deleteRealmRoleMappings(List) |  | 0% |  | 0% | 5 | 5 | 20 | 20 | 1 | 1 |
addRealmRoleMappings(List) |  | 0% |  | 0% | 4 | 4 | 15 | 15 | 1 | 1 |
lambda$getRoleMappings$0(List, AtomicReference, Map, RoleModel) |  | 0% |  | 0% | 4 | 4 | 14 | 14 | 1 | 1 |
getRoleMappings() |  | 0% |  | 0% | 3 | 3 | 9 | 9 | 1 | 1 |
RoleMapperResource(KeycloakSession, AdminPermissionEvaluator, RoleMapperModel, AdminEventBuilder, AdminPermissionEvaluator.RequirePermissionCheck, AdminPermissionEvaluator.RequirePermissionCheck) |  | 0% | | n/a | 1 | 1 | 11 | 11 | 1 | 1 |
getUserClientRoleMappingsResource(String) |  | 0% |  | 0% | 2 | 2 | 5 | 5 | 1 | 1 |
getCompositeRealmRoleMappings(boolean) |  | 0% |  | 0% | 2 | 2 | 6 | 6 | 1 | 1 |
getAvailableRealmRoleMappings() |  | 0% | | n/a | 1 | 1 | 5 | 5 | 1 | 1 |
lambda$deleteRealmRoleMappings$1(RoleModel) |  | 0% | | n/a | 1 | 1 | 3 | 3 | 1 | 1 |
getRealmRoleMappings() |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
canMapRole(RoleModel) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
static {...} |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |