mirror of
https://github.com/keycloak/keycloak.git
synced 2026-01-10 15:32:05 -03:30
[Test framework MVP] ManagementPermissionsTest (#35109)
Signed-off-by: Lukas Hanusovsky <lhanusov@redhat.com>
This commit is contained in:
parent
c51959836c
commit
2e0b0d3878
@ -14,38 +14,48 @@
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.keycloak.testsuite.admin;
|
||||
package org.keycloak.test.admin;
|
||||
|
||||
import org.junit.Test;
|
||||
import org.junit.jupiter.api.Test;
|
||||
import org.keycloak.admin.client.resource.ClientResource;
|
||||
import org.keycloak.admin.client.resource.GroupResource;
|
||||
import org.keycloak.admin.client.resource.RealmResource;
|
||||
import org.keycloak.admin.client.resource.RoleResource;
|
||||
import org.keycloak.common.Profile;
|
||||
import org.keycloak.representations.idm.*;
|
||||
import org.keycloak.testsuite.AbstractTestRealmKeycloakTest;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
import org.keycloak.test.framework.annotations.InjectRealm;
|
||||
import org.keycloak.test.framework.annotations.KeycloakIntegrationTest;
|
||||
import org.keycloak.test.framework.realm.ManagedRealm;
|
||||
import org.keycloak.test.framework.server.KeycloakTestServerConfig;
|
||||
import org.keycloak.test.utils.admin.ApiUtil;
|
||||
|
||||
import jakarta.ws.rs.core.Response;
|
||||
|
||||
import static org.junit.Assert.assertFalse;
|
||||
import static org.junit.Assert.assertNotNull;
|
||||
import static org.junit.Assert.assertTrue;
|
||||
import java.util.Set;
|
||||
|
||||
import static org.junit.jupiter.api.Assertions.assertFalse;
|
||||
import static org.junit.jupiter.api.Assertions.assertNotNull;
|
||||
import static org.junit.jupiter.api.Assertions.assertTrue;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:leon.graser@bosch-si.com">Leon Graser</a>
|
||||
*/
|
||||
@EnableFeature(value = Profile.Feature.ADMIN_FINE_GRAINED_AUTHZ, skipRestart = true)
|
||||
public class ManagementPermissionsTest extends AbstractTestRealmKeycloakTest {
|
||||
@KeycloakIntegrationTest(config = ManagementPermissionsTest.ServerConfig.class)
|
||||
public class ManagementPermissionsTest {
|
||||
|
||||
@Override
|
||||
public void configureTestRealm(RealmRepresentation testRealm) {
|
||||
@InjectRealm
|
||||
private ManagedRealm realm;
|
||||
|
||||
public static class ServerConfig implements KeycloakTestServerConfig {
|
||||
|
||||
@Override
|
||||
public Set<String> features() {
|
||||
return Set.of("admin-fine-grained-authz");
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void updateGroupPermissions() {
|
||||
RealmResource realmResource = adminClient.realms().realm("test");
|
||||
RealmResource realmResource = realm.admin();
|
||||
GroupRepresentation group = new GroupRepresentation();
|
||||
group.setName("perm-group-test");
|
||||
Response response = realmResource.groups().add(group);
|
||||
@ -97,7 +107,7 @@ public class ManagementPermissionsTest extends AbstractTestRealmKeycloakTest {
|
||||
|
||||
@Test
|
||||
public void updateClientPermissions() {
|
||||
RealmResource realmResource = adminClient.realms().realm("test");
|
||||
RealmResource realmResource = realm.admin();
|
||||
ClientRepresentation clientRepresentation = new ClientRepresentation();
|
||||
clientRepresentation.setName("perm-client-test");
|
||||
Response response = realmResource.clients().create(clientRepresentation);
|
||||
@ -149,7 +159,7 @@ public class ManagementPermissionsTest extends AbstractTestRealmKeycloakTest {
|
||||
|
||||
@Test
|
||||
public void updateRealmRolePermissions() {
|
||||
RealmResource realmResource = adminClient.realms().realm("test");
|
||||
RealmResource realmResource = realm.admin();
|
||||
RoleRepresentation roleRepresentation = new RoleRepresentation();
|
||||
roleRepresentation.setName("perm-role-test");
|
||||
realmResource.roles().create(roleRepresentation);
|
||||
@ -200,7 +210,7 @@ public class ManagementPermissionsTest extends AbstractTestRealmKeycloakTest {
|
||||
|
||||
@Test
|
||||
public void updateClientRolePermissions() {
|
||||
RealmResource realmResource = adminClient.realms().realm("test");
|
||||
RealmResource realmResource = realm.admin();
|
||||
ClientRepresentation clientRepresentation = new ClientRepresentation();
|
||||
clientRepresentation.setName("perm-client-test");
|
||||
Response response = realmResource.clients().create(clientRepresentation);
|
||||
@ -52,5 +52,10 @@
|
||||
<groupId>org.keycloak</groupId>
|
||||
<artifactId>keycloak-junit5</artifactId>
|
||||
</dependency>
|
||||
<dependency>
|
||||
<groupId>org.keycloak</groupId>
|
||||
<artifactId>keycloak-admin-client-tests</artifactId>
|
||||
<version>${project.version}</version>
|
||||
</dependency>
|
||||
</dependencies>
|
||||
</project>
|
||||
|
||||
@ -0,0 +1,339 @@
|
||||
/*
|
||||
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||
* and other contributors as indicated by the @author tags.
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.keycloak.test.utils.admin;
|
||||
|
||||
import org.jboss.logging.Logger;
|
||||
import org.keycloak.admin.client.resource.AuthorizationResource;
|
||||
import org.keycloak.admin.client.resource.ClientResource;
|
||||
import org.keycloak.admin.client.resource.ClientScopeResource;
|
||||
import org.keycloak.admin.client.resource.GroupResource;
|
||||
import org.keycloak.admin.client.resource.RealmResource;
|
||||
import org.keycloak.admin.client.resource.RoleResource;
|
||||
import org.keycloak.admin.client.resource.UserResource;
|
||||
import org.keycloak.models.UserModel;
|
||||
import org.keycloak.representations.idm.ClientRepresentation;
|
||||
import org.keycloak.representations.idm.ClientScopeRepresentation;
|
||||
import org.keycloak.representations.idm.CredentialRepresentation;
|
||||
import org.keycloak.representations.idm.GroupRepresentation;
|
||||
import org.keycloak.representations.idm.ProtocolMapperRepresentation;
|
||||
import org.keycloak.representations.idm.RequiredActionProviderRepresentation;
|
||||
import org.keycloak.representations.idm.RoleRepresentation;
|
||||
import org.keycloak.representations.idm.UserRepresentation;
|
||||
|
||||
import jakarta.ws.rs.WebApplicationException;
|
||||
import jakarta.ws.rs.core.Response;
|
||||
import jakarta.ws.rs.core.Response.Status;
|
||||
import jakarta.ws.rs.core.Response.StatusType;
|
||||
import java.net.URI;
|
||||
import java.util.ArrayList;
|
||||
import java.util.Arrays;
|
||||
import java.util.List;
|
||||
import java.util.stream.Collectors;
|
||||
|
||||
import static org.keycloak.representations.idm.CredentialRepresentation.PASSWORD;
|
||||
|
||||
/**
|
||||
* @author Stan Silvert ssilvert@redhat.com (C) 2016 Red Hat Inc.
|
||||
*/
|
||||
public class ApiUtil {
|
||||
|
||||
private static final Logger log = Logger.getLogger(ApiUtil.class);
|
||||
|
||||
public static String getCreatedId(Response response) {
|
||||
URI location = response.getLocation();
|
||||
if (!response.getStatusInfo().equals(Status.CREATED)) {
|
||||
StatusType statusInfo = response.getStatusInfo();
|
||||
response.bufferEntity();
|
||||
String body = response.readEntity(String.class);
|
||||
throw new WebApplicationException("Create method returned status "
|
||||
+ statusInfo.getReasonPhrase() + " (Code: " + statusInfo.getStatusCode() + "); expected status: Created (201). Response body: " + body, response);
|
||||
}
|
||||
if (location == null) {
|
||||
return null;
|
||||
}
|
||||
String path = location.getPath();
|
||||
return path.substring(path.lastIndexOf('/') + 1);
|
||||
}
|
||||
|
||||
public static ClientResource findClientResourceById(RealmResource realm, String id) {
|
||||
for (ClientRepresentation c : realm.clients().findAll()) {
|
||||
if (c.getId().equals(id)) {
|
||||
return realm.clients().get(c.getId());
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
public static ClientResource findClientResourceByClientId(RealmResource realm, String clientId) {
|
||||
for (ClientRepresentation c : realm.clients().findAll()) {
|
||||
if (c.getClientId().equals(clientId)) {
|
||||
return realm.clients().get(c.getId());
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
public static ClientResource findClientResourceByName(RealmResource realm, String name) {
|
||||
for (ClientRepresentation c : realm.clients().findAll()) {
|
||||
if (name.equals(c.getName())) {
|
||||
return realm.clients().get(c.getId());
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
public static ClientResource findClientByClientId(RealmResource realm, String clientId) {
|
||||
for (ClientRepresentation c : realm.clients().findAll()) {
|
||||
if (clientId.equals(c.getClientId())) {
|
||||
return realm.clients().get(c.getId());
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
public static RoleResource findClientRoleByName(ClientResource client, String role) {
|
||||
return client.roles().get(role);
|
||||
}
|
||||
|
||||
public static ProtocolMapperRepresentation findProtocolMapperByName(ClientResource client, String name) {
|
||||
for (ProtocolMapperRepresentation p : client.getProtocolMappers().getMappers()) {
|
||||
if (p.getName().equals(name)) {
|
||||
return p;
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
public static ProtocolMapperRepresentation findProtocolMapperByName(ClientScopeResource scope, String name) {
|
||||
for (ProtocolMapperRepresentation p : scope.getProtocolMappers().getMappers()) {
|
||||
if (p.getName().equals(name)) {
|
||||
return p;
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
public static ClientScopeResource findClientScopeByName(RealmResource realm, String clientScopeName) {
|
||||
for (ClientScopeRepresentation clientScope : realm.clientScopes().findAll()) {
|
||||
if (clientScopeName.equals(clientScope.getName())) {
|
||||
return realm.clientScopes().get(clientScope.getId());
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
public static RoleResource findRealmRoleByName(RealmResource realm, String role) {
|
||||
return realm.roles().get(role);
|
||||
}
|
||||
|
||||
public static UserRepresentation findUserByUsername(RealmResource realm, String username) {
|
||||
UserRepresentation user = null;
|
||||
List<UserRepresentation> ur = realm.users().search(username, true);
|
||||
if (ur.size() == 1) {
|
||||
user = ur.get(0);
|
||||
}
|
||||
|
||||
if (ur.size() > 1) { // try to be more specific
|
||||
for (UserRepresentation rep : ur) {
|
||||
if (rep.getUsername().equalsIgnoreCase(username)) {
|
||||
return rep;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return user;
|
||||
}
|
||||
|
||||
public static UserResource findUserByUsernameId(RealmResource realm, String username) {
|
||||
return realm.users().get(findUserByUsername(realm, username).getId());
|
||||
}
|
||||
|
||||
/**
|
||||
* Creates a user
|
||||
* @param realm
|
||||
* @param user
|
||||
* @return ID of the new user
|
||||
*/
|
||||
public static String createUserWithAdminClient(RealmResource realm, UserRepresentation user) {
|
||||
Response response = realm.users().create(user);
|
||||
String createdId = getCreatedId(response);
|
||||
response.close();
|
||||
return createdId;
|
||||
}
|
||||
|
||||
/**
|
||||
* Creates a user and sets the password
|
||||
* @param realm
|
||||
* @param user
|
||||
* @param password
|
||||
* @return ID of the new user
|
||||
*/
|
||||
public static String createUserAndResetPasswordWithAdminClient(RealmResource realm, UserRepresentation user, String password) {
|
||||
return createUserAndResetPasswordWithAdminClient(realm, user, password, false);
|
||||
}
|
||||
|
||||
/**
|
||||
* Creates a user and sets the password
|
||||
* @param realm
|
||||
* @param user
|
||||
* @param password
|
||||
* @param temporary
|
||||
* @return ID of the new user
|
||||
*/
|
||||
public static String createUserAndResetPasswordWithAdminClient(RealmResource realm, UserRepresentation user, String password, boolean temporary) {
|
||||
String id = createUserWithAdminClient(realm, user);
|
||||
resetUserPassword(realm.users().get(id), password, temporary);
|
||||
return id;
|
||||
}
|
||||
|
||||
public static void resetUserPassword(UserResource userResource, String newPassword, boolean temporary) {
|
||||
CredentialRepresentation newCredential = new CredentialRepresentation();
|
||||
newCredential.setType(PASSWORD);
|
||||
newCredential.setValue(newPassword);
|
||||
newCredential.setTemporary(temporary);
|
||||
userResource.resetPassword(newCredential);
|
||||
}
|
||||
|
||||
public static void assignRealmRoles(RealmResource realm, String userId, String... roles) {
|
||||
String realmName = realm.toRepresentation().getRealm();
|
||||
|
||||
List<RoleRepresentation> roleRepresentations = new ArrayList<>();
|
||||
for (String roleName : roles) {
|
||||
RoleRepresentation role = realm.roles().get(roleName).toRepresentation();
|
||||
roleRepresentations.add(role);
|
||||
}
|
||||
|
||||
UserResource userResource = realm.users().get(userId);
|
||||
log.info("assigning roles " + Arrays.toString(roles) + " to user: \""
|
||||
+ userResource.toRepresentation().getUsername() + "\" in realm: \"" + realmName + "\"");
|
||||
userResource.roles().realmLevel().add(roleRepresentations);
|
||||
}
|
||||
|
||||
public static void removeUserByUsername(RealmResource realmResource, String username) {
|
||||
UserRepresentation user = findUserByUsername(realmResource, username);
|
||||
if (user != null) {
|
||||
realmResource.users().delete(user.getId());
|
||||
}
|
||||
}
|
||||
|
||||
public static void assignClientRoles(RealmResource realm, String userId, String clientName, String... roles) {
|
||||
String realmName = realm.toRepresentation().getRealm();
|
||||
String clientId = "";
|
||||
for (ClientRepresentation clientRepresentation : realm.clients().findAll()) {
|
||||
if (clientRepresentation.getClientId().equals(clientName)) {
|
||||
clientId = clientRepresentation.getId();
|
||||
}
|
||||
}
|
||||
|
||||
if (!clientId.isEmpty()) {
|
||||
ClientResource clientResource = realm.clients().get(clientId);
|
||||
|
||||
List<RoleRepresentation> roleRepresentations = new ArrayList<>();
|
||||
for (String roleName : roles) {
|
||||
RoleRepresentation role = clientResource.roles().get(roleName).toRepresentation();
|
||||
roleRepresentations.add(role);
|
||||
}
|
||||
|
||||
UserResource userResource = realm.users().get(userId);
|
||||
log.info("assigning role: " + Arrays.toString(roles) + " to user: \""
|
||||
+ userResource.toRepresentation().getUsername() + "\" of client: \""
|
||||
+ clientName + "\" in realm: \"" + realmName + "\"");
|
||||
userResource.roles().clientLevel(clientId).add(roleRepresentations);
|
||||
} else {
|
||||
log.warn("client with name " + clientName + " doesn't exist in realm " + realmName);
|
||||
}
|
||||
}
|
||||
|
||||
public static boolean groupContainsSubgroup(GroupResource groupsResource, GroupRepresentation subgroup) {
|
||||
boolean contains = false;
|
||||
for (GroupRepresentation sg : groupsResource.getSubGroups(null,null, true)) {
|
||||
if (subgroup.getId().equals(sg.getId())) {
|
||||
contains = true;
|
||||
break;
|
||||
}
|
||||
}
|
||||
return contains;
|
||||
}
|
||||
|
||||
public static AuthorizationResource findAuthorizationSettings(RealmResource realm, String clientId) {
|
||||
for (ClientRepresentation c : realm.clients().findAll()) {
|
||||
if (c.getClientId().equals(clientId)) {
|
||||
return realm.clients().get(c.getId()).authorization();
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
/**
|
||||
* Updates the order of required actions
|
||||
*
|
||||
* @param realmResource the realm
|
||||
* @param requiredActionsInTargetOrder the required actions for which the order should be changed (order will be the
|
||||
* order of this list) - can be a subset of the available required actions
|
||||
* @see #updateRequiredActionsOrderByAlias(RealmResource, List)
|
||||
*/
|
||||
public static void updateRequiredActionsOrder(final RealmResource realmResource,
|
||||
final List<UserModel.RequiredAction> requiredActionsInTargetOrder) {
|
||||
updateRequiredActionsOrderByAlias(realmResource,
|
||||
requiredActionsInTargetOrder.stream().map(Enum::name).collect(Collectors.toList()));
|
||||
}
|
||||
|
||||
/**
|
||||
* @see #updateRequiredActionsOrder(RealmResource, List)
|
||||
*/
|
||||
public static void updateRequiredActionsOrderByAlias(final RealmResource realmResource,
|
||||
final List<String> requiredActionsInTargetOrder) {
|
||||
final var realmName = realmResource.toRepresentation().getRealm();
|
||||
final var initialRequiredActionsOrdered = realmResource.flows().getRequiredActions().stream()
|
||||
.map(RequiredActionProviderRepresentation::getAlias).collect(Collectors.toList());
|
||||
log.infof("initial required actions order for realm '%s': %s", realmName, initialRequiredActionsOrdered);
|
||||
log.infof("target order for realm '%s' (maybe partial): %s", realmName, requiredActionsInTargetOrder);
|
||||
|
||||
final var requiredActionsToConfigureWithLowerPrio = new ArrayList<>(requiredActionsInTargetOrder);
|
||||
for (final var requiredActionAlias : requiredActionsInTargetOrder) {
|
||||
var allRequiredActionsOrdered = realmResource.flows().getRequiredActions().stream()
|
||||
.map(RequiredActionProviderRepresentation::getAlias).collect(Collectors.toList());
|
||||
|
||||
requiredActionsToConfigureWithLowerPrio.remove(requiredActionAlias);
|
||||
|
||||
final var currentIndex = allRequiredActionsOrdered.indexOf(requiredActionAlias);
|
||||
if (currentIndex == -1) {
|
||||
throw new IllegalStateException("Required action not found: " + requiredActionAlias);
|
||||
}
|
||||
|
||||
final var aliasOfCurrentlyFirstActionWithLowerTargetPrioOpt = allRequiredActionsOrdered.stream()
|
||||
.filter(requiredActionsToConfigureWithLowerPrio::contains).findFirst();
|
||||
aliasOfCurrentlyFirstActionWithLowerTargetPrioOpt
|
||||
.ifPresent(aliasOfCurrentlyFirstActionWithLowerTargetPrio -> {
|
||||
final var indexOfCurrentlyFirstActionWithLowerTargetPrio =
|
||||
allRequiredActionsOrdered.indexOf(aliasOfCurrentlyFirstActionWithLowerTargetPrio);
|
||||
final var positionsToMoveCurrentActionUp =
|
||||
Math.max(currentIndex - indexOfCurrentlyFirstActionWithLowerTargetPrio, 0);
|
||||
if (positionsToMoveCurrentActionUp > 0) {
|
||||
for (var i = 0; i < positionsToMoveCurrentActionUp; i++) {
|
||||
realmResource.flows().raiseRequiredActionPriority(requiredActionAlias);
|
||||
}
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
final var updatedRequiredActionsOrdered = realmResource.flows().getRequiredActions().stream()
|
||||
.map(RequiredActionProviderRepresentation::getAlias).collect(Collectors.toList());
|
||||
log.infof("updated required actions order for realm '%s': %s", realmName, updatedRequiredActionsOrdered);
|
||||
}
|
||||
|
||||
}
|
||||
Loading…
x
Reference in New Issue
Block a user