From f71b9bf1489125ec2bbfd4c1e70a1dde5ff23793 Mon Sep 17 00:00:00 2001 From: Martin Devlin Date: Mon, 23 Oct 2017 18:31:52 +0100 Subject: [PATCH] Initial commit --- README.md | 21 +++++++++++-- keycloak/connection.py | 26 +++++++++++++--- keycloak/keycloak_admin.py | 62 +++++++++++++++++++++++++++++++++++-- keycloak/keycloak_openid.py | 9 ++---- keycloak/urls_patterns.py | 2 -- 5 files changed, 101 insertions(+), 19 deletions(-) diff --git a/README.md b/README.md index 064dc0e..099c0c8 100644 --- a/README.md +++ b/README.md @@ -3,6 +3,8 @@ Python Keycloak ==================== +For review- see https://bitbucket.org/agriness/python-keycloak + **python-keycloak** is a Python package providing access to the Keycloak API. ## Installation @@ -113,6 +115,9 @@ count_users = keycloak_admin.users_count() # Get users Returns a list of users, filtered according to query parameters users = keycloak_admin.get_users({}) +# Get user ID from name +user-id-keycloak = keycloak_admin.get_user_id("example@example.com") + # Get User user = keycloak_admin.get_user("user-id-keycloak") @@ -142,14 +147,24 @@ server_info = keycloak_admin.get_server_info() # Get clients belonging to the realm Returns a list of clients belonging to the realm clients = keycloak_admin.get_clients() +# Get client - id (not client-id) from client by name +client_id=keycloak_admin.get_client_id("my-client") + # Get representation of the client - id of client (not client-id) -client = keycloak_admin.get_client(client_id='id-client') +client = keycloak_admin.get_client(client_id=client_id) # Get all roles for the client -client_roles = keycloak_admin.get_client_role(client_id='id-client') +client_roles = keycloak_admin.get_client_role(client_id=client_id) + +# Create client role +keycloak_admin.create_client_role(client_id, "test") +# Get client role id from name +role_id = keycloak_admin.get_client_role_id(client_id=client_id, role_name="test") # Get all roles for the realm or client realm_roles = keycloak_admin.get_roles() -``` \ No newline at end of file +# Assign client role to user. Note that BOTH role_name and role_id appear to be required. +keycloak_admin.assign_client_role(client_id=client_id, user_id=user_id, role_id=role_id, role_name="test") +``` diff --git a/keycloak/connection.py b/keycloak/connection.py index 808edb6..503b688 100644 --- a/keycloak/connection.py +++ b/keycloak/connection.py @@ -30,12 +30,14 @@ class ConnectionManager(object): base_url (str): The server URL. headers (dict): The header parameters of the requests to the server. timeout (int): Timeout to use for requests to the server. + verify (bool): Verify server SSL. """ - def __init__(self, base_url, headers={}, timeout=60): + def __init__(self, base_url, headers={}, timeout=60, verify=True): self._base_url = base_url self._headers = headers self._timeout = timeout + self._verify = verify @property def base_url(self): @@ -57,6 +59,16 @@ class ConnectionManager(object): """ """ self._timeout = value + @property + def verify(self): + """ Return verify in use for request to the server. """ + return self._verify + + @verify.setter + def verify(self, value): + """ """ + self._verify = value + @property def headers(self): """ Return header request to the server. """ @@ -118,7 +130,8 @@ class ConnectionManager(object): return requests.get(urljoin(self.base_url, path), params=kwargs, headers=self.headers, - timeout=self.timeout) + timeout=self.timeout, + verify=self.verify) except Exception as e: raise KeycloakConnectionError( "Can't connect to server (%s)" % e) @@ -138,7 +151,8 @@ class ConnectionManager(object): params=kwargs, data=data, headers=self.headers, - timeout=self.timeout) + timeout=self.timeout, + verify=self.verify) except Exception as e: raise KeycloakConnectionError( "Can't connect to server (%s)" % e) @@ -158,7 +172,8 @@ class ConnectionManager(object): params=kwargs, data=data, headers=self.headers, - timeout=self.timeout) + timeout=self.timeout, + verify=self.verify) except Exception as e: raise KeycloakConnectionError( "Can't connect to server (%s)" % e) @@ -177,7 +192,8 @@ class ConnectionManager(object): return requests.delete(urljoin(self.base_url, path), params=kwargs, headers=self.headers, - timeout=self.timeout) + timeout=self.timeout, + verify=self.verify) except Exception as e: raise KeycloakConnectionError( "Can't connect to server (%s)" % e) diff --git a/keycloak/keycloak_admin.py b/keycloak/keycloak_admin.py index e530f60..c24dbc3 100644 --- a/keycloak/keycloak_admin.py +++ b/keycloak/keycloak_admin.py @@ -32,20 +32,21 @@ import json class KeycloakAdmin: - def __init__(self, server_url, username, password, realm_name='master', client_id='admin-cli'): + def __init__(self, server_url, verify, username, password, realm_name='master', client_id='admin-cli'): self._username = username self._password = password self._client_id = client_id self._realm_name = realm_name # Get token Admin - keycloak_openid = KeycloakOpenID(server_url, client_id, realm_name) + keycloak_openid = KeycloakOpenID(server_url=server_url, client_id=client_id, realm_name=realm_name, verify=verify) self._token = keycloak_openid.token(username, password) self._connection = ConnectionManager(base_url=server_url, headers={'Authorization': 'Bearer ' + self.token.get('access_token'), 'Content-Type': 'application/json'}, - timeout=60) + timeout=60, + verify=verify) @property def realm_name(self): @@ -333,6 +334,43 @@ class KeycloakAdmin: data_raw = self.connection.raw_get(URL_ADMIN_CLIENT.format(**params_path)) return raise_error_from_response(data_raw, KeycloakGetError) + def create_client(self, name, client_id, redirect_urls, protocol="openid-connect", public_client=True, direct_access_grants=True): + """ + Create a client + + :param name: name of client, payload (ClientRepresentation) + + ClientRepresentation + http://www.keycloak.org/docs-api/3.3/rest-api/index.html#_clientrepresentation + + """ + data={} + data["name"]=name + data["clientId"]=client_id + data["redirectUris"]=redirect_urls + data["protocol"]=protocol + data["publicClient"]=public_client + data["directAccessGrantsEnabled"]=direct_access_grants + params_path = {"realm-name": self.realm_name} + data_raw = self.connection.raw_post(URL_ADMIN_CLIENTS.format(**params_path), + data=json.dumps(data)) + return raise_error_from_response(data_raw, KeycloakGetError, expected_code=201) + + def delete_client(self, client_id): + """ + Get representation of the client + + ClientRepresentation + http://www.keycloak.org/docs-api/3.3/rest-api/index.html#_clientrepresentation + + :param client_id: id of client (not client-id) + + :return: ClientRepresentation + """ + params_path = {"realm-name": self.realm_name, "id": client_id} + data_raw = self.connection.raw_delete(URL_ADMIN_CLIENT.format(**params_path)) + return raise_error_from_response(data_raw, KeycloakGetError, expected_code=204) + def get_client_roles(self, client_id): """ Get all roles for the client @@ -402,6 +440,24 @@ class KeycloakAdmin: data=json.dumps(data)) return raise_error_from_response(data_raw, KeycloakGetError, expected_code=201) + def delete_client_role(self, client_id, role_name): + """ + Create a client role + + :param client_id: id of client (not client-id), payload (RoleRepresentation) + + RoleRepresentation + http://www.keycloak.org/docs-api/3.3/rest-api/index.html#_rolerepresentation + + """ + data={} + data["name"]=role_name + data["clientRole"]=True + params_path = {"realm-name": self.realm_name, "id": client_id} + data_raw = self.connection.raw_delete(URL_ADMIN_CLIENT_ROLES.format(**params_path) + "/" + role_name, + data=json.dumps(data)) + return raise_error_from_response(data_raw, KeycloakGetError, expected_code=204) + def assign_client_role(self, user_id, client_id, role_id, role_name): """ Assign a client role to a user diff --git a/keycloak/keycloak_openid.py b/keycloak/keycloak_openid.py index 669d5e0..f19c0e0 100644 --- a/keycloak/keycloak_openid.py +++ b/keycloak/keycloak_openid.py @@ -34,14 +34,14 @@ import json class KeycloakOpenID: - def __init__(self, server_url, client_id, realm_name, client_secret_key=None): + def __init__(self, server_url, verify, client_id, realm_name, client_secret_key=None): self._client_id = client_id self._client_secret_key = client_secret_key self._realm_name = realm_name - self._connection = ConnectionManager(base_url=server_url, headers={}, - timeout=60) + timeout=60, + verify=verify) self._authorization = Authorization() @@ -360,6 +360,3 @@ class KeycloakOpenID: permissions += policy.permissions return list(set(permissions)) - - - diff --git a/keycloak/urls_patterns.py b/keycloak/urls_patterns.py index 3c5b5b6..33c04e9 100644 --- a/keycloak/urls_patterns.py +++ b/keycloak/urls_patterns.py @@ -42,5 +42,3 @@ URL_ADMIN_CLIENT = "admin/realms/{realm-name}/clients/{id}" URL_ADMIN_CLIENT_ROLES = "admin/realms/{realm-name}/clients/{id}/roles" URL_ADMIN_REALM_ROLES = "admin/realms/{realm-name}/roles" - -