You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
2812 lines
109 KiB
2812 lines
109 KiB
# -*- coding: utf-8 -*-
|
|
#
|
|
# The MIT License (MIT)
|
|
#
|
|
# Copyright (C) 2017 Marcos Pereira <marcospereira.mpj@gmail.com>
|
|
#
|
|
# Permission is hereby granted, free of charge, to any person obtaining a copy of
|
|
# this software and associated documentation files (the "Software"), to deal in
|
|
# the Software without restriction, including without limitation the rights to
|
|
# use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
|
# the Software, and to permit persons to whom the Software is furnished to do so,
|
|
# subject to the following conditions:
|
|
#
|
|
# The above copyright notice and this permission notice shall be included in all
|
|
# copies or substantial portions of the Software.
|
|
#
|
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
|
# FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
|
# COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
|
# IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
# Unless otherwise stated in the comments, "id", in e.g. user_id, refers to the
|
|
# internal Keycloak server ID, usually a uuid string
|
|
|
|
"""The keycloak admin module."""
|
|
|
|
import json
|
|
from builtins import isinstance
|
|
from typing import Iterable
|
|
|
|
from . import urls_patterns
|
|
from .connection import ConnectionManager
|
|
from .exceptions import (
|
|
KeycloakDeleteError,
|
|
KeycloakGetError,
|
|
KeycloakPostError,
|
|
KeycloakPutError,
|
|
raise_error_from_response,
|
|
)
|
|
from .keycloak_openid import KeycloakOpenID
|
|
|
|
|
|
class KeycloakAdmin:
|
|
"""Keycloak Admin client.
|
|
|
|
:param server_url: Keycloak server url
|
|
:param username: admin username
|
|
:param password: admin password
|
|
:param totp: Time based OTP
|
|
:param realm_name: realm name
|
|
:param client_id: client id
|
|
:param verify: True if want check connection SSL
|
|
:param client_secret_key: client secret key
|
|
(optional, required only for access type confidential)
|
|
:param custom_headers: dict of custom header to pass to each HTML request
|
|
:param user_realm_name: The realm name of the user, if different from realm_name
|
|
:param auto_refresh_token: list of methods that allows automatic token refresh.
|
|
Ex: ['get', 'put', 'post', 'delete']
|
|
:param timeout: connection timeout in seconds
|
|
"""
|
|
|
|
PAGE_SIZE = 100
|
|
|
|
_server_url = None
|
|
_username = None
|
|
_password = None
|
|
_totp = None
|
|
_realm_name = None
|
|
_client_id = None
|
|
_verify = None
|
|
_client_secret_key = None
|
|
_auto_refresh_token = None
|
|
_connection = None
|
|
_token = None
|
|
_custom_headers = None
|
|
_user_realm_name = None
|
|
|
|
def __init__(
|
|
self,
|
|
server_url,
|
|
username=None,
|
|
password=None,
|
|
totp=None,
|
|
realm_name="master",
|
|
client_id="admin-cli",
|
|
verify=True,
|
|
client_secret_key=None,
|
|
custom_headers=None,
|
|
user_realm_name=None,
|
|
auto_refresh_token=None,
|
|
timeout=60,
|
|
):
|
|
"""Init method."""
|
|
self.server_url = server_url
|
|
self.username = username
|
|
self.password = password
|
|
self.totp = totp
|
|
self.realm_name = realm_name
|
|
self.client_id = client_id
|
|
self.verify = verify
|
|
self.client_secret_key = client_secret_key
|
|
self.auto_refresh_token = auto_refresh_token or []
|
|
self.user_realm_name = user_realm_name
|
|
self.custom_headers = custom_headers
|
|
self.timeout = timeout
|
|
|
|
# Get token Admin
|
|
self.get_token()
|
|
|
|
@property
|
|
def server_url(self):
|
|
"""Get server url."""
|
|
return self._server_url
|
|
|
|
@server_url.setter
|
|
def server_url(self, value):
|
|
self._server_url = value
|
|
|
|
@property
|
|
def realm_name(self):
|
|
"""Get realm name."""
|
|
return self._realm_name
|
|
|
|
@realm_name.setter
|
|
def realm_name(self, value):
|
|
self._realm_name = value
|
|
|
|
@property
|
|
def connection(self):
|
|
"""Get connection."""
|
|
return self._connection
|
|
|
|
@connection.setter
|
|
def connection(self, value):
|
|
self._connection = value
|
|
|
|
@property
|
|
def client_id(self):
|
|
"""Get client id."""
|
|
return self._client_id
|
|
|
|
@client_id.setter
|
|
def client_id(self, value):
|
|
self._client_id = value
|
|
|
|
@property
|
|
def client_secret_key(self):
|
|
"""Get client secret key."""
|
|
return self._client_secret_key
|
|
|
|
@client_secret_key.setter
|
|
def client_secret_key(self, value):
|
|
self._client_secret_key = value
|
|
|
|
@property
|
|
def verify(self):
|
|
"""Get verify."""
|
|
return self._verify
|
|
|
|
@verify.setter
|
|
def verify(self, value):
|
|
self._verify = value
|
|
|
|
@property
|
|
def username(self):
|
|
"""Get username."""
|
|
return self._username
|
|
|
|
@username.setter
|
|
def username(self, value):
|
|
self._username = value
|
|
|
|
@property
|
|
def password(self):
|
|
"""Get password."""
|
|
return self._password
|
|
|
|
@password.setter
|
|
def password(self, value):
|
|
self._password = value
|
|
|
|
@property
|
|
def totp(self):
|
|
"""Get totp."""
|
|
return self._totp
|
|
|
|
@totp.setter
|
|
def totp(self, value):
|
|
self._totp = value
|
|
|
|
@property
|
|
def token(self):
|
|
"""Get token."""
|
|
return self._token
|
|
|
|
@token.setter
|
|
def token(self, value):
|
|
self._token = value
|
|
|
|
@property
|
|
def auto_refresh_token(self):
|
|
"""Get auto refresh token."""
|
|
return self._auto_refresh_token
|
|
|
|
@property
|
|
def user_realm_name(self):
|
|
"""Get user realm name."""
|
|
return self._user_realm_name
|
|
|
|
@user_realm_name.setter
|
|
def user_realm_name(self, value):
|
|
self._user_realm_name = value
|
|
|
|
@property
|
|
def custom_headers(self):
|
|
"""Get custom headers."""
|
|
return self._custom_headers
|
|
|
|
@custom_headers.setter
|
|
def custom_headers(self, value):
|
|
self._custom_headers = value
|
|
|
|
@auto_refresh_token.setter
|
|
def auto_refresh_token(self, value):
|
|
allowed_methods = {"get", "post", "put", "delete"}
|
|
if not isinstance(value, Iterable):
|
|
raise TypeError(
|
|
"Expected a list of strings among {allowed}".format(allowed=allowed_methods)
|
|
)
|
|
if not all(method in allowed_methods for method in value):
|
|
raise TypeError(
|
|
"Unexpected method in auto_refresh_token, accepted methods are {allowed}".format(
|
|
allowed=allowed_methods
|
|
)
|
|
)
|
|
|
|
self._auto_refresh_token = value
|
|
|
|
def __fetch_all(self, url, query=None):
|
|
"""Paginate over get requests.
|
|
|
|
Wrapper function to paginate GET requests.
|
|
|
|
:param url: The url on which the query is executed
|
|
:param query: Existing query parameters (optional)
|
|
|
|
:return: Combined results of paginated queries
|
|
"""
|
|
results = []
|
|
|
|
# initalize query if it was called with None
|
|
if not query:
|
|
query = {}
|
|
page = 0
|
|
query["max"] = self.PAGE_SIZE
|
|
|
|
# fetch until we can
|
|
while True:
|
|
query["first"] = page * self.PAGE_SIZE
|
|
partial_results = raise_error_from_response(
|
|
self.raw_get(url, **query), KeycloakGetError
|
|
)
|
|
if not partial_results:
|
|
break
|
|
results.extend(partial_results)
|
|
if len(partial_results) < query["max"]:
|
|
break
|
|
page += 1
|
|
return results
|
|
|
|
def __fetch_paginated(self, url, query=None):
|
|
query = query or {}
|
|
|
|
return raise_error_from_response(self.raw_get(url, **query), KeycloakGetError)
|
|
|
|
def import_realm(self, payload):
|
|
"""Import a new realm from a RealmRepresentation.
|
|
|
|
Realm name must be unique.
|
|
|
|
RealmRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_realmrepresentation
|
|
|
|
:param payload: RealmRepresentation
|
|
|
|
:return: RealmRepresentation
|
|
"""
|
|
data_raw = self.raw_post(urls_patterns.URL_ADMIN_REALMS, data=json.dumps(payload))
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def export_realm(self, export_clients=False, export_groups_and_role=False):
|
|
"""Export the realm configurations in the json format.
|
|
|
|
RealmRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_partialexport
|
|
|
|
:param export-clients: Skip if not want to export realm clients
|
|
:param export-groups-and-roles: Skip if not want to export realm groups and roles
|
|
|
|
:return: realm configurations JSON
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.realm_name,
|
|
"export-clients": export_clients,
|
|
"export-groups-and-roles": export_groups_and_role,
|
|
}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_REALM_EXPORT.format(**params_path), data=""
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError)
|
|
|
|
def get_realms(self):
|
|
"""List all realms in Keycloak deployment.
|
|
|
|
:return: realms list
|
|
"""
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_REALMS)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_realm(self, realm_name):
|
|
"""Get a specific realm.
|
|
|
|
RealmRepresentation:
|
|
https://www.keycloak.org/docs-api/8.0/rest-api/index.html#_realmrepresentation
|
|
|
|
:param realm_name: Realm name (not the realm id)
|
|
:return: RealmRepresentation
|
|
"""
|
|
params_path = {"realm-name": realm_name}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_REALM.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
def create_realm(self, payload, skip_exists=False):
|
|
"""Create a realm.
|
|
|
|
RealmRepresentation:
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_realmrepresentation
|
|
|
|
:param payload: RealmRepresentation
|
|
:param skip_exists: Skip if Realm already exist.
|
|
:return: Keycloak server response (RealmRepresentation)
|
|
"""
|
|
data_raw = self.raw_post(urls_patterns.URL_ADMIN_REALMS, data=json.dumps(payload))
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
def update_realm(self, realm_name, payload):
|
|
"""Update a realm.
|
|
|
|
This wil only update top level attributes and will ignore any user,
|
|
role, or client information in the payload.
|
|
|
|
RealmRepresentation:
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_realmrepresentation
|
|
|
|
:param realm_name: Realm name (not the realm id)
|
|
:param payload: RealmRepresentation
|
|
:return: Http response
|
|
"""
|
|
params_path = {"realm-name": realm_name}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_REALM.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_realm(self, realm_name):
|
|
"""Delete a realm.
|
|
|
|
:param realm_name: Realm name (not the realm id)
|
|
:return: Http response
|
|
"""
|
|
params_path = {"realm-name": realm_name}
|
|
data_raw = self.raw_delete(urls_patterns.URL_ADMIN_REALM.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_users(self, query=None):
|
|
"""Get all users.
|
|
|
|
Return a list of users, filtered according to query parameters
|
|
|
|
UserRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_userrepresentation
|
|
|
|
:param query: Query parameters (optional)
|
|
:return: users list
|
|
"""
|
|
query = query or {}
|
|
params_path = {"realm-name": self.realm_name}
|
|
url = urls_patterns.URL_ADMIN_USERS.format(**params_path)
|
|
|
|
if "first" in query or "max" in query:
|
|
return self.__fetch_paginated(url, query)
|
|
|
|
return self.__fetch_all(url, query)
|
|
|
|
def create_idp(self, payload):
|
|
"""Create an ID Provider.
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_identityproviderrepresentation
|
|
|
|
:param: payload: IdentityProviderRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_IDPS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def update_idp(self, idp_alias, payload):
|
|
"""Update an ID Provider.
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/15.0/rest-api/index.html#_identity_providers_resource
|
|
|
|
:param: alias: alias for IdP to update
|
|
:param: payload: The IdentityProviderRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "alias": idp_alias}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_IDP.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def add_mapper_to_idp(self, idp_alias, payload):
|
|
"""Create an ID Provider.
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_identityprovidermapperrepresentation
|
|
|
|
:param: idp_alias: alias for Idp to add mapper in
|
|
:param: payload: IdentityProviderMapperRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "idp-alias": idp_alias}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_IDP_MAPPERS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def update_mapper_in_idp(self, idp_alias, mapper_id, payload):
|
|
"""Update an IdP mapper.
|
|
|
|
IdentityProviderMapperRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_update
|
|
|
|
:param: idp_alias: alias for Idp to fetch mappers
|
|
:param: mapper_id: Mapper Id to update
|
|
:param: payload: IdentityProviderMapperRepresentation
|
|
:return: Http response
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.realm_name,
|
|
"idp-alias": idp_alias,
|
|
"mapper-id": mapper_id,
|
|
}
|
|
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_IDP_MAPPER_UPDATE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def get_idp_mappers(self, idp_alias):
|
|
"""Get IDP mappers.
|
|
|
|
Returns a list of ID Providers mappers
|
|
|
|
IdentityProviderMapperRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_getmappers
|
|
|
|
:param: idp_alias: alias for Idp to fetch mappers
|
|
:return: array IdentityProviderMapperRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "idp-alias": idp_alias}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_IDP_MAPPERS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_idps(self):
|
|
"""Get IDPs.
|
|
|
|
Returns a list of ID Providers,
|
|
|
|
IdentityProviderRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_identityproviderrepresentation
|
|
|
|
:return: array IdentityProviderRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_IDPS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def delete_idp(self, idp_alias):
|
|
"""Delete an ID Provider.
|
|
|
|
:param: idp_alias: idp alias name
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "alias": idp_alias}
|
|
data_raw = self.raw_delete(urls_patterns.URL_ADMIN_IDP.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def create_user(self, payload, exist_ok=False):
|
|
"""Create a new user.
|
|
|
|
Username must be unique
|
|
|
|
UserRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_userrepresentation
|
|
|
|
:param payload: UserRepresentation
|
|
:param exist_ok: If False, raise KeycloakGetError if username already exists.
|
|
Otherwise, return existing user ID.
|
|
|
|
:return: UserRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
|
|
if exist_ok:
|
|
exists = self.get_user_id(username=payload["username"])
|
|
|
|
if exists is not None:
|
|
return str(exists)
|
|
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_USERS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
def users_count(self, query=None):
|
|
"""Count users.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_users_resource
|
|
|
|
:param query: (dict) Query parameters for users count
|
|
|
|
:return: counter
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_USERS_COUNT.format(**params_path), **query)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_user_id(self, username):
|
|
"""Get internal keycloak user id from username.
|
|
|
|
This is required for further actions against this user.
|
|
|
|
UserRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_userrepresentation
|
|
|
|
:param username: id in UserRepresentation
|
|
|
|
:return: user_id
|
|
"""
|
|
lower_user_name = username.lower()
|
|
users = self.get_users(query={"search": lower_user_name})
|
|
return next((user["id"] for user in users if user["username"] == lower_user_name), None)
|
|
|
|
def get_user(self, user_id):
|
|
"""Get representation of the user.
|
|
|
|
:param user_id: User id
|
|
|
|
UserRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_userrepresentation
|
|
|
|
:return: UserRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_USER.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_user_groups(self, user_id):
|
|
"""Get user groups.
|
|
|
|
Returns a list of groups of which the user is a member
|
|
|
|
:param user_id: User id
|
|
|
|
:return: user groups list
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_USER_GROUPS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def update_user(self, user_id, payload):
|
|
"""Update the user.
|
|
|
|
:param user_id: User id
|
|
:param payload: UserRepresentation
|
|
|
|
:return: Http response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_USER.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_user(self, user_id):
|
|
"""Delete the user.
|
|
|
|
:param user_id: User id
|
|
|
|
:return: Http response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_delete(urls_patterns.URL_ADMIN_USER.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def set_user_password(self, user_id, password, temporary=True):
|
|
"""Set up a password for the user.
|
|
|
|
If temporary is True, the user will have to reset
|
|
the temporary password next time they log in.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/#_users_resource
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/#_credentialrepresentation
|
|
|
|
:param user_id: User id
|
|
:param password: New password
|
|
:param temporary: True if password is temporary
|
|
|
|
:return:
|
|
"""
|
|
payload = {"type": "password", "temporary": temporary, "value": password}
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_RESET_PASSWORD.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def get_credentials(self, user_id):
|
|
"""Get user credentials.
|
|
|
|
Returns a list of credential belonging to the user.
|
|
|
|
CredentialRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_credentialrepresentation
|
|
|
|
:param: user_id: user id
|
|
:return: Keycloak server response (CredentialRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_USER_CREDENTIALS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def delete_credential(self, user_id, credential_id):
|
|
"""Delete credential of the user.
|
|
|
|
CredentialRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_credentialrepresentation
|
|
|
|
:param: user_id: user id
|
|
:param: credential_id: credential id
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.realm_name,
|
|
"id": user_id,
|
|
"credential_id": credential_id,
|
|
}
|
|
data_raw = self.raw_delete(urls_patterns.URL_ADMIN_USER_CREDENTIAL.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError)
|
|
|
|
def user_logout(self, user_id):
|
|
"""Log out the user.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_logout
|
|
|
|
:param user_id: User id
|
|
:return:
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_USER_LOGOUT.format(**params_path), data=""
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def user_consents(self, user_id):
|
|
"""Get consents granted by the user.
|
|
|
|
UserConsentRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_userconsentrepresentation
|
|
|
|
:param user_id: User id
|
|
:return: List of UserConsentRepresentations
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_USER_CONSENTS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_user_social_logins(self, user_id):
|
|
"""Get user social logins.
|
|
|
|
Returns a list of federated identities/social logins of which the user has been associated
|
|
with
|
|
:param user_id: User id
|
|
:return: federated identities list
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_USER_FEDERATED_IDENTITIES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def add_user_social_login(self, user_id, provider_id, provider_userid, provider_username):
|
|
"""Add a federated identity / social login provider to the user.
|
|
|
|
:param user_id: User id
|
|
:param provider_id: Social login provider id
|
|
:param provider_userid: userid specified by the provider
|
|
:param provider_username: username specified by the provider
|
|
:return:
|
|
"""
|
|
payload = {
|
|
"identityProvider": provider_id,
|
|
"userId": provider_userid,
|
|
"userName": provider_username,
|
|
}
|
|
params_path = {"realm-name": self.realm_name, "id": user_id, "provider": provider_id}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_USER_FEDERATED_IDENTITY.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201, 204])
|
|
|
|
def delete_user_social_login(self, user_id, provider_id):
|
|
"""Delete a federated identity / social login provider from the user.
|
|
|
|
:param user_id: User id
|
|
:param provider_id: Social login provider id
|
|
:return:
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id, "provider": provider_id}
|
|
data_raw = self.raw_delete(
|
|
urls_patterns.URL_ADMIN_USER_FEDERATED_IDENTITY.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def send_update_account(
|
|
self, user_id, payload, client_id=None, lifespan=None, redirect_uri=None
|
|
):
|
|
"""Send an update account email to the user.
|
|
|
|
An email contains a link the user can click to perform a set of required actions.
|
|
|
|
:param user_id: User id
|
|
:param payload: A list of actions for the user to complete
|
|
:param client_id: Client id (optional)
|
|
:param lifespan: Number of seconds after which the generated token expires (optional)
|
|
:param redirect_uri: The redirect uri (optional)
|
|
|
|
:return:
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
params_query = {"client_id": client_id, "lifespan": lifespan, "redirect_uri": redirect_uri}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_SEND_UPDATE_ACCOUNT.format(**params_path),
|
|
data=json.dumps(payload),
|
|
**params_query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
def send_verify_email(self, user_id, client_id=None, redirect_uri=None):
|
|
"""Send a update account email to the user.
|
|
|
|
An email contains a link the user can click to perform a set of required actions.
|
|
|
|
:param user_id: User id
|
|
:param client_id: Client id (optional)
|
|
:param redirect_uri: Redirect uri (optional)
|
|
|
|
:return:
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
params_query = {"client_id": client_id, "redirect_uri": redirect_uri}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_SEND_VERIFY_EMAIL.format(**params_path),
|
|
data={},
|
|
**params_query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
def get_sessions(self, user_id):
|
|
"""Get sessions associated with the user.
|
|
|
|
:param user_id: id of user
|
|
|
|
UserSessionRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_usersessionrepresentation
|
|
|
|
:return: UserSessionRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_GET_SESSIONS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_server_info(self):
|
|
"""Get themes, social providers, auth providers, and event listeners available on this server.
|
|
|
|
ServerInfoRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_serverinforepresentation
|
|
|
|
:return: ServerInfoRepresentation
|
|
"""
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_SERVER_INFO)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_groups(self, query=None):
|
|
"""Get groups.
|
|
|
|
Returns a list of groups belonging to the realm
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/#_grouprepresentation
|
|
|
|
:return: array GroupRepresentation
|
|
"""
|
|
query = query or {}
|
|
params_path = {"realm-name": self.realm_name}
|
|
url = urls_patterns.URL_ADMIN_GROUPS.format(**params_path)
|
|
|
|
if "first" in query or "max" in query:
|
|
return self.__fetch_paginated(url, query)
|
|
|
|
return self.__fetch_all(url, query)
|
|
|
|
def get_group(self, group_id):
|
|
"""Get group by id.
|
|
|
|
Returns full group details
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/#_grouprepresentation
|
|
|
|
:param group_id: The group id
|
|
:return: Keycloak server response (GroupRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": group_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_GROUP.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_subgroups(self, group, path):
|
|
"""Get subgroups.
|
|
|
|
Utility function to iterate through nested group structures
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/#_grouprepresentation
|
|
|
|
:param name: group (GroupRepresentation)
|
|
:param path: group path (string)
|
|
|
|
:return: Keycloak server response (GroupRepresentation)
|
|
"""
|
|
for subgroup in group["subGroups"]:
|
|
if subgroup["path"] == path:
|
|
return subgroup
|
|
elif subgroup["subGroups"]:
|
|
for subgroup in group["subGroups"]:
|
|
result = self.get_subgroups(subgroup, path)
|
|
if result:
|
|
return result
|
|
# went through the tree without hits
|
|
return None
|
|
|
|
def get_group_members(self, group_id, query=None):
|
|
"""Get members by group id.
|
|
|
|
Returns group members
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/#_userrepresentation
|
|
|
|
:param group_id: The group id
|
|
:param query: Additional query parameters
|
|
(see https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_getmembers)
|
|
:return: Keycloak server response (UserRepresentation)
|
|
"""
|
|
query = query or {}
|
|
params_path = {"realm-name": self.realm_name, "id": group_id}
|
|
url = urls_patterns.URL_ADMIN_GROUP_MEMBERS.format(**params_path)
|
|
|
|
if "first" in query or "max" in query:
|
|
return self.__fetch_paginated(url, query)
|
|
|
|
return self.__fetch_all(url, query)
|
|
|
|
def get_group_by_path(self, path, search_in_subgroups=False):
|
|
"""Get group id based on name or path.
|
|
|
|
A straight name or path match with a top-level group will return first.
|
|
Subgroups are traversed, the first to match path (or name with path) is returned.
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/#_grouprepresentation
|
|
|
|
:param path: group path
|
|
:param search_in_subgroups: True if want search in the subgroups
|
|
:return: Keycloak server response (GroupRepresentation)
|
|
"""
|
|
groups = self.get_groups()
|
|
|
|
# TODO: Review this code is necessary
|
|
for group in groups:
|
|
if group["path"] == path:
|
|
return group
|
|
elif search_in_subgroups and group["subGroups"]:
|
|
for group in group["subGroups"]:
|
|
if group["path"] == path:
|
|
return group
|
|
res = self.get_subgroups(group, path)
|
|
if res is not None:
|
|
return res
|
|
return None
|
|
|
|
def create_group(self, payload, parent=None, skip_exists=False):
|
|
"""Create a group in the Realm.
|
|
|
|
:param payload: GroupRepresentation
|
|
:param parent: parent group's id. Required to create a sub-group.
|
|
:param skip_exists: If true then do not raise an error if it already exists
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/#_grouprepresentation
|
|
|
|
:return: Group id for newly created group or None for an existing group
|
|
"""
|
|
if parent is None:
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_GROUPS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
else:
|
|
params_path = {"realm-name": self.realm_name, "id": parent}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_GROUP_CHILD.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
try:
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
except KeyError:
|
|
return
|
|
|
|
def update_group(self, group_id, payload):
|
|
"""Update group, ignores subgroups.
|
|
|
|
:param group_id: id of group
|
|
:param payload: GroupRepresentation with updated information.
|
|
|
|
GroupRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/#_grouprepresentation
|
|
|
|
:return: Http response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": group_id}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_GROUP.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def group_set_permissions(self, group_id, enabled=True):
|
|
"""Enable/Disable permissions for a group.
|
|
|
|
Cannot delete group if disabled
|
|
|
|
:param group_id: id of group
|
|
:param enabled: boolean
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": group_id}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_GROUP_PERMISSIONS.format(**params_path),
|
|
data=json.dumps({"enabled": enabled}),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError)
|
|
|
|
def group_user_add(self, user_id, group_id):
|
|
"""Add user to group (user_id and group_id).
|
|
|
|
:param user_id: id of user
|
|
:param group_id: id of group to add to
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id, "group-id": group_id}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_USER_GROUP.format(**params_path), data=None
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def group_user_remove(self, user_id, group_id):
|
|
"""Remove user from group (user_id and group_id).
|
|
|
|
:param user_id: id of user
|
|
:param group_id: id of group to remove from
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id, "group-id": group_id}
|
|
data_raw = self.raw_delete(urls_patterns.URL_ADMIN_USER_GROUP.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def delete_group(self, group_id):
|
|
"""Delete a group in the Realm.
|
|
|
|
:param group_id: id of group to delete
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": group_id}
|
|
data_raw = self.raw_delete(urls_patterns.URL_ADMIN_GROUP.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_clients(self):
|
|
"""Get clients.
|
|
|
|
Returns a list of clients belonging to the realm
|
|
|
|
ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_CLIENTS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client(self, client_id):
|
|
"""Get representation of the client.
|
|
|
|
ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_CLIENT.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_id(self, client_name):
|
|
"""Get internal keycloak client id from client-id.
|
|
|
|
This is required for further actions against this client.
|
|
|
|
:param client_name: name in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:return: client_id (uuid as string)
|
|
"""
|
|
clients = self.get_clients()
|
|
|
|
for client in clients:
|
|
if client_name == client.get("name") or client_name == client.get("clientId"):
|
|
return client["id"]
|
|
|
|
return None
|
|
|
|
def get_client_authz_settings(self, client_id):
|
|
"""Get authorization json from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SETTINGS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def create_client_authz_resource(self, client_id, payload, skip_exists=False):
|
|
"""Create resources of client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:param payload: ResourceRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_resourcerepresentation
|
|
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
def get_client_authz_resources(self, client_id):
|
|
"""Get resources from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def create_client_authz_role_based_policy(self, client_id, payload, skip_exists=False):
|
|
"""Create role-based policy of client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:param payload: No Document
|
|
:return: Keycloak server response
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"type": "role",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"name": "Policy-1",
|
|
"roles": [
|
|
{
|
|
"id": id
|
|
}
|
|
]
|
|
}
|
|
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_ROLE_BASED_POLICY.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
def create_client_authz_resource_based_permission(self, client_id, payload, skip_exists=False):
|
|
"""Create resource-based permission of client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:param payload: PolicyRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_policyrepresentation
|
|
:return: Keycloak server response
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"type": "resource",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"name": "Permission-Name",
|
|
"resources": [
|
|
resource_id
|
|
],
|
|
"policies": [
|
|
policy_id
|
|
]
|
|
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_RESOURCE_BASED_PERMISSION.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
def get_client_authz_scopes(self, client_id):
|
|
"""Get scopes from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SCOPES.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_authz_permissions(self, client_id):
|
|
"""Get permissions from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_PERMISSIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_authz_policies(self, client_id):
|
|
"""Get policies from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICIES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_service_account_user(self, client_id):
|
|
"""Get service account user from client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:return: UserRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SERVICE_ACCOUNT_USER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def create_client(self, payload, skip_exists=False):
|
|
"""Create a client.
|
|
|
|
ClientRepresentation:
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
|
|
:param skip_exists: If true then do not raise an error if client already exists
|
|
:param payload: ClientRepresentation
|
|
:return: Client ID
|
|
"""
|
|
if skip_exists:
|
|
client_id = self.get_client_id(client_name=payload["name"])
|
|
|
|
if client_id is not None:
|
|
return client_id
|
|
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENTS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
def update_client(self, client_id, payload):
|
|
"""Update a client.
|
|
|
|
:param client_id: Client id
|
|
:param payload: ClientRepresentation
|
|
|
|
:return: Http response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_client(self, client_id):
|
|
"""Get representation of the client.
|
|
|
|
ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
|
|
:param client_id: keycloak client id (not oauth client-id)
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_delete(urls_patterns.URL_ADMIN_CLIENT.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_client_installation_provider(self, client_id, provider_id):
|
|
"""Get content for given installation provider.
|
|
|
|
Related documentation:
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clients_resource
|
|
|
|
Possible provider_id list available in the ServerInfoRepresentation#clientInstallations
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_serverinforepresentation
|
|
|
|
:param client_id: Client id
|
|
:param provider_id: provider id to specify response format
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id, "provider-id": provider_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_INSTALLATION_PROVIDER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
def get_realm_roles(self):
|
|
"""Get all roles for the realm or client.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_rolerepresentation
|
|
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_REALM_ROLES.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_realm_role_members(self, role_name, query=None):
|
|
"""Get role members of realm by role name.
|
|
|
|
:param role_name: Name of the role.
|
|
:param query: Additional Query parameters
|
|
(see https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_roles_resource)
|
|
:return: Keycloak Server Response (UserRepresentation)
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.realm_name, "role-name": role_name}
|
|
return self.__fetch_all(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_MEMBERS.format(**params_path), query
|
|
)
|
|
|
|
def get_client_roles(self, client_id):
|
|
"""Get all roles for the client.
|
|
|
|
:param client_id: id of client (not client-id)
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_rolerepresentation
|
|
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_CLIENT_ROLES.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_role(self, client_id, role_name):
|
|
"""Get client role id by name.
|
|
|
|
This is required for further actions with this role.
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:param role_name: role’s name (not id!)
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_rolerepresentation
|
|
|
|
:return: role_id
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id, "role-name": role_name}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_CLIENT_ROLE.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_role_id(self, client_id, role_name):
|
|
"""Get client role id by name.
|
|
|
|
This is required for further actions with this role.
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:param role_name: role’s name (not id!)
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_rolerepresentation
|
|
|
|
:return: role_id
|
|
"""
|
|
role = self.get_client_role(client_id, role_name)
|
|
return role.get("id")
|
|
|
|
def create_client_role(self, client_role_id, payload, skip_exists=False):
|
|
"""Create a client role.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_role_id: id of client (not client-id)
|
|
:param payload: RoleRepresentation
|
|
:param skip_exists: If true then do not raise an error if client role already exists
|
|
:return: Client role name
|
|
"""
|
|
if skip_exists:
|
|
try:
|
|
res = self.get_client_role(client_id=client_role_id, role_name=payload["name"])
|
|
return res["name"]
|
|
except KeycloakGetError:
|
|
pass
|
|
|
|
params_path = {"realm-name": self.realm_name, "id": client_role_id}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLES.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
def add_composite_client_roles_to_role(self, client_role_id, role_name, roles):
|
|
"""Add composite roles to client role.
|
|
|
|
:param client_role_id: id of client (not client-id)
|
|
:param role_name: The name of the role
|
|
:param roles: roles list or role (use RoleRepresentation) to be updated
|
|
:return: Keycloak server response
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.realm_name, "id": client_role_id, "role-name": role_name}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLES_COMPOSITE_CLIENT_ROLE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def update_client_role(self, client_role_id, role_name, payload):
|
|
"""Update a client role.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_role_id: id of client (not client-id)
|
|
:param role_name: role's name (not id!)
|
|
:param payload: RoleRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_role_id, "role-name": role_name}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_client_role(self, client_role_id, role_name):
|
|
"""Delete a client role.
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_rolerepresentation
|
|
|
|
:param client_role_id: id of client (not client-id)
|
|
:param role_name: role's name (not id!)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_role_id, "role-name": role_name}
|
|
data_raw = self.raw_delete(urls_patterns.URL_ADMIN_CLIENT_ROLE.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def assign_client_role(self, user_id, client_id, roles):
|
|
"""Assign a client role to a user.
|
|
|
|
:param user_id: id of user
|
|
:param client_id: id of client (not client-id)
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:return: Keycloak server response
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.realm_name, "id": user_id, "client-id": client_id}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def get_client_role_members(self, client_id, role_name, **query):
|
|
"""Get members by client role.
|
|
|
|
:param client_id: The client id
|
|
:param role_name: the name of role to be queried.
|
|
:param query: Additional query parameters
|
|
(see https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clients_resource)
|
|
:return: Keycloak server response (UserRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id, "role-name": role_name}
|
|
return self.__fetch_all(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE_MEMBERS.format(**params_path), query
|
|
)
|
|
|
|
def get_client_role_groups(self, client_id, role_name, **query):
|
|
"""Get group members by client role.
|
|
|
|
:param client_id: The client id
|
|
:param role_name: the name of role to be queried.
|
|
:param query: Additional query parameters
|
|
(see https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clients_resource)
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id, "role-name": role_name}
|
|
return self.__fetch_all(
|
|
urls_patterns.URL_ADMIN_CLIENT_ROLE_GROUPS.format(**params_path), query
|
|
)
|
|
|
|
def create_realm_role(self, payload, skip_exists=False):
|
|
"""Create a new role for the realm or client.
|
|
|
|
:param payload: The role (use RoleRepresentation)
|
|
:param skip_exists: If true then do not raise an error if realm role already exists
|
|
:return: Realm role name
|
|
"""
|
|
if skip_exists:
|
|
try:
|
|
role = self.get_realm_role(role_name=payload["name"])
|
|
return role["name"]
|
|
except KeycloakGetError:
|
|
pass
|
|
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
def get_realm_role(self, role_name):
|
|
"""Get realm role by role name.
|
|
|
|
:param role_name: role's name, not id!
|
|
|
|
RoleRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_rolerepresentation
|
|
:return: role_id
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "role-name": role_name}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_NAME.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def update_realm_role(self, role_name, payload):
|
|
"""Update a role for the realm by name.
|
|
|
|
:param role_name: The name of the role to be updated
|
|
:param payload: The role (use RoleRepresentation)
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "role-name": role_name}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_NAME.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_realm_role(self, role_name):
|
|
"""Delete a role for the realm by name.
|
|
|
|
:param payload: The role name {'role-name':'name-of-the-role'}
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "role-name": role_name}
|
|
data_raw = self.raw_delete(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_ROLE_BY_NAME.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def add_composite_realm_roles_to_role(self, role_name, roles):
|
|
"""Add composite roles to the role.
|
|
|
|
:param role_name: The name of the role
|
|
:param roles: roles list or role (use RoleRepresentation) to be updated
|
|
:return: Keycloak server response
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.realm_name, "role-name": role_name}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_COMPOSITE_REALM_ROLE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def remove_composite_realm_roles_to_role(self, role_name, roles):
|
|
"""Remove composite roles from the role.
|
|
|
|
:param role_name: The name of the role
|
|
:param roles: roles list or role (use RoleRepresentation) to be removed
|
|
:return: Keycloak server response
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.realm_name, "role-name": role_name}
|
|
data_raw = self.raw_delete(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_COMPOSITE_REALM_ROLE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_composite_realm_roles_of_role(self, role_name):
|
|
"""Get composite roles of the role.
|
|
|
|
:param role_name: The name of the role
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "role-name": role_name}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_REALM_ROLES_COMPOSITE_REALM_ROLE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def assign_realm_roles(self, user_id, roles):
|
|
"""Assign realm roles to a user.
|
|
|
|
:param user_id: id of user
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:return: Keycloak server response
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def delete_realm_roles_of_user(self, user_id, roles):
|
|
"""Delete realm roles of a user.
|
|
|
|
:param user_id: id of user
|
|
:param roles: roles list or role (use RoleRepresentation)
|
|
:return: Keycloak server response
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_delete(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_realm_roles_of_user(self, user_id):
|
|
"""Get all realm roles for a user.
|
|
|
|
:param user_id: id of user
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_USER_REALM_ROLES.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_available_realm_roles_of_user(self, user_id):
|
|
"""Get all available (i.e. unassigned) realm roles for a user.
|
|
|
|
:param user_id: id of user
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES_AVAILABLE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_composite_realm_roles_of_user(self, user_id):
|
|
"""Get all composite (i.e. implicit) realm roles for a user.
|
|
|
|
:param user_id: id of user
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": user_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_USER_REALM_ROLES_COMPOSITE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def assign_group_realm_roles(self, group_id, roles):
|
|
"""Assign realm roles to a group.
|
|
|
|
:param group_id: id of groupp
|
|
:param roles: roles list or role (use GroupRoleRepresentation)
|
|
:return: Keycloak server response
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.realm_name, "id": group_id}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_GROUPS_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def delete_group_realm_roles(self, group_id, roles):
|
|
"""Delete realm roles of a group.
|
|
|
|
:param group_id: id of group
|
|
:param roles: roles list or role (use GroupRoleRepresentation)
|
|
:return: Keycloak server response
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.realm_name, "id": group_id}
|
|
data_raw = self.raw_delete(
|
|
urls_patterns.URL_ADMIN_GROUPS_REALM_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_group_realm_roles(self, group_id):
|
|
"""Get all realm roles for a group.
|
|
|
|
:param user_id: id of the group
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": group_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_GROUPS_REALM_ROLES.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def assign_group_client_roles(self, group_id, client_id, roles):
|
|
"""Assign client roles to a group.
|
|
|
|
:param group_id: id of group
|
|
:param client_id: id of client (not client-id)
|
|
:param roles: roles list or role (use GroupRoleRepresentation)
|
|
:return: Keycloak server response
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.realm_name, "id": group_id, "client-id": client_id}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_GROUPS_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[204])
|
|
|
|
def get_group_client_roles(self, group_id, client_id):
|
|
"""Get client roles of a group.
|
|
|
|
:param group_id: id of group
|
|
:param client_id: id of client (not client-id)
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": group_id, "client-id": client_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_GROUPS_CLIENT_ROLES.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def delete_group_client_roles(self, group_id, client_id, roles):
|
|
"""Delete client roles of a group.
|
|
|
|
:param group_id: id of group
|
|
:param client_id: id of client (not client-id)
|
|
:param roles: roles list or role (use GroupRoleRepresentation)
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.realm_name, "id": group_id, "client-id": client_id}
|
|
data_raw = self.raw_delete(
|
|
urls_patterns.URL_ADMIN_GROUPS_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_client_roles_of_user(self, user_id, client_id):
|
|
"""Get all client roles for a user.
|
|
|
|
:param user_id: id of user
|
|
:param client_id: id of client (not client-id)
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
"""
|
|
return self._get_client_roles_of_user(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES, user_id, client_id
|
|
)
|
|
|
|
def get_available_client_roles_of_user(self, user_id, client_id):
|
|
"""Get available client role-mappings for a user.
|
|
|
|
:param user_id: id of user
|
|
:param client_id: id of client (not client-id)
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
"""
|
|
return self._get_client_roles_of_user(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES_AVAILABLE, user_id, client_id
|
|
)
|
|
|
|
def get_composite_client_roles_of_user(self, user_id, client_id):
|
|
"""Get composite client role-mappings for a user.
|
|
|
|
:param user_id: id of user
|
|
:param client_id: id of client (not client-id)
|
|
:return: Keycloak server response (array RoleRepresentation)
|
|
"""
|
|
return self._get_client_roles_of_user(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES_COMPOSITE, user_id, client_id
|
|
)
|
|
|
|
def _get_client_roles_of_user(self, client_level_role_mapping_url, user_id, client_id):
|
|
params_path = {"realm-name": self.realm_name, "id": user_id, "client-id": client_id}
|
|
data_raw = self.raw_get(client_level_role_mapping_url.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def delete_client_roles_of_user(self, user_id, client_id, roles):
|
|
"""Delete client roles from a user.
|
|
|
|
:param user_id: id of user
|
|
:param client_id: id of client containing role (not client-id)
|
|
:param roles: roles list or role to delete (use RoleRepresentation)
|
|
:return: Keycloak server response
|
|
"""
|
|
payload = roles if isinstance(roles, list) else [roles]
|
|
params_path = {"realm-name": self.realm_name, "id": user_id, "client-id": client_id}
|
|
data_raw = self.raw_delete(
|
|
urls_patterns.URL_ADMIN_USER_CLIENT_ROLES.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_authentication_flows(self):
|
|
"""Get authentication flows.
|
|
|
|
Returns all flow details
|
|
|
|
AuthenticationFlowRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_authenticationflowrepresentation
|
|
|
|
:return: Keycloak server response (AuthenticationFlowRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_FLOWS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_authentication_flow_for_id(self, flow_id):
|
|
"""Get one authentication flow by it's id.
|
|
|
|
Returns all flow details
|
|
|
|
AuthenticationFlowRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_authenticationflowrepresentation
|
|
|
|
:param flow_id: the id of a flow NOT it's alias
|
|
:return: Keycloak server response (AuthenticationFlowRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "flow-id": flow_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_FLOWS_ALIAS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def create_authentication_flow(self, payload, skip_exists=False):
|
|
"""Create a new authentication flow.
|
|
|
|
AuthenticationFlowRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_authenticationflowrepresentation
|
|
|
|
:param payload: AuthenticationFlowRepresentation
|
|
:param skip_exists: Do not raise an error if authentication flow already exists
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_FLOWS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
def copy_authentication_flow(self, payload, flow_alias):
|
|
"""Copy existing authentication flow under a new name.
|
|
|
|
The new name is given as 'newName' attribute of the passed payload.
|
|
|
|
:param payload: JSON containing 'newName' attribute
|
|
:param flow_alias: the flow alias
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "flow-alias": flow_alias}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_FLOWS_COPY.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def delete_authentication_flow(self, flow_id):
|
|
"""Delete authentication flow.
|
|
|
|
AuthenticationInfoRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_authenticationinforepresentation
|
|
|
|
:param flow_id: authentication flow id
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": flow_id}
|
|
data_raw = self.raw_delete(urls_patterns.URL_ADMIN_FLOW.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_authentication_flow_executions(self, flow_alias):
|
|
"""Get authentication flow executions.
|
|
|
|
Returns all execution steps
|
|
|
|
:param flow_alias: the flow alias
|
|
:return: Response(json)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "flow-alias": flow_alias}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_FLOWS_EXECUTIONS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def update_authentication_flow_executions(self, payload, flow_alias):
|
|
"""Update an authentication flow execution.
|
|
|
|
AuthenticationExecutionInfoRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_authenticationexecutioninforepresentation
|
|
|
|
:param payload: AuthenticationExecutionInfoRepresentation
|
|
:param flow_alias: The flow alias
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "flow-alias": flow_alias}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTIONS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[202, 204])
|
|
|
|
def get_authentication_flow_execution(self, execution_id):
|
|
"""Get authentication flow execution.
|
|
|
|
AuthenticationExecutionInfoRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_authenticationexecutioninforepresentation
|
|
|
|
:param execution_id: the execution ID
|
|
:return: Response(json)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": execution_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_FLOWS_EXECUTION.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def create_authentication_flow_execution(self, payload, flow_alias):
|
|
"""Create an authentication flow execution.
|
|
|
|
AuthenticationExecutionInfoRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_authenticationexecutioninforepresentation
|
|
|
|
:param payload: AuthenticationExecutionInfoRepresentation
|
|
:param flow_alias: The flow alias
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "flow-alias": flow_alias}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTIONS_EXECUTION.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def delete_authentication_flow_execution(self, execution_id):
|
|
"""Delete authentication flow execution.
|
|
|
|
AuthenticationExecutionInfoRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_authenticationexecutioninforepresentation
|
|
|
|
:param execution_id: keycloak client id (not oauth client-id)
|
|
:return: Keycloak server response (json)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": execution_id}
|
|
data_raw = self.raw_delete(urls_patterns.URL_ADMIN_FLOWS_EXECUTION.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def create_authentication_flow_subflow(self, payload, flow_alias, skip_exists=False):
|
|
"""Create a new sub authentication flow for a given authentication flow.
|
|
|
|
AuthenticationFlowRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_authenticationflowrepresentation
|
|
|
|
:param payload: AuthenticationFlowRepresentation
|
|
:param flow_alias: The flow alias
|
|
:param skip_exists: Do not raise an error if authentication flow already exists
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "flow-alias": flow_alias}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_FLOWS_EXECUTIONS_FLOW.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
|
|
def get_authenticator_providers(self):
|
|
"""Get authenticator providers list.
|
|
|
|
:return: Response(json)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_PROVIDERS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_authenticator_provider_config_description(self, provider_id):
|
|
"""Get authenticator's provider configuration description.
|
|
|
|
AuthenticatorConfigInfoRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_authenticatorconfiginforepresentation
|
|
|
|
:param provider_id: Provider Id
|
|
:return: AuthenticatorConfigInfoRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "provider-id": provider_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_CONFIG_DESCRIPTION.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_authenticator_config(self, config_id):
|
|
"""Get authenticator configuration.
|
|
|
|
Returns all configuration details.
|
|
|
|
:param config_id: Authenticator config id
|
|
:return: Response(json)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": config_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_AUTHENTICATOR_CONFIG.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def update_authenticator_config(self, payload, config_id):
|
|
"""Update an authenticator configuration.
|
|
|
|
AuthenticatorConfigRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_authenticatorconfigrepresentation
|
|
|
|
:param payload: AuthenticatorConfigRepresentation
|
|
:param config_id: Authenticator config id
|
|
:return: Response(json)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": config_id}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_CONFIG.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_authenticator_config(self, config_id):
|
|
"""Delete a authenticator configuration.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_authentication_management_resource
|
|
|
|
:param config_id: Authenticator config id
|
|
:return: Keycloak server Response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": config_id}
|
|
data_raw = self.raw_delete(
|
|
urls_patterns.URL_ADMIN_AUTHENTICATOR_CONFIG.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def sync_users(self, storage_id, action):
|
|
"""Trigger user sync from provider.
|
|
|
|
:param storage_id: The id of the user storage provider
|
|
:param action: Action can be "triggerFullSync" or "triggerChangedUsersSync"
|
|
:return:
|
|
"""
|
|
data = {"action": action}
|
|
params_query = {"action": action}
|
|
|
|
params_path = {"realm-name": self.realm_name, "id": storage_id}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_USER_STORAGE.format(**params_path),
|
|
data=json.dumps(data),
|
|
**params_query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError)
|
|
|
|
def get_client_scopes(self):
|
|
"""Get client scopes.
|
|
|
|
Get representation of the client scopes for the realm where we are connected to
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_getclientscopes
|
|
|
|
:return: Keycloak server response Array of (ClientScopeRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_CLIENT_SCOPES.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_scope(self, client_scope_id):
|
|
"""Get client scope.
|
|
|
|
Get representation of the client scopes for the realm where we are connected to
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_getclientscopes
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:return: Keycloak server response (ClientScopeRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "scope-id": client_scope_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_CLIENT_SCOPE.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_scope_by_name(self, client_scope_name):
|
|
"""Get client scope by name.
|
|
|
|
Get representation of the client scope identified by the client scope name.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_getclientscopes
|
|
:param client_scope_name: (str) Name of the client scope
|
|
:returns: ClientScopeRepresentation or None
|
|
"""
|
|
client_scopes = self.get_client_scopes()
|
|
for client_scope in client_scopes:
|
|
if client_scope["name"] == client_scope_name:
|
|
return client_scope
|
|
|
|
return None
|
|
|
|
def create_client_scope(self, payload, skip_exists=False):
|
|
"""Create a client scope.
|
|
|
|
ClientScopeRepresentation:
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_getclientscopes
|
|
|
|
:param payload: ClientScopeRepresentation
|
|
:param skip_exists: If true then do not raise an error if client scope already exists
|
|
:return: Client scope id
|
|
"""
|
|
if skip_exists:
|
|
exists = self.get_client_scope_by_name(client_scope_name=payload["name"])
|
|
|
|
if exists is not None:
|
|
return exists["id"]
|
|
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(
|
|
data_raw, KeycloakPostError, expected_codes=[201], skip_exists=skip_exists
|
|
)
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
def update_client_scope(self, client_scope_id, payload):
|
|
"""Update a client scope.
|
|
|
|
ClientScopeRepresentation:
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_client_scopes_resource
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:param payload: ClientScopeRepresentation
|
|
:return: Keycloak server response (ClientScopeRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "scope-id": client_scope_id}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPE.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_client_scope(self, client_scope_id):
|
|
"""Delete existing client scope.
|
|
|
|
ClientScopeRepresentation:
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_client_scopes_resource
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "scope-id": client_scope_id}
|
|
data_raw = self.raw_delete(urls_patterns.URL_ADMIN_CLIENT_SCOPE.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_mappers_from_client_scope(self, client_scope_id):
|
|
"""Get a list of all mappers connected to the client scope.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_protocol_mappers_resource
|
|
:param client_scope_id: Client scope id
|
|
:returns: Keycloak server response (ProtocolMapperRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "scope-id": client_scope_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES_ADD_MAPPER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
def add_mapper_to_client_scope(self, client_scope_id, payload):
|
|
"""Add a mapper to a client scope.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_create_mapper
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:param payload: ProtocolMapperRepresentation
|
|
:return: Keycloak server Response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "scope-id": client_scope_id}
|
|
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES_ADD_MAPPER.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def delete_mapper_from_client_scope(self, client_scope_id, protocol_mapper_id):
|
|
"""Delete a mapper from a client scope.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_delete_mapper
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:param protocol_mapper_id: Protocol mapper id
|
|
:return: Keycloak server Response
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.realm_name,
|
|
"scope-id": client_scope_id,
|
|
"protocol-mapper-id": protocol_mapper_id,
|
|
}
|
|
|
|
data_raw = self.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES_MAPPERS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def update_mapper_in_client_scope(self, client_scope_id, protocol_mapper_id, payload):
|
|
"""Update an existing protocol mapper in a client scope.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_protocol_mappers_resource
|
|
|
|
:param client_scope_id: The id of the client scope
|
|
:param protocol_mapper_id: The id of the protocol mapper which exists in the client scope
|
|
and should to be updated
|
|
:param payload: ProtocolMapperRepresentation
|
|
:return: Keycloak server Response
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.realm_name,
|
|
"scope-id": client_scope_id,
|
|
"protocol-mapper-id": protocol_mapper_id,
|
|
}
|
|
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_SCOPES_MAPPERS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def get_default_default_client_scopes(self):
|
|
"""Get default default client scopes.
|
|
|
|
Return list of default default client scopes
|
|
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_DEFAULT_DEFAULT_CLIENT_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def delete_default_default_client_scope(self, scope_id):
|
|
"""Delete default default client scope.
|
|
|
|
:param scope_id: default default client scope id
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": scope_id}
|
|
data_raw = self.raw_delete(
|
|
urls_patterns.URL_ADMIN_DEFAULT_DEFAULT_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def add_default_default_client_scope(self, scope_id):
|
|
"""Add default default client scope.
|
|
|
|
:param scope_id: default default client scope id
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": scope_id}
|
|
payload = {"realm": self.realm_name, "clientScopeId": scope_id}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_DEFAULT_DEFAULT_CLIENT_SCOPE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def get_default_optional_client_scopes(self):
|
|
"""Get default optional client scopes.
|
|
|
|
Return list of default optional client scopes
|
|
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_DEFAULT_OPTIONAL_CLIENT_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def delete_default_optional_client_scope(self, scope_id):
|
|
"""Delete default optional client scope.
|
|
|
|
:param scope_id: default optional client scope id
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": scope_id}
|
|
data_raw = self.raw_delete(
|
|
urls_patterns.URL_ADMIN_DEFAULT_OPTIONAL_CLIENT_SCOPE.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def add_default_optional_client_scope(self, scope_id):
|
|
"""Add default optional client scope.
|
|
|
|
:param scope_id: default optional client scope id
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": scope_id}
|
|
payload = {"realm": self.realm_name, "clientScopeId": scope_id}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_DEFAULT_OPTIONAL_CLIENT_SCOPE.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def get_mappers_from_client(self, client_id):
|
|
"""List of all client mappers.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_protocolmapperrepresentation
|
|
|
|
:param client_id: Client id
|
|
:returns: KeycloakServerResponse (list of ProtocolMapperRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_PROTOCOL_MAPPERS.format(**params_path)
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[200])
|
|
|
|
def add_mapper_to_client(self, client_id, payload):
|
|
"""Add a mapper to a client.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_create_mapper
|
|
|
|
:param client_id: The id of the client
|
|
:param payload: ProtocolMapperRepresentation
|
|
:return: Keycloak server Response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_PROTOCOL_MAPPERS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
|
|
def update_client_mapper(self, client_id, mapper_id, payload):
|
|
"""Update client mapper.
|
|
|
|
:param client_id: The id of the client
|
|
:param client_mapper_id: The id of the mapper to be deleted
|
|
:param payload: ProtocolMapperRepresentation
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.realm_name,
|
|
"id": client_id,
|
|
"protocol-mapper-id": mapper_id,
|
|
}
|
|
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_PROTOCOL_MAPPER.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def remove_client_mapper(self, client_id, client_mapper_id):
|
|
"""Remove a mapper from the client.
|
|
|
|
https://www.keycloak.org/docs-api/15.0/rest-api/index.html#_protocol_mappers_resource
|
|
:param client_id: The id of the client
|
|
:param client_mapper_id: The id of the mapper to be deleted
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {
|
|
"realm-name": self.realm_name,
|
|
"id": client_id,
|
|
"protocol-mapper-id": client_mapper_id,
|
|
}
|
|
|
|
data_raw = self.raw_delete(
|
|
urls_patterns.URL_ADMIN_CLIENT_PROTOCOL_MAPPER.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def generate_client_secrets(self, client_id):
|
|
"""Generate a new secret for the client.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_regeneratesecret
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_SECRETS.format(**params_path), data=None
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError)
|
|
|
|
def get_client_secrets(self, client_id):
|
|
"""Get representation of the client secrets.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_getclientsecret
|
|
|
|
:param client_id: id of client (not client-id)
|
|
:return: Keycloak server response (ClientRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_CLIENT_SECRETS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_components(self, query=None):
|
|
"""Get components.
|
|
|
|
Return a list of components, filtered according to query parameters
|
|
|
|
ComponentRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_componentrepresentation
|
|
|
|
:param query: Query parameters (optional)
|
|
:return: components list
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_COMPONENTS.format(**params_path), data=None, **query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def create_component(self, payload):
|
|
"""Create a new component.
|
|
|
|
ComponentRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_componentrepresentation
|
|
|
|
:param payload: ComponentRepresentation
|
|
:return: Component id
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_COMPONENTS.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|
|
_last_slash_idx = data_raw.headers["Location"].rindex("/")
|
|
return data_raw.headers["Location"][_last_slash_idx + 1 :] # noqa: E203
|
|
|
|
def get_component(self, component_id):
|
|
"""Get representation of the component.
|
|
|
|
:param component_id: Component id
|
|
|
|
ComponentRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_componentrepresentation
|
|
|
|
:return: ComponentRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "component-id": component_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_COMPONENT.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def update_component(self, component_id, payload):
|
|
"""Update the component.
|
|
|
|
:param component_id: Component id
|
|
:param payload: ComponentRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_componentrepresentation
|
|
|
|
:return: Http response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "component-id": component_id}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_COMPONENT.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def delete_component(self, component_id):
|
|
"""Delete the component.
|
|
|
|
:param component_id: Component id
|
|
|
|
:return: Http response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "component-id": component_id}
|
|
data_raw = self.raw_delete(urls_patterns.URL_ADMIN_COMPONENT.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakDeleteError, expected_codes=[204])
|
|
|
|
def get_keys(self):
|
|
"""Get keys.
|
|
|
|
Return a list of keys, filtered according to query parameters
|
|
|
|
KeysMetadataRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_key_resource
|
|
|
|
:return: keys list
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_KEYS.format(**params_path), data=None)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_events(self, query=None):
|
|
"""Get events.
|
|
|
|
Return a list of events, filtered according to query parameters
|
|
|
|
EventRepresentation array
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_eventrepresentation
|
|
|
|
:return: events list
|
|
"""
|
|
query = query or dict()
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_EVENTS.format(**params_path), data=None, **query
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def set_events(self, payload):
|
|
"""Set realm events configuration.
|
|
|
|
RealmEventsConfigRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_realmeventsconfigrepresentation
|
|
|
|
:return: Http response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_EVENTS_CONFIG.format(**params_path), data=json.dumps(payload)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[204])
|
|
|
|
def raw_get(self, *args, **kwargs):
|
|
"""Call connection.raw_get.
|
|
|
|
If auto_refresh is set for *get* and *access_token* is expired, it will refresh the token
|
|
and try *get* once more.
|
|
"""
|
|
r = self.connection.raw_get(*args, **kwargs)
|
|
if "get" in self.auto_refresh_token and r.status_code == 401:
|
|
self.refresh_token()
|
|
return self.connection.raw_get(*args, **kwargs)
|
|
return r
|
|
|
|
def raw_post(self, *args, **kwargs):
|
|
"""Call connection.raw_post.
|
|
|
|
If auto_refresh is set for *post* and *access_token* is expired, it will refresh the token
|
|
and try *post* once more.
|
|
"""
|
|
r = self.connection.raw_post(*args, **kwargs)
|
|
if "post" in self.auto_refresh_token and r.status_code == 401:
|
|
self.refresh_token()
|
|
return self.connection.raw_post(*args, **kwargs)
|
|
return r
|
|
|
|
def raw_put(self, *args, **kwargs):
|
|
"""Call connection.raw_put.
|
|
|
|
If auto_refresh is set for *put* and *access_token* is expired, it will refresh the token
|
|
and try *put* once more.
|
|
"""
|
|
r = self.connection.raw_put(*args, **kwargs)
|
|
if "put" in self.auto_refresh_token and r.status_code == 401:
|
|
self.refresh_token()
|
|
return self.connection.raw_put(*args, **kwargs)
|
|
return r
|
|
|
|
def raw_delete(self, *args, **kwargs):
|
|
"""Call connection.raw_delete.
|
|
|
|
If auto_refresh is set for *delete* and *access_token* is expired,
|
|
it will refresh the token and try *delete* once more.
|
|
"""
|
|
r = self.connection.raw_delete(*args, **kwargs)
|
|
if "delete" in self.auto_refresh_token and r.status_code == 401:
|
|
self.refresh_token()
|
|
return self.connection.raw_delete(*args, **kwargs)
|
|
return r
|
|
|
|
def get_token(self):
|
|
"""Get admin token."""
|
|
if self.user_realm_name:
|
|
token_realm_name = self.user_realm_name
|
|
elif self.realm_name:
|
|
token_realm_name = self.realm_name
|
|
else:
|
|
token_realm_name = "master"
|
|
|
|
self.keycloak_openid = KeycloakOpenID(
|
|
server_url=self.server_url,
|
|
client_id=self.client_id,
|
|
realm_name=token_realm_name,
|
|
verify=self.verify,
|
|
client_secret_key=self.client_secret_key,
|
|
custom_headers=self.custom_headers,
|
|
timeout=self.timeout,
|
|
)
|
|
|
|
grant_type = []
|
|
if self.client_secret_key:
|
|
if self.user_realm_name:
|
|
self.realm_name = self.user_realm_name
|
|
grant_type.append("client_credentials")
|
|
elif self.username and self.password:
|
|
grant_type.append("password")
|
|
|
|
if grant_type:
|
|
self.token = self.keycloak_openid.token(
|
|
self.username, self.password, grant_type=grant_type, totp=self.totp
|
|
)
|
|
|
|
headers = {
|
|
"Authorization": "Bearer " + self.token.get("access_token"),
|
|
"Content-Type": "application/json",
|
|
}
|
|
else:
|
|
self.token = None
|
|
headers = {}
|
|
|
|
if self.custom_headers is not None:
|
|
# merge custom headers to main headers
|
|
headers.update(self.custom_headers)
|
|
|
|
self.connection = ConnectionManager(
|
|
base_url=self.server_url, headers=headers, timeout=60, verify=self.verify
|
|
)
|
|
|
|
def refresh_token(self):
|
|
"""Refresh the token."""
|
|
refresh_token = self.token.get("refresh_token", None)
|
|
if refresh_token is None:
|
|
self.get_token()
|
|
else:
|
|
try:
|
|
self.token = self.keycloak_openid.refresh_token(refresh_token)
|
|
except KeycloakPostError as e:
|
|
list_errors = [
|
|
b"Refresh token expired",
|
|
b"Token is not active",
|
|
b"Session not active",
|
|
]
|
|
if e.response_code == 400 and any(err in e.response_body for err in list_errors):
|
|
self.get_token()
|
|
else:
|
|
raise
|
|
|
|
self.connection.add_param_headers(
|
|
"Authorization", "Bearer " + self.token.get("access_token")
|
|
)
|
|
|
|
def get_client_all_sessions(self, client_id):
|
|
"""Get sessions associated with the client.
|
|
|
|
:param client_id: id of client
|
|
|
|
UserSessionRepresentation
|
|
http://www.keycloak.org/docs-api/18.0/rest-api/index.html#_usersessionrepresentation
|
|
|
|
:return: UserSessionRepresentation
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_CLIENT_ALL_SESSIONS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_sessions_stats(self):
|
|
"""Get current session count for all clients with active sessions.
|
|
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_getclientsessionstats
|
|
|
|
:return: Dict of clients and session count
|
|
"""
|
|
params_path = {"realm-name": self.realm_name}
|
|
data_raw = self.raw_get(urls_patterns.URL_ADMIN_CLIENT_SESSION_STATS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_management_permissions(self, client_id):
|
|
"""Get management permissions for a client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_MANAGEMENT_PERMISSIONS.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def update_client_management_permissions(self, payload, client_id):
|
|
"""Update management permissions for a client.
|
|
|
|
ManagementPermissionReference
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_managementpermissionreference
|
|
|
|
:param payload: ManagementPermissionReference
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:return: Keycloak server response
|
|
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"enabled": true
|
|
}
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_MANAGEMENT_PERMISSIONS.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[200])
|
|
|
|
def get_client_authz_policy_scopes(self, client_id, policy_id):
|
|
"""Get scopes for a given policy.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:param policy_id: No Document
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id, "policy-id": policy_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICY_SCOPES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_authz_policy_resources(self, client_id, policy_id):
|
|
"""Get resources for a given policy.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:param policy_id: No Document
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id, "policy-id": policy_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_POLICY_RESOURCES.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def get_client_authz_scope_permission(self, client_id, scope_id):
|
|
"""Get permissions for a given scope.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:param scope_id: No Document
|
|
:return: Keycloak server response
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id, "scope-id": scope_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SCOPE_PERMISSION.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def update_client_authz_scope_permission(self, payload, client_id, scope_id):
|
|
"""Update permissions for a given scope.
|
|
|
|
:param payload: No Document
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:param scope_id: No Document
|
|
:return: Keycloak server response
|
|
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"id": scope_id,
|
|
"name": "My Permission Name",
|
|
"type": "scope",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"resources": [some_resource_id],
|
|
"scopes": [some_scope_id],
|
|
"policies": [some_policy_id],
|
|
}
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id, "scope-id": scope_id}
|
|
data_raw = self.raw_put(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_SCOPE_PERMISSION.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPutError, expected_codes=[201])
|
|
|
|
def get_client_authz_client_policies(self, client_id):
|
|
"""Get policies for a given client.
|
|
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_get(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_CLIENT_POLICY.format(**params_path)
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_codes=[200])
|
|
|
|
def create_client_authz_client_policy(self, payload, client_id):
|
|
"""Create a new policy for a given client.
|
|
|
|
:param payload: No Document
|
|
:param client_id: id in ClientRepresentation
|
|
https://www.keycloak.org/docs-api/18.0/rest-api/index.html#_clientrepresentation
|
|
:return: Keycloak server response (RoleRepresentation)
|
|
|
|
|
|
Payload example::
|
|
|
|
payload={
|
|
"type": "client",
|
|
"logic": "POSITIVE",
|
|
"decisionStrategy": "UNANIMOUS",
|
|
"name": "My Policy",
|
|
"clients": [other_client_id],
|
|
}
|
|
"""
|
|
params_path = {"realm-name": self.realm_name, "id": client_id}
|
|
data_raw = self.raw_post(
|
|
urls_patterns.URL_ADMIN_CLIENT_AUTHZ_CLIENT_POLICY.format(**params_path),
|
|
data=json.dumps(payload),
|
|
)
|
|
return raise_error_from_response(data_raw, KeycloakPostError, expected_codes=[201])
|