Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Build update #3

Merged
merged 16 commits into from
Aug 1, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ jobs:
releaseDate=$(date '+%B-%-d-%Y' | tr '[:upper:]' '[:lower:]')
releaseVersion=$(echo ${{ steps.get_tag_name.outputs.TAG }} | tr -d '.')
tmp=$(mktemp -d)
echo "[Release Notes](https://github.com/mrparkers/terraform-provider-keycloak/blob/master/CHANGELOG.md#${releaseVersion}-${releaseDate})" > ${tmp}/release-notes.md
echo "[Release Notes](https://github.com/qvest-digital/terraform-provider-keycloak/blob/master/CHANGELOG.md#${releaseVersion}-${releaseDate})" > ${tmp}/release-notes.md
cat ${tmp}/release-notes.md
echo ::set-output name=NOTES::${tmp}/release-notes.md

Expand Down
12 changes: 7 additions & 5 deletions .github/workflows/test.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,8 +9,8 @@ on:

jobs:
verify:
runs-on: ubuntu-latest
# runs-on: self-hosted
# runs-on: ubuntu-latest
runs-on: self-hosted
steps:
- name: Checkout Code
uses: actions/checkout@v3
Expand Down Expand Up @@ -57,7 +57,7 @@ jobs:
(needs.verify.outputs.code-files-changed || startsWith(github.ref, 'refs/tags/v'))
needs:
- verify
runs-on: ubuntu-latest
runs-on: self-hosted
strategy:
matrix:
keycloak-version:
Expand All @@ -74,7 +74,7 @@ jobs:
keycloak:
# we have to use a custom docker image for these tests, since it's not possible to provide command-line args
# to a service container. see https://github.com/actions/runner/issues/2139
image: mrparkers/keycloak-dev:${{ matrix.keycloak-version }}
image: markusqvestseidl/keycloak-dev:${{ matrix.keycloak-version }}
ports:
- 8080:8080
env:
Expand All @@ -96,7 +96,8 @@ jobs:
uses: hashicorp/setup-terraform@v1
with:
terraform_wrapper: false
terraform_version: 1.4.1
# terraform_version: 1.4.1
terraform_version: 1.5.7

- name: Initialize Keycloak
run: ./scripts/wait-for-local-keycloak.sh && ./scripts/create-terraform-client.sh
Expand All @@ -111,6 +112,7 @@ jobs:
return process.env.KEYCLOAK_VERSION.split("-")[0]
- name: Test
run: |
terraform version
go mod download
make testacc
env:
Expand Down
544 changes: 272 additions & 272 deletions CHANGELOG.md

Large diffs are not rendered by default.

10 changes: 5 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ This provider can be installed automatically using Terraform >=0.13 by using the
terraform {
required_providers {
keycloak = {
source = "mrparkers/keycloak"
source = "qvest-digital/keycloak"
version = ">= 4.0.0"
}
}
Expand Down Expand Up @@ -47,14 +47,14 @@ The following versions are used when running acceptance tests in CI:
## Releases

This provider uses [GoReleaser](https://goreleaser.com/) to build and publish releases. Each release published to GitHub
contains binary files for Linux, macOS (darwin), and Windows, as configured within the [`.goreleaser.yml`](https://github.com/mrparkers/terraform-provider-keycloak/blob/master/.goreleaser.yml)
contains binary files for Linux, macOS (darwin), and Windows, as configured within the [`.goreleaser.yml`](https://github.com/qvest-digital/terraform-provider-keycloak/blob/master/.goreleaser.yml)
file.

Each release also contains a `terraform-provider-keycloak_${RELEASE_VERSION}_SHA256SUMS` file, accompanied by a signature
created by a PGP key with the fingerprint `C508 6791 5E11 6CD2`. This key can be found on my Keybase account at https://keybase.io/mrparkers.

You can find the list of releases [here](https://github.com/mrparkers/terraform-provider-keycloak/releases).
You can find the changelog for each version [here](https://github.com/mrparkers/terraform-provider-keycloak/blob/master/CHANGELOG.md).
You can find the list of releases [here](https://github.com/qvest-digital/terraform-provider-keycloak/releases).
You can find the changelog for each version [here](https://github.com/qvest-digital/terraform-provider-keycloak/blob/master/CHANGELOG.md).

Note: Prior to v2.0.0, a statically linked build for use within Alpine linux was included with each release. This is no longer
done due to [GoReleaser not supporting CGO](https://goreleaser.com/limitations/cgo/). Instead of using a statically linked,
Expand Down Expand Up @@ -94,4 +94,4 @@ make testacc

## License

[MIT](https://github.com/mrparkers/terraform-provider-keycloak/blob/master/LICENSE)
[MIT](https://github.com/qvest-digital/terraform-provider-keycloak/blob/master/LICENSE)
4 changes: 2 additions & 2 deletions docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,6 @@ services:
- 8080:8080
# Enable for remote java debugging
# - 8787:8787
volumes:
# volumes:
# Make the custom-user-federation-example extension available to Keycloak. The :z option is required and tells Docker that the volume content will be shared between containers.
- ./custom-user-federation-example/build/libs/custom-user-federation-example.jar:/opt/jboss/keycloak/standalone/deployments/custom-user-federation-example.jar:z
# - ./custom-user-federation-example/build/libs/custom-user-federation-example.jar:/opt/jboss/keycloak/standalone/deployments/custom-user-federation-example.jar:z
2 changes: 1 addition & 1 deletion docs/resources/custom_user_federation.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ page_title: "keycloak_custom_user_federation Resource"
Allows for creating and managing custom user federation providers within Keycloak.

A custom user federation provider is an implementation of Keycloak's [User Storage SPI](https://www.keycloak.org/docs/4.2/server_development/index.html#_user-storage-spi).
An example of this implementation can be found [here](https://github.com/mrparkers/terraform-provider-keycloak/tree/master/custom-user-federation-example).
An example of this implementation can be found [here](https://github.com/qvest-digital/terraform-provider-keycloak/tree/master/custom-user-federation-example).

## Example Usage

Expand Down
2 changes: 1 addition & 1 deletion docs/resources/group_permissions.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Allows you to manage all group Scope Based Permissions https://www.keycloak.org/

This is part of a preview Keycloak feature: `admin_fine_grained_authz` (see https://www.keycloak.org/docs/latest/server_admin/#_fine_grain_permissions).
This feature can be enabled with the Keycloak option `-Dkeycloak.profile.feature.admin_fine_grained_authz=enabled`. See the
example [`docker-compose.yml`](https://github.com/mrparkers/terraform-provider-keycloak/blob/898094df6b3e01c3404981ce7ca268142d6ff0e5/docker-compose.yml#L21) file for an example.
example [`docker-compose.yml`](https://github.com/qvest-digital/terraform-provider-keycloak/blob/898094df6b3e01c3404981ce7ca268142d6ff0e5/docker-compose.yml#L21) file for an example.

When enabling Roles Permissions, Keycloak does several things automatically:
1. Enable Authorization on built-in `realm-management` client (if not already enabled).
Expand Down
4 changes: 2 additions & 2 deletions docs/resources/user.md
Original file line number Diff line number Diff line change
Expand Up @@ -62,8 +62,8 @@ resource "keycloak_user" "user_with_initial_password" {
- `first_name` - (Optional) The user's first name.
- `last_name` - (Optional) The user's last name.
- `attributes` - (Optional) A map representing attributes for the user. In order to add multivalue attributes, use `##` to seperate the values. Max length for each value is 255 chars
- `required_actions` - (Optional) A list of required user actions.
- `federated_identity` - (Optional) When specified, the user will be linked to a federated identity provider. Refer to the [federated user example](https://github.com/mrparkers/terraform-provider-keycloak/blob/master/example/federated_user_example.tf) for more details.
- `required_actions` - (Optional) A list of required user actions.
- `federated_identity` - (Optional) When specified, the user will be linked to a federated identity provider. Refer to the [federated user example](https://github.com/qvest-digital/terraform-provider-keycloak/blob/master/example/federated_user_example.tf) for more details.
- `identity_provider` - (Required) The name of the identity provider
- `user_id` - (Required) The ID of the user defined in the identity provider
- `user_name` - (Required) The user name of the user defined in the identity provider
Expand Down
2 changes: 1 addition & 1 deletion docs/resources/users_permissions.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Allows you to manage fine-grained permissions for all users in a realm: https://

This is part of a preview Keycloak feature: `admin_fine_grained_authz` (see https://www.keycloak.org/docs/latest/server_admin/#_fine_grain_permissions).
This feature can be enabled with the Keycloak option `-Dkeycloak.profile.feature.admin_fine_grained_authz=enabled`. See the
example [`docker-compose.yml`](https://github.com/mrparkers/terraform-provider-keycloak/blob/898094df6b3e01c3404981ce7ca268142d6ff0e5/docker-compose.yml#L21) file for an example.
example [`docker-compose.yml`](https://github.com/qvest-digital/terraform-provider-keycloak/blob/898094df6b3e01c3404981ce7ca268142d6ff0e5/docker-compose.yml#L21) file for an example.

When enabling fine-grained permissions for users, Keycloak does several things automatically:
1. Enable Authorization on built-in `realm-management` client (if not already enabled).
Expand Down
2 changes: 1 addition & 1 deletion go.mod
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
module github.com/mrparkers/terraform-provider-keycloak
module github.com/qvest-digital/terraform-provider-keycloak

require (
github.com/hashicorp/errwrap v1.0.0
Expand Down
2 changes: 1 addition & 1 deletion keycloak/extra_config.go
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ package keycloak

import (
"encoding/json"
"github.com/mrparkers/terraform-provider-keycloak/keycloak/types"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak/types"
"reflect"
"strconv"
"strings"
Expand Down
2 changes: 1 addition & 1 deletion keycloak/identity_provider.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ package keycloak
import (
"context"
"fmt"
"github.com/mrparkers/terraform-provider-keycloak/keycloak/types"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak/types"
"reflect"
)

Expand Down
4 changes: 4 additions & 0 deletions keycloak/keycloak_client.go
Original file line number Diff line number Diff line change
Expand Up @@ -530,3 +530,7 @@ func newHttpClient(tlsInsecureSkipVerify bool, clientTimeout int, caCert string)

return httpClient, nil
}

func (keycloakClient *KeycloakClient) InvalidateAccessToken() {
keycloakClient.initialLogin = false
}
2 changes: 1 addition & 1 deletion keycloak/openid_client.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ package keycloak
import (
"context"
"fmt"
"github.com/mrparkers/terraform-provider-keycloak/keycloak/types"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak/types"
"reflect"
)

Expand Down
2 changes: 1 addition & 1 deletion keycloak/openid_client_scope.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ package keycloak
import (
"context"
"fmt"
"github.com/mrparkers/terraform-provider-keycloak/keycloak/types"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak/types"
)

type OpenidClientScope struct {
Expand Down
2 changes: 1 addition & 1 deletion keycloak/realm.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ package keycloak
import (
"context"
"fmt"
"github.com/mrparkers/terraform-provider-keycloak/keycloak/types"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak/types"
"strings"
)

Expand Down
2 changes: 1 addition & 1 deletion keycloak/saml_client.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ package keycloak
import (
"context"
"fmt"
"github.com/mrparkers/terraform-provider-keycloak/keycloak/types"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak/types"
"reflect"
)

Expand Down
2 changes: 1 addition & 1 deletion keycloak/saml_client_scope.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ package keycloak
import (
"context"
"fmt"
"github.com/mrparkers/terraform-provider-keycloak/keycloak/types"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak/types"
)

type SamlClientScope struct {
Expand Down
2 changes: 1 addition & 1 deletion main.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ package main
import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/hashicorp/terraform-plugin-sdk/v2/plugin"
"github.com/mrparkers/terraform-provider-keycloak/provider"
"github.com/qvest-digital/terraform-provider-keycloak/provider"
)

func main() {
Expand Down
12 changes: 6 additions & 6 deletions makefile
Original file line number Diff line number Diff line change
Expand Up @@ -10,10 +10,10 @@ build:
CGO_ENABLED=0 go build -trimpath -ldflags "-s -w -X main.version=$(VERSION)" -o terraform-provider-keycloak_$(VERSION)

build-example: build
mkdir -p example/.terraform/plugins/terraform.local/mrparkers/keycloak/4.0.0/$(GOOS)_$(GOARCH)
mkdir -p example/terraform.d/plugins/terraform.local/mrparkers/keycloak/4.0.0/$(GOOS)_$(GOARCH)
cp terraform-provider-keycloak_* example/.terraform/plugins/terraform.local/mrparkers/keycloak/4.0.0/$(GOOS)_$(GOARCH)/
cp terraform-provider-keycloak_* example/terraform.d/plugins/terraform.local/mrparkers/keycloak/4.0.0/$(GOOS)_$(GOARCH)/
mkdir -p example/.terraform/plugins/terraform.local/qvest-digital/keycloak/4.0.0/$(GOOS)_$(GOARCH)
mkdir -p example/terraform.d/plugins/terraform.local/qvest-digital/keycloak/4.0.0/$(GOOS)_$(GOARCH)
cp terraform-provider-keycloak_* example/.terraform/plugins/terraform.local/qvest-digital/keycloak/4.0.0/$(GOOS)_$(GOARCH)/
cp terraform-provider-keycloak_* example/terraform.d/plugins/terraform.local/qvest-digital/keycloak/4.0.0/$(GOOS)_$(GOARCH)/

local: deps
docker compose up --build -d
Expand All @@ -30,8 +30,8 @@ test: fmtcheck vet
go test $(TEST)

testacc: fmtcheck vet
go test -v github.com/mrparkers/terraform-provider-keycloak/keycloak
TF_ACC=1 CHECKPOINT_DISABLE=1 go test -v -timeout 60m -parallel 4 github.com/mrparkers/terraform-provider-keycloak/provider $(TESTARGS)
go test -v github.com/qvest-digital/terraform-provider-keycloak/keycloak
TF_ACC=1 CHECKPOINT_DISABLE=1 go test -v -timeout 60m -parallel 4 github.com/qvest-digital/terraform-provider-keycloak/provider $(TESTARGS)

fmtcheck:
lineCount=$(shell gofmt -l -s $(GOFMT_FILES) | wc -l | tr -d ' ') && exit $$lineCount
Expand Down
2 changes: 1 addition & 1 deletion provider/data_source_keycloak_authentication_execution.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ import (
"context"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakAuthenticationExecution() *schema.Resource {
Expand Down
2 changes: 1 addition & 1 deletion provider/data_source_keycloak_authentication_flow.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ import (
"context"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakAuthenticationFlow() *schema.Resource {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ import (
"context"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakClientDescriptionConverter() *schema.Resource {
Expand Down
2 changes: 1 addition & 1 deletion provider/data_source_keycloak_group.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ import (
"context"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakGroup() *schema.Resource {
Expand Down
2 changes: 1 addition & 1 deletion provider/data_source_keycloak_openid_client.go
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ import (

"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakOpenidClient() *schema.Resource {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ import (
"context"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakOpenidClientAuthorizationPolicy() *schema.Resource {
Expand Down
2 changes: 1 addition & 1 deletion provider/data_source_keycloak_openid_client_scope.go
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ import (

"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakOpenidClientScope() *schema.Resource {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ import (

"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakOpenidClientServiceAccountUser() *schema.Resource {
Expand Down
2 changes: 1 addition & 1 deletion provider/data_source_keycloak_realm.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ import (
"context"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakRealm() *schema.Resource {
Expand Down
2 changes: 1 addition & 1 deletion provider/data_source_keycloak_realm_keys.go
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"

"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakRealmKeys() *schema.Resource {
Expand Down
2 changes: 1 addition & 1 deletion provider/data_source_keycloak_role.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ import (
"context"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakRole() *schema.Resource {
Expand Down
2 changes: 1 addition & 1 deletion provider/data_source_keycloak_saml_client.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ import (
"context"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakSamlClient() *schema.Resource {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ import (
"encoding/base64"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakSamlClientInstallationProvider() *schema.Resource {
Expand Down
2 changes: 1 addition & 1 deletion provider/data_source_keycloak_user.go
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ import (

"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakUser() *schema.Resource {
Expand Down
2 changes: 1 addition & 1 deletion provider/data_source_keycloak_user_realm_roles.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ import (
"context"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
)

func dataSourceKeycloakUserRealmRoles() *schema.Resource {
Expand Down
2 changes: 1 addition & 1 deletion provider/generic_keycloak_identity_provider.go
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation"
"github.com/mrparkers/terraform-provider-keycloak/keycloak"
"github.com/qvest-digital/terraform-provider-keycloak/keycloak"
"reflect"
"strings"
)
Expand Down
Loading
Loading