keycloakify 10.0.0-rc.86 → 10.0.0-rc.89

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/bin/440.index.js CHANGED
@@ -485,7 +485,15 @@ var crawl = __webpack_require__(73036);
485
485
  /** Assumes the theme type exists */
486
486
  function readFieldNameUsage(params) {
487
487
  const { themeSrcDirPath, themeType } = params;
488
- const fieldNames = new Set();
488
+ // NOTE: We pre-populate with the synthetic user attributes defined in useUserProfileForm (can't be parsed automatically)
489
+ const fieldNames = new Set([
490
+ "firstName",
491
+ "lastName",
492
+ "email",
493
+ "username",
494
+ "password",
495
+ "password-confirm"
496
+ ]);
489
497
  for (const srcDirPath of [
490
498
  (0,external_path_.join)((0,getThisCodebaseRootDirPath/* getThisCodebaseRootDirPath */.e)(), "src", themeType),
491
499
  (0,external_path_.join)(themeSrcDirPath, themeType)
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "keycloakify",
3
- "version": "10.0.0-rc.86",
3
+ "version": "10.0.0-rc.89",
4
4
  "description": "Create Keycloak themes using React",
5
5
  "repository": {
6
6
  "type": "git",
@@ -211,8 +211,6 @@ function decodeHtmlEntities(htmlStr){
211
211
  <#continue>
212
212
  </#if>
213
213
 
214
- USER_DEFINED_EXCLUSIONS_eKsaY4ZsZ4eMr2
215
-
216
214
  <#-- https://github.com/keycloakify/keycloakify/discussions/406 -->
217
215
  <#if (
218
216
  ["register.ftl", "register-user-profile.ftl", "terms.ftl", "info.ftl", "login.ftl", "login-update-password.ftl", "login-oauth2-device-verify-user-code.ftl"]?seq_contains(pageId) &&
@@ -228,6 +226,8 @@ function decodeHtmlEntities(htmlStr){
228
226
  <#local out_seq += ["/*Accessing attemptedUsername throwed an exception */"]>
229
227
  </#attempt>
230
228
  </#if>
229
+
230
+ USER_DEFINED_EXCLUSIONS_eKsaY4ZsZ4eMr2
231
231
 
232
232
  <#attempt>
233
233
  <#if !object[key]??>
@@ -11,7 +11,15 @@ export function readFieldNameUsage(params: {
11
11
  }): string[] {
12
12
  const { themeSrcDirPath, themeType } = params;
13
13
 
14
- const fieldNames = new Set<string>();
14
+ // NOTE: We pre-populate with the synthetic user attributes defined in useUserProfileForm (can't be parsed automatically)
15
+ const fieldNames = new Set<string>([
16
+ "firstName",
17
+ "lastName",
18
+ "email",
19
+ "username",
20
+ "password",
21
+ "password-confirm"
22
+ ]);
15
23
 
16
24
  for (const srcDirPath of [
17
25
  pathJoin(getThisCodebaseRootDirPath(), "src", themeType),
@@ -1,6 +1,8 @@
1
1
  {
2
2
  "id": "34c5f904-d66e-4d8f-8876-8f00d9fa9d6c",
3
3
  "realm": "myrealm",
4
+ "displayName": "",
5
+ "displayNameHtml": "",
4
6
  "notBefore": 0,
5
7
  "defaultSignatureAlgorithm": "RS256",
6
8
  "revokeRefreshToken": false,
@@ -1356,11 +1358,11 @@
1356
1358
  "config": {
1357
1359
  "allowed-protocol-mapper-types": [
1358
1360
  "oidc-sha256-pairwise-sub-mapper",
1359
- "oidc-address-mapper",
1360
1361
  "saml-user-property-mapper",
1362
+ "oidc-address-mapper",
1361
1363
  "oidc-full-name-mapper",
1362
- "oidc-usermodel-attribute-mapper",
1363
1364
  "saml-role-list-mapper",
1365
+ "oidc-usermodel-attribute-mapper",
1364
1366
  "saml-user-attribute-mapper",
1365
1367
  "oidc-usermodel-property-mapper"
1366
1368
  ]
@@ -1431,13 +1433,13 @@
1431
1433
  "subComponents": {},
1432
1434
  "config": {
1433
1435
  "allowed-protocol-mapper-types": [
1434
- "saml-user-property-mapper",
1436
+ "saml-role-list-mapper",
1435
1437
  "oidc-full-name-mapper",
1438
+ "oidc-address-mapper",
1436
1439
  "saml-user-attribute-mapper",
1437
1440
  "oidc-sha256-pairwise-sub-mapper",
1438
- "saml-role-list-mapper",
1439
- "oidc-address-mapper",
1440
1441
  "oidc-usermodel-attribute-mapper",
1442
+ "saml-user-property-mapper",
1441
1443
  "oidc-usermodel-property-mapper"
1442
1444
  ]
1443
1445
  }
@@ -2127,17 +2129,20 @@
2127
2129
  "dockerAuthenticationFlow": "docker auth",
2128
2130
  "attributes": {
2129
2131
  "cibaBackchannelTokenDeliveryMode": "poll",
2130
- "cibaExpiresIn": "120",
2131
2132
  "cibaAuthRequestedUserHint": "login_hint",
2132
- "oauth2DeviceCodeLifespan": "600",
2133
2133
  "clientOfflineSessionMaxLifespan": "0",
2134
2134
  "oauth2DevicePollingInterval": "5",
2135
2135
  "clientSessionIdleTimeout": "0",
2136
- "parRequestUriLifespan": "60",
2137
- "clientSessionMaxLifespan": "0",
2136
+ "userProfileEnabled": "true",
2138
2137
  "clientOfflineSessionIdleTimeout": "0",
2139
2138
  "cibaInterval": "5",
2140
- "realmReusableOtpCode": "false"
2139
+ "realmReusableOtpCode": "false",
2140
+ "cibaExpiresIn": "120",
2141
+ "oauth2DeviceCodeLifespan": "600",
2142
+ "parRequestUriLifespan": "60",
2143
+ "clientSessionMaxLifespan": "0",
2144
+ "frontendUrl": "",
2145
+ "acr.loa.map": "{}"
2141
2146
  },
2142
2147
  "keycloakVersion": "23.0.7",
2143
2148
  "userManagedAccessAllowed": false,