forked from Mirror/python-keycloak
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
158 lines
6.0 KiB
158 lines
6.0 KiB
"""
|
|
|
|
"""
|
|
|
|
from keycloak.exceptions import raise_error_from_response, KeycloakGetError
|
|
from .urls_patterns import URL_AUTH, URL_TOKEN, URL_USERINFO, URL_WELL_KNOWN, URL_LOGOUT, \
|
|
URL_CERTS, URL_ENTITLEMENT, URL_INTROSPECT
|
|
from .connection import ConnectionManager
|
|
|
|
|
|
class Keycloak:
|
|
|
|
def __init__(self, server_url, client_id, realm_name, client_secret_key=None):
|
|
self.__client_id = client_id
|
|
self.__client_secret_key = client_secret_key
|
|
self.__realm_name = realm_name
|
|
|
|
self.__connection = ConnectionManager(base_url=server_url,
|
|
headers={},
|
|
timeout=60)
|
|
|
|
def well_know(self):
|
|
""" The most important endpoint to understand is the well-known configuration
|
|
endpoint. It lists endpoints and other configuration options relevant to
|
|
the OpenID Connect implementation in Keycloak.
|
|
|
|
:return It lists endpoints and other configuration options relevant.
|
|
"""
|
|
|
|
params_path = {"realm-name": self.__realm_name}
|
|
data_raw = self.__connection.raw_get(URL_WELL_KNOWN.format(**params_path))
|
|
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def auth_url(self, redirect_uri):
|
|
"""
|
|
|
|
http://openid.net/specs/openid-connect-core-1_0.html#AuthorizationEndpoint
|
|
|
|
:return:
|
|
"""
|
|
return NotImplemented
|
|
|
|
def token(self, username, password, grant_type=["password",]):
|
|
"""
|
|
The token endpoint is used to obtain tokens. Tokens can either be obtained by
|
|
exchanging an authorization code or by supplying credentials directly depending on
|
|
what flow is used. The token endpoint is also used to obtain new access tokens
|
|
when they expire.
|
|
|
|
http://openid.net/specs/openid-connect-core-1_0.html#TokenEndpoint
|
|
|
|
:param username:
|
|
:param password:
|
|
:param grant_type:
|
|
:return:
|
|
"""
|
|
params_path = {"realm-name": self.__realm_name}
|
|
payload = {"username": username, "password": password,
|
|
"client_id": self.__client_id, "grant_type": grant_type}
|
|
|
|
if self.__client_secret_key:
|
|
payload.update({"client_secret": self.__client_secret_key})
|
|
|
|
data_raw = self.__connection.raw_post(URL_TOKEN.format(**params_path),
|
|
data=payload)
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def userinfo(self, token):
|
|
"""
|
|
The userinfo endpoint returns standard claims about the authenticated user,
|
|
and is protected by a bearer token.
|
|
|
|
http://openid.net/specs/openid-connect-core-1_0.html#UserInfo
|
|
|
|
:param token:
|
|
:return:
|
|
"""
|
|
|
|
self.__connection.add_param_headers("Authorization", "Bearer " + token)
|
|
params_path = {"realm-name": self.__realm_name}
|
|
|
|
data_raw = self.__connection.raw_get(URL_USERINFO.format(**params_path))
|
|
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def logout(self, refresh_token):
|
|
"""
|
|
The logout endpoint logs out the authenticated user.
|
|
:param refresh_token:
|
|
:return:
|
|
"""
|
|
params_path = {"realm-name": self.__realm_name}
|
|
payload = {"client_id": self.__client_id, "refresh_token": refresh_token}
|
|
|
|
if self.__client_secret_key:
|
|
payload.update({"client_secret": self.__client_secret_key})
|
|
|
|
data_raw = self.__connection.raw_post(URL_LOGOUT.format(**params_path),
|
|
data=payload)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakGetError, expected_code=204)
|
|
|
|
def certs(self):
|
|
"""
|
|
The certificate endpoint returns the public keys enabled by the realm, encoded as a
|
|
JSON Web Key (JWK). Depending on the realm settings there can be one or more keys enabled
|
|
for verifying tokens.
|
|
|
|
https://tools.ietf.org/html/rfc7517
|
|
|
|
:return:
|
|
"""
|
|
params_path = {"realm-name": self.__realm_name}
|
|
data_raw = self.__connection.raw_get(URL_CERTS.format(**params_path))
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def entitlement(self, token, resource_server_id):
|
|
"""
|
|
Client applications can use a specific endpoint to obtain a special security token
|
|
called a requesting party token (RPT). This token consists of all the entitlements
|
|
(or permissions) for a user as a result of the evaluation of the permissions and authorization
|
|
policies associated with the resources being requested. With an RPT, client applications can
|
|
gain access to protected resources at the resource server.
|
|
|
|
:return:
|
|
"""
|
|
self.__connection.add_param_headers("Authorization", "Bearer " + token)
|
|
params_path = {"realm-name": self.__realm_name, "resource-server-id": resource_server_id}
|
|
data_raw = self.__connection.raw_get(URL_ENTITLEMENT.format(**params_path))
|
|
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|
|
|
|
def instropect(self, token, rpt, token_type_hint="requesting_party_token"):
|
|
"""
|
|
The introspection endpoint is used to retrieve the active state of a token. It is can only be
|
|
invoked by confidential clients.
|
|
|
|
https://tools.ietf.org/html/rfc7662
|
|
|
|
:param token:
|
|
:param rpt:
|
|
:param token_type_hint:
|
|
|
|
:return:
|
|
"""
|
|
params_path = {"realm-name": self.__realm_name}
|
|
payload = {"client_id": self.__client_id, "token": rpt,
|
|
'token_type_hint': token_type_hint}
|
|
|
|
if self.__client_secret_key:
|
|
payload.update({"client_secret": self.__client_secret_key})
|
|
|
|
self.__connection.add_param_headers("Authorization", "Bearer " + token)
|
|
data_raw = self.__connection.raw_post(URL_INTROSPECT.format(**params_path),
|
|
data=payload)
|
|
|
|
return raise_error_from_response(data_raw, KeycloakGetError)
|