* list sub group of a group using the id
* introduced group bread crumb component to render
this builds up the groups as you click to subgroups
* added deeplinking
* fixed route config types
* fixed new realm prefix
* added null checks for if group not found
* changed labes to groups
* created scope picker
* added user select
* added evaluate function
* added the tabs
* added generated token
* added useFetch
* fixed formating after merge
* fixed the tabs layout
Co-authored-by: srambach
* added space between tabs and content
* added help into text
* whoAmI has the realm access information
so when a new realm is created the whoAmI request has to be done again
* fixed "add realm" button
* remove debug
* refactor
* also force token update
* refresh realm list on realm change
fix storybook demos
add attributes tab to realm roles section
use TableComposable
fix formatting
css updates
fix up styling of role attributes table
fix check-types erros
logic from call with Jeff
clean up, format, make eslint proud
delete roledetails
call with Erik
add delete function and css changes
fix storybook demos and format
make key input disabled once new attribute is created
minus icon gray
address PR feedback from Sarah
set add and save buttons to disabled when new input field is empty
fix save/add
fix onChange formState
rebase with resolved conflicts
fix formatting
remove !important
Update RealmRolesSection.css
Update src/realm-roles/RoleAttributes.tsx
Co-authored-by: Erik Jan de Wit <erikjan.dewit@gmail.com>
address PR feedback from Sarah and Erik
fix paths and use error msg from response
remove log stmt
fix lint
remove minLength
* renamed `useFetch` to `asyncStateFetch`
otherwise React will mistake it for a react hook and will complain.
* added jsdoc
* fixed the user red stories
* renamed
* remove circular dependency on realm context
* added realm as a param of the url
* updated links to include realm
* null !== undefined
* set realm if realm in url
* fixed breadcrumb type
* fixed tests
* addressed pr review comments
* KEYCLOAK-13923 - Support PKCE for Identity Provider
We now support usage of PKCE for OIDC based Identity Providers.
* KEYCLOAK-13923 Warn if PKCE information cannot be found code-to-token request in OIDCIdentityProvider
* KEYCLOAK-13923 Pull up PKCE handling from OIDC to OAuth IdentityProvider infrastructure
* KEYCLOAK-13923 Adding test for PKCE support for OAuth Identity providers
* KEYCLOAK-13923 Use URI from KeycloakContext instead of HttpRequest
Co-authored-by: Pedro Igor <pigor.craveiro@gmail.com>
Co-authored-by: Pedro Igor <pigor.craveiro@gmail.com>