@@ -508,7 +508,6 @@ func (g *GoCloak) GetRequestingPartyPermissions(ctx context.Context, token, real
508
508
if err := checkForError (resp , err , errMessage ); err != nil {
509
509
return nil , err
510
510
}
511
-
512
511
return & res , nil
513
512
}
514
513
@@ -4304,3 +4303,38 @@ func (g *GoCloak) RevokeToken(ctx context.Context, realm, clientID, clientSecret
4304
4303
4305
4304
return checkForError (resp , err , errMessage )
4306
4305
}
4306
+
4307
+ // UpdateUsersManagementPermissions updates the management permissions for users
4308
+ func (g * GoCloak ) UpdateUsersManagementPermissions (ctx context.Context , accessToken , realm string , managementPermissions ManagementPermissionRepresentation ) (* ManagementPermissionRepresentation , error ) {
4309
+ const errMessage = "could not update users management permissions"
4310
+
4311
+ var result ManagementPermissionRepresentation
4312
+
4313
+ resp , err := g .GetRequestWithBearerAuth (ctx , accessToken ).
4314
+ SetResult (& result ).
4315
+ SetBody (managementPermissions ).
4316
+ Put (g .getAdminRealmURL (realm , "users-management-permissions" ))
4317
+
4318
+ if err := checkForError (resp , err , errMessage ); err != nil {
4319
+ return nil , err
4320
+ }
4321
+
4322
+ return & result , nil
4323
+ }
4324
+
4325
+ // GetUsersManagementPermissions returns the management permissions for users
4326
+ func (g * GoCloak ) GetUsersManagementPermissions (ctx context.Context , accessToken , realm string ) (* ManagementPermissionRepresentation , error ) {
4327
+ const errMessage = "could not get users management permissions"
4328
+
4329
+ var result ManagementPermissionRepresentation
4330
+
4331
+ resp , err := g .GetRequestWithBearerAuth (ctx , accessToken ).
4332
+ SetResult (& result ).
4333
+ Get (g .getAdminRealmURL (realm , "users-management-permissions" ))
4334
+
4335
+ if err := checkForError (resp , err , errMessage ); err != nil {
4336
+ return nil , err
4337
+ }
4338
+
4339
+ return & result , nil
4340
+ }
0 commit comments