You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
8790 lines
340 KiB
8790 lines
340 KiB
# -*- coding: utf-8 -*-
|
|
#
|
|
# The MIT License (MIT)
|
|
#
|
|
# Copyright (C) 2017 Marcos Pereira <marcospereira.mpj@gmail.com>
|
|
#
|
|
# Permission is hereby granted, free of charge, to any person obtaining a copy of
|
|
# this software and associated documentation files (the "Software"), to deal in
|
|
# the Software without restriction, including without limitation the rights to
|
|
# use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
|
# the Software, and to permit persons to whom the Software is furnished to do so,
|
|
# subject to the following conditions:
|
|
#
|
|
# The above copyright notice and this permission notice shall be included in all
|
|
# copies or substantial portions of the Software.
|
|
#
|
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
|
# FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
|
# COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
|
# IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
# Unless otherwise stated in the comments, "id", in e.g. user_id, refers to the
|
|
# internal Keycloak server ID, usually a uuid string
|
|
|
|
"""The keycloak admin module."""
|
|
|
|
import copy
|
|
import json
|
|
from builtins import isinstance
|
|
from typing import Optional
|
|
|
|
from requests_toolbelt import MultipartEncoder
|
|
|
|
from . import urls_patterns
|
|
from .exceptions import (
|
|
KeycloakDeleteError,
|
|
KeycloakGetError,
|
|
KeycloakPostError,
|
|
KeycloakPutError,
|
|
raise_error_from_response,
|
|
)
|
|
from .openid_connection import KeycloakOpenIDConnection
|
|
|
|
|
|
class KeycloakAdmin:
|
|
"""Keycloak Admin client.
|
|
|
|
:param server_url: Keycloak server url
|
|
:type server_url: str
|
|
:param username: admin username
|
|
:type username: str
|
|
:param password: admin password
|
|
:type password: str
|
|
:param token: access and refresh tokens
|
|
:type token: dict
|
|
:param totp: Time based OTP
|
|
:type totp: str
|
|
:param realm_name: realm name
|
|
:type realm_name: str
|
|
:param client_id: client id
|
|
:type client_id: str
|
|
:param verify: Boolean value to enable or disable certificate validation or a string
|
|
containing a path to a CA bundle to use
|
|
:type verify: Union[bool,str]
|
|
:param client_secret_key: client secret key
|
|
(optional, required only for access type confidential)
|
|
:type client_secret_key: str
|
|
:param custom_headers: dict of custom header to pass to each HTML request
|
|
:type custom_headers: dict
|
|
:param user_realm_name: The realm name of the user, if different from realm_name
|
|
:type user_realm_name: str
|
|
:param timeout: connection timeout in seconds
|
|
:type timeout: int
|
|
:param cert: An SSL certificate used by the requested host to authenticate the client.
|
|
Either a path to an SSL certificate file, or two-tuple of
|
|
(certificate file, key file).
|
|
:type cert: Union[str,Tuple[str,str]]
|
|
:param max_retries: The total number of times to retry HTTP requests.
|
|
:type max_retries: int
|
|
:param connection: A KeycloakOpenIDConnection as an alternative to individual params.
|
|
:type connection: KeycloakOpenIDConnection
|
|
"""
|
|
|
|
PAGE_SIZE = 100
|
|
|
|
def __init__(
|
|
self,
|
|
server_url=None,
|
|
grant_type=None,
|
|
username=None,
|
|
password=None,
|
|
token=None,
|
|
totp=None,
|
|
realm_name="master",
|
|
client_id="admin-cli",
|
|
verify=True,
|
|
client_secret_key=None,
|
|
custom_headers=None,
|
|
user_realm_name=None,
|
|
timeout=60,
|
|
cert=None,
|
|
max_retries=1,
|
|
connection: Optional[KeycloakOpenIDConnection] = None,
|
|
):
|
|
"""Init method.
|
|
|
|
:param server_url: Keycloak server url
|
|
:type server_url: str
|
|
:param grant_type: grant type for authn
|
|
:type grant_type: str
|
|
:param username: admin username
|
|
:type username: str
|
|
:param password: admin password
|
|
:type password: str
|
|
:param token: access and refresh tokens
|
|
:type token: dict
|
|
:param totp: Time based OTP
|
|
:type totp: str
|
|
:param realm_name: realm name
|
|
:type realm_name: str
|
|
:param client_id: client id
|
|
:type client_id: str
|
|
:param verify: Boolean value to enable or disable certificate validation or a string
|
|
containing a path to a CA bundle to use
|
|
:type verify: Union[bool,str]
|
|
:param client_secret_key: client secret key
|
|
(optional, required only for access type confidential)
|
|
:type client_secret_key: str
|
|
:param custom_headers: dict of custom header to pass to each HTML request
|
|
:type custom_headers: dict
|
|
:param user_realm_name: The realm name of the user, if different from realm_name
|
|
:type user_realm_name: str
|
|
:param timeout: connection timeout in seconds
|
|
:type timeout: int
|
|
:param cert: An SSL certificate used by the requested host to authenticate the client.
|
|
Either a path to an SSL certificate file, or two-tuple of (certificate file, key file).
|
|
:type cert: Union[str,Tuple[str,str]]
|
|
:param max_retries: The total number of times to retry HTTP requests.
|
|
:type max_retries: int
|
|
:param connection: An OpenID Connection as an alternative to individual params.
|
|
:type connection: KeycloakOpenIDConnection
|
|
"""
|
|
self.connection = connection or KeycloakOpenIDConnection(
|
|
server_url=server_url,
|
|
grant_type=grant_type,
|
|
username=username,
|
|
password=password,
|
|
token=token,
|
|
totp=totp,
|
|
realm_name=realm_name,
|
|
client_id=client_id,
|
|
verify=verify,
|
|
client_secret_key=client_secret_key,
|
|
user_realm_name=user_realm_name,
|
|
custom_headers=custom_headers,
|
|
timeout=timeout,
|
|
cert=cert,
|
|
max_retries=max_retries,
|
|
)
|
|
|
|
@property
|
|
def connection(self) -> KeycloakOpenIDConnection:
|
|
"""Get connection.
|
|
|
|
:returns: Connection manager
|
|
:rtype: KeycloakOpenIDConnection
|
|
"""
|
|
return self._connection
|
|
|
|
@connection.setter
|
|
def connection(self, value: KeycloakOpenIDConnection) -> None:
|
|
self._connection = value
|
|
|
|
def __fetch_all(self, url, query=None):
|
|
"""Paginate over get requests.
|
|
|
|
Wrapper function to paginate GET requests.
|
|
|
|
:param url: The url on which the query is executed
|
|
:type url: str
|
|
:param query: Existing query parameters (optional)
|
|
:type query: dict
|
|
|
|
:return: Combined results of paginated queries
|
|
:rtype: list
|
|
"""
|
|
results = []
|
|
|
|
# initialize query if it was called with None
|
|
if not query:
|
|
query = {}
|
|
page = 0
|
|
query["max"] = self.PAGE_SIZE
|
|
|
|
# fetch until we can
|
|
while True:
|
|
query["first"] = page * self.PAGE_SIZE
|
|
partial_results = raise_error_from_response(
|
|
self.connection.raw_get(url, **query), KeycloakGetError
|
|
)
|
|
if not partial_results:
|
|
break
|
|
results.extend(partial_results)
|
|
if len(partial_results) < query["max"]:
|
|
break
|
|
page += 1
|
|
return results
|
|
|
|
def __fetch_paginated(self, url, query=None):
|
|
"""Make a specific paginated request.
|
|
|
|
:param url: The url on which the query is executed
|
|
:type url: str
|
|
:param query: Pagination settings
|
|
:type query: dict
|
|
:returns: Response
|
|
:rtype: dict
|
|
"""
|
|
query = query or {}
|
|
return raise_error_from_response(self.connection.raw_get(url, **query), KeycloakGetError)
|
|
|
|
def get_current_realm(self) -> str:
|
|
"""Return the currently configured realm.
|
|
|
|
:returns: Currently configured realm name
|
|
:rtype: str
|
|
"""
|
|
return self.connection.realm_name
|
|
|
|
def change_current_realm(self, realm_name: str) -> None:
|
|
"""Change the current realm.
|
|
|
|
:param realm_name: The name of the realm to be configured as current
|
|
:type realm_name: str
|
|
"""
|
|
self.connection.realm_name = realm_name
|
|
|
|
def import_realm(self, payload):
|
|
"""Import a new realm from a RealmRepresentation.
|
|
|
|
Realm name must be unique.
|
|
|
|
RealmRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_realmrepresentation
|
|
|
|
:param payload: RealmRepresentation
|
|
:type payload: dict
|
|
:return: RealmRepresentation
|
|
:rtype: dict
|
|
"""
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_REALMS, data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def partial_import_realm(self, realm_name, payload):
|
|
"""Partial import realm configuration from PartialImportRepresentation.
|
|
|
|
Realm partialImport is used for modifying configuration of existing realm.
|
|
|
|
PartialImportRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_partialimportrepresentation
|
|
|
|
:param realm_name: Realm name (not the realm id)
|
|
:type realm_name: str
|
|
:param payload: PartialImportRepresentation
|
|
:type payload: dict
|
|
|
|
:return: PartialImportResponse
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": realm_name}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_REALM_PARTIAL_IMPORT.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[200])
|
|
|
|
def export_realm(self, export_clients=False, export_groups_and_role=False):
|
|
"""Export the realm configurations in the json format.
|
|
|
|
RealmRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_partialexport
|
|
|
|
:param export_clients: Skip if not want to export realm clients
|
|
:type export_clients: bool
|
|
:param export_groups_and_role: Skip if not want to export realm groups and roles
|
|
:type export_groups_and_role: bool
|
|
|
|
:return: realm configurations JSON
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"export-clients": export_clients,
|
|
"export-groups-and-roles": export_groups_and_role,
|
|
}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_REALM_EXPORT.format(**params_path), data=""
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError)
|
|
|
|
def get_realms(self):
|
|
"""List all realms in Keycloak deployment.
|
|
|
|
:return: realms list
|
|
:rtype: list
|
|
"""
|
|
data_raw = self.connection.raw_get(urls_patterns.URL_ADMIN_REALMS)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_realm(self, realm_name):
|
|
"""Get a specific realm.
|
|
|
|
RealmRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_realmrepresentation
|
|
|
|
:param realm_name: Realm name (not the realm id)
|
|
:type realm_name: str
|
|
:return: RealmRepresentation
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": realm_name}
|
|
data_raw = self.connection.raw_get(urls_patterns.URL_ADMIN_REALM.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
def create_realm(self, payload, skip_exists=False):
|
|
"""Create a realm.
|
|
|
|
RealmRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_realmrepresentation
|
|
|
|
:param payload: RealmRepresentation
|
|
:type payload: dict
|
|
:param skip_exists: Skip if Realm already exist.
|
|
:type skip_exists: bool
|
|
:return: Keycloak server response (RealmRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_REALMS, data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
def update_realm(self, realm_name, payload):
|
|
"""Update a realm.
|
|
|
|
This will only update top level attributes and will ignore any user,
|
|
role, or client information in the payload.
|
|
|
|
RealmRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_realmrepresentation
|
|
|
|
:param realm_name: Realm name (not the realm id)
|
|
:type realm_name: str
|
|
:param payload: RealmRepresentation
|
|
:type payload: dict
|
|
:return: Http response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": realm_name}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_REALM.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_realm(self, realm_name):
|
|
"""Delete a realm.
|
|
|
|
:param realm_name: Realm name (not the realm id)
|
|
:type realm_name: str
|
|
:return: Http response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": realm_name}
|
|
data_raw = self.connection.raw_delete(urls_patterns.URL_ADMIN_REALM.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_users(self, query=None):
|
|
"""Get all users.
|
|
|
|
Return a list of users, filtered according to query parameters
|
|
|
|
UserRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_userrepresentation
|
|
|
|
:param query: Query parameters (optional)
|
|
:type query: dict
|
|
:return: users list
|
|
:rtype: list
|
|
"""
|
|
query = query or {}
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
url = urls_patterns.URL_ADMIN_USERS.format(**params_path)
|
|
|
|
if "first" in query or "max" in query:
|
|
return self.__fetch_paginated(url, query)
|
|
|
|
return self.__fetch_all(url, query)
|
|
|
|
def create_idp(self, payload):
|
|
"""Create an ID Provider.
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_identityproviderrepresentation
|
|
|
|
:param: payload: IdentityProviderRepresentation
|
|
:type payload: dict
|
|
:returns: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_IDPS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def update_idp(self, idp_alias, payload):
|
|
"""Update an ID Provider.
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_identity_providers_resource
|
|
|
|
:param: idp_alias: alias for IdP to update
|
|
:type idp_alias: str
|
|
:param: payload: The IdentityProviderRepresentation
|
|
:type payload: dict
|
|
:returns: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "alias": idp_alias}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_IDP.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def add_mapper_to_idp(self, idp_alias, payload):
|
|
"""Create an ID Provider.
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_identityprovidermapperrepresentation
|
|
|
|
:param: idp_alias: alias for Idp to add mapper in
|
|
:type idp_alias: str
|
|
:param: payload: IdentityProviderMapperRepresentation
|
|
:type payload: dict
|
|
:returns: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "idp-alias": idp_alias}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_IDP_MAPPERS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def update_mapper_in_idp(self, idp_alias, mapper_id, payload):
|
|
"""Update an IdP mapper.
|
|
|
|
IdentityProviderMapperRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_update
|
|
|
|
:param: idp_alias: alias for Idp to fetch mappers
|
|
:type idp_alias: str
|
|
:param: mapper_id: Mapper Id to update
|
|
:type mapper_id: str
|
|
:param: payload: IdentityProviderMapperRepresentation
|
|
:type payload: dict
|
|
:return: Http response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"idp-alias": idp_alias,
|
|
"mapper-id": mapper_id,
|
|
}
|
|
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_IDP_MAPPER_UPDATE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def get_idp_mappers(self, idp_alias):
|
|
"""Get IDP mappers.
|
|
|
|
Returns a list of ID Providers mappers
|
|
|
|
IdentityProviderMapperRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getmappers
|
|
|
|
:param: idp_alias: alias for Idp to fetch mappers
|
|
:type idp_alias: str
|
|
:return: array IdentityProviderMapperRepresentation
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "idp-alias": idp_alias}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_IDP_MAPPERS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_idps(self):
|
|
"""Get IDPs.
|
|
|
|
Returns a list of ID Providers,
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_identityproviderrepresentation
|
|
|
|
:return: array IdentityProviderRepresentation
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(urls_patterns.URL_ADMIN_IDPS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_idp(self, idp_alias):
|
|
"""Get IDP provider.
|
|
|
|
Get the representation of a specific IDP Provider.
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_identityproviderrepresentation
|
|
|
|
:param: idp_alias: alias for IdP to get
|
|
:type idp_alias: str
|
|
:return: IdentityProviderRepresentation
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "alias": idp_alias}
|
|
data_raw = self.connection.raw_get(urls_patterns.URL_ADMIN_IDP.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def delete_idp(self, idp_alias):
|
|
"""Delete an ID Provider.
|
|
|
|
:param: idp_alias: idp alias name
|
|
:type idp_alias: str
|
|
:returns: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "alias": idp_alias}
|
|
data_raw = self.connection.raw_delete(urls_patterns.URL_ADMIN_IDP.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def create_user(self, payload, exist_ok=False):
|
|
"""Create a new user.
|
|
|
|
Username must be unique
|
|
|
|
UserRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_userrepresentation
|
|
|
|
:param payload: UserRepresentation
|
|
:type payload: dict
|
|
:param exist_ok: If False, raise KeycloakGetError if username already exists.
|
|
Otherwise, return existing user ID.
|
|
:type exist_ok: bool
|
|
|
|
:return: user_id
|
|
:rtype: str
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
|
|
if exist_ok:
|
|
exists = self.get_user_id(username=payload["username"])
|
|
|
|
if exists is not None:
|
|
return str(exists)
|
|
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_USERS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
def users_count(self, query=None):
|
|
"""Count users.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_users_resource
|
|
|
|
:param query: (dict) Query parameters for users count
|
|
:type query: dict
|
|
|
|
:return: counter
|
|
:rtype: int
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_USERS_COUNT.format(**params_path), **query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_user_id(self, username):
|
|
"""Get internal keycloak user id from username.
|
|
|
|
This is required for further actions against this user.
|
|
|
|
UserRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_userrepresentation
|
|
|
|
:param username: id in UserRepresentation
|
|
:type username: str
|
|
|
|
:return: user_id
|
|
:rtype: str
|
|
"""
|
|
lower_user_name = username.lower()
|
|
users = self.get_users(query={"username": lower_user_name, "max": 1, "exact": True})
|
|
return users[0]["id"] if len(users) == 1 else None
|
|
|
|
def get_user(self, user_id):
|
|
"""Get representation of the user.
|
|
|
|
UserRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_userrepresentation
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:return: UserRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_get(urls_patterns.URL_ADMIN_USER.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_user_groups(self, user_id, query=None, brief_representation=True):
|
|
"""Get user groups.
|
|
|
|
Returns a list of groups of which the user is a member
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param query: Additional query options
|
|
:type query: dict
|
|
:param brief_representation: whether to omit attributes in the response
|
|
:type brief_representation: bool
|
|
:return: user groups list
|
|
:rtype: list
|
|
"""
|
|
query = query or {}
|
|
|
|
params = {"briefRepresentation": brief_representation}
|
|
|
|
query.update(params)
|
|
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
|
|
url = urls_patterns.URL_ADMIN_USER_GROUPS.format(**params_path)
|
|
|
|
if "first" in query or "max" in query:
|
|
return self.__fetch_paginated(url, query)
|
|
|
|
return self.__fetch_all(url, query)
|
|
|
|
def update_user(self, user_id, payload):
|
|
"""Update the user.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param payload: UserRepresentation
|
|
:type payload: dict
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_USER.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def disable_user(self, user_id):
|
|
"""Disable the user from the realm. Disabled users can not log in.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
return self.update_user(user_id=user_id, payload={"enabled": False})
|
|
|
|
def enable_user(self, user_id):
|
|
"""Enable the user from the realm.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
return self.update_user(user_id=user_id, payload={"enabled": True})
|
|
|
|
def disable_all_users(self):
|
|
"""Disable all existing users."""
|
|
users = self.get_users()
|
|
for user in users:
|
|
user_id = user["id"]
|
|
self.disable_user(user_id=user_id)
|
|
|
|
def enable_all_users(self):
|
|
"""Disable all existing users."""
|
|
users = self.get_users()
|
|
for user in users:
|
|
user_id = user["id"]
|
|
self.enable_user(user_id=user_id)
|
|
|
|
def delete_user(self, user_id):
|
|
"""Delete the user.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_delete(urls_patterns.URL_ADMIN_USER.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def set_user_password(self, user_id, password, temporary=True):
|
|
"""Set up a password for the user.
|
|
|
|
If temporary is True, the user will have to reset
|
|
the temporary password next time they log in.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_users_resource
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_credentialrepresentation
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param password: New password
|
|
:type password: str
|
|
:param temporary: True if password is temporary
|
|
:type temporary: bool
|
|
:returns: Response
|
|
:rtype: dict
|
|
"""
|
|
payload = {"type": "password", "temporary": temporary, "value": password}
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_RESET_PASSWORD.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def get_credentials(self, user_id):
|
|
"""Get user credentials.
|
|
|
|
Returns a list of credential belonging to the user.
|
|
|
|
CredentialRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_credentialrepresentation
|
|
|
|
:param: user_id: user id
|
|
:type user_id: str
|
|
:returns: Keycloak server response (CredentialRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_USER_CREDENTIALS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def delete_credential(self, user_id, credential_id):
|
|
"""Delete credential of the user.
|
|
|
|
CredentialRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_credentialrepresentation
|
|
|
|
:param: user_id: user id
|
|
:type user_id: str
|
|
:param: credential_id: credential id
|
|
:type credential_id: str
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"credential_id": credential_id,
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_USER_CREDENTIAL.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError)
|
|
|
|
def user_logout(self, user_id):
|
|
"""Log out the user.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_logout
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_USER_LOGOUT.format(**params_path), data=""
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def user_consents(self, user_id):
|
|
"""Get consents granted by the user.
|
|
|
|
UserConsentRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_userconsentrepresentation
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:returns: List of UserConsentRepresentations
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_USER_CONSENTS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_user_social_logins(self, user_id):
|
|
"""Get user social logins.
|
|
|
|
Returns a list of federated identities/social logins of which the user has been associated
|
|
with
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:returns: Federated identities list
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_USER_FEDERATED_IDENTITIES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def add_user_social_login(self, user_id, provider_id, provider_userid, provider_username):
|
|
"""Add a federated identity / social login provider to the user.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param provider_id: Social login provider id
|
|
:type provider_id: str
|
|
:param provider_userid: userid specified by the provider
|
|
:type provider_userid: str
|
|
:param provider_username: username specified by the provider
|
|
:type provider_username: str
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = {
|
|
"identityProvider": provider_id,
|
|
"userId": provider_userid,
|
|
"userName": provider_username,
|
|
}
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"provider": provider_id,
|
|
}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_USER_FEDERATED_IDENTITY.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201, 204])
|
|
|
|
def delete_user_social_login(self, user_id, provider_id):
|
|
"""Delete a federated identity / social login provider from the user.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param provider_id: Social login provider id
|
|
:type provider_id: str
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"provider": provider_id,
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_USER_FEDERATED_IDENTITY.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def send_update_account(
|
|
self, user_id, payload, client_id=None, lifespan=None, redirect_uri=None
|
|
):
|
|
"""Send an update account email to the user.
|
|
|
|
An email contains a link the user can click to perform a set of required actions.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param payload: A list of actions for the user to complete
|
|
:type payload: list
|
|
:param client_id: Client id (optional)
|
|
:type client_id: str
|
|
:param lifespan: Number of seconds after which the generated token expires (optional)
|
|
:type lifespan: int
|
|
:param redirect_uri: The redirect uri (optional)
|
|
:type redirect_uri: str
|
|
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
params_query = {"client_id": client_id, "lifespan": lifespan, "redirect_uri": redirect_uri}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_SEND_UPDATE_ACCOUNT.format(**params_path),
|
|
data=json.dumps(payload),
|
|
**params_query,
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
def send_verify_email(self, user_id, client_id=None, redirect_uri=None):
|
|
"""Send a update account email to the user.
|
|
|
|
An email contains a link the user can click to perform a set of required actions.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param client_id: Client id (optional)
|
|
:type client_id: str
|
|
:param redirect_uri: Redirect uri (optional)
|
|
:type redirect_uri: str
|
|
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
params_query = {"client_id": client_id, "redirect_uri": redirect_uri}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_SEND_VERIFY_EMAIL.format(**params_path),
|
|
data={},
|
|
**params_query,
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
def get_sessions(self, user_id):
|
|
"""Get sessions associated with the user.
|
|
|
|
UserSessionRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_usersessionrepresentation
|
|
|
|
:param user_id: Id of user
|
|
:type user_id: str
|
|
:return: UserSessionRepresentation
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_GET_SESSIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_server_info(self):
|
|
"""Get themes, social providers, etc. on this server.
|
|
|
|
ServerInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_serverinforepresentation
|
|
|
|
:return: ServerInfoRepresentation
|
|
:rtype: dict
|
|
"""
|
|
data_raw = self.connection.raw_get(urls_patterns.URL_ADMIN_SERVER_INFO)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_groups(self, query=None, full_hierarchy=False):
|
|
"""Get groups.
|
|
|
|
Returns a list of groups belonging to the realm
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_grouprepresentation
|
|
|
|
Notice that when using full_hierarchy=True, the response will be a nested structure
|
|
containing all the children groups. If used with query parameters, the full_hierarchy
|
|
will be applied to the received groups only.
|
|
|
|
:param query: Additional query options
|
|
:type query: dict
|
|
:param full_hierarchy: If True, return all of the nested children groups, otherwise only
|
|
the first level children are returned
|
|
:type full_hierarchy: bool
|
|
:return: array GroupRepresentation
|
|
:rtype: list
|
|
"""
|
|
query = query or {}
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
url = urls_patterns.URL_ADMIN_GROUPS.format(**params_path)
|
|
|
|
if "first" in query or "max" in query:
|
|
groups = self.__fetch_paginated(url, query)
|
|
else:
|
|
groups = self.__fetch_all(url, query)
|
|
|
|
# For version +23.0.0
|
|
for group in groups:
|
|
if group.get("subGroupCount"):
|
|
group["subGroups"] = self.get_group_children(
|
|
group_id=group.get("id"), full_hierarchy=full_hierarchy
|
|
)
|
|
|
|
return groups
|
|
|
|
def get_group(self, group_id, full_hierarchy=False):
|
|
"""Get group by id.
|
|
|
|
Returns full group details
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_grouprepresentation
|
|
|
|
:param group_id: The group id
|
|
:type group_id: str
|
|
:param full_hierarchy: If True, return all of the nested children groups, otherwise only
|
|
the first level children are returned
|
|
:type full_hierarchy: bool
|
|
:return: Keycloak server response (GroupRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
response = self.connection.raw_get(urls_patterns.URL_ADMIN_GROUP.format(**params_path))
|
|
|
|
if response.status_code >= 400:
|
|
return raise_error_from_response(response, KeycloakGetError)
|
|
|
|
# For version +23.0.0
|
|
group = response.json()
|
|
if group.get("subGroupCount"):
|
|
group["subGroups"] = self.get_group_children(
|
|
group.get("id"), full_hierarchy=full_hierarchy
|
|
)
|
|
|
|
return group
|
|
|
|
def get_subgroups(self, group, path):
|
|
"""Get subgroups.
|
|
|
|
Utility function to iterate through nested group structures
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_grouprepresentation
|
|
|
|
:param group: group (GroupRepresentation)
|
|
:type group: dict
|
|
:param path: group path (string)
|
|
:type path: str
|
|
:return: Keycloak server response (GroupRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
for subgroup in group["subGroups"]:
|
|
if subgroup["path"] == path:
|
|
return subgroup
|
|
elif subgroup["subGroups"]:
|
|
for subgroup in group["subGroups"]:
|
|
result = self.get_subgroups(subgroup, path)
|
|
if result:
|
|
return result
|
|
# went through the tree without hits
|
|
return None
|
|
|
|
def get_group_children(self, group_id, query=None, full_hierarchy=False):
|
|
"""Get group children by parent id.
|
|
|
|
Returns full group children details
|
|
|
|
:param group_id: The parent group id
|
|
:type group_id: str
|
|
:param query: Additional query options
|
|
:type query: dict
|
|
:param full_hierarchy: If True, return all of the nested children groups
|
|
:type full_hierarchy: bool
|
|
:return: Keycloak server response (GroupRepresentation)
|
|
:rtype: dict
|
|
:raises ValueError: If both query and full_hierarchy parameters are used
|
|
"""
|
|
query = query or {}
|
|
if query and full_hierarchy:
|
|
raise ValueError("Cannot use both query and full_hierarchy parameters")
|
|
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
url = urls_patterns.URL_ADMIN_GROUP_CHILD.format(**params_path)
|
|
if "first" in query or "max" in query:
|
|
return self.__fetch_paginated(url, query)
|
|
res = self.__fetch_all(url, query)
|
|
|
|
if not full_hierarchy:
|
|
return res
|
|
|
|
for group in res:
|
|
if group.get("subGroupCount"):
|
|
group["subGroups"] = self.get_group_children(
|
|
group_id=group.get("id"), full_hierarchy=full_hierarchy
|
|
)
|
|
|
|
return res
|
|
|
|
def get_group_members(self, group_id, query=None):
|
|
"""Get members by group id.
|
|
|
|
Returns group members
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_userrepresentation
|
|
|
|
:param group_id: The group id
|
|
:type group_id: str
|
|
:param query: Additional query parameters
|
|
(see https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getmembers)
|
|
:type query: dict
|
|
:return: Keycloak server response (UserRepresentation)
|
|
:rtype: list
|
|
"""
|
|
query = query or {}
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
url = urls_patterns.URL_ADMIN_GROUP_MEMBERS.format(**params_path)
|
|
|
|
if "first" in query or "max" in query:
|
|
return self.__fetch_paginated(url, query)
|
|
|
|
return self.__fetch_all(url, query)
|
|
|
|
def get_group_by_path(self, path):
|
|
"""Get group id based on name or path.
|
|
|
|
Returns full group details for a group defined by path
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_grouprepresentation
|
|
|
|
:param path: group path
|
|
:type path: str
|
|
:return: Keycloak server response (GroupRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "path": path}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_GROUP_BY_PATH.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def create_group(self, payload, parent=None, skip_exists=False):
|
|
"""Create a group in the Realm.
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_grouprepresentation
|
|
|
|
:param payload: GroupRepresentation
|
|
:type payload: dict
|
|
:param parent: parent group's id. Required to create a sub-group.
|
|
:type parent: str
|
|
:param skip_exists: If true then do not raise an error if it already exists
|
|
:type skip_exists: bool
|
|
|
|
:return: Group id for newly created group or None for an existing group
|
|
:rtype: str
|
|
"""
|
|
if parent is None:
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_GROUPS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
else:
|
|
params_path = {"realm-name": self.connection.realm_name, "id": parent}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_GROUP_CHILD.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
try:
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
except KeyError:
|
|
return
|
|
|
|
def update_group(self, group_id, payload):
|
|
"""Update group, ignores subgroups.
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_grouprepresentation
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param payload: GroupRepresentation with updated information.
|
|
:type payload: dict
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_GROUP.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def groups_count(self, query=None):
|
|
"""Count groups.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_groups
|
|
|
|
:param query: (dict) Query parameters for groups count
|
|
:type query: dict
|
|
|
|
:return: Keycloak Server Response
|
|
:rtype: dict
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_GROUPS_COUNT.format(**params_path), **query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def group_set_permissions(self, group_id, enabled=True):
|
|
"""Enable/Disable permissions for a group.
|
|
|
|
Cannot delete group if disabled
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param enabled: Enabled flag
|
|
:type enabled: bool
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_GROUP_PERMISSIONS.format(**params_path),
|
|
data=json.dumps({"enabled": enabled}),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
def group_user_add(self, user_id, group_id):
|
|
"""Add user to group (user_id and group_id).
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param group_id: id of group to add to
|
|
:type group_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"group-id": group_id,
|
|
}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_USER_GROUP.format(**params_path), data=None
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def group_user_remove(self, user_id, group_id):
|
|
"""Remove user from group (user_id and group_id).
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param group_id: id of group to remove from
|
|
:type group_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"group-id": group_id,
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_USER_GROUP.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def delete_group(self, group_id):
|
|
"""Delete a group in the Realm.
|
|
|
|
:param group_id: id of group to delete
|
|
:type group_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
data_raw = self.connection.raw_delete(urls_patterns.URL_ADMIN_GROUP.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_clients(self):
|
|
"""Get clients.
|
|
|
|
Returns a list of clients belonging to the realm
|
|
|
|
ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(urls_patterns.URL_ADMIN_CLIENTS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client(self, client_id):
|
|
"""Get representation of the client.
|
|
|
|
ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(urls_patterns.URL_ADMIN_CLIENT.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_id(self, client_id):
|
|
"""Get internal keycloak client id from client-id.
|
|
|
|
This is required for further actions against this client.
|
|
|
|
:param client_id: clientId in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: client_id (uuid as string)
|
|
:rtype: str
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "client-id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENTS_CLIENT_ID.format(**params_path)
|
|
)
|
|
data_response = raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
for client in data_response:
|
|
if client_id == client.get("clientId"):
|
|
return client["id"]
|
|
|
|
return None
|
|
|
|
def get_client_authz_settings(self, client_id):
|
|
"""Get authorization json from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SETTINGS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def create_client_authz_resource(self, client_id, payload, skip_exists=False):
|
|
"""Create resources of client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param payload: ResourceRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_resourcerepresentation
|
|
:type payload: dict
|
|
:param skip_exists: Skip the creation in case the resource exists
|
|
:type skip_exists: bool
|
|
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
def update_client_authz_resource(self, client_id, resource_id, payload):
|
|
"""Update resource of client.
|
|
|
|
Any parameter missing from the ResourceRepresentation in the payload WILL be set
|
|
to default by the Keycloak server.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param payload: ResourceRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_resourcerepresentation
|
|
:type payload: dict
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param resource_id: id in ResourceRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_resourcerepresentation
|
|
:type resource_id: str
|
|
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"resource-id": resource_id,
|
|
}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_client_authz_resource(self, client_id: str, resource_id: str):
|
|
"""Delete a client resource.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param resource_id: id in ResourceRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_resourcerepresentation
|
|
:type resource_id: str
|
|
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"resource-id": resource_id,
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_client_authz_resources(self, client_id):
|
|
"""Get resources from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response (ResourceRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_authz_resource(self, client_id: str, resource_id: str):
|
|
"""Get a client resource.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param resource_id: id in ResourceRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_resourcerepresentation
|
|
:type resource_id: str
|
|
|
|
:return: Keycloak server response (ResourceRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"resource-id": resource_id,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
def create_client_authz_role_based_policy(self, client_id, payload, skip_exists=False):
|
|
"""Create role-based policy of client.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"type": "role",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"name": "Policy-1",
|
|
"roles": [
|
|
{
|
|
"id": id
|
|
}
|
|
]
|
|
}
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param payload: No Document
|
|
:type payload: dict
|
|
:param skip_exists: Skip creation in case the object exists
|
|
:type skip_exists: bool
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_ROLE_BASED_POLICY.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
def create_client_authz_policy(self, client_id, payload, skip_exists=False):
|
|
"""Create an authz policy of client.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"name": "Policy-time-based",
|
|
"type": "time",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"config": {
|
|
"hourEnd": "18",
|
|
"hour": "9"
|
|
}
|
|
}
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param payload: No Document
|
|
:type payload: dict
|
|
:param skip_exists: Skip creation in case the object exists
|
|
:type skip_exists: bool
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICIES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
def create_client_authz_resource_based_permission(self, client_id, payload, skip_exists=False):
|
|
"""Create resource-based permission of client.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"type": "resource",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"name": "Permission-Name",
|
|
"resources": [
|
|
resource_id
|
|
],
|
|
"policies": [
|
|
policy_id
|
|
]
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param payload: PolicyRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_policyrepresentation
|
|
:type payload: dict
|
|
:param skip_exists: Skip creation in case the object already exists
|
|
:type skip_exists: bool
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCE_BASED_PERMISSION.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
def get_client_authz_scopes(self, client_id):
|
|
"""Get scopes from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def create_client_authz_scopes(self, client_id, payload):
|
|
"""Create scopes for client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:param payload: ScopeRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_ScopeRepresentation
|
|
:type payload: dict
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SCOPES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def get_client_authz_permissions(self, client_id):
|
|
"""Get permissions from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_PERMISSIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_authz_policies(self, client_id):
|
|
"""Get policies from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICIES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def delete_client_authz_policy(self, client_id, policy_id):
|
|
"""Delete a policy from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param policy_id: id in PolicyRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_policyrepresentation
|
|
:type policy_id: str
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"policy-id": policy_id,
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICY.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_client_authz_policy(self, client_id, policy_id):
|
|
"""Get a policy from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param policy_id: id in PolicyRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_policyrepresentation
|
|
:type policy_id: str
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"policy-id": policy_id,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICY.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_service_account_user(self, client_id):
|
|
"""Get service account user from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: UserRepresentation
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SERVICE_ACCOUNT_USER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_default_client_scopes(self, client_id):
|
|
"""Get all default client scopes from client.
|
|
|
|
:param client_id: id of the client in which the new default client scope should be added
|
|
:type client_id: str
|
|
|
|
:return: list of client scopes with id and name
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_DEFAULT_CLIENT_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def add_client_default_client_scope(self, client_id, client_scope_id, payload):
|
|
"""Add a client scope to the default client scopes from client.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"realm":"testrealm",
|
|
"client":"aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa",
|
|
"clientScopeId":"bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb"
|
|
}
|
|
|
|
:param client_id: id of the client in which the new default client scope should be added
|
|
:type client_id: str
|
|
:param client_scope_id: id of the new client scope that should be added
|
|
:type client_scope_id: str
|
|
:param payload: dictionary with realm, client and clientScopeId
|
|
:type payload: dict
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client_scope_id": client_scope_id,
|
|
}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_DEFAULT_CLIENT_SCOPE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
def delete_client_default_client_scope(self, client_id, client_scope_id):
|
|
"""Delete a client scope from the default client scopes of the client.
|
|
|
|
:param client_id: id of the client in which the default client scope should be deleted
|
|
:type client_id: str
|
|
:param client_scope_id: id of the client scope that should be deleted
|
|
:type client_scope_id: str
|
|
|
|
:return: list of client scopes with id and name
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client_scope_id": client_scope_id,
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_DEFAULT_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError)
|
|
|
|
def get_client_optional_client_scopes(self, client_id):
|
|
"""Get all optional client scopes from client.
|
|
|
|
:param client_id: id of the client in which the new optional client scope should be added
|
|
:type client_id: str
|
|
|
|
:return: list of client scopes with id and name
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_OPTIONAL_CLIENT_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def add_client_optional_client_scope(self, client_id, client_scope_id, payload):
|
|
"""Add a client scope to the optional client scopes from client.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"realm":"testrealm",
|
|
"client":"aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa",
|
|
"clientScopeId":"bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb"
|
|
}
|
|
|
|
:param client_id: id of the client in which the new optional client scope should be added
|
|
:type client_id: str
|
|
:param client_scope_id: id of the new client scope that should be added
|
|
:type client_scope_id: str
|
|
:param payload: dictionary with realm, client and clientScopeId
|
|
:type payload: dict
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client_scope_id": client_scope_id,
|
|
}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_OPTIONAL_CLIENT_SCOPE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
def delete_client_optional_client_scope(self, client_id, client_scope_id):
|
|
"""Delete a client scope from the optional client scopes of the client.
|
|
|
|
:param client_id: id of the client in which the optional client scope should be deleted
|
|
:type client_id: str
|
|
:param client_scope_id: id of the client scope that should be deleted
|
|
:type client_scope_id: str
|
|
|
|
:return: list of client scopes with id and name
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client_scope_id": client_scope_id,
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_OPTIONAL_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError)
|
|
|
|
def create_initial_access_token(self, count: int = 1, expiration: int = 1):
|
|
"""Create an initial access token.
|
|
|
|
:param count: Number of clients that can be registered
|
|
:type count: int
|
|
:param expiration: Days until expireation
|
|
:type expiration: int
|
|
:return: initial access token
|
|
:rtype: str
|
|
"""
|
|
payload = {"count": count, "expiration": expiration}
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_INITIAL_ACCESS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[200])
|
|
|
|
def create_client(self, payload, skip_exists=False):
|
|
"""Create a client.
|
|
|
|
ClientRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
|
|
:param skip_exists: If true then do not raise an error if client already exists
|
|
:type skip_exists: bool
|
|
:param payload: ClientRepresentation
|
|
:type payload: dict
|
|
:return: Client ID
|
|
:rtype: str
|
|
"""
|
|
if skip_exists:
|
|
client_id = self.get_client_id(client_id=payload["clientId"])
|
|
|
|
if client_id is not None:
|
|
return client_id
|
|
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENTS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
def update_client(self, client_id, payload):
|
|
"""Update a client.
|
|
|
|
:param client_id: Client id
|
|
:type client_id: str
|
|
:param payload: ClientRepresentation
|
|
:type payload: dict
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_client(self, client_id):
|
|
"""Get representation of the client.
|
|
|
|
ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
|
|
:param client_id: keycloak client id (not oauth client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_delete(urls_patterns.URL_ADMIN_CLIENT.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_client_installation_provider(self, client_id, provider_id):
|
|
"""Get content for given installation provider.
|
|
|
|
Related documentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clients_resource
|
|
|
|
Possible provider_id list available in the ServerInfoRepresentation#clientInstallations
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_serverinforepresentation
|
|
|
|
:param client_id: Client id
|
|
:type client_id: str
|
|
:param provider_id: provider id to specify response format
|
|
:type provider_id: str
|
|
:returns: Installation providers
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"provider-id": provider_id,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_INSTALLATION_PROVIDER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
def get_realm_roles(self, brief_representation=True, search_text=""):
|
|
"""Get all roles for the realm or client.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param brief_representation: whether to omit role attributes in the response
|
|
:type brief_representation: bool
|
|
:param search_text: optional search text to limit the returned result.
|
|
:type search_text: str
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
url = urls_patterns.URL_ADMIN_REALM_ROLES
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
params = {"briefRepresentation": brief_representation}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES.format(**params_path), **params
|
|
)
|
|
|
|
# set the search_text path param, if it is a valid string
|
|
if search_text is not None and search_text.strip() != "":
|
|
params_path["search-text"] = search_text
|
|
url = urls_patterns.URL_ADMIN_REALM_ROLES_SEARCH
|
|
|
|
data_raw = self.connection.raw_get(url.format(**params_path), **params)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_realm_role_groups(self, role_name, query=None, brief_representation=True):
|
|
"""Get role groups of realm by role name.
|
|
|
|
:param role_name: Name of the role.
|
|
:type role_name: str
|
|
:param query: Additional Query parameters
|
|
(see https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_parameters_226)
|
|
:type query: dict
|
|
:param brief_representation: whether to omit role attributes in the response
|
|
:type brief_representation: bool
|
|
:return: Keycloak Server Response (GroupRepresentation)
|
|
:rtype: list
|
|
"""
|
|
query = query or {}
|
|
|
|
params = {"briefRepresentation": brief_representation}
|
|
|
|
query.update(params)
|
|
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
|
|
url = urls_patterns.URL_ADMIN_REALM_ROLES_GROUPS.format(**params_path)
|
|
|
|
if "first" in query or "max" in query:
|
|
return self.__fetch_paginated(url, query)
|
|
|
|
return self.__fetch_all(url, query)
|
|
|
|
def get_realm_role_members(self, role_name, query=None):
|
|
"""Get role members of realm by role name.
|
|
|
|
:param role_name: Name of the role.
|
|
:type role_name: str
|
|
:param query: Additional Query parameters
|
|
(see https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_roles_resource)
|
|
:type query: dict
|
|
:return: Keycloak Server Response (UserRepresentation)
|
|
:rtype: list
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
return self.__fetch_all(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_MEMBERS.format(**params_path), query
|
|
)
|
|
|
|
def get_default_realm_role_id(self):
|
|
"""Get the ID of the default realm role.
|
|
|
|
:return: Realm role ID
|
|
:rtype: str
|
|
"""
|
|
all_realm_roles = self.get_realm_roles()
|
|
default_realm_roles = [
|
|
realm_role
|
|
for realm_role in all_realm_roles
|
|
if realm_role["name"] == f"default-roles-{self.connection.realm_name}".lower()
|
|
]
|
|
return default_realm_roles[0]["id"]
|
|
|
|
def get_realm_default_roles(self):
|
|
"""Get all the default realm roles.
|
|
|
|
:return: Keycloak Server Response (UserRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"role-id": self.get_default_realm_role_id(),
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLE_COMPOSITES_REALM.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def remove_realm_default_roles(self, payload):
|
|
"""Remove a set of default realm roles.
|
|
|
|
:param payload: List of RoleRepresentations
|
|
:type payload: list
|
|
:return: Keycloak Server Response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"role-id": self.get_default_realm_role_id(),
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_REALM_ROLE_COMPOSITES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError)
|
|
|
|
def add_realm_default_roles(self, payload):
|
|
"""Add a set of default realm roles.
|
|
|
|
:param payload: List of RoleRepresentations
|
|
:type payload: list
|
|
:return: Keycloak Server Response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"role-id": self.get_default_realm_role_id(),
|
|
}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_REALM_ROLE_COMPOSITES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError)
|
|
|
|
def get_client_roles(self, client_id, brief_representation=True):
|
|
"""Get all roles for the client.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param brief_representation: whether to omit role attributes in the response
|
|
:type brief_representation: bool
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
params = {"briefRepresentation": brief_representation}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLES.format(**params_path), **params
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_role(self, client_id, role_name):
|
|
"""Get client role id by name.
|
|
|
|
This is required for further actions with this role.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param role_name: role's name (not id!)
|
|
:type role_name: str
|
|
:return: role_id
|
|
:rtype: str
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"role-name": role_name,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_role_id(self, client_id, role_name):
|
|
"""Get client role id by name.
|
|
|
|
This is required for further actions with this role.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param role_name: role's name (not id!)
|
|
:type role_name: str
|
|
:return: role_id
|
|
:rtype: str
|
|
"""
|
|
role = self.get_client_role(client_id, role_name)
|
|
return role.get("id")
|
|
|
|
def create_client_role(self, client_role_id, payload, skip_exists=False):
|
|
"""Create a client role.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_role_id: id of client (not client-id)
|
|
:type client_role_id: str
|
|
:param payload: RoleRepresentation
|
|
:type payload: dict
|
|
:param skip_exists: If true then do not raise an error if client role already exists
|
|
:type skip_exists: bool
|
|
:return: Client role name
|
|
:rtype: str
|
|
"""
|
|
if skip_exists:
|
|
try:
|
|
res = self.get_client_role(client_id=client_role_id, role_name=payload["name"])
|
|
return res["name"]
|
|
except KeycloakGetError:
|
|
pass
|
|
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_role_id}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLES.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
def add_composite_client_roles_to_role(self, client_role_id, role_name, roles):
|
|
"""Add composite roles to client role.
|
|
|
|
:param client_role_id: id of client (not client-id)
|
|
:type client_role_id: str
|
|
:param role_name: The name of the role
|
|
:type role_name: str
|
|
:param roles: roles list or role (use RoleRepresentation) to be updated
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_role_id,
|
|
"role-name": role_name,
|
|
}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLES_COMPOSITE_CLIENT_ROLE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def remove_composite_client_roles_from_role(self, client_role_id, role_name, roles):
|
|
"""Remove composite roles from a client role.
|
|
|
|
:param client_role_id: id of client (not client-id)
|
|
:type client_role_id: str
|
|
:param role_name: The name of the role
|
|
:type role_name: str
|
|
:param roles: roles list or role (use RoleRepresentation) to be removed
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_role_id,
|
|
"role-name": role_name,
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLES_COMPOSITE_CLIENT_ROLE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def update_client_role(self, client_id, role_name, payload):
|
|
"""Update a client role.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param role_name: role's name (not id!)
|
|
:type role_name: str
|
|
:param payload: RoleRepresentation
|
|
:type payload: dict
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"role-name": role_name,
|
|
}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_client_role(self, client_role_id, role_name):
|
|
"""Delete a client role.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_role_id: id of client (not client-id)
|
|
:type client_role_id: str
|
|
:param role_name: role's name (not id!)
|
|
:type role_name: str
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_role_id,
|
|
"role-name": role_name,
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def assign_client_role(self, user_id, client_id, roles):
|
|
"""Assign a client role to a user.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def get_client_role_members(self, client_id, role_name, **query):
|
|
"""Get members by client role.
|
|
|
|
:param client_id: The client id
|
|
:type client_id: str
|
|
:param role_name: the name of role to be queried.
|
|
:type role_name: str
|
|
:param query: Additional query parameters
|
|
(see https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clients_resource)
|
|
:type query: dict
|
|
:return: Keycloak server response (UserRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"role-name": role_name,
|
|
}
|
|
return self.__fetch_all(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE_MEMBERS.format(**params_path), query
|
|
)
|
|
|
|
def get_client_role_groups(self, client_id, role_name, **query):
|
|
"""Get group members by client role.
|
|
|
|
:param client_id: The client id
|
|
:type client_id: str
|
|
:param role_name: the name of role to be queried.
|
|
:type role_name: str
|
|
:param query: Additional query parameters
|
|
(see https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clients_resource)
|
|
:type query: dict
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"role-name": role_name,
|
|
}
|
|
return self.__fetch_all(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE_GROUPS.format(**params_path), query
|
|
)
|
|
|
|
def get_role_by_id(self, role_id):
|
|
"""Get a specific role’s representation.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param role_id: id of role
|
|
:type role_id: str
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-id": role_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_ID.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
def update_role_by_id(self, role_id, payload):
|
|
"""Update the role.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param payload: RoleRepresentation
|
|
:type payload: dict
|
|
:param role_id: id of role
|
|
:type role_id: str
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-id": role_id}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_ID.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_role_by_id(self, role_id):
|
|
"""Delete a role by its id.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param role_id: id of role
|
|
:type role_id: str
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-id": role_id}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_ID.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def create_realm_role(self, payload, skip_exists=False):
|
|
"""Create a new role for the realm or client.
|
|
|
|
:param payload: The role (use RoleRepresentation)
|
|
:type payload: dict
|
|
:param skip_exists: If true then do not raise an error if realm role already exists
|
|
:type skip_exists: bool
|
|
:return: Realm role name
|
|
:rtype: str
|
|
"""
|
|
if skip_exists:
|
|
try:
|
|
role = self.get_realm_role(role_name=payload["name"])
|
|
return role["name"]
|
|
except KeycloakGetError:
|
|
pass
|
|
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
def get_realm_role(self, role_name):
|
|
"""Get realm role by role name.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param role_name: role's name, not id!
|
|
:type role_name: str
|
|
:return: role
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_NAME.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_realm_role_by_id(self, role_id: str):
|
|
"""Get realm role by role id.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param role_id: role's id, not name!
|
|
:type role_id: str
|
|
:return: role
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-id": role_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_ID.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def update_realm_role(self, role_name, payload):
|
|
"""Update a role for the realm by name.
|
|
|
|
:param role_name: The name of the role to be updated
|
|
:type role_name: str
|
|
:param payload: The role (use RoleRepresentation)
|
|
:type payload: dict
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_NAME.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_realm_role(self, role_name):
|
|
"""Delete a role for the realm by name.
|
|
|
|
:param role_name: The role name
|
|
:type role_name: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_NAME.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def add_composite_realm_roles_to_role(self, role_name, roles):
|
|
"""Add composite roles to the role.
|
|
|
|
:param role_name: The name of the role
|
|
:type role_name: str
|
|
:param roles: roles list or role (use RoleRepresentation) to be updated
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_COMPOSITE_REALM_ROLE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def remove_composite_realm_roles_to_role(self, role_name, roles):
|
|
"""Remove composite roles from the role.
|
|
|
|
:param role_name: The name of the role
|
|
:type role_name: str
|
|
:param roles: roles list or role (use RoleRepresentation) to be removed
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_COMPOSITE_REALM_ROLE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_composite_realm_roles_of_role(self, role_name):
|
|
"""Get composite roles of the role.
|
|
|
|
:param role_name: The name of the role
|
|
:type role_name: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_COMPOSITE_REALM_ROLE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def assign_realm_roles_to_client_scope(self, client_id, roles):
|
|
"""Assign realm roles to a client's scope.
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_MAPPINGS_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def delete_realm_roles_of_client_scope(self, client_id, roles):
|
|
"""Delete realm roles of a client's scope.
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_MAPPINGS_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_realm_roles_of_client_scope(self, client_id):
|
|
"""Get all realm roles for a client's scope.
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_MAPPINGS_REALM_ROLES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def assign_client_roles_to_client_scope(self, client_id, client_roles_owner_id, roles):
|
|
"""Assign client roles to a client's dedicated scope.
|
|
|
|
To assign roles to a client scope, use add_client_specific_roles_to_client_scope.
|
|
|
|
:param client_id: id of client (not client-id) who is assigned the roles
|
|
:type client_id: str
|
|
:param client_roles_owner_id: id of client (not client-id) who has the roles
|
|
:type client_roles_owner_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client": client_roles_owner_id,
|
|
}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_MAPPINGS_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def delete_client_roles_of_client_scope(self, client_id, client_roles_owner_id, roles):
|
|
"""Delete client roles of a client's dedicated scope.
|
|
|
|
To delete roles from a client scope, use remove_client_specific_roles_of_client_scope.
|
|
|
|
:param client_id: id of client (not client-id) who is assigned the roles
|
|
:type client_id: str
|
|
:param client_roles_owner_id: id of client (not client-id) who has the roles
|
|
:type client_roles_owner_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client": client_roles_owner_id,
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_MAPPINGS_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_client_roles_of_client_scope(self, client_id, client_roles_owner_id):
|
|
"""Get all client roles for a client's dedicated scope.
|
|
|
|
To get roles for a client scope, use get_client_specific_roles_of_client_scope.
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param client_roles_owner_id: id of client (not client-id) who has the roles
|
|
:type client_roles_owner_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client": client_roles_owner_id,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_MAPPINGS_CLIENT_ROLES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def assign_realm_roles(self, user_id, roles):
|
|
"""Assign realm roles to a user.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def delete_realm_roles_of_user(self, user_id, roles):
|
|
"""Delete realm roles of a user.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_realm_roles_of_user(self, user_id):
|
|
"""Get all realm roles for a user.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_available_realm_roles_of_user(self, user_id):
|
|
"""Get all available (i.e. unassigned) realm roles for a user.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES_AVAILABLE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_composite_realm_roles_of_user(self, user_id, brief_representation=True):
|
|
"""Get all composite (i.e. implicit) realm roles for a user.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param brief_representation: whether to omit role attributes in the response
|
|
:type brief_representation: bool
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
params = {"briefRepresentation": brief_representation}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES_COMPOSITE.format(**params_path), **params
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def assign_group_realm_roles(self, group_id, roles):
|
|
"""Assign realm roles to a group.
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param roles: roles list or role (use GroupRoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_GROUPS_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def delete_group_realm_roles(self, group_id, roles):
|
|
"""Delete realm roles of a group.
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param roles: roles list or role (use GroupRoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_GROUPS_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_group_realm_roles(self, group_id, brief_representation=True):
|
|
"""Get all realm roles for a group.
|
|
|
|
:param group_id: id of the group
|
|
:type group_id: str
|
|
:param brief_representation: whether to omit role attributes in the response
|
|
:type brief_representation: bool
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
params = {"briefRepresentation": brief_representation}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_GROUPS_REALM_ROLES.format(**params_path), **params
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def assign_group_client_roles(self, group_id, client_id, roles):
|
|
"""Assign client roles to a group.
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param roles: roles list or role (use GroupRoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": group_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_GROUPS_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def get_group_client_roles(self, group_id, client_id):
|
|
"""Get client roles of a group.
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": group_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_GROUPS_CLIENT_ROLES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def delete_group_client_roles(self, group_id, client_id, roles):
|
|
"""Delete client roles of a group.
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param roles: roles list or role (use GroupRoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": group_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_GROUPS_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_all_roles_of_user(self, user_id):
|
|
"""Get all level roles for a user.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_USER_ALL_ROLES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_roles_of_user(self, user_id, client_id):
|
|
"""Get all client roles for a user.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
return self._get_client_roles_of_user(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES, user_id, client_id
|
|
)
|
|
|
|
def get_available_client_roles_of_user(self, user_id, client_id):
|
|
"""Get available client role-mappings for a user.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
return self._get_client_roles_of_user(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES_AVAILABLE, user_id, client_id
|
|
)
|
|
|
|
def get_composite_client_roles_of_user(self, user_id, client_id, brief_representation=False):
|
|
"""Get composite client role-mappings for a user.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param brief_representation: whether to omit attributes in the response
|
|
:type brief_representation: bool
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params = {"briefRepresentation": brief_representation}
|
|
return self._get_client_roles_of_user(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES_COMPOSITE, user_id, client_id, **params
|
|
)
|
|
|
|
def _get_client_roles_of_user(
|
|
self, client_level_role_mapping_url, user_id, client_id, **params
|
|
):
|
|
"""Get client roles of a single user helper.
|
|
|
|
:param client_level_role_mapping_url: Url for the client role mapping
|
|
:type client_level_role_mapping_url: str
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param client_id: Client id
|
|
:type client_id: str
|
|
:param params: Additional parameters
|
|
:type params: dict
|
|
:returns: Client roles of a user
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
client_level_role_mapping_url.format(**params_path), **params
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def delete_client_roles_of_user(self, user_id, client_id, roles):
|
|
"""Delete client roles from a user.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param client_id: id of client containing role (not client-id)
|
|
:type client_id: str
|
|
:param roles: roles list or role to delete (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_authentication_flows(self):
|
|
"""Get authentication flows.
|
|
|
|
Returns all flow details
|
|
|
|
AuthenticationFlowRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationflowrepresentation
|
|
|
|
:return: Keycloak server response (AuthenticationFlowRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(urls_patterns.URL_ADMIN_FLOWS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_authentication_flow_for_id(self, flow_id):
|
|
"""Get one authentication flow by it's id.
|
|
|
|
Returns all flow details
|
|
|
|
AuthenticationFlowRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationflowrepresentation
|
|
|
|
:param flow_id: the id of a flow NOT it's alias
|
|
:type flow_id: str
|
|
:return: Keycloak server response (AuthenticationFlowRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "flow-id": flow_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_FLOWS_ALIAS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def create_authentication_flow(self, payload, skip_exists=False):
|
|
"""Create a new authentication flow.
|
|
|
|
AuthenticationFlowRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationflowrepresentation
|
|
|
|
:param payload: AuthenticationFlowRepresentation
|
|
:type payload: dict
|
|
:param skip_exists: Do not raise an error if authentication flow already exists
|
|
:type skip_exists: bool
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_FLOWS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
def copy_authentication_flow(self, payload, flow_alias):
|
|
"""Copy existing authentication flow under a new name.
|
|
|
|
The new name is given as 'newName' attribute of the passed payload.
|
|
|
|
:param payload: JSON containing 'newName' attribute
|
|
:type payload: dict
|
|
:param flow_alias: the flow alias
|
|
:type flow_alias: str
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "flow-alias": flow_alias}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_FLOWS_COPY.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def delete_authentication_flow(self, flow_id):
|
|
"""Delete authentication flow.
|
|
|
|
AuthenticationInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationinforepresentation
|
|
|
|
:param flow_id: authentication flow id
|
|
:type flow_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": flow_id}
|
|
data_raw = self.connection.raw_delete(urls_patterns.URL_ADMIN_FLOW.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_authentication_flow_executions(self, flow_alias):
|
|
"""Get authentication flow executions.
|
|
|
|
Returns all execution steps
|
|
|
|
:param flow_alias: the flow alias
|
|
:type flow_alias: str
|
|
:return: Response(json)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "flow-alias": flow_alias}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def update_authentication_flow_executions(self, payload, flow_alias):
|
|
"""Update an authentication flow execution.
|
|
|
|
AuthenticationExecutionInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationexecutioninforepresentation
|
|
|
|
:param payload: AuthenticationExecutionInfoRepresentation
|
|
:type payload: dict
|
|
:param flow_alias: The flow alias
|
|
:type flow_alias: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "flow-alias": flow_alias}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTIONS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[202, 204])
|
|
|
|
def get_authentication_flow_execution(self, execution_id):
|
|
"""Get authentication flow execution.
|
|
|
|
AuthenticationExecutionInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationexecutioninforepresentation
|
|
|
|
:param execution_id: the execution ID
|
|
:type execution_id: str
|
|
:return: Response(json)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": execution_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTION.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def create_authentication_flow_execution(self, payload, flow_alias):
|
|
"""Create an authentication flow execution.
|
|
|
|
AuthenticationExecutionInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationexecutioninforepresentation
|
|
|
|
:param payload: AuthenticationExecutionInfoRepresentation
|
|
:type payload: dict
|
|
:param flow_alias: The flow alias
|
|
:type flow_alias: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "flow-alias": flow_alias}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTIONS_EXECUTION.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def delete_authentication_flow_execution(self, execution_id):
|
|
"""Delete authentication flow execution.
|
|
|
|
AuthenticationExecutionInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationexecutioninforepresentation
|
|
|
|
:param execution_id: keycloak client id (not oauth client-id)
|
|
:type execution_id: str
|
|
:return: Keycloak server response (json)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": execution_id}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTION.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def create_authentication_flow_subflow(self, payload, flow_alias, skip_exists=False):
|
|
"""Create a new sub authentication flow for a given authentication flow.
|
|
|
|
AuthenticationFlowRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationflowrepresentation
|
|
|
|
:param payload: AuthenticationFlowRepresentation
|
|
:type payload: dict
|
|
:param flow_alias: The flow alias
|
|
:type flow_alias: str
|
|
:param skip_exists: Do not raise an error if authentication flow already exists
|
|
:type skip_exists: bool
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "flow-alias": flow_alias}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTIONS_FLOW.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
def get_authenticator_providers(self):
|
|
"""Get authenticator providers list.
|
|
|
|
:return: Authenticator providers
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_PROVIDERS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_authenticator_provider_config_description(self, provider_id):
|
|
"""Get authenticator's provider configuration description.
|
|
|
|
AuthenticatorConfigInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticatorconfiginforepresentation
|
|
|
|
:param provider_id: Provider Id
|
|
:type provider_id: str
|
|
:return: AuthenticatorConfigInfoRepresentation
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "provider-id": provider_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_CONFIG_DESCRIPTION.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_authenticator_config(self, config_id):
|
|
"""Get authenticator configuration.
|
|
|
|
Returns all configuration details.
|
|
|
|
:param config_id: Authenticator config id
|
|
:type config_id: str
|
|
:return: Response(json)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": config_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_CONFIG.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def update_authenticator_config(self, payload, config_id):
|
|
"""Update an authenticator configuration.
|
|
|
|
AuthenticatorConfigRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticatorconfigrepresentation
|
|
|
|
:param payload: AuthenticatorConfigRepresentation
|
|
:type payload: dict
|
|
:param config_id: Authenticator config id
|
|
:type config_id: str
|
|
:return: Response(json)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": config_id}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_CONFIG.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_authenticator_config(self, config_id):
|
|
"""Delete a authenticator configuration.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authentication_management_resource
|
|
|
|
:param config_id: Authenticator config id
|
|
:type config_id: str
|
|
:return: Keycloak server Response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": config_id}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_CONFIG.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def sync_users(self, storage_id, action):
|
|
"""Trigger user sync from provider.
|
|
|
|
:param storage_id: The id of the user storage provider
|
|
:type storage_id: str
|
|
:param action: Action can be "triggerFullSync" or "triggerChangedUsersSync"
|
|
:type action: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
data = {"action": action}
|
|
params_query = {"action": action}
|
|
|
|
params_path = {"realm-name": self.connection.realm_name, "id": storage_id}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_USER_STORAGE.format(**params_path),
|
|
data=json.dumps(data),
|
|
**params_query,
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError)
|
|
|
|
def get_client_scopes(self):
|
|
"""Get client scopes.
|
|
|
|
Get representation of the client scopes for the realm where we are connected to
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getclientscopes
|
|
|
|
:return: Keycloak server response Array of (ClientScopeRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_scope(self, client_scope_id):
|
|
"""Get client scope.
|
|
|
|
Get representation of the client scopes for the realm where we are connected to
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getclientscopes
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:type client_scope_id: str
|
|
:return: Keycloak server response (ClientScopeRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "scope-id": client_scope_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_scope_by_name(self, client_scope_name):
|
|
"""Get client scope by name.
|
|
|
|
Get representation of the client scope identified by the client scope name.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getclientscopes
|
|
:param client_scope_name: (str) Name of the client scope
|
|
:type client_scope_name: str
|
|
:returns: ClientScopeRepresentation or None
|
|
:rtype: dict
|
|
"""
|
|
client_scopes = self.get_client_scopes()
|
|
for client_scope in client_scopes:
|
|
if client_scope["name"] == client_scope_name:
|
|
return client_scope
|
|
|
|
return None
|
|
|
|
def create_client_scope(self, payload, skip_exists=False):
|
|
"""Create a client scope.
|
|
|
|
ClientScopeRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getclientscopes
|
|
|
|
:param payload: ClientScopeRepresentation
|
|
:type payload: dict
|
|
:param skip_exists: If true then do not raise an error if client scope already exists
|
|
:type skip_exists: bool
|
|
:return: Client scope id
|
|
:rtype: str
|
|
"""
|
|
if skip_exists:
|
|
exists = self.get_client_scope_by_name(client_scope_name=payload["name"])
|
|
|
|
if exists is not None:
|
|
return exists["id"]
|
|
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
def update_client_scope(self, client_scope_id, payload):
|
|
"""Update a client scope.
|
|
|
|
ClientScopeRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_client_scopes_resource
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:type client_scope_id: str
|
|
:param payload: ClientScopeRepresentation
|
|
:type payload: dict
|
|
:return: Keycloak server response (ClientScopeRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "scope-id": client_scope_id}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_client_scope(self, client_scope_id):
|
|
"""Delete existing client scope.
|
|
|
|
ClientScopeRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_client_scopes_resource
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:type client_scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "scope-id": client_scope_id}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_mappers_from_client_scope(self, client_scope_id):
|
|
"""Get a list of all mappers connected to the client scope.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_protocol_mappers_resource
|
|
:param client_scope_id: Client scope id
|
|
:type client_scope_id: str
|
|
:returns: Keycloak server response (ProtocolMapperRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "scope-id": client_scope_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES_ADD_MAPPER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
def add_mapper_to_client_scope(self, client_scope_id, payload):
|
|
"""Add a mapper to a client scope.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_create_mapper
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:type client_scope_id: str
|
|
:param payload: ProtocolMapperRepresentation
|
|
:type payload: dict
|
|
:return: Keycloak server Response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "scope-id": client_scope_id}
|
|
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES_ADD_MAPPER.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def delete_mapper_from_client_scope(self, client_scope_id, protocol_mapper_id):
|
|
"""Delete a mapper from a client scope.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_delete_mapper
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:type client_scope_id: str
|
|
:param protocol_mapper_id: Protocol mapper id
|
|
:type protocol_mapper_id: str
|
|
:return: Keycloak server Response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"scope-id": client_scope_id,
|
|
"protocol-mapper-id": protocol_mapper_id,
|
|
}
|
|
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES_MAPPERS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def update_mapper_in_client_scope(self, client_scope_id, protocol_mapper_id, payload):
|
|
"""Update an existing protocol mapper in a client scope.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_protocol_mappers_resource
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:type client_scope_id: str
|
|
:param protocol_mapper_id: The id of the protocol mapper which exists in the client scope
|
|
and should to be updated
|
|
:type protocol_mapper_id: str
|
|
:param payload: ProtocolMapperRepresentation
|
|
:type payload: dict
|
|
:return: Keycloak server Response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"scope-id": client_scope_id,
|
|
"protocol-mapper-id": protocol_mapper_id,
|
|
}
|
|
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES_MAPPERS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def get_default_default_client_scopes(self):
|
|
"""Get default default client scopes.
|
|
|
|
Return list of default default client scopes
|
|
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_DEFAULT_DEFAULT_CLIENT_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def delete_default_default_client_scope(self, scope_id):
|
|
"""Delete default default client scope.
|
|
|
|
:param scope_id: default default client scope id
|
|
:type scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": scope_id}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_DEFAULT_DEFAULT_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def add_default_default_client_scope(self, scope_id):
|
|
"""Add default default client scope.
|
|
|
|
:param scope_id: default default client scope id
|
|
:type scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": scope_id}
|
|
payload = {"realm": self.connection.realm_name, "clientScopeId": scope_id}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_DEFAULT_DEFAULT_CLIENT_SCOPE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def get_default_optional_client_scopes(self):
|
|
"""Get default optional client scopes.
|
|
|
|
Return list of default optional client scopes
|
|
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_DEFAULT_OPTIONAL_CLIENT_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def delete_default_optional_client_scope(self, scope_id):
|
|
"""Delete default optional client scope.
|
|
|
|
:param scope_id: default optional client scope id
|
|
:type scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": scope_id}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_DEFAULT_OPTIONAL_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def add_default_optional_client_scope(self, scope_id):
|
|
"""Add default optional client scope.
|
|
|
|
:param scope_id: default optional client scope id
|
|
:type scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": scope_id}
|
|
payload = {"realm": self.connection.realm_name, "clientScopeId": scope_id}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_DEFAULT_OPTIONAL_CLIENT_SCOPE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def add_client_specific_roles_to_client_scope(
|
|
self, client_scope_id, client_roles_owner_id, roles
|
|
):
|
|
"""Assign client roles to a client scope.
|
|
|
|
To assign roles to a client's dedicated scope, use assign_client_roles_to_client_scope.
|
|
|
|
:param client_scope_id: client scope id
|
|
:type client_scope_id: str
|
|
:param client_roles_owner_id: id of client (not client-id) who has the roles
|
|
:type client_roles_owner_id: str
|
|
:param roles: roles list or role (use RoleRepresentation, must include id and name)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"scope-id": client_scope_id,
|
|
"client-id": client_roles_owner_id,
|
|
}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_ROLE_MAPPINGS_CLIENT.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def remove_client_specific_roles_of_client_scope(
|
|
self, client_scope_id, client_roles_owner_id, roles
|
|
):
|
|
"""Delete client roles of a client scope.
|
|
|
|
To delete roles from a client's dedicated scope, use delete_client_roles_of_client_scope.
|
|
|
|
:param client_scope_id: client scope id
|
|
:type client_scope_id: str
|
|
:param client_roles_owner_id: id of client (not client-id) who has the roles
|
|
:type client_roles_owner_id: str
|
|
:param roles: roles list or role (use RoleRepresentation, must include id and name)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"scope-id": client_scope_id,
|
|
"client-id": client_roles_owner_id,
|
|
}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_ROLE_MAPPINGS_CLIENT.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_client_specific_roles_of_client_scope(self, client_scope_id, client_roles_owner_id):
|
|
"""Get client roles for a client scope, for a specific client.
|
|
|
|
To get roles for a client's dedicated scope, use get_client_roles_of_client_scope.
|
|
|
|
:param client_scope_id: client scope id
|
|
:type client_scope_id: str
|
|
:param client_roles_owner_id: id of client (not client-id) who has the roles
|
|
:type client_roles_owner_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"scope-id": client_scope_id,
|
|
"client-id": client_roles_owner_id,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_ROLE_MAPPINGS_CLIENT.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_all_roles_of_client_scope(self, client_scope_id):
|
|
"""Get all client roles for a client scope.
|
|
|
|
To get roles for a client's dedicated scope,
|
|
use get_client_roles_of_client_scope.
|
|
|
|
:param client_scope_id: client scope id
|
|
:type client_scope_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"scope-id": client_scope_id,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_ROLE_MAPPINGS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_mappers_from_client(self, client_id):
|
|
"""List of all client mappers.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_protocolmapperrepresentation
|
|
|
|
:param client_id: Client id
|
|
:type client_id: str
|
|
:returns: KeycloakServerResponse (list of ProtocolMapperRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_PROTOCOL_MAPPERS.format(**params_path)
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[200])
|
|
|
|
def add_mapper_to_client(self, client_id, payload):
|
|
"""Add a mapper to a client.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_create_mapper
|
|
|
|
:param client_id: The id of the client
|
|
:type client_id: str
|
|
:param payload: ProtocolMapperRepresentation
|
|
:type payload: dict
|
|
:return: Keycloak server Response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_PROTOCOL_MAPPERS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def update_client_mapper(self, client_id, mapper_id, payload):
|
|
"""Update client mapper.
|
|
|
|
:param client_id: The id of the client
|
|
:type client_id: str
|
|
:param mapper_id: The id of the mapper to be deleted
|
|
:type mapper_id: str
|
|
:param payload: ProtocolMapperRepresentation
|
|
:type payload: dict
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"protocol-mapper-id": mapper_id,
|
|
}
|
|
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_PROTOCOL_MAPPER.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def remove_client_mapper(self, client_id, client_mapper_id):
|
|
"""Remove a mapper from the client.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_protocol_mappers_resource
|
|
|
|
:param client_id: The id of the client
|
|
:type client_id: str
|
|
:param client_mapper_id: The id of the mapper to be deleted
|
|
:type client_mapper_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"protocol-mapper-id": client_mapper_id,
|
|
}
|
|
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_PROTOCOL_MAPPER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def generate_client_secrets(self, client_id):
|
|
"""Generate a new secret for the client.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_regeneratesecret
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SECRETS.format(**params_path), data=None
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError)
|
|
|
|
def get_client_secrets(self, client_id):
|
|
"""Get representation of the client secrets.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getclientsecret
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SECRETS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_components(self, query=None):
|
|
"""Get components.
|
|
|
|
Return a list of components, filtered according to query parameters
|
|
|
|
ComponentRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_componentrepresentation
|
|
|
|
:param query: Query parameters (optional)
|
|
:type query: dict
|
|
:return: components list
|
|
:rtype: list
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_COMPONENTS.format(**params_path), data=None, **query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def create_component(self, payload):
|
|
"""Create a new component.
|
|
|
|
ComponentRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_componentrepresentation
|
|
|
|
:param payload: ComponentRepresentation
|
|
:type payload: dict
|
|
:return: Component id
|
|
:rtype: str
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_COMPONENTS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
def get_component(self, component_id):
|
|
"""Get representation of the component.
|
|
|
|
:param component_id: Component id
|
|
|
|
ComponentRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_componentrepresentation
|
|
|
|
:param component_id: Id of the component
|
|
:type component_id: str
|
|
:return: ComponentRepresentation
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "component-id": component_id}
|
|
data_raw = self.connection.raw_get(urls_patterns.URL_ADMIN_COMPONENT.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def update_component(self, component_id, payload):
|
|
"""Update the component.
|
|
|
|
:param component_id: Component id
|
|
:type component_id: str
|
|
:param payload: ComponentRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_componentrepresentation
|
|
:type payload: dict
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "component-id": component_id}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_COMPONENT.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_component(self, component_id):
|
|
"""Delete the component.
|
|
|
|
:param component_id: Component id
|
|
:type component_id: str
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "component-id": component_id}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_COMPONENT.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_keys(self):
|
|
"""Get keys.
|
|
|
|
Return a list of keys, filtered according to query parameters
|
|
|
|
KeysMetadataRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_key_resource
|
|
|
|
:return: keys list
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_KEYS.format(**params_path), data=None
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_admin_events(self, query=None):
|
|
"""Get Administrative events.
|
|
|
|
Return a list of events, filtered according to query parameters
|
|
|
|
AdminEvents Representation array
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getevents
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_get_adminrealmsrealmadmin_events
|
|
|
|
:param query: Additional query parameters
|
|
:type query: dict
|
|
:return: events list
|
|
:rtype: list
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_ADMIN_EVENTS.format(**params_path), data=None, **query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_events(self, query=None):
|
|
"""Get events.
|
|
|
|
Return a list of events, filtered according to query parameters
|
|
|
|
EventRepresentation array
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_eventrepresentation
|
|
|
|
:param query: Additional query parameters
|
|
:type query: dict
|
|
:return: events list
|
|
:rtype: list
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_USER_EVENTS.format(**params_path), data=None, **query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def set_events(self, payload):
|
|
"""Set realm events configuration.
|
|
|
|
RealmEventsConfigRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_realmeventsconfigrepresentation
|
|
|
|
:param payload: Payload object for the events configuration
|
|
:type payload: dict
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_EVENTS_CONFIG.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def get_client_all_sessions(self, client_id):
|
|
"""Get sessions associated with the client.
|
|
|
|
UserSessionRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_usersessionrepresentation
|
|
|
|
:param client_id: id of client
|
|
:type client_id: str
|
|
:return: UserSessionRepresentation
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_ALL_SESSIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_sessions_stats(self):
|
|
"""Get current session count for all clients with active sessions.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getclientsessionstats
|
|
|
|
:return: Dict of clients and session count
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SESSION_STATS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_management_permissions(self, client_id):
|
|
"""Get management permissions for a client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_MANAGEMENT_PERMISSIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def update_client_management_permissions(self, payload, client_id):
|
|
"""Update management permissions for a client.
|
|
|
|
ManagementPermissionReference
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_managementpermissionreference
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"enabled": true
|
|
}
|
|
|
|
:param payload: ManagementPermissionReference
|
|
:type payload: dict
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_MANAGEMENT_PERMISSIONS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[200])
|
|
|
|
def get_client_authz_policy_scopes(self, client_id, policy_id):
|
|
"""Get scopes for a given policy.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param policy_id: No Document
|
|
:type policy_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"policy-id": policy_id,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICY_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_authz_policy_resources(self, client_id, policy_id):
|
|
"""Get resources for a given policy.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param policy_id: No Document
|
|
:type policy_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"policy-id": policy_id,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICY_RESOURCES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_authz_scope_permission(self, client_id, scope_id):
|
|
"""Get permissions for a given scope.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param scope_id: No Document
|
|
:type scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"scope-id": scope_id,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SCOPE_PERMISSION.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def create_client_authz_scope_permission(self, payload, client_id):
|
|
"""Create permissions for a authz scope.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"name": "My Permission Name",
|
|
"type": "scope",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"resources": [some_resource_id],
|
|
"scopes": [some_scope_id],
|
|
"policies": [some_policy_id],
|
|
}
|
|
|
|
:param payload: No Document
|
|
:type payload: dict
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_ADD_CLIENT_AUTHZ_SCOPE_PERMISSION.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def update_client_authz_scope_permission(self, payload, client_id, scope_id):
|
|
"""Update permissions for a given scope.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"id": scope_id,
|
|
"name": "My Permission Name",
|
|
"type": "scope",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"resources": [some_resource_id],
|
|
"scopes": [some_scope_id],
|
|
"policies": [some_policy_id],
|
|
}
|
|
|
|
:param payload: No Document
|
|
:type payload: dict
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param scope_id: No Document
|
|
:type scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"scope-id": scope_id,
|
|
}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SCOPE_PERMISSION.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[201])
|
|
|
|
def update_client_authz_resource_permission(self, payload, client_id, resource_id):
|
|
"""Update permissions for a given resource.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"id": resource_id,
|
|
"name": "My Permission Name",
|
|
"type": "resource",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"resources": [some_resource_id],
|
|
"scopes": [],
|
|
"policies": [some_policy_id],
|
|
}
|
|
|
|
:param payload: No Document
|
|
:type payload: dict
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param resource_id: No Document
|
|
:type resource_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"resource-id": resource_id,
|
|
}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCE_PERMISSION.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[201])
|
|
|
|
def get_client_authz_client_policies(self, client_id):
|
|
"""Get policies for a given client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_CLIENT_POLICY.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
def get_client_authz_permission_associated_policies(self, client_id, policy_id):
|
|
"""Get associated policies for a given client permission.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param policy_id: id in PolicyRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_policyrepresentation
|
|
:type policy_id: str
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"policy-id": policy_id,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_CLIENT_POLICY_ASSOCIATED_POLICIES.format(
|
|
**params_path
|
|
)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
def create_client_authz_client_policy(self, payload, client_id):
|
|
"""Create a new policy for a given client.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"type": "client",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"name": "My Policy",
|
|
"clients": [other_client_id],
|
|
}
|
|
|
|
:param payload: No Document
|
|
:type payload: dict
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_CLIENT_POLICY.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def get_composite_client_roles_of_group(self, client_id, group_id, brief_representation=True):
|
|
"""Get the composite client roles of the given group for the given client.
|
|
|
|
:param client_id: id of the client.
|
|
:type client_id: str
|
|
:param group_id: id of the group.
|
|
:type group_id: str
|
|
:param brief_representation: whether to omit attributes in the response
|
|
:type brief_representation: bool
|
|
:return: the composite client roles of the group (list of RoleRepresentation).
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": group_id,
|
|
"client-id": client_id,
|
|
}
|
|
params = {"briefRepresentation": brief_representation}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_GROUPS_CLIENT_ROLES_COMPOSITE.format(**params_path), **params
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_role_client_level_children(self, client_id, role_id):
|
|
"""Get the child roles of which the given composite client role is composed of.
|
|
|
|
:param client_id: id of the client.
|
|
:type client_id: str
|
|
:param role_id: id of the role.
|
|
:type role_id: str
|
|
:return: the child roles (list of RoleRepresentation).
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"role-id": role_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE_CHILDREN.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def upload_certificate(self, client_id, certcont):
|
|
"""Upload a new certificate for the client.
|
|
|
|
:param client_id: id of the client.
|
|
:type client_id: str
|
|
:param certcont: the content of the certificate.
|
|
:type certcont: str
|
|
:return: dictionary {"certificate": "<certcont>"},
|
|
where <certcont> is the content of the uploaded certificate.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"attr": "jwt.credential",
|
|
}
|
|
m = MultipartEncoder(fields={"keystoreFormat": "Certificate PEM", "file": certcont})
|
|
new_headers = copy.deepcopy(self.connection.headers)
|
|
new_headers["Content-Type"] = m.content_type
|
|
self.connection.headers = new_headers
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_CERT_UPLOAD.format(**params_path),
|
|
data=m,
|
|
headers=new_headers,
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError)
|
|
|
|
def get_required_action_by_alias(self, action_alias):
|
|
"""Get a required action by its alias.
|
|
|
|
:param action_alias: the alias of the required action.
|
|
:type action_alias: str
|
|
:return: the required action (RequiredActionProviderRepresentation).
|
|
:rtype: dict
|
|
"""
|
|
actions = self.get_required_actions()
|
|
for a in actions:
|
|
if a["alias"] == action_alias:
|
|
return a
|
|
return None
|
|
|
|
def get_required_actions(self):
|
|
"""Get the required actions for the realms.
|
|
|
|
:return: the required actions (list of RequiredActionProviderRepresentation).
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_REQUIRED_ACTIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def update_required_action(self, action_alias, payload):
|
|
"""Update a required action.
|
|
|
|
:param action_alias: the action alias.
|
|
:type action_alias: str
|
|
:param payload: the new required action (RequiredActionProviderRepresentation).
|
|
:type payload: dict
|
|
:return: empty dictionary.
|
|
:rtype: dict
|
|
"""
|
|
if not isinstance(payload, str):
|
|
payload = json.dumps(payload)
|
|
params_path = {"realm-name": self.connection.realm_name, "action-alias": action_alias}
|
|
data_raw = self.connection.raw_put(
|
|
urls_patterns.URL_ADMIN_REQUIRED_ACTIONS_ALIAS.format(**params_path), data=payload
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
def get_bruteforce_detection_status(self, user_id):
|
|
"""Get bruteforce detection status for user.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:return: Bruteforce status.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_get(
|
|
urls_patterns.URL_ADMIN_ATTACK_DETECTION_USER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def clear_bruteforce_attempts_for_user(self, user_id):
|
|
"""Clear bruteforce attempts for user.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:return: empty dictionary.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_ATTACK_DETECTION_USER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError)
|
|
|
|
def clear_all_bruteforce_attempts(self):
|
|
"""Clear bruteforce attempts for all users in realm.
|
|
|
|
:return: empty dictionary.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_delete(
|
|
urls_patterns.URL_ADMIN_ATTACK_DETECTION.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError)
|
|
|
|
def clear_keys_cache(self):
|
|
"""Clear keys cache.
|
|
|
|
:return: empty dictionary.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLEAR_KEYS_CACHE.format(**params_path), data=""
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def clear_realm_cache(self):
|
|
"""Clear realm cache.
|
|
|
|
:return: empty dictionary.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLEAR_REALM_CACHE.format(**params_path), data=""
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def clear_user_cache(self):
|
|
"""Clear user cache.
|
|
|
|
:return: empty dictionary.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = self.connection.raw_post(
|
|
urls_patterns.URL_ADMIN_CLEAR_USER_CACHE.format(**params_path), data=""
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
# async functions start
|
|
async def a___fetch_all(self, url, query=None):
|
|
"""Paginate asynchronously over get requests .
|
|
|
|
Wrapper function to paginate GET requests.
|
|
|
|
:param url: The url on which the query is executed
|
|
:type url: str
|
|
:param query: Existing query parameters (optional)
|
|
:type query: dict
|
|
|
|
:return: Combined results of paginated queries
|
|
:rtype: list
|
|
"""
|
|
results = []
|
|
|
|
# initialize query if it was called with None
|
|
if not query:
|
|
query = {}
|
|
page = 0
|
|
query["max"] = self.PAGE_SIZE
|
|
|
|
# fetch until we can
|
|
while True:
|
|
query["first"] = page * self.PAGE_SIZE
|
|
partial_results = raise_error_from_response(
|
|
await self.connection.a_raw_get(url, **query), KeycloakGetError
|
|
)
|
|
if not partial_results:
|
|
break
|
|
results.extend(partial_results)
|
|
if len(partial_results) < query["max"]:
|
|
break
|
|
page += 1
|
|
return results
|
|
|
|
async def a___fetch_paginated(self, url, query=None):
|
|
"""Make a specific paginated request asynchronously.
|
|
|
|
:param url: The url on which the query is executed
|
|
:type url: str
|
|
:param query: Pagination settings
|
|
:type query: dict
|
|
:returns: Response
|
|
:rtype: dict
|
|
"""
|
|
query = query or {}
|
|
return raise_error_from_response(
|
|
await self.connection.a_raw_get(url, **query), KeycloakGetError
|
|
)
|
|
|
|
async def a_get_current_realm(self) -> str:
|
|
"""Return the currently configured realm asynchronously.
|
|
|
|
:returns: Currently configured realm name
|
|
:rtype: str
|
|
"""
|
|
return self.connection.realm_name
|
|
|
|
async def a_change_current_realm(self, realm_name: str) -> None:
|
|
"""Change the current realm asynchronously.
|
|
|
|
:param realm_name: The name of the realm to be configured as current
|
|
:type realm_name: str
|
|
"""
|
|
self.connection.realm_name = realm_name
|
|
|
|
async def a_import_realm(self, payload):
|
|
"""Import a new realm asynchronously from a RealmRepresentation.
|
|
|
|
Realm name must be unique.
|
|
|
|
RealmRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_realmrepresentation
|
|
|
|
:param payload: RealmRepresentation
|
|
:type payload: dict
|
|
:return: RealmRepresentation
|
|
:rtype: dict
|
|
"""
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_REALMS, data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
async def a_partial_import_realm(self, realm_name, payload):
|
|
"""Partial import realm configuration asynchronously from PartialImportRepresentation.
|
|
|
|
Realm partialImport is used for modifying configuration of existing realm.
|
|
|
|
PartialImportRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_partialimportrepresentation
|
|
|
|
:param realm_name: Realm name (not the realm id)
|
|
:type realm_name: str
|
|
:param payload: PartialImportRepresentation
|
|
:type payload: dict
|
|
|
|
:return: PartialImportResponse
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": realm_name}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_REALM_PARTIAL_IMPORT.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[200])
|
|
|
|
async def a_export_realm(self, export_clients=False, export_groups_and_role=False):
|
|
"""Export the realm configurations asynchronously in the json format.
|
|
|
|
RealmRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_partialexport
|
|
|
|
:param export_clients: Skip if not want to export realm clients
|
|
:type export_clients: bool
|
|
:param export_groups_and_role: Skip if not want to export realm groups and roles
|
|
:type export_groups_and_role: bool
|
|
|
|
:return: realm configurations JSON
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"export-clients": export_clients,
|
|
"export-groups-and-roles": export_groups_and_role,
|
|
}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_REALM_EXPORT.format(**params_path), data=""
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError)
|
|
|
|
async def a_get_realms(self):
|
|
"""List all realms in asynchronouslyKeycloak deployment.
|
|
|
|
:return: realms list
|
|
:rtype: list
|
|
"""
|
|
data_raw = await self.connection.a_raw_get(urls_patterns.URL_ADMIN_REALMS)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_realm(self, realm_name):
|
|
"""Get a specific realm asynchronously.
|
|
|
|
RealmRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_realmrepresentation
|
|
|
|
:param realm_name: Realm name (not the realm id)
|
|
:type realm_name: str
|
|
:return: RealmRepresentation
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_REALM.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
async def a_create_realm(self, payload, skip_exists=False):
|
|
"""Create a realm asynchronously.
|
|
|
|
RealmRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_realmrepresentation
|
|
|
|
:param payload: RealmRepresentation
|
|
:type payload: dict
|
|
:param skip_exists: Skip if Realm already exist.
|
|
:type skip_exists: bool
|
|
:return: Keycloak server response (RealmRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_REALMS, data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
async def a_update_realm(self, realm_name, payload):
|
|
"""Update a realm asynchronously.
|
|
|
|
This will only update top level attributes and will ignore any user,
|
|
role, or client information in the payload.
|
|
|
|
RealmRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_realmrepresentation
|
|
|
|
:param realm_name: Realm name (not the realm id)
|
|
:type realm_name: str
|
|
:param payload: RealmRepresentation
|
|
:type payload: dict
|
|
:return: Http response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": realm_name}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_REALM.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_delete_realm(self, realm_name):
|
|
"""Delete a realm asynchronously.
|
|
|
|
:param realm_name: Realm name (not the realm id)
|
|
:type realm_name: str
|
|
:return: Http response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": realm_name}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_REALM.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_users(self, query=None):
|
|
"""Get all users asynchronously.
|
|
|
|
Return a list of users, filtered according to query parameters
|
|
|
|
UserRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_userrepresentation
|
|
|
|
:param query: Query parameters (optional)
|
|
:type query: dict
|
|
:return: users list
|
|
:rtype: list
|
|
"""
|
|
query = query or {}
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
url = urls_patterns.URL_ADMIN_USERS.format(**params_path)
|
|
|
|
if "first" in query or "max" in query:
|
|
return await self.a___fetch_paginated(url, query)
|
|
|
|
return await self.a___fetch_all(url, query)
|
|
|
|
async def a_create_idp(self, payload):
|
|
"""Create an ID Provider asynchronously.
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_identityproviderrepresentation
|
|
|
|
:param: payload: IdentityProviderRepresentation
|
|
:type payload: dict
|
|
:returns: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_IDPS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
async def a_update_idp(self, idp_alias, payload):
|
|
"""Update an ID Provider asynchronously.
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_identity_providers_resource
|
|
|
|
:param: idp_alias: alias for IdP to update
|
|
:type idp_alias: str
|
|
:param: payload: The IdentityProviderRepresentation
|
|
:type payload: dict
|
|
:returns: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "alias": idp_alias}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_IDP.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_add_mapper_to_idp(self, idp_alias, payload):
|
|
"""Create an ID Provider asynchronously.
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_identityprovidermapperrepresentation
|
|
|
|
:param: idp_alias: alias for Idp to add mapper in
|
|
:type idp_alias: str
|
|
:param: payload: IdentityProviderMapperRepresentation
|
|
:type payload: dict
|
|
:returns: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "idp-alias": idp_alias}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_IDP_MAPPERS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
async def a_update_mapper_in_idp(self, idp_alias, mapper_id, payload):
|
|
"""Update an IdP mapper asynchronously.
|
|
|
|
IdentityProviderMapperRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_update
|
|
|
|
:param: idp_alias: alias for Idp to fetch mappers
|
|
:type idp_alias: str
|
|
:param: mapper_id: Mapper Id to update
|
|
:type mapper_id: str
|
|
:param: payload: IdentityProviderMapperRepresentation
|
|
:type payload: dict
|
|
:return: Http response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"idp-alias": idp_alias,
|
|
"mapper-id": mapper_id,
|
|
}
|
|
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_IDP_MAPPER_UPDATE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_get_idp_mappers(self, idp_alias):
|
|
"""Get IDP mappers asynchronously.
|
|
|
|
Returns a list of ID Providers mappers
|
|
|
|
IdentityProviderMapperRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getmappers
|
|
|
|
:param: idp_alias: alias for Idp to fetch mappers
|
|
:type idp_alias: str
|
|
:return: array IdentityProviderMapperRepresentation
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "idp-alias": idp_alias}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_IDP_MAPPERS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_idps(self):
|
|
"""Get IDPs asynchronously.
|
|
|
|
Returns a list of ID Providers,
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_identityproviderrepresentation
|
|
|
|
:return: array IdentityProviderRepresentation
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_IDPS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_idp(self, idp_alias):
|
|
"""Get IDP provider asynchronously.
|
|
|
|
Get the representation of a specific IDP Provider.
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_identityproviderrepresentation
|
|
|
|
:param: idp_alias: alias for IdP to get
|
|
:type idp_alias: str
|
|
:return: IdentityProviderRepresentation
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "alias": idp_alias}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_IDP.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_delete_idp(self, idp_alias):
|
|
"""Delete an ID Provider asynchronously.
|
|
|
|
:param: idp_alias: idp alias name
|
|
:type idp_alias: str
|
|
:returns: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "alias": idp_alias}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_IDP.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_create_user(self, payload, exist_ok=False):
|
|
"""Create a new user asynchronously.
|
|
|
|
Username must be unique
|
|
|
|
UserRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_userrepresentation
|
|
|
|
:param payload: UserRepresentation
|
|
:type payload: dict
|
|
:param exist_ok: If False, raise KeycloakGetError if username already exists.
|
|
Otherwise, return existing user ID.
|
|
:type exist_ok: bool
|
|
|
|
:return: user_id
|
|
:rtype: str
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
|
|
if exist_ok:
|
|
exists = await self.a_get_user_id(username=payload["username"])
|
|
|
|
if exists is not None:
|
|
return str(exists)
|
|
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_USERS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
async def a_users_count(self, query=None):
|
|
"""Count users asynchronously.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_users_resource
|
|
|
|
:param query: (dict) Query parameters for users count
|
|
:type query: dict
|
|
|
|
:return: counter
|
|
:rtype: int
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_USERS_COUNT.format(**params_path), **query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_user_id(self, username):
|
|
"""Get internal keycloak user id from username asynchronously.
|
|
|
|
This is required for further actions against this user.
|
|
|
|
UserRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_userrepresentation
|
|
|
|
:param username: id in UserRepresentation
|
|
:type username: str
|
|
|
|
:return: user_id
|
|
:rtype: str
|
|
"""
|
|
lower_user_name = username.lower()
|
|
users = await self.a_get_users(
|
|
query={"username": lower_user_name, "max": 1, "exact": True}
|
|
)
|
|
return users[0]["id"] if len(users) == 1 else None
|
|
|
|
async def a_get_user(self, user_id):
|
|
"""Get representation of the user asynchronously.
|
|
|
|
UserRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_userrepresentation
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:return: UserRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_USER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_user_groups(self, user_id, query=None, brief_representation=True):
|
|
"""Get user groups asynchronously.
|
|
|
|
Returns a list of groups of which the user is a member
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param query: Additional query options
|
|
:type query: dict
|
|
:param brief_representation: whether to omit attributes in the response
|
|
:type brief_representation: bool
|
|
:return: user groups list
|
|
:rtype: list
|
|
"""
|
|
query = query or {}
|
|
|
|
params = {"briefRepresentation": brief_representation}
|
|
|
|
query.update(params)
|
|
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
|
|
url = urls_patterns.URL_ADMIN_USER_GROUPS.format(**params_path)
|
|
|
|
if "first" in query or "max" in query:
|
|
return await self.a___fetch_paginated(url, query)
|
|
|
|
return await self.a___fetch_all(url, query)
|
|
|
|
async def a_update_user(self, user_id, payload):
|
|
"""Update the user asynchronously.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param payload: UserRepresentation
|
|
:type payload: dict
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_USER.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_disable_user(self, user_id):
|
|
"""Disable the user asynchronously from the realm. Disabled users can not log in.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
return await self.a_update_user(user_id=user_id, payload={"enabled": False})
|
|
|
|
async def a_enable_user(self, user_id):
|
|
"""Enable the user from the realm asynchronously.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
return await self.a_update_user(user_id=user_id, payload={"enabled": True})
|
|
|
|
async def a_disable_all_users(self):
|
|
"""Disable all existing users asynchronously."""
|
|
users = await self.a_get_users()
|
|
for user in users:
|
|
user_id = user["id"]
|
|
await self.a_disable_user(user_id=user_id)
|
|
|
|
async def a_enable_all_users(self):
|
|
"""Disable all existing users asynchronously."""
|
|
users = await self.a_get_users()
|
|
for user in users:
|
|
user_id = user["id"]
|
|
await self.a_enable_user(user_id=user_id)
|
|
|
|
async def a_delete_user(self, user_id):
|
|
"""Delete the user asynchronously.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_USER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_set_user_password(self, user_id, password, temporary=True):
|
|
"""Set up a password for the user asynchronously.
|
|
|
|
If temporary is True, the user will have to reset
|
|
the temporary password next time they log in.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_users_resource
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_credentialrepresentation
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param password: New password
|
|
:type password: str
|
|
:param temporary: True if password is temporary
|
|
:type temporary: bool
|
|
:returns: Response
|
|
:rtype: dict
|
|
"""
|
|
payload = {"type": "password", "temporary": temporary, "value": password}
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_RESET_PASSWORD.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_get_credentials(self, user_id):
|
|
"""Get user credentials asynchronously.
|
|
|
|
Returns a list of credential belonging to the user.
|
|
|
|
CredentialRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_credentialrepresentation
|
|
|
|
:param: user_id: user id
|
|
:type user_id: str
|
|
:returns: Keycloak server response (CredentialRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_USER_CREDENTIALS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_delete_credential(self, user_id, credential_id):
|
|
"""Delete credential of the user asynchronously.
|
|
|
|
CredentialRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_credentialrepresentation
|
|
|
|
:param: user_id: user id
|
|
:type user_id: str
|
|
:param: credential_id: credential id
|
|
:type credential_id: str
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"credential_id": credential_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_USER_CREDENTIAL.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError)
|
|
|
|
async def a_user_logout(self, user_id):
|
|
"""Log out the user.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_logout
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_USER_LOGOUT.format(**params_path), data=""
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
async def a_user_consents(self, user_id):
|
|
"""Get consents granted asynchronously by the user.
|
|
|
|
UserConsentRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_userconsentrepresentation
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:returns: List of UserConsentRepresentations
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_USER_CONSENTS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_user_social_logins(self, user_id):
|
|
"""Get user social logins asynchronously.
|
|
|
|
Returns a list of federated identities/social logins of which the user has been associated
|
|
with
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:returns: Federated identities list
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_USER_FEDERATED_IDENTITIES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_add_user_social_login(
|
|
self, user_id, provider_id, provider_userid, provider_username
|
|
):
|
|
"""Add a federated identity / social login provider asynchronously to the user.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param provider_id: Social login provider id
|
|
:type provider_id: str
|
|
:param provider_userid: userid specified by the provider
|
|
:type provider_userid: str
|
|
:param provider_username: username specified by the provider
|
|
:type provider_username: str
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = {
|
|
"identityProvider": provider_id,
|
|
"userId": provider_userid,
|
|
"userName": provider_username,
|
|
}
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"provider": provider_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_USER_FEDERATED_IDENTITY.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201, 204])
|
|
|
|
async def a_delete_user_social_login(self, user_id, provider_id):
|
|
"""Delete a federated identity / social login provider asynchronously from the user.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param provider_id: Social login provider id
|
|
:type provider_id: str
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"provider": provider_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_USER_FEDERATED_IDENTITY.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_send_update_account(
|
|
self, user_id, payload, client_id=None, lifespan=None, redirect_uri=None
|
|
):
|
|
"""Send an update account email to the user asynchronously.
|
|
|
|
An email contains a link the user can click to perform a set of required actions.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param payload: A list of actions for the user to complete
|
|
:type payload: list
|
|
:param client_id: Client id (optional)
|
|
:type client_id: str
|
|
:param lifespan: Number of seconds after which the generated token expires (optional)
|
|
:type lifespan: int
|
|
:param redirect_uri: The redirect uri (optional)
|
|
:type redirect_uri: str
|
|
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
params_query = {"client_id": client_id, "lifespan": lifespan, "redirect_uri": redirect_uri}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_SEND_UPDATE_ACCOUNT.format(**params_path),
|
|
data=json.dumps(payload),
|
|
**params_query,
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
async def a_send_verify_email(self, user_id, client_id=None, redirect_uri=None):
|
|
"""Send a update account email to the user asynchronously.
|
|
|
|
An email contains a link the user can click to perform a set of required actions.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param client_id: Client id (optional)
|
|
:type client_id: str
|
|
:param redirect_uri: Redirect uri (optional)
|
|
:type redirect_uri: str
|
|
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
params_query = {"client_id": client_id, "redirect_uri": redirect_uri}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_SEND_VERIFY_EMAIL.format(**params_path),
|
|
data={},
|
|
**params_query,
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
async def a_get_sessions(self, user_id):
|
|
"""Get sessions associated with the user asynchronously.
|
|
|
|
UserSessionRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_usersessionrepresentation
|
|
|
|
:param user_id: Id of user
|
|
:type user_id: str
|
|
:return: UserSessionRepresentation
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_GET_SESSIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_server_info(self):
|
|
"""Get themes, social providers, etc. on this server asynchronously.
|
|
|
|
ServerInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_serverinforepresentation
|
|
|
|
:return: ServerInfoRepresentation
|
|
:rtype: dict
|
|
"""
|
|
data_raw = await self.connection.a_raw_get(urls_patterns.URL_ADMIN_SERVER_INFO)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_groups(self, query=None, full_hierarchy=False):
|
|
"""Get groups asynchronously.
|
|
|
|
Returns a list of groups belonging to the realm
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_grouprepresentation
|
|
|
|
Notice that when using full_hierarchy=True, the response will be a nested structure
|
|
containing all the children groups. If used with query parameters, the full_hierarchy
|
|
will be applied to the received groups only.
|
|
|
|
:param query: Additional query options
|
|
:type query: dict
|
|
:param full_hierarchy: If True, return all of the nested children groups, otherwise only
|
|
the first level children are returned
|
|
:type full_hierarchy: bool
|
|
:return: array GroupRepresentation
|
|
:rtype: list
|
|
"""
|
|
query = query or {}
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
url = urls_patterns.URL_ADMIN_GROUPS.format(**params_path)
|
|
|
|
if "first" in query or "max" in query:
|
|
groups = await self.a___fetch_paginated(url, query)
|
|
else:
|
|
groups = await self.a___fetch_all(url, query)
|
|
|
|
# For version +23.0.0
|
|
for group in groups:
|
|
if group.get("subGroupCount"):
|
|
group["subGroups"] = await self.a_get_group_children(
|
|
group_id=group.get("id"), full_hierarchy=full_hierarchy
|
|
)
|
|
|
|
return groups
|
|
|
|
async def a_get_group(self, group_id, full_hierarchy=False):
|
|
"""Get group by id asynchronously.
|
|
|
|
Returns full group details
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_grouprepresentation
|
|
|
|
:param group_id: The group id
|
|
:type group_id: str
|
|
:param full_hierarchy: If True, return all of the nested children groups, otherwise only
|
|
the first level children are returned
|
|
:type full_hierarchy: bool
|
|
:return: Keycloak server response (GroupRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
response = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_GROUP.format(**params_path)
|
|
)
|
|
|
|
if response.status_code >= 400:
|
|
return raise_error_from_response(response, KeycloakGetError)
|
|
|
|
# For version +23.0.0
|
|
group = response.json()
|
|
if group.get("subGroupCount"):
|
|
group["subGroups"] = await self.a_get_group_children(
|
|
group.get("id"), full_hierarchy=full_hierarchy
|
|
)
|
|
|
|
return group
|
|
|
|
async def a_get_subgroups(self, group, path):
|
|
"""Get subgroups asynchronously.
|
|
|
|
Utility function to iterate through nested group structures
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_grouprepresentation
|
|
|
|
:param group: group (GroupRepresentation)
|
|
:type group: dict
|
|
:param path: group path (string)
|
|
:type path: str
|
|
:return: Keycloak server response (GroupRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
for subgroup in group["subGroups"]:
|
|
if subgroup["path"] == path:
|
|
return subgroup
|
|
elif subgroup["subGroups"]:
|
|
for subgroup in group["subGroups"]:
|
|
result = await self.a_get_subgroups(subgroup, path)
|
|
if result:
|
|
return result
|
|
# went through the tree without hits
|
|
return None
|
|
|
|
async def a_get_group_children(self, group_id, query=None, full_hierarchy=False):
|
|
"""Get group children by parent id asynchronously.
|
|
|
|
Returns full group children details
|
|
|
|
:param group_id: The parent group id
|
|
:type group_id: str
|
|
:param query: Additional query options
|
|
:type query: dict
|
|
:param full_hierarchy: If True, return all of the nested children groups
|
|
:type full_hierarchy: bool
|
|
:return: Keycloak server response (GroupRepresentation)
|
|
:rtype: dict
|
|
:raises ValueError: If both query and full_hierarchy parameters are used
|
|
"""
|
|
query = query or {}
|
|
if query and full_hierarchy:
|
|
raise ValueError("Cannot use both query and full_hierarchy parameters")
|
|
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
url = urls_patterns.URL_ADMIN_GROUP_CHILD.format(**params_path)
|
|
if "first" in query or "max" in query:
|
|
return await self.a___fetch_paginated(url, query)
|
|
res = await self.a___fetch_all(url, query)
|
|
|
|
if not full_hierarchy:
|
|
return res
|
|
|
|
for group in res:
|
|
if group.get("subGroupCount"):
|
|
group["subGroups"] = await self.a_get_group_children(
|
|
group_id=group.get("id"), full_hierarchy=full_hierarchy
|
|
)
|
|
|
|
return res
|
|
|
|
async def a_get_group_members(self, group_id, query=None):
|
|
"""Get members by group id asynchronously.
|
|
|
|
Returns group members
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_userrepresentation
|
|
|
|
:param group_id: The group id
|
|
:type group_id: str
|
|
:param query: Additional query parameters
|
|
(see https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getmembers)
|
|
:type query: dict
|
|
:return: Keycloak server response (UserRepresentation)
|
|
:rtype: list
|
|
"""
|
|
query = query or {}
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
url = urls_patterns.URL_ADMIN_GROUP_MEMBERS.format(**params_path)
|
|
|
|
if "first" in query or "max" in query:
|
|
return await self.a___fetch_paginated(url, query)
|
|
|
|
return await self.a___fetch_all(url, query)
|
|
|
|
async def a_get_group_by_path(self, path):
|
|
"""Get group id based on name or path asynchronously .
|
|
|
|
Returns full group details for a group defined by path
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_grouprepresentation
|
|
|
|
:param path: group path
|
|
:type path: str
|
|
:return: Keycloak server response (GroupRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "path": path}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_GROUP_BY_PATH.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_create_group(self, payload, parent=None, skip_exists=False):
|
|
"""Create a group in the Realm asynchronously.
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_grouprepresentation
|
|
|
|
:param payload: GroupRepresentation
|
|
:type payload: dict
|
|
:param parent: parent group's id. Required to create a sub-group.
|
|
:type parent: str
|
|
:param skip_exists: If true then do not raise an error if it already exists
|
|
:type skip_exists: bool
|
|
|
|
:return: Group id for newly created group or None for an existing group
|
|
:rtype: str
|
|
"""
|
|
if parent is None:
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_GROUPS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
else:
|
|
params_path = {"realm-name": self.connection.realm_name, "id": parent}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_GROUP_CHILD.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
try:
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
except KeyError:
|
|
return
|
|
|
|
async def a_update_group(self, group_id, payload):
|
|
"""Update group, ignores subgroups asynchronously.
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/#_grouprepresentation
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param payload: GroupRepresentation with updated information.
|
|
:type payload: dict
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_GROUP.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_groups_count(self, query=None):
|
|
"""Count groups asynchronously.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_groups
|
|
|
|
:param query: (dict) Query parameters for groups count
|
|
:type query: dict
|
|
|
|
:return: Keycloak Server Response
|
|
:rtype: dict
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_GROUPS_COUNT.format(**params_path), **query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_group_set_permissions(self, group_id, enabled=True):
|
|
"""Enable/Disable permissions for a group asynchronously.
|
|
|
|
Cannot delete group if disabled
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param enabled: Enabled flag
|
|
:type enabled: bool
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_GROUP_PERMISSIONS.format(**params_path),
|
|
data=json.dumps({"enabled": enabled}),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
async def a_group_user_add(self, user_id, group_id):
|
|
"""Add user to group (user_id and group_id) asynchronously.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param group_id: id of group to add to
|
|
:type group_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"group-id": group_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_USER_GROUP.format(**params_path), data=None
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_group_user_remove(self, user_id, group_id):
|
|
"""Remove user from group (user_id and group_id) asynchronously.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param group_id: id of group to remove from
|
|
:type group_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"group-id": group_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_USER_GROUP.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_delete_group(self, group_id):
|
|
"""Delete a group in the Realm asynchronously.
|
|
|
|
:param group_id: id of group to delete
|
|
:type group_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_GROUP.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_clients(self):
|
|
"""Get clients asynchronously.
|
|
|
|
Returns a list of clients belonging to the realm
|
|
|
|
ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENTS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client(self, client_id):
|
|
"""Get representation of the client asynchronously.
|
|
|
|
ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_id(self, client_id):
|
|
"""Get internal keycloak client id from client-id asynchronously.
|
|
|
|
This is required for further actions against this client.
|
|
|
|
:param client_id: clientId in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: client_id (uuid as string)
|
|
:rtype: str
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "client-id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENTS_CLIENT_ID.format(**params_path)
|
|
)
|
|
data_response = raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
for client in data_response:
|
|
if client_id == client.get("clientId"):
|
|
return client["id"]
|
|
|
|
return None
|
|
|
|
async def a_get_client_authz_settings(self, client_id):
|
|
"""Get authorization json from client asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SETTINGS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_create_client_authz_resource(self, client_id, payload, skip_exists=False):
|
|
"""Create resources of client asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param payload: ResourceRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_resourcerepresentation
|
|
:type payload: dict
|
|
:param skip_exists: Skip the creation in case the resource exists
|
|
:type skip_exists: bool
|
|
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
async def a_update_client_authz_resource(self, client_id, resource_id, payload):
|
|
"""Update resource of client asynchronously.
|
|
|
|
Any parameter missing from the ResourceRepresentation in the payload WILL be set
|
|
to default by the Keycloak server.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param payload: ResourceRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_resourcerepresentation
|
|
:type payload: dict
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param resource_id: id in ResourceRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_resourcerepresentation
|
|
:type resource_id: str
|
|
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"resource-id": resource_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_delete_client_authz_resource(self, client_id: str, resource_id: str):
|
|
"""Delete a client resource asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param resource_id: id in ResourceRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_resourcerepresentation
|
|
:type resource_id: str
|
|
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"resource-id": resource_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_client_authz_resources(self, client_id):
|
|
"""Get resources from client asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response (ResourceRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_authz_resource(self, client_id: str, resource_id: str):
|
|
"""Get a client resource asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param resource_id: id in ResourceRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_resourcerepresentation
|
|
:type resource_id: str
|
|
|
|
:return: Keycloak server response (ResourceRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"resource-id": resource_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
async def a_create_client_authz_role_based_policy(self, client_id, payload, skip_exists=False):
|
|
"""Create role-based policy of client asynchronously.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"type": "role",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"name": "Policy-1",
|
|
"roles": [
|
|
{
|
|
"id": id
|
|
}
|
|
]
|
|
}
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param payload: No Document
|
|
:type payload: dict
|
|
:param skip_exists: Skip creation in case the object exists
|
|
:type skip_exists: bool
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_ROLE_BASED_POLICY.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
async def a_create_client_authz_policy(self, client_id, payload, skip_exists=False):
|
|
"""Create an authz policy of client asynchronously.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"name": "Policy-time-based",
|
|
"type": "time",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"config": {
|
|
"hourEnd": "18",
|
|
"hour": "9"
|
|
}
|
|
}
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param payload: No Document
|
|
:type payload: dict
|
|
:param skip_exists: Skip creation in case the object exists
|
|
:type skip_exists: bool
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICIES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
async def a_create_client_authz_resource_based_permission(
|
|
self, client_id, payload, skip_exists=False
|
|
):
|
|
"""Create resource-based permission of client asynchronously.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"type": "resource",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"name": "Permission-Name",
|
|
"resources": [
|
|
resource_id
|
|
],
|
|
"policies": [
|
|
policy_id
|
|
]
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param payload: PolicyRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_policyrepresentation
|
|
:type payload: dict
|
|
:param skip_exists: Skip creation in case the object already exists
|
|
:type skip_exists: bool
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCE_BASED_PERMISSION.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
async def a_get_client_authz_scopes(self, client_id):
|
|
"""Get scopes from client asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_create_client_authz_scopes(self, client_id, payload):
|
|
"""Create scopes for client asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:param payload: ScopeRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_ScopeRepresentation
|
|
:type payload: dict
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SCOPES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
async def a_get_client_authz_permissions(self, client_id):
|
|
"""Get permissions from client asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_PERMISSIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_authz_policies(self, client_id):
|
|
"""Get policies from client asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICIES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_delete_client_authz_policy(self, client_id, policy_id):
|
|
"""Delete a policy from client asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param policy_id: id in PolicyRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_policyrepresentation
|
|
:type policy_id: str
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"policy-id": policy_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICY.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_client_authz_policy(self, client_id, policy_id):
|
|
"""Get a policy from client asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param policy_id: id in PolicyRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_policyrepresentation
|
|
:type policy_id: str
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"policy-id": policy_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICY.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_service_account_user(self, client_id):
|
|
"""Get service account user from client asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: UserRepresentation
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SERVICE_ACCOUNT_USER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_default_client_scopes(self, client_id):
|
|
"""Get all default client scopes from client asynchronously.
|
|
|
|
:param client_id: id of the client in which the new default client scope should be added
|
|
:type client_id: str
|
|
|
|
:return: list of client scopes with id and name
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_DEFAULT_CLIENT_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_add_client_default_client_scope(self, client_id, client_scope_id, payload):
|
|
"""Add a client scope to the default client scopes from client asynchronously.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"realm":"testrealm",
|
|
"client":"aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa",
|
|
"clientScopeId":"bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb"
|
|
}
|
|
|
|
:param client_id: id of the client in which the new default client scope should be added
|
|
:type client_id: str
|
|
:param client_scope_id: id of the new client scope that should be added
|
|
:type client_scope_id: str
|
|
:param payload: dictionary with realm, client and clientScopeId
|
|
:type payload: dict
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client_scope_id": client_scope_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_DEFAULT_CLIENT_SCOPE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
async def a_delete_client_default_client_scope(self, client_id, client_scope_id):
|
|
"""Delete a client scope from the default client scopes of the client asynchronously.
|
|
|
|
:param client_id: id of the client in which the default client scope should be deleted
|
|
:type client_id: str
|
|
:param client_scope_id: id of the client scope that should be deleted
|
|
:type client_scope_id: str
|
|
|
|
:return: list of client scopes with id and name
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client_scope_id": client_scope_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_DEFAULT_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError)
|
|
|
|
async def a_get_client_optional_client_scopes(self, client_id):
|
|
"""Get all optional client scopes from client asynchronously.
|
|
|
|
:param client_id: id of the client in which the new optional client scope should be added
|
|
:type client_id: str
|
|
|
|
:return: list of client scopes with id and name
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_OPTIONAL_CLIENT_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_add_client_optional_client_scope(self, client_id, client_scope_id, payload):
|
|
"""Add a client scope to the optional client scopes from client asynchronously.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"realm":"testrealm",
|
|
"client":"aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa",
|
|
"clientScopeId":"bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb"
|
|
}
|
|
|
|
:param client_id: id of the client in which the new optional client scope should be added
|
|
:type client_id: str
|
|
:param client_scope_id: id of the new client scope that should be added
|
|
:type client_scope_id: str
|
|
:param payload: dictionary with realm, client and clientScopeId
|
|
:type payload: dict
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client_scope_id": client_scope_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_OPTIONAL_CLIENT_SCOPE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
async def a_delete_client_optional_client_scope(self, client_id, client_scope_id):
|
|
"""Delete a client scope from the optional client scopes of the client asynchronously.
|
|
|
|
:param client_id: id of the client in which the optional client scope should be deleted
|
|
:type client_id: str
|
|
:param client_scope_id: id of the client scope that should be deleted
|
|
:type client_scope_id: str
|
|
|
|
:return: list of client scopes with id and name
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client_scope_id": client_scope_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_OPTIONAL_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError)
|
|
|
|
async def a_create_initial_access_token(self, count: int = 1, expiration: int = 1):
|
|
"""Create an initial access token asynchronously.
|
|
|
|
:param count: Number of clients that can be registered
|
|
:type count: int
|
|
:param expiration: Days until expireation
|
|
:type expiration: int
|
|
:return: initial access token
|
|
:rtype: str
|
|
"""
|
|
payload = {"count": count, "expiration": expiration}
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_INITIAL_ACCESS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[200])
|
|
|
|
async def a_create_client(self, payload, skip_exists=False):
|
|
"""Create a client asynchronously.
|
|
|
|
ClientRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
|
|
:param skip_exists: If true then do not raise an error if client already exists
|
|
:type skip_exists: bool
|
|
:param payload: ClientRepresentation
|
|
:type payload: dict
|
|
:return: Client ID
|
|
:rtype: str
|
|
"""
|
|
if skip_exists:
|
|
client_id = await self.a_get_client_id(client_id=payload["clientId"])
|
|
|
|
if client_id is not None:
|
|
return client_id
|
|
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENTS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
async def a_update_client(self, client_id, payload):
|
|
"""Update a client asynchronously.
|
|
|
|
:param client_id: Client id
|
|
:type client_id: str
|
|
:param payload: ClientRepresentation
|
|
:type payload: dict
|
|
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_delete_client(self, client_id):
|
|
"""Get representation of the client asynchronously.
|
|
|
|
ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
|
|
:param client_id: keycloak client id (not oauth client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_client_installation_provider(self, client_id, provider_id):
|
|
"""Get content for given installation provider asynchronously.
|
|
|
|
Related documentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clients_resource
|
|
|
|
Possible provider_id list available in the ServerInfoRepresentation#clientInstallations
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_serverinforepresentation
|
|
|
|
:param client_id: Client id
|
|
:type client_id: str
|
|
:param provider_id: provider id to specify response format
|
|
:type provider_id: str
|
|
:returns: Installation providers
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"provider-id": provider_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_INSTALLATION_PROVIDER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
async def a_get_realm_roles(self, brief_representation=True, search_text=""):
|
|
"""Get all roles for the realm or client asynchronously.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param brief_representation: whether to omit role attributes in the response
|
|
:type brief_representation: bool
|
|
:param search_text: optional search text to limit the returned result.
|
|
:type search_text: str
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
url = urls_patterns.URL_ADMIN_REALM_ROLES
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
params = {"briefRepresentation": brief_representation}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES.format(**params_path), **params
|
|
)
|
|
|
|
# set the search_text path param, if it is a valid string
|
|
if search_text is not None and search_text.strip() != "":
|
|
params_path["search-text"] = search_text
|
|
url = urls_patterns.URL_ADMIN_REALM_ROLES_SEARCH
|
|
|
|
data_raw = await self.connection.a_raw_get(url.format(**params_path), **params)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_realm_role_groups(self, role_name, query=None, brief_representation=True):
|
|
"""Get role groups of realm by role name asynchronously.
|
|
|
|
:param role_name: Name of the role.
|
|
:type role_name: str
|
|
:param query: Additional Query parameters
|
|
(see https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_parameters_226)
|
|
:type query: dict
|
|
:param brief_representation: whether to omit role attributes in the response
|
|
:type brief_representation: bool
|
|
:return: Keycloak Server Response (GroupRepresentation)
|
|
:rtype: list
|
|
"""
|
|
query = query or {}
|
|
|
|
params = {"briefRepresentation": brief_representation}
|
|
|
|
query.update(params)
|
|
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
|
|
url = urls_patterns.URL_ADMIN_REALM_ROLES_GROUPS.format(**params_path)
|
|
|
|
if "first" in query or "max" in query:
|
|
return await self.a___fetch_paginated(url, query)
|
|
|
|
return await self.a___fetch_all(url, query)
|
|
|
|
async def a_get_realm_role_members(self, role_name, query=None):
|
|
"""Get role members of realm by role name asynchronously.
|
|
|
|
:param role_name: Name of the role.
|
|
:type role_name: str
|
|
:param query: Additional Query parameters
|
|
(see https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_roles_resource)
|
|
:type query: dict
|
|
:return: Keycloak Server Response (UserRepresentation)
|
|
:rtype: list
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
return await self.a___fetch_all(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_MEMBERS.format(**params_path), query
|
|
)
|
|
|
|
async def a_get_default_realm_role_id(self):
|
|
"""Get the ID of the default realm role asynchronously.
|
|
|
|
:return: Realm role ID
|
|
:rtype: str
|
|
"""
|
|
all_realm_roles = await self.a_get_realm_roles()
|
|
default_realm_roles = [
|
|
realm_role
|
|
for realm_role in all_realm_roles
|
|
if realm_role["name"] == f"default-roles-{self.connection.realm_name}".lower()
|
|
]
|
|
return default_realm_roles[0]["id"]
|
|
|
|
async def a_get_realm_default_roles(self):
|
|
"""Get all the default realm roles asyncho asynchronously.
|
|
|
|
:return: Keycloak Server Response (UserRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"role-id": await self.a_get_default_realm_role_id(),
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLE_COMPOSITES_REALM.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_remove_realm_default_roles(self, payload):
|
|
"""Remove a set of default realm roles asynchronously.
|
|
|
|
:param payload: List of RoleRepresentations
|
|
:type payload: list
|
|
:return: Keycloak Server Response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"role-id": await self.a_get_default_realm_role_id(),
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_REALM_ROLE_COMPOSITES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError)
|
|
|
|
async def a_add_realm_default_roles(self, payload):
|
|
"""Add a set of default realm roles asynchronously.
|
|
|
|
:param payload: List of RoleRepresentations
|
|
:type payload: list
|
|
:return: Keycloak Server Response
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"role-id": await self.a_get_default_realm_role_id(),
|
|
}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_REALM_ROLE_COMPOSITES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError)
|
|
|
|
async def a_get_client_roles(self, client_id, brief_representation=True):
|
|
"""Get all roles for the client asynchronously.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param brief_representation: whether to omit role attributes in the response
|
|
:type brief_representation: bool
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
params = {"briefRepresentation": brief_representation}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLES.format(**params_path), **params
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_role(self, client_id, role_name):
|
|
"""Get client role id by name asynchronously.
|
|
|
|
This is required for further actions with this role.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param role_name: role's name (not id!)
|
|
:type role_name: str
|
|
:return: role_id
|
|
:rtype: str
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"role-name": role_name,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_role_id(self, client_id, role_name):
|
|
"""Get client role id by name asynchronously.
|
|
|
|
This is required for further actions with this role.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param role_name: role's name (not id!)
|
|
:type role_name: str
|
|
:return: role_id
|
|
:rtype: str
|
|
"""
|
|
role = await self.a_get_client_role(client_id, role_name)
|
|
return role.get("id")
|
|
|
|
async def a_create_client_role(self, client_role_id, payload, skip_exists=False):
|
|
"""Create a client role asynchronously.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_role_id: id of client (not client-id)
|
|
:type client_role_id: str
|
|
:param payload: RoleRepresentation
|
|
:type payload: dict
|
|
:param skip_exists: If true then do not raise an error if client role already exists
|
|
:type skip_exists: bool
|
|
:return: Client role name
|
|
:rtype: str
|
|
"""
|
|
if skip_exists:
|
|
try:
|
|
res = await self.a_get_client_role(
|
|
client_id=client_role_id, role_name=payload["name"]
|
|
)
|
|
return res["name"]
|
|
except KeycloakGetError:
|
|
pass
|
|
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_role_id}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLES.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
async def a_add_composite_client_roles_to_role(self, client_role_id, role_name, roles):
|
|
"""Add composite roles to client role asynchronously.
|
|
|
|
:param client_role_id: id of client (not client-id)
|
|
:type client_role_id: str
|
|
:param role_name: The name of the role
|
|
:type role_name: str
|
|
:param roles: roles list or role (use RoleRepresentation) to be updated
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_role_id,
|
|
"role-name": role_name,
|
|
}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLES_COMPOSITE_CLIENT_ROLE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
async def a_remove_composite_client_roles_from_role(self, client_role_id, role_name, roles):
|
|
"""Remove composite roles from a client role asynchronously.
|
|
|
|
:param client_role_id: id of client (not client-id)
|
|
:type client_role_id: str
|
|
:param role_name: The name of the role
|
|
:type role_name: str
|
|
:param roles: roles list or role (use RoleRepresentation) to be removed
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_role_id,
|
|
"role-name": role_name,
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLES_COMPOSITE_CLIENT_ROLE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_update_client_role(self, client_id, role_name, payload):
|
|
"""Update a client role asynchronously.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param role_name: role's name (not id!)
|
|
:type role_name: str
|
|
:param payload: RoleRepresentation
|
|
:type payload: dict
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"role-name": role_name,
|
|
}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_delete_client_role(self, client_role_id, role_name):
|
|
"""Delete a client role asynchronously.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_role_id: id of client (not client-id)
|
|
:type client_role_id: str
|
|
:param role_name: role's name (not id!)
|
|
:type role_name: str
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_role_id,
|
|
"role-name": role_name,
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_assign_client_role(self, user_id, client_id, roles):
|
|
"""Assign a client role to a user asynchronously.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
async def a_get_client_role_members(self, client_id, role_name, **query):
|
|
"""Get members by client role asynchronously.
|
|
|
|
:param client_id: The client id
|
|
:type client_id: str
|
|
:param role_name: the name of role to be queried.
|
|
:type role_name: str
|
|
:param query: Additional query parameters
|
|
(see https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clients_resource)
|
|
:type query: dict
|
|
:return: Keycloak server response (UserRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"role-name": role_name,
|
|
}
|
|
return await self.a___fetch_all(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE_MEMBERS.format(**params_path), query
|
|
)
|
|
|
|
async def a_get_client_role_groups(self, client_id, role_name, **query):
|
|
"""Get group members by client role asynchronously.
|
|
|
|
:param client_id: The client id
|
|
:type client_id: str
|
|
:param role_name: the name of role to be queried.
|
|
:type role_name: str
|
|
:param query: Additional query parameters
|
|
(see https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clients_resource)
|
|
:type query: dict
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"role-name": role_name,
|
|
}
|
|
return await self.a___fetch_all(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE_GROUPS.format(**params_path), query
|
|
)
|
|
|
|
async def a_get_role_by_id(self, role_id):
|
|
"""Get a specific role’s representation asynchronously.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param role_id: id of role
|
|
:type role_id: str
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-id": role_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_ID.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
async def a_update_role_by_id(self, role_id, payload):
|
|
"""Update the role asynchronously.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param payload: RoleRepresentation
|
|
:type payload: dict
|
|
:param role_id: id of role
|
|
:type role_id: str
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-id": role_id}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_ID.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_delete_role_by_id(self, role_id):
|
|
"""Delete a role by its id asynchronously.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param role_id: id of role
|
|
:type role_id: str
|
|
:returns: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-id": role_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_ID.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_create_realm_role(self, payload, skip_exists=False):
|
|
"""Create a new role for the realm or client asynchronously.
|
|
|
|
:param payload: The role (use RoleRepresentation)
|
|
:type payload: dict
|
|
:param skip_exists: If true then do not raise an error if realm role already exists
|
|
:type skip_exists: bool
|
|
:return: Realm role name
|
|
:rtype: str
|
|
"""
|
|
if skip_exists:
|
|
try:
|
|
role = await self.a_get_realm_role(role_name=payload["name"])
|
|
return role["name"]
|
|
except KeycloakGetError:
|
|
pass
|
|
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
async def a_get_realm_role(self, role_name):
|
|
"""Get realm role by role name asynchronously.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param role_name: role's name, not id!
|
|
:type role_name: str
|
|
:return: role
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_NAME.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_realm_role_by_id(self, role_id: str):
|
|
"""Get realm role by role id.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_rolerepresentation
|
|
|
|
:param role_id: role's id, not name!
|
|
:type role_id: str
|
|
:return: role
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-id": role_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_ID.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_update_realm_role(self, role_name, payload):
|
|
"""Update a role for the realm by name asynchronously.
|
|
|
|
:param role_name: The name of the role to be updated
|
|
:type role_name: str
|
|
:param payload: The role (use RoleRepresentation)
|
|
:type payload: dict
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_NAME.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_delete_realm_role(self, role_name):
|
|
"""Delete a role for the realm by name asynchronously.
|
|
|
|
:param role_name: The role name
|
|
:type role_name: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_NAME.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_add_composite_realm_roles_to_role(self, role_name, roles):
|
|
"""Add composite roles to the role asynchronously.
|
|
|
|
:param role_name: The name of the role
|
|
:type role_name: str
|
|
:param roles: roles list or role (use RoleRepresentation) to be updated
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_COMPOSITE_REALM_ROLE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
async def a_remove_composite_realm_roles_to_role(self, role_name, roles):
|
|
"""Remove composite roles from the role asynchronously.
|
|
|
|
:param role_name: The name of the role
|
|
:type role_name: str
|
|
:param roles: roles list or role (use RoleRepresentation) to be removed
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_COMPOSITE_REALM_ROLE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_composite_realm_roles_of_role(self, role_name):
|
|
"""Get composite roles of the role asynchronously.
|
|
|
|
:param role_name: The name of the role
|
|
:type role_name: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "role-name": role_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_COMPOSITE_REALM_ROLE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_assign_realm_roles_to_client_scope(self, client_id, roles):
|
|
"""Assign realm roles to a client's scope asynchronously.
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_MAPPINGS_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
async def a_delete_realm_roles_of_client_scope(self, client_id, roles):
|
|
"""Delete realm roles of a client's scope asynchronously.
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_MAPPINGS_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_realm_roles_of_client_scope(self, client_id):
|
|
"""Get all realm roles for a client's scope.
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_MAPPINGS_REALM_ROLES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_assign_client_roles_to_client_scope(self, client_id, client_roles_owner_id, roles):
|
|
"""Assign client roles to a client's dedicated scope asynchronously.
|
|
|
|
To assign roles to a client scope, use a_add_client_specific_roles_to_client_scope.
|
|
|
|
:param client_id: id of client (not client-id) who is assigned the roles
|
|
:type client_id: str
|
|
:param client_roles_owner_id: id of client (not client-id) who has the roles
|
|
:type client_roles_owner_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client": client_roles_owner_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_MAPPINGS_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
async def a_delete_client_roles_of_client_scope(self, client_id, client_roles_owner_id, roles):
|
|
"""Delete client roles of a client's dedicated scope asynchronously.
|
|
|
|
To remove roles from a client scope, use a_remove_client_specific_roles_of_client_scope.
|
|
|
|
:param client_id: id of client (not client-id) who is assigned the roles
|
|
:type client_id: str
|
|
:param client_roles_owner_id: id of client (not client-id) who has the roles
|
|
:type client_roles_owner_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client": client_roles_owner_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_MAPPINGS_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_client_roles_of_client_scope(self, client_id, client_roles_owner_id):
|
|
"""Get all client roles for a client's scope asynchronously.
|
|
|
|
To get roles from a client scope, use a_get_client_roles_of_client_scope.
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param client_roles_owner_id: id of client (not client-id) who has the roles
|
|
:type client_roles_owner_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"client": client_roles_owner_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_MAPPINGS_CLIENT_ROLES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_assign_realm_roles(self, user_id, roles):
|
|
"""Assign realm roles to a user asynchronously.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
async def a_delete_realm_roles_of_user(self, user_id, roles):
|
|
"""Delete realm roles of a user asynchronously.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_realm_roles_of_user(self, user_id):
|
|
"""Get all realm roles for a user asynchronously.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_available_realm_roles_of_user(self, user_id):
|
|
"""Get all available (i.e. unassigned) realm roles for a user asynchronously.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES_AVAILABLE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_composite_realm_roles_of_user(self, user_id, brief_representation=True):
|
|
"""Get all composite (i.e. implicit) realm roles for a user asynchronously.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param brief_representation: whether to omit role attributes in the response
|
|
:type brief_representation: bool
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
params = {"briefRepresentation": brief_representation}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES_COMPOSITE.format(**params_path), **params
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_assign_group_realm_roles(self, group_id, roles):
|
|
"""Assign realm roles to a group asynchronously.
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param roles: roles list or role (use GroupRoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_GROUPS_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
async def a_delete_group_realm_roles(self, group_id, roles):
|
|
"""Delete realm roles of a group asynchronously.
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param roles: roles list or role (use GroupRoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_GROUPS_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_group_realm_roles(self, group_id, brief_representation=True):
|
|
"""Get all realm roles for a group asynchronously.
|
|
|
|
:param group_id: id of the group
|
|
:type group_id: str
|
|
:param brief_representation: whether to omit role attributes in the response
|
|
:type brief_representation: bool
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": group_id}
|
|
params = {"briefRepresentation": brief_representation}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_GROUPS_REALM_ROLES.format(**params_path), **params
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_assign_group_client_roles(self, group_id, client_id, roles):
|
|
"""Assign client roles to a group asynchronously.
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param roles: roles list or role (use GroupRoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": group_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_GROUPS_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
async def a_get_group_client_roles(self, group_id, client_id):
|
|
"""Get client roles of a group asynchronously.
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": group_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_GROUPS_CLIENT_ROLES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_delete_group_client_roles(self, group_id, client_id, roles):
|
|
"""Delete client roles of a group asynchronously.
|
|
|
|
:param group_id: id of group
|
|
:type group_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param roles: roles list or role (use GroupRoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": group_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_GROUPS_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_all_roles_of_user(self, user_id):
|
|
"""Get all level roles for a user asynchronously.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_USER_ALL_ROLES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_roles_of_user(self, user_id, client_id):
|
|
"""Get all client roles for a user asynchronously.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
return await self.a__get_client_roles_of_user(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES, user_id, client_id
|
|
)
|
|
|
|
async def a_get_available_client_roles_of_user(self, user_id, client_id):
|
|
"""Get available client role-mappings for a user asynchronously.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
return await self.a__get_client_roles_of_user(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES_AVAILABLE, user_id, client_id
|
|
)
|
|
|
|
async def a_get_composite_client_roles_of_user(
|
|
self, user_id, client_id, brief_representation=False
|
|
):
|
|
"""Get composite client role-mappings for a user asynchronously.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:param brief_representation: whether to omit attributes in the response
|
|
:type brief_representation: bool
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params = {"briefRepresentation": brief_representation}
|
|
return await self.a__get_client_roles_of_user(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES_COMPOSITE, user_id, client_id, **params
|
|
)
|
|
|
|
async def a__get_client_roles_of_user(
|
|
self, client_level_role_mapping_url, user_id, client_id, **params
|
|
):
|
|
"""Get client roles of a single user helper asynchronously.
|
|
|
|
:param client_level_role_mapping_url: Url for the client role mapping
|
|
:type client_level_role_mapping_url: str
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:param client_id: Client id
|
|
:type client_id: str
|
|
:param params: Additional parameters
|
|
:type params: dict
|
|
:returns: Client roles of a user
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
client_level_role_mapping_url.format(**params_path), **params
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_delete_client_roles_of_user(self, user_id, client_id, roles):
|
|
"""Delete client roles from a user asynchronously.
|
|
|
|
:param user_id: id of user
|
|
:type user_id: str
|
|
:param client_id: id of client containing role (not client-id)
|
|
:type client_id: str
|
|
:param roles: roles list or role to delete (use RoleRepresentation)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": user_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_authentication_flows(self):
|
|
"""Get authentication flows asynchronously.
|
|
|
|
Returns all flow details
|
|
|
|
AuthenticationFlowRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationflowrepresentation
|
|
|
|
:return: Keycloak server response (AuthenticationFlowRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_FLOWS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_authentication_flow_for_id(self, flow_id):
|
|
"""Get one authentication flow by it's id asynchronously.
|
|
|
|
Returns all flow details
|
|
|
|
AuthenticationFlowRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationflowrepresentation
|
|
|
|
:param flow_id: the id of a flow NOT it's alias
|
|
:type flow_id: str
|
|
:return: Keycloak server response (AuthenticationFlowRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "flow-id": flow_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_FLOWS_ALIAS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_create_authentication_flow(self, payload, skip_exists=False):
|
|
"""Create a new authentication flow asynchronously.
|
|
|
|
AuthenticationFlowRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationflowrepresentation
|
|
|
|
:param payload: AuthenticationFlowRepresentation
|
|
:type payload: dict
|
|
:param skip_exists: Do not raise an error if authentication flow already exists
|
|
:type skip_exists: bool
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_FLOWS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
async def a_copy_authentication_flow(self, payload, flow_alias):
|
|
"""Copy existing authentication flow under a new name asynchronously.
|
|
|
|
The new name is given as 'newName' attribute of the passed payload.
|
|
|
|
:param payload: JSON containing 'newName' attribute
|
|
:type payload: dict
|
|
:param flow_alias: the flow alias
|
|
:type flow_alias: str
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "flow-alias": flow_alias}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_FLOWS_COPY.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
async def a_delete_authentication_flow(self, flow_id):
|
|
"""Delete authentication flow asynchronously.
|
|
|
|
AuthenticationInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationinforepresentation
|
|
|
|
:param flow_id: authentication flow id
|
|
:type flow_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": flow_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_FLOW.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_authentication_flow_executions(self, flow_alias):
|
|
"""Get authentication flow executions asynchronously.
|
|
|
|
Returns all execution steps
|
|
|
|
:param flow_alias: the flow alias
|
|
:type flow_alias: str
|
|
:return: Response(json)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "flow-alias": flow_alias}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_update_authentication_flow_executions(self, payload, flow_alias):
|
|
"""Update an authentication flow execution asynchronously.
|
|
|
|
AuthenticationExecutionInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationexecutioninforepresentation
|
|
|
|
:param payload: AuthenticationExecutionInfoRepresentation
|
|
:type payload: dict
|
|
:param flow_alias: The flow alias
|
|
:type flow_alias: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "flow-alias": flow_alias}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTIONS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[202, 204])
|
|
|
|
async def a_get_authentication_flow_execution(self, execution_id):
|
|
"""Get authentication flow execution asynchronously.
|
|
|
|
AuthenticationExecutionInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationexecutioninforepresentation
|
|
|
|
:param execution_id: the execution ID
|
|
:type execution_id: str
|
|
:return: Response(json)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": execution_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTION.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_create_authentication_flow_execution(self, payload, flow_alias):
|
|
"""Create an authentication flow execution asynchronously.
|
|
|
|
AuthenticationExecutionInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationexecutioninforepresentation
|
|
|
|
:param payload: AuthenticationExecutionInfoRepresentation
|
|
:type payload: dict
|
|
:param flow_alias: The flow alias
|
|
:type flow_alias: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "flow-alias": flow_alias}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTIONS_EXECUTION.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
async def a_delete_authentication_flow_execution(self, execution_id):
|
|
"""Delete authentication flow execution asynchronously.
|
|
|
|
AuthenticationExecutionInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationexecutioninforepresentation
|
|
|
|
:param execution_id: keycloak client id (not oauth client-id)
|
|
:type execution_id: str
|
|
:return: Keycloak server response (json)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": execution_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTION.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_create_authentication_flow_subflow(self, payload, flow_alias, skip_exists=False):
|
|
"""Create a new sub authentication flow for a given authentication flow asynchronously.
|
|
|
|
AuthenticationFlowRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticationflowrepresentation
|
|
|
|
:param payload: AuthenticationFlowRepresentation
|
|
:type payload: dict
|
|
:param flow_alias: The flow alias
|
|
:type flow_alias: str
|
|
:param skip_exists: Do not raise an error if authentication flow already exists
|
|
:type skip_exists: bool
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "flow-alias": flow_alias}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTIONS_FLOW.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
async def a_get_authenticator_providers(self):
|
|
"""Get authenticator providers list asynchronously.
|
|
|
|
:return: Authenticator providers
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_PROVIDERS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_authenticator_provider_config_description(self, provider_id):
|
|
"""Get authenticator's provider configuration description asynchronously.
|
|
|
|
AuthenticatorConfigInfoRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticatorconfiginforepresentation
|
|
|
|
:param provider_id: Provider Id
|
|
:type provider_id: str
|
|
:return: AuthenticatorConfigInfoRepresentation
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "provider-id": provider_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_CONFIG_DESCRIPTION.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_authenticator_config(self, config_id):
|
|
"""Get authenticator configuration asynchronously.
|
|
|
|
Returns all configuration details.
|
|
|
|
:param config_id: Authenticator config id
|
|
:type config_id: str
|
|
:return: Response(json)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": config_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_CONFIG.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_update_authenticator_config(self, payload, config_id):
|
|
"""Update an authenticator configuration asynchronously.
|
|
|
|
AuthenticatorConfigRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authenticatorconfigrepresentation
|
|
|
|
:param payload: AuthenticatorConfigRepresentation
|
|
:type payload: dict
|
|
:param config_id: Authenticator config id
|
|
:type config_id: str
|
|
:return: Response(json)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": config_id}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_CONFIG.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_delete_authenticator_config(self, config_id):
|
|
"""Delete a authenticator configuration asynchronously.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_authentication_management_resource
|
|
|
|
:param config_id: Authenticator config id
|
|
:type config_id: str
|
|
:return: Keycloak server Response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": config_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_CONFIG.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_sync_users(self, storage_id, action):
|
|
"""Trigger user sync from provider asynchronously.
|
|
|
|
:param storage_id: The id of the user storage provider
|
|
:type storage_id: str
|
|
:param action: Action can be "triggerFullSync" or "triggerChangedUsersSync"
|
|
:type action: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
data = {"action": action}
|
|
params_query = {"action": action}
|
|
|
|
params_path = {"realm-name": self.connection.realm_name, "id": storage_id}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_USER_STORAGE.format(**params_path),
|
|
data=json.dumps(data),
|
|
**params_query,
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError)
|
|
|
|
async def a_get_client_scopes(self):
|
|
"""Get client scopes asynchronously.
|
|
|
|
Get representation of the client scopes for the realm where we are connected to
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getclientscopes
|
|
|
|
:return: Keycloak server response Array of (ClientScopeRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_scope(self, client_scope_id):
|
|
"""Get client scope asynchronously.
|
|
|
|
Get representation of the client scopes for the realm where we are connected to
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getclientscopes
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:type client_scope_id: str
|
|
:return: Keycloak server response (ClientScopeRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "scope-id": client_scope_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_scope_by_name(self, client_scope_name):
|
|
"""Get client scope by name asynchronously.
|
|
|
|
Get representation of the client scope identified by the client scope name.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getclientscopes
|
|
:param client_scope_name: (str) Name of the client scope
|
|
:type client_scope_name: str
|
|
:returns: ClientScopeRepresentation or None
|
|
:rtype: dict
|
|
"""
|
|
client_scopes = await self.a_get_client_scopes()
|
|
for client_scope in client_scopes:
|
|
if client_scope["name"] == client_scope_name:
|
|
return client_scope
|
|
|
|
return None
|
|
|
|
async def a_create_client_scope(self, payload, skip_exists=False):
|
|
"""Create a client scope asynchronously.
|
|
|
|
ClientScopeRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getclientscopes
|
|
|
|
:param payload: ClientScopeRepresentation
|
|
:type payload: dict
|
|
:param skip_exists: If true then do not raise an error if client scope already exists
|
|
:type skip_exists: bool
|
|
:return: Client scope id
|
|
:rtype: str
|
|
"""
|
|
if skip_exists:
|
|
exists = await self.a_get_client_scope_by_name(client_scope_name=payload["name"])
|
|
|
|
if exists is not None:
|
|
return exists["id"]
|
|
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
async def a_update_client_scope(self, client_scope_id, payload):
|
|
"""Update a client scope asynchronously.
|
|
|
|
ClientScopeRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_client_scopes_resource
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:type client_scope_id: str
|
|
:param payload: ClientScopeRepresentation
|
|
:type payload: dict
|
|
:return: Keycloak server response (ClientScopeRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "scope-id": client_scope_id}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_delete_client_scope(self, client_scope_id):
|
|
"""Delete existing client scope asynchronously.
|
|
|
|
ClientScopeRepresentation:
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_client_scopes_resource
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:type client_scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "scope-id": client_scope_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_mappers_from_client_scope(self, client_scope_id):
|
|
"""Get a list of all mappers connected to the client scope asynchronously.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_protocol_mappers_resource
|
|
:param client_scope_id: Client scope id
|
|
:type client_scope_id: str
|
|
:returns: Keycloak server response (ProtocolMapperRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "scope-id": client_scope_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES_ADD_MAPPER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
async def a_add_mapper_to_client_scope(self, client_scope_id, payload):
|
|
"""Add a mapper to a client scope asynchronously.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_create_mapper
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:type client_scope_id: str
|
|
:param payload: ProtocolMapperRepresentation
|
|
:type payload: dict
|
|
:return: Keycloak server Response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "scope-id": client_scope_id}
|
|
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES_ADD_MAPPER.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
async def a_delete_mapper_from_client_scope(self, client_scope_id, protocol_mapper_id):
|
|
"""Delete a mapper from a client scope asynchronously.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_delete_mapper
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:type client_scope_id: str
|
|
:param protocol_mapper_id: Protocol mapper id
|
|
:type protocol_mapper_id: str
|
|
:return: Keycloak server Response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"scope-id": client_scope_id,
|
|
"protocol-mapper-id": protocol_mapper_id,
|
|
}
|
|
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES_MAPPERS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_update_mapper_in_client_scope(self, client_scope_id, protocol_mapper_id, payload):
|
|
"""Update an existing protocol mapper in a client scope asynchronously.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_protocol_mappers_resource
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:type client_scope_id: str
|
|
:param protocol_mapper_id: The id of the protocol mapper which exists in the client scope
|
|
and should to be updated
|
|
:type protocol_mapper_id: str
|
|
:param payload: ProtocolMapperRepresentation
|
|
:type payload: dict
|
|
:return: Keycloak server Response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"scope-id": client_scope_id,
|
|
"protocol-mapper-id": protocol_mapper_id,
|
|
}
|
|
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES_MAPPERS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_get_default_default_client_scopes(self):
|
|
"""Get default default client scopes asynchronously.
|
|
|
|
Return list of default default client scopes
|
|
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_DEFAULT_DEFAULT_CLIENT_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_delete_default_default_client_scope(self, scope_id):
|
|
"""Delete default default client scope asynchronously.
|
|
|
|
:param scope_id: default default client scope id
|
|
:type scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": scope_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_DEFAULT_DEFAULT_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_add_default_default_client_scope(self, scope_id):
|
|
"""Add default default client scope asynchronously.
|
|
|
|
:param scope_id: default default client scope id
|
|
:type scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": scope_id}
|
|
payload = {"realm": self.connection.realm_name, "clientScopeId": scope_id}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_DEFAULT_DEFAULT_CLIENT_SCOPE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_get_default_optional_client_scopes(self):
|
|
"""Get default optional client scopes asynchronously.
|
|
|
|
Return list of default optional client scopes
|
|
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_DEFAULT_OPTIONAL_CLIENT_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_delete_default_optional_client_scope(self, scope_id):
|
|
"""Delete default optional client scope asynchronously.
|
|
|
|
:param scope_id: default optional client scope id
|
|
:type scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": scope_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_DEFAULT_OPTIONAL_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_add_default_optional_client_scope(self, scope_id):
|
|
"""Add default optional client scope asynchronously.
|
|
|
|
:param scope_id: default optional client scope id
|
|
:type scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": scope_id}
|
|
payload = {"realm": self.connection.realm_name, "clientScopeId": scope_id}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_DEFAULT_OPTIONAL_CLIENT_SCOPE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_add_client_specific_roles_to_client_scope(
|
|
self, client_scope_id, client_roles_owner_id, roles
|
|
):
|
|
"""Assign client roles to a client scope asynchronously.
|
|
|
|
To assign roles to a client's dedicated scope, use
|
|
a_assign_client_roles_to_client_scope.
|
|
|
|
:param client_scope_id: client scope id
|
|
:type client_scope_id: str
|
|
:param client_roles_owner_id: id of client (not client-id) who has the roles
|
|
:type client_roles_owner_id: str
|
|
:param roles: roles list or role (use RoleRepresentation, must include id and name)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"scope-id": client_scope_id,
|
|
"client-id": client_roles_owner_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_ROLE_MAPPINGS_CLIENT.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
async def a_remove_client_specific_roles_of_client_scope(
|
|
self, client_scope_id, client_roles_owner_id, roles
|
|
):
|
|
"""Delete client roles of a client scope asynchronously.
|
|
|
|
To delete roles from a client's dedicated scope,
|
|
use a_delete_client_roles_of_client_scope.
|
|
|
|
:param client_scope_id: client scope id
|
|
:type client_scope_id: str
|
|
:param client_roles_owner_id: id of client (not client-id) who has the roles
|
|
:type client_roles_owner_id: str
|
|
:param roles: roles list or role (use RoleRepresentation, must include id and name)
|
|
:type roles: list
|
|
:return: Keycloak server response
|
|
:rtype: dict
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"scope-id": client_scope_id,
|
|
"client-id": client_roles_owner_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_ROLE_MAPPINGS_CLIENT.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_client_specific_roles_of_client_scope(
|
|
self, client_scope_id, client_roles_owner_id
|
|
):
|
|
"""Get all client roles for a client scope asynchronously.
|
|
|
|
To get roles for a client's dedicated scope,
|
|
use a_get_client_roles_of_client_scope.
|
|
|
|
:param client_scope_id: client scope id
|
|
:type client_scope_id: str
|
|
:param client_roles_owner_id: id of client (not client-id) who has the roles
|
|
:type client_roles_owner_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"scope-id": client_scope_id,
|
|
"client-id": client_roles_owner_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_ROLE_MAPPINGS_CLIENT.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_all_roles_of_client_scope(self, client_scope_id):
|
|
"""Get all client roles for a client scope.
|
|
|
|
To get roles for a client's dedicated scope,
|
|
use a_get_client_roles_of_client_scope.
|
|
|
|
:param client_scope_id: client scope id
|
|
:type client_scope_id: str
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"scope-id": client_scope_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE_ROLE_MAPPINGS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_mappers_from_client(self, client_id):
|
|
"""List of all client mappers asynchronously.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_protocolmapperrepresentation
|
|
|
|
:param client_id: Client id
|
|
:type client_id: str
|
|
:returns: KeycloakServerResponse (list of ProtocolMapperRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_PROTOCOL_MAPPERS.format(**params_path)
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[200])
|
|
|
|
async def a_add_mapper_to_client(self, client_id, payload):
|
|
"""Add a mapper to a client asynchronously.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_create_mapper
|
|
|
|
:param client_id: The id of the client
|
|
:type client_id: str
|
|
:param payload: ProtocolMapperRepresentation
|
|
:type payload: dict
|
|
:return: Keycloak server Response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_PROTOCOL_MAPPERS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
async def a_update_client_mapper(self, client_id, mapper_id, payload):
|
|
"""Update client mapper asynchronously.
|
|
|
|
:param client_id: The id of the client
|
|
:type client_id: str
|
|
:param mapper_id: The id of the mapper to be deleted
|
|
:type mapper_id: str
|
|
:param payload: ProtocolMapperRepresentation
|
|
:type payload: dict
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"protocol-mapper-id": mapper_id,
|
|
}
|
|
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_PROTOCOL_MAPPER.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_remove_client_mapper(self, client_id, client_mapper_id):
|
|
"""Remove a mapper from the client asynchronously.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_protocol_mappers_resource
|
|
|
|
:param client_id: The id of the client
|
|
:type client_id: str
|
|
:param client_mapper_id: The id of the mapper to be deleted
|
|
:type client_mapper_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"protocol-mapper-id": client_mapper_id,
|
|
}
|
|
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_PROTOCOL_MAPPER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_generate_client_secrets(self, client_id):
|
|
"""Generate a new secret for the client asynchronously.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_regeneratesecret
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SECRETS.format(**params_path), data=None
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError)
|
|
|
|
async def a_get_client_secrets(self, client_id):
|
|
"""Get representation of the client secrets asynchronously.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getclientsecret
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:type client_id: str
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SECRETS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_components(self, query=None):
|
|
"""Get components asynchronously.
|
|
|
|
Return a list of components, filtered according to query parameters
|
|
|
|
ComponentRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_componentrepresentation
|
|
|
|
:param query: Query parameters (optional)
|
|
:type query: dict
|
|
:return: components list
|
|
:rtype: list
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_COMPONENTS.format(**params_path), data=None, **query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_create_component(self, payload):
|
|
"""Create a new component asynchronously.
|
|
|
|
ComponentRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_componentrepresentation
|
|
|
|
:param payload: ComponentRepresentation
|
|
:type payload: dict
|
|
:return: Component id
|
|
:rtype: str
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_COMPONENTS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
async def a_get_component(self, component_id):
|
|
"""Get representation of the component asynchronously.
|
|
|
|
:param component_id: Component id
|
|
|
|
ComponentRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_componentrepresentation
|
|
|
|
:param component_id: Id of the component
|
|
:type component_id: str
|
|
:return: ComponentRepresentation
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "component-id": component_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_COMPONENT.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_update_component(self, component_id, payload):
|
|
"""Update the component asynchronously.
|
|
|
|
:param component_id: Component id
|
|
:type component_id: str
|
|
:param payload: ComponentRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_componentrepresentation
|
|
:type payload: dict
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "component-id": component_id}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_COMPONENT.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_delete_component(self, component_id):
|
|
"""Delete the component asynchronously.
|
|
|
|
:param component_id: Component id
|
|
:type component_id: str
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "component-id": component_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_COMPONENT.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
async def a_get_keys(self):
|
|
"""Get keys asynchronously.
|
|
|
|
Return a list of keys, filtered according to query parameters
|
|
|
|
KeysMetadataRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_key_resource
|
|
|
|
:return: keys list
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_KEYS.format(**params_path), data=None
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_admin_events(self, query=None):
|
|
"""Get Administrative events asynchronously.
|
|
|
|
Return a list of events, filtered according to query parameters
|
|
|
|
AdminEvents Representation array
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getevents
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_get_adminrealmsrealmadmin_events
|
|
|
|
:param query: Additional query parameters
|
|
:type query: dict
|
|
:return: events list
|
|
:rtype: list
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_ADMIN_EVENTS.format(**params_path), data=None, **query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_events(self, query=None):
|
|
"""Get events asynchronously.
|
|
|
|
Return a list of events, filtered according to query parameters
|
|
|
|
EventRepresentation array
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_eventrepresentation
|
|
|
|
:param query: Additional query parameters
|
|
:type query: dict
|
|
:return: events list
|
|
:rtype: list
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_USER_EVENTS.format(**params_path), data=None, **query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_set_events(self, payload):
|
|
"""Set realm events configuration asynchronously.
|
|
|
|
RealmEventsConfigRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_realmeventsconfigrepresentation
|
|
|
|
:param payload: Payload object for the events configuration
|
|
:type payload: dict
|
|
:return: Http response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_EVENTS_CONFIG.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
async def a_get_client_all_sessions(self, client_id):
|
|
"""Get sessions associated with the client asynchronously.
|
|
|
|
UserSessionRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_usersessionrepresentation
|
|
|
|
:param client_id: id of client
|
|
:type client_id: str
|
|
:return: UserSessionRepresentation
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_ALL_SESSIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_sessions_stats(self):
|
|
"""Get current session count for all clients with active sessions asynchronously.
|
|
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_getclientsessionstats
|
|
|
|
:return: Dict of clients and session count
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SESSION_STATS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_management_permissions(self, client_id):
|
|
"""Get management permissions for a client asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_MANAGEMENT_PERMISSIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_update_client_management_permissions(self, payload, client_id):
|
|
"""Update management permissions for a client asynchronously.
|
|
|
|
ManagementPermissionReference
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_managementpermissionreference
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"enabled": true
|
|
}
|
|
|
|
:param payload: ManagementPermissionReference
|
|
:type payload: dict
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_MANAGEMENT_PERMISSIONS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[200])
|
|
|
|
async def a_get_client_authz_policy_scopes(self, client_id, policy_id):
|
|
"""Get scopes for a given policy asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param policy_id: No Document
|
|
:type policy_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"policy-id": policy_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICY_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_authz_policy_resources(self, client_id, policy_id):
|
|
"""Get resources for a given policy asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param policy_id: No Document
|
|
:type policy_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"policy-id": policy_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICY_RESOURCES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_client_authz_scope_permission(self, client_id, scope_id):
|
|
"""Get permissions for a given scope asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param scope_id: No Document
|
|
:type scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"scope-id": scope_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SCOPE_PERMISSION.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_create_client_authz_scope_permission(self, payload, client_id):
|
|
"""Create permissions for a authz scope asynchronously.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"name": "My Permission Name",
|
|
"type": "scope",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"resources": [some_resource_id],
|
|
"scopes": [some_scope_id],
|
|
"policies": [some_policy_id],
|
|
}
|
|
|
|
:param payload: No Document
|
|
:type payload: dict
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_ADD_CLIENT_AUTHZ_SCOPE_PERMISSION.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
async def a_update_client_authz_scope_permission(self, payload, client_id, scope_id):
|
|
"""Update permissions for a given scope asynchronously.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"id": scope_id,
|
|
"name": "My Permission Name",
|
|
"type": "scope",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"resources": [some_resource_id],
|
|
"scopes": [some_scope_id],
|
|
"policies": [some_policy_id],
|
|
}
|
|
|
|
:param payload: No Document
|
|
:type payload: dict
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param scope_id: No Document
|
|
:type scope_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"scope-id": scope_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SCOPE_PERMISSION.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[201])
|
|
|
|
async def a_update_client_authz_resource_permission(self, payload, client_id, resource_id):
|
|
"""Update permissions for a given resource asynchronously.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"id": resource_id,
|
|
"name": "My Permission Name",
|
|
"type": "resource",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"resources": [some_resource_id],
|
|
"scopes": [],
|
|
"policies": [some_policy_id],
|
|
}
|
|
|
|
:param payload: No Document
|
|
:type payload: dict
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param resource_id: No Document
|
|
:type resource_id: str
|
|
:return: Keycloak server response
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"resource-id": resource_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCE_PERMISSION.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[201])
|
|
|
|
async def a_get_client_authz_client_policies(self, client_id):
|
|
"""Get policies for a given client asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_CLIENT_POLICY.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
async def a_get_client_authz_permission_associated_policies(self, client_id, policy_id):
|
|
"""Get associated policies for a given client permission asynchronously.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:param policy_id: id in PolicyRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_policyrepresentation
|
|
:type policy_id: str
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"policy-id": policy_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_CLIENT_POLICY_ASSOCIATED_POLICIES.format(
|
|
**params_path
|
|
)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
async def a_create_client_authz_client_policy(self, payload, client_id):
|
|
"""Create a new policy for a given client asynchronously.
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"type": "client",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"name": "My Policy",
|
|
"clients": [other_client_id],
|
|
}
|
|
|
|
:param payload: No Document
|
|
:type payload: dict
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/24.0.2/rest-api/index.html#_clientrepresentation
|
|
:type client_id: str
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
:rtype: bytes
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": client_id}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_CLIENT_POLICY.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
async def a_get_composite_client_roles_of_group(
|
|
self, client_id, group_id, brief_representation=True
|
|
):
|
|
"""Get the composite client roles of the given group for the given client asynchronously.
|
|
|
|
:param client_id: id of the client.
|
|
:type client_id: str
|
|
:param group_id: id of the group.
|
|
:type group_id: str
|
|
:param brief_representation: whether to omit attributes in the response
|
|
:type brief_representation: bool
|
|
:return: the composite client roles of the group (list of RoleRepresentation).
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": group_id,
|
|
"client-id": client_id,
|
|
}
|
|
params = {"briefRepresentation": brief_representation}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_GROUPS_CLIENT_ROLES_COMPOSITE.format(**params_path), **params
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_get_role_client_level_children(self, client_id, role_id):
|
|
"""Get the child roles async of which the given composite client role is composed of.
|
|
|
|
:param client_id: id of the client.
|
|
:type client_id: str
|
|
:param role_id: id of the role.
|
|
:type role_id: str
|
|
:return: the child roles (list of RoleRepresentation).
|
|
:rtype: list
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"role-id": role_id,
|
|
"client-id": client_id,
|
|
}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE_CHILDREN.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_upload_certificate(self, client_id, certcont):
|
|
"""Upload a new certificate for the client asynchronously.
|
|
|
|
:param client_id: id of the client.
|
|
:type client_id: str
|
|
:param certcont: the content of the certificate.
|
|
:type certcont: str
|
|
:return: dictionary {"certificate": "<certcont>"},
|
|
where <certcont> is the content of the uploaded certificate.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.connection.realm_name,
|
|
"id": client_id,
|
|
"attr": "jwt.credential",
|
|
}
|
|
m = MultipartEncoder(fields={"keystoreFormat": "Certificate PEM", "file": certcont})
|
|
new_headers = copy.deepcopy(self.connection.headers)
|
|
new_headers["Content-Type"] = m.content_type
|
|
self.connection.headers = new_headers
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_CERT_UPLOAD.format(**params_path),
|
|
data=m,
|
|
headers=new_headers,
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError)
|
|
|
|
async def a_get_required_action_by_alias(self, action_alias):
|
|
"""Get a required action by its alias asynchronously.
|
|
|
|
:param action_alias: the alias of the required action.
|
|
:type action_alias: str
|
|
:return: the required action (RequiredActionProviderRepresentation).
|
|
:rtype: dict
|
|
"""
|
|
actions = await self.a_get_required_actions()
|
|
for a in actions:
|
|
if a["alias"] == action_alias:
|
|
return a
|
|
return None
|
|
|
|
async def a_get_required_actions(self):
|
|
"""Get the required actions for the realms asynchronously.
|
|
|
|
:return: the required actions (list of RequiredActionProviderRepresentation).
|
|
:rtype: list
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_REQUIRED_ACTIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_update_required_action(self, action_alias, payload):
|
|
"""Update a required action asynchronously.
|
|
|
|
:param action_alias: the action alias.
|
|
:type action_alias: str
|
|
:param payload: the new required action (RequiredActionProviderRepresentation).
|
|
:type payload: dict
|
|
:return: empty dictionary.
|
|
:rtype: dict
|
|
"""
|
|
if not isinstance(payload, str):
|
|
payload = json.dumps(payload)
|
|
params_path = {"realm-name": self.connection.realm_name, "action-alias": action_alias}
|
|
data_raw = await self.connection.a_raw_put(
|
|
urls_patterns.URL_ADMIN_REQUIRED_ACTIONS_ALIAS.format(**params_path), data=payload
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
async def a_get_bruteforce_detection_status(self, user_id):
|
|
"""Get bruteforce detection status for user asynchronously.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:return: Bruteforce status.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_get(
|
|
urls_patterns.URL_ADMIN_ATTACK_DETECTION_USER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
async def a_clear_bruteforce_attempts_for_user(self, user_id):
|
|
"""Clear bruteforce attempts for user asynchronously.
|
|
|
|
:param user_id: User id
|
|
:type user_id: str
|
|
:return: empty dictionary.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name, "id": user_id}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_ATTACK_DETECTION_USER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError)
|
|
|
|
async def a_clear_all_bruteforce_attempts(self):
|
|
"""Clear bruteforce attempts for all users in realm asynchronously.
|
|
|
|
:return: empty dictionary.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_delete(
|
|
urls_patterns.URL_ADMIN_ATTACK_DETECTION.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError)
|
|
|
|
async def a_clear_keys_cache(self):
|
|
"""Clear keys cache asynchronously.
|
|
|
|
:return: empty dictionary.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLEAR_KEYS_CACHE.format(**params_path), data=""
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
async def a_clear_realm_cache(self):
|
|
"""Clear realm cache asynchronously.
|
|
|
|
:return: empty dictionary.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLEAR_REALM_CACHE.format(**params_path), data=""
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
async def a_clear_user_cache(self):
|
|
"""Clear user cache asynchronously.
|
|
|
|
:return: empty dictionary.
|
|
:rtype: dict
|
|
"""
|
|
params_path = {"realm-name": self.connection.realm_name}
|
|
data_raw = await self.connection.a_raw_post(
|
|
urls_patterns.URL_ADMIN_CLEAR_USER_CACHE.format(**params_path), data=""
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|