You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
259 lines
7.1 KiB
259 lines
7.1 KiB
"""Fixtures for tests."""
|
|
|
|
import os
|
|
import uuid
|
|
|
|
import pytest
|
|
|
|
from keycloak import KeycloakAdmin, KeycloakOpenID
|
|
|
|
|
|
class KeycloakTestEnv(object):
|
|
"""Wrapper for test Keycloak connection configuration.
|
|
|
|
:param host: Hostname
|
|
:type host: str
|
|
:param port: Port
|
|
:type port: str
|
|
:param username: Admin username
|
|
:type username: str
|
|
:param password: Admin password
|
|
:type password: str
|
|
"""
|
|
|
|
def __init__(
|
|
self,
|
|
host: str = os.environ["KEYCLOAK_HOST"],
|
|
port: str = os.environ["KEYCLOAK_PORT"],
|
|
username: str = os.environ["KEYCLOAK_ADMIN"],
|
|
password: str = os.environ["KEYCLOAK_ADMIN_PASSWORD"],
|
|
):
|
|
"""Init method."""
|
|
self.KEYCLOAK_HOST = host
|
|
self.KEYCLOAK_PORT = port
|
|
self.KEYCLOAK_ADMIN = username
|
|
self.KEYCLOAK_ADMIN_PASSWORD = password
|
|
|
|
@property
|
|
def KEYCLOAK_HOST(self):
|
|
"""Hostname getter."""
|
|
return self._KEYCLOAK_HOST
|
|
|
|
@KEYCLOAK_HOST.setter
|
|
def KEYCLOAK_HOST(self, value: str):
|
|
"""Hostname setter."""
|
|
self._KEYCLOAK_HOST = value
|
|
|
|
@property
|
|
def KEYCLOAK_PORT(self):
|
|
"""Port getter."""
|
|
return self._KEYCLOAK_PORT
|
|
|
|
@KEYCLOAK_PORT.setter
|
|
def KEYCLOAK_PORT(self, value: str):
|
|
"""Port setter."""
|
|
self._KEYCLOAK_PORT = value
|
|
|
|
@property
|
|
def KEYCLOAK_ADMIN(self):
|
|
"""Admin username getter."""
|
|
return self._KEYCLOAK_ADMIN
|
|
|
|
@KEYCLOAK_ADMIN.setter
|
|
def KEYCLOAK_ADMIN(self, value: str):
|
|
"""Admin username setter."""
|
|
self._KEYCLOAK_ADMIN = value
|
|
|
|
@property
|
|
def KEYCLOAK_ADMIN_PASSWORD(self):
|
|
"""Admin password getter."""
|
|
return self._KEYCLOAK_ADMIN_PASSWORD
|
|
|
|
@KEYCLOAK_ADMIN_PASSWORD.setter
|
|
def KEYCLOAK_ADMIN_PASSWORD(self, value: str):
|
|
"""Admin password setter."""
|
|
self._KEYCLOAK_ADMIN_PASSWORD = value
|
|
|
|
|
|
@pytest.fixture
|
|
def env():
|
|
"""Fixture for getting the test environment configuration object."""
|
|
return KeycloakTestEnv()
|
|
|
|
|
|
@pytest.fixture
|
|
def admin(env: KeycloakTestEnv):
|
|
"""Fixture for initialized KeycloakAdmin class."""
|
|
return KeycloakAdmin(
|
|
server_url=f"http://{env.KEYCLOAK_HOST}:{env.KEYCLOAK_PORT}",
|
|
username=env.KEYCLOAK_ADMIN,
|
|
password=env.KEYCLOAK_ADMIN_PASSWORD,
|
|
)
|
|
|
|
|
|
@pytest.fixture
|
|
def oid(env: KeycloakTestEnv, realm: str, admin: KeycloakAdmin):
|
|
"""Fixture for initialized KeycloakOpenID class."""
|
|
# Set the realm
|
|
admin.realm_name = realm
|
|
# Create client
|
|
client = str(uuid.uuid4())
|
|
client_id = admin.create_client(
|
|
payload={
|
|
"name": client,
|
|
"clientId": client,
|
|
"enabled": True,
|
|
"publicClient": True,
|
|
"protocol": "openid-connect",
|
|
}
|
|
)
|
|
# Return OID
|
|
yield KeycloakOpenID(
|
|
server_url=f"http://{env.KEYCLOAK_HOST}:{env.KEYCLOAK_PORT}",
|
|
realm_name=realm,
|
|
client_id=client,
|
|
)
|
|
# Cleanup
|
|
admin.delete_client(client_id=client_id)
|
|
|
|
|
|
@pytest.fixture
|
|
def oid_with_credentials(env: KeycloakTestEnv, realm: str, admin: KeycloakAdmin):
|
|
"""Fixture for an initialized KeycloakOpenID class and a random user credentials."""
|
|
# Set the realm
|
|
admin.realm_name = realm
|
|
# Create client
|
|
client = str(uuid.uuid4())
|
|
secret = str(uuid.uuid4())
|
|
client_id = admin.create_client(
|
|
payload={
|
|
"name": client,
|
|
"clientId": client,
|
|
"enabled": True,
|
|
"publicClient": False,
|
|
"protocol": "openid-connect",
|
|
"secret": secret,
|
|
"clientAuthenticatorType": "client-secret",
|
|
}
|
|
)
|
|
# Create user
|
|
username = str(uuid.uuid4())
|
|
password = str(uuid.uuid4())
|
|
user_id = admin.create_user(
|
|
payload={
|
|
"username": username,
|
|
"email": f"{username}@test.test",
|
|
"enabled": True,
|
|
"credentials": [{"type": "password", "value": password}],
|
|
}
|
|
)
|
|
|
|
yield (
|
|
KeycloakOpenID(
|
|
server_url=f"http://{env.KEYCLOAK_HOST}:{env.KEYCLOAK_PORT}",
|
|
realm_name=realm,
|
|
client_id=client,
|
|
client_secret_key=secret,
|
|
),
|
|
username,
|
|
password,
|
|
)
|
|
|
|
# Cleanup
|
|
admin.delete_client(client_id=client_id)
|
|
admin.delete_user(user_id=user_id)
|
|
|
|
|
|
@pytest.fixture
|
|
def oid_with_credentials_authz(env: KeycloakTestEnv, realm: str, admin: KeycloakAdmin):
|
|
"""Fixture for an initialized KeycloakOpenID class and a random user credentials."""
|
|
# Set the realm
|
|
admin.realm_name = realm
|
|
# Create client
|
|
client = str(uuid.uuid4())
|
|
secret = str(uuid.uuid4())
|
|
client_id = admin.create_client(
|
|
payload={
|
|
"name": client,
|
|
"clientId": client,
|
|
"enabled": True,
|
|
"publicClient": False,
|
|
"protocol": "openid-connect",
|
|
"secret": secret,
|
|
"clientAuthenticatorType": "client-secret",
|
|
"authorizationServicesEnabled": True,
|
|
"serviceAccountsEnabled": True,
|
|
}
|
|
)
|
|
admin.create_client_authz_role_based_policy(
|
|
client_id=client_id,
|
|
payload={
|
|
"name": "test-authz-rb-policy",
|
|
"roles": [{"id": admin.get_realm_role(role_name="offline_access")["id"]}],
|
|
},
|
|
)
|
|
# Create user
|
|
username = str(uuid.uuid4())
|
|
password = str(uuid.uuid4())
|
|
user_id = admin.create_user(
|
|
payload={
|
|
"username": username,
|
|
"email": f"{username}@test.test",
|
|
"enabled": True,
|
|
"credentials": [{"type": "password", "value": password}],
|
|
}
|
|
)
|
|
|
|
yield (
|
|
KeycloakOpenID(
|
|
server_url=f"http://{env.KEYCLOAK_HOST}:{env.KEYCLOAK_PORT}",
|
|
realm_name=realm,
|
|
client_id=client,
|
|
client_secret_key=secret,
|
|
),
|
|
username,
|
|
password,
|
|
)
|
|
|
|
# Cleanup
|
|
admin.delete_client(client_id=client_id)
|
|
admin.delete_user(user_id=user_id)
|
|
|
|
|
|
@pytest.fixture
|
|
def realm(admin: KeycloakAdmin) -> str:
|
|
"""Fixture for a new random realm."""
|
|
realm_name = str(uuid.uuid4())
|
|
admin.create_realm(payload={"realm": realm_name, "enabled": True})
|
|
yield realm_name
|
|
admin.delete_realm(realm_name=realm_name)
|
|
|
|
|
|
@pytest.fixture
|
|
def user(admin: KeycloakAdmin, realm: str) -> str:
|
|
"""Fixture for a new random user."""
|
|
admin.realm_name = realm
|
|
username = str(uuid.uuid4())
|
|
user_id = admin.create_user(payload={"username": username, "email": f"{username}@test.test"})
|
|
yield user_id
|
|
admin.delete_user(user_id=user_id)
|
|
|
|
|
|
@pytest.fixture
|
|
def group(admin: KeycloakAdmin, realm: str) -> str:
|
|
"""Fixture for a new random group."""
|
|
admin.realm_name = realm
|
|
group_name = str(uuid.uuid4())
|
|
group_id = admin.create_group(payload={"name": group_name})
|
|
yield group_id
|
|
admin.delete_group(group_id=group_id)
|
|
|
|
|
|
@pytest.fixture
|
|
def client(admin: KeycloakAdmin, realm: str) -> str:
|
|
"""Fixture for a new random client."""
|
|
admin.realm_name = realm
|
|
client = str(uuid.uuid4())
|
|
client_id = admin.create_client(payload={"name": client, "clientId": client})
|
|
yield client_id
|
|
admin.delete_client(client_id=client_id)
|