use of org.keycloak.representations.idm.ClientScopeRepresentation in project keycloak by keycloak.
the class OAuthGrantTest method oauthGrantAddAnotherScope.
@Test
public void oauthGrantAddAnotherScope() {
// Grant permissions on grant screen
oauth.clientId(THIRD_PARTY_APP);
oauth.doLoginGrant("test-user@localhost", "password");
// Create new clientScope and add to client
RealmResource appRealm = adminClient.realm(REALM_NAME);
ClientScopeRepresentation scope1 = new ClientScopeRepresentation();
scope1.setName("foo-scope");
scope1.setProtocol(OIDCLoginProtocol.LOGIN_PROTOCOL);
Response response = appRealm.clientScopes().create(scope1);
String fooScopeId = ApiUtil.getCreatedId(response);
response.close();
getCleanup().addClientScopeId(fooScopeId);
// Add clientScope to client
ClientResource thirdParty = findClientByClientId(appRealm, THIRD_PARTY_APP);
thirdParty.addDefaultClientScope(fooScopeId);
// Confirm grant page
grantPage.assertCurrent();
grantPage.accept();
events.expectLogin().client(THIRD_PARTY_APP).detail(Details.CONSENT, Details.CONSENT_VALUE_CONSENT_GRANTED).assertEvent();
// Assert new clientScope not yet in account mgmt
accountAppsPage.open();
AccountApplicationsPage.AppEntry appEntry = accountAppsPage.getApplications().get(THIRD_PARTY_APP);
Assert.assertFalse(appEntry.getClientScopesGranted().contains("foo-scope"));
// Show grant page another time. Just new clientScope is on the page
oauth.openLoginForm();
grantPage.assertCurrent();
grantPage.assertGrants("foo-scope");
grantPage.accept();
events.expectLogin().client(THIRD_PARTY_APP).detail(Details.CONSENT, Details.CONSENT_VALUE_CONSENT_GRANTED).assertEvent();
// Go to account mgmt. Everything is granted now
accountAppsPage.open();
appEntry = accountAppsPage.getApplications().get(THIRD_PARTY_APP);
Assert.assertTrue(appEntry.getClientScopesGranted().contains("foo-scope"));
// Revoke
accountAppsPage.revokeGrant(THIRD_PARTY_APP);
events.expect(EventType.REVOKE_GRANT).client("account").detail(Details.REVOKED_CLIENT, THIRD_PARTY_APP).assertEvent();
// Cleanup
thirdParty.removeDefaultClientScope(fooScopeId);
}
use of org.keycloak.representations.idm.ClientScopeRepresentation in project keycloak by keycloak.
the class OAuthScopeInTokenResponseTest method failCodeNotExistingScope.
@Test
public void failCodeNotExistingScope() throws Exception {
String loginUser = "john-doh@localhost";
String loginPassword = "password";
String clientSecret = "password";
ClientsResource clients = realmsResouce().realm("test").clients();
ClientRepresentation clientRep = clients.findByClientId(oauth.getClientId()).get(0);
ClientResource client = clients.get(clientRep.getId());
List<ClientScopeRepresentation> scopes = client.getDefaultClientScopes();
for (ClientScopeRepresentation scope : scopes) {
client.removeDefaultClientScope(scope.getId());
}
oauth.openid(false);
oauth.scope("user openid phone");
oauth.openLoginForm();
MultivaluedHashMap<String, String> queryParams = UriUtils.decodeQueryString(new URL(driver.getCurrentUrl()).getQuery());
assertEquals("invalid_scope", queryParams.getFirst("error"));
assertTrue(queryParams.getFirst("error_description").startsWith("Invalid scopes"));
oauth.scope("user");
oauth.openLoginForm();
queryParams = UriUtils.decodeQueryString(new URL(driver.getCurrentUrl()).getQuery());
assertEquals("invalid_scope", queryParams.getFirst("error"));
assertTrue(queryParams.getFirst("error_description").startsWith("Invalid scopes"));
oauth.scope("phone");
oauth.doLogin(loginUser, loginPassword);
String code = oauth.getCurrentQuery().get(OAuth2Constants.CODE);
expectSuccessfulResponseFromTokenEndpoint(code, "phone", clientSecret);
oauth.openLogout();
oauth.scope(null);
oauth.doLogin(loginUser, loginPassword);
code = oauth.getCurrentQuery().get(OAuth2Constants.CODE);
expectSuccessfulResponseFromTokenEndpoint(code, "", clientSecret);
for (ClientScopeRepresentation scope : scopes) {
client.addDefaultClientScope(scope.getId());
}
}
use of org.keycloak.representations.idm.ClientScopeRepresentation in project keycloak by keycloak.
the class OAuthScopeInTokenResponseTest method failTokenNotExistingScope.
@Test
public void failTokenNotExistingScope() throws Exception {
String loginUser = "john-doh@localhost";
String loginPassword = "password";
String clientSecret = "password";
ClientsResource clients = realmsResouce().realm("test").clients();
ClientRepresentation clientRep = clients.findByClientId(oauth.getClientId()).get(0);
clientRep.setDirectAccessGrantsEnabled(true);
ClientResource client = clients.get(clientRep.getId());
client.update(clientRep);
List<ClientScopeRepresentation> scopes = client.getDefaultClientScopes();
for (ClientScopeRepresentation scope : scopes) {
client.removeDefaultClientScope(scope.getId());
}
oauth.openid(false);
oauth.scope("user phone");
OAuthClient.AccessTokenResponse response = oauth.doGrantAccessTokenRequest(clientSecret, loginUser, loginPassword);
assertNotNull(response.getError());
assertEquals(OAuthErrorException.INVALID_SCOPE, response.getError());
oauth.scope("user");
response = oauth.doGrantAccessTokenRequest(clientSecret, loginUser, loginPassword);
assertNotNull(response.getError());
assertEquals(OAuthErrorException.INVALID_SCOPE, response.getError());
oauth.scope(null);
response = oauth.doGrantAccessTokenRequest(clientSecret, loginUser, loginPassword);
assertNotNull(response.getAccessToken());
for (ClientScopeRepresentation scope : scopes) {
client.addDefaultClientScope(scope.getId());
}
}
use of org.keycloak.representations.idm.ClientScopeRepresentation in project keycloak by keycloak.
the class ExportImportUtil method testRealmDefaultClientScopes.
public static void testRealmDefaultClientScopes(RealmResource realm) {
// Assert built-in scopes were created in realm
List<ClientScopeRepresentation> clientScopes = realm.clientScopes().findAll();
Map<String, ClientScopeRepresentation> clientScopesMap = clientScopes.stream().collect(Collectors.toMap(ClientScopeRepresentation::getName, Function.identity()));
assertThat(clientScopesMap.keySet(), Matchers.hasItems(OAuth2Constants.SCOPE_PROFILE, OAuth2Constants.SCOPE_EMAIL, OAuth2Constants.SCOPE_ADDRESS, OAuth2Constants.SCOPE_PHONE, OAuth2Constants.OFFLINE_ACCESS, OIDCLoginProtocolFactory.ROLES_SCOPE, OIDCLoginProtocolFactory.WEB_ORIGINS_SCOPE, OIDCLoginProtocolFactory.MICROPROFILE_JWT_SCOPE, SamlProtocolFactory.SCOPE_ROLE_LIST));
// Check content of some client scopes
Map<String, ProtocolMapperRepresentation> protocolMappers = clientScopesMap.get(OAuth2Constants.SCOPE_EMAIL).getProtocolMappers().stream().collect(Collectors.toMap(protocolMapper -> protocolMapper.getName(), protocolMapper -> protocolMapper));
org.keycloak.testsuite.Assert.assertNames(protocolMappers.keySet(), OIDCLoginProtocolFactory.EMAIL, OIDCLoginProtocolFactory.EMAIL_VERIFIED);
ClientScopeRepresentation offlineScope = clientScopesMap.get(OAuth2Constants.OFFLINE_ACCESS);
org.keycloak.testsuite.Assert.assertTrue(offlineScope.getProtocolMappers() == null || offlineScope.getProtocolMappers().isEmpty());
List<RoleRepresentation> offlineRoleScopes = realm.clientScopes().get(offlineScope.getId()).getScopeMappings().realmLevel().listAll();
org.keycloak.testsuite.Assert.assertNames(offlineRoleScopes, OAuth2Constants.OFFLINE_ACCESS);
// Check default client scopes and optional client scopes expected
Set<String> defaultClientScopes = realm.getDefaultDefaultClientScopes().stream().map(ClientScopeRepresentation::getName).collect(Collectors.toSet());
assertThat(defaultClientScopes, Matchers.hasItems(OAuth2Constants.SCOPE_PROFILE, OAuth2Constants.SCOPE_EMAIL, OIDCLoginProtocolFactory.ROLES_SCOPE, OIDCLoginProtocolFactory.WEB_ORIGINS_SCOPE));
Set<String> optionalClientScopes = realm.getDefaultOptionalClientScopes().stream().map(ClientScopeRepresentation::getName).collect(Collectors.toSet());
assertThat(optionalClientScopes, Matchers.hasItems(OAuth2Constants.SCOPE_ADDRESS, OAuth2Constants.SCOPE_PHONE, OAuth2Constants.OFFLINE_ACCESS, OIDCLoginProtocolFactory.MICROPROFILE_JWT_SCOPE));
}
use of org.keycloak.representations.idm.ClientScopeRepresentation in project keycloak by keycloak.
the class ExportImportUtil method assertDataImportedInRealm.
// In the old testsuite, this method exists as a public method of ImportTest from the model package.
// However, model package is not ready to be migrated yet.
public static void assertDataImportedInRealm(Keycloak adminClient, KeycloakTestingClient testingClient, RealmRepresentation realm) throws IOException {
Assert.assertTrue(realm.isVerifyEmail());
Assert.assertEquals((Integer) 3600000, realm.getOfflineSessionIdleTimeout());
Assert.assertEquals((Integer) 1500, realm.getAccessTokenLifespanForImplicitFlow());
Assert.assertEquals((Integer) 1800, realm.getSsoSessionIdleTimeout());
Assert.assertEquals((Integer) 36000, realm.getSsoSessionMaxLifespan());
Assert.assertEquals((Integer) 3600, realm.getSsoSessionIdleTimeoutRememberMe());
Assert.assertEquals((Integer) 172800, realm.getSsoSessionMaxLifespanRememberMe());
Set<String> creds = realm.getRequiredCredentials();
Assert.assertEquals(1, creds.size());
String cred = (String) creds.iterator().next();
Assert.assertEquals("password", cred);
RealmResource realmRsc = adminClient.realm(realm.getRealm());
/* See KEYCLOAK-3104*/
UserRepresentation user = findByUsername(realmRsc, "loginclient");
Assert.assertNotNull(user);
UserResource userRsc = realmRsc.users().get(user.getId());
Assert.assertEquals(0, userRsc.getFederatedIdentity().size());
List<ClientRepresentation> resources = realmRsc.clients().findAll();
Assert.assertEquals(10, resources.size());
// Test applications imported
ClientRepresentation application = ApiUtil.findClientByClientId(realmRsc, "Application").toRepresentation();
ClientRepresentation otherApp = ApiUtil.findClientByClientId(realmRsc, "OtherApp").toRepresentation();
ClientRepresentation accountApp = ApiUtil.findClientByClientId(realmRsc, Constants.ACCOUNT_MANAGEMENT_CLIENT_ID).toRepresentation();
ClientRepresentation testAppAuthzApp = ApiUtil.findClientByClientId(realmRsc, "test-app-authz").toRepresentation();
ClientResource nonExisting = ApiUtil.findClientByClientId(realmRsc, "NonExisting");
Assert.assertNotNull(application);
Assert.assertNotNull(otherApp);
Assert.assertNull(nonExisting);
List<ClientRepresentation> clients = realmRsc.clients().findAll();
Assert.assertEquals(10, clients.size());
Assert.assertTrue(hasClient(clients, application));
Assert.assertTrue(hasClient(clients, otherApp));
Assert.assertTrue(hasClient(clients, accountApp));
Assert.assertEquals("Applicationn", application.getName());
Assert.assertEquals((Integer) 50, application.getNodeReRegistrationTimeout());
Map<String, Integer> appRegisteredNodes = application.getRegisteredNodes();
Assert.assertEquals(2, appRegisteredNodes.size());
Assert.assertTrue(10 == appRegisteredNodes.get("node1"));
Assert.assertTrue(20 == appRegisteredNodes.get("172.10.15.20"));
// test clientAuthenticatorType
Assert.assertEquals("client-secret", application.getClientAuthenticatorType());
Assert.assertEquals("client-jwt", otherApp.getClientAuthenticatorType());
// test authenticationFlowBindingOverrides
Map<String, String> flowMap = otherApp.getAuthenticationFlowBindingOverrides();
Assert.assertNotNull(flowMap);
Assert.assertEquals(1, flowMap.size());
Assert.assertTrue(flowMap.containsKey("browser"));
// if the authentication flows were correctly imported there must be a flow whose id matches the one in the authenticationFlowBindingOverrides
AuthenticationFlowRepresentation flowRep = realmRsc.flows().getFlow(flowMap.get("browser"));
Assert.assertNotNull(flowRep);
Assert.assertEquals("browser", flowRep.getAlias());
// Test finding applications by ID
Assert.assertNull(ApiUtil.findClientResourceById(realmRsc, "982734"));
Assert.assertEquals(application.getId(), ApiUtil.findClientResourceById(realmRsc, application.getId()).toRepresentation().getId());
// Test role mappings
UserRepresentation admin = findByUsername(realmRsc, "admin");
// user without creation timestamp in import
Assert.assertNull(admin.getCreatedTimestamp());
Set<RoleRepresentation> allRoles = allRoles(realmRsc, admin);
Assert.assertEquals(3, allRoles.size());
Assert.assertTrue(containsRole(allRoles, findRealmRole(realmRsc, "admin")));
Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, application.getId(), "app-admin")));
Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, otherApp.getId(), "otherapp-admin")));
UserRepresentation wburke = findByUsername(realmRsc, "wburke");
// user with creation timestamp in import
Assert.assertEquals(new Long(123654), wburke.getCreatedTimestamp());
allRoles = allRoles(realmRsc, wburke);
Assert.assertEquals(2, allRoles.size());
Assert.assertFalse(containsRole(allRoles, findRealmRole(realmRsc, "admin")));
Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, application.getId(), "app-user")));
Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, otherApp.getId(), "otherapp-user")));
Assert.assertNull(realmRsc.users().get(wburke.getId()).roles().getAll().getRealmMappings());
Assert.assertEquals((Object) 159, wburke.getNotBefore());
UserRepresentation loginclient = findByUsername(realmRsc, "loginclient");
// user with creation timestamp as string in import
Assert.assertEquals(new Long(123655), loginclient.getCreatedTimestamp());
UserRepresentation hashedPasswordUser = findByUsername(realmRsc, "hashedpassworduser");
CredentialRepresentation password = realmRsc.users().get(hashedPasswordUser.getId()).credentials().stream().filter(credential -> PasswordCredentialModel.TYPE.equals(credential.getType())).findFirst().get();
PasswordCredentialData credentialData = JsonSerialization.readValue(password.getCredentialData(), PasswordCredentialData.class);
Assert.assertEquals(1234, credentialData.getHashIterations());
List<RoleRepresentation> realmRoles = realmRolesForUser(realmRsc, admin);
Assert.assertEquals(1, realmRoles.size());
Assert.assertEquals("admin", realmRoles.iterator().next().getName());
List<RoleRepresentation> appRoles = clientRolesForUser(realmRsc, application, admin);
Assert.assertEquals(1, appRoles.size());
Assert.assertEquals("app-admin", appRoles.iterator().next().getName());
// Test attributes
Map<String, List<String>> attrs = wburke.getAttributes();
Assert.assertEquals(1, attrs.size());
List<String> attrVals = attrs.get("old-email");
Assert.assertEquals(1, attrVals.size());
Assert.assertEquals("bburke@redhat.com", attrVals.get(0));
attrs = admin.getAttributes();
Assert.assertEquals(2, attrs.size());
attrVals = attrs.get("key1");
Assert.assertEquals(1, attrVals.size());
Assert.assertEquals("val1", attrVals.get(0));
attrVals = attrs.get("key2");
Assert.assertEquals(2, attrVals.size());
Assert.assertTrue(attrVals.contains("val21") && attrVals.contains("val22"));
// Test client
ClientResource oauthClient = ApiUtil.findClientResourceByClientId(realmRsc, "oauthclient");
ClientRepresentation oauthClientRep = oauthClient.toRepresentation();
Assert.assertEquals("clientpassword", oauthClient.getSecret().getValue());
Assert.assertTrue(oauthClientRep.isEnabled());
Assert.assertNotNull(oauthClientRep);
// Test scope relationship
Set<RoleRepresentation> allScopes = allScopeMappings(oauthClient);
Assert.assertEquals(2, allScopes.size());
Assert.assertTrue(containsRole(allScopes, findRealmRole(realmRsc, "admin")));
Assert.assertTrue(containsRole(allScopes, findClientRole(realmRsc, application.getId(), "app-user")));
List<RoleRepresentation> realmScopes = realmScopeMappings(oauthClient);
Assert.assertTrue(containsRole(realmScopes, findRealmRole(realmRsc, "admin")));
List<RoleRepresentation> appScopes = clientScopeMappings(oauthClient);
Assert.assertTrue(containsRole(appScopes, findClientRole(realmRsc, application.getId(), "app-user")));
// Test social linking
UserResource socialUser = realmRsc.users().get(findByUsername(realmRsc, "mySocialUser").getId());
List<FederatedIdentityRepresentation> socialLinks = socialUser.getFederatedIdentity();
Assert.assertEquals(3, socialLinks.size());
boolean facebookFound = false;
boolean googleFound = false;
boolean twitterFound = false;
FederatedIdentityRepresentation facebookIdentityRep = null;
for (FederatedIdentityRepresentation federatedIdentityRep : socialLinks) {
if ("facebook1".equals(federatedIdentityRep.getIdentityProvider())) {
facebookFound = true;
facebookIdentityRep = federatedIdentityRep;
Assert.assertEquals("facebook1", federatedIdentityRep.getUserId());
Assert.assertEquals("fbuser1", federatedIdentityRep.getUserName());
} else if ("google1".equals(federatedIdentityRep.getIdentityProvider())) {
googleFound = true;
Assert.assertEquals("google1", federatedIdentityRep.getUserId());
Assert.assertEquals("mysocialuser@gmail.com", federatedIdentityRep.getUserName());
} else if ("twitter1".equals(federatedIdentityRep.getIdentityProvider())) {
twitterFound = true;
Assert.assertEquals("twitter1", federatedIdentityRep.getUserId());
Assert.assertEquals("twuser1", federatedIdentityRep.getUserName());
}
}
Assert.assertTrue(facebookFound && twitterFound && googleFound);
UserRepresentation foundSocialUser = testingClient.testing().getUserByFederatedIdentity(realm.getRealm(), "facebook1", "facebook1", "fbuser1");
Assert.assertEquals(foundSocialUser.getUsername(), socialUser.toRepresentation().getUsername());
Assert.assertNull(testingClient.testing().getUserByFederatedIdentity(realm.getRealm(), "facebook", "not-existing", "not-existing"));
Assert.assertEquals("facebook1", facebookIdentityRep.getUserId());
Assert.assertEquals("fbuser1", facebookIdentityRep.getUserName());
Assert.assertEquals("facebook1", facebookIdentityRep.getIdentityProvider());
// Test remove/add social link
socialUser.removeFederatedIdentity("facebook1");
Assert.assertEquals(2, socialUser.getFederatedIdentity().size());
socialUser.addFederatedIdentity("facebook1", facebookIdentityRep);
Assert.assertEquals(3, socialUser.getFederatedIdentity().size());
// Test smtp config
Map<String, String> smtpConfig = realm.getSmtpServer();
Assert.assertTrue(smtpConfig.size() == 3);
Assert.assertEquals("auto@keycloak.org", smtpConfig.get("from"));
Assert.assertEquals("localhost", smtpConfig.get("host"));
Assert.assertEquals("3025", smtpConfig.get("port"));
// Test identity providers
List<IdentityProviderRepresentation> identityProviders = realm.getIdentityProviders();
Assert.assertEquals(3, identityProviders.size());
IdentityProviderRepresentation google = null;
for (IdentityProviderRepresentation idpRep : identityProviders) {
if (idpRep.getAlias().equals("google1"))
google = idpRep;
}
Assert.assertNotNull(google);
Assert.assertEquals("google1", google.getAlias());
Assert.assertEquals("google", google.getProviderId());
Assert.assertTrue(google.isEnabled());
Assert.assertEquals("googleId", google.getConfig().get("clientId"));
Assert.assertEquals("googleSecret", google.getConfig().get("clientSecret"));
// ////////////////
// Test federation providers
// on import should convert UserfederationProviderRepresentation to Component model
List<UserFederationProviderRepresentation> fedProviders = realm.getUserFederationProviders();
Assert.assertTrue(fedProviders == null || fedProviders.size() == 0);
List<ComponentRepresentation> storageProviders = realmRsc.components().query(realm.getId(), UserStorageProvider.class.getName());
Assert.assertTrue(storageProviders.size() == 2);
ComponentRepresentation ldap1 = storageProviders.get(0);
ComponentRepresentation ldap2 = storageProviders.get(1);
if (!"MyLDAPProvider1".equals(ldap1.getName())) {
ldap2 = ldap1;
ldap1 = storageProviders.get(1);
}
Assert.assertEquals("MyLDAPProvider1", ldap1.getName());
Assert.assertEquals("ldap", ldap1.getProviderId());
Assert.assertEquals("1", ldap1.getConfig().getFirst("priority"));
Assert.assertEquals("ldap://foo", ldap1.getConfig().getFirst(LDAPConstants.CONNECTION_URL));
Assert.assertEquals("MyLDAPProvider2", ldap2.getName());
Assert.assertEquals("ldap://bar", ldap2.getConfig().getFirst(LDAPConstants.CONNECTION_URL));
// Test federation mappers
List<ComponentRepresentation> fedMappers1 = realmRsc.components().query(ldap1.getId(), LDAPStorageMapper.class.getName());
ComponentRepresentation fullNameMapper = fedMappers1.iterator().next();
Assert.assertEquals("FullNameMapper", fullNameMapper.getName());
Assert.assertEquals(FullNameLDAPStorageMapperFactory.PROVIDER_ID, fullNameMapper.getProviderId());
Assert.assertEquals("cn", fullNameMapper.getConfig().getFirst(FullNameLDAPStorageMapper.LDAP_FULL_NAME_ATTRIBUTE));
// ///////////////
// Assert that federation link wasn't created during import
Assert.assertNull(testingClient.testing().getUserByUsernameFromFedProviderFactory(realm.getRealm(), "wburke"));
// Test builtin authentication flows
AuthenticationFlowRepresentation clientFlow = testingClient.testing().getClientAuthFlow(realm.getRealm());
Assert.assertEquals(DefaultAuthenticationFlows.CLIENT_AUTHENTICATION_FLOW, clientFlow.getAlias());
Assert.assertNotNull(realmRsc.flows().getFlow(clientFlow.getId()));
Assert.assertTrue(realmRsc.flows().getExecutions(clientFlow.getAlias()).size() > 0);
AuthenticationFlowRepresentation resetFlow = testingClient.testing().getResetCredFlow(realm.getRealm());
Assert.assertEquals(DefaultAuthenticationFlows.RESET_CREDENTIALS_FLOW, resetFlow.getAlias());
Assert.assertNotNull(realmRsc.flows().getFlow(resetFlow.getId()));
Assert.assertTrue(realmRsc.flows().getExecutions(resetFlow.getAlias()).size() > 0);
// Test protocol mappers. Default application doesn't have any builtin protocol mappers. OtherApp just gss credential
List<ProtocolMapperRepresentation> applicationMappers = application.getProtocolMappers();
// application.getProtocolMapperByName(OIDCLoginProtocol.LOGIN_PROTOCOL, "username"));
Assert.assertNull(findMapperByName(applicationMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, "username"));
Assert.assertNull(findMapperByName(applicationMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, "email"));
Assert.assertNull(findMapperByName(applicationMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, "given name"));
Assert.assertNull(findMapperByName(applicationMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, KerberosConstants.GSS_DELEGATION_CREDENTIAL_DISPLAY_NAME));
Assert.assertEquals(1, otherApp.getProtocolMappers().size());
List<ProtocolMapperRepresentation> otherAppMappers = otherApp.getProtocolMappers();
Assert.assertNull(findMapperByName(otherAppMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, "username"));
ProtocolMapperRepresentation gssCredentialMapper = findMapperByName(otherAppMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, KerberosConstants.GSS_DELEGATION_CREDENTIAL_DISPLAY_NAME);
assertGssProtocolMapper(gssCredentialMapper);
// Test clientScopes
List<ClientScopeRepresentation> clientScopes = realmRsc.clientScopes().findAll();
ClientScopeRepresentation clientScope = clientScopes.stream().filter((ClientScopeRepresentation clientScope1) -> {
return "foo_scope".equals(clientScope1.getName());
}).findFirst().get();
Assert.assertEquals("foo_scope", clientScope.getName());
Assert.assertEquals("foo scope-desc", clientScope.getDescription());
Assert.assertEquals(OIDCLoginProtocol.LOGIN_PROTOCOL, clientScope.getProtocol());
Assert.assertEquals(1, clientScope.getProtocolMappers().size());
List<ProtocolMapperRepresentation> clientScopeMappers = clientScope.getProtocolMappers();
ProtocolMapperRepresentation scopeGssCredentialMapper = findMapperByName(clientScopeMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, KerberosConstants.GSS_DELEGATION_CREDENTIAL_DISPLAY_NAME);
assertGssProtocolMapper(scopeGssCredentialMapper);
// Test client scope - scopes
Set<RoleRepresentation> allClientScopeScopes = allScopeMappings(realmRsc.clientScopes().get(clientScope.getId()));
Assert.assertEquals(3, allClientScopeScopes.size());
Assert.assertTrue(containsRole(allClientScopeScopes, findRealmRole(realmRsc, "admin")));
Assert.assertTrue(containsRole(allClientScopeScopes, findClientRole(realmRsc, application.getId(), "app-user")));
Assert.assertTrue(containsRole(allClientScopeScopes, findClientRole(realmRsc, application.getId(), "app-admin")));
List<RoleRepresentation> clientScopeRealmScopes = realmScopeMappings(realmRsc.clientScopes().get(clientScope.getId()));
Assert.assertTrue(containsRole(clientScopeRealmScopes, findRealmRole(realmRsc, "admin")));
List<RoleRepresentation> clientScopeAppScopes = clientScopeMappings(realmRsc.clientScopes().get(clientScope.getId()));
Assert.assertTrue(containsRole(clientScopeAppScopes, findClientRole(realmRsc, application.getId(), "app-user")));
Assert.assertTrue(containsRole(clientScopeAppScopes, findClientRole(realmRsc, application.getId(), "app-admin")));
// Test client scopes assignment
Assert.assertTrue(otherApp.getDefaultClientScopes().contains("foo_scope"));
Assert.assertFalse(application.getDefaultClientScopes().contains("foo_scope"));
// Test builtin client scopes
testRealmDefaultClientScopes(realmRsc);
// Test user consents
UserResource adminRsc = realmRsc.users().get(admin.getId());
List<Map<String, Object>> consents = adminRsc.getConsents();
// .getConsents().size());
Assert.assertEquals(2, consents.size());
Map<String, Object> appAdminConsent = findConsentByClientId(consents, application.getClientId());
Assert.assertNotNull(appAdminConsent);
Assert.assertTrue(isClientScopeGranted(appAdminConsent, OAuth2Constants.OFFLINE_ACCESS, "roles", "profile", "email", "account", "web-origins"));
// admin.getConsentByClient(otherApp.getId());
Map<String, Object> otherAppAdminConsent = findConsentByClientId(consents, otherApp.getClientId());
Assert.assertFalse(isClientScopeGranted(otherAppAdminConsent, OAuth2Constants.OFFLINE_ACCESS));
Assert.assertTrue(application.isStandardFlowEnabled());
Assert.assertTrue(application.isImplicitFlowEnabled());
Assert.assertTrue(application.isDirectAccessGrantsEnabled());
Assert.assertFalse(otherApp.isStandardFlowEnabled());
Assert.assertFalse(otherApp.isImplicitFlowEnabled());
Assert.assertFalse(otherApp.isDirectAccessGrantsEnabled());
// Test service accounts
Assert.assertFalse(application.isServiceAccountsEnabled());
Assert.assertTrue(otherApp.isServiceAccountsEnabled());
if (ProfileAssume.isFeatureEnabled(Profile.Feature.AUTHORIZATION)) {
Assert.assertTrue(testAppAuthzApp.isServiceAccountsEnabled());
// session.users().getUserByServiceAccountClient(application));
Assert.assertNull(testingClient.testing().getUserByServiceAccountClient(realm.getRealm(), application.getClientId()));
// session.users().getUserByServiceAccountClient(otherApp);
UserRepresentation otherAppSA = testingClient.testing().getUserByServiceAccountClient(realm.getRealm(), otherApp.getClientId());
Assert.assertNotNull(otherAppSA);
Assert.assertEquals("service-account-otherapp", otherAppSA.getUsername());
UserRepresentation testAppAuthzSA = testingClient.testing().getUserByServiceAccountClient(realm.getRealm(), testAppAuthzApp.getClientId());
Assert.assertNotNull(testAppAuthzSA);
Assert.assertEquals("service-account-test-app-authz", testAppAuthzSA.getUsername());
// test service account maintains the roles in OtherApp
allRoles = allRoles(realmRsc, otherAppSA);
Assert.assertEquals(3, allRoles.size());
Assert.assertTrue(containsRole(allRoles, findRealmRole(realmRsc, "user")));
Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, otherApp.getId(), "otherapp-user")));
Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, otherApp.getId(), "otherapp-admin")));
assertAuthorizationSettingsOtherApp(realmRsc);
assertAuthorizationSettingsTestAppAuthz(realmRsc);
}
}
Aggregations