|
|
"""Fixtures for tests."""
import os import uuid
import pytest
from keycloak import KeycloakAdmin, KeycloakOpenID
class KeycloakTestEnv(object): """Wrapper for test Keycloak connection configuration.
:param host: Hostname :type host: str :param port: Port :type port: str :param username: Admin username :type username: str :param password: Admin password :type password: str """
def __init__( self, host: str = os.environ["KEYCLOAK_HOST"], port: str = os.environ["KEYCLOAK_PORT"], username: str = os.environ["KEYCLOAK_ADMIN"], password: str = os.environ["KEYCLOAK_ADMIN_PASSWORD"], ): """Init method.""" self.KEYCLOAK_HOST = host self.KEYCLOAK_PORT = port self.KEYCLOAK_ADMIN = username self.KEYCLOAK_ADMIN_PASSWORD = password
@property def KEYCLOAK_HOST(self): """Hostname getter.""" return self._KEYCLOAK_HOST
@KEYCLOAK_HOST.setter def KEYCLOAK_HOST(self, value: str): """Hostname setter.""" self._KEYCLOAK_HOST = value
@property def KEYCLOAK_PORT(self): """Port getter.""" return self._KEYCLOAK_PORT
@KEYCLOAK_PORT.setter def KEYCLOAK_PORT(self, value: str): """Port setter.""" self._KEYCLOAK_PORT = value
@property def KEYCLOAK_ADMIN(self): """Admin username getter.""" return self._KEYCLOAK_ADMIN
@KEYCLOAK_ADMIN.setter def KEYCLOAK_ADMIN(self, value: str): """Admin username setter.""" self._KEYCLOAK_ADMIN = value
@property def KEYCLOAK_ADMIN_PASSWORD(self): """Admin password getter.""" return self._KEYCLOAK_ADMIN_PASSWORD
@KEYCLOAK_ADMIN_PASSWORD.setter def KEYCLOAK_ADMIN_PASSWORD(self, value: str): """Admin password setter.""" self._KEYCLOAK_ADMIN_PASSWORD = value
@pytest.fixture def env(): """Fixture for getting the test environment configuration object.""" return KeycloakTestEnv()
@pytest.fixture def admin(env: KeycloakTestEnv): """Fixture for initialized KeycloakAdmin class.""" return KeycloakAdmin( server_url=f"http://{env.KEYCLOAK_HOST}:{env.KEYCLOAK_PORT}", username=env.KEYCLOAK_ADMIN, password=env.KEYCLOAK_ADMIN_PASSWORD, )
@pytest.fixture def oid(env: KeycloakTestEnv, realm: str, admin: KeycloakAdmin): """Fixture for initialized KeycloakOpenID class.""" # Set the realm admin.realm_name = realm # Create client client = str(uuid.uuid4()) client_id = admin.create_client( payload={ "name": client, "clientId": client, "enabled": True, "publicClient": True, "protocol": "openid-connect", } ) # Return OID yield KeycloakOpenID( server_url=f"http://{env.KEYCLOAK_HOST}:{env.KEYCLOAK_PORT}", realm_name=realm, client_id=client, ) # Cleanup admin.delete_client(client_id=client_id)
@pytest.fixture def oid_with_credentials(env: KeycloakTestEnv, realm: str, admin: KeycloakAdmin): """Fixture for an initialized KeycloakOpenID class and a random user credentials.""" # Set the realm admin.realm_name = realm # Create client client = str(uuid.uuid4()) secret = str(uuid.uuid4()) client_id = admin.create_client( payload={ "name": client, "clientId": client, "enabled": True, "publicClient": False, "protocol": "openid-connect", "secret": secret, "clientAuthenticatorType": "client-secret", } ) # Create user username = str(uuid.uuid4()) password = str(uuid.uuid4()) user_id = admin.create_user( payload={ "username": username, "email": f"{username}@test.test", "enabled": True, "credentials": [{"type": "password", "value": password}], } )
yield ( KeycloakOpenID( server_url=f"http://{env.KEYCLOAK_HOST}:{env.KEYCLOAK_PORT}", realm_name=realm, client_id=client, client_secret_key=secret, ), username, password, )
# Cleanup admin.delete_client(client_id=client_id) admin.delete_user(user_id=user_id)
@pytest.fixture def oid_with_credentials_authz(env: KeycloakTestEnv, realm: str, admin: KeycloakAdmin): """Fixture for an initialized KeycloakOpenID class and a random user credentials.""" # Set the realm admin.realm_name = realm # Create client client = str(uuid.uuid4()) secret = str(uuid.uuid4()) client_id = admin.create_client( payload={ "name": client, "clientId": client, "enabled": True, "publicClient": False, "protocol": "openid-connect", "secret": secret, "clientAuthenticatorType": "client-secret", "authorizationServicesEnabled": True, "serviceAccountsEnabled": True, } ) admin.create_client_authz_role_based_policy( client_id=client_id, payload={ "name": "test-authz-rb-policy", "roles": [{"id": admin.get_realm_role(role_name="offline_access")["id"]}], }, ) admin.create_client_authz_resource # Create user username = str(uuid.uuid4()) password = str(uuid.uuid4()) user_id = admin.create_user( payload={ "username": username, "email": f"{username}@test.test", "enabled": True, "credentials": [{"type": "password", "value": password}], } )
yield ( KeycloakOpenID( server_url=f"http://{env.KEYCLOAK_HOST}:{env.KEYCLOAK_PORT}", realm_name=realm, client_id=client, client_secret_key=secret, ), username, password, )
# Cleanup admin.delete_client(client_id=client_id) admin.delete_user(user_id=user_id)
@pytest.fixture def realm(admin: KeycloakAdmin) -> str: """Fixture for a new random realm.""" realm_name = str(uuid.uuid4()) admin.create_realm(payload={"realm": realm_name, "enabled": True}) yield realm_name admin.delete_realm(realm_name=realm_name)
@pytest.fixture def user(admin: KeycloakAdmin, realm: str) -> str: """Fixture for a new random user.""" admin.realm_name = realm username = str(uuid.uuid4()) user_id = admin.create_user(payload={"username": username, "email": f"{username}@test.test"}) yield user_id admin.delete_user(user_id=user_id)
@pytest.fixture def group(admin: KeycloakAdmin, realm: str) -> str: """Fixture for a new random group.""" admin.realm_name = realm group_name = str(uuid.uuid4()) group_id = admin.create_group(payload={"name": group_name}) yield group_id admin.delete_group(group_id=group_id)
@pytest.fixture def client(admin: KeycloakAdmin, realm: str) -> str: """Fixture for a new random client.""" admin.realm_name = realm client = str(uuid.uuid4()) client_id = admin.create_client(payload={"name": client, "clientId": client}) yield client_id admin.delete_client(client_id=client_id)
|