Search in sources :

Example 21 with FederatedIdentityRepresentation

use of org.keycloak.representations.idm.FederatedIdentityRepresentation in project keycloak by keycloak.

the class ClientInitiatedAccountLinkTest method testAccountLinkingExpired.

@Test
// TODO remove this (KEYCLOAK-16228)
@DisableFeature(value = Profile.Feature.ACCOUNT2, skipRestart = true)
public void testAccountLinkingExpired() throws Exception {
    RealmResource realm = adminClient.realms().realm(CHILD_IDP);
    List<FederatedIdentityRepresentation> links = realm.users().get(childUserId).getFederatedIdentity();
    Assert.assertTrue(links.isEmpty());
    // Login to account mgmt first
    profilePage.open(CHILD_IDP);
    WaitUtils.waitForPageToLoad();
    Assert.assertTrue(loginPage.isCurrent(CHILD_IDP));
    loginPage.login("child", "password");
    profilePage.assertCurrent();
    // Now in another tab, request account linking
    UriBuilder linkBuilder = UriBuilder.fromUri(appPage.getInjectedUrl().toString()).path("link");
    String linkUrl = linkBuilder.clone().queryParam("realm", CHILD_IDP).queryParam("provider", PARENT_IDP).build().toString();
    navigateTo(linkUrl);
    Assert.assertTrue(loginPage.isCurrent(PARENT_IDP));
    // Logout "child" userSession in the meantime (for example through admin request)
    realm.logoutAll();
    // Finish login on parent.
    loginPage.login(PARENT_USERNAME, "password");
    // Test I was not automatically linked
    links = realm.users().get(childUserId).getFederatedIdentity();
    Assert.assertTrue(links.isEmpty());
    errorPage.assertCurrent();
    Assert.assertEquals("Requested broker account linking, but current session is no longer valid.", errorPage.getError());
    logoutAll();
}
Also used : RealmResource(org.keycloak.admin.client.resource.RealmResource) UriBuilder(javax.ws.rs.core.UriBuilder) FederatedIdentityRepresentation(org.keycloak.representations.idm.FederatedIdentityRepresentation) DisableFeature(org.keycloak.testsuite.arquillian.annotation.DisableFeature) Test(org.junit.Test) AbstractServletsAdapterTest(org.keycloak.testsuite.adapter.AbstractServletsAdapterTest)

Example 22 with FederatedIdentityRepresentation

use of org.keycloak.representations.idm.FederatedIdentityRepresentation in project keycloak by keycloak.

the class ExportImportUtil method assertDataImportedInRealm.

// In the old testsuite, this method exists as a public method of ImportTest from the model package.
// However, model package is not ready to be migrated yet.
public static void assertDataImportedInRealm(Keycloak adminClient, KeycloakTestingClient testingClient, RealmRepresentation realm) throws IOException {
    Assert.assertTrue(realm.isVerifyEmail());
    Assert.assertEquals((Integer) 3600000, realm.getOfflineSessionIdleTimeout());
    Assert.assertEquals((Integer) 1500, realm.getAccessTokenLifespanForImplicitFlow());
    Assert.assertEquals((Integer) 1800, realm.getSsoSessionIdleTimeout());
    Assert.assertEquals((Integer) 36000, realm.getSsoSessionMaxLifespan());
    Assert.assertEquals((Integer) 3600, realm.getSsoSessionIdleTimeoutRememberMe());
    Assert.assertEquals((Integer) 172800, realm.getSsoSessionMaxLifespanRememberMe());
    Set<String> creds = realm.getRequiredCredentials();
    Assert.assertEquals(1, creds.size());
    String cred = (String) creds.iterator().next();
    Assert.assertEquals("password", cred);
    RealmResource realmRsc = adminClient.realm(realm.getRealm());
    /* See KEYCLOAK-3104*/
    UserRepresentation user = findByUsername(realmRsc, "loginclient");
    Assert.assertNotNull(user);
    UserResource userRsc = realmRsc.users().get(user.getId());
    Assert.assertEquals(0, userRsc.getFederatedIdentity().size());
    List<ClientRepresentation> resources = realmRsc.clients().findAll();
    Assert.assertEquals(10, resources.size());
    // Test applications imported
    ClientRepresentation application = ApiUtil.findClientByClientId(realmRsc, "Application").toRepresentation();
    ClientRepresentation otherApp = ApiUtil.findClientByClientId(realmRsc, "OtherApp").toRepresentation();
    ClientRepresentation accountApp = ApiUtil.findClientByClientId(realmRsc, Constants.ACCOUNT_MANAGEMENT_CLIENT_ID).toRepresentation();
    ClientRepresentation testAppAuthzApp = ApiUtil.findClientByClientId(realmRsc, "test-app-authz").toRepresentation();
    ClientResource nonExisting = ApiUtil.findClientByClientId(realmRsc, "NonExisting");
    Assert.assertNotNull(application);
    Assert.assertNotNull(otherApp);
    Assert.assertNull(nonExisting);
    List<ClientRepresentation> clients = realmRsc.clients().findAll();
    Assert.assertEquals(10, clients.size());
    Assert.assertTrue(hasClient(clients, application));
    Assert.assertTrue(hasClient(clients, otherApp));
    Assert.assertTrue(hasClient(clients, accountApp));
    Assert.assertEquals("Applicationn", application.getName());
    Assert.assertEquals((Integer) 50, application.getNodeReRegistrationTimeout());
    Map<String, Integer> appRegisteredNodes = application.getRegisteredNodes();
    Assert.assertEquals(2, appRegisteredNodes.size());
    Assert.assertTrue(10 == appRegisteredNodes.get("node1"));
    Assert.assertTrue(20 == appRegisteredNodes.get("172.10.15.20"));
    // test clientAuthenticatorType
    Assert.assertEquals("client-secret", application.getClientAuthenticatorType());
    Assert.assertEquals("client-jwt", otherApp.getClientAuthenticatorType());
    // test authenticationFlowBindingOverrides
    Map<String, String> flowMap = otherApp.getAuthenticationFlowBindingOverrides();
    Assert.assertNotNull(flowMap);
    Assert.assertEquals(1, flowMap.size());
    Assert.assertTrue(flowMap.containsKey("browser"));
    // if the authentication flows were correctly imported there must be a flow whose id matches the one in the authenticationFlowBindingOverrides
    AuthenticationFlowRepresentation flowRep = realmRsc.flows().getFlow(flowMap.get("browser"));
    Assert.assertNotNull(flowRep);
    Assert.assertEquals("browser", flowRep.getAlias());
    // Test finding applications by ID
    Assert.assertNull(ApiUtil.findClientResourceById(realmRsc, "982734"));
    Assert.assertEquals(application.getId(), ApiUtil.findClientResourceById(realmRsc, application.getId()).toRepresentation().getId());
    // Test role mappings
    UserRepresentation admin = findByUsername(realmRsc, "admin");
    // user without creation timestamp in import
    Assert.assertNull(admin.getCreatedTimestamp());
    Set<RoleRepresentation> allRoles = allRoles(realmRsc, admin);
    Assert.assertEquals(3, allRoles.size());
    Assert.assertTrue(containsRole(allRoles, findRealmRole(realmRsc, "admin")));
    Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, application.getId(), "app-admin")));
    Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, otherApp.getId(), "otherapp-admin")));
    UserRepresentation wburke = findByUsername(realmRsc, "wburke");
    // user with creation timestamp in import
    Assert.assertEquals(new Long(123654), wburke.getCreatedTimestamp());
    allRoles = allRoles(realmRsc, wburke);
    Assert.assertEquals(2, allRoles.size());
    Assert.assertFalse(containsRole(allRoles, findRealmRole(realmRsc, "admin")));
    Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, application.getId(), "app-user")));
    Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, otherApp.getId(), "otherapp-user")));
    Assert.assertNull(realmRsc.users().get(wburke.getId()).roles().getAll().getRealmMappings());
    Assert.assertEquals((Object) 159, wburke.getNotBefore());
    UserRepresentation loginclient = findByUsername(realmRsc, "loginclient");
    // user with creation timestamp as string in import
    Assert.assertEquals(new Long(123655), loginclient.getCreatedTimestamp());
    UserRepresentation hashedPasswordUser = findByUsername(realmRsc, "hashedpassworduser");
    CredentialRepresentation password = realmRsc.users().get(hashedPasswordUser.getId()).credentials().stream().filter(credential -> PasswordCredentialModel.TYPE.equals(credential.getType())).findFirst().get();
    PasswordCredentialData credentialData = JsonSerialization.readValue(password.getCredentialData(), PasswordCredentialData.class);
    Assert.assertEquals(1234, credentialData.getHashIterations());
    List<RoleRepresentation> realmRoles = realmRolesForUser(realmRsc, admin);
    Assert.assertEquals(1, realmRoles.size());
    Assert.assertEquals("admin", realmRoles.iterator().next().getName());
    List<RoleRepresentation> appRoles = clientRolesForUser(realmRsc, application, admin);
    Assert.assertEquals(1, appRoles.size());
    Assert.assertEquals("app-admin", appRoles.iterator().next().getName());
    // Test attributes
    Map<String, List<String>> attrs = wburke.getAttributes();
    Assert.assertEquals(1, attrs.size());
    List<String> attrVals = attrs.get("old-email");
    Assert.assertEquals(1, attrVals.size());
    Assert.assertEquals("bburke@redhat.com", attrVals.get(0));
    attrs = admin.getAttributes();
    Assert.assertEquals(2, attrs.size());
    attrVals = attrs.get("key1");
    Assert.assertEquals(1, attrVals.size());
    Assert.assertEquals("val1", attrVals.get(0));
    attrVals = attrs.get("key2");
    Assert.assertEquals(2, attrVals.size());
    Assert.assertTrue(attrVals.contains("val21") && attrVals.contains("val22"));
    // Test client
    ClientResource oauthClient = ApiUtil.findClientResourceByClientId(realmRsc, "oauthclient");
    ClientRepresentation oauthClientRep = oauthClient.toRepresentation();
    Assert.assertEquals("clientpassword", oauthClient.getSecret().getValue());
    Assert.assertTrue(oauthClientRep.isEnabled());
    Assert.assertNotNull(oauthClientRep);
    // Test scope relationship
    Set<RoleRepresentation> allScopes = allScopeMappings(oauthClient);
    Assert.assertEquals(2, allScopes.size());
    Assert.assertTrue(containsRole(allScopes, findRealmRole(realmRsc, "admin")));
    Assert.assertTrue(containsRole(allScopes, findClientRole(realmRsc, application.getId(), "app-user")));
    List<RoleRepresentation> realmScopes = realmScopeMappings(oauthClient);
    Assert.assertTrue(containsRole(realmScopes, findRealmRole(realmRsc, "admin")));
    List<RoleRepresentation> appScopes = clientScopeMappings(oauthClient);
    Assert.assertTrue(containsRole(appScopes, findClientRole(realmRsc, application.getId(), "app-user")));
    // Test social linking
    UserResource socialUser = realmRsc.users().get(findByUsername(realmRsc, "mySocialUser").getId());
    List<FederatedIdentityRepresentation> socialLinks = socialUser.getFederatedIdentity();
    Assert.assertEquals(3, socialLinks.size());
    boolean facebookFound = false;
    boolean googleFound = false;
    boolean twitterFound = false;
    FederatedIdentityRepresentation facebookIdentityRep = null;
    for (FederatedIdentityRepresentation federatedIdentityRep : socialLinks) {
        if ("facebook1".equals(federatedIdentityRep.getIdentityProvider())) {
            facebookFound = true;
            facebookIdentityRep = federatedIdentityRep;
            Assert.assertEquals("facebook1", federatedIdentityRep.getUserId());
            Assert.assertEquals("fbuser1", federatedIdentityRep.getUserName());
        } else if ("google1".equals(federatedIdentityRep.getIdentityProvider())) {
            googleFound = true;
            Assert.assertEquals("google1", federatedIdentityRep.getUserId());
            Assert.assertEquals("mysocialuser@gmail.com", federatedIdentityRep.getUserName());
        } else if ("twitter1".equals(federatedIdentityRep.getIdentityProvider())) {
            twitterFound = true;
            Assert.assertEquals("twitter1", federatedIdentityRep.getUserId());
            Assert.assertEquals("twuser1", federatedIdentityRep.getUserName());
        }
    }
    Assert.assertTrue(facebookFound && twitterFound && googleFound);
    UserRepresentation foundSocialUser = testingClient.testing().getUserByFederatedIdentity(realm.getRealm(), "facebook1", "facebook1", "fbuser1");
    Assert.assertEquals(foundSocialUser.getUsername(), socialUser.toRepresentation().getUsername());
    Assert.assertNull(testingClient.testing().getUserByFederatedIdentity(realm.getRealm(), "facebook", "not-existing", "not-existing"));
    Assert.assertEquals("facebook1", facebookIdentityRep.getUserId());
    Assert.assertEquals("fbuser1", facebookIdentityRep.getUserName());
    Assert.assertEquals("facebook1", facebookIdentityRep.getIdentityProvider());
    // Test remove/add social link
    socialUser.removeFederatedIdentity("facebook1");
    Assert.assertEquals(2, socialUser.getFederatedIdentity().size());
    socialUser.addFederatedIdentity("facebook1", facebookIdentityRep);
    Assert.assertEquals(3, socialUser.getFederatedIdentity().size());
    // Test smtp config
    Map<String, String> smtpConfig = realm.getSmtpServer();
    Assert.assertTrue(smtpConfig.size() == 3);
    Assert.assertEquals("auto@keycloak.org", smtpConfig.get("from"));
    Assert.assertEquals("localhost", smtpConfig.get("host"));
    Assert.assertEquals("3025", smtpConfig.get("port"));
    // Test identity providers
    List<IdentityProviderRepresentation> identityProviders = realm.getIdentityProviders();
    Assert.assertEquals(3, identityProviders.size());
    IdentityProviderRepresentation google = null;
    for (IdentityProviderRepresentation idpRep : identityProviders) {
        if (idpRep.getAlias().equals("google1"))
            google = idpRep;
    }
    Assert.assertNotNull(google);
    Assert.assertEquals("google1", google.getAlias());
    Assert.assertEquals("google", google.getProviderId());
    Assert.assertTrue(google.isEnabled());
    Assert.assertEquals("googleId", google.getConfig().get("clientId"));
    Assert.assertEquals("googleSecret", google.getConfig().get("clientSecret"));
    // ////////////////
    // Test federation providers
    // on import should convert UserfederationProviderRepresentation to Component model
    List<UserFederationProviderRepresentation> fedProviders = realm.getUserFederationProviders();
    Assert.assertTrue(fedProviders == null || fedProviders.size() == 0);
    List<ComponentRepresentation> storageProviders = realmRsc.components().query(realm.getId(), UserStorageProvider.class.getName());
    Assert.assertTrue(storageProviders.size() == 2);
    ComponentRepresentation ldap1 = storageProviders.get(0);
    ComponentRepresentation ldap2 = storageProviders.get(1);
    if (!"MyLDAPProvider1".equals(ldap1.getName())) {
        ldap2 = ldap1;
        ldap1 = storageProviders.get(1);
    }
    Assert.assertEquals("MyLDAPProvider1", ldap1.getName());
    Assert.assertEquals("ldap", ldap1.getProviderId());
    Assert.assertEquals("1", ldap1.getConfig().getFirst("priority"));
    Assert.assertEquals("ldap://foo", ldap1.getConfig().getFirst(LDAPConstants.CONNECTION_URL));
    Assert.assertEquals("MyLDAPProvider2", ldap2.getName());
    Assert.assertEquals("ldap://bar", ldap2.getConfig().getFirst(LDAPConstants.CONNECTION_URL));
    // Test federation mappers
    List<ComponentRepresentation> fedMappers1 = realmRsc.components().query(ldap1.getId(), LDAPStorageMapper.class.getName());
    ComponentRepresentation fullNameMapper = fedMappers1.iterator().next();
    Assert.assertEquals("FullNameMapper", fullNameMapper.getName());
    Assert.assertEquals(FullNameLDAPStorageMapperFactory.PROVIDER_ID, fullNameMapper.getProviderId());
    Assert.assertEquals("cn", fullNameMapper.getConfig().getFirst(FullNameLDAPStorageMapper.LDAP_FULL_NAME_ATTRIBUTE));
    // ///////////////
    // Assert that federation link wasn't created during import
    Assert.assertNull(testingClient.testing().getUserByUsernameFromFedProviderFactory(realm.getRealm(), "wburke"));
    // Test builtin authentication flows
    AuthenticationFlowRepresentation clientFlow = testingClient.testing().getClientAuthFlow(realm.getRealm());
    Assert.assertEquals(DefaultAuthenticationFlows.CLIENT_AUTHENTICATION_FLOW, clientFlow.getAlias());
    Assert.assertNotNull(realmRsc.flows().getFlow(clientFlow.getId()));
    Assert.assertTrue(realmRsc.flows().getExecutions(clientFlow.getAlias()).size() > 0);
    AuthenticationFlowRepresentation resetFlow = testingClient.testing().getResetCredFlow(realm.getRealm());
    Assert.assertEquals(DefaultAuthenticationFlows.RESET_CREDENTIALS_FLOW, resetFlow.getAlias());
    Assert.assertNotNull(realmRsc.flows().getFlow(resetFlow.getId()));
    Assert.assertTrue(realmRsc.flows().getExecutions(resetFlow.getAlias()).size() > 0);
    // Test protocol mappers. Default application doesn't have any builtin protocol mappers. OtherApp just gss credential
    List<ProtocolMapperRepresentation> applicationMappers = application.getProtocolMappers();
    // application.getProtocolMapperByName(OIDCLoginProtocol.LOGIN_PROTOCOL, "username"));
    Assert.assertNull(findMapperByName(applicationMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, "username"));
    Assert.assertNull(findMapperByName(applicationMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, "email"));
    Assert.assertNull(findMapperByName(applicationMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, "given name"));
    Assert.assertNull(findMapperByName(applicationMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, KerberosConstants.GSS_DELEGATION_CREDENTIAL_DISPLAY_NAME));
    Assert.assertEquals(1, otherApp.getProtocolMappers().size());
    List<ProtocolMapperRepresentation> otherAppMappers = otherApp.getProtocolMappers();
    Assert.assertNull(findMapperByName(otherAppMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, "username"));
    ProtocolMapperRepresentation gssCredentialMapper = findMapperByName(otherAppMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, KerberosConstants.GSS_DELEGATION_CREDENTIAL_DISPLAY_NAME);
    assertGssProtocolMapper(gssCredentialMapper);
    // Test clientScopes
    List<ClientScopeRepresentation> clientScopes = realmRsc.clientScopes().findAll();
    ClientScopeRepresentation clientScope = clientScopes.stream().filter((ClientScopeRepresentation clientScope1) -> {
        return "foo_scope".equals(clientScope1.getName());
    }).findFirst().get();
    Assert.assertEquals("foo_scope", clientScope.getName());
    Assert.assertEquals("foo scope-desc", clientScope.getDescription());
    Assert.assertEquals(OIDCLoginProtocol.LOGIN_PROTOCOL, clientScope.getProtocol());
    Assert.assertEquals(1, clientScope.getProtocolMappers().size());
    List<ProtocolMapperRepresentation> clientScopeMappers = clientScope.getProtocolMappers();
    ProtocolMapperRepresentation scopeGssCredentialMapper = findMapperByName(clientScopeMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, KerberosConstants.GSS_DELEGATION_CREDENTIAL_DISPLAY_NAME);
    assertGssProtocolMapper(scopeGssCredentialMapper);
    // Test client scope - scopes
    Set<RoleRepresentation> allClientScopeScopes = allScopeMappings(realmRsc.clientScopes().get(clientScope.getId()));
    Assert.assertEquals(3, allClientScopeScopes.size());
    Assert.assertTrue(containsRole(allClientScopeScopes, findRealmRole(realmRsc, "admin")));
    Assert.assertTrue(containsRole(allClientScopeScopes, findClientRole(realmRsc, application.getId(), "app-user")));
    Assert.assertTrue(containsRole(allClientScopeScopes, findClientRole(realmRsc, application.getId(), "app-admin")));
    List<RoleRepresentation> clientScopeRealmScopes = realmScopeMappings(realmRsc.clientScopes().get(clientScope.getId()));
    Assert.assertTrue(containsRole(clientScopeRealmScopes, findRealmRole(realmRsc, "admin")));
    List<RoleRepresentation> clientScopeAppScopes = clientScopeMappings(realmRsc.clientScopes().get(clientScope.getId()));
    Assert.assertTrue(containsRole(clientScopeAppScopes, findClientRole(realmRsc, application.getId(), "app-user")));
    Assert.assertTrue(containsRole(clientScopeAppScopes, findClientRole(realmRsc, application.getId(), "app-admin")));
    // Test client scopes assignment
    Assert.assertTrue(otherApp.getDefaultClientScopes().contains("foo_scope"));
    Assert.assertFalse(application.getDefaultClientScopes().contains("foo_scope"));
    // Test builtin client scopes
    testRealmDefaultClientScopes(realmRsc);
    // Test user consents
    UserResource adminRsc = realmRsc.users().get(admin.getId());
    List<Map<String, Object>> consents = adminRsc.getConsents();
    // .getConsents().size());
    Assert.assertEquals(2, consents.size());
    Map<String, Object> appAdminConsent = findConsentByClientId(consents, application.getClientId());
    Assert.assertNotNull(appAdminConsent);
    Assert.assertTrue(isClientScopeGranted(appAdminConsent, OAuth2Constants.OFFLINE_ACCESS, "roles", "profile", "email", "account", "web-origins"));
    // admin.getConsentByClient(otherApp.getId());
    Map<String, Object> otherAppAdminConsent = findConsentByClientId(consents, otherApp.getClientId());
    Assert.assertFalse(isClientScopeGranted(otherAppAdminConsent, OAuth2Constants.OFFLINE_ACCESS));
    Assert.assertTrue(application.isStandardFlowEnabled());
    Assert.assertTrue(application.isImplicitFlowEnabled());
    Assert.assertTrue(application.isDirectAccessGrantsEnabled());
    Assert.assertFalse(otherApp.isStandardFlowEnabled());
    Assert.assertFalse(otherApp.isImplicitFlowEnabled());
    Assert.assertFalse(otherApp.isDirectAccessGrantsEnabled());
    // Test service accounts
    Assert.assertFalse(application.isServiceAccountsEnabled());
    Assert.assertTrue(otherApp.isServiceAccountsEnabled());
    if (ProfileAssume.isFeatureEnabled(Profile.Feature.AUTHORIZATION)) {
        Assert.assertTrue(testAppAuthzApp.isServiceAccountsEnabled());
        // session.users().getUserByServiceAccountClient(application));
        Assert.assertNull(testingClient.testing().getUserByServiceAccountClient(realm.getRealm(), application.getClientId()));
        // session.users().getUserByServiceAccountClient(otherApp);
        UserRepresentation otherAppSA = testingClient.testing().getUserByServiceAccountClient(realm.getRealm(), otherApp.getClientId());
        Assert.assertNotNull(otherAppSA);
        Assert.assertEquals("service-account-otherapp", otherAppSA.getUsername());
        UserRepresentation testAppAuthzSA = testingClient.testing().getUserByServiceAccountClient(realm.getRealm(), testAppAuthzApp.getClientId());
        Assert.assertNotNull(testAppAuthzSA);
        Assert.assertEquals("service-account-test-app-authz", testAppAuthzSA.getUsername());
        // test service account maintains the roles in OtherApp
        allRoles = allRoles(realmRsc, otherAppSA);
        Assert.assertEquals(3, allRoles.size());
        Assert.assertTrue(containsRole(allRoles, findRealmRole(realmRsc, "user")));
        Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, otherApp.getId(), "otherapp-user")));
        Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, otherApp.getId(), "otherapp-admin")));
        assertAuthorizationSettingsOtherApp(realmRsc);
        assertAuthorizationSettingsTestAppAuthz(realmRsc);
    }
}
Also used : RoleRepresentation(org.keycloak.representations.idm.RoleRepresentation) RealmResource(org.keycloak.admin.client.resource.RealmResource) AuthenticationFlowRepresentation(org.keycloak.representations.idm.AuthenticationFlowRepresentation) CredentialRepresentation(org.keycloak.representations.idm.CredentialRepresentation) ComponentRepresentation(org.keycloak.representations.idm.ComponentRepresentation) UserFederationProviderRepresentation(org.keycloak.representations.idm.UserFederationProviderRepresentation) ProtocolMapperRepresentation(org.keycloak.representations.idm.ProtocolMapperRepresentation) IdentityProviderRepresentation(org.keycloak.representations.idm.IdentityProviderRepresentation) ClientResource(org.keycloak.admin.client.resource.ClientResource) List(java.util.List) ArrayList(java.util.ArrayList) LinkedList(java.util.LinkedList) UserRepresentation(org.keycloak.representations.idm.UserRepresentation) PasswordCredentialData(org.keycloak.models.credential.dto.PasswordCredentialData) LDAPStorageMapper(org.keycloak.storage.ldap.mappers.LDAPStorageMapper) FullNameLDAPStorageMapper(org.keycloak.storage.ldap.mappers.FullNameLDAPStorageMapper) UserResource(org.keycloak.admin.client.resource.UserResource) ClientRepresentation(org.keycloak.representations.idm.ClientRepresentation) UserStorageProvider(org.keycloak.storage.UserStorageProvider) ClientScopeRepresentation(org.keycloak.representations.idm.ClientScopeRepresentation) FederatedIdentityRepresentation(org.keycloak.representations.idm.FederatedIdentityRepresentation) Map(java.util.Map)

Example 23 with FederatedIdentityRepresentation

use of org.keycloak.representations.idm.FederatedIdentityRepresentation in project keycloak by keycloak.

the class ManyUsersTest method manyUsers.

@Test
public void manyUsers() throws IOException {
    RealmRepresentation realm = realmResource().toRepresentation();
    realm.setUsers(users);
    // CREATE
    realmTimer.reset("create " + users.size() + " users");
    usersTimer.reset("create " + BATCH + " users");
    int i = 0;
    for (UserRepresentation user : users) {
        refreshTokenIfMinValidityExpired();
        UserRepresentation createdUser = createUser(realmResource().users(), user);
        // Send additional request to read every user after he is created
        if (READ_USER_AFTER_CREATE) {
            UserRepresentation returned = realmResource().users().get(createdUser.getId()).toRepresentation();
            Assert.assertEquals(returned.getId(), createdUser.getId());
        }
        // Send additional request to read social links of user
        if (CREATE_SOCIAL_LINKS) {
            List<FederatedIdentityRepresentation> fedIdentities = realmResource().users().get(createdUser.getId()).getFederatedIdentity();
        }
        if (++i % BATCH == 0) {
            usersTimer.reset();
            log.info("Created users: " + i + " / " + users.size());
        }
    }
    if (i % BATCH != 0) {
        usersTimer.reset();
        log.info("Created users: " + i + " / " + users.size());
    }
    if (REIMPORT) {
        // SAVE REALM
        realmTimer.reset("save realm with " + users.size() + " users");
        File realmFile = new File(PROJECT_BUILD_DIRECTORY, REALM + ".json");
        JsonSerialization.writeValueToStream(new BufferedOutputStream(new FileOutputStream(realmFile)), realm);
        // DELETE REALM
        realmTimer.reset("delete realm with " + users.size() + " users");
        realmResource().remove();
        try {
            realmResource().toRepresentation();
            fail("realm not deleted");
        } catch (Exception ex) {
            log.debug("realm deleted");
        }
        // RE-IMPORT SAVED REALM
        realmTimer.reset("re-import realm with " + realm.getUsers().size() + " users");
        realmsResouce().create(realm);
        realmTimer.reset("load " + realm.getUsers().size() + " users");
        users = realmResource().users().search("", 0, -1);
    }
    // DELETE INDIVIDUAL USERS
    realmTimer.reset("delete " + users.size() + " users");
    usersTimer.reset("delete " + BATCH + " users", false);
    i = 0;
    for (UserRepresentation user : users) {
        refreshTokenIfMinValidityExpired();
        realmResource().users().get(user.getId()).remove();
        if (++i % BATCH == 0) {
            usersTimer.reset();
            log.info("Deleted users: " + i + " / " + users.size());
        }
    }
    if (i % BATCH != 0) {
        usersTimer.reset();
        log.info("Deleted users: " + i + " / " + users.size());
    }
    realmTimer.reset();
}
Also used : RealmRepresentation(org.keycloak.representations.idm.RealmRepresentation) FileOutputStream(java.io.FileOutputStream) FederatedIdentityRepresentation(org.keycloak.representations.idm.FederatedIdentityRepresentation) File(java.io.File) BufferedOutputStream(java.io.BufferedOutputStream) IOException(java.io.IOException) UserRepresentation(org.keycloak.representations.idm.UserRepresentation) Test(org.junit.Test)

Example 24 with FederatedIdentityRepresentation

use of org.keycloak.representations.idm.FederatedIdentityRepresentation in project keycloak by keycloak.

the class LinkedAccountsRestServiceTest method addGitHubIdentity.

private void addGitHubIdentity(RealmRepresentation testRealm) {
    UserRepresentation acctMgtUser = findUser(testRealm, "test-user@localhost");
    FederatedIdentityRepresentation fedIdp = new FederatedIdentityRepresentation();
    fedIdp.setIdentityProvider("github");
    fedIdp.setUserId("foo");
    fedIdp.setUserName("foo");
    ArrayList<FederatedIdentityRepresentation> fedIdps = new ArrayList<>();
    fedIdps.add(fedIdp);
    acctMgtUser.setFederatedIdentities(fedIdps);
}
Also used : ArrayList(java.util.ArrayList) FederatedIdentityRepresentation(org.keycloak.representations.idm.FederatedIdentityRepresentation) UserRepresentation(org.keycloak.representations.idm.UserRepresentation)

Example 25 with FederatedIdentityRepresentation

use of org.keycloak.representations.idm.FederatedIdentityRepresentation in project keycloak by keycloak.

the class UserTest method searchByIdpAndEnabled.

@Test
public void searchByIdpAndEnabled() {
    // add sample Identity Provider
    final String identityProviderAlias = "identity-provider-alias";
    addSampleIdentityProvider(identityProviderAlias, 0);
    // add disabled user with IDP link
    UserRepresentation disabledUser = new UserRepresentation();
    final String disabledUsername = "disabled_username";
    disabledUser.setUsername(disabledUsername);
    disabledUser.setEmail("disabled@localhost");
    disabledUser.setEnabled(false);
    final String disabledUserKeycloakId = createUser(disabledUser);
    FederatedIdentityRepresentation disabledUserLink = new FederatedIdentityRepresentation();
    final String disabledUserId = "disabledUserId";
    disabledUserLink.setUserId(disabledUserId);
    disabledUserLink.setUserName(disabledUsername);
    addFederatedIdentity(disabledUserKeycloakId, identityProviderAlias, disabledUserLink);
    // add enabled user with IDP link
    UserRepresentation enabledUser = new UserRepresentation();
    final String enabledUsername = "enabled_username";
    enabledUser.setUsername(enabledUsername);
    enabledUser.setEmail("enabled@localhost");
    enabledUser.setEnabled(true);
    final String enabledUserKeycloakId = createUser(enabledUser);
    FederatedIdentityRepresentation enabledUserLink = new FederatedIdentityRepresentation();
    final String enabledUserId = "enabledUserId";
    enabledUserLink.setUserId(enabledUserId);
    enabledUserLink.setUserName(enabledUsername);
    addFederatedIdentity(enabledUserKeycloakId, identityProviderAlias, enabledUserLink);
    // run search tests
    List<UserRepresentation> searchByIdpAliasAndEnabled = realm.users().search(null, null, null, null, null, identityProviderAlias, null, null, null, true, null);
    assertEquals(1, searchByIdpAliasAndEnabled.size());
    assertEquals(enabledUsername, searchByIdpAliasAndEnabled.get(0).getUsername());
    List<UserRepresentation> searchByIdpAliasAndDisabled = realm.users().search(null, null, null, null, null, identityProviderAlias, null, null, null, false, null);
    assertEquals(1, searchByIdpAliasAndDisabled.size());
    assertEquals(disabledUsername, searchByIdpAliasAndDisabled.get(0).getUsername());
    List<UserRepresentation> searchByIdpAliasWithoutEnabledFlag = realm.users().search(null, null, null, null, null, identityProviderAlias, null, null, null, null, null);
    assertEquals(2, searchByIdpAliasWithoutEnabledFlag.size());
    assertEquals(disabledUsername, searchByIdpAliasWithoutEnabledFlag.get(0).getUsername());
    assertEquals(enabledUsername, searchByIdpAliasWithoutEnabledFlag.get(1).getUsername());
}
Also used : FederatedIdentityRepresentation(org.keycloak.representations.idm.FederatedIdentityRepresentation) UserRepresentation(org.keycloak.representations.idm.UserRepresentation) Test(org.junit.Test)

Aggregations

FederatedIdentityRepresentation (org.keycloak.representations.idm.FederatedIdentityRepresentation)30 Test (org.junit.Test)18 UserRepresentation (org.keycloak.representations.idm.UserRepresentation)12 RealmResource (org.keycloak.admin.client.resource.RealmResource)9 LinkedList (java.util.LinkedList)7 List (java.util.List)7 UriBuilder (javax.ws.rs.core.UriBuilder)6 ArrayList (java.util.ArrayList)5 AbstractServletsAdapterTest (org.keycloak.testsuite.adapter.AbstractServletsAdapterTest)5 Map (java.util.Map)4 UserResource (org.keycloak.admin.client.resource.UserResource)4 ClientRepresentation (org.keycloak.representations.idm.ClientRepresentation)4 CredentialRepresentation (org.keycloak.representations.idm.CredentialRepresentation)4 IdentityProviderRepresentation (org.keycloak.representations.idm.IdentityProviderRepresentation)4 IOException (java.io.IOException)3 HashMap (java.util.HashMap)3 Response (javax.ws.rs.core.Response)3 UsersResource (org.keycloak.admin.client.resource.UsersResource)3 MultivaluedHashMap (org.keycloak.common.util.MultivaluedHashMap)3 UserConsentRepresentation (org.keycloak.representations.idm.UserConsentRepresentation)3