugins/terraform.local/mrparkers/keycloak/4.0.0/$(GOOS)_$(GOARCH)/ + mkdir -p example/.terraform/plugins/terraform.local/qvest-digital/keycloak/4.0.0/$(GOOS)_$(GOARCH) + mkdir -p example/terraform.d/plugins/terraform.local/qvest-digital/keycloak/4.0.0/$(GOOS)_$(GOARCH) + cp terraform-provider-keycloak_* example/.terraform/plugins/terraform.local/qvest-digital/keycloak/4.0.0/$(GOOS)_$(GOARCH)/ + cp terraform-provider-keycloak_* example/terraform.d/plugins/terraform.local/qvest-digital/keycloak/4.0.0/$(GOOS)_$(GOARCH)/ local: deps docker compose up --build -d diff --git a/provider/resource_keycloak_realm_events_test.go b/provider/resource_keycloak_realm_events_test.go index 39f722b57..3dc7344db 100644 --- a/provider/resource_keycloak_realm_events_test.go +++ b/provider/resource_keycloak_realm_events_test.go @@ -229,6 +229,7 @@ realm = "%s" } resource "keycloak_realm_events" "realm_events" { realm_id = "${keycloak_realm.realm.id}" +enabled = true admin_events_enabled = true admin_events_details_enabled = true From 0c4c702ac63df362fd720a5222f85a96702a5b84 Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Thu, 1 Aug 2024 10:18:09 +0200 Subject: [PATCH 11/16] Test improvements. --- provider/resource_keycloak_realm_events_test.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/provider/resource_keycloak_realm_events_test.go b/provider/resource_keycloak_realm_events_test.go index 3dc7344db..3e5a1b790 100644 --- a/provider/resource_keycloak_realm_events_test.go +++ b/provider/resource_keycloak_realm_events_test.go @@ -226,10 +226,10 @@ func testKeycloakRealmEvents_basic(realm string) string { return fmt.Sprintf(` resource "keycloak_realm" "realm" { realm = "%s" +enabled = true } resource "keycloak_realm_events" "realm_events" { realm_id = "${keycloak_realm.realm.id}" -enabled = true admin_events_enabled = true admin_events_details_enabled = true From 1e81085997ee3eff05bfef112180d547a20d609b Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Thu, 1 Aug 2024 10:22:46 +0200 Subject: [PATCH 12/16] Test improvements. --- .github/workflows/test.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/.github/workflows/test.yml b/.github/workflows/test.yml index b35b1a214..a641d69ef 100644 --- a/.github/workflows/test.yml +++ b/.github/workflows/test.yml @@ -111,6 +111,7 @@ jobs: return process.env.KEYCLOAK_VERSION.split("-")[0] - name: Test run: | + tf --version go mod download make testacc env: From 7b15cc264ba75003607c24f4aca1c68c21e5e30c Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Thu, 1 Aug 2024 10:28:42 +0200 Subject: [PATCH 13/16] Test improvements. --- provider/resource_keycloak_realm.go | 4 ++++ provider/resource_keycloak_realm_events_test.go | 1 - 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/provider/resource_keycloak_realm.go b/provider/resource_keycloak_realm.go index b165f876d..752e639a6 100644 --- a/provider/resource_keycloak_realm.go +++ b/provider/resource_keycloak_realm.go @@ -7,6 +7,7 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" + "strconv" ) var ( @@ -1172,6 +1173,9 @@ func setDefaultSecuritySettingsBruteForceDetection(realm *keycloak.Realm) { func setRealmData(data *schema.ResourceData, realm *keycloak.Realm) { data.SetId(realm.Realm) + println(data.Get("enabled")) + println("Realm enabled: " + strconv.FormatBool(realm.Enabled)) + println("----") data.Set("realm", realm.Realm) data.Set("internal_id", realm.Id) diff --git a/provider/resource_keycloak_realm_events_test.go b/provider/resource_keycloak_realm_events_test.go index 3e5a1b790..39f722b57 100644 --- a/provider/resource_keycloak_realm_events_test.go +++ b/provider/resource_keycloak_realm_events_test.go @@ -226,7 +226,6 @@ func testKeycloakRealmEvents_basic(realm string) string { return fmt.Sprintf(` resource "keycloak_realm" "realm" { realm = "%s" -enabled = true } resource "keycloak_realm_events" "realm_events" { realm_id = "${keycloak_realm.realm.id}" From 6300506acb99f434e0e392e34925d33aefa675d9 Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Thu, 1 Aug 2024 10:31:21 +0200 Subject: [PATCH 14/16] Test improvements. --- .github/workflows/test.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/test.yml b/.github/workflows/test.yml index a641d69ef..e5f1cc919 100644 --- a/.github/workflows/test.yml +++ b/.github/workflows/test.yml @@ -111,7 +111,7 @@ jobs: return process.env.KEYCLOAK_VERSION.split("-")[0] - name: Test run: | - tf --version + terraform version go mod download make testacc env: From 99c520e75fab7e1a76262d52ed3567cebc498d69 Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Thu, 1 Aug 2024 10:36:58 +0200 Subject: [PATCH 15/16] Test improvements. --- .github/workflows/test.yml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/.github/workflows/test.yml b/.github/workflows/test.yml index e5f1cc919..429232e9c 100644 --- a/.github/workflows/test.yml +++ b/.github/workflows/test.yml @@ -96,7 +96,8 @@ jobs: uses: hashicorp/setup-terraform@v1 with: terraform_wrapper: false - terraform_version: 1.4.1 + # terraform_version: 1.4.1 + terraform_version: 1.5.7 - name: Initialize Keycloak run: ./scripts/wait-for-local-keycloak.sh && ./scripts/create-terraform-client.sh From acd102aec78e9c956d83ee3b549c3ddf911eb5bf Mon Sep 17 00:00:00 2001 From: Markus Seidl Date: Thu, 1 Aug 2024 11:40:10 +0200 Subject: [PATCH 16/16] Force re-authentication after realm-creation. --- keycloak/keycloak_client.go | 4 ++++ provider/resource_keycloak_realm.go | 9 +++++---- 2 files changed, 9 insertions(+), 4 deletions(-) diff --git a/keycloak/keycloak_client.go b/keycloak/keycloak_client.go index 23e896128..ec5418b92 100644 --- a/keycloak/keycloak_client.go +++ b/keycloak/keycloak_client.go @@ -530,3 +530,7 @@ func newHttpClient(tlsInsecureSkipVerify bool, clientTimeout int, caCert string) return httpClient, nil } + +func (keycloakClient *KeycloakClient) InvalidateAccessToken() { + keycloakClient.initialLogin = false +} diff --git a/provider/resource_keycloak_realm.go b/provider/resource_keycloak_realm.go index 752e639a6..704631ead 100644 --- a/provider/resource_keycloak_realm.go +++ b/provider/resource_keycloak_realm.go @@ -7,7 +7,6 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" "github.com/qvest-digital/terraform-provider-keycloak/keycloak" "github.com/qvest-digital/terraform-provider-keycloak/keycloak/types" - "strconv" ) var ( @@ -1173,9 +1172,6 @@ func setDefaultSecuritySettingsBruteForceDetection(realm *keycloak.Realm) { func setRealmData(data *schema.ResourceData, realm *keycloak.Realm) { data.SetId(realm.Realm) - println(data.Get("enabled")) - println("Realm enabled: " + strconv.FormatBool(realm.Enabled)) - println("----") data.Set("realm", realm.Realm) data.Set("internal_id", realm.Id) @@ -1388,6 +1384,11 @@ func resourceKeycloakRealmCreate(ctx context.Context, data *schema.ResourceData, return diag.FromErr(err) } + // When a new realm is created, our realm might not have the correct aud and resource_access values, + // forcing an update here + // TODO unsure why this is necessary. + meta.(*keycloak.KeycloakClient).InvalidateAccessToken() + setRealmData(data, realm) return resourceKeycloakRealmRead(ctx, data, meta)