@@ -113,8 +113,8 @@ def _token_info(self, token, method_token_info, **kwargs):
113
113
:param kwargs:
114
114
:return:
115
115
"""
116
- if method_token_info == 'instropect ' :
117
- token_info = self .instropect (token )
116
+ if method_token_info == 'introspect ' :
117
+ token_info = self .introspect (token )
118
118
else :
119
119
token_info = self .decode_token (token , ** kwargs )
120
120
@@ -228,7 +228,7 @@ def entitlement(self, token, resource_server_id):
228
228
229
229
return raise_error_from_response (data_raw , KeycloakGetError )
230
230
231
- def instropect (self , token , rpt = None , token_type_hint = None ):
231
+ def introspect (self , token , rpt = None , token_type_hint = None ):
232
232
"""
233
233
The introspection endpoint is used to retrieve the active state of a token. It is can only be
234
234
invoked by confidential clients.
@@ -291,7 +291,7 @@ def load_authorization_config(self, path):
291
291
self .authorization .load_config (authorization_json )
292
292
authorization_file .close ()
293
293
294
- def get_policies (self , token , method_token_info = 'instropect ' , ** kwargs ):
294
+ def get_policies (self , token , method_token_info = 'introspect ' , ** kwargs ):
295
295
"""
296
296
Get policies by user token
297
297
@@ -306,7 +306,7 @@ def get_policies(self, token, method_token_info='instropect', **kwargs):
306
306
307
307
token_info = self ._token_info (token , method_token_info , ** kwargs )
308
308
309
- if method_token_info == 'instropect ' and not token_info ['active' ]:
309
+ if method_token_info == 'introspect ' and not token_info ['active' ]:
310
310
raise KeycloakInvalidTokenError (
311
311
"Token expired or invalid."
312
312
)
@@ -325,7 +325,7 @@ def get_policies(self, token, method_token_info='instropect', **kwargs):
325
325
326
326
return list (set (policies ))
327
327
328
- def get_permissions (self , token , method_token_info = 'instropect ' , ** kwargs ):
328
+ def get_permissions (self , token , method_token_info = 'introspect ' , ** kwargs ):
329
329
"""
330
330
Get permission by user token
331
331
@@ -342,7 +342,7 @@ def get_permissions(self, token, method_token_info='instropect', **kwargs):
342
342
343
343
token_info = self ._token_info (token , method_token_info , ** kwargs )
344
344
345
- if method_token_info == 'instropect ' and not token_info ['active' ]:
345
+ if method_token_info == 'introspect ' and not token_info ['active' ]:
346
346
raise KeycloakInvalidTokenError (
347
347
"Token expired or invalid."
348
348
)
0 commit comments