Skip to content

Commit 7d9b8af

Browse files
authored
chore: ci fixes (#686)
* chore: ci fixes * chore: backports
1 parent ed0fd6d commit 7d9b8af

8 files changed

Lines changed: 1309 additions & 759 deletions

File tree

.github/workflows/daily.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ jobs:
1010
strategy:
1111
fail-fast: false
1212
matrix:
13-
python-version: ["3.9", "3.10", "3.11", "3.12", "3.13"]
13+
python-version: ["3.10", "3.11", "3.12", "3.13", "3.14"]
1414
keycloak-version: ["22.0", "23.0", "24.0", "25.0", "26.0", "latest"]
1515
env:
1616
KEYCLOAK_DOCKER_IMAGE_TAG: ${{ matrix.keycloak-version }}

.github/workflows/lint.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ jobs:
2020
- name: Set up Python 3.13
2121
uses: actions/setup-python@v5
2222
with:
23-
python-version: "3.13"
23+
python-version: "3.14"
2424
- name: Install dependencies
2525
run: |
2626
python -m pip install --upgrade pip
@@ -40,7 +40,7 @@ jobs:
4040
- name: Set up Python 3.13
4141
uses: actions/setup-python@v5
4242
with:
43-
python-version: "3.13"
43+
python-version: "3.14"
4444
- name: Install dependencies
4545
run: |
4646
python -m pip install --upgrade pip
@@ -55,7 +55,7 @@ jobs:
5555
strategy:
5656
fail-fast: false
5757
matrix:
58-
python-version: ["3.9", "3.10", "3.11", "3.12", "3.13"]
58+
python-version: ["3.10", "3.11", "3.12", "3.13", "3.14"]
5959
keycloak-version: ["22.0", "23.0", "24.0", "25.0", "26.0", "latest"]
6060
needs:
6161
- check-commits
@@ -91,7 +91,7 @@ jobs:
9191
- name: Set up Python 3.13
9292
uses: actions/setup-python@v5
9393
with:
94-
python-version: "3.13"
94+
python-version: "3.14"
9595
- name: Install dependencies
9696
run: |
9797
python -m pip install --upgrade pip

.github/workflows/publish.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ jobs:
1515
- name: Set up Python 3.13
1616
uses: actions/setup-python@v5
1717
with:
18-
python-version: "3.13"
18+
python-version: "3.14"
1919
- name: Install dependencies
2020
run: |
2121
python -m pip install --upgrade pip

.readthedocs.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sphinx:
66
build:
77
os: "ubuntu-24.04"
88
tools:
9-
python: "3.13"
9+
python: "3.14"
1010
jobs:
1111
post_create_environment:
1212
- python -m pip install poetry

poetry.lock

Lines changed: 1287 additions & 734 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

pyproject.toml

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -65,10 +65,7 @@ twine = ">=4.0.2"
6565
freezegun = ">=1.2.2"
6666
docutils = "<0.21"
6767
ruff = ">=0.9.3"
68-
69-
[[tool.poetry.source]]
70-
name = "PyPI"
71-
priority = "primary"
68+
backports-asyncio-runner = { "version" = ">=1.2.0", "python" = ">=3.9,<3.11" }
7269

7370
[build-system]
7471
requires = ["poetry-core>=1.0.0"]

tests/test_keycloak_admin.py

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2620,7 +2620,7 @@ def test_auth_flows(admin: KeycloakAdmin, realm: str) -> None:
26202620

26212621
# Test flow executions
26222622
res = admin.get_authentication_flow_executions(flow_alias="browser")
2623-
assert len(res) in [8, 12, 14], res
2623+
assert len(res) in [8, 12, 14, 15], res
26242624

26252625
with pytest.raises(KeycloakGetError) as err:
26262626
admin.get_authentication_flow_executions(flow_alias="bad")
@@ -2763,7 +2763,7 @@ def test_authentication_configs(admin: KeycloakAdmin, realm: str) -> None:
27632763

27642764
# Test list of auth providers
27652765
res = admin.get_authenticator_providers()
2766-
assert len(res) <= 41
2766+
assert len(res) <= 42
27672767

27682768
res = admin.get_authenticator_provider_config_description(provider_id="auth-cookie")
27692769
assert res == {
@@ -3326,7 +3326,7 @@ def test_get_bruteforce_status_for_user(
33263326
:param realm: Keycloak realm
33273327
:type realm: str
33283328
"""
3329-
oid, username, password = oid_with_credentials
3329+
oid, username, _ = oid_with_credentials
33303330
admin.change_current_realm(realm)
33313331

33323332
# Turn on bruteforce protection
@@ -3364,7 +3364,7 @@ def test_clear_bruteforce_attempts_for_user(
33643364
:param realm: Keycloak realm
33653365
:type realm: str
33663366
"""
3367-
oid, username, password = oid_with_credentials
3367+
oid, username, _ = oid_with_credentials
33683368
admin.change_current_realm(realm)
33693369

33703370
# Turn on bruteforce protection
@@ -3405,7 +3405,7 @@ def test_clear_bruteforce_attempts_for_all_users(
34053405
:param realm: Keycloak realm
34063406
:type realm: str
34073407
"""
3408-
oid, username, password = oid_with_credentials
3408+
oid, username, _ = oid_with_credentials
34093409
admin.change_current_realm(realm)
34103410

34113411
# Turn on bruteforce protection
@@ -3566,7 +3566,7 @@ def test_initial_access_token(
35663566
assert res["count"] == 2
35673567
assert res["expiration"] == 3
35683568

3569-
oid, username, password = oid_with_credentials
3569+
oid, _, _ = oid_with_credentials
35703570

35713571
client = str(uuid.uuid4())
35723572
secret = str(uuid.uuid4())
@@ -6326,7 +6326,7 @@ async def test_a_auth_flows(admin: KeycloakAdmin, realm: str) -> None:
63266326

63276327
# Test flow executions
63286328
res = await admin.a_get_authentication_flow_executions(flow_alias="browser")
6329-
assert len(res) in [8, 12, 14], res
6329+
assert len(res) in [8, 12, 14, 15], res
63306330

63316331
with pytest.raises(KeycloakGetError) as err:
63326332
await admin.a_get_authentication_flow_executions(flow_alias="bad")
@@ -6474,7 +6474,7 @@ async def test_a_authentication_configs(admin: KeycloakAdmin, realm: str) -> Non
64746474

64756475
# Test list of auth providers
64766476
res = await admin.a_get_authenticator_providers()
6477-
assert len(res) <= 41
6477+
assert len(res) <= 42
64786478

64796479
res = await admin.a_get_authenticator_provider_config_description(provider_id="auth-cookie")
64806480
assert res == {
@@ -7060,7 +7060,7 @@ async def test_a_get_bruteforce_status_for_user(
70607060
:param realm: Keycloak realm
70617061
:type realm: str
70627062
"""
7063-
oid, username, password = oid_with_credentials
7063+
oid, username, _ = oid_with_credentials
70647064
await admin.a_change_current_realm(realm)
70657065

70667066
# Turn on bruteforce protection
@@ -7099,7 +7099,7 @@ async def test_a_clear_bruteforce_attempts_for_user(
70997099
:param realm: Keycloak realm
71007100
:type realm: str
71017101
"""
7102-
oid, username, password = oid_with_credentials
7102+
oid, username, _ = oid_with_credentials
71037103
await admin.a_change_current_realm(realm)
71047104

71057105
# Turn on bruteforce protection
@@ -7141,7 +7141,7 @@ async def test_a_clear_bruteforce_attempts_for_all_users(
71417141
:param realm: Keycloak realm
71427142
:type realm: str
71437143
"""
7144-
oid, username, password = oid_with_credentials
7144+
oid, username, _ = oid_with_credentials
71457145
await admin.a_change_current_realm(realm)
71467146

71477147
# Turn on bruteforce protection
@@ -7315,7 +7315,7 @@ async def test_a_initial_access_token(
73157315
assert res["count"] == 2
73167316
assert res["expiration"] == 3
73177317

7318-
oid, username, password = oid_with_credentials
7318+
oid, _, _ = oid_with_credentials
73197319

73207320
client = str(uuid.uuid4())
73217321
secret = str(uuid.uuid4())

tests/test_keycloak_openid.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -383,7 +383,7 @@ def test_load_authorization_config(
383383
server with client credentials
384384
:type oid_with_credentials_authz: Tuple[KeycloakOpenID, str, str]
385385
"""
386-
oid, username, password = oid_with_credentials_authz
386+
oid, _, _ = oid_with_credentials_authz
387387

388388
oid.load_authorization_config(path="tests/data/authz_settings.json")
389389
assert "test-authz-rb-policy" in oid.authorization.policies
@@ -927,7 +927,7 @@ async def test_a_load_authorization_config(
927927
server with client credentials
928928
:type oid_with_credentials_authz: Tuple[KeycloakOpenID, str, str]
929929
"""
930-
oid, username, password = oid_with_credentials_authz
930+
oid, _, _ = oid_with_credentials_authz
931931

932932
await oid.a_load_authorization_config(path="tests/data/authz_settings.json")
933933
assert "test-authz-rb-policy" in oid.authorization.policies

0 commit comments

Comments
 (0)