Merge pull request #4030 from pedroigor/KEYCLOAK-3135
[KEYCLOAK-3135] - Part 1: Permission Management API
This commit is contained in:
commit
2336e97bf0
84 changed files with 3626 additions and 1155 deletions
|
@ -1,69 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
|
||||||
* and other contributors as indicated by the @author tags.
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.keycloak.authorization.policy.provider.aggregated;
|
|
||||||
|
|
||||||
import org.keycloak.authorization.model.Policy;
|
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
|
||||||
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
|
||||||
*/
|
|
||||||
public class AggregatePolicyAdminResource implements PolicyProviderAdminService {
|
|
||||||
|
|
||||||
private final ResourceServer resourceServer;
|
|
||||||
|
|
||||||
public AggregatePolicyAdminResource(ResourceServer resourceServer) {
|
|
||||||
this.resourceServer = resourceServer;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void onCreate(Policy policy) {
|
|
||||||
verifyCircularReference(policy, new ArrayList<>());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void onUpdate(Policy policy) {
|
|
||||||
verifyCircularReference(policy, new ArrayList<>());
|
|
||||||
}
|
|
||||||
|
|
||||||
private void verifyCircularReference(Policy policy, List<String> ids) {
|
|
||||||
if (!policy.getType().equals("aggregate")) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (ids.contains(policy.getId())) {
|
|
||||||
throw new RuntimeException("Circular reference found [" + policy.getName() + "].");
|
|
||||||
}
|
|
||||||
|
|
||||||
ids.add(policy.getId());
|
|
||||||
|
|
||||||
for (Policy associated : policy.getAssociatedPolicies()) {
|
|
||||||
verifyCircularReference(associated, ids);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void onRemove(Policy policy) {
|
|
||||||
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -17,19 +17,24 @@
|
||||||
*/
|
*/
|
||||||
package org.keycloak.authorization.policy.provider.aggregated;
|
package org.keycloak.authorization.policy.provider.aggregated;
|
||||||
|
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
import org.keycloak.Config;
|
import org.keycloak.Config;
|
||||||
import org.keycloak.authorization.AuthorizationProvider;
|
import org.keycloak.authorization.AuthorizationProvider;
|
||||||
|
import org.keycloak.authorization.model.Policy;
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
||||||
import org.keycloak.models.KeycloakSession;
|
import org.keycloak.models.KeycloakSession;
|
||||||
import org.keycloak.models.KeycloakSessionFactory;
|
import org.keycloak.models.KeycloakSessionFactory;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
public class AggregatePolicyProviderFactory implements PolicyProviderFactory {
|
public class AggregatePolicyProviderFactory implements PolicyProviderFactory<PolicyRepresentation> {
|
||||||
|
|
||||||
private AggregatePolicyProvider provider = new AggregatePolicyProvider();
|
private AggregatePolicyProvider provider = new AggregatePolicyProvider();
|
||||||
|
|
||||||
|
@ -49,8 +54,8 @@ public class AggregatePolicyProviderFactory implements PolicyProviderFactory {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer) {
|
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer, AuthorizationProvider authorization) {
|
||||||
return new AggregatePolicyAdminResource(resourceServer);
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -58,6 +63,37 @@ public class AggregatePolicyProviderFactory implements PolicyProviderFactory {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onCreate(Policy policy, PolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
verifyCircularReference(policy, new ArrayList<>());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onUpdate(Policy policy, PolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
verifyCircularReference(policy, new ArrayList<>());
|
||||||
|
}
|
||||||
|
|
||||||
|
private void verifyCircularReference(Policy policy, List<String> ids) {
|
||||||
|
if (!policy.getType().equals("aggregate")) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (ids.contains(policy.getId())) {
|
||||||
|
throw new RuntimeException("Circular reference found [" + policy.getName() + "].");
|
||||||
|
}
|
||||||
|
|
||||||
|
ids.add(policy.getId());
|
||||||
|
|
||||||
|
for (Policy associated : policy.getAssociatedPolicies()) {
|
||||||
|
verifyCircularReference(associated, ids);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onRemove(Policy policy, AuthorizationProvider authorization) {
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void init(Config.Scope config) {
|
public void init(Config.Scope config) {
|
||||||
|
|
||||||
|
|
|
@ -40,7 +40,7 @@ public class ClientPolicyProviderFactory implements PolicyProviderFactory {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer) {
|
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer, AuthorizationProvider authorization) {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -42,7 +42,7 @@ public class JSPolicyProviderFactory implements PolicyProviderFactory {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer) {
|
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer, AuthorizationProvider authorization) {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -1,18 +1,20 @@
|
||||||
package org.keycloak.authorization.policy.provider.resource;
|
package org.keycloak.authorization.policy.provider.resource;
|
||||||
|
|
||||||
|
import java.util.Map;
|
||||||
|
|
||||||
import org.keycloak.Config;
|
import org.keycloak.Config;
|
||||||
import org.keycloak.authorization.AuthorizationProvider;
|
import org.keycloak.authorization.AuthorizationProvider;
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
import org.keycloak.authorization.model.Policy;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
||||||
import org.keycloak.models.KeycloakSession;
|
import org.keycloak.models.KeycloakSession;
|
||||||
import org.keycloak.models.KeycloakSessionFactory;
|
import org.keycloak.models.KeycloakSessionFactory;
|
||||||
|
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
public class ResourcePolicyProviderFactory implements PolicyProviderFactory {
|
public class ResourcePolicyProviderFactory implements PolicyProviderFactory<ResourcePermissionRepresentation> {
|
||||||
|
|
||||||
private ResourcePolicyProvider provider = new ResourcePolicyProvider();
|
private ResourcePolicyProvider provider = new ResourcePolicyProvider();
|
||||||
|
|
||||||
|
@ -32,8 +34,14 @@ public class ResourcePolicyProviderFactory implements PolicyProviderFactory {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer) {
|
public Class<ResourcePermissionRepresentation> getRepresentationType() {
|
||||||
return null;
|
return ResourcePermissionRepresentation.class;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ResourcePermissionRepresentation toRepresentation(Policy policy, ResourcePermissionRepresentation representation) {
|
||||||
|
representation.setResourceType(policy.getConfig().get("defaultResourceType"));
|
||||||
|
return representation;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -41,6 +49,39 @@ public class ResourcePolicyProviderFactory implements PolicyProviderFactory {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onCreate(Policy policy, ResourcePermissionRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
updateResourceType(policy, representation);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onUpdate(Policy policy, ResourcePermissionRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
updateResourceType(policy, representation);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void updateResourceType(Policy policy, ResourcePermissionRepresentation representation) {
|
||||||
|
if (representation != null) {
|
||||||
|
//TODO: remove this check once we migrate to new API
|
||||||
|
if (ResourcePermissionRepresentation.class.equals(representation.getClass())) {
|
||||||
|
ResourcePermissionRepresentation resourcePermission = ResourcePermissionRepresentation.class.cast(representation);
|
||||||
|
Map<String, String> config = policy.getConfig();
|
||||||
|
|
||||||
|
config.compute("defaultResourceType", (key, value) -> {
|
||||||
|
String resourceType = resourcePermission.getResourceType();
|
||||||
|
return resourceType != null ? resourcePermission.getResourceType() : null;
|
||||||
|
});
|
||||||
|
|
||||||
|
policy.setConfig(config);
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onRemove(Policy policy, AuthorizationProvider authorization) {
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void init(Config.Scope config) {
|
public void init(Config.Scope config) {
|
||||||
|
|
||||||
|
|
|
@ -35,19 +35,23 @@ import org.keycloak.models.RealmModel;
|
||||||
import org.keycloak.models.RoleContainerModel;
|
import org.keycloak.models.RoleContainerModel;
|
||||||
import org.keycloak.models.RoleContainerModel.RoleRemovedEvent;
|
import org.keycloak.models.RoleContainerModel.RoleRemovedEvent;
|
||||||
import org.keycloak.models.RoleModel;
|
import org.keycloak.models.RoleModel;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.RolePolicyRepresentation;
|
||||||
import org.keycloak.util.JsonSerialization;
|
import org.keycloak.util.JsonSerialization;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
|
import java.util.Arrays;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
|
import java.util.HashSet;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.function.Consumer;
|
import java.util.Set;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
public class RolePolicyProviderFactory implements PolicyProviderFactory {
|
public class RolePolicyProviderFactory implements PolicyProviderFactory<RolePolicyRepresentation> {
|
||||||
|
|
||||||
private RolePolicyProvider provider = new RolePolicyProvider();
|
private RolePolicyProvider provider = new RolePolicyProvider();
|
||||||
|
|
||||||
|
@ -67,7 +71,7 @@ public class RolePolicyProviderFactory implements PolicyProviderFactory {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer) {
|
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer, AuthorizationProvider authorization) {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -76,6 +80,107 @@ public class RolePolicyProviderFactory implements PolicyProviderFactory {
|
||||||
return new RolePolicyProvider();
|
return new RolePolicyProvider();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public RolePolicyRepresentation toRepresentation(Policy policy, RolePolicyRepresentation representation) {
|
||||||
|
try {
|
||||||
|
representation.setRoles(JsonSerialization.readValue(policy.getConfig().get("roles"), Set.class));
|
||||||
|
} catch (IOException cause) {
|
||||||
|
throw new RuntimeException("Failed to deserialize roles", cause);
|
||||||
|
}
|
||||||
|
return representation;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Class<RolePolicyRepresentation> getRepresentationType() {
|
||||||
|
return RolePolicyRepresentation.class;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onCreate(Policy policy, RolePolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
updateRoles(policy, representation, authorization);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onUpdate(Policy policy, RolePolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
updateRoles(policy, representation, authorization);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onImport(Policy policy, PolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
try {
|
||||||
|
updateRoles(policy, authorization, new HashSet<>(Arrays.asList(JsonSerialization.readValue(representation.getConfig().get("roles"), RolePolicyRepresentation.RoleDefinition[].class))));
|
||||||
|
} catch (IOException cause) {
|
||||||
|
throw new RuntimeException("Failed to deserialize roles during import", cause);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private void updateRoles(Policy policy, RolePolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
updateRoles(policy, authorization, representation.getRoles());
|
||||||
|
}
|
||||||
|
|
||||||
|
private void updateRoles(Policy policy, AuthorizationProvider authorization, Set<RolePolicyRepresentation.RoleDefinition> roles) {
|
||||||
|
try {
|
||||||
|
RealmModel realm = authorization.getRealm();
|
||||||
|
Set<RolePolicyRepresentation.RoleDefinition> updatedRoles = new HashSet<>();
|
||||||
|
|
||||||
|
if (roles != null) {
|
||||||
|
for (RolePolicyRepresentation.RoleDefinition definition : roles) {
|
||||||
|
String roleName = definition.getId();
|
||||||
|
String clientId = null;
|
||||||
|
int clientIdSeparator = roleName.indexOf("/");
|
||||||
|
|
||||||
|
if (clientIdSeparator != -1) {
|
||||||
|
clientId = roleName.substring(0, clientIdSeparator);
|
||||||
|
roleName = roleName.substring(clientIdSeparator + 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
RoleModel role;
|
||||||
|
|
||||||
|
if (clientId == null) {
|
||||||
|
role = realm.getRole(roleName);
|
||||||
|
|
||||||
|
if (role == null) {
|
||||||
|
role = realm.getRoleById(roleName);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
ClientModel client = realm.getClientByClientId(clientId);
|
||||||
|
|
||||||
|
if (client == null) {
|
||||||
|
throw new RuntimeException("Client with id [" + clientId + "] not found.");
|
||||||
|
}
|
||||||
|
|
||||||
|
role = client.getRole(roleName);
|
||||||
|
}
|
||||||
|
|
||||||
|
// fallback to find any client role with the given name
|
||||||
|
if (role == null) {
|
||||||
|
String finalRoleName = roleName;
|
||||||
|
role = realm.getClients().stream().map(clientModel -> clientModel.getRole(finalRoleName)).filter(roleModel -> roleModel != null)
|
||||||
|
.findFirst().orElse(null);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (role == null) {
|
||||||
|
throw new RuntimeException("Error while importing configuration. Role [" + roleName + "] could not be found.");
|
||||||
|
}
|
||||||
|
|
||||||
|
definition.setId(role.getId());
|
||||||
|
|
||||||
|
updatedRoles.add(definition);
|
||||||
|
}
|
||||||
|
try {
|
||||||
|
} catch (Exception e) {
|
||||||
|
throw new RuntimeException("Error while updating policy [" + policy.getName() + "].", e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Map<String, String> config = policy.getConfig();
|
||||||
|
config.put("roles", JsonSerialization.writeValueAsString(updatedRoles));
|
||||||
|
policy.setConfig(config);
|
||||||
|
} catch (IOException cause) {
|
||||||
|
throw new RuntimeException("Failed to deserialize roles", cause);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void init(Config.Scope config) {
|
public void init(Config.Scope config) {
|
||||||
|
|
||||||
|
|
|
@ -2,17 +2,17 @@ package org.keycloak.authorization.policy.provider.scope;
|
||||||
|
|
||||||
import org.keycloak.Config;
|
import org.keycloak.Config;
|
||||||
import org.keycloak.authorization.AuthorizationProvider;
|
import org.keycloak.authorization.AuthorizationProvider;
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
import org.keycloak.authorization.model.Policy;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
||||||
import org.keycloak.models.KeycloakSession;
|
import org.keycloak.models.KeycloakSession;
|
||||||
import org.keycloak.models.KeycloakSessionFactory;
|
import org.keycloak.models.KeycloakSessionFactory;
|
||||||
|
import org.keycloak.representations.idm.authorization.ScopePermissionRepresentation;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
public class ScopePolicyProviderFactory implements PolicyProviderFactory {
|
public class ScopePolicyProviderFactory implements PolicyProviderFactory<ScopePermissionRepresentation> {
|
||||||
|
|
||||||
private ScopePolicyProvider provider = new ScopePolicyProvider();
|
private ScopePolicyProvider provider = new ScopePolicyProvider();
|
||||||
|
|
||||||
|
@ -32,13 +32,18 @@ public class ScopePolicyProviderFactory implements PolicyProviderFactory {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer) {
|
public PolicyProvider create(KeycloakSession session) {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PolicyProvider create(KeycloakSession session) {
|
public Class<ScopePermissionRepresentation> getRepresentationType() {
|
||||||
return null;
|
return ScopePermissionRepresentation.class;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ScopePermissionRepresentation toRepresentation(Policy policy, ScopePermissionRepresentation representation) {
|
||||||
|
return representation;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -18,45 +18,11 @@
|
||||||
|
|
||||||
package org.keycloak.authorization.policy.provider.time;
|
package org.keycloak.authorization.policy.provider.time;
|
||||||
|
|
||||||
import org.keycloak.authorization.model.Policy;
|
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
||||||
|
|
||||||
import java.text.SimpleDateFormat;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
public class TimePolicyAdminResource implements PolicyProviderAdminService {
|
public class TimePolicyAdminResource implements PolicyProviderAdminService {
|
||||||
|
|
||||||
@Override
|
|
||||||
public void onCreate(Policy policy) {
|
|
||||||
validateConfig(policy);
|
|
||||||
}
|
|
||||||
|
|
||||||
private void validateConfig(Policy policy) {
|
|
||||||
String nbf = policy.getConfig().get("nbf");
|
|
||||||
String noa = policy.getConfig().get("noa");
|
|
||||||
|
|
||||||
if (nbf != null && noa != null) {
|
|
||||||
validateFormat(nbf);
|
|
||||||
validateFormat(noa);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void onUpdate(Policy policy) {
|
|
||||||
validateConfig(policy);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void onRemove(Policy policy) {
|
|
||||||
}
|
|
||||||
|
|
||||||
private void validateFormat(String date) {
|
|
||||||
try {
|
|
||||||
new SimpleDateFormat(TimePolicyProvider.DEFAULT_DATE_PATTERN).parse(TimePolicyProvider.format(date));
|
|
||||||
} catch (Exception e) {
|
|
||||||
throw new RuntimeException("Could not parse a date using format [" + date + "]");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,18 +1,22 @@
|
||||||
package org.keycloak.authorization.policy.provider.time;
|
package org.keycloak.authorization.policy.provider.time;
|
||||||
|
|
||||||
|
import java.text.SimpleDateFormat;
|
||||||
|
|
||||||
import org.keycloak.Config;
|
import org.keycloak.Config;
|
||||||
import org.keycloak.authorization.AuthorizationProvider;
|
import org.keycloak.authorization.AuthorizationProvider;
|
||||||
|
import org.keycloak.authorization.model.Policy;
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
||||||
import org.keycloak.models.KeycloakSession;
|
import org.keycloak.models.KeycloakSession;
|
||||||
import org.keycloak.models.KeycloakSessionFactory;
|
import org.keycloak.models.KeycloakSessionFactory;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
public class TimePolicyProviderFactory implements PolicyProviderFactory {
|
public class TimePolicyProviderFactory implements PolicyProviderFactory<PolicyRepresentation> {
|
||||||
|
|
||||||
private TimePolicyProvider provider = new TimePolicyProvider();
|
private TimePolicyProvider provider = new TimePolicyProvider();
|
||||||
|
|
||||||
|
@ -32,7 +36,7 @@ public class TimePolicyProviderFactory implements PolicyProviderFactory {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer) {
|
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer, AuthorizationProvider authorization) {
|
||||||
return new TimePolicyAdminResource();
|
return new TimePolicyAdminResource();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -41,6 +45,38 @@ public class TimePolicyProviderFactory implements PolicyProviderFactory {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onCreate(Policy policy, PolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
validateConfig(policy);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void validateConfig(Policy policy) {
|
||||||
|
String nbf = policy.getConfig().get("nbf");
|
||||||
|
String noa = policy.getConfig().get("noa");
|
||||||
|
|
||||||
|
if (nbf != null && noa != null) {
|
||||||
|
validateFormat(nbf);
|
||||||
|
validateFormat(noa);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onUpdate(Policy policy, PolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
validateConfig(policy);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onRemove(Policy policy, AuthorizationProvider authorization) {
|
||||||
|
}
|
||||||
|
|
||||||
|
private void validateFormat(String date) {
|
||||||
|
try {
|
||||||
|
new SimpleDateFormat(TimePolicyProvider.DEFAULT_DATE_PATTERN).parse(TimePolicyProvider.format(date));
|
||||||
|
} catch (Exception e) {
|
||||||
|
throw new RuntimeException("Could not parse a date using format [" + date + "]");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void init(Config.Scope config) {
|
public void init(Config.Scope config) {
|
||||||
|
|
||||||
|
|
|
@ -20,14 +20,16 @@ package org.keycloak.authorization.policy.provider.user;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
|
import java.util.HashSet;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
import java.util.Map;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
import org.keycloak.Config;
|
import org.keycloak.Config;
|
||||||
import org.keycloak.authorization.AuthorizationProvider;
|
import org.keycloak.authorization.AuthorizationProvider;
|
||||||
import org.keycloak.authorization.model.Policy;
|
import org.keycloak.authorization.model.Policy;
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
||||||
import org.keycloak.authorization.store.PolicyStore;
|
import org.keycloak.authorization.store.PolicyStore;
|
||||||
import org.keycloak.authorization.store.ResourceServerStore;
|
import org.keycloak.authorization.store.ResourceServerStore;
|
||||||
|
@ -37,12 +39,15 @@ import org.keycloak.models.KeycloakSessionFactory;
|
||||||
import org.keycloak.models.RealmModel;
|
import org.keycloak.models.RealmModel;
|
||||||
import org.keycloak.models.UserModel;
|
import org.keycloak.models.UserModel;
|
||||||
import org.keycloak.models.UserModel.UserRemovedEvent;
|
import org.keycloak.models.UserModel.UserRemovedEvent;
|
||||||
|
import org.keycloak.models.UserProvider;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.UserPolicyRepresentation;
|
||||||
import org.keycloak.util.JsonSerialization;
|
import org.keycloak.util.JsonSerialization;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
public class UserPolicyProviderFactory implements PolicyProviderFactory {
|
public class UserPolicyProviderFactory implements PolicyProviderFactory<UserPolicyRepresentation> {
|
||||||
|
|
||||||
private UserPolicyProvider provider = new UserPolicyProvider();
|
private UserPolicyProvider provider = new UserPolicyProvider();
|
||||||
|
|
||||||
|
@ -62,13 +67,86 @@ public class UserPolicyProviderFactory implements PolicyProviderFactory {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer) {
|
public PolicyProvider create(KeycloakSession session) {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PolicyProvider create(KeycloakSession session) {
|
public UserPolicyRepresentation toRepresentation(Policy policy, UserPolicyRepresentation representation) {
|
||||||
return null;
|
try {
|
||||||
|
representation.setUsers(JsonSerialization.readValue(policy.getConfig().get("users"), Set.class));
|
||||||
|
} catch (IOException cause) {
|
||||||
|
throw new RuntimeException("Failed to deserialize roles", cause);
|
||||||
|
}
|
||||||
|
return representation;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Class<UserPolicyRepresentation> getRepresentationType() {
|
||||||
|
return UserPolicyRepresentation.class;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onCreate(Policy policy, UserPolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
updateUsers(policy, representation, authorization);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onUpdate(Policy policy, UserPolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
updateUsers(policy, representation, authorization);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onImport(Policy policy, PolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
try {
|
||||||
|
updateUsers(policy, authorization, JsonSerialization.readValue(representation.getConfig().get("users"), Set.class));
|
||||||
|
} catch (IOException cause) {
|
||||||
|
throw new RuntimeException("Failed to deserialize users during import", cause);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private void updateUsers(Policy policy, UserPolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
updateUsers(policy, authorization, representation.getUsers());
|
||||||
|
}
|
||||||
|
|
||||||
|
private void updateUsers(Policy policy, AuthorizationProvider authorization, Set<String> users) {
|
||||||
|
try {
|
||||||
|
KeycloakSession session = authorization.getKeycloakSession();
|
||||||
|
RealmModel realm = authorization.getRealm();
|
||||||
|
UserProvider userProvider = session.users();
|
||||||
|
Set<String> updatedUsers = new HashSet<>();
|
||||||
|
|
||||||
|
if (users != null) {
|
||||||
|
try {
|
||||||
|
for (String userId : users) {
|
||||||
|
UserModel user = null;
|
||||||
|
|
||||||
|
try {
|
||||||
|
user = userProvider.getUserByUsername(userId, realm);
|
||||||
|
} catch (Exception ignore) {
|
||||||
|
}
|
||||||
|
|
||||||
|
if (user == null) {
|
||||||
|
user = userProvider.getUserById(userId, realm);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (user == null) {
|
||||||
|
throw new RuntimeException("Error while importing configuration. User [" + userId + "] could not be found.");
|
||||||
|
}
|
||||||
|
|
||||||
|
updatedUsers.add(user.getId());
|
||||||
|
}
|
||||||
|
} catch (Exception e) {
|
||||||
|
throw new RuntimeException("Error while updating policy [" + policy.getName() + "].", e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Map<String, String> config = policy.getConfig();
|
||||||
|
config.put("users", JsonSerialization.writeValueAsString(updatedUsers));
|
||||||
|
policy.setConfig(config);
|
||||||
|
} catch (IOException cause) {
|
||||||
|
throw new RuntimeException("Failed to deserialize roles", cause);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -133,16 +211,16 @@ public class UserPolicyProviderFactory implements PolicyProviderFactory {
|
||||||
}
|
}
|
||||||
|
|
||||||
static String[] getUsers(Policy policy) {
|
static String[] getUsers(Policy policy) {
|
||||||
String roles = policy.getConfig().get("users");
|
String users = policy.getConfig().get("users");
|
||||||
|
|
||||||
if (roles != null) {
|
if (users != null) {
|
||||||
try {
|
try {
|
||||||
return JsonSerialization.readValue(roles.getBytes(), String[].class);
|
return JsonSerialization.readValue(users.getBytes(), String[].class);
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
throw new RuntimeException("Could not parse roles [" + roles + "] from policy config [" + policy.getName() + ".", e);
|
throw new RuntimeException("Could not parse users [" + users + "] from policy config [" + policy.getName() + ".", e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return new String[]{};
|
return new String[0];
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -16,8 +16,6 @@
|
||||||
*/
|
*/
|
||||||
package org.keycloak.authorization.policy.provider.drools;
|
package org.keycloak.authorization.policy.provider.drools;
|
||||||
|
|
||||||
import org.keycloak.authorization.model.Policy;
|
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
||||||
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
import org.kie.api.runtime.KieContainer;
|
import org.kie.api.runtime.KieContainer;
|
||||||
|
@ -33,29 +31,12 @@ import javax.ws.rs.core.Response;
|
||||||
*/
|
*/
|
||||||
public class DroolsPolicyAdminResource implements PolicyProviderAdminService {
|
public class DroolsPolicyAdminResource implements PolicyProviderAdminService {
|
||||||
|
|
||||||
private final ResourceServer resourceServer;
|
|
||||||
private final DroolsPolicyProviderFactory factory;
|
private final DroolsPolicyProviderFactory factory;
|
||||||
|
|
||||||
public DroolsPolicyAdminResource(ResourceServer resourceServer, DroolsPolicyProviderFactory factory) {
|
public DroolsPolicyAdminResource(DroolsPolicyProviderFactory factory) {
|
||||||
this.resourceServer = resourceServer;
|
|
||||||
this.factory = factory;
|
this.factory = factory;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public void onCreate(Policy policy) {
|
|
||||||
this.factory.update(policy);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void onUpdate(Policy policy) {
|
|
||||||
this.factory.update(policy);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void onRemove(Policy policy) {
|
|
||||||
this.factory.remove(policy);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Path("/resolveModules")
|
@Path("/resolveModules")
|
||||||
@POST
|
@POST
|
||||||
@Consumes("application/json")
|
@Consumes("application/json")
|
||||||
|
|
|
@ -13,6 +13,8 @@ import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
||||||
import org.keycloak.models.KeycloakSession;
|
import org.keycloak.models.KeycloakSession;
|
||||||
import org.keycloak.models.KeycloakSessionFactory;
|
import org.keycloak.models.KeycloakSessionFactory;
|
||||||
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
import org.kie.api.KieServices;
|
import org.kie.api.KieServices;
|
||||||
import org.kie.api.KieServices.Factory;
|
import org.kie.api.KieServices.Factory;
|
||||||
import org.kie.api.runtime.KieContainer;
|
import org.kie.api.runtime.KieContainer;
|
||||||
|
@ -49,8 +51,8 @@ public class DroolsPolicyProviderFactory implements PolicyProviderFactory {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer) {
|
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer, AuthorizationProvider authorization) {
|
||||||
return new DroolsPolicyAdminResource(resourceServer, this);
|
return new DroolsPolicyAdminResource(this);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -58,6 +60,26 @@ public class DroolsPolicyProviderFactory implements PolicyProviderFactory {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onCreate(Policy policy, AbstractPolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
update(policy);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onUpdate(Policy policy, AbstractPolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
update(policy);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onImport(Policy policy, PolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
update(policy);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void onRemove(Policy policy, AuthorizationProvider authorization) {
|
||||||
|
remove(policy);
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void init(Config.Scope config) {
|
public void init(Config.Scope config) {
|
||||||
this.ks = Factory.get();
|
this.ks = Factory.get();
|
||||||
|
|
|
@ -0,0 +1,132 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.representations.idm.authorization;
|
||||||
|
|
||||||
|
import java.util.Arrays;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.Objects;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public class AbstractPolicyRepresentation {
|
||||||
|
|
||||||
|
private String id;
|
||||||
|
private String name;
|
||||||
|
private String description;
|
||||||
|
private String type;
|
||||||
|
private Set<String> policies;
|
||||||
|
private Set<String> resources;
|
||||||
|
private Set<String> scopes;
|
||||||
|
private Logic logic = Logic.POSITIVE;
|
||||||
|
private DecisionStrategy decisionStrategy = DecisionStrategy.UNANIMOUS;
|
||||||
|
|
||||||
|
public String getId() {
|
||||||
|
return this.id;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setId(String id) {
|
||||||
|
this.id = id;
|
||||||
|
}
|
||||||
|
|
||||||
|
public String getType() {
|
||||||
|
return this.type;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setType(String type) {
|
||||||
|
this.type = type;
|
||||||
|
}
|
||||||
|
|
||||||
|
public DecisionStrategy getDecisionStrategy() {
|
||||||
|
return this.decisionStrategy;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setDecisionStrategy(DecisionStrategy decisionStrategy) {
|
||||||
|
this.decisionStrategy = decisionStrategy;
|
||||||
|
}
|
||||||
|
|
||||||
|
public Logic getLogic() {
|
||||||
|
return logic;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setLogic(Logic logic) {
|
||||||
|
this.logic = logic;
|
||||||
|
}
|
||||||
|
|
||||||
|
public String getName() {
|
||||||
|
return name;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setName(String name) {
|
||||||
|
this.name = name;
|
||||||
|
}
|
||||||
|
|
||||||
|
public String getDescription() {
|
||||||
|
return this.description;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setDescription(String description) {
|
||||||
|
this.description = description;
|
||||||
|
}
|
||||||
|
|
||||||
|
public Set<String> getPolicies() {
|
||||||
|
return policies;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void addPolicy(String... id) {
|
||||||
|
if (this.policies == null) {
|
||||||
|
this.policies = new HashSet<>();
|
||||||
|
}
|
||||||
|
this.policies.addAll(Arrays.asList(id));
|
||||||
|
}
|
||||||
|
|
||||||
|
public Set<String> getResources() {
|
||||||
|
return resources;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void addResource(String id) {
|
||||||
|
if (this.resources == null) {
|
||||||
|
this.resources = new HashSet<>();
|
||||||
|
}
|
||||||
|
this.resources.add(id);
|
||||||
|
}
|
||||||
|
|
||||||
|
public Set<String> getScopes() {
|
||||||
|
return scopes;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void addScope(String... id) {
|
||||||
|
if (this.scopes == null) {
|
||||||
|
this.scopes = new HashSet<>();
|
||||||
|
}
|
||||||
|
this.scopes.addAll(Arrays.asList(id));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean equals(final Object o) {
|
||||||
|
if (this == o) return true;
|
||||||
|
if (o == null || getClass() != o.getClass()) return false;
|
||||||
|
final AbstractPolicyRepresentation policy = (AbstractPolicyRepresentation) o;
|
||||||
|
return Objects.equals(getId(), policy.getId());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public int hashCode() {
|
||||||
|
return Objects.hash(getId());
|
||||||
|
}
|
||||||
|
}
|
|
@ -18,53 +18,14 @@ package org.keycloak.representations.idm.authorization;
|
||||||
|
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.Objects;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
public class PolicyRepresentation {
|
public class PolicyRepresentation extends AbstractPolicyRepresentation {
|
||||||
|
|
||||||
private String id;
|
|
||||||
private String name;
|
|
||||||
private String description;
|
|
||||||
private String type;
|
|
||||||
private Logic logic = Logic.POSITIVE;
|
|
||||||
private DecisionStrategy decisionStrategy = DecisionStrategy.UNANIMOUS;
|
|
||||||
private Map<String, String> config = new HashMap();
|
private Map<String, String> config = new HashMap();
|
||||||
|
|
||||||
public String getId() {
|
|
||||||
return this.id;
|
|
||||||
}
|
|
||||||
|
|
||||||
public void setId(String id) {
|
|
||||||
this.id = id;
|
|
||||||
}
|
|
||||||
|
|
||||||
public String getType() {
|
|
||||||
return this.type;
|
|
||||||
}
|
|
||||||
|
|
||||||
public void setType(String type) {
|
|
||||||
this.type = type;
|
|
||||||
}
|
|
||||||
|
|
||||||
public DecisionStrategy getDecisionStrategy() {
|
|
||||||
return this.decisionStrategy;
|
|
||||||
}
|
|
||||||
|
|
||||||
public void setDecisionStrategy(DecisionStrategy decisionStrategy) {
|
|
||||||
this.decisionStrategy = decisionStrategy;
|
|
||||||
}
|
|
||||||
|
|
||||||
public Logic getLogic() {
|
|
||||||
return logic;
|
|
||||||
}
|
|
||||||
|
|
||||||
public void setLogic(Logic logic) {
|
|
||||||
this.logic = logic;
|
|
||||||
}
|
|
||||||
|
|
||||||
public Map<String, String> getConfig() {
|
public Map<String, String> getConfig() {
|
||||||
return this.config;
|
return this.config;
|
||||||
}
|
}
|
||||||
|
@ -72,33 +33,4 @@ public class PolicyRepresentation {
|
||||||
public void setConfig(Map<String, String> config) {
|
public void setConfig(Map<String, String> config) {
|
||||||
this.config = config;
|
this.config = config;
|
||||||
}
|
}
|
||||||
|
|
||||||
public String getName() {
|
|
||||||
return name;
|
|
||||||
}
|
|
||||||
|
|
||||||
public void setName(String name) {
|
|
||||||
this.name = name;
|
|
||||||
}
|
|
||||||
|
|
||||||
public String getDescription() {
|
|
||||||
return this.description;
|
|
||||||
}
|
|
||||||
|
|
||||||
public void setDescription(String description) {
|
|
||||||
this.description = description;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public boolean equals(final Object o) {
|
|
||||||
if (this == o) return true;
|
|
||||||
if (o == null || getClass() != o.getClass()) return false;
|
|
||||||
final PolicyRepresentation policy = (PolicyRepresentation) o;
|
|
||||||
return Objects.equals(getId(), policy.getId());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public int hashCode() {
|
|
||||||
return Objects.hash(getId());
|
|
||||||
}
|
|
||||||
}
|
}
|
|
@ -0,0 +1,38 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.representations.idm.authorization;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public class ResourcePermissionRepresentation extends AbstractPolicyRepresentation {
|
||||||
|
|
||||||
|
private String resourceType;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getType() {
|
||||||
|
return "resource";
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setResourceType(String resourceType) {
|
||||||
|
this.resourceType = resourceType;
|
||||||
|
}
|
||||||
|
|
||||||
|
public String getResourceType() {
|
||||||
|
return resourceType;
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,86 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.representations.idm.authorization;
|
||||||
|
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public class RolePolicyRepresentation extends AbstractPolicyRepresentation {
|
||||||
|
|
||||||
|
private Set<RoleDefinition> roles;
|
||||||
|
|
||||||
|
public Set<RoleDefinition> getRoles() {
|
||||||
|
return roles;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setRoles(Set<RoleDefinition> roles) {
|
||||||
|
this.roles = roles;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void addRole(String name, boolean required) {
|
||||||
|
if (roles == null) {
|
||||||
|
roles = new HashSet<>();
|
||||||
|
}
|
||||||
|
roles.add(new RoleDefinition(name, required));
|
||||||
|
}
|
||||||
|
|
||||||
|
public void addRole(String name) {
|
||||||
|
addRole(name, false);
|
||||||
|
}
|
||||||
|
|
||||||
|
public void addClientRole(String clientId, String name) {
|
||||||
|
addRole(clientId + "/" +name, false);
|
||||||
|
}
|
||||||
|
|
||||||
|
public void addClientRole(String clientId, String name, boolean required) {
|
||||||
|
addRole(clientId + "/" + name, required);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static class RoleDefinition {
|
||||||
|
|
||||||
|
private String id;
|
||||||
|
private boolean required;
|
||||||
|
|
||||||
|
public RoleDefinition() {
|
||||||
|
this(null, false);
|
||||||
|
}
|
||||||
|
|
||||||
|
public RoleDefinition(String id, boolean required) {
|
||||||
|
this.id = id;
|
||||||
|
this.required = required;
|
||||||
|
}
|
||||||
|
|
||||||
|
public String getId() {
|
||||||
|
return id;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setId(String id) {
|
||||||
|
this.id = id;
|
||||||
|
}
|
||||||
|
|
||||||
|
public boolean isRequired() {
|
||||||
|
return required;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setRequired(boolean required) {
|
||||||
|
this.required = required;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,28 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.representations.idm.authorization;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public class ScopePermissionRepresentation extends AbstractPolicyRepresentation {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getType() {
|
||||||
|
return "scope";
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,43 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.representations.idm.authorization;
|
||||||
|
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public class UserPolicyRepresentation extends AbstractPolicyRepresentation {
|
||||||
|
|
||||||
|
private Set<String> users;
|
||||||
|
|
||||||
|
public Set<String> getUsers() {
|
||||||
|
return users;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void setUsers(Set<String> users) {
|
||||||
|
this.users= users;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void addUser(String name) {
|
||||||
|
if (users == null) {
|
||||||
|
users = new HashSet<>();
|
||||||
|
}
|
||||||
|
users.add(name);
|
||||||
|
}
|
||||||
|
}
|
|
@ -23,6 +23,7 @@ import javax.ws.rs.GET;
|
||||||
import javax.ws.rs.POST;
|
import javax.ws.rs.POST;
|
||||||
import javax.ws.rs.PUT;
|
import javax.ws.rs.PUT;
|
||||||
import javax.ws.rs.Path;
|
import javax.ws.rs.Path;
|
||||||
|
import javax.ws.rs.PathParam;
|
||||||
import javax.ws.rs.Produces;
|
import javax.ws.rs.Produces;
|
||||||
import javax.ws.rs.core.MediaType;
|
import javax.ws.rs.core.MediaType;
|
||||||
|
|
||||||
|
@ -58,4 +59,7 @@ public interface AuthorizationResource {
|
||||||
|
|
||||||
@Path("/policy")
|
@Path("/policy")
|
||||||
PoliciesResource policies();
|
PoliciesResource policies();
|
||||||
|
|
||||||
|
@Path("/permission")
|
||||||
|
PermissionsResource permissions();
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,31 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.admin.client.resource;
|
||||||
|
|
||||||
|
import javax.ws.rs.Path;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public interface PermissionsResource {
|
||||||
|
|
||||||
|
@Path("resource")
|
||||||
|
ResourcePermissionsResource resource();
|
||||||
|
|
||||||
|
@Path("scope")
|
||||||
|
ScopePermissionsResource scope();
|
||||||
|
}
|
|
@ -28,6 +28,7 @@ import javax.ws.rs.POST;
|
||||||
import javax.ws.rs.Path;
|
import javax.ws.rs.Path;
|
||||||
import javax.ws.rs.PathParam;
|
import javax.ws.rs.PathParam;
|
||||||
import javax.ws.rs.Produces;
|
import javax.ws.rs.Produces;
|
||||||
|
import javax.ws.rs.QueryParam;
|
||||||
import javax.ws.rs.core.MediaType;
|
import javax.ws.rs.core.MediaType;
|
||||||
import javax.ws.rs.core.Response;
|
import javax.ws.rs.core.Response;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
@ -45,6 +46,12 @@ public interface PoliciesResource {
|
||||||
@Path("{id}")
|
@Path("{id}")
|
||||||
PolicyResource policy(@PathParam("id") String id);
|
PolicyResource policy(@PathParam("id") String id);
|
||||||
|
|
||||||
|
@Path("/search")
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
PolicyRepresentation findByName(@QueryParam("name") String name);
|
||||||
|
|
||||||
@GET
|
@GET
|
||||||
@Produces(MediaType.APPLICATION_JSON)
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
@NoCache
|
@NoCache
|
||||||
|
@ -62,4 +69,9 @@ public interface PoliciesResource {
|
||||||
@Path("evaluate")
|
@Path("evaluate")
|
||||||
PolicyEvaluationResponse evaluate(PolicyEvaluationRequest evaluationRequest);
|
PolicyEvaluationResponse evaluate(PolicyEvaluationRequest evaluationRequest);
|
||||||
|
|
||||||
|
@Path("role")
|
||||||
|
RolePoliciesResource roles();
|
||||||
|
|
||||||
|
@Path("user")
|
||||||
|
UserPoliciesResource users();
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,69 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.admin.client.resource;
|
||||||
|
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import javax.ws.rs.Consumes;
|
||||||
|
import javax.ws.rs.DELETE;
|
||||||
|
import javax.ws.rs.GET;
|
||||||
|
import javax.ws.rs.PUT;
|
||||||
|
import javax.ws.rs.Path;
|
||||||
|
import javax.ws.rs.Produces;
|
||||||
|
import javax.ws.rs.core.MediaType;
|
||||||
|
|
||||||
|
import org.jboss.resteasy.annotations.cache.NoCache;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public interface ResourcePermissionResource {
|
||||||
|
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
ResourcePermissionRepresentation toRepresentation();
|
||||||
|
|
||||||
|
@PUT
|
||||||
|
@Consumes(MediaType.APPLICATION_JSON)
|
||||||
|
void update(ResourcePermissionRepresentation representation);
|
||||||
|
|
||||||
|
@DELETE
|
||||||
|
void remove();
|
||||||
|
|
||||||
|
@Path("/associatedPolicies")
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
List<PolicyRepresentation> associatedPolicies();
|
||||||
|
|
||||||
|
@Path("/dependentPolicies")
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
List<PolicyRepresentation> dependentPolicies();
|
||||||
|
|
||||||
|
@Path("/resources")
|
||||||
|
@GET
|
||||||
|
@Produces("application/json")
|
||||||
|
@NoCache
|
||||||
|
List<ResourceRepresentation> resources();
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,42 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.admin.client.resource;
|
||||||
|
|
||||||
|
import javax.ws.rs.Consumes;
|
||||||
|
import javax.ws.rs.POST;
|
||||||
|
import javax.ws.rs.Path;
|
||||||
|
import javax.ws.rs.PathParam;
|
||||||
|
import javax.ws.rs.Produces;
|
||||||
|
import javax.ws.rs.core.MediaType;
|
||||||
|
import javax.ws.rs.core.Response;
|
||||||
|
|
||||||
|
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public interface ResourcePermissionsResource {
|
||||||
|
|
||||||
|
@POST
|
||||||
|
@Consumes(MediaType.APPLICATION_JSON)
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
Response create(ResourcePermissionRepresentation representation);
|
||||||
|
|
||||||
|
@Path("{id}")
|
||||||
|
ResourcePermissionResource findById(@PathParam("id") String id);
|
||||||
|
|
||||||
|
}
|
|
@ -25,6 +25,7 @@ import javax.ws.rs.POST;
|
||||||
import javax.ws.rs.Path;
|
import javax.ws.rs.Path;
|
||||||
import javax.ws.rs.PathParam;
|
import javax.ws.rs.PathParam;
|
||||||
import javax.ws.rs.Produces;
|
import javax.ws.rs.Produces;
|
||||||
|
import javax.ws.rs.QueryParam;
|
||||||
import javax.ws.rs.core.MediaType;
|
import javax.ws.rs.core.MediaType;
|
||||||
import javax.ws.rs.core.Response;
|
import javax.ws.rs.core.Response;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
@ -46,4 +47,10 @@ public interface ResourceScopesResource {
|
||||||
@NoCache
|
@NoCache
|
||||||
@Produces(MediaType.APPLICATION_JSON)
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
List<ScopeRepresentation> scopes();
|
List<ScopeRepresentation> scopes();
|
||||||
|
|
||||||
|
@Path("/search")
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
ScopeRepresentation findByName(@QueryParam("name") String name);
|
||||||
}
|
}
|
||||||
|
|
|
@ -54,6 +54,11 @@ public interface ResourcesResource {
|
||||||
@QueryParam("first") Integer firstResult,
|
@QueryParam("first") Integer firstResult,
|
||||||
@QueryParam("max") Integer maxResult);
|
@QueryParam("max") Integer maxResult);
|
||||||
|
|
||||||
|
@GET
|
||||||
|
@NoCache
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
List<ResourceRepresentation> findByName(@QueryParam("name") String name);
|
||||||
|
|
||||||
@GET
|
@GET
|
||||||
@NoCache
|
@NoCache
|
||||||
@Produces(MediaType.APPLICATION_JSON)
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
|
|
@ -0,0 +1,42 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.admin.client.resource;
|
||||||
|
|
||||||
|
import javax.ws.rs.Consumes;
|
||||||
|
import javax.ws.rs.POST;
|
||||||
|
import javax.ws.rs.Path;
|
||||||
|
import javax.ws.rs.PathParam;
|
||||||
|
import javax.ws.rs.Produces;
|
||||||
|
import javax.ws.rs.core.MediaType;
|
||||||
|
import javax.ws.rs.core.Response;
|
||||||
|
|
||||||
|
import org.keycloak.representations.idm.authorization.RolePolicyRepresentation;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public interface RolePoliciesResource {
|
||||||
|
|
||||||
|
@POST
|
||||||
|
@Consumes(MediaType.APPLICATION_JSON)
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
Response create(RolePolicyRepresentation representation);
|
||||||
|
|
||||||
|
@Path("{id}")
|
||||||
|
RolePolicyResource findById(@PathParam("id") String id);
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,69 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.admin.client.resource;
|
||||||
|
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import javax.ws.rs.Consumes;
|
||||||
|
import javax.ws.rs.DELETE;
|
||||||
|
import javax.ws.rs.GET;
|
||||||
|
import javax.ws.rs.PUT;
|
||||||
|
import javax.ws.rs.Path;
|
||||||
|
import javax.ws.rs.Produces;
|
||||||
|
import javax.ws.rs.core.MediaType;
|
||||||
|
|
||||||
|
import org.jboss.resteasy.annotations.cache.NoCache;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.RolePolicyRepresentation;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public interface RolePolicyResource {
|
||||||
|
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
RolePolicyRepresentation toRepresentation();
|
||||||
|
|
||||||
|
@PUT
|
||||||
|
@Consumes(MediaType.APPLICATION_JSON)
|
||||||
|
void update(RolePolicyRepresentation representation);
|
||||||
|
|
||||||
|
@DELETE
|
||||||
|
void remove();
|
||||||
|
|
||||||
|
@Path("/associatedPolicies")
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
List<PolicyRepresentation> associatedPolicies();
|
||||||
|
|
||||||
|
@Path("/dependentPolicies")
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
List<PolicyRepresentation> dependentPolicies();
|
||||||
|
|
||||||
|
@Path("/resources")
|
||||||
|
@GET
|
||||||
|
@Produces("application/json")
|
||||||
|
@NoCache
|
||||||
|
List<ResourceRepresentation> resources();
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,75 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.admin.client.resource;
|
||||||
|
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import javax.ws.rs.Consumes;
|
||||||
|
import javax.ws.rs.DELETE;
|
||||||
|
import javax.ws.rs.GET;
|
||||||
|
import javax.ws.rs.PUT;
|
||||||
|
import javax.ws.rs.Path;
|
||||||
|
import javax.ws.rs.Produces;
|
||||||
|
import javax.ws.rs.core.MediaType;
|
||||||
|
|
||||||
|
import org.jboss.resteasy.annotations.cache.NoCache;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ScopePermissionRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ScopeRepresentation;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public interface ScopePermissionResource {
|
||||||
|
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
ScopePermissionRepresentation toRepresentation();
|
||||||
|
|
||||||
|
@PUT
|
||||||
|
@Consumes(MediaType.APPLICATION_JSON)
|
||||||
|
void update(ScopePermissionRepresentation representation);
|
||||||
|
|
||||||
|
@DELETE
|
||||||
|
void remove();
|
||||||
|
|
||||||
|
@Path("/associatedPolicies")
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
List<PolicyRepresentation> associatedPolicies();
|
||||||
|
|
||||||
|
@Path("/dependentPolicies")
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
List<PolicyRepresentation> dependentPolicies();
|
||||||
|
|
||||||
|
@Path("/resources")
|
||||||
|
@GET
|
||||||
|
@Produces("application/json")
|
||||||
|
@NoCache
|
||||||
|
List<ResourceRepresentation> resources();
|
||||||
|
|
||||||
|
@Path("/scopes")
|
||||||
|
@GET
|
||||||
|
@Produces("application/json")
|
||||||
|
@NoCache
|
||||||
|
List<ScopeRepresentation> scopes();
|
||||||
|
}
|
|
@ -0,0 +1,41 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.admin.client.resource;
|
||||||
|
|
||||||
|
import javax.ws.rs.Consumes;
|
||||||
|
import javax.ws.rs.POST;
|
||||||
|
import javax.ws.rs.Path;
|
||||||
|
import javax.ws.rs.PathParam;
|
||||||
|
import javax.ws.rs.Produces;
|
||||||
|
import javax.ws.rs.core.MediaType;
|
||||||
|
import javax.ws.rs.core.Response;
|
||||||
|
|
||||||
|
import org.keycloak.representations.idm.authorization.ScopePermissionRepresentation;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public interface ScopePermissionsResource {
|
||||||
|
|
||||||
|
@POST
|
||||||
|
@Consumes(MediaType.APPLICATION_JSON)
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
Response create(ScopePermissionRepresentation representation);
|
||||||
|
|
||||||
|
@Path("{id}")
|
||||||
|
ScopePermissionResource findById(@PathParam("id") String id);
|
||||||
|
}
|
|
@ -0,0 +1,42 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.admin.client.resource;
|
||||||
|
|
||||||
|
import javax.ws.rs.Consumes;
|
||||||
|
import javax.ws.rs.POST;
|
||||||
|
import javax.ws.rs.Path;
|
||||||
|
import javax.ws.rs.PathParam;
|
||||||
|
import javax.ws.rs.Produces;
|
||||||
|
import javax.ws.rs.core.MediaType;
|
||||||
|
import javax.ws.rs.core.Response;
|
||||||
|
|
||||||
|
import org.keycloak.representations.idm.authorization.UserPolicyRepresentation;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public interface UserPoliciesResource {
|
||||||
|
|
||||||
|
@POST
|
||||||
|
@Consumes(MediaType.APPLICATION_JSON)
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
Response create(UserPolicyRepresentation representation);
|
||||||
|
|
||||||
|
@Path("{id}")
|
||||||
|
UserPolicyResource findById(@PathParam("id") String id);
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,69 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.admin.client.resource;
|
||||||
|
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import javax.ws.rs.Consumes;
|
||||||
|
import javax.ws.rs.DELETE;
|
||||||
|
import javax.ws.rs.GET;
|
||||||
|
import javax.ws.rs.PUT;
|
||||||
|
import javax.ws.rs.Path;
|
||||||
|
import javax.ws.rs.Produces;
|
||||||
|
import javax.ws.rs.core.MediaType;
|
||||||
|
|
||||||
|
import org.jboss.resteasy.annotations.cache.NoCache;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.UserPolicyRepresentation;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public interface UserPolicyResource {
|
||||||
|
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
UserPolicyRepresentation toRepresentation();
|
||||||
|
|
||||||
|
@PUT
|
||||||
|
@Consumes(MediaType.APPLICATION_JSON)
|
||||||
|
void update(UserPolicyRepresentation representation);
|
||||||
|
|
||||||
|
@DELETE
|
||||||
|
void remove();
|
||||||
|
|
||||||
|
@Path("/associatedPolicies")
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
List<PolicyRepresentation> associatedPolicies();
|
||||||
|
|
||||||
|
@Path("/dependentPolicies")
|
||||||
|
@GET
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
List<PolicyRepresentation> dependentPolicies();
|
||||||
|
|
||||||
|
@Path("/resources")
|
||||||
|
@GET
|
||||||
|
@Produces("application/json")
|
||||||
|
@NoCache
|
||||||
|
List<ResourceRepresentation> resources();
|
||||||
|
|
||||||
|
}
|
|
@ -42,6 +42,7 @@ import org.keycloak.models.KeycloakSession;
|
||||||
import org.keycloak.models.authorization.infinispan.InfinispanStoreFactoryProvider.CacheTransaction;
|
import org.keycloak.models.authorization.infinispan.InfinispanStoreFactoryProvider.CacheTransaction;
|
||||||
import org.keycloak.models.authorization.infinispan.entities.CachedPolicy;
|
import org.keycloak.models.authorization.infinispan.entities.CachedPolicy;
|
||||||
import org.keycloak.models.cache.authorization.CachedStoreFactoryProvider;
|
import org.keycloak.models.cache.authorization.CachedStoreFactoryProvider;
|
||||||
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.DecisionStrategy;
|
import org.keycloak.representations.idm.authorization.DecisionStrategy;
|
||||||
import org.keycloak.representations.idm.authorization.Logic;
|
import org.keycloak.representations.idm.authorization.Logic;
|
||||||
|
|
||||||
|
@ -53,15 +54,14 @@ public class CachedPolicyStore implements PolicyStore {
|
||||||
private static final String POLICY_ID_CACHE_PREFIX = "policy-id-";
|
private static final String POLICY_ID_CACHE_PREFIX = "policy-id-";
|
||||||
|
|
||||||
private final Cache<String, Map<String, List<CachedPolicy>>> cache;
|
private final Cache<String, Map<String, List<CachedPolicy>>> cache;
|
||||||
private final KeycloakSession session;
|
private final CachedStoreFactoryProvider cacheStoreFactory;
|
||||||
private final CacheTransaction transaction;
|
private final CacheTransaction transaction;
|
||||||
private final List<String> cacheKeys;
|
private final List<String> cacheKeys;
|
||||||
private StoreFactory storeFactory;
|
private final StoreFactory storeFactory;
|
||||||
private PolicyStore delegate;
|
private PolicyStore delegate;
|
||||||
private CachedStoreFactoryProvider cachedStoreFactory;
|
|
||||||
|
|
||||||
public CachedPolicyStore(KeycloakSession session, CacheTransaction transaction, StoreFactory storeFactory) {
|
public CachedPolicyStore(KeycloakSession session, CachedStoreFactoryProvider cacheStoreFactory, CacheTransaction transaction, StoreFactory delegate) {
|
||||||
this.session = session;
|
this.cacheStoreFactory = cacheStoreFactory;
|
||||||
this.transaction = transaction;
|
this.transaction = transaction;
|
||||||
InfinispanConnectionProvider provider = session.getProvider(InfinispanConnectionProvider.class);
|
InfinispanConnectionProvider provider = session.getProvider(InfinispanConnectionProvider.class);
|
||||||
this.cache = provider.getCache(InfinispanConnectionProvider.AUTHORIZATION_CACHE_NAME);
|
this.cache = provider.getCache(InfinispanConnectionProvider.AUTHORIZATION_CACHE_NAME);
|
||||||
|
@ -70,12 +70,12 @@ public class CachedPolicyStore implements PolicyStore {
|
||||||
cacheKeys.add("findByResourceType");
|
cacheKeys.add("findByResourceType");
|
||||||
cacheKeys.add("findByScopeIds");
|
cacheKeys.add("findByScopeIds");
|
||||||
cacheKeys.add("findByType");
|
cacheKeys.add("findByType");
|
||||||
this.storeFactory = storeFactory;
|
this.storeFactory = delegate;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public Policy create(String name, String type, ResourceServer resourceServer) {
|
public Policy create(AbstractPolicyRepresentation representation, ResourceServer resourceServer) {
|
||||||
Policy policy = getDelegate().create(name, type, getStoreFactory().getResourceServerStore().findById(resourceServer.getId()));
|
Policy policy = getDelegate().create(representation, getStoreFactory().getResourceServerStore().findById(resourceServer.getId()));
|
||||||
String id = policy.getId();
|
String id = policy.getId();
|
||||||
|
|
||||||
this.transaction.whenRollback(() -> {
|
this.transaction.whenRollback(() -> {
|
||||||
|
@ -285,6 +285,7 @@ public class CachedPolicyStore implements PolicyStore {
|
||||||
public void removeScope(Scope scope) {
|
public void removeScope(Scope scope) {
|
||||||
getDelegateForUpdate().removeScope(getStoreFactory().getScopeStore().findById(scope.getId(), cached.getResourceServerId()));
|
getDelegateForUpdate().removeScope(getStoreFactory().getScopeStore().findById(scope.getId(), cached.getResourceServerId()));
|
||||||
cached.removeScope(scope);
|
cached.removeScope(scope);
|
||||||
|
scopes.remove(scope);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -297,6 +298,7 @@ public class CachedPolicyStore implements PolicyStore {
|
||||||
public void removeAssociatedPolicy(Policy associatedPolicy) {
|
public void removeAssociatedPolicy(Policy associatedPolicy) {
|
||||||
getDelegateForUpdate().removeAssociatedPolicy(getStoreFactory().getPolicyStore().findById(associatedPolicy.getId(), cached.getResourceServerId()));
|
getDelegateForUpdate().removeAssociatedPolicy(getStoreFactory().getPolicyStore().findById(associatedPolicy.getId(), cached.getResourceServerId()));
|
||||||
cached.removeAssociatedPolicy(associatedPolicy);
|
cached.removeAssociatedPolicy(associatedPolicy);
|
||||||
|
associatedPolicies.remove(associatedPolicy);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -309,6 +311,7 @@ public class CachedPolicyStore implements PolicyStore {
|
||||||
public void removeResource(Resource resource) {
|
public void removeResource(Resource resource) {
|
||||||
getDelegateForUpdate().removeResource(getStoreFactory().getResourceStore().findById(resource.getId(), cached.getResourceServerId()));
|
getDelegateForUpdate().removeResource(getStoreFactory().getResourceStore().findById(resource.getId(), cached.getResourceServerId()));
|
||||||
cached.removeResource(resource);
|
cached.removeResource(resource);
|
||||||
|
resources.remove(resource);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -401,10 +404,7 @@ public class CachedPolicyStore implements PolicyStore {
|
||||||
}
|
}
|
||||||
|
|
||||||
private CachedStoreFactoryProvider getCachedStoreFactory() {
|
private CachedStoreFactoryProvider getCachedStoreFactory() {
|
||||||
if (cachedStoreFactory == null) {
|
return cacheStoreFactory;
|
||||||
cachedStoreFactory = session.getProvider(CachedStoreFactoryProvider.class);
|
|
||||||
}
|
|
||||||
return cachedStoreFactory;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private void invalidateCache(String resourceServerId) {
|
private void invalidateCache(String resourceServerId) {
|
||||||
|
|
|
@ -41,18 +41,16 @@ public class CachedResourceServerStore implements ResourceServerStore {
|
||||||
private static final String RS_ID_CACHE_PREFIX = "rs-id-";
|
private static final String RS_ID_CACHE_PREFIX = "rs-id-";
|
||||||
private static final String RS_CLIENT_ID_CACHE_PREFIX = "rs-client-id-";
|
private static final String RS_CLIENT_ID_CACHE_PREFIX = "rs-client-id-";
|
||||||
|
|
||||||
private final KeycloakSession session;
|
|
||||||
private final CacheTransaction transaction;
|
private final CacheTransaction transaction;
|
||||||
private StoreFactory storeFactory;
|
private StoreFactory storeFactory;
|
||||||
private ResourceServerStore delegate;
|
private ResourceServerStore delegate;
|
||||||
private final Cache<String, Map<String, List<CachedResourceServer>>> cache;
|
private final Cache<String, Map<String, List<CachedResourceServer>>> cache;
|
||||||
|
|
||||||
public CachedResourceServerStore(KeycloakSession session, CacheTransaction transaction, StoreFactory storeFactory) {
|
public CachedResourceServerStore(KeycloakSession session, CacheTransaction transaction, StoreFactory delegate) {
|
||||||
this.session = session;
|
|
||||||
this.transaction = transaction;
|
this.transaction = transaction;
|
||||||
InfinispanConnectionProvider provider = session.getProvider(InfinispanConnectionProvider.class);
|
InfinispanConnectionProvider provider = session.getProvider(InfinispanConnectionProvider.class);
|
||||||
this.cache = provider.getCache(InfinispanConnectionProvider.AUTHORIZATION_CACHE_NAME);
|
this.cache = provider.getCache(InfinispanConnectionProvider.AUTHORIZATION_CACHE_NAME);
|
||||||
this.storeFactory = storeFactory;
|
this.storeFactory = delegate;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -49,15 +49,15 @@ public class CachedResourceStore implements ResourceStore {
|
||||||
private static final String RESOURCE_ID_CACHE_PREFIX = "rsc-id-";
|
private static final String RESOURCE_ID_CACHE_PREFIX = "rsc-id-";
|
||||||
private static final String RESOURCE_NAME_CACHE_PREFIX = "rsc-name-";
|
private static final String RESOURCE_NAME_CACHE_PREFIX = "rsc-name-";
|
||||||
|
|
||||||
private final KeycloakSession session;
|
private final CachedStoreFactoryProvider cacheStoreFactory;
|
||||||
private final CacheTransaction transaction;
|
private final CacheTransaction transaction;
|
||||||
private final List<String> cacheKeys;
|
private final List<String> cacheKeys;
|
||||||
private StoreFactory storeFactory;
|
private StoreFactory delegateStoreFactory;
|
||||||
private ResourceStore delegate;
|
private ResourceStore delegate;
|
||||||
private final Cache<String, Map<String, List<CachedResource>>> cache;
|
private final Cache<String, Map<String, List<CachedResource>>> cache;
|
||||||
|
|
||||||
public CachedResourceStore(KeycloakSession session, CacheTransaction transaction, StoreFactory storeFactory) {
|
public CachedResourceStore(KeycloakSession session, CachedStoreFactoryProvider cacheStoreFactory, CacheTransaction transaction, StoreFactory delegate) {
|
||||||
this.session = session;
|
this.cacheStoreFactory = cacheStoreFactory;
|
||||||
InfinispanConnectionProvider provider = session.getProvider(InfinispanConnectionProvider.class);
|
InfinispanConnectionProvider provider = session.getProvider(InfinispanConnectionProvider.class);
|
||||||
this.cache = provider.getCache(InfinispanConnectionProvider.AUTHORIZATION_CACHE_NAME);
|
this.cache = provider.getCache(InfinispanConnectionProvider.AUTHORIZATION_CACHE_NAME);
|
||||||
this.transaction = transaction;
|
this.transaction = transaction;
|
||||||
|
@ -65,12 +65,12 @@ public class CachedResourceStore implements ResourceStore {
|
||||||
cacheKeys.add("findByOwner");
|
cacheKeys.add("findByOwner");
|
||||||
cacheKeys.add("findByUri");
|
cacheKeys.add("findByUri");
|
||||||
cacheKeys.add("findByName");
|
cacheKeys.add("findByName");
|
||||||
this.storeFactory = storeFactory;
|
this.delegateStoreFactory = delegate;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public Resource create(String name, ResourceServer resourceServer, String owner) {
|
public Resource create(String name, ResourceServer resourceServer, String owner) {
|
||||||
Resource resource = getDelegate().create(name, getStoreFactory().getResourceServerStore().findById(resourceServer.getId()), owner);
|
Resource resource = getDelegate().create(name, getDelegateStoreFactory().getResourceServerStore().findById(resourceServer.getId()), owner);
|
||||||
|
|
||||||
this.transaction.whenRollback(() -> {
|
this.transaction.whenRollback(() -> {
|
||||||
resolveResourceServerCache(resourceServer.getId()).remove(getCacheKeyForResource(resource.getId()));
|
resolveResourceServerCache(resourceServer.getId()).remove(getCacheKeyForResource(resource.getId()));
|
||||||
|
@ -176,14 +176,14 @@ public class CachedResourceStore implements ResourceStore {
|
||||||
|
|
||||||
private ResourceStore getDelegate() {
|
private ResourceStore getDelegate() {
|
||||||
if (this.delegate == null) {
|
if (this.delegate == null) {
|
||||||
this.delegate = getStoreFactory().getResourceStore();
|
this.delegate = getDelegateStoreFactory().getResourceStore();
|
||||||
}
|
}
|
||||||
|
|
||||||
return this.delegate;
|
return this.delegate;
|
||||||
}
|
}
|
||||||
|
|
||||||
private StoreFactory getStoreFactory() {
|
private StoreFactory getDelegateStoreFactory() {
|
||||||
return this.storeFactory;
|
return this.delegateStoreFactory;
|
||||||
}
|
}
|
||||||
|
|
||||||
private Resource createAdapter(CachedResource cached) {
|
private Resource createAdapter(CachedResource cached) {
|
||||||
|
@ -270,7 +270,7 @@ public class CachedResourceStore implements ResourceStore {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void updateScopes(Set<Scope> scopes) {
|
public void updateScopes(Set<Scope> scopes) {
|
||||||
getDelegateForUpdate().updateScopes(scopes.stream().map(scope -> getStoreFactory().getScopeStore().findById(scope.getId(), cached.getResourceServerId())).collect(Collectors.toSet()));
|
getDelegateForUpdate().updateScopes(scopes.stream().map(scope -> getDelegateStoreFactory().getScopeStore().findById(scope.getId(), cached.getResourceServerId())).collect(Collectors.toSet()));
|
||||||
cached.updateScopes(scopes);
|
cached.updateScopes(scopes);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -293,7 +293,7 @@ public class CachedResourceStore implements ResourceStore {
|
||||||
}
|
}
|
||||||
|
|
||||||
private CachedStoreFactoryProvider getCachedStoreFactory() {
|
private CachedStoreFactoryProvider getCachedStoreFactory() {
|
||||||
return session.getProvider(CachedStoreFactoryProvider.class);
|
return cacheStoreFactory;
|
||||||
}
|
}
|
||||||
|
|
||||||
private List<Resource> cacheResult(String resourceServerId, String key, Supplier<List<Resource>> provider) {
|
private List<Resource> cacheResult(String resourceServerId, String key, Supplier<List<Resource>> provider) {
|
||||||
|
|
|
@ -44,17 +44,17 @@ public class CachedScopeStore implements ScopeStore {
|
||||||
private static final String SCOPE_NAME_CACHE_PREFIX = "scp-name-";
|
private static final String SCOPE_NAME_CACHE_PREFIX = "scp-name-";
|
||||||
|
|
||||||
private final Cache<String, Map<String, List<CachedScope>>> cache;
|
private final Cache<String, Map<String, List<CachedScope>>> cache;
|
||||||
private final KeycloakSession session;
|
private final CachedStoreFactoryProvider cacheStoreFactory;
|
||||||
private final CacheTransaction transaction;
|
private final CacheTransaction transaction;
|
||||||
private ScopeStore delegate;
|
private ScopeStore delegate;
|
||||||
private StoreFactory storeFactory;
|
private StoreFactory storeFactory;
|
||||||
|
|
||||||
public CachedScopeStore(KeycloakSession session, CacheTransaction transaction, StoreFactory storeFactory) {
|
public CachedScopeStore(KeycloakSession session, CachedStoreFactoryProvider cacheStoreFactory, CacheTransaction transaction, StoreFactory delegate) {
|
||||||
this.session = session;
|
this.cacheStoreFactory = cacheStoreFactory;
|
||||||
this.transaction = transaction;
|
this.transaction = transaction;
|
||||||
InfinispanConnectionProvider provider = session.getProvider(InfinispanConnectionProvider.class);
|
InfinispanConnectionProvider provider = session.getProvider(InfinispanConnectionProvider.class);
|
||||||
this.cache = provider.getCache(InfinispanConnectionProvider.AUTHORIZATION_CACHE_NAME);
|
this.cache = provider.getCache(InfinispanConnectionProvider.AUTHORIZATION_CACHE_NAME);
|
||||||
this.storeFactory = storeFactory;
|
this.storeFactory = delegate;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -220,7 +220,7 @@ public class CachedScopeStore implements ScopeStore {
|
||||||
}
|
}
|
||||||
|
|
||||||
private CachedStoreFactoryProvider getCachedStoreFactory() {
|
private CachedStoreFactoryProvider getCachedStoreFactory() {
|
||||||
return session.getProvider(CachedStoreFactoryProvider.class);
|
return cacheStoreFactory;
|
||||||
}
|
}
|
||||||
|
|
||||||
private void invalidateCache(String resourceServerId) {
|
private void invalidateCache(String resourceServerId) {
|
||||||
|
|
|
@ -18,6 +18,9 @@
|
||||||
|
|
||||||
package org.keycloak.models.authorization.infinispan;
|
package org.keycloak.models.authorization.infinispan;
|
||||||
|
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
import org.keycloak.authorization.store.PolicyStore;
|
import org.keycloak.authorization.store.PolicyStore;
|
||||||
import org.keycloak.authorization.store.ResourceServerStore;
|
import org.keycloak.authorization.store.ResourceServerStore;
|
||||||
import org.keycloak.authorization.store.ResourceStore;
|
import org.keycloak.authorization.store.ResourceStore;
|
||||||
|
@ -27,31 +30,25 @@ import org.keycloak.models.KeycloakSession;
|
||||||
import org.keycloak.models.KeycloakTransaction;
|
import org.keycloak.models.KeycloakTransaction;
|
||||||
import org.keycloak.models.cache.authorization.CachedStoreFactoryProvider;
|
import org.keycloak.models.cache.authorization.CachedStoreFactoryProvider;
|
||||||
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
public class InfinispanStoreFactoryProvider implements CachedStoreFactoryProvider {
|
public class InfinispanStoreFactoryProvider implements CachedStoreFactoryProvider {
|
||||||
|
|
||||||
private final KeycloakSession session;
|
|
||||||
private final CacheTransaction transaction;
|
private final CacheTransaction transaction;
|
||||||
private final StoreFactory storeFactory;
|
|
||||||
private final CachedResourceStore resourceStore;
|
private final CachedResourceStore resourceStore;
|
||||||
private final CachedScopeStore scopeStore;
|
private final CachedScopeStore scopeStore;
|
||||||
private final CachedPolicyStore policyStore;
|
private final CachedPolicyStore policyStore;
|
||||||
private ResourceServerStore resourceServerStore;
|
private ResourceServerStore resourceServerStore;
|
||||||
|
|
||||||
InfinispanStoreFactoryProvider(KeycloakSession delegate) {
|
public InfinispanStoreFactoryProvider(KeycloakSession session) {
|
||||||
this.session = delegate;
|
|
||||||
this.transaction = new CacheTransaction();
|
this.transaction = new CacheTransaction();
|
||||||
this.session.getTransactionManager().enlistAfterCompletion(transaction);
|
session.getTransactionManager().enlistAfterCompletion(transaction);
|
||||||
storeFactory = this.session.getProvider(StoreFactory.class);
|
StoreFactory delegate = session.getProvider(StoreFactory.class);
|
||||||
resourceStore = new CachedResourceStore(this.session, this.transaction, storeFactory);
|
resourceStore = new CachedResourceStore(session, this, this.transaction, delegate);
|
||||||
resourceServerStore = new CachedResourceServerStore(this.session, this.transaction, storeFactory);
|
resourceServerStore = new CachedResourceServerStore(session, this.transaction, delegate);
|
||||||
scopeStore = new CachedScopeStore(this.session, this.transaction, storeFactory);
|
scopeStore = new CachedScopeStore(session, this, this.transaction, delegate);
|
||||||
policyStore = new CachedPolicyStore(this.session, this.transaction, storeFactory);
|
policyStore = new CachedPolicyStore(session, this, this.transaction, delegate);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -19,6 +19,8 @@
|
||||||
package org.keycloak.models.authorization.infinispan;
|
package org.keycloak.models.authorization.infinispan;
|
||||||
|
|
||||||
import org.keycloak.Config;
|
import org.keycloak.Config;
|
||||||
|
import org.keycloak.authorization.AuthorizationProvider;
|
||||||
|
import org.keycloak.authorization.store.StoreFactory;
|
||||||
import org.keycloak.models.KeycloakSession;
|
import org.keycloak.models.KeycloakSession;
|
||||||
import org.keycloak.models.KeycloakSessionFactory;
|
import org.keycloak.models.KeycloakSessionFactory;
|
||||||
import org.keycloak.models.cache.authorization.CachedStoreFactoryProvider;
|
import org.keycloak.models.cache.authorization.CachedStoreFactoryProvider;
|
||||||
|
|
|
@ -160,7 +160,7 @@ public class CachedPolicy implements Policy, Serializable {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void removeResource(Resource resource) {
|
public void removeResource(Resource resource) {
|
||||||
this.resourcesIds.add(resource.getId());
|
this.resourcesIds.remove(resource.getId());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -18,14 +18,15 @@
|
||||||
|
|
||||||
package org.keycloak.authorization.jpa.store;
|
package org.keycloak.authorization.jpa.store;
|
||||||
|
|
||||||
|
import javax.persistence.EntityManager;
|
||||||
|
|
||||||
import org.keycloak.Config;
|
import org.keycloak.Config;
|
||||||
|
import org.keycloak.authorization.AuthorizationProvider;
|
||||||
import org.keycloak.authorization.store.AuthorizationStoreFactory;
|
import org.keycloak.authorization.store.AuthorizationStoreFactory;
|
||||||
import org.keycloak.authorization.store.StoreFactory;
|
import org.keycloak.authorization.store.StoreFactory;
|
||||||
import org.keycloak.connections.jpa.JpaConnectionProvider;
|
import org.keycloak.connections.jpa.JpaConnectionProvider;
|
||||||
import org.keycloak.models.KeycloakSession;
|
import org.keycloak.models.KeycloakSession;
|
||||||
|
|
||||||
import javax.persistence.EntityManager;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -17,14 +17,10 @@
|
||||||
*/
|
*/
|
||||||
package org.keycloak.authorization.jpa.store;
|
package org.keycloak.authorization.jpa.store;
|
||||||
|
|
||||||
import org.keycloak.authorization.jpa.entities.PolicyEntity;
|
import java.util.ArrayList;
|
||||||
import org.keycloak.authorization.jpa.entities.ResourceServerEntity;
|
import java.util.Collections;
|
||||||
import org.keycloak.authorization.jpa.entities.ScopeEntity;
|
import java.util.List;
|
||||||
import org.keycloak.authorization.model.Policy;
|
import java.util.Map;
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
|
||||||
import org.keycloak.authorization.model.Scope;
|
|
||||||
import org.keycloak.authorization.store.PolicyStore;
|
|
||||||
import org.keycloak.models.utils.KeycloakModelUtils;
|
|
||||||
|
|
||||||
import javax.persistence.EntityManager;
|
import javax.persistence.EntityManager;
|
||||||
import javax.persistence.NoResultException;
|
import javax.persistence.NoResultException;
|
||||||
|
@ -33,11 +29,14 @@ import javax.persistence.criteria.CriteriaBuilder;
|
||||||
import javax.persistence.criteria.CriteriaQuery;
|
import javax.persistence.criteria.CriteriaQuery;
|
||||||
import javax.persistence.criteria.Predicate;
|
import javax.persistence.criteria.Predicate;
|
||||||
import javax.persistence.criteria.Root;
|
import javax.persistence.criteria.Root;
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Arrays;
|
import org.keycloak.authorization.jpa.entities.PolicyEntity;
|
||||||
import java.util.Collections;
|
import org.keycloak.authorization.jpa.entities.ResourceServerEntity;
|
||||||
import java.util.List;
|
import org.keycloak.authorization.model.Policy;
|
||||||
import java.util.Map;
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
|
import org.keycloak.authorization.store.PolicyStore;
|
||||||
|
import org.keycloak.models.utils.KeycloakModelUtils;
|
||||||
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
@ -51,23 +50,19 @@ public class JPAPolicyStore implements PolicyStore {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public Policy create(String name, String type, ResourceServer resourceServer) {
|
public Policy create(AbstractPolicyRepresentation representation, ResourceServer resourceServer) {
|
||||||
PolicyEntity entity = new PolicyEntity();
|
PolicyEntity entity = new PolicyEntity();
|
||||||
|
|
||||||
entity.setId(KeycloakModelUtils.generateId());
|
entity.setId(KeycloakModelUtils.generateId());
|
||||||
entity.setName(name);
|
entity.setType(representation.getType());
|
||||||
entity.setType(type);
|
entity.setName(representation.getName());
|
||||||
entity.setResourceServer((ResourceServerEntity) resourceServer);
|
entity.setResourceServer((ResourceServerEntity) resourceServer);
|
||||||
|
|
||||||
this.entityManager.persist(entity);
|
this.entityManager.persist(entity);
|
||||||
|
this.entityManager.flush();
|
||||||
return entity;
|
return entity;
|
||||||
}
|
}
|
||||||
|
|
||||||
public EntityManager getEntityManager() {
|
|
||||||
return this.entityManager;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void delete(String id) {
|
public void delete(String id) {
|
||||||
Policy policy = entityManager.find(PolicyEntity.class, id);
|
Policy policy = entityManager.find(PolicyEntity.class, id);
|
||||||
|
@ -99,7 +94,7 @@ public class JPAPolicyStore implements PolicyStore {
|
||||||
@Override
|
@Override
|
||||||
public Policy findByName(String name, String resourceServerId) {
|
public Policy findByName(String name, String resourceServerId) {
|
||||||
try {
|
try {
|
||||||
Query query = getEntityManager().createQuery("from PolicyEntity where name = :name and resourceServer.id = :serverId");
|
Query query = entityManager.createQuery("from PolicyEntity where name = :name and resourceServer.id = :serverId");
|
||||||
|
|
||||||
query.setParameter("name", name);
|
query.setParameter("name", name);
|
||||||
query.setParameter("serverId", resourceServerId);
|
query.setParameter("serverId", resourceServerId);
|
||||||
|
@ -112,7 +107,7 @@ public class JPAPolicyStore implements PolicyStore {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public List<Policy> findByResourceServer(final String resourceServerId) {
|
public List<Policy> findByResourceServer(final String resourceServerId) {
|
||||||
Query query = getEntityManager().createQuery("from PolicyEntity where resourceServer.id = :serverId");
|
Query query = entityManager.createQuery("from PolicyEntity where resourceServer.id = :serverId");
|
||||||
|
|
||||||
query.setParameter("serverId", resourceServerId);
|
query.setParameter("serverId", resourceServerId);
|
||||||
|
|
||||||
|
@ -158,7 +153,7 @@ public class JPAPolicyStore implements PolicyStore {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public List<Policy> findByResource(final String resourceId, String resourceServerId) {
|
public List<Policy> findByResource(final String resourceId, String resourceServerId) {
|
||||||
Query query = getEntityManager().createQuery("select p from PolicyEntity p inner join p.resources r where p.resourceServer.id = :serverId and (r.resourceServer.id = :serverId and r.id = :resourceId)");
|
Query query = entityManager.createQuery("select p from PolicyEntity p inner join p.resources r where p.resourceServer.id = :serverId and (r.resourceServer.id = :serverId and r.id = :resourceId)");
|
||||||
|
|
||||||
query.setParameter("resourceId", resourceId);
|
query.setParameter("resourceId", resourceId);
|
||||||
query.setParameter("serverId", resourceServerId);
|
query.setParameter("serverId", resourceServerId);
|
||||||
|
@ -168,7 +163,7 @@ public class JPAPolicyStore implements PolicyStore {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public List<Policy> findByResourceType(final String resourceType, String resourceServerId) {
|
public List<Policy> findByResourceType(final String resourceType, String resourceServerId) {
|
||||||
Query query = getEntityManager().createQuery("select p from PolicyEntity p inner join p.config c where p.resourceServer.id = :serverId and KEY(c) = 'defaultResourceType' and c like :type");
|
Query query = entityManager.createQuery("select p from PolicyEntity p inner join p.config c where p.resourceServer.id = :serverId and KEY(c) = 'defaultResourceType' and c like :type");
|
||||||
|
|
||||||
query.setParameter("serverId", resourceServerId);
|
query.setParameter("serverId", resourceServerId);
|
||||||
query.setParameter("type", resourceType);
|
query.setParameter("type", resourceType);
|
||||||
|
@ -183,7 +178,7 @@ public class JPAPolicyStore implements PolicyStore {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Use separate subquery to handle DB2 and MSSSQL
|
// Use separate subquery to handle DB2 and MSSSQL
|
||||||
Query query = getEntityManager().createQuery("select pe from PolicyEntity pe where pe.resourceServer.id = :serverId and pe.id IN (select p.id from ScopeEntity s inner join s.policies p where s.resourceServer.id = :serverId and (p.resourceServer.id = :serverId and p.type = 'scope' and s.id in (:scopeIds)))");
|
Query query = entityManager.createQuery("select pe from PolicyEntity pe where pe.resourceServer.id = :serverId and pe.id IN (select p.id from ScopeEntity s inner join s.policies p where s.resourceServer.id = :serverId and (p.resourceServer.id = :serverId and p.type = 'scope' and s.id in (:scopeIds)))");
|
||||||
|
|
||||||
query.setParameter("serverId", resourceServerId);
|
query.setParameter("serverId", resourceServerId);
|
||||||
query.setParameter("scopeIds", scopeIds);
|
query.setParameter("scopeIds", scopeIds);
|
||||||
|
@ -193,7 +188,7 @@ public class JPAPolicyStore implements PolicyStore {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public List<Policy> findByType(String type, String resourceServerId) {
|
public List<Policy> findByType(String type, String resourceServerId) {
|
||||||
Query query = getEntityManager().createQuery("select p from PolicyEntity p where p.resourceServer.id = :serverId and p.type = :type");
|
Query query = entityManager.createQuery("select p from PolicyEntity p where p.resourceServer.id = :serverId and p.type = :type");
|
||||||
|
|
||||||
query.setParameter("serverId", resourceServerId);
|
query.setParameter("serverId", resourceServerId);
|
||||||
query.setParameter("type", type);
|
query.setParameter("type", type);
|
||||||
|
@ -203,7 +198,7 @@ public class JPAPolicyStore implements PolicyStore {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public List<Policy> findDependentPolicies(String policyId, String resourceServerId) {
|
public List<Policy> findDependentPolicies(String policyId, String resourceServerId) {
|
||||||
Query query = getEntityManager().createQuery("select p from PolicyEntity p inner join p.associatedPolicies ap where p.resourceServer.id = :serverId and (ap.resourceServer.id = :serverId and ap.id = :policyId)");
|
Query query = entityManager.createQuery("select p from PolicyEntity p inner join p.associatedPolicies ap where p.resourceServer.id = :serverId and (ap.resourceServer.id = :serverId and ap.id = :policyId)");
|
||||||
|
|
||||||
query.setParameter("serverId", resourceServerId);
|
query.setParameter("serverId", resourceServerId);
|
||||||
query.setParameter("policyId", policyId);
|
query.setParameter("policyId", policyId);
|
||||||
|
|
|
@ -18,43 +18,49 @@
|
||||||
|
|
||||||
package org.keycloak.authorization.jpa.store;
|
package org.keycloak.authorization.jpa.store;
|
||||||
|
|
||||||
|
import javax.persistence.EntityManager;
|
||||||
|
|
||||||
import org.keycloak.authorization.store.PolicyStore;
|
import org.keycloak.authorization.store.PolicyStore;
|
||||||
import org.keycloak.authorization.store.ResourceServerStore;
|
import org.keycloak.authorization.store.ResourceServerStore;
|
||||||
import org.keycloak.authorization.store.ResourceStore;
|
import org.keycloak.authorization.store.ResourceStore;
|
||||||
import org.keycloak.authorization.store.ScopeStore;
|
import org.keycloak.authorization.store.ScopeStore;
|
||||||
import org.keycloak.authorization.store.StoreFactory;
|
import org.keycloak.authorization.store.StoreFactory;
|
||||||
|
|
||||||
import javax.persistence.EntityManager;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
public class JPAStoreFactory implements StoreFactory {
|
public class JPAStoreFactory implements StoreFactory {
|
||||||
|
|
||||||
private final EntityManager entityManager;
|
private final PolicyStore policyStore;
|
||||||
|
private final ResourceServerStore resourceServerStore;
|
||||||
|
private final ResourceStore resourceStore;
|
||||||
|
private final ScopeStore scopeStore;
|
||||||
|
|
||||||
public JPAStoreFactory(EntityManager entityManager) {
|
public JPAStoreFactory(EntityManager entityManager) {
|
||||||
this.entityManager = entityManager;
|
policyStore = new JPAPolicyStore(entityManager);
|
||||||
|
resourceServerStore = new JPAResourceServerStore(entityManager);
|
||||||
|
resourceStore = new JPAResourceStore(entityManager);
|
||||||
|
scopeStore = new JPAScopeStore(entityManager);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PolicyStore getPolicyStore() {
|
public PolicyStore getPolicyStore() {
|
||||||
return new JPAPolicyStore(this.entityManager);
|
return policyStore;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public ResourceServerStore getResourceServerStore() {
|
public ResourceServerStore getResourceServerStore() {
|
||||||
return new JPAResourceServerStore(this.entityManager);
|
return resourceServerStore;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public ResourceStore getResourceStore() {
|
public ResourceStore getResourceStore() {
|
||||||
return new JPAResourceStore(this.entityManager);
|
return resourceStore;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public ScopeStore getScopeStore() {
|
public ScopeStore getScopeStore() {
|
||||||
return new JPAScopeStore(this.entityManager);
|
return scopeStore;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -21,17 +21,23 @@ package org.keycloak.authorization;
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.concurrent.Executor;
|
|
||||||
import java.util.function.Supplier;
|
|
||||||
|
|
||||||
|
import org.keycloak.authorization.model.Policy;
|
||||||
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
import org.keycloak.authorization.permission.evaluator.Evaluators;
|
import org.keycloak.authorization.permission.evaluator.Evaluators;
|
||||||
import org.keycloak.authorization.policy.evaluation.DefaultPolicyEvaluator;
|
import org.keycloak.authorization.policy.evaluation.DefaultPolicyEvaluator;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
||||||
|
import org.keycloak.authorization.store.PolicyStore;
|
||||||
|
import org.keycloak.authorization.store.ResourceServerStore;
|
||||||
|
import org.keycloak.authorization.store.ResourceStore;
|
||||||
|
import org.keycloak.authorization.store.ScopeStore;
|
||||||
import org.keycloak.authorization.store.StoreFactory;
|
import org.keycloak.authorization.store.StoreFactory;
|
||||||
import org.keycloak.models.KeycloakSession;
|
import org.keycloak.models.KeycloakSession;
|
||||||
import org.keycloak.models.RealmModel;
|
import org.keycloak.models.RealmModel;
|
||||||
|
import org.keycloak.models.utils.RepresentationToModel;
|
||||||
import org.keycloak.provider.Provider;
|
import org.keycloak.provider.Provider;
|
||||||
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* <p>The main contract here is the creation of {@link org.keycloak.authorization.permission.evaluator.PermissionEvaluator} instances. Usually
|
* <p>The main contract here is the creation of {@link org.keycloak.authorization.permission.evaluator.PermissionEvaluator} instances. Usually
|
||||||
|
@ -62,25 +68,19 @@ import org.keycloak.provider.Provider;
|
||||||
public final class AuthorizationProvider implements Provider {
|
public final class AuthorizationProvider implements Provider {
|
||||||
|
|
||||||
private final DefaultPolicyEvaluator policyEvaluator;
|
private final DefaultPolicyEvaluator policyEvaluator;
|
||||||
private final Executor scheduller;
|
private StoreFactory storeFactory;
|
||||||
private final Supplier<StoreFactory> storeFactory;
|
|
||||||
private final Map<String, PolicyProviderFactory> policyProviderFactories;
|
private final Map<String, PolicyProviderFactory> policyProviderFactories;
|
||||||
private final KeycloakSession keycloakSession;
|
private final KeycloakSession keycloakSession;
|
||||||
private final RealmModel realm;
|
private final RealmModel realm;
|
||||||
|
|
||||||
public AuthorizationProvider(KeycloakSession session, RealmModel realm, Supplier<StoreFactory> storeFactory, Map<String, PolicyProviderFactory> policyProviderFactories, Executor scheduller) {
|
public AuthorizationProvider(KeycloakSession session, RealmModel realm, StoreFactory storeFactory, Map<String, PolicyProviderFactory> policyProviderFactories) {
|
||||||
this.keycloakSession = session;
|
this.keycloakSession = session;
|
||||||
this.realm = realm;
|
this.realm = realm;
|
||||||
this.storeFactory = storeFactory;
|
this.storeFactory = storeFactory;
|
||||||
this.scheduller = scheduller;
|
|
||||||
this.policyProviderFactories = policyProviderFactories;
|
this.policyProviderFactories = policyProviderFactories;
|
||||||
this.policyEvaluator = new DefaultPolicyEvaluator(this);
|
this.policyEvaluator = new DefaultPolicyEvaluator(this);
|
||||||
}
|
}
|
||||||
|
|
||||||
public AuthorizationProvider(KeycloakSession session, RealmModel realm, StoreFactory storeFactory, Map<String, PolicyProviderFactory> policyProviderFactories) {
|
|
||||||
this(session, realm, () -> storeFactory, policyProviderFactories, Runnable::run);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns a {@link Evaluators} instance from where {@link org.keycloak.authorization.policy.evaluation.PolicyEvaluator} instances
|
* Returns a {@link Evaluators} instance from where {@link org.keycloak.authorization.policy.evaluation.PolicyEvaluator} instances
|
||||||
* can be obtained.
|
* can be obtained.
|
||||||
|
@ -88,7 +88,7 @@ public final class AuthorizationProvider implements Provider {
|
||||||
* @return a {@link Evaluators} instance
|
* @return a {@link Evaluators} instance
|
||||||
*/
|
*/
|
||||||
public Evaluators evaluators() {
|
public Evaluators evaluators() {
|
||||||
return new Evaluators(this.policyEvaluator, this.scheduller);
|
return new Evaluators(policyEvaluator);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -97,7 +97,92 @@ public final class AuthorizationProvider implements Provider {
|
||||||
* @return the {@link StoreFactory}
|
* @return the {@link StoreFactory}
|
||||||
*/
|
*/
|
||||||
public StoreFactory getStoreFactory() {
|
public StoreFactory getStoreFactory() {
|
||||||
return this.storeFactory.get();
|
return createStoreFactory();
|
||||||
|
}
|
||||||
|
|
||||||
|
private StoreFactory createStoreFactory() {
|
||||||
|
return new StoreFactory() {
|
||||||
|
@Override
|
||||||
|
public ResourceStore getResourceStore() {
|
||||||
|
return storeFactory.getResourceStore();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ResourceServerStore getResourceServerStore() {
|
||||||
|
return storeFactory.getResourceServerStore();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ScopeStore getScopeStore() {
|
||||||
|
return storeFactory.getScopeStore();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public PolicyStore getPolicyStore() {
|
||||||
|
PolicyStore policyStore = storeFactory.getPolicyStore();
|
||||||
|
return new PolicyStore() {
|
||||||
|
@Override
|
||||||
|
public Policy create(AbstractPolicyRepresentation representation, ResourceServer resourceServer) {
|
||||||
|
return RepresentationToModel.toModel(representation, AuthorizationProvider.this, policyStore.create(representation, resourceServer));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void delete(String id) {
|
||||||
|
policyStore.delete(id);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Policy findById(String id, String resourceServerId) {
|
||||||
|
return policyStore.findById(id, resourceServerId);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Policy findByName(String name, String resourceServerId) {
|
||||||
|
return policyStore.findByName(name, resourceServerId);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<Policy> findByResourceServer(String resourceServerId) {
|
||||||
|
return policyStore.findByResourceServer(resourceServerId);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<Policy> findByResourceServer(Map<String, String[]> attributes, String resourceServerId, int firstResult, int maxResult) {
|
||||||
|
return policyStore.findByResourceServer(attributes, resourceServerId, firstResult, maxResult);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<Policy> findByResource(String resourceId, String resourceServerId) {
|
||||||
|
return policyStore.findByResource(resourceId, resourceServerId);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<Policy> findByResourceType(String resourceType, String resourceServerId) {
|
||||||
|
return policyStore.findByResourceType(resourceType, resourceServerId);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<Policy> findByScopeIds(List<String> scopeIds, String resourceServerId) {
|
||||||
|
return policyStore.findByScopeIds(scopeIds, resourceServerId);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<Policy> findByType(String type, String resourceServerId) {
|
||||||
|
return policyStore.findByType(type, resourceServerId);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<Policy> findDependentPolicies(String id, String resourceServerId) {
|
||||||
|
return policyStore.findDependentPolicies(id, resourceServerId);
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void close() {
|
||||||
|
storeFactory.close();
|
||||||
|
}
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -17,22 +17,18 @@
|
||||||
*/
|
*/
|
||||||
package org.keycloak.authorization.permission.evaluator;
|
package org.keycloak.authorization.permission.evaluator;
|
||||||
|
|
||||||
import java.util.concurrent.Executor;
|
|
||||||
|
|
||||||
import org.keycloak.authorization.Decision;
|
import org.keycloak.authorization.Decision;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
* @see PermissionEvaluator
|
* @see PermissionEvaluator
|
||||||
*/
|
*/
|
||||||
class ScheduledPermissionEvaluator implements PermissionEvaluator {
|
class DefaultPermissionEvaluator implements PermissionEvaluator {
|
||||||
|
|
||||||
private final PermissionEvaluator publisher;
|
private final PermissionEvaluator publisher;
|
||||||
private final Executor scheduler;
|
|
||||||
|
|
||||||
ScheduledPermissionEvaluator(PermissionEvaluator publisher, Executor scheduler) {
|
DefaultPermissionEvaluator(PermissionEvaluator publisher) {
|
||||||
this.publisher = publisher;
|
this.publisher = publisher;
|
||||||
this.scheduler = scheduler;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
|
@ -19,7 +19,6 @@
|
||||||
package org.keycloak.authorization.permission.evaluator;
|
package org.keycloak.authorization.permission.evaluator;
|
||||||
|
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.concurrent.Executor;
|
|
||||||
|
|
||||||
import org.keycloak.authorization.permission.ResourcePermission;
|
import org.keycloak.authorization.permission.ResourcePermission;
|
||||||
import org.keycloak.authorization.policy.evaluation.DefaultPolicyEvaluator;
|
import org.keycloak.authorization.policy.evaluation.DefaultPolicyEvaluator;
|
||||||
|
@ -33,11 +32,9 @@ import org.keycloak.authorization.policy.evaluation.EvaluationContext;
|
||||||
public final class Evaluators {
|
public final class Evaluators {
|
||||||
|
|
||||||
private final DefaultPolicyEvaluator policyEvaluator;
|
private final DefaultPolicyEvaluator policyEvaluator;
|
||||||
private final Executor scheduler;
|
|
||||||
|
|
||||||
public Evaluators(DefaultPolicyEvaluator policyEvaluator, Executor scheduler) {
|
public Evaluators(DefaultPolicyEvaluator policyEvaluator) {
|
||||||
this.policyEvaluator = policyEvaluator;
|
this.policyEvaluator = policyEvaluator;
|
||||||
this.scheduler = scheduler;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public PermissionEvaluator from(List<ResourcePermission> permissions, EvaluationContext evaluationContext) {
|
public PermissionEvaluator from(List<ResourcePermission> permissions, EvaluationContext evaluationContext) {
|
||||||
|
@ -45,6 +42,6 @@ public final class Evaluators {
|
||||||
}
|
}
|
||||||
|
|
||||||
public PermissionEvaluator schedule(List<ResourcePermission> permissions, EvaluationContext evaluationContext) {
|
public PermissionEvaluator schedule(List<ResourcePermission> permissions, EvaluationContext evaluationContext) {
|
||||||
return new ScheduledPermissionEvaluator(new IterablePermissionEvaluator(permissions.iterator(), evaluationContext, this.policyEvaluator), this.scheduler);
|
return new DefaultPermissionEvaluator(new IterablePermissionEvaluator(permissions.iterator(), evaluationContext, this.policyEvaluator));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -35,6 +35,7 @@ import org.keycloak.authorization.model.Scope;
|
||||||
import org.keycloak.authorization.permission.ResourcePermission;
|
import org.keycloak.authorization.permission.ResourcePermission;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
||||||
import org.keycloak.authorization.store.PolicyStore;
|
import org.keycloak.authorization.store.PolicyStore;
|
||||||
|
import org.keycloak.authorization.store.ResourceStore;
|
||||||
import org.keycloak.authorization.store.StoreFactory;
|
import org.keycloak.authorization.store.StoreFactory;
|
||||||
import org.keycloak.representations.idm.authorization.PolicyEnforcementMode;
|
import org.keycloak.representations.idm.authorization.PolicyEnforcementMode;
|
||||||
|
|
||||||
|
@ -46,11 +47,13 @@ public class DefaultPolicyEvaluator implements PolicyEvaluator {
|
||||||
private final AuthorizationProvider authorization;
|
private final AuthorizationProvider authorization;
|
||||||
private final StoreFactory storeFactory;
|
private final StoreFactory storeFactory;
|
||||||
private final PolicyStore policyStore;
|
private final PolicyStore policyStore;
|
||||||
|
private final ResourceStore resourceStore;
|
||||||
|
|
||||||
public DefaultPolicyEvaluator(AuthorizationProvider authorization) {
|
public DefaultPolicyEvaluator(AuthorizationProvider authorization) {
|
||||||
this.authorization = authorization;
|
this.authorization = authorization;
|
||||||
storeFactory = this.authorization.getStoreFactory();
|
storeFactory = this.authorization.getStoreFactory();
|
||||||
policyStore = storeFactory.getPolicyStore();
|
policyStore = storeFactory.getPolicyStore();
|
||||||
|
resourceStore = storeFactory.getResourceStore();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -159,7 +162,7 @@ public class DefaultPolicyEvaluator implements PolicyEvaluator {
|
||||||
String type = resource.getType();
|
String type = resource.getType();
|
||||||
|
|
||||||
if (type != null) {
|
if (type != null) {
|
||||||
List<Resource> resourcesByType = authorization.getStoreFactory().getResourceStore().findByType(type, resource.getResourceServer().getId());
|
List<Resource> resourcesByType = resourceStore.findByType(type, resource.getResourceServer().getId());
|
||||||
|
|
||||||
for (Resource resourceType : resourcesByType) {
|
for (Resource resourceType : resourcesByType) {
|
||||||
if (resourceType.getOwner().equals(resource.getResourceServer().getClientId())) {
|
if (resourceType.getOwner().equals(resource.getResourceServer().getClientId())) {
|
||||||
|
|
|
@ -18,16 +18,11 @@
|
||||||
|
|
||||||
package org.keycloak.authorization.policy.provider;
|
package org.keycloak.authorization.policy.provider;
|
||||||
|
|
||||||
import org.keycloak.authorization.model.Policy;
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
public interface PolicyProviderAdminService {
|
public interface PolicyProviderAdminService<R extends AbstractPolicyRepresentation> {
|
||||||
|
|
||||||
void onCreate(Policy policy);
|
|
||||||
|
|
||||||
void onUpdate(Policy policy);
|
|
||||||
|
|
||||||
void onRemove(Policy policy);
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -22,11 +22,13 @@ import org.keycloak.authorization.AuthorizationProvider;
|
||||||
import org.keycloak.authorization.model.Policy;
|
import org.keycloak.authorization.model.Policy;
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
import org.keycloak.provider.ProviderFactory;
|
import org.keycloak.provider.ProviderFactory;
|
||||||
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
public interface PolicyProviderFactory extends ProviderFactory<PolicyProvider> {
|
public interface PolicyProviderFactory<R extends AbstractPolicyRepresentation> extends ProviderFactory<PolicyProvider> {
|
||||||
|
|
||||||
String getName();
|
String getName();
|
||||||
|
|
||||||
|
@ -34,5 +36,31 @@ public interface PolicyProviderFactory extends ProviderFactory<PolicyProvider> {
|
||||||
|
|
||||||
PolicyProvider create(AuthorizationProvider authorization);
|
PolicyProvider create(AuthorizationProvider authorization);
|
||||||
|
|
||||||
PolicyProviderAdminService getAdminResource(ResourceServer resourceServer);
|
default R toRepresentation(Policy policy, R representation) {
|
||||||
|
return representation;
|
||||||
|
}
|
||||||
|
|
||||||
|
default Class<R> getRepresentationType() {
|
||||||
|
return (Class<R>) PolicyRepresentation.class;
|
||||||
|
}
|
||||||
|
|
||||||
|
default void onCreate(Policy policy, R representation, AuthorizationProvider authorization) {
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
default void onUpdate(Policy policy, R representation, AuthorizationProvider authorization) {
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
default void onRemove(Policy policy, AuthorizationProvider authorization) {
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
default void onImport(Policy policy, PolicyRepresentation representation, AuthorizationProvider authorization) {
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
default PolicyProviderAdminService getAdminResource(ResourceServer resourceServer, AuthorizationProvider authorization) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -18,6 +18,9 @@
|
||||||
|
|
||||||
package org.keycloak.authorization.store;
|
package org.keycloak.authorization.store;
|
||||||
|
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.Map;
|
||||||
|
|
||||||
import org.keycloak.authorization.store.syncronization.ClientApplicationSynchronizer;
|
import org.keycloak.authorization.store.syncronization.ClientApplicationSynchronizer;
|
||||||
import org.keycloak.authorization.store.syncronization.RealmSynchronizer;
|
import org.keycloak.authorization.store.syncronization.RealmSynchronizer;
|
||||||
import org.keycloak.authorization.store.syncronization.Synchronizer;
|
import org.keycloak.authorization.store.syncronization.Synchronizer;
|
||||||
|
@ -29,9 +32,6 @@ import org.keycloak.models.UserModel.UserRemovedEvent;
|
||||||
import org.keycloak.provider.ProviderEvent;
|
import org.keycloak.provider.ProviderEvent;
|
||||||
import org.keycloak.provider.ProviderFactory;
|
import org.keycloak.provider.ProviderFactory;
|
||||||
|
|
||||||
import java.util.HashMap;
|
|
||||||
import java.util.Map;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -18,12 +18,13 @@
|
||||||
package org.keycloak.authorization.store;
|
package org.keycloak.authorization.store;
|
||||||
|
|
||||||
|
|
||||||
import org.keycloak.authorization.model.Policy;
|
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
|
||||||
|
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
|
||||||
|
import org.keycloak.authorization.model.Policy;
|
||||||
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A {@link PolicyStore} is responsible to manage the persistence of {@link Policy} instances.
|
* A {@link PolicyStore} is responsible to manage the persistence of {@link Policy} instances.
|
||||||
*
|
*
|
||||||
|
@ -35,12 +36,11 @@ public interface PolicyStore {
|
||||||
* Creates a new {@link Policy} instance. The new instance is not necessarily persisted though, which may require
|
* Creates a new {@link Policy} instance. The new instance is not necessarily persisted though, which may require
|
||||||
* a call to the {#save} method to actually make it persistent.
|
* a call to the {#save} method to actually make it persistent.
|
||||||
*
|
*
|
||||||
* @param name the name of the policy
|
* @param representation the policy representation
|
||||||
* @param type the type of the policy
|
|
||||||
* @param resourceServer the resource server to which this policy belongs
|
* @param resourceServer the resource server to which this policy belongs
|
||||||
* @return a new instance of {@link Policy}
|
* @return a new instance of {@link Policy}
|
||||||
*/
|
*/
|
||||||
Policy create(String name, String type, ResourceServer resourceServer);
|
Policy create(AbstractPolicyRepresentation representation, ResourceServer resourceServer);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Deletes a policy from the underlying persistence mechanism.
|
* Deletes a policy from the underlying persistence mechanism.
|
||||||
|
|
|
@ -33,6 +33,7 @@ import org.keycloak.authorization.model.Policy;
|
||||||
import org.keycloak.authorization.model.Resource;
|
import org.keycloak.authorization.model.Resource;
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
import org.keycloak.authorization.model.Scope;
|
import org.keycloak.authorization.model.Scope;
|
||||||
|
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
||||||
import org.keycloak.authorization.store.ResourceStore;
|
import org.keycloak.authorization.store.ResourceStore;
|
||||||
import org.keycloak.common.util.MultivaluedHashMap;
|
import org.keycloak.common.util.MultivaluedHashMap;
|
||||||
import org.keycloak.common.util.Time;
|
import org.keycloak.common.util.Time;
|
||||||
|
@ -87,6 +88,7 @@ import org.keycloak.representations.idm.RoleRepresentation;
|
||||||
import org.keycloak.representations.idm.UserConsentRepresentation;
|
import org.keycloak.representations.idm.UserConsentRepresentation;
|
||||||
import org.keycloak.representations.idm.UserRepresentation;
|
import org.keycloak.representations.idm.UserRepresentation;
|
||||||
import org.keycloak.representations.idm.UserSessionRepresentation;
|
import org.keycloak.representations.idm.UserSessionRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.ResourceOwnerRepresentation;
|
import org.keycloak.representations.idm.authorization.ResourceOwnerRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||||
|
@ -793,16 +795,29 @@ public class ModelToRepresentation {
|
||||||
return server;
|
return server;
|
||||||
}
|
}
|
||||||
|
|
||||||
public static PolicyRepresentation toRepresentation(Policy model) {
|
public static <R extends AbstractPolicyRepresentation> R toRepresentation(Policy policy, Class<R> representationType, AuthorizationProvider authorization) {
|
||||||
PolicyRepresentation representation = new PolicyRepresentation();
|
R representation;
|
||||||
|
|
||||||
representation.setId(model.getId());
|
try {
|
||||||
representation.setName(model.getName());
|
representation = representationType.newInstance();
|
||||||
representation.setDescription(model.getDescription());
|
} catch (Exception cause) {
|
||||||
representation.setType(model.getType());
|
throw new RuntimeException("Could not create policy [" + policy.getType() + "] representation", cause);
|
||||||
representation.setDecisionStrategy(model.getDecisionStrategy());
|
}
|
||||||
representation.setLogic(model.getLogic());
|
|
||||||
representation.setConfig(new HashMap<>(model.getConfig()));
|
PolicyProviderFactory providerFactory = authorization.getProviderFactory(policy.getType());
|
||||||
|
|
||||||
|
representation.setId(policy.getId());
|
||||||
|
representation.setName(policy.getName());
|
||||||
|
representation.setDescription(policy.getDescription());
|
||||||
|
representation.setType(policy.getType());
|
||||||
|
representation.setDecisionStrategy(policy.getDecisionStrategy());
|
||||||
|
representation.setLogic(policy.getLogic());
|
||||||
|
|
||||||
|
if (representation instanceof PolicyRepresentation) {
|
||||||
|
PolicyRepresentation.class.cast(representation).setConfig(policy.getConfig());
|
||||||
|
} else {
|
||||||
|
representation = (R) providerFactory.toRepresentation(policy, representation);
|
||||||
|
}
|
||||||
|
|
||||||
return representation;
|
return representation;
|
||||||
}
|
}
|
||||||
|
|
|
@ -17,6 +17,18 @@
|
||||||
|
|
||||||
package org.keycloak.models.utils;
|
package org.keycloak.models.utils;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.LinkedList;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.ListIterator;
|
||||||
|
import java.util.Map;
|
||||||
|
import java.util.Set;
|
||||||
|
import java.util.function.Function;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
import org.jboss.logging.Logger;
|
import org.jboss.logging.Logger;
|
||||||
import org.keycloak.authorization.AuthorizationProvider;
|
import org.keycloak.authorization.AuthorizationProvider;
|
||||||
import org.keycloak.authorization.AuthorizationProviderFactory;
|
import org.keycloak.authorization.AuthorizationProviderFactory;
|
||||||
|
@ -24,7 +36,7 @@ import org.keycloak.authorization.model.Policy;
|
||||||
import org.keycloak.authorization.model.Resource;
|
import org.keycloak.authorization.model.Resource;
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
import org.keycloak.authorization.model.Scope;
|
import org.keycloak.authorization.model.Scope;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
||||||
import org.keycloak.authorization.store.PolicyStore;
|
import org.keycloak.authorization.store.PolicyStore;
|
||||||
import org.keycloak.authorization.store.ResourceServerStore;
|
import org.keycloak.authorization.store.ResourceServerStore;
|
||||||
import org.keycloak.authorization.store.ResourceStore;
|
import org.keycloak.authorization.store.ResourceStore;
|
||||||
|
@ -92,6 +104,7 @@ import org.keycloak.representations.idm.UserConsentRepresentation;
|
||||||
import org.keycloak.representations.idm.UserFederationMapperRepresentation;
|
import org.keycloak.representations.idm.UserFederationMapperRepresentation;
|
||||||
import org.keycloak.representations.idm.UserFederationProviderRepresentation;
|
import org.keycloak.representations.idm.UserFederationProviderRepresentation;
|
||||||
import org.keycloak.representations.idm.UserRepresentation;
|
import org.keycloak.representations.idm.UserRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.PolicyEnforcementMode;
|
import org.keycloak.representations.idm.authorization.PolicyEnforcementMode;
|
||||||
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.ResourceOwnerRepresentation;
|
import org.keycloak.representations.idm.authorization.ResourceOwnerRepresentation;
|
||||||
|
@ -103,18 +116,6 @@ import org.keycloak.storage.UserStorageProviderModel;
|
||||||
import org.keycloak.storage.federated.UserFederatedStorageProvider;
|
import org.keycloak.storage.federated.UserFederatedStorageProvider;
|
||||||
import org.keycloak.util.JsonSerialization;
|
import org.keycloak.util.JsonSerialization;
|
||||||
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.HashMap;
|
|
||||||
import java.util.HashSet;
|
|
||||||
import java.util.LinkedList;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.ListIterator;
|
|
||||||
import java.util.Map;
|
|
||||||
import java.util.Set;
|
|
||||||
import java.util.function.Function;
|
|
||||||
import java.util.stream.Collectors;
|
|
||||||
|
|
||||||
public class RepresentationToModel {
|
public class RepresentationToModel {
|
||||||
|
|
||||||
private static Logger logger = Logger.getLogger(RepresentationToModel.class);
|
private static Logger logger = Logger.getLogger(RepresentationToModel.class);
|
||||||
|
@ -1896,9 +1897,6 @@ public class RepresentationToModel {
|
||||||
resourceServer.setPolicyEnforcementMode(rep.getPolicyEnforcementMode());
|
resourceServer.setPolicyEnforcementMode(rep.getPolicyEnforcementMode());
|
||||||
resourceServer.setAllowRemoteResourceManagement(rep.isAllowRemoteResourceManagement());
|
resourceServer.setAllowRemoteResourceManagement(rep.isAllowRemoteResourceManagement());
|
||||||
|
|
||||||
StoreFactory storeFactory = authorization.getStoreFactory();
|
|
||||||
ScopeStore scopeStore = storeFactory.getScopeStore();
|
|
||||||
|
|
||||||
rep.getScopes().forEach(scope -> {
|
rep.getScopes().forEach(scope -> {
|
||||||
toModel(scope, resourceServer, authorization);
|
toModel(scope, resourceServer, authorization);
|
||||||
});
|
});
|
||||||
|
@ -1932,138 +1930,12 @@ public class RepresentationToModel {
|
||||||
|
|
||||||
private static Policy importPolicies(AuthorizationProvider authorization, ResourceServer resourceServer, List<PolicyRepresentation> policiesToImport, String parentPolicyName) {
|
private static Policy importPolicies(AuthorizationProvider authorization, ResourceServer resourceServer, List<PolicyRepresentation> policiesToImport, String parentPolicyName) {
|
||||||
StoreFactory storeFactory = authorization.getStoreFactory();
|
StoreFactory storeFactory = authorization.getStoreFactory();
|
||||||
KeycloakSession session = authorization.getKeycloakSession();
|
|
||||||
RealmModel realm = authorization.getRealm();
|
|
||||||
for (PolicyRepresentation policyRepresentation : policiesToImport) {
|
for (PolicyRepresentation policyRepresentation : policiesToImport) {
|
||||||
if (parentPolicyName != null && !parentPolicyName.equals(policyRepresentation.getName())) {
|
if (parentPolicyName != null && !parentPolicyName.equals(policyRepresentation.getName())) {
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
Map<String, String> config = policyRepresentation.getConfig();
|
Map<String, String> config = policyRepresentation.getConfig();
|
||||||
|
|
||||||
String roles = config.get("roles");
|
|
||||||
|
|
||||||
if (roles != null && !roles.isEmpty()) {
|
|
||||||
try {
|
|
||||||
List<Map> rolesMap = (List<Map>) JsonSerialization.readValue(roles, List.class);
|
|
||||||
config.put("roles", JsonSerialization.writeValueAsString(rolesMap.stream().map(roleConfig -> {
|
|
||||||
String roleName = roleConfig.get("id").toString();
|
|
||||||
String clientId = null;
|
|
||||||
int clientIdSeparator = roleName.indexOf("/");
|
|
||||||
|
|
||||||
if (clientIdSeparator != -1) {
|
|
||||||
clientId = roleName.substring(0, clientIdSeparator);
|
|
||||||
roleName = roleName.substring(clientIdSeparator + 1);
|
|
||||||
}
|
|
||||||
|
|
||||||
RoleModel role;
|
|
||||||
|
|
||||||
if (clientId == null) {
|
|
||||||
role = realm.getRole(roleName);
|
|
||||||
} else {
|
|
||||||
role = realm.getClientByClientId(clientId).getRole(roleName);
|
|
||||||
}
|
|
||||||
|
|
||||||
// fallback to find any client role with the given name
|
|
||||||
if (role == null) {
|
|
||||||
String finalRoleName = roleName;
|
|
||||||
role = realm.getClients().stream().map(clientModel -> clientModel.getRole(finalRoleName)).filter(roleModel -> roleModel != null)
|
|
||||||
.findFirst().orElse(null);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (role == null) {
|
|
||||||
role = realm.getRoleById(roleName);
|
|
||||||
|
|
||||||
if (role == null) {
|
|
||||||
String finalRoleName1 = roleName;
|
|
||||||
role = realm.getClients().stream().map(clientModel -> clientModel.getRole(finalRoleName1)).filter(roleModel -> roleModel != null)
|
|
||||||
.findFirst().orElse(null);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (role == null) {
|
|
||||||
throw new RuntimeException("Error while importing configuration. Role [" + roleName + "] could not be found.");
|
|
||||||
}
|
|
||||||
|
|
||||||
roleConfig.put("id", role.getId());
|
|
||||||
return roleConfig;
|
|
||||||
}).collect(Collectors.toList())));
|
|
||||||
} catch (Exception e) {
|
|
||||||
throw new RuntimeException("Error while exporting policy [" + policyRepresentation.getName() + "].", e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
String users = config.get("users");
|
|
||||||
|
|
||||||
if (users != null && !users.isEmpty()) {
|
|
||||||
try {
|
|
||||||
List<String> usersMap = (List<String>) JsonSerialization.readValue(users, List.class);
|
|
||||||
config.put("users", JsonSerialization.writeValueAsString(usersMap.stream().map(userId -> {
|
|
||||||
UserModel user = session.users().getUserByUsername(userId, realm);
|
|
||||||
|
|
||||||
if (user == null) {
|
|
||||||
user = session.users().getUserById(userId, realm);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (user == null) {
|
|
||||||
throw new RuntimeException("Error while importing configuration. User [" + userId + "] could not be found.");
|
|
||||||
}
|
|
||||||
|
|
||||||
return user.getId();
|
|
||||||
}).collect(Collectors.toList())));
|
|
||||||
} catch (Exception e) {
|
|
||||||
throw new RuntimeException("Error while exporting policy [" + policyRepresentation.getName() + "].", e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
String scopes = config.get("scopes");
|
|
||||||
|
|
||||||
if (scopes != null && !scopes.isEmpty()) {
|
|
||||||
try {
|
|
||||||
ScopeStore scopeStore = storeFactory.getScopeStore();
|
|
||||||
List<String> scopesMap = (List<String>) JsonSerialization.readValue(scopes, List.class);
|
|
||||||
config.put("scopes", JsonSerialization.writeValueAsString(scopesMap.stream().map(scopeName -> {
|
|
||||||
Scope newScope = scopeStore.findByName(scopeName, resourceServer.getId());
|
|
||||||
|
|
||||||
if (newScope == null) {
|
|
||||||
newScope = scopeStore.findById(scopeName, resourceServer.getId());
|
|
||||||
}
|
|
||||||
|
|
||||||
if (newScope == null) {
|
|
||||||
throw new RuntimeException("Scope with name [" + scopeName + "] not defined.");
|
|
||||||
}
|
|
||||||
|
|
||||||
return newScope.getId();
|
|
||||||
}).collect(Collectors.toList())));
|
|
||||||
} catch (Exception e) {
|
|
||||||
throw new RuntimeException("Error while exporting policy [" + policyRepresentation.getName() + "].", e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
String policyResources = config.get("resources");
|
|
||||||
|
|
||||||
if (policyResources != null && !policyResources.isEmpty()) {
|
|
||||||
ResourceStore resourceStore = storeFactory.getResourceStore();
|
|
||||||
try {
|
|
||||||
List<String> resources = JsonSerialization.readValue(policyResources, List.class);
|
|
||||||
config.put("resources", JsonSerialization.writeValueAsString(resources.stream().map(resourceName -> {
|
|
||||||
Resource resource = resourceStore.findByName(resourceName, resourceServer.getId());
|
|
||||||
|
|
||||||
if (resource == null) {
|
|
||||||
resource = resourceStore.findById(resourceName, resourceServer.getId());
|
|
||||||
}
|
|
||||||
|
|
||||||
if (resource == null) {
|
|
||||||
throw new RuntimeException("Resource with name [" + resourceName + "] not defined.");
|
|
||||||
}
|
|
||||||
|
|
||||||
return resource.getId();
|
|
||||||
}).collect(Collectors.toList())));
|
|
||||||
} catch (Exception e) {
|
|
||||||
throw new RuntimeException("Error while exporting policy [" + policyRepresentation.getName() + "].", e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
String applyPolicies = config.get("applyPolicies");
|
String applyPolicies = config.get("applyPolicies");
|
||||||
|
|
||||||
if (applyPolicies != null && !applyPolicies.isEmpty()) {
|
if (applyPolicies != null && !applyPolicies.isEmpty()) {
|
||||||
|
@ -2087,91 +1959,111 @@ public class RepresentationToModel {
|
||||||
return policy.getId();
|
return policy.getId();
|
||||||
}).collect(Collectors.toList())));
|
}).collect(Collectors.toList())));
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
throw new RuntimeException("Error while exporting policy [" + policyRepresentation.getName() + "].", e);
|
throw new RuntimeException("Error while importing policy [" + policyRepresentation.getName() + "].", e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (parentPolicyName == null) {
|
PolicyStore policyStore = storeFactory.getPolicyStore();
|
||||||
toModel(policyRepresentation, resourceServer, authorization);
|
Policy policy = policyStore.findById(policyRepresentation.getId(), resourceServer.getId());
|
||||||
} else if (parentPolicyName.equals(policyRepresentation.getName())) {
|
|
||||||
return toModel(policyRepresentation, resourceServer, authorization);
|
if (policy == null) {
|
||||||
|
policy = policyStore.findByName(policyRepresentation.getName(), resourceServer.getId());
|
||||||
|
}
|
||||||
|
|
||||||
|
if (policy == null) {
|
||||||
|
policy = policyStore.create(policyRepresentation, resourceServer);
|
||||||
|
} else {
|
||||||
|
policy = toModel(policyRepresentation, authorization, policy);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (parentPolicyName != null && parentPolicyName.equals(policyRepresentation.getName())) {
|
||||||
|
return policy;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
public static Policy toModel(PolicyRepresentation policy, ResourceServer resourceServer, AuthorizationProvider authorization) {
|
public static Policy toModel(AbstractPolicyRepresentation representation, AuthorizationProvider authorization, Policy model) {
|
||||||
String type = policy.getType();
|
model.setName(representation.getName());
|
||||||
PolicyProvider provider = authorization.getProvider(type);
|
model.setDescription(representation.getDescription());
|
||||||
|
model.setDecisionStrategy(representation.getDecisionStrategy());
|
||||||
|
model.setLogic(representation.getLogic());
|
||||||
|
|
||||||
if (provider == null) {
|
Set resources = representation.getResources();
|
||||||
//TODO: temporary, remove this check on future versions as drools type is now deprecated
|
Set scopes = representation.getScopes();
|
||||||
if ("drools".equalsIgnoreCase(type)) {
|
Set policies = representation.getPolicies();
|
||||||
type = "rules";
|
|
||||||
}
|
|
||||||
if (authorization.getProvider(type) == null) {
|
|
||||||
throw new RuntimeException("Unknown polucy type [" + type + "]. Could not find a provider for this type.");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
PolicyStore policyStore = authorization.getStoreFactory().getPolicyStore();
|
if (representation instanceof PolicyRepresentation) {
|
||||||
Policy existing;
|
PolicyRepresentation policy = PolicyRepresentation.class.cast(representation);
|
||||||
|
String resourcesConfig = policy.getConfig().get("resources");
|
||||||
if (policy.getId() != null) {
|
|
||||||
existing = policyStore.findById(policy.getId(), resourceServer.getId());
|
|
||||||
} else {
|
|
||||||
existing = policyStore.findByName(policy.getName(), resourceServer.getId());
|
|
||||||
}
|
|
||||||
|
|
||||||
if (existing != null) {
|
|
||||||
existing.setName(policy.getName());
|
|
||||||
existing.setDescription(policy.getDescription());
|
|
||||||
existing.setConfig(policy.getConfig());
|
|
||||||
existing.setDecisionStrategy(policy.getDecisionStrategy());
|
|
||||||
existing.setLogic(policy.getLogic());
|
|
||||||
|
|
||||||
updateResources(existing, authorization);
|
|
||||||
updateAssociatedPolicies(existing, resourceServer, authorization);
|
|
||||||
updateScopes(existing, authorization);
|
|
||||||
|
|
||||||
return existing;
|
|
||||||
}
|
|
||||||
|
|
||||||
Policy model = policyStore.create(policy.getName(), type, resourceServer);
|
|
||||||
|
|
||||||
model.setDescription(policy.getDescription());
|
|
||||||
model.setDecisionStrategy(policy.getDecisionStrategy());
|
|
||||||
model.setLogic(policy.getLogic());
|
|
||||||
model.setConfig(policy.getConfig());
|
|
||||||
|
|
||||||
updateResources(model, authorization);
|
|
||||||
updateAssociatedPolicies(model, resourceServer, authorization);
|
|
||||||
updateScopes(model, authorization);
|
|
||||||
|
|
||||||
policy.setId(model.getId());
|
|
||||||
|
|
||||||
return model;
|
|
||||||
}
|
|
||||||
|
|
||||||
private static void updateScopes(Policy policy, AuthorizationProvider authorization) {
|
|
||||||
String scopes = policy.getConfig().get("scopes");
|
|
||||||
if (scopes != null) {
|
|
||||||
String[] scopeIds;
|
|
||||||
|
|
||||||
|
if (resourcesConfig != null) {
|
||||||
try {
|
try {
|
||||||
scopeIds = JsonSerialization.readValue(scopes, String[].class);
|
resources = JsonSerialization.readValue(resourcesConfig, Set.class);
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
throw new RuntimeException(e);
|
throw new RuntimeException(e);
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
String scopesConfig = policy.getConfig().get("scopes");
|
||||||
|
|
||||||
|
if (scopesConfig != null) {
|
||||||
|
try {
|
||||||
|
scopes = JsonSerialization.readValue(scopesConfig, Set.class);
|
||||||
|
} catch (IOException e) {
|
||||||
|
throw new RuntimeException(e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
String policiesConfig = policy.getConfig().get("applyPolicies");
|
||||||
|
|
||||||
|
if (policiesConfig != null) {
|
||||||
|
try {
|
||||||
|
policies = JsonSerialization.readValue(policiesConfig, Set.class);
|
||||||
|
} catch (IOException e) {
|
||||||
|
throw new RuntimeException(e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
model.setConfig(policy.getConfig());
|
||||||
|
}
|
||||||
|
|
||||||
StoreFactory storeFactory = authorization.getStoreFactory();
|
StoreFactory storeFactory = authorization.getStoreFactory();
|
||||||
|
|
||||||
|
updateResources(resources, model, storeFactory);
|
||||||
|
updateScopes(scopes, model, storeFactory);
|
||||||
|
updateAssociatedPolicies(policies, model, storeFactory);
|
||||||
|
|
||||||
|
PolicyProviderFactory provider = authorization.getProviderFactory(model.getType());
|
||||||
|
|
||||||
|
if (representation instanceof PolicyRepresentation) {
|
||||||
|
provider.onImport(model, PolicyRepresentation.class.cast(representation), authorization);
|
||||||
|
} else if (representation.getId() == null) {
|
||||||
|
provider.onCreate(model, representation, authorization);
|
||||||
|
} else {
|
||||||
|
provider.onUpdate(model, representation, authorization);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
representation.setId(model.getId());
|
||||||
|
|
||||||
|
return model;
|
||||||
|
}
|
||||||
|
|
||||||
|
private static void updateScopes(Set<String> scopeIds, Policy policy, StoreFactory storeFactory) {
|
||||||
|
if (scopeIds != null) {
|
||||||
|
if (scopeIds.isEmpty()) {
|
||||||
|
for (Scope scope : new HashSet<Scope>(policy.getScopes())) {
|
||||||
|
policy.removeScope(scope);
|
||||||
|
}
|
||||||
|
return;
|
||||||
|
}
|
||||||
for (String scopeId : scopeIds) {
|
for (String scopeId : scopeIds) {
|
||||||
boolean hasScope = false;
|
boolean hasScope = false;
|
||||||
|
|
||||||
for (Scope scopeModel : new HashSet<Scope>(policy.getScopes())) {
|
for (Scope scopeModel : new HashSet<Scope>(policy.getScopes())) {
|
||||||
if (scopeModel.getId().equals(scopeId)) {
|
if (scopeModel.getId().equals(scopeId) || scopeModel.getName().equals(scopeId)) {
|
||||||
hasScope = true;
|
hasScope = true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -2180,7 +2072,10 @@ public class RepresentationToModel {
|
||||||
Scope scope = storeFactory.getScopeStore().findById(scopeId, resourceServer.getId());
|
Scope scope = storeFactory.getScopeStore().findById(scopeId, resourceServer.getId());
|
||||||
|
|
||||||
if (scope == null) {
|
if (scope == null) {
|
||||||
storeFactory.getScopeStore().findByName(scopeId, resourceServer.getId());
|
scope = storeFactory.getScopeStore().findByName(scopeId, resourceServer.getId());
|
||||||
|
if (scope == null) {
|
||||||
|
throw new RuntimeException("Scope with id or name [" + scopeId + "] does not exist");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
policy.addScope(scope);
|
policy.addScope(scope);
|
||||||
|
@ -2191,7 +2086,7 @@ public class RepresentationToModel {
|
||||||
boolean hasScope = false;
|
boolean hasScope = false;
|
||||||
|
|
||||||
for (String scopeId : scopeIds) {
|
for (String scopeId : scopeIds) {
|
||||||
if (scopeModel.getId().equals(scopeId)) {
|
if (scopeModel.getId().equals(scopeId) || scopeModel.getName().equals(scopeId)) {
|
||||||
hasScope = true;
|
hasScope = true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -2199,24 +2094,22 @@ public class RepresentationToModel {
|
||||||
policy.removeScope(scopeModel);
|
policy.removeScope(scopeModel);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
policy.getConfig().remove("scopes");
|
policy.getConfig().remove("scopes");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private static void updateAssociatedPolicies(Set<String> policyIds, Policy policy, StoreFactory storeFactory) {
|
||||||
|
ResourceServer resourceServer = policy.getResourceServer();
|
||||||
|
|
||||||
|
if (policyIds != null) {
|
||||||
|
if (policyIds.isEmpty()) {
|
||||||
|
for (Policy associated: new HashSet<Policy>(policy.getAssociatedPolicies())) {
|
||||||
|
policy.removeAssociatedPolicy(associated);
|
||||||
|
}
|
||||||
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
private static void updateAssociatedPolicies(Policy policy, ResourceServer resourceServer, AuthorizationProvider authorization) {
|
|
||||||
String policies = policy.getConfig().get("applyPolicies");
|
|
||||||
|
|
||||||
if (policies != null) {
|
|
||||||
String[] policyIds;
|
|
||||||
|
|
||||||
try {
|
|
||||||
policyIds = JsonSerialization.readValue(policies, String[].class);
|
|
||||||
} catch (IOException e) {
|
|
||||||
throw new RuntimeException(e);
|
|
||||||
}
|
|
||||||
|
|
||||||
StoreFactory storeFactory = authorization.getStoreFactory();
|
|
||||||
PolicyStore policyStore = storeFactory.getPolicyStore();
|
PolicyStore policyStore = storeFactory.getPolicyStore();
|
||||||
|
|
||||||
for (String policyId : policyIds) {
|
for (String policyId : policyIds) {
|
||||||
|
@ -2228,12 +2121,14 @@ public class RepresentationToModel {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
if (!hasPolicy) {
|
if (!hasPolicy) {
|
||||||
Policy associatedPolicy = policyStore.findById(policyId, resourceServer.getId());
|
Policy associatedPolicy = policyStore.findById(policyId, resourceServer.getId());
|
||||||
|
|
||||||
if (associatedPolicy == null) {
|
if (associatedPolicy == null) {
|
||||||
associatedPolicy = policyStore.findByName(policyId, resourceServer.getId());
|
associatedPolicy = policyStore.findByName(policyId, resourceServer.getId());
|
||||||
|
if (associatedPolicy == null) {
|
||||||
|
throw new RuntimeException("Policy with id or name [" + policyId + "] does not exist");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
policy.addAssociatedPolicy(associatedPolicy);
|
policy.addAssociatedPolicy(associatedPolicy);
|
||||||
|
@ -2250,31 +2145,24 @@ public class RepresentationToModel {
|
||||||
}
|
}
|
||||||
if (!hasPolicy) {
|
if (!hasPolicy) {
|
||||||
policy.removeAssociatedPolicy(policyModel);
|
policy.removeAssociatedPolicy(policyModel);
|
||||||
;
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
policy.getConfig().remove("applyPolicies");
|
policy.getConfig().remove("applyPolicies");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private static void updateResources(Set<String> resourceIds, Policy policy, StoreFactory storeFactory) {
|
||||||
|
if (resourceIds != null) {
|
||||||
|
if (resourceIds.isEmpty()) {
|
||||||
|
for (Scope scope : new HashSet<Scope>(policy.getScopes())) {
|
||||||
|
policy.removeScope(scope);
|
||||||
}
|
}
|
||||||
|
|
||||||
private static void updateResources(Policy policy, AuthorizationProvider authorization) {
|
|
||||||
String resources = policy.getConfig().get("resources");
|
|
||||||
if (resources != null) {
|
|
||||||
String[] resourceIds;
|
|
||||||
|
|
||||||
try {
|
|
||||||
resourceIds = JsonSerialization.readValue(resources, String[].class);
|
|
||||||
} catch (IOException e) {
|
|
||||||
throw new RuntimeException(e);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
StoreFactory storeFactory = authorization.getStoreFactory();
|
|
||||||
|
|
||||||
for (String resourceId : resourceIds) {
|
for (String resourceId : resourceIds) {
|
||||||
boolean hasResource = false;
|
boolean hasResource = false;
|
||||||
for (Resource resourceModel : new HashSet<Resource>(policy.getResources())) {
|
for (Resource resourceModel : new HashSet<Resource>(policy.getResources())) {
|
||||||
if (resourceModel.getId().equals(resourceId)) {
|
if (resourceModel.getId().equals(resourceId) || resourceModel.getName().equals(resourceId)) {
|
||||||
hasResource = true;
|
hasResource = true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -2282,7 +2170,10 @@ public class RepresentationToModel {
|
||||||
Resource resource = storeFactory.getResourceStore().findById(resourceId, policy.getResourceServer().getId());
|
Resource resource = storeFactory.getResourceStore().findById(resourceId, policy.getResourceServer().getId());
|
||||||
|
|
||||||
if (resource == null) {
|
if (resource == null) {
|
||||||
throw new RuntimeException("Resource [" + resourceId + "] not found.");
|
resource = storeFactory.getResourceStore().findByName(resourceId, policy.getResourceServer().getId());
|
||||||
|
if (resource == null) {
|
||||||
|
throw new RuntimeException("Resource with id or name [" + resourceId + "] does not exist");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
policy.addResource(resource);
|
policy.addResource(resource);
|
||||||
|
@ -2293,7 +2184,7 @@ public class RepresentationToModel {
|
||||||
boolean hasResource = false;
|
boolean hasResource = false;
|
||||||
|
|
||||||
for (String resourceId : resourceIds) {
|
for (String resourceId : resourceIds) {
|
||||||
if (resourceModel.getId().equals(resourceId)) {
|
if (resourceModel.getId().equals(resourceId) || resourceModel.getName().equals(resourceId)) {
|
||||||
hasResource = true;
|
hasResource = true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -2302,10 +2193,10 @@ public class RepresentationToModel {
|
||||||
policy.removeResource(resourceModel);
|
policy.removeResource(resourceModel);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
policy.getConfig().remove("resources");
|
policy.getConfig().remove("resources");
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
public static Resource toModel(ResourceRepresentation resource, ResourceServer resourceServer, AuthorizationProvider authorization) {
|
public static Resource toModel(ResourceRepresentation resource, ResourceServer resourceServer, AuthorizationProvider authorization) {
|
||||||
ResourceStore resourceStore = authorization.getStoreFactory().getResourceStore();
|
ResourceStore resourceStore = authorization.getStoreFactory().getResourceStore();
|
||||||
|
|
|
@ -21,7 +21,6 @@ package org.keycloak.authorization;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.concurrent.Executor;
|
|
||||||
|
|
||||||
import org.keycloak.Config;
|
import org.keycloak.Config;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
import org.keycloak.authorization.policy.provider.PolicyProvider;
|
||||||
|
@ -38,7 +37,6 @@ import org.keycloak.provider.ProviderFactory;
|
||||||
*/
|
*/
|
||||||
public class DefaultAuthorizationProviderFactory implements AuthorizationProviderFactory {
|
public class DefaultAuthorizationProviderFactory implements AuthorizationProviderFactory {
|
||||||
|
|
||||||
private Executor scheduler;
|
|
||||||
private Map<String, PolicyProviderFactory> policyProviderFactories;
|
private Map<String, PolicyProviderFactory> policyProviderFactories;
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -48,15 +46,6 @@ public class DefaultAuthorizationProviderFactory implements AuthorizationProvide
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void init(Config.Scope config) {
|
public void init(Config.Scope config) {
|
||||||
//TODO: user-defined configuration
|
|
||||||
// Executor executor = Executors.newWorkStealingPool();
|
|
||||||
// this.scheduler = command -> {
|
|
||||||
// Map<Class<?>, Object> contextDataMap = ResteasyProviderFactory.getContextDataMap();
|
|
||||||
// executor.execute(() -> {
|
|
||||||
// ResteasyProviderFactory.pushContextDataMap(contextDataMap);
|
|
||||||
// command.run();
|
|
||||||
// });
|
|
||||||
// };
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -77,11 +66,9 @@ public class DefaultAuthorizationProviderFactory implements AuthorizationProvide
|
||||||
@Override
|
@Override
|
||||||
public AuthorizationProvider create(KeycloakSession session, RealmModel realm) {
|
public AuthorizationProvider create(KeycloakSession session, RealmModel realm) {
|
||||||
StoreFactory storeFactory = session.getProvider(CachedStoreFactoryProvider.class);
|
StoreFactory storeFactory = session.getProvider(CachedStoreFactoryProvider.class);
|
||||||
|
|
||||||
if (storeFactory == null) {
|
if (storeFactory == null) {
|
||||||
storeFactory = session.getProvider(StoreFactory.class);
|
storeFactory = session.getProvider(StoreFactory.class);
|
||||||
}
|
}
|
||||||
|
|
||||||
return new AuthorizationProvider(session, realm, storeFactory, policyProviderFactories);
|
return new AuthorizationProvider(session, realm, storeFactory, policyProviderFactories);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,46 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.authorization.admin;
|
||||||
|
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Map;
|
||||||
|
|
||||||
|
import org.keycloak.authorization.AuthorizationProvider;
|
||||||
|
import org.keycloak.authorization.model.Policy;
|
||||||
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
|
import org.keycloak.services.resources.admin.RealmAuth;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public class PermissionService extends PolicyService {
|
||||||
|
|
||||||
|
public PermissionService(ResourceServer resourceServer, AuthorizationProvider authorization, RealmAuth auth) {
|
||||||
|
super(resourceServer, authorization, auth);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected PolicyResourceService doCreatePolicyResource(Policy policy) {
|
||||||
|
return new PolicyTypeResourceService(policy, resourceServer, authorization, auth);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected List<Object> doSearch(Integer firstResult, Integer maxResult, Map<String, String[]> filters) {
|
||||||
|
filters.put("permission", new String[] {Boolean.TRUE.toString()});
|
||||||
|
return super.doSearch(firstResult, maxResult, filters);
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,236 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.authorization.admin;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
|
import javax.ws.rs.Consumes;
|
||||||
|
import javax.ws.rs.DELETE;
|
||||||
|
import javax.ws.rs.GET;
|
||||||
|
import javax.ws.rs.PUT;
|
||||||
|
import javax.ws.rs.Path;
|
||||||
|
import javax.ws.rs.Produces;
|
||||||
|
import javax.ws.rs.core.Response;
|
||||||
|
import javax.ws.rs.core.Response.Status;
|
||||||
|
|
||||||
|
import org.jboss.resteasy.annotations.cache.NoCache;
|
||||||
|
import org.keycloak.authorization.AuthorizationProvider;
|
||||||
|
import org.keycloak.authorization.model.Policy;
|
||||||
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
|
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
||||||
|
import org.keycloak.authorization.store.PolicyStore;
|
||||||
|
import org.keycloak.authorization.store.StoreFactory;
|
||||||
|
import org.keycloak.models.utils.ModelToRepresentation;
|
||||||
|
import org.keycloak.models.utils.RepresentationToModel;
|
||||||
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ScopeRepresentation;
|
||||||
|
import org.keycloak.services.resources.admin.RealmAuth;
|
||||||
|
import org.keycloak.util.JsonSerialization;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public class PolicyResourceService {
|
||||||
|
|
||||||
|
private final Policy policy;
|
||||||
|
protected final ResourceServer resourceServer;
|
||||||
|
protected final AuthorizationProvider authorization;
|
||||||
|
protected final RealmAuth auth;
|
||||||
|
|
||||||
|
public PolicyResourceService(Policy policy, ResourceServer resourceServer, AuthorizationProvider authorization, RealmAuth auth) {
|
||||||
|
this.policy = policy;
|
||||||
|
this.resourceServer = resourceServer;
|
||||||
|
this.authorization = authorization;
|
||||||
|
this.auth = auth;
|
||||||
|
}
|
||||||
|
|
||||||
|
@PUT
|
||||||
|
@Consumes("application/json")
|
||||||
|
@Produces("application/json")
|
||||||
|
@NoCache
|
||||||
|
public Response update(String payload) {
|
||||||
|
this.auth.requireManage();
|
||||||
|
|
||||||
|
AbstractPolicyRepresentation representation = doCreateRepresentation(payload);
|
||||||
|
|
||||||
|
if (policy == null) {
|
||||||
|
return Response.status(Status.NOT_FOUND).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
representation.setId(policy.getId());
|
||||||
|
|
||||||
|
RepresentationToModel.toModel(representation, authorization, policy);
|
||||||
|
|
||||||
|
return Response.status(Status.CREATED).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
@DELETE
|
||||||
|
public Response delete() {
|
||||||
|
this.auth.requireManage();
|
||||||
|
|
||||||
|
if (policy == null) {
|
||||||
|
return Response.status(Status.NOT_FOUND).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
StoreFactory storeFactory = authorization.getStoreFactory();
|
||||||
|
PolicyStore policyStore = storeFactory.getPolicyStore();
|
||||||
|
PolicyProviderFactory resource = getProviderFactory(policy.getType());
|
||||||
|
|
||||||
|
resource.onRemove(policy, authorization);
|
||||||
|
|
||||||
|
policyStore.findDependentPolicies(policy.getId(), resourceServer.getId()).forEach(dependentPolicy -> {
|
||||||
|
if (dependentPolicy.getAssociatedPolicies().size() == 1) {
|
||||||
|
policyStore.delete(dependentPolicy.getId());
|
||||||
|
} else {
|
||||||
|
dependentPolicy.removeAssociatedPolicy(policy);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
policyStore.delete(policy.getId());
|
||||||
|
|
||||||
|
return Response.noContent().build();
|
||||||
|
}
|
||||||
|
|
||||||
|
@GET
|
||||||
|
@Produces("application/json")
|
||||||
|
@NoCache
|
||||||
|
public Response findById() {
|
||||||
|
this.auth.requireView();
|
||||||
|
|
||||||
|
if (policy == null) {
|
||||||
|
return Response.status(Status.NOT_FOUND).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
return Response.ok(toRepresentation(policy, authorization)).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
protected AbstractPolicyRepresentation toRepresentation(Policy policy, AuthorizationProvider authorization) {
|
||||||
|
return ModelToRepresentation.toRepresentation(policy, PolicyRepresentation.class, authorization);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Path("/dependentPolicies")
|
||||||
|
@GET
|
||||||
|
@Produces("application/json")
|
||||||
|
@NoCache
|
||||||
|
public Response getDependentPolicies() {
|
||||||
|
this.auth.requireView();
|
||||||
|
|
||||||
|
if (policy == null) {
|
||||||
|
return Response.status(Status.NOT_FOUND).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
List<Policy> policies = authorization.getStoreFactory().getPolicyStore().findDependentPolicies(policy.getId(), resourceServer.getId());
|
||||||
|
|
||||||
|
return Response.ok(policies.stream().map(policy -> {
|
||||||
|
PolicyRepresentation representation1 = new PolicyRepresentation();
|
||||||
|
|
||||||
|
representation1.setId(policy.getId());
|
||||||
|
representation1.setName(policy.getName());
|
||||||
|
representation1.setType(policy.getType());
|
||||||
|
|
||||||
|
return representation1;
|
||||||
|
}).collect(Collectors.toList())).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Path("/scopes")
|
||||||
|
@GET
|
||||||
|
@Produces("application/json")
|
||||||
|
@NoCache
|
||||||
|
public Response getScopes() {
|
||||||
|
this.auth.requireView();
|
||||||
|
|
||||||
|
if (policy == null) {
|
||||||
|
return Response.status(Status.NOT_FOUND).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
return Response.ok(policy.getScopes().stream().map(scope -> {
|
||||||
|
ScopeRepresentation representation = new ScopeRepresentation();
|
||||||
|
|
||||||
|
representation.setId(scope.getId());
|
||||||
|
representation.setName(scope.getName());
|
||||||
|
|
||||||
|
return representation;
|
||||||
|
}).collect(Collectors.toList())).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Path("/resources")
|
||||||
|
@GET
|
||||||
|
@Produces("application/json")
|
||||||
|
@NoCache
|
||||||
|
public Response getResources() {
|
||||||
|
this.auth.requireView();
|
||||||
|
|
||||||
|
if (policy == null) {
|
||||||
|
return Response.status(Status.NOT_FOUND).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
return Response.ok(policy.getResources().stream().map(resource -> {
|
||||||
|
ResourceRepresentation representation = new ResourceRepresentation();
|
||||||
|
|
||||||
|
representation.setId(resource.getId());
|
||||||
|
representation.setName(resource.getName());
|
||||||
|
|
||||||
|
return representation;
|
||||||
|
}).collect(Collectors.toList())).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Path("/associatedPolicies")
|
||||||
|
@GET
|
||||||
|
@Produces("application/json")
|
||||||
|
@NoCache
|
||||||
|
public Response getAssociatedPolicies() {
|
||||||
|
this.auth.requireView();
|
||||||
|
|
||||||
|
if (policy == null) {
|
||||||
|
return Response.status(Status.NOT_FOUND).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
return Response.ok(policy.getAssociatedPolicies().stream().map(policy -> {
|
||||||
|
PolicyRepresentation representation1 = new PolicyRepresentation();
|
||||||
|
|
||||||
|
representation1.setId(policy.getId());
|
||||||
|
representation1.setName(policy.getName());
|
||||||
|
representation1.setType(policy.getType());
|
||||||
|
|
||||||
|
return representation1;
|
||||||
|
}).collect(Collectors.toList())).build();
|
||||||
|
}
|
||||||
|
|
||||||
|
protected AbstractPolicyRepresentation doCreateRepresentation(String payload) {
|
||||||
|
PolicyRepresentation representation;
|
||||||
|
|
||||||
|
try {
|
||||||
|
representation = JsonSerialization.readValue(payload, PolicyRepresentation.class);
|
||||||
|
} catch (IOException cause) {
|
||||||
|
throw new RuntimeException("Failed to deserialize representation", cause);
|
||||||
|
}
|
||||||
|
|
||||||
|
return representation;
|
||||||
|
}
|
||||||
|
|
||||||
|
private PolicyProviderFactory getProviderFactory(String policyType) {
|
||||||
|
return authorization.getProviderFactory(policyType);
|
||||||
|
}
|
||||||
|
|
||||||
|
protected Policy getPolicy() {
|
||||||
|
return policy;
|
||||||
|
}
|
||||||
|
}
|
|
@ -17,9 +17,7 @@
|
||||||
*/
|
*/
|
||||||
package org.keycloak.authorization.admin;
|
package org.keycloak.authorization.admin;
|
||||||
|
|
||||||
import static org.keycloak.models.utils.ModelToRepresentation.toRepresentation;
|
import java.io.IOException;
|
||||||
import static org.keycloak.models.utils.RepresentationToModel.toModel;
|
|
||||||
|
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
|
@ -29,14 +27,13 @@ import java.util.Map;
|
||||||
import java.util.stream.Collectors;
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
import javax.ws.rs.Consumes;
|
import javax.ws.rs.Consumes;
|
||||||
import javax.ws.rs.DELETE;
|
|
||||||
import javax.ws.rs.GET;
|
import javax.ws.rs.GET;
|
||||||
import javax.ws.rs.POST;
|
import javax.ws.rs.POST;
|
||||||
import javax.ws.rs.PUT;
|
|
||||||
import javax.ws.rs.Path;
|
import javax.ws.rs.Path;
|
||||||
import javax.ws.rs.PathParam;
|
import javax.ws.rs.PathParam;
|
||||||
import javax.ws.rs.Produces;
|
import javax.ws.rs.Produces;
|
||||||
import javax.ws.rs.QueryParam;
|
import javax.ws.rs.QueryParam;
|
||||||
|
import javax.ws.rs.core.MediaType;
|
||||||
import javax.ws.rs.core.Response;
|
import javax.ws.rs.core.Response;
|
||||||
import javax.ws.rs.core.Response.Status;
|
import javax.ws.rs.core.Response.Status;
|
||||||
|
|
||||||
|
@ -48,24 +45,24 @@ import org.keycloak.authorization.model.ResourceServer;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
||||||
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
||||||
import org.keycloak.authorization.store.PolicyStore;
|
import org.keycloak.authorization.store.PolicyStore;
|
||||||
import org.keycloak.authorization.store.ResourceStore;
|
|
||||||
import org.keycloak.authorization.store.ScopeStore;
|
|
||||||
import org.keycloak.authorization.store.StoreFactory;
|
import org.keycloak.authorization.store.StoreFactory;
|
||||||
import org.keycloak.models.Constants;
|
import org.keycloak.models.Constants;
|
||||||
|
import org.keycloak.models.utils.ModelToRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.PolicyProviderRepresentation;
|
import org.keycloak.representations.idm.authorization.PolicyProviderRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
import org.keycloak.services.ErrorResponseException;
|
||||||
import org.keycloak.representations.idm.authorization.ScopeRepresentation;
|
|
||||||
import org.keycloak.services.resources.admin.RealmAuth;
|
import org.keycloak.services.resources.admin.RealmAuth;
|
||||||
|
import org.keycloak.util.JsonSerialization;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
public class PolicyService {
|
public class PolicyService {
|
||||||
|
|
||||||
private final ResourceServer resourceServer;
|
protected final ResourceServer resourceServer;
|
||||||
private final AuthorizationProvider authorization;
|
protected final AuthorizationProvider authorization;
|
||||||
private final RealmAuth auth;
|
protected final RealmAuth auth;
|
||||||
|
|
||||||
public PolicyService(ResourceServer resourceServer, AuthorizationProvider authorization, RealmAuth auth) {
|
public PolicyService(ResourceServer resourceServer, AuthorizationProvider authorization, RealmAuth auth) {
|
||||||
this.resourceServer = resourceServer;
|
this.resourceServer = resourceServer;
|
||||||
|
@ -73,210 +70,66 @@ public class PolicyService {
|
||||||
this.auth = auth;
|
this.auth = auth;
|
||||||
}
|
}
|
||||||
|
|
||||||
@POST
|
@Path("{type}")
|
||||||
@Consumes("application/json")
|
public Object getResource(@PathParam("type") String type) {
|
||||||
@Produces("application/json")
|
PolicyProviderFactory providerFactory = getPolicyProviderFactory(type);
|
||||||
@NoCache
|
|
||||||
public Response create(PolicyRepresentation representation) {
|
|
||||||
this.auth.requireManage();
|
|
||||||
Policy policy = toModel(representation, this.resourceServer, authorization);
|
|
||||||
PolicyProviderAdminService resource = getPolicyProviderAdminResource(policy.getType(), authorization);
|
|
||||||
|
|
||||||
if (resource != null) {
|
if (providerFactory != null) {
|
||||||
try {
|
return new PolicyTypeService(type, resourceServer, authorization, auth);
|
||||||
resource.onCreate(policy);
|
|
||||||
} catch (Exception e) {
|
|
||||||
throw new RuntimeException(e);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Policy policy = authorization.getStoreFactory().getPolicyStore().findById(type, resourceServer.getId());
|
||||||
|
|
||||||
|
return doCreatePolicyResource(policy);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
protected Object doCreatePolicyResource(Policy policy) {
|
||||||
|
return new PolicyResourceService(policy, resourceServer, authorization, auth);
|
||||||
|
}
|
||||||
|
|
||||||
|
@POST
|
||||||
|
@Consumes(MediaType.APPLICATION_JSON)
|
||||||
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
|
@NoCache
|
||||||
|
public Response create(String payload) {
|
||||||
|
this.auth.requireManage();
|
||||||
|
|
||||||
|
AbstractPolicyRepresentation representation = doCreateRepresentation(payload);
|
||||||
|
Policy policy = create(representation);
|
||||||
|
|
||||||
representation.setId(policy.getId());
|
representation.setId(policy.getId());
|
||||||
|
|
||||||
return Response.status(Status.CREATED).entity(representation).build();
|
return Response.status(Status.CREATED).entity(representation).build();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Path("{id}")
|
protected AbstractPolicyRepresentation doCreateRepresentation(String payload) {
|
||||||
@PUT
|
PolicyRepresentation representation;
|
||||||
@Consumes("application/json")
|
|
||||||
@Produces("application/json")
|
|
||||||
@NoCache
|
|
||||||
public Response update(@PathParam("id") String id, PolicyRepresentation representation) {
|
|
||||||
this.auth.requireManage();
|
|
||||||
representation.setId(id);
|
|
||||||
StoreFactory storeFactory = authorization.getStoreFactory();
|
|
||||||
Policy policy = storeFactory.getPolicyStore().findById(representation.getId(), resourceServer.getId());
|
|
||||||
|
|
||||||
if (policy == null) {
|
|
||||||
return Response.status(Status.NOT_FOUND).build();
|
|
||||||
}
|
|
||||||
|
|
||||||
policy = toModel(representation, resourceServer, authorization);
|
|
||||||
|
|
||||||
PolicyProviderAdminService resource = getPolicyProviderAdminResource(policy.getType(), authorization);
|
|
||||||
|
|
||||||
if (resource != null) {
|
|
||||||
try {
|
try {
|
||||||
resource.onUpdate(policy);
|
representation = JsonSerialization.readValue(payload, PolicyRepresentation.class);
|
||||||
} catch (Exception e) {
|
} catch (IOException cause) {
|
||||||
throw new RuntimeException(e);
|
throw new RuntimeException("Failed to deserialize representation", cause);
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
return Response.status(Status.CREATED).build();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Path("{id}")
|
|
||||||
@DELETE
|
|
||||||
public Response delete(@PathParam("id") String id) {
|
|
||||||
this.auth.requireManage();
|
|
||||||
StoreFactory storeFactory = authorization.getStoreFactory();
|
|
||||||
PolicyStore policyStore = storeFactory.getPolicyStore();
|
|
||||||
Policy policy = policyStore.findById(id, resourceServer.getId());
|
|
||||||
|
|
||||||
if (policy == null) {
|
|
||||||
return Response.status(Status.NOT_FOUND).build();
|
|
||||||
}
|
|
||||||
|
|
||||||
PolicyProviderAdminService resource = getPolicyProviderAdminResource(policy.getType(), authorization);
|
|
||||||
|
|
||||||
if (resource != null) {
|
|
||||||
try {
|
|
||||||
resource.onRemove(policy);
|
|
||||||
} catch (Exception e) {
|
|
||||||
throw new RuntimeException(e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
policyStore.findDependentPolicies(id, resourceServer.getId()).forEach(dependentPolicy -> {
|
|
||||||
if (dependentPolicy.getAssociatedPolicies().size() == 1) {
|
|
||||||
policyStore.delete(dependentPolicy.getId());
|
|
||||||
} else {
|
|
||||||
dependentPolicy.removeAssociatedPolicy(policy);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
|
|
||||||
policyStore.delete(policy.getId());
|
|
||||||
|
|
||||||
return Response.noContent().build();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Path("{id}")
|
|
||||||
@GET
|
|
||||||
@Produces("application/json")
|
|
||||||
@NoCache
|
|
||||||
public Response findById(@PathParam("id") String id) {
|
|
||||||
this.auth.requireView();
|
|
||||||
StoreFactory storeFactory = authorization.getStoreFactory();
|
|
||||||
Policy model = storeFactory.getPolicyStore().findById(id, resourceServer.getId());
|
|
||||||
|
|
||||||
if (model == null) {
|
|
||||||
return Response.status(Status.NOT_FOUND).build();
|
|
||||||
}
|
|
||||||
|
|
||||||
return Response.ok(toRepresentation(model)).build();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Path("{id}/dependentPolicies")
|
|
||||||
@GET
|
|
||||||
@Produces("application/json")
|
|
||||||
@NoCache
|
|
||||||
public Response getDependentPolicies(@PathParam("id") String id) {
|
|
||||||
this.auth.requireView();
|
|
||||||
StoreFactory storeFactory = authorization.getStoreFactory();
|
|
||||||
Policy model = storeFactory.getPolicyStore().findById(id, resourceServer.getId());
|
|
||||||
|
|
||||||
if (model == null) {
|
|
||||||
return Response.status(Status.NOT_FOUND).build();
|
|
||||||
}
|
|
||||||
|
|
||||||
List<Policy> policies = authorization.getStoreFactory().getPolicyStore().findDependentPolicies(model.getId(), resourceServer.getId());
|
|
||||||
|
|
||||||
return Response.ok(policies.stream().map(policy -> {
|
|
||||||
PolicyRepresentation representation1 = new PolicyRepresentation();
|
|
||||||
|
|
||||||
representation1.setId(policy.getId());
|
|
||||||
representation1.setName(policy.getName());
|
|
||||||
representation1.setType(policy.getType());
|
|
||||||
|
|
||||||
return representation1;
|
|
||||||
}).collect(Collectors.toList())).build();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Path("{id}/scopes")
|
|
||||||
@GET
|
|
||||||
@Produces("application/json")
|
|
||||||
@NoCache
|
|
||||||
public Response getScopes(@PathParam("id") String id) {
|
|
||||||
this.auth.requireView();
|
|
||||||
StoreFactory storeFactory = authorization.getStoreFactory();
|
|
||||||
Policy model = storeFactory.getPolicyStore().findById(id, resourceServer.getId());
|
|
||||||
|
|
||||||
if (model == null) {
|
|
||||||
return Response.status(Status.NOT_FOUND).build();
|
|
||||||
}
|
|
||||||
|
|
||||||
return Response.ok(model.getScopes().stream().map(scope -> {
|
|
||||||
ScopeRepresentation representation = new ScopeRepresentation();
|
|
||||||
|
|
||||||
representation.setId(scope.getId());
|
|
||||||
representation.setName(scope.getName());
|
|
||||||
|
|
||||||
return representation;
|
return representation;
|
||||||
}).collect(Collectors.toList())).build();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Path("{id}/resources")
|
public Policy create(AbstractPolicyRepresentation representation) {
|
||||||
@GET
|
PolicyStore policyStore = authorization.getStoreFactory().getPolicyStore();
|
||||||
@Produces("application/json")
|
Policy existing = policyStore.findByName(representation.getName(), resourceServer.getId());
|
||||||
@NoCache
|
|
||||||
public Response getResources(@PathParam("id") String id) {
|
|
||||||
this.auth.requireView();
|
|
||||||
StoreFactory storeFactory = authorization.getStoreFactory();
|
|
||||||
Policy model = storeFactory.getPolicyStore().findById(id, resourceServer.getId());
|
|
||||||
|
|
||||||
if (model == null) {
|
if (existing != null) {
|
||||||
return Response.status(Status.NOT_FOUND).build();
|
throw new ErrorResponseException("Policy with name [" + representation.getName() + "] already exists", "Conflicting policy", Status.CONFLICT);
|
||||||
}
|
}
|
||||||
|
|
||||||
return Response.ok(model.getResources().stream().map(resource -> {
|
return policyStore.create(representation, resourceServer);
|
||||||
ResourceRepresentation representation = new ResourceRepresentation();
|
|
||||||
|
|
||||||
representation.setId(resource.getId());
|
|
||||||
representation.setName(resource.getName());
|
|
||||||
|
|
||||||
return representation;
|
|
||||||
}).collect(Collectors.toList())).build();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Path("{id}/associatedPolicies")
|
|
||||||
@GET
|
|
||||||
@Produces("application/json")
|
|
||||||
@NoCache
|
|
||||||
public Response getAssociatedPolicies(@PathParam("id") String id) {
|
|
||||||
this.auth.requireView();
|
|
||||||
StoreFactory storeFactory = authorization.getStoreFactory();
|
|
||||||
Policy model = storeFactory.getPolicyStore().findById(id, resourceServer.getId());
|
|
||||||
|
|
||||||
if (model == null) {
|
|
||||||
return Response.status(Status.NOT_FOUND).build();
|
|
||||||
}
|
|
||||||
|
|
||||||
return Response.ok(model.getAssociatedPolicies().stream().map(policy -> {
|
|
||||||
PolicyRepresentation representation1 = new PolicyRepresentation();
|
|
||||||
|
|
||||||
representation1.setId(policy.getId());
|
|
||||||
representation1.setName(policy.getName());
|
|
||||||
representation1.setType(policy.getType());
|
|
||||||
|
|
||||||
return representation1;
|
|
||||||
}).collect(Collectors.toList())).build();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Path("/search")
|
@Path("/search")
|
||||||
@GET
|
@GET
|
||||||
@Produces("application/json")
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
@NoCache
|
@NoCache
|
||||||
public Response find(@QueryParam("name") String name) {
|
public Response findByName(@QueryParam("name") String name) {
|
||||||
this.auth.requireView();
|
this.auth.requireView();
|
||||||
StoreFactory storeFactory = authorization.getStoreFactory();
|
StoreFactory storeFactory = authorization.getStoreFactory();
|
||||||
|
|
||||||
|
@ -290,11 +143,11 @@ public class PolicyService {
|
||||||
return Response.status(Status.OK).build();
|
return Response.status(Status.OK).build();
|
||||||
}
|
}
|
||||||
|
|
||||||
return Response.ok(toRepresentation(model)).build();
|
return Response.ok(toRepresentation(model, authorization)).build();
|
||||||
}
|
}
|
||||||
|
|
||||||
@GET
|
@GET
|
||||||
@Produces("application/json")
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
@NoCache
|
@NoCache
|
||||||
public Response findAll(@QueryParam("policyId") String id,
|
public Response findAll(@QueryParam("policyId") String id,
|
||||||
@QueryParam("name") String name,
|
@QueryParam("name") String name,
|
||||||
|
@ -363,15 +216,24 @@ public class PolicyService {
|
||||||
}
|
}
|
||||||
|
|
||||||
return Response.ok(
|
return Response.ok(
|
||||||
policyStore.findByResourceServer(search, resourceServer.getId(), firstResult != null ? firstResult : -1, maxResult != null ? maxResult : Constants.DEFAULT_MAX_RESULTS).stream()
|
doSearch(firstResult, maxResult, search))
|
||||||
.map(policy -> toRepresentation(policy))
|
|
||||||
.collect(Collectors.toList()))
|
|
||||||
.build();
|
.build();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
protected AbstractPolicyRepresentation toRepresentation(Policy model, AuthorizationProvider authorization) {
|
||||||
|
return ModelToRepresentation.toRepresentation(model, PolicyRepresentation.class, authorization);
|
||||||
|
}
|
||||||
|
|
||||||
|
protected List<Object> doSearch(Integer firstResult, Integer maxResult, Map<String, String[]> filters) {
|
||||||
|
PolicyStore policyStore = authorization.getStoreFactory().getPolicyStore();
|
||||||
|
return policyStore.findByResourceServer(filters, resourceServer.getId(), firstResult != null ? firstResult : -1, maxResult != null ? maxResult : Constants.DEFAULT_MAX_RESULTS).stream()
|
||||||
|
.map(policy -> toRepresentation(policy, authorization))
|
||||||
|
.collect(Collectors.toList());
|
||||||
|
}
|
||||||
|
|
||||||
@Path("providers")
|
@Path("providers")
|
||||||
@GET
|
@GET
|
||||||
@Produces("application/json")
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
@NoCache
|
@NoCache
|
||||||
public Response findPolicyProviders() {
|
public Response findPolicyProviders() {
|
||||||
this.auth.requireView();
|
this.auth.requireView();
|
||||||
|
@ -400,20 +262,12 @@ public class PolicyService {
|
||||||
return resource;
|
return resource;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Path("{policyType}")
|
protected PolicyProviderAdminService getPolicyProviderAdminResource(String policyType) {
|
||||||
public Object getPolicyTypeResource(@PathParam("policyType") String policyType) {
|
return getPolicyProviderFactory(policyType).getAdminResource(resourceServer, authorization);
|
||||||
this.auth.requireView();
|
|
||||||
return getPolicyProviderAdminResource(policyType, this.authorization);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private PolicyProviderAdminService getPolicyProviderAdminResource(String policyType, AuthorizationProvider authorization) {
|
protected PolicyProviderFactory getPolicyProviderFactory(String policyType) {
|
||||||
PolicyProviderFactory providerFactory = authorization.getProviderFactory(policyType);
|
return authorization.getProviderFactory(policyType);
|
||||||
|
|
||||||
if (providerFactory != null) {
|
|
||||||
return providerFactory.getAdminResource(this.resourceServer);
|
|
||||||
}
|
|
||||||
|
|
||||||
return null;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private void findAssociatedPolicies(Policy policy, List<Policy> policies) {
|
private void findAssociatedPolicies(Policy policy, List<Policy> policies) {
|
||||||
|
|
|
@ -0,0 +1,66 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.authorization.admin;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
|
||||||
|
import org.keycloak.authorization.AuthorizationProvider;
|
||||||
|
import org.keycloak.authorization.model.Policy;
|
||||||
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
|
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
||||||
|
import org.keycloak.models.utils.ModelToRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
|
import org.keycloak.services.resources.admin.RealmAuth;
|
||||||
|
import org.keycloak.util.JsonSerialization;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public class PolicyTypeResourceService extends PolicyResourceService {
|
||||||
|
|
||||||
|
public PolicyTypeResourceService(Policy policy, ResourceServer resourceServer, AuthorizationProvider authorization, RealmAuth auth) {
|
||||||
|
super(policy, resourceServer, authorization, auth);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected AbstractPolicyRepresentation doCreateRepresentation(String payload) {
|
||||||
|
String type = getPolicy().getType();
|
||||||
|
Class<? extends AbstractPolicyRepresentation> representationType = authorization.getProviderFactory(type).getRepresentationType();
|
||||||
|
|
||||||
|
if (representationType == null) {
|
||||||
|
throw new RuntimeException("Policy provider for type [" + type + "] returned a null representation type.");
|
||||||
|
}
|
||||||
|
|
||||||
|
AbstractPolicyRepresentation representation;
|
||||||
|
|
||||||
|
try {
|
||||||
|
representation = JsonSerialization.readValue(payload, representationType);
|
||||||
|
} catch (IOException e) {
|
||||||
|
throw new RuntimeException("Failed to deserialize JSON using policy provider for type [" + type + "].", e);
|
||||||
|
}
|
||||||
|
|
||||||
|
representation.setType(type);
|
||||||
|
|
||||||
|
return representation;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected AbstractPolicyRepresentation toRepresentation(Policy policy, AuthorizationProvider authorization) {
|
||||||
|
PolicyProviderFactory providerFactory = authorization.getProviderFactory(policy.getType());
|
||||||
|
return ModelToRepresentation.toRepresentation(policy, providerFactory.getRepresentationType(), authorization);
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,91 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.authorization.admin;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
|
||||||
|
import javax.ws.rs.Path;
|
||||||
|
|
||||||
|
import org.jboss.resteasy.spi.ResteasyProviderFactory;
|
||||||
|
import org.keycloak.authorization.AuthorizationProvider;
|
||||||
|
import org.keycloak.authorization.model.Policy;
|
||||||
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
|
import org.keycloak.authorization.policy.provider.PolicyProviderAdminService;
|
||||||
|
import org.keycloak.authorization.policy.provider.PolicyProviderFactory;
|
||||||
|
import org.keycloak.models.utils.ModelToRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
|
import org.keycloak.services.resources.admin.RealmAuth;
|
||||||
|
import org.keycloak.util.JsonSerialization;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public class PolicyTypeService extends PolicyService {
|
||||||
|
|
||||||
|
private final String type;
|
||||||
|
|
||||||
|
PolicyTypeService(String type, ResourceServer resourceServer, AuthorizationProvider authorization, RealmAuth auth) {
|
||||||
|
super(resourceServer, authorization, auth);
|
||||||
|
this.type = type;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Path("/provider")
|
||||||
|
public Object getPolicyAdminResourceProvider() {
|
||||||
|
PolicyProviderAdminService resource = getPolicyProviderAdminResource(type);
|
||||||
|
|
||||||
|
if (resource == null) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
ResteasyProviderFactory.getInstance().injectProperties(resource);
|
||||||
|
|
||||||
|
return resource;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected Object doCreatePolicyResource(Policy policy) {
|
||||||
|
return new PolicyTypeResourceService(policy, resourceServer,authorization, auth);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected AbstractPolicyRepresentation doCreateRepresentation(String payload) {
|
||||||
|
PolicyProviderFactory provider = getPolicyProviderFactory(type);
|
||||||
|
Class<? extends AbstractPolicyRepresentation> representationType = provider.getRepresentationType();
|
||||||
|
|
||||||
|
if (representationType == null) {
|
||||||
|
throw new RuntimeException("Policy provider for type [" + type + "] returned a null representation type.");
|
||||||
|
}
|
||||||
|
|
||||||
|
AbstractPolicyRepresentation representation;
|
||||||
|
|
||||||
|
try {
|
||||||
|
representation = JsonSerialization.readValue(payload, representationType);
|
||||||
|
} catch (IOException e) {
|
||||||
|
throw new RuntimeException("Failed to deserialize JSON using policy provider for type [" + type + "].", e);
|
||||||
|
}
|
||||||
|
|
||||||
|
representation.setType(type);
|
||||||
|
|
||||||
|
return representation;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected AbstractPolicyRepresentation toRepresentation(Policy policy, AuthorizationProvider authorization) {
|
||||||
|
PolicyProviderFactory providerFactory = authorization.getProviderFactory(policy.getType());
|
||||||
|
return ModelToRepresentation.toRepresentation(policy, providerFactory.getRepresentationType(), authorization);
|
||||||
|
}
|
||||||
|
}
|
|
@ -17,6 +17,22 @@
|
||||||
*/
|
*/
|
||||||
package org.keycloak.authorization.admin;
|
package org.keycloak.authorization.admin;
|
||||||
|
|
||||||
|
import static org.keycloak.models.utils.ModelToRepresentation.toRepresentation;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.HashMap;
|
||||||
|
|
||||||
|
import javax.ws.rs.Consumes;
|
||||||
|
import javax.ws.rs.GET;
|
||||||
|
import javax.ws.rs.POST;
|
||||||
|
import javax.ws.rs.PUT;
|
||||||
|
import javax.ws.rs.Path;
|
||||||
|
import javax.ws.rs.Produces;
|
||||||
|
import javax.ws.rs.core.Context;
|
||||||
|
import javax.ws.rs.core.MediaType;
|
||||||
|
import javax.ws.rs.core.Response;
|
||||||
|
import javax.ws.rs.core.UriInfo;
|
||||||
|
|
||||||
import org.jboss.resteasy.spi.ResteasyProviderFactory;
|
import org.jboss.resteasy.spi.ResteasyProviderFactory;
|
||||||
import org.keycloak.authorization.AuthorizationProvider;
|
import org.keycloak.authorization.AuthorizationProvider;
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
|
@ -34,25 +50,11 @@ import org.keycloak.models.utils.RepresentationToModel;
|
||||||
import org.keycloak.representations.idm.authorization.DecisionStrategy;
|
import org.keycloak.representations.idm.authorization.DecisionStrategy;
|
||||||
import org.keycloak.representations.idm.authorization.Logic;
|
import org.keycloak.representations.idm.authorization.Logic;
|
||||||
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.ResourceServerRepresentation;
|
import org.keycloak.representations.idm.authorization.ResourceServerRepresentation;
|
||||||
import org.keycloak.services.resources.admin.RealmAuth;
|
import org.keycloak.services.resources.admin.RealmAuth;
|
||||||
|
|
||||||
import javax.ws.rs.Consumes;
|
|
||||||
import javax.ws.rs.GET;
|
|
||||||
import javax.ws.rs.POST;
|
|
||||||
import javax.ws.rs.PUT;
|
|
||||||
import javax.ws.rs.Path;
|
|
||||||
import javax.ws.rs.Produces;
|
|
||||||
import javax.ws.rs.core.Context;
|
|
||||||
import javax.ws.rs.core.MediaType;
|
|
||||||
import javax.ws.rs.core.Response;
|
|
||||||
import javax.ws.rs.core.UriInfo;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.util.HashMap;
|
|
||||||
|
|
||||||
import static org.keycloak.models.utils.ModelToRepresentation.toRepresentation;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
|
@ -171,22 +173,26 @@ public class ResourceServerService {
|
||||||
return resource;
|
return resource;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Path("/permission")
|
||||||
|
public Object getPermissionTypeResource() {
|
||||||
|
this.auth.requireView();
|
||||||
|
PermissionService resource = new PermissionService(this.resourceServer, this.authorization, this.auth);
|
||||||
|
|
||||||
|
ResteasyProviderFactory.getInstance().injectProperties(resource);
|
||||||
|
|
||||||
|
return resource;
|
||||||
|
}
|
||||||
|
|
||||||
private void createDefaultPermission(ResourceRepresentation resource, PolicyRepresentation policy) {
|
private void createDefaultPermission(ResourceRepresentation resource, PolicyRepresentation policy) {
|
||||||
PolicyRepresentation defaultPermission = new PolicyRepresentation();
|
ResourcePermissionRepresentation defaultPermission = new ResourcePermissionRepresentation();
|
||||||
|
|
||||||
defaultPermission.setName("Default Permission");
|
defaultPermission.setName("Default Permission");
|
||||||
defaultPermission.setType("resource");
|
|
||||||
defaultPermission.setDescription("A permission that applies to the default resource type");
|
defaultPermission.setDescription("A permission that applies to the default resource type");
|
||||||
defaultPermission.setDecisionStrategy(DecisionStrategy.UNANIMOUS);
|
defaultPermission.setDecisionStrategy(DecisionStrategy.UNANIMOUS);
|
||||||
defaultPermission.setLogic(Logic.POSITIVE);
|
defaultPermission.setLogic(Logic.POSITIVE);
|
||||||
|
|
||||||
HashMap<String, String> defaultPermissionConfig = new HashMap<>();
|
defaultPermission.setResourceType(resource.getType());
|
||||||
|
defaultPermission.addPolicy(policy.getName());
|
||||||
defaultPermissionConfig.put("default", "true");
|
|
||||||
defaultPermissionConfig.put("defaultResourceType", resource.getType());
|
|
||||||
defaultPermissionConfig.put("applyPolicies", "[\"" + policy.getName() + "\"]");
|
|
||||||
|
|
||||||
defaultPermission.setConfig(defaultPermissionConfig);
|
|
||||||
|
|
||||||
getPolicyResource().create(defaultPermission);
|
getPolicyResource().create(defaultPermission);
|
||||||
}
|
}
|
||||||
|
|
|
@ -58,7 +58,6 @@ import java.util.HashSet;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import java.util.function.Function;
|
|
||||||
import java.util.stream.Collectors;
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
import static org.keycloak.models.utils.ModelToRepresentation.toRepresentation;
|
import static org.keycloak.models.utils.ModelToRepresentation.toRepresentation;
|
||||||
|
|
|
@ -41,6 +41,7 @@ import javax.ws.rs.Path;
|
||||||
import javax.ws.rs.PathParam;
|
import javax.ws.rs.PathParam;
|
||||||
import javax.ws.rs.Produces;
|
import javax.ws.rs.Produces;
|
||||||
import javax.ws.rs.QueryParam;
|
import javax.ws.rs.QueryParam;
|
||||||
|
import javax.ws.rs.core.MediaType;
|
||||||
import javax.ws.rs.core.Response;
|
import javax.ws.rs.core.Response;
|
||||||
import javax.ws.rs.core.Response.Status;
|
import javax.ws.rs.core.Response.Status;
|
||||||
|
|
||||||
|
@ -69,8 +70,8 @@ public class ScopeService {
|
||||||
}
|
}
|
||||||
|
|
||||||
@POST
|
@POST
|
||||||
@Consumes("application/json")
|
@Consumes(MediaType.APPLICATION_JSON)
|
||||||
@Produces("application/json")
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
public Response create(ScopeRepresentation scope) {
|
public Response create(ScopeRepresentation scope) {
|
||||||
this.auth.requireManage();
|
this.auth.requireManage();
|
||||||
Scope model = toModel(scope, this.resourceServer, authorization);
|
Scope model = toModel(scope, this.resourceServer, authorization);
|
||||||
|
@ -82,8 +83,8 @@ public class ScopeService {
|
||||||
|
|
||||||
@Path("{id}")
|
@Path("{id}")
|
||||||
@PUT
|
@PUT
|
||||||
@Consumes("application/json")
|
@Consumes(MediaType.APPLICATION_JSON)
|
||||||
@Produces("application/json")
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
public Response update(@PathParam("id") String id, ScopeRepresentation scope) {
|
public Response update(@PathParam("id") String id, ScopeRepresentation scope) {
|
||||||
this.auth.requireManage();
|
this.auth.requireManage();
|
||||||
scope.setId(id);
|
scope.setId(id);
|
||||||
|
@ -134,7 +135,7 @@ public class ScopeService {
|
||||||
|
|
||||||
@Path("{id}")
|
@Path("{id}")
|
||||||
@GET
|
@GET
|
||||||
@Produces("application/json")
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
public Response findById(@PathParam("id") String id) {
|
public Response findById(@PathParam("id") String id) {
|
||||||
this.auth.requireView();
|
this.auth.requireView();
|
||||||
Scope model = this.authorization.getStoreFactory().getScopeStore().findById(id, resourceServer.getId());
|
Scope model = this.authorization.getStoreFactory().getScopeStore().findById(id, resourceServer.getId());
|
||||||
|
@ -148,7 +149,7 @@ public class ScopeService {
|
||||||
|
|
||||||
@Path("{id}/resources")
|
@Path("{id}/resources")
|
||||||
@GET
|
@GET
|
||||||
@Produces("application/json")
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
public Response getResources(@PathParam("id") String id) {
|
public Response getResources(@PathParam("id") String id) {
|
||||||
this.auth.requireView();
|
this.auth.requireView();
|
||||||
StoreFactory storeFactory = this.authorization.getStoreFactory();
|
StoreFactory storeFactory = this.authorization.getStoreFactory();
|
||||||
|
@ -170,7 +171,7 @@ public class ScopeService {
|
||||||
|
|
||||||
@Path("{id}/permissions")
|
@Path("{id}/permissions")
|
||||||
@GET
|
@GET
|
||||||
@Produces("application/json")
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
public Response getPermissions(@PathParam("id") String id) {
|
public Response getPermissions(@PathParam("id") String id) {
|
||||||
this.auth.requireView();
|
this.auth.requireView();
|
||||||
StoreFactory storeFactory = this.authorization.getStoreFactory();
|
StoreFactory storeFactory = this.authorization.getStoreFactory();
|
||||||
|
@ -195,7 +196,7 @@ public class ScopeService {
|
||||||
|
|
||||||
@Path("/search")
|
@Path("/search")
|
||||||
@GET
|
@GET
|
||||||
@Produces("application/json")
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
@NoCache
|
@NoCache
|
||||||
public Response find(@QueryParam("name") String name) {
|
public Response find(@QueryParam("name") String name) {
|
||||||
this.auth.requireView();
|
this.auth.requireView();
|
||||||
|
|
|
@ -139,12 +139,19 @@ public class KeycloakIdentity implements Identity {
|
||||||
|
|
||||||
if (this.accessToken.getClientSession() != null) {
|
if (this.accessToken.getClientSession() != null) {
|
||||||
ClientSessionModel clientSession = this.keycloakSession.sessions().getClientSession(this.accessToken.getClientSession());
|
ClientSessionModel clientSession = this.keycloakSession.sessions().getClientSession(this.accessToken.getClientSession());
|
||||||
|
|
||||||
|
if (clientSession != null) {
|
||||||
clientUser = this.keycloakSession.users().getServiceAccount(clientSession.getClient());
|
clientUser = this.keycloakSession.users().getServiceAccount(clientSession.getClient());
|
||||||
} else if (this.accessToken.getIssuedFor() != null) {
|
}
|
||||||
ClientModel clientModel = this.keycloakSession.realms().getClientById(this.accessToken.getIssuedFor(), this.realm);
|
|
||||||
clientUser = this.keycloakSession.users().getServiceAccount(clientModel);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (this.accessToken.getIssuedFor() != null) {
|
||||||
|
ClientModel clientModel = this.keycloakSession.realms().getClientById(this.accessToken.getIssuedFor(), this.realm);
|
||||||
|
|
||||||
|
if (clientModel != null) {
|
||||||
|
clientUser = this.keycloakSession.users().getServiceAccount(clientModel);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (clientUser == null) {
|
if (clientUser == null) {
|
||||||
return false;
|
return false;
|
||||||
|
|
|
@ -139,7 +139,7 @@ public class EntitlementService {
|
||||||
.allowedOrigins(identity.getAccessToken())
|
.allowedOrigins(identity.getAccessToken())
|
||||||
.exposedHeaders(Cors.ACCESS_CONTROL_ALLOW_METHODS).build());
|
.exposedHeaders(Cors.ACCESS_CONTROL_ALLOW_METHODS).build());
|
||||||
} else {
|
} else {
|
||||||
asyncResponse.resume(Cors.add(request, Response.ok().entity(new EntitlementResponse(createRequestingPartyToken(entitlements)))).allowedOrigins(identity.getAccessToken()).allowedMethods("GET").exposedHeaders(Cors.ACCESS_CONTROL_ALLOW_METHODS).build());
|
asyncResponse.resume(Cors.add(request, Response.ok().entity(new EntitlementResponse(createRequestingPartyToken(entitlements, identity.getAccessToken())))).allowedOrigins(identity.getAccessToken()).allowedMethods("GET").exposedHeaders(Cors.ACCESS_CONTROL_ALLOW_METHODS).build());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
@ -192,7 +192,7 @@ public class EntitlementService {
|
||||||
.allowedOrigins(identity.getAccessToken())
|
.allowedOrigins(identity.getAccessToken())
|
||||||
.exposedHeaders(Cors.ACCESS_CONTROL_ALLOW_METHODS).build());
|
.exposedHeaders(Cors.ACCESS_CONTROL_ALLOW_METHODS).build());
|
||||||
} else {
|
} else {
|
||||||
asyncResponse.resume(Cors.add(request, Response.ok().entity(new EntitlementResponse(createRequestingPartyToken(entitlements)))).allowedOrigins(identity.getAccessToken()).allowedMethods("GET").exposedHeaders(Cors.ACCESS_CONTROL_ALLOW_METHODS).build());
|
asyncResponse.resume(Cors.add(request, Response.ok().entity(new EntitlementResponse(createRequestingPartyToken(entitlements, identity.getAccessToken())))).allowedOrigins(identity.getAccessToken()).allowedMethods("GET").exposedHeaders(Cors.ACCESS_CONTROL_ALLOW_METHODS).build());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
@ -207,8 +207,7 @@ public class EntitlementService {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private String createRequestingPartyToken(List<Permission> permissions) {
|
private String createRequestingPartyToken(List<Permission> permissions, AccessToken accessToken) {
|
||||||
AccessToken accessToken = Tokens.getAccessToken(this.authorization.getKeycloakSession());
|
|
||||||
RealmModel realm = this.authorization.getKeycloakSession().getContext().getRealm();
|
RealmModel realm = this.authorization.getKeycloakSession().getContext().getRealm();
|
||||||
AccessToken.Authorization authorization = new AccessToken.Authorization();
|
AccessToken.Authorization authorization = new AccessToken.Authorization();
|
||||||
|
|
||||||
|
|
|
@ -337,7 +337,7 @@ public class ExportUtils {
|
||||||
RealmModel realm = authorizationProvider.getRealm();
|
RealmModel realm = authorizationProvider.getRealm();
|
||||||
StoreFactory storeFactory = authorizationProvider.getStoreFactory();
|
StoreFactory storeFactory = authorizationProvider.getStoreFactory();
|
||||||
try {
|
try {
|
||||||
PolicyRepresentation rep = toRepresentation(policy);
|
PolicyRepresentation rep = toRepresentation(policy, PolicyRepresentation.class, authorizationProvider);
|
||||||
|
|
||||||
rep.setId(null);
|
rep.setId(null);
|
||||||
|
|
||||||
|
|
|
@ -47,7 +47,7 @@ public class TestPolicyProviderFactory implements PolicyProviderFactory {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer) {
|
public PolicyProviderAdminService getAdminResource(ResourceServer resourceServer, AuthorizationProvider authorization) {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -96,6 +96,7 @@
|
||||||
<filtering>true</filtering>
|
<filtering>true</filtering>
|
||||||
<includes>
|
<includes>
|
||||||
<include>migration-test/*</include>
|
<include>migration-test/*</include>
|
||||||
|
<include>authorization-test/*</include>
|
||||||
</includes>
|
</includes>
|
||||||
</testResource>
|
</testResource>
|
||||||
<testResource>
|
<testResource>
|
||||||
|
|
|
@ -108,11 +108,13 @@ public class PhotozClientAuthzTestApp extends AbstractPageWithInjectedUrl {
|
||||||
public void requestEntitlement() {
|
public void requestEntitlement() {
|
||||||
entitlement.click();
|
entitlement.click();
|
||||||
pause(WAIT_AFTER_OPERATION);
|
pause(WAIT_AFTER_OPERATION);
|
||||||
|
pause(WAIT_AFTER_OPERATION);
|
||||||
}
|
}
|
||||||
|
|
||||||
public void requestEntitlements() {
|
public void requestEntitlements() {
|
||||||
entitlements.click();
|
entitlements.click();
|
||||||
pause(WAIT_AFTER_OPERATION);
|
pause(WAIT_AFTER_OPERATION);
|
||||||
|
pause(WAIT_AFTER_OPERATION);
|
||||||
}
|
}
|
||||||
|
|
||||||
public void login(String username, String password, String... scopes) throws InterruptedException {
|
public void login(String username, String password, String... scopes) throws InterruptedException {
|
||||||
|
|
|
@ -16,6 +16,22 @@
|
||||||
*/
|
*/
|
||||||
package org.keycloak.testsuite.adapter.example.authorization;
|
package org.keycloak.testsuite.adapter.example.authorization;
|
||||||
|
|
||||||
|
import static org.junit.Assert.assertFalse;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
|
import static org.keycloak.testsuite.util.IOUtil.loadJson;
|
||||||
|
import static org.keycloak.testsuite.util.IOUtil.loadRealm;
|
||||||
|
import static org.keycloak.testsuite.util.WaitUtils.pause;
|
||||||
|
|
||||||
|
import java.io.File;
|
||||||
|
import java.io.FileInputStream;
|
||||||
|
import java.io.FileNotFoundException;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.net.MalformedURLException;
|
||||||
|
import java.net.URL;
|
||||||
|
import java.util.Arrays;
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
import org.jboss.arquillian.container.test.api.Deployer;
|
import org.jboss.arquillian.container.test.api.Deployer;
|
||||||
import org.jboss.arquillian.container.test.api.Deployment;
|
import org.jboss.arquillian.container.test.api.Deployment;
|
||||||
import org.jboss.arquillian.test.api.ArquillianResource;
|
import org.jboss.arquillian.test.api.ArquillianResource;
|
||||||
|
@ -41,22 +57,6 @@ import org.keycloak.util.JsonSerialization;
|
||||||
import org.openqa.selenium.By;
|
import org.openqa.selenium.By;
|
||||||
import org.openqa.selenium.WebElement;
|
import org.openqa.selenium.WebElement;
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.io.FileInputStream;
|
|
||||||
import java.io.FileNotFoundException;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.net.MalformedURLException;
|
|
||||||
import java.net.URL;
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.HashMap;
|
|
||||||
import java.util.List;
|
|
||||||
|
|
||||||
import static org.junit.Assert.assertFalse;
|
|
||||||
import static org.junit.Assert.assertTrue;
|
|
||||||
import static org.keycloak.testsuite.util.IOUtil.loadJson;
|
|
||||||
import static org.keycloak.testsuite.util.IOUtil.loadRealm;
|
|
||||||
import static org.keycloak.testsuite.util.WaitUtils.pause;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
*/
|
*/
|
||||||
|
@ -82,17 +82,9 @@ public abstract class AbstractServletAuthzAdapterTest extends AbstractExampleAda
|
||||||
return exampleDeployment(RESOURCE_SERVER_ID);
|
return exampleDeployment(RESOURCE_SERVER_ID);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public void beforeAbstractKeycloakTest() throws Exception {
|
|
||||||
super.beforeAbstractKeycloakTest();
|
|
||||||
importResourceServerSettings();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testRegularUserPermissions() throws Exception {
|
public void testRegularUserPermissions() throws Exception {
|
||||||
try {
|
performTests(() -> {
|
||||||
this.deployer.deploy(RESOURCE_SERVER_ID);
|
|
||||||
|
|
||||||
login("alice", "alice");
|
login("alice", "alice");
|
||||||
assertFalse(wasDenied());
|
assertFalse(wasDenied());
|
||||||
assertTrue(hasLink("User Premium"));
|
assertTrue(hasLink("User Premium"));
|
||||||
|
@ -111,16 +103,12 @@ public abstract class AbstractServletAuthzAdapterTest extends AbstractExampleAda
|
||||||
|
|
||||||
navigateToAdminPage();
|
navigateToAdminPage();
|
||||||
assertTrue(wasDenied());
|
assertTrue(wasDenied());
|
||||||
} finally {
|
});
|
||||||
this.deployer.undeploy(RESOURCE_SERVER_ID);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testUserPremiumPermissions() throws Exception {
|
public void testUserPremiumPermissions() throws Exception {
|
||||||
try {
|
performTests(() -> {
|
||||||
this.deployer.deploy(RESOURCE_SERVER_ID);
|
|
||||||
|
|
||||||
login("jdoe", "jdoe");
|
login("jdoe", "jdoe");
|
||||||
assertFalse(wasDenied());
|
assertFalse(wasDenied());
|
||||||
assertTrue(hasLink("User Premium"));
|
assertTrue(hasLink("User Premium"));
|
||||||
|
@ -139,16 +127,12 @@ public abstract class AbstractServletAuthzAdapterTest extends AbstractExampleAda
|
||||||
|
|
||||||
navigateToAdminPage();
|
navigateToAdminPage();
|
||||||
assertTrue(wasDenied());
|
assertTrue(wasDenied());
|
||||||
} finally {
|
});
|
||||||
this.deployer.undeploy(RESOURCE_SERVER_ID);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testAdminPermissions() throws Exception {
|
public void testAdminPermissions() throws Exception {
|
||||||
try {
|
performTests(() -> {
|
||||||
this.deployer.deploy(RESOURCE_SERVER_ID);
|
|
||||||
|
|
||||||
login("admin", "admin");
|
login("admin", "admin");
|
||||||
assertFalse(wasDenied());
|
assertFalse(wasDenied());
|
||||||
assertTrue(hasLink("User Premium"));
|
assertTrue(hasLink("User Premium"));
|
||||||
|
@ -167,16 +151,12 @@ public abstract class AbstractServletAuthzAdapterTest extends AbstractExampleAda
|
||||||
|
|
||||||
navigateToAdminPage();
|
navigateToAdminPage();
|
||||||
assertFalse(wasDenied());
|
assertFalse(wasDenied());
|
||||||
} finally {
|
});
|
||||||
this.deployer.undeploy(RESOURCE_SERVER_ID);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testGrantPremiumAccessToUser() throws Exception {
|
public void testGrantPremiumAccessToUser() throws Exception {
|
||||||
try {
|
performTests(() -> {
|
||||||
this.deployer.deploy(RESOURCE_SERVER_ID);
|
|
||||||
|
|
||||||
login("alice", "alice");
|
login("alice", "alice");
|
||||||
assertFalse(wasDenied());
|
assertFalse(wasDenied());
|
||||||
|
|
||||||
|
@ -233,16 +213,12 @@ public abstract class AbstractServletAuthzAdapterTest extends AbstractExampleAda
|
||||||
|
|
||||||
navigateToUserPremiumPage();
|
navigateToUserPremiumPage();
|
||||||
assertFalse(wasDenied());
|
assertFalse(wasDenied());
|
||||||
} finally {
|
});
|
||||||
this.deployer.undeploy(RESOURCE_SERVER_ID);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testGrantAdministrativePermissions() throws Exception {
|
public void testGrantAdministrativePermissions() throws Exception {
|
||||||
try {
|
performTests(() -> {
|
||||||
this.deployer.deploy(RESOURCE_SERVER_ID);
|
|
||||||
|
|
||||||
login("jdoe", "jdoe");
|
login("jdoe", "jdoe");
|
||||||
|
|
||||||
navigateToAdminPage();
|
navigateToAdminPage();
|
||||||
|
@ -263,23 +239,30 @@ public abstract class AbstractServletAuthzAdapterTest extends AbstractExampleAda
|
||||||
|
|
||||||
navigateToAdminPage();
|
navigateToAdminPage();
|
||||||
assertFalse(wasDenied());
|
assertFalse(wasDenied());
|
||||||
} finally {
|
});
|
||||||
this.deployer.undeploy(RESOURCE_SERVER_ID);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
//KEYCLOAK-3830
|
//KEYCLOAK-3830
|
||||||
@Test
|
@Test
|
||||||
public void testAccessPublicResource() throws Exception {
|
public void testAccessPublicResource() throws Exception {
|
||||||
try {
|
performTests(() -> {
|
||||||
this.deployer.deploy(RESOURCE_SERVER_ID);
|
|
||||||
|
|
||||||
driver.navigate().to(getResourceServerUrl() + "/public-html.html");
|
driver.navigate().to(getResourceServerUrl() + "/public-html.html");
|
||||||
WaitUtils.waitForPageToLoad(driver);
|
WaitUtils.waitForPageToLoad(driver);
|
||||||
assertTrue(hasText("This is public resource that should be accessible without login."));
|
assertTrue(hasText("This is public resource that should be accessible without login."));
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
private void performTests(TestRunnable assertion) {
|
||||||
|
try {
|
||||||
|
importResourceServerSettings();
|
||||||
|
deployer.deploy(RESOURCE_SERVER_ID);
|
||||||
|
assertion.run();
|
||||||
|
} catch (FileNotFoundException cause) {
|
||||||
|
throw new RuntimeException("Failed to import authorization settings", cause);
|
||||||
|
} catch (Exception cause) {
|
||||||
|
throw new RuntimeException("Error while executing tests", cause);
|
||||||
} finally {
|
} finally {
|
||||||
this.deployer.undeploy(RESOURCE_SERVER_ID);
|
deployer.undeploy(RESOURCE_SERVER_ID);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -299,7 +282,7 @@ public abstract class AbstractServletAuthzAdapterTest extends AbstractExampleAda
|
||||||
getAuthorizationResource().importSettings(loadJson(new FileInputStream(new File(TEST_APPS_HOME_DIR + "/servlet-authz-app/servlet-authz-app-authz-service.json")), ResourceServerRepresentation.class));
|
getAuthorizationResource().importSettings(loadJson(new FileInputStream(new File(TEST_APPS_HOME_DIR + "/servlet-authz-app/servlet-authz-app-authz-service.json")), ResourceServerRepresentation.class));
|
||||||
}
|
}
|
||||||
|
|
||||||
private AuthorizationResource getAuthorizationResource() throws FileNotFoundException {
|
private AuthorizationResource getAuthorizationResource() {
|
||||||
return getClientResource(RESOURCE_SERVER_ID).authorization();
|
return getClientResource(RESOURCE_SERVER_ID).authorization();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -317,7 +300,8 @@ public abstract class AbstractServletAuthzAdapterTest extends AbstractExampleAda
|
||||||
pause(500);
|
pause(500);
|
||||||
}
|
}
|
||||||
|
|
||||||
private void login(String username, String password) throws InterruptedException {
|
private void login(String username, String password) {
|
||||||
|
try {
|
||||||
navigateTo();
|
navigateTo();
|
||||||
Thread.sleep(2000);
|
Thread.sleep(2000);
|
||||||
if (this.driver.getCurrentUrl().startsWith(getResourceServerUrl().toString())) {
|
if (this.driver.getCurrentUrl().startsWith(getResourceServerUrl().toString())) {
|
||||||
|
@ -329,6 +313,9 @@ public abstract class AbstractServletAuthzAdapterTest extends AbstractExampleAda
|
||||||
Thread.sleep(2000);
|
Thread.sleep(2000);
|
||||||
|
|
||||||
this.loginPage.form().login(username, password);
|
this.loginPage.form().login(username, password);
|
||||||
|
} catch (Exception cause) {
|
||||||
|
throw new RuntimeException("Login failed", cause);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private void navigateTo() {
|
private void navigateTo() {
|
||||||
|
@ -362,4 +349,8 @@ public abstract class AbstractServletAuthzAdapterTest extends AbstractExampleAda
|
||||||
navigateTo();
|
navigateTo();
|
||||||
getLink("Administration").click();
|
getLink("Administration").click();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private interface TestRunnable {
|
||||||
|
void run() throws Exception;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -16,6 +16,10 @@
|
||||||
*/
|
*/
|
||||||
package org.keycloak.testsuite.admin;
|
package org.keycloak.testsuite.admin;
|
||||||
|
|
||||||
|
import static org.keycloak.testsuite.auth.page.AuthRealm.TEST;
|
||||||
|
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
import org.jboss.arquillian.container.test.api.Deployment;
|
import org.jboss.arquillian.container.test.api.Deployment;
|
||||||
import org.jboss.shrinkwrap.api.spec.WebArchive;
|
import org.jboss.shrinkwrap.api.spec.WebArchive;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
|
@ -25,18 +29,14 @@ import org.keycloak.authorization.model.ResourceServer;
|
||||||
import org.keycloak.models.ClientModel;
|
import org.keycloak.models.ClientModel;
|
||||||
import org.keycloak.models.KeycloakSession;
|
import org.keycloak.models.KeycloakSession;
|
||||||
import org.keycloak.models.RealmModel;
|
import org.keycloak.models.RealmModel;
|
||||||
import org.keycloak.models.RoleModel;
|
|
||||||
import org.keycloak.representations.idm.RealmRepresentation;
|
import org.keycloak.representations.idm.RealmRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.DecisionStrategy;
|
import org.keycloak.representations.idm.authorization.DecisionStrategy;
|
||||||
import org.keycloak.representations.idm.authorization.Logic;
|
import org.keycloak.representations.idm.authorization.Logic;
|
||||||
|
import org.keycloak.representations.idm.authorization.RolePolicyRepresentation;
|
||||||
import org.keycloak.testsuite.AbstractKeycloakTest;
|
import org.keycloak.testsuite.AbstractKeycloakTest;
|
||||||
import org.keycloak.testsuite.runonserver.RunOnServerDeployment;
|
import org.keycloak.testsuite.runonserver.RunOnServerDeployment;
|
||||||
|
import org.keycloak.testsuite.util.ClientBuilder;
|
||||||
import java.util.HashMap;
|
import org.keycloak.testsuite.util.RealmBuilder;
|
||||||
import java.util.List;
|
|
||||||
import java.util.Map;
|
|
||||||
|
|
||||||
import static org.keycloak.testsuite.auth.page.AuthRealm.TEST;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
||||||
|
@ -51,37 +51,34 @@ public class AuthzCleanupTest extends AbstractKeycloakTest {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void addTestRealms(List<RealmRepresentation> testRealms) {
|
public void addTestRealms(List<RealmRepresentation> testRealms) {
|
||||||
RealmRepresentation testRealmRep = new RealmRepresentation();
|
testRealms.add(RealmBuilder.create().name(TEST)
|
||||||
testRealmRep.setId(TEST);
|
.client(ClientBuilder.create().clientId("myclient")
|
||||||
testRealmRep.setRealm(TEST);
|
.secret("secret")
|
||||||
testRealmRep.setEnabled(true);
|
.authorizationServicesEnabled(true)
|
||||||
testRealms.add(testRealmRep);
|
.redirectUris("http://localhost/myclient")
|
||||||
|
.defaultRoles("client-role-1", "client-role-2").build()).build());
|
||||||
}
|
}
|
||||||
|
|
||||||
public static void setup(KeycloakSession session) {
|
public static void setup(KeycloakSession session) {
|
||||||
RealmModel realm = session.realms().getRealmByName(TEST);
|
RealmModel realm = session.realms().getRealmByName(TEST);
|
||||||
ClientModel client = session.realms().addClient(realm, "myclient");
|
session.getContext().setRealm(realm);
|
||||||
RoleModel role1 = client.addRole("client-role1");
|
|
||||||
RoleModel role2 = client.addRole("client-role2");
|
|
||||||
|
|
||||||
AuthorizationProvider authz = session.getProvider(AuthorizationProvider.class);
|
AuthorizationProvider authz = session.getProvider(AuthorizationProvider.class);
|
||||||
ResourceServer resourceServer = authz.getStoreFactory().getResourceServerStore().create(client.getId());
|
ClientModel myclient = realm.getClientByClientId("myclient");
|
||||||
createRolePolicy(authz, resourceServer, role1);
|
ResourceServer resourceServer = authz.getStoreFactory().getResourceServerStore().findByClient(myclient.getId());
|
||||||
createRolePolicy(authz, resourceServer, role2);
|
createRolePolicy(authz, resourceServer, "client-role-1");
|
||||||
|
createRolePolicy(authz, resourceServer, "client-role-2");
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private static Policy createRolePolicy(AuthorizationProvider authz, ResourceServer resourceServer, RoleModel role) {
|
private static Policy createRolePolicy(AuthorizationProvider authz, ResourceServer resourceServer, String roleName) {
|
||||||
Policy policy = authz.getStoreFactory().getPolicyStore().create(role.getName(), "role", resourceServer);
|
RolePolicyRepresentation representation = new RolePolicyRepresentation();
|
||||||
|
|
||||||
String roleValues = "[{\"id\":\"" + role.getId() + "\",\"required\": true}]";
|
representation.setName(roleName);
|
||||||
policy.setDecisionStrategy(DecisionStrategy.UNANIMOUS);
|
representation.setType("role");
|
||||||
policy.setLogic(Logic.POSITIVE);
|
representation.setDecisionStrategy(DecisionStrategy.UNANIMOUS);
|
||||||
Map<String, String> config = new HashMap<>();
|
representation.setLogic(Logic.POSITIVE);
|
||||||
config.put("roles", roleValues);
|
representation.addRole(roleName, true);
|
||||||
policy.setConfig(config);
|
|
||||||
return policy;
|
return authz.getStoreFactory().getPolicyStore().create(representation, resourceServer);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -39,6 +39,8 @@ import org.keycloak.representations.idm.authorization.DecisionStrategy;
|
||||||
import org.keycloak.representations.idm.authorization.Logic;
|
import org.keycloak.representations.idm.authorization.Logic;
|
||||||
import org.keycloak.representations.idm.authorization.PolicyEvaluationRequest;
|
import org.keycloak.representations.idm.authorization.PolicyEvaluationRequest;
|
||||||
import org.keycloak.representations.idm.authorization.PolicyEvaluationResponse;
|
import org.keycloak.representations.idm.authorization.PolicyEvaluationResponse;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ScopePermissionRepresentation;
|
||||||
import org.keycloak.testsuite.AbstractKeycloakTest;
|
import org.keycloak.testsuite.AbstractKeycloakTest;
|
||||||
|
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
|
@ -102,21 +104,16 @@ public class FineGrainAdminLocalTest extends AbstractKeycloakTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
private static Policy addScopePermission(AuthorizationProvider authz, ResourceServer resourceServer, String name, Resource resource, Scope scope, Policy policy) {
|
private static Policy addScopePermission(AuthorizationProvider authz, ResourceServer resourceServer, String name, Resource resource, Scope scope, Policy policy) {
|
||||||
Policy permission = authz.getStoreFactory().getPolicyStore().create(name, "scope", resourceServer);
|
ScopePermissionRepresentation representation = new ScopePermissionRepresentation();
|
||||||
String resources = "[\"" + resource.getId() + "\"]";
|
|
||||||
String scopes = "[\"" + scope.getId() + "\"]";
|
representation.setName(name);
|
||||||
String applyPolicies = "[\"" + policy.getId() + "\"]";
|
representation.setDecisionStrategy(DecisionStrategy.UNANIMOUS);
|
||||||
Map<String, String> config = new HashMap<>();
|
representation.setLogic(Logic.POSITIVE);
|
||||||
config.put("resources", resources);
|
representation.addResource(resource.getName());
|
||||||
config.put("scopes", scopes);
|
representation.addScope(scope.getName());
|
||||||
config.put("applyPolicies", applyPolicies);
|
representation.addPolicy(policy.getName());
|
||||||
permission.setConfig(config);
|
|
||||||
permission.setDecisionStrategy(DecisionStrategy.UNANIMOUS);
|
return authz.getStoreFactory().getPolicyStore().create(representation, resourceServer);
|
||||||
permission.setLogic(Logic.POSITIVE);
|
|
||||||
permission.addResource(resource);
|
|
||||||
permission.addScope(scope);
|
|
||||||
permission.addAssociatedPolicy(policy);
|
|
||||||
return permission;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private static Resource createRoleResource(AuthorizationProvider authz, ResourceServer resourceServer, RoleModel role) {
|
private static Resource createRoleResource(AuthorizationProvider authz, ResourceServer resourceServer, RoleModel role) {
|
||||||
|
@ -144,15 +141,18 @@ public class FineGrainAdminLocalTest extends AbstractKeycloakTest {
|
||||||
roleName = client.getClientId() ;
|
roleName = client.getClientId() ;
|
||||||
}
|
}
|
||||||
roleName = "role.policy." + roleName + "." + role.getName();
|
roleName = "role.policy." + roleName + "." + role.getName();
|
||||||
Policy policy = authz.getStoreFactory().getPolicyStore().create(roleName, "role", resourceServer);
|
PolicyRepresentation representation = new PolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName(roleName);
|
||||||
|
representation.setType("role");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.UNANIMOUS);
|
||||||
|
representation.setLogic(Logic.POSITIVE);
|
||||||
String roleValues = "[{\"id\":\"" + role.getId() + "\",\"required\": true}]";
|
String roleValues = "[{\"id\":\"" + role.getId() + "\",\"required\": true}]";
|
||||||
policy.setDecisionStrategy(DecisionStrategy.UNANIMOUS);
|
|
||||||
policy.setLogic(Logic.POSITIVE);
|
|
||||||
Map<String, String> config = new HashMap<>();
|
Map<String, String> config = new HashMap<>();
|
||||||
config.put("roles", roleValues);
|
config.put("roles", roleValues);
|
||||||
policy.setConfig(config);
|
representation.setConfig(config);
|
||||||
return policy;
|
|
||||||
|
return authz.getStoreFactory().getPolicyStore().create(representation, resourceServer);
|
||||||
}
|
}
|
||||||
|
|
||||||
public static void setupUsers(KeycloakSession session) {
|
public static void setupUsers(KeycloakSession session) {
|
||||||
|
|
|
@ -0,0 +1,169 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.testsuite.admin.client.authorization;
|
||||||
|
|
||||||
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.assertNotNull;
|
||||||
|
import static org.junit.Assert.assertNull;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Set;
|
||||||
|
import java.util.function.Supplier;
|
||||||
|
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.keycloak.admin.client.resource.ClientResource;
|
||||||
|
import org.keycloak.admin.client.resource.ClientsResource;
|
||||||
|
import org.keycloak.admin.client.resource.RealmResource;
|
||||||
|
import org.keycloak.representations.idm.RealmRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.AbstractPolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ScopeRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.UserPolicyRepresentation;
|
||||||
|
import org.keycloak.testsuite.AbstractKeycloakTest;
|
||||||
|
import org.keycloak.testsuite.util.AdminClientUtil;
|
||||||
|
import org.keycloak.testsuite.util.ClientBuilder;
|
||||||
|
import org.keycloak.testsuite.util.RealmBuilder;
|
||||||
|
import org.keycloak.testsuite.util.UserBuilder;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public abstract class AbstractPermissionManagementTest extends AbstractKeycloakTest {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void addTestRealms(List<RealmRepresentation> testRealms) {
|
||||||
|
testRealms.add(createTestRealm().build());
|
||||||
|
}
|
||||||
|
|
||||||
|
protected RealmBuilder createTestRealm() {
|
||||||
|
return RealmBuilder.create().name("authz-test")
|
||||||
|
.user(UserBuilder.create().username("marta").password("password"))
|
||||||
|
.user(UserBuilder.create().username("kolo").password("password"))
|
||||||
|
.client(ClientBuilder.create().clientId("resource-server-test")
|
||||||
|
.secret("secret")
|
||||||
|
.authorizationServicesEnabled(true)
|
||||||
|
.redirectUris("http://localhost/resource-server-test")
|
||||||
|
.defaultRoles("uma_protection")
|
||||||
|
.directAccessGrants());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Before
|
||||||
|
public void configureAuthorization() throws Exception {
|
||||||
|
createResourcesAndScopes();
|
||||||
|
RealmResource realm = getRealm();
|
||||||
|
createPolicies(realm, getClient(realm));
|
||||||
|
}
|
||||||
|
|
||||||
|
protected void assertRepresentation(AbstractPolicyRepresentation expected, AbstractPolicyRepresentation actual,
|
||||||
|
Supplier<List<ResourceRepresentation>> resources,
|
||||||
|
Supplier<List<ScopeRepresentation>> scopes,
|
||||||
|
Supplier<List<PolicyRepresentation>> policies) {
|
||||||
|
assertNotNull(actual);
|
||||||
|
assertNotNull(actual.getId());
|
||||||
|
|
||||||
|
assertEquals(expected.getName(), actual.getName());
|
||||||
|
assertEquals(expected.getDescription(), actual.getDescription());
|
||||||
|
assertEquals(expected.getDecisionStrategy(), actual.getDecisionStrategy());
|
||||||
|
assertEquals(expected.getLogic(), actual.getLogic());
|
||||||
|
assertNull(actual.getResources());
|
||||||
|
assertNull(actual.getPolicies());
|
||||||
|
assertNull(actual.getScopes());
|
||||||
|
|
||||||
|
List<PolicyRepresentation> associatedPolicies = policies.get();
|
||||||
|
|
||||||
|
if (expected.getPolicies() != null) {
|
||||||
|
assertEquals(expected.getPolicies().size(), associatedPolicies.size());
|
||||||
|
assertEquals(0, associatedPolicies.stream().map(representation1 -> representation1.getName()).filter(policyName -> !expected.getPolicies().contains(policyName)).count());
|
||||||
|
} else {
|
||||||
|
assertTrue(associatedPolicies.isEmpty());
|
||||||
|
}
|
||||||
|
|
||||||
|
List<ResourceRepresentation> associatedResources = resources.get();
|
||||||
|
|
||||||
|
if (expected.getResources() != null) {
|
||||||
|
assertEquals(expected.getResources().size(), associatedResources.size());
|
||||||
|
assertEquals(0, associatedResources.stream().map(representation1 -> representation1.getName()).filter(resourceName -> !expected.getResources().contains(resourceName)).count());
|
||||||
|
} else {
|
||||||
|
assertTrue(associatedResources.isEmpty());
|
||||||
|
}
|
||||||
|
|
||||||
|
List<ScopeRepresentation> associatedScopes = scopes.get();
|
||||||
|
|
||||||
|
if (expected.getScopes() != null) {
|
||||||
|
assertEquals(expected.getScopes().size(), associatedScopes.size());
|
||||||
|
assertEquals(0, associatedScopes.stream().map(representation1 -> representation1.getName()).filter(scopeName -> !expected.getScopes().contains(scopeName)).count());
|
||||||
|
} else {
|
||||||
|
assertTrue(associatedScopes.isEmpty());
|
||||||
|
}
|
||||||
|
|
||||||
|
expected.setId(actual.getId());
|
||||||
|
}
|
||||||
|
|
||||||
|
private void createResourcesAndScopes() throws IOException {
|
||||||
|
Set<ScopeRepresentation> scopes = new HashSet<>();
|
||||||
|
|
||||||
|
scopes.add(new ScopeRepresentation("read"));
|
||||||
|
scopes.add(new ScopeRepresentation("write"));
|
||||||
|
scopes.add(new ScopeRepresentation("execute"));
|
||||||
|
|
||||||
|
List<ResourceRepresentation> resources = new ArrayList<>();
|
||||||
|
|
||||||
|
resources.add(new ResourceRepresentation("Resource A", scopes));
|
||||||
|
resources.add(new ResourceRepresentation("Resource B", scopes));
|
||||||
|
resources.add(new ResourceRepresentation("Resource C", scopes));
|
||||||
|
|
||||||
|
resources.forEach(resource -> getClient().authorization().resources().create(resource));
|
||||||
|
}
|
||||||
|
|
||||||
|
private void createPolicies(RealmResource realm, ClientResource client) throws IOException {
|
||||||
|
createUserPolicy("Only Marta Policy", realm, client, "marta");
|
||||||
|
createUserPolicy("Only Kolo Policy", realm, client, "kolo");
|
||||||
|
}
|
||||||
|
|
||||||
|
private void createUserPolicy(String name, RealmResource realm, ClientResource client, String username) throws IOException {
|
||||||
|
String userId = realm.users().search(username).stream().map(representation -> representation.getId()).findFirst().orElseThrow(() -> new RuntimeException("Expected user [userId]"));
|
||||||
|
|
||||||
|
UserPolicyRepresentation representation = new UserPolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName(name);
|
||||||
|
representation.addUser(userId);
|
||||||
|
|
||||||
|
client.authorization().policies().users().create(representation);
|
||||||
|
}
|
||||||
|
|
||||||
|
protected ClientResource getClient() {
|
||||||
|
return getClient(getRealm());
|
||||||
|
}
|
||||||
|
|
||||||
|
protected ClientResource getClient(RealmResource realm) {
|
||||||
|
ClientsResource clients = realm.clients();
|
||||||
|
return clients.findByClientId("resource-server-test").stream().map(representation -> clients.get(representation.getId())).findFirst().orElseThrow(() -> new RuntimeException("Expected client [resource-server-test]"));
|
||||||
|
}
|
||||||
|
|
||||||
|
protected RealmResource getRealm() {
|
||||||
|
try {
|
||||||
|
return AdminClientUtil.createAdminClient().realm("authz-test");
|
||||||
|
} catch (Exception cause) {
|
||||||
|
throw new RuntimeException("Failed to create admin client", cause);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,165 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.testsuite.admin.client.authorization;
|
||||||
|
|
||||||
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.fail;
|
||||||
|
|
||||||
|
import java.util.Collections;
|
||||||
|
|
||||||
|
import javax.ws.rs.NotFoundException;
|
||||||
|
import javax.ws.rs.core.Response;
|
||||||
|
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.keycloak.admin.client.resource.AuthorizationResource;
|
||||||
|
import org.keycloak.admin.client.resource.ResourcePermissionResource;
|
||||||
|
import org.keycloak.admin.client.resource.ResourcePermissionsResource;
|
||||||
|
import org.keycloak.representations.idm.authorization.DecisionStrategy;
|
||||||
|
import org.keycloak.representations.idm.authorization.Logic;
|
||||||
|
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public class ResourcePermissionManagementTest extends AbstractPermissionManagementTest {
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testCreateResourcePermission() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
ResourcePermissionRepresentation representation = new ResourcePermissionRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Resource A Permission");
|
||||||
|
representation.setDescription("description");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.CONSENSUS);
|
||||||
|
representation.setLogic(Logic.NEGATIVE);
|
||||||
|
representation.addResource("Resource A");
|
||||||
|
representation.addPolicy("Only Marta Policy", "Only Kolo Policy");
|
||||||
|
|
||||||
|
assertCreated(authorization, representation);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testCreateResourceType() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
ResourcePermissionRepresentation representation = new ResourcePermissionRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Resource A Type Permission");
|
||||||
|
representation.setDescription("description");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.CONSENSUS);
|
||||||
|
representation.setLogic(Logic.NEGATIVE);
|
||||||
|
representation.setResourceType("test-resource");
|
||||||
|
representation.addPolicy("Only Marta Policy");
|
||||||
|
|
||||||
|
assertCreated(authorization, representation);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testUpdate() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
ResourcePermissionRepresentation representation = new ResourcePermissionRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Update Test Resource Permission");
|
||||||
|
representation.setDescription("description");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.CONSENSUS);
|
||||||
|
representation.setLogic(Logic.NEGATIVE);
|
||||||
|
representation.addResource("Resource A");
|
||||||
|
representation.addPolicy("Only Marta Policy", "Only Kolo Policy");
|
||||||
|
|
||||||
|
assertCreated(authorization, representation);
|
||||||
|
|
||||||
|
representation.setName("changed");
|
||||||
|
representation.setDescription("changed");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.AFFIRMATIVE);
|
||||||
|
representation.setLogic(Logic.POSITIVE);
|
||||||
|
representation.getResources().remove("Resource A");
|
||||||
|
representation.addResource("Resource B");
|
||||||
|
representation.getPolicies().remove("Only Marta Policy");
|
||||||
|
|
||||||
|
ResourcePermissionsResource permissions = authorization.permissions().resource();
|
||||||
|
ResourcePermissionResource permission = permissions.findById(representation.getId());
|
||||||
|
|
||||||
|
permission.update(representation);
|
||||||
|
|
||||||
|
assertRepresentation(representation, permission);
|
||||||
|
|
||||||
|
representation.getResources().clear();
|
||||||
|
representation.setResourceType("changed");
|
||||||
|
|
||||||
|
permission.update(representation);
|
||||||
|
|
||||||
|
assertRepresentation(representation, permission);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testDelete() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
ResourcePermissionRepresentation representation = new ResourcePermissionRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Test Delete Permission");
|
||||||
|
representation.setResourceType("test-resource");
|
||||||
|
representation.addPolicy("Only Marta Policy");
|
||||||
|
|
||||||
|
ResourcePermissionsResource permissions = authorization.permissions().resource();
|
||||||
|
Response response = permissions.create(representation);
|
||||||
|
ResourcePermissionRepresentation created = response.readEntity(ResourcePermissionRepresentation.class);
|
||||||
|
|
||||||
|
permissions.findById(created.getId()).remove();
|
||||||
|
|
||||||
|
ResourcePermissionResource removed = permissions.findById(created.getId());
|
||||||
|
|
||||||
|
try {
|
||||||
|
removed.toRepresentation();
|
||||||
|
fail("Permission not removed");
|
||||||
|
} catch (NotFoundException ignore) {
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void failCreateWithSameName() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
ResourcePermissionRepresentation permission1 = new ResourcePermissionRepresentation();
|
||||||
|
|
||||||
|
permission1.setName("Conflicting Name Permission");
|
||||||
|
permission1.setResourceType("test-resource");
|
||||||
|
permission1.addPolicy("Only Marta Policy");
|
||||||
|
|
||||||
|
ResourcePermissionsResource permissions = authorization.permissions().resource();
|
||||||
|
|
||||||
|
permissions.create(permission1);
|
||||||
|
|
||||||
|
ResourcePermissionRepresentation permission2 = new ResourcePermissionRepresentation();
|
||||||
|
|
||||||
|
permission2.setName(permission1.getName());
|
||||||
|
|
||||||
|
Response response = permissions.create(permission2);
|
||||||
|
|
||||||
|
assertEquals(Response.Status.CONFLICT.getStatusCode(), response.getStatus());
|
||||||
|
}
|
||||||
|
|
||||||
|
private void assertCreated(AuthorizationResource authorization, ResourcePermissionRepresentation representation) {
|
||||||
|
ResourcePermissionsResource permissions = authorization.permissions().resource();
|
||||||
|
Response response = permissions.create(representation);
|
||||||
|
ResourcePermissionRepresentation created = response.readEntity(ResourcePermissionRepresentation.class);
|
||||||
|
ResourcePermissionResource permission = permissions.findById(created.getId());
|
||||||
|
assertRepresentation(representation, permission);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void assertRepresentation(ResourcePermissionRepresentation representation, ResourcePermissionResource permission) {
|
||||||
|
assertRepresentation(representation, permission.toRepresentation(), () -> permission.resources(), () -> Collections.emptyList(), () -> permission.associatedPolicies());
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,211 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.testsuite.admin.client.authorization;
|
||||||
|
|
||||||
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.assertNotNull;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
|
import static org.junit.Assert.fail;
|
||||||
|
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
|
import javax.management.relation.Role;
|
||||||
|
import javax.ws.rs.NotFoundException;
|
||||||
|
import javax.ws.rs.core.Response;
|
||||||
|
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.keycloak.admin.client.resource.AuthorizationResource;
|
||||||
|
import org.keycloak.admin.client.resource.ClientResource;
|
||||||
|
import org.keycloak.admin.client.resource.PolicyResource;
|
||||||
|
import org.keycloak.admin.client.resource.RolePoliciesResource;
|
||||||
|
import org.keycloak.admin.client.resource.RolePolicyResource;
|
||||||
|
import org.keycloak.admin.client.resource.RolesResource;
|
||||||
|
import org.keycloak.representations.idm.ClientRepresentation;
|
||||||
|
import org.keycloak.representations.idm.RoleRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.DecisionStrategy;
|
||||||
|
import org.keycloak.representations.idm.authorization.Logic;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.RolePolicyRepresentation;
|
||||||
|
import org.keycloak.testsuite.util.RealmBuilder;
|
||||||
|
import org.keycloak.testsuite.util.RolesBuilder;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public class RolePolicyManagementTest extends AbstractPermissionManagementTest {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected RealmBuilder createTestRealm() {
|
||||||
|
return super.createTestRealm().roles(
|
||||||
|
RolesBuilder.create()
|
||||||
|
.realmRole(new RoleRepresentation("Role A", "Role A description", false))
|
||||||
|
.realmRole(new RoleRepresentation("Role B", "Role B description", false))
|
||||||
|
.realmRole(new RoleRepresentation("Role C", "Role C description", false))
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testCreateRealmRolePolicy() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
RolePolicyRepresentation representation = new RolePolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Realm Role Policy");
|
||||||
|
representation.setDescription("description");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.CONSENSUS);
|
||||||
|
representation.setLogic(Logic.NEGATIVE);
|
||||||
|
representation.addRole("Role A", false);
|
||||||
|
representation.addRole("Role B", true);
|
||||||
|
|
||||||
|
assertCreated(authorization, representation);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testCreateClientRolePolicy() {
|
||||||
|
ClientResource client = getClient();
|
||||||
|
AuthorizationResource authorization = client.authorization();
|
||||||
|
RolePolicyRepresentation representation = new RolePolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Realm Client Role Policy");
|
||||||
|
representation.setDescription("description");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.CONSENSUS);
|
||||||
|
representation.setLogic(Logic.NEGATIVE);
|
||||||
|
|
||||||
|
RolesResource roles = client.roles();
|
||||||
|
|
||||||
|
roles.create(new RoleRepresentation("Client Role A", "desc", false));
|
||||||
|
|
||||||
|
ClientRepresentation clientRep = client.toRepresentation();
|
||||||
|
|
||||||
|
roles.create(new RoleRepresentation("Client Role B", "desc", false));
|
||||||
|
|
||||||
|
representation.addRole("Client Role A");
|
||||||
|
representation.addClientRole(clientRep.getClientId(), "Client Role B", true);
|
||||||
|
|
||||||
|
assertCreated(authorization, representation);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testUpdate() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
RolePolicyRepresentation representation = new RolePolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Update Test Role Policy");
|
||||||
|
representation.setDescription("description");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.CONSENSUS);
|
||||||
|
representation.setLogic(Logic.NEGATIVE);
|
||||||
|
representation.addRole("Role A", false);
|
||||||
|
representation.addRole("Role B", true);
|
||||||
|
representation.addRole("Role C", false);
|
||||||
|
|
||||||
|
assertCreated(authorization, representation);
|
||||||
|
|
||||||
|
representation.setName("changed");
|
||||||
|
representation.setDescription("changed");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.AFFIRMATIVE);
|
||||||
|
representation.setLogic(Logic.POSITIVE);
|
||||||
|
representation.setRoles(representation.getRoles().stream().filter(roleDefinition -> !roleDefinition.getId().equals("Resource A")).collect(Collectors.toSet()));
|
||||||
|
|
||||||
|
RolePoliciesResource policies = authorization.policies().roles();
|
||||||
|
RolePolicyResource permission = policies.findById(representation.getId());
|
||||||
|
|
||||||
|
permission.update(representation);
|
||||||
|
assertRepresentation(representation, permission);
|
||||||
|
|
||||||
|
for (RolePolicyRepresentation.RoleDefinition roleDefinition : representation.getRoles()) {
|
||||||
|
if (roleDefinition.getId().equals("Role B")) {
|
||||||
|
roleDefinition.setRequired(false);
|
||||||
|
}
|
||||||
|
if (roleDefinition.getId().equals("Role C")) {
|
||||||
|
roleDefinition.setRequired(true);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
permission.update(representation);
|
||||||
|
assertRepresentation(representation, permission);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testDelete() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
RolePolicyRepresentation representation = new RolePolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Test Delete Permission");
|
||||||
|
representation.addRole("Role A", false);
|
||||||
|
|
||||||
|
RolePoliciesResource policies = authorization.policies().roles();
|
||||||
|
Response response = policies.create(representation);
|
||||||
|
RolePolicyRepresentation created = response.readEntity(RolePolicyRepresentation.class);
|
||||||
|
|
||||||
|
policies.findById(created.getId()).remove();
|
||||||
|
|
||||||
|
RolePolicyResource removed = policies.findById(created.getId());
|
||||||
|
|
||||||
|
try {
|
||||||
|
removed.toRepresentation();
|
||||||
|
fail("Permission not removed");
|
||||||
|
} catch (NotFoundException ignore) {
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testGenericConfig() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
RolePolicyRepresentation representation = new RolePolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Test Generic Config Permission");
|
||||||
|
representation.addRole("Role A", false);
|
||||||
|
|
||||||
|
RolePoliciesResource policies = authorization.policies().roles();
|
||||||
|
Response response = policies.create(representation);
|
||||||
|
RolePolicyRepresentation created = response.readEntity(RolePolicyRepresentation.class);
|
||||||
|
|
||||||
|
PolicyResource policy = authorization.policies().policy(created.getId());
|
||||||
|
PolicyRepresentation genericConfig = policy.toRepresentation();
|
||||||
|
|
||||||
|
assertNotNull(genericConfig.getConfig());
|
||||||
|
assertNotNull(genericConfig.getConfig().get("roles"));
|
||||||
|
|
||||||
|
RoleRepresentation role = getRealm().roles().get("Role A").toRepresentation();
|
||||||
|
|
||||||
|
assertTrue(genericConfig.getConfig().get("roles").contains(role.getId()));
|
||||||
|
}
|
||||||
|
|
||||||
|
private void assertCreated(AuthorizationResource authorization, RolePolicyRepresentation representation) {
|
||||||
|
RolePoliciesResource permissions = authorization.policies().roles();
|
||||||
|
Response response = permissions.create(representation);
|
||||||
|
RolePolicyRepresentation created = response.readEntity(RolePolicyRepresentation.class);
|
||||||
|
RolePolicyResource permission = permissions.findById(created.getId());
|
||||||
|
assertRepresentation(representation, permission);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void assertRepresentation(RolePolicyRepresentation representation, RolePolicyResource permission) {
|
||||||
|
RolePolicyRepresentation actual = permission.toRepresentation();
|
||||||
|
assertRepresentation(representation, actual, () -> permission.resources(), () -> Collections.emptyList(), () -> permission.associatedPolicies());
|
||||||
|
assertEquals(representation.getRoles().size(), actual.getRoles().size());
|
||||||
|
ClientRepresentation clientRep = getClient().toRepresentation();
|
||||||
|
assertEquals(0, actual.getRoles().stream().filter(actualDefinition -> !representation.getRoles().stream()
|
||||||
|
.filter(roleDefinition -> (getRoleName(actualDefinition.getId()).equals(roleDefinition.getId()) || (clientRep.getClientId() + "/" + getRoleName(actualDefinition.getId())).equals(roleDefinition.getId())) && actualDefinition.isRequired() == roleDefinition.isRequired())
|
||||||
|
.findFirst().isPresent())
|
||||||
|
.count());
|
||||||
|
}
|
||||||
|
|
||||||
|
private String getRoleName(String id) {
|
||||||
|
return getRealm().rolesById().getRole(id).getName();
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,159 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.testsuite.admin.client.authorization;
|
||||||
|
|
||||||
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.fail;
|
||||||
|
|
||||||
|
import javax.ws.rs.NotFoundException;
|
||||||
|
import javax.ws.rs.core.Response;
|
||||||
|
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.keycloak.admin.client.resource.AuthorizationResource;
|
||||||
|
import org.keycloak.admin.client.resource.ScopePermissionResource;
|
||||||
|
import org.keycloak.admin.client.resource.ScopePermissionsResource;
|
||||||
|
import org.keycloak.representations.idm.authorization.DecisionStrategy;
|
||||||
|
import org.keycloak.representations.idm.authorization.Logic;
|
||||||
|
import org.keycloak.representations.idm.authorization.ScopePermissionRepresentation;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public class ScopePermissionManagementTest extends AbstractPermissionManagementTest {
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testCreateResourceScopePermission() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
ScopePermissionRepresentation representation = new ScopePermissionRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Resource A Scope Permission");
|
||||||
|
representation.setDescription("description");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.CONSENSUS);
|
||||||
|
representation.setLogic(Logic.NEGATIVE);
|
||||||
|
representation.addResource("Resource A");
|
||||||
|
representation.addScope("read", "execute");
|
||||||
|
representation.addPolicy("Only Marta Policy", "Only Kolo Policy");
|
||||||
|
|
||||||
|
assertCreated(authorization, representation);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testCreateScopePermission() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
ScopePermissionRepresentation representation = new ScopePermissionRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Read Permission");
|
||||||
|
representation.setDescription("description");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.CONSENSUS);
|
||||||
|
representation.setLogic(Logic.NEGATIVE);
|
||||||
|
representation.addScope("read", "write");
|
||||||
|
representation.addPolicy("Only Marta Policy");
|
||||||
|
|
||||||
|
assertCreated(authorization, representation);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testUpdate() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
ScopePermissionRepresentation representation = new ScopePermissionRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Update Test Scope Permission");
|
||||||
|
representation.setDescription("description");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.CONSENSUS);
|
||||||
|
representation.setLogic(Logic.NEGATIVE);
|
||||||
|
representation.addResource("Resource A");
|
||||||
|
representation.addScope("read", "execute");
|
||||||
|
representation.addPolicy("Only Marta Policy", "Only Kolo Policy");
|
||||||
|
|
||||||
|
assertCreated(authorization, representation);
|
||||||
|
|
||||||
|
representation.setName("changed");
|
||||||
|
representation.setDescription("changed");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.AFFIRMATIVE);
|
||||||
|
representation.setLogic(Logic.POSITIVE);
|
||||||
|
representation.getResources().remove("Resource A");
|
||||||
|
representation.addResource("Resource B");
|
||||||
|
representation.getScopes().remove("execute");
|
||||||
|
representation.getPolicies().remove("Only Marta Policy");
|
||||||
|
|
||||||
|
ScopePermissionsResource permissions = authorization.permissions().scope();
|
||||||
|
ScopePermissionResource permission = permissions.findById(representation.getId());
|
||||||
|
|
||||||
|
permission.update(representation);
|
||||||
|
|
||||||
|
assertRepresentation(representation, permission);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testDelete() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
ScopePermissionRepresentation representation = new ScopePermissionRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Test Delete Permission");
|
||||||
|
representation.addScope("execute");
|
||||||
|
representation.addPolicy("Only Marta Policy");
|
||||||
|
|
||||||
|
assertCreated(authorization, representation);
|
||||||
|
|
||||||
|
ScopePermissionsResource permissions = authorization.permissions().scope();
|
||||||
|
|
||||||
|
permissions.findById(representation.getId()).remove();
|
||||||
|
|
||||||
|
ScopePermissionResource removed = permissions.findById(representation.getId());
|
||||||
|
|
||||||
|
try {
|
||||||
|
removed.toRepresentation();
|
||||||
|
fail("Permission not removed");
|
||||||
|
} catch (NotFoundException ignore) {
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void failCreateWithSameName() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
ScopePermissionRepresentation permission1 = new ScopePermissionRepresentation();
|
||||||
|
|
||||||
|
permission1.setName("Conflicting Name Permission");
|
||||||
|
permission1.addScope("read");
|
||||||
|
permission1.addPolicy("Only Marta Policy");
|
||||||
|
|
||||||
|
ScopePermissionsResource permissions = authorization.permissions().scope();
|
||||||
|
|
||||||
|
permissions.create(permission1);
|
||||||
|
|
||||||
|
ScopePermissionRepresentation permission2 = new ScopePermissionRepresentation();
|
||||||
|
|
||||||
|
permission2.setName(permission1.getName());
|
||||||
|
|
||||||
|
Response response = permissions.create(permission2);
|
||||||
|
|
||||||
|
assertEquals(Response.Status.CONFLICT.getStatusCode(), response.getStatus());
|
||||||
|
}
|
||||||
|
|
||||||
|
private void assertCreated(AuthorizationResource authorization, ScopePermissionRepresentation representation) {
|
||||||
|
ScopePermissionsResource permissions = authorization.permissions().scope();
|
||||||
|
Response response = permissions.create(representation);
|
||||||
|
ScopePermissionRepresentation created = response.readEntity(ScopePermissionRepresentation.class);
|
||||||
|
ScopePermissionResource permission = permissions.findById(created.getId());
|
||||||
|
assertRepresentation(representation, permission);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void assertRepresentation(ScopePermissionRepresentation representation, ScopePermissionResource permission) {
|
||||||
|
assertRepresentation(representation, permission.toRepresentation(), () -> permission.resources(), () -> permission.scopes(), () -> permission.associatedPolicies());
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,172 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.testsuite.admin.client.authorization;
|
||||||
|
|
||||||
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.assertNotNull;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
|
import static org.junit.Assert.fail;
|
||||||
|
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
|
import javax.ws.rs.NotFoundException;
|
||||||
|
import javax.ws.rs.core.Response;
|
||||||
|
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.keycloak.admin.client.resource.AuthorizationResource;
|
||||||
|
import org.keycloak.admin.client.resource.PolicyResource;
|
||||||
|
import org.keycloak.admin.client.resource.UserPoliciesResource;
|
||||||
|
import org.keycloak.admin.client.resource.UserPolicyResource;
|
||||||
|
import org.keycloak.representations.idm.UserRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.DecisionStrategy;
|
||||||
|
import org.keycloak.representations.idm.authorization.Logic;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.UserPolicyRepresentation;
|
||||||
|
import org.keycloak.testsuite.util.RealmBuilder;
|
||||||
|
import org.keycloak.testsuite.util.UserBuilder;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||||
|
*/
|
||||||
|
public class UserPolicyManagementTest extends AbstractPermissionManagementTest {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected RealmBuilder createTestRealm() {
|
||||||
|
return super.createTestRealm()
|
||||||
|
.user(UserBuilder.create().username("User A"))
|
||||||
|
.user(UserBuilder.create().username("User B"))
|
||||||
|
.user(UserBuilder.create().username("User C"));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testCreateUserPolicy() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
UserPolicyRepresentation representation = new UserPolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Realm User Policy");
|
||||||
|
representation.setDescription("description");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.CONSENSUS);
|
||||||
|
representation.setLogic(Logic.NEGATIVE);
|
||||||
|
representation.addUser("User A");
|
||||||
|
representation.addUser("User B");
|
||||||
|
|
||||||
|
assertCreated(authorization, representation);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testUpdate() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
UserPolicyRepresentation representation = new UserPolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Update Test User Policy");
|
||||||
|
representation.setDescription("description");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.CONSENSUS);
|
||||||
|
representation.setLogic(Logic.NEGATIVE);
|
||||||
|
representation.addUser("User A");
|
||||||
|
representation.addUser("User B");
|
||||||
|
representation.addUser("User C");
|
||||||
|
|
||||||
|
assertCreated(authorization, representation);
|
||||||
|
|
||||||
|
representation.setName("changed");
|
||||||
|
representation.setDescription("changed");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.AFFIRMATIVE);
|
||||||
|
representation.setLogic(Logic.POSITIVE);
|
||||||
|
representation.setUsers(representation.getUsers().stream().filter(userName -> !userName.equals("User A")).collect(Collectors.toSet()));
|
||||||
|
|
||||||
|
UserPoliciesResource policies = authorization.policies().users();
|
||||||
|
UserPolicyResource permission = policies.findById(representation.getId());
|
||||||
|
|
||||||
|
permission.update(representation);
|
||||||
|
assertRepresentation(representation, permission);
|
||||||
|
|
||||||
|
representation.setUsers(representation.getUsers().stream().filter(userName -> !userName.equals("User C")).collect(Collectors.toSet()));
|
||||||
|
|
||||||
|
permission.update(representation);
|
||||||
|
assertRepresentation(representation, permission);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testDelete() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
UserPolicyRepresentation representation = new UserPolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Test Delete Permission");
|
||||||
|
representation.addUser("User A");
|
||||||
|
|
||||||
|
UserPoliciesResource policies = authorization.policies().users();
|
||||||
|
Response response = policies.create(representation);
|
||||||
|
UserPolicyRepresentation created = response.readEntity(UserPolicyRepresentation.class);
|
||||||
|
|
||||||
|
policies.findById(created.getId()).remove();
|
||||||
|
|
||||||
|
UserPolicyResource removed = policies.findById(created.getId());
|
||||||
|
|
||||||
|
try {
|
||||||
|
removed.toRepresentation();
|
||||||
|
fail("Permission not removed");
|
||||||
|
} catch (NotFoundException ignore) {
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testGenericConfig() {
|
||||||
|
AuthorizationResource authorization = getClient().authorization();
|
||||||
|
UserPolicyRepresentation representation = new UserPolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Test Generic Config Permission");
|
||||||
|
representation.addUser("User A");
|
||||||
|
|
||||||
|
UserPoliciesResource policies = authorization.policies().users();
|
||||||
|
Response response = policies.create(representation);
|
||||||
|
UserPolicyRepresentation created = response.readEntity(UserPolicyRepresentation.class);
|
||||||
|
|
||||||
|
PolicyResource policy = authorization.policies().policy(created.getId());
|
||||||
|
PolicyRepresentation genericConfig = policy.toRepresentation();
|
||||||
|
|
||||||
|
assertNotNull(genericConfig.getConfig());
|
||||||
|
assertNotNull(genericConfig.getConfig().get("users"));
|
||||||
|
|
||||||
|
UserRepresentation user = getRealm().users().search("User A").get(0);
|
||||||
|
|
||||||
|
assertTrue(genericConfig.getConfig().get("users").contains(user.getId()));
|
||||||
|
}
|
||||||
|
|
||||||
|
private void assertCreated(AuthorizationResource authorization, UserPolicyRepresentation representation) {
|
||||||
|
UserPoliciesResource permissions = authorization.policies().users();
|
||||||
|
Response response = permissions.create(representation);
|
||||||
|
UserPolicyRepresentation created = response.readEntity(UserPolicyRepresentation.class);
|
||||||
|
UserPolicyResource permission = permissions.findById(created.getId());
|
||||||
|
assertRepresentation(representation, permission);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void assertRepresentation(UserPolicyRepresentation representation, UserPolicyResource permission) {
|
||||||
|
UserPolicyRepresentation actual = permission.toRepresentation();
|
||||||
|
assertRepresentation(representation, actual, () -> permission.resources(), () -> Collections.emptyList(), () -> permission.associatedPolicies());
|
||||||
|
assertEquals(representation.getUsers().size(), actual.getUsers().size());
|
||||||
|
assertEquals(0, actual.getUsers().stream().filter(userId -> !representation.getUsers().stream()
|
||||||
|
.filter(userName -> getUserName(userId).equalsIgnoreCase(userName))
|
||||||
|
.findFirst().isPresent())
|
||||||
|
.count());
|
||||||
|
}
|
||||||
|
|
||||||
|
private String getUserName(String id) {
|
||||||
|
return getRealm().users().get(id).toRepresentation().getUsername();
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,229 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.testsuite.authz;
|
||||||
|
|
||||||
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.assertNotNull;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
|
import static org.junit.Assert.fail;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Arrays;
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Map;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.keycloak.admin.client.resource.AuthorizationResource;
|
||||||
|
import org.keycloak.admin.client.resource.ClientResource;
|
||||||
|
import org.keycloak.admin.client.resource.ClientsResource;
|
||||||
|
import org.keycloak.admin.client.resource.RealmResource;
|
||||||
|
import org.keycloak.authorization.client.AuthzClient;
|
||||||
|
import org.keycloak.authorization.client.Configuration;
|
||||||
|
import org.keycloak.authorization.client.representation.EntitlementResponse;
|
||||||
|
import org.keycloak.authorization.client.representation.ResourceRepresentation;
|
||||||
|
import org.keycloak.authorization.client.representation.ScopeRepresentation;
|
||||||
|
import org.keycloak.jose.jws.JWSInput;
|
||||||
|
import org.keycloak.jose.jws.JWSInputException;
|
||||||
|
import org.keycloak.representations.AccessToken;
|
||||||
|
import org.keycloak.representations.idm.RealmRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.Permission;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ScopePermissionRepresentation;
|
||||||
|
import org.keycloak.testsuite.AbstractKeycloakTest;
|
||||||
|
import org.keycloak.testsuite.util.AdminClientUtil;
|
||||||
|
import org.keycloak.testsuite.util.ClientBuilder;
|
||||||
|
import org.keycloak.testsuite.util.RealmBuilder;
|
||||||
|
import org.keycloak.testsuite.util.UserBuilder;
|
||||||
|
import org.keycloak.util.JsonSerialization;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
||||||
|
* @version $Revision: 1 $
|
||||||
|
*/
|
||||||
|
public class ConflictingScopePermissionTest extends AbstractKeycloakTest {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void addTestRealms(List<RealmRepresentation> testRealms) {
|
||||||
|
testRealms.add(RealmBuilder.create().name("authz-test")
|
||||||
|
.user(UserBuilder.create().username("marta").password("password"))
|
||||||
|
.user(UserBuilder.create().username("kolo").password("password"))
|
||||||
|
.client(ClientBuilder.create().clientId("resource-server-test")
|
||||||
|
.secret("secret")
|
||||||
|
.authorizationServicesEnabled(true)
|
||||||
|
.redirectUris("http://localhost/resource-server-test")
|
||||||
|
.defaultRoles("uma_protection")
|
||||||
|
.directAccessGrants())
|
||||||
|
.build());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Before
|
||||||
|
public void configureAuthorization() throws Exception {
|
||||||
|
createResourcesAndScopes();
|
||||||
|
|
||||||
|
RealmResource realm = getRealm();
|
||||||
|
ClientResource client = getClient(realm);
|
||||||
|
|
||||||
|
createPolicies(realm, client);
|
||||||
|
createPermissions(client);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* <p>Scope Read on Resource A has two conflicting permissions. One is granting access for Marta and the other for Kolo.
|
||||||
|
*
|
||||||
|
* <p>Scope Read should not be granted for Marta.
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void testMartaCanAccessResourceAWithExecuteAndWrite() {
|
||||||
|
List<Permission> permissions = getEntitlements("marta", "password");
|
||||||
|
|
||||||
|
for (Permission permission : new ArrayList<>(permissions)) {
|
||||||
|
String resourceSetName = permission.getResourceSetName();
|
||||||
|
|
||||||
|
switch (resourceSetName) {
|
||||||
|
case "Resource A":
|
||||||
|
assertEquals(2, permission.getScopes().size());
|
||||||
|
assertTrue(permission.getScopes().contains("execute"));
|
||||||
|
assertTrue(permission.getScopes().contains("write"));
|
||||||
|
permissions.remove(permission);
|
||||||
|
break;
|
||||||
|
case "Resource C":
|
||||||
|
assertEquals(3, permission.getScopes().size());
|
||||||
|
assertTrue(permission.getScopes().contains("execute"));
|
||||||
|
assertTrue(permission.getScopes().contains("write"));
|
||||||
|
assertTrue(permission.getScopes().contains("read"));
|
||||||
|
permissions.remove(permission);
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
fail("Unexpected permission for resource [" + resourceSetName + "]");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
assertTrue(permissions.isEmpty());
|
||||||
|
}
|
||||||
|
|
||||||
|
private List<Permission> getEntitlements(String username, String password) {
|
||||||
|
AuthzClient authzClient = getAuthzClient();
|
||||||
|
EntitlementResponse response = authzClient.entitlement(authzClient.obtainAccessToken(username, password).getToken()).getAll("resource-server-test");
|
||||||
|
AccessToken accessToken;
|
||||||
|
|
||||||
|
try {
|
||||||
|
accessToken = new JWSInput(response.getRpt()).readJsonContent(AccessToken.class);
|
||||||
|
} catch (JWSInputException cause) {
|
||||||
|
throw new RuntimeException("Failed to deserialize RPT", cause);
|
||||||
|
}
|
||||||
|
|
||||||
|
AccessToken.Authorization authorization = accessToken.getAuthorization();
|
||||||
|
|
||||||
|
assertNotNull("RPT does not contain any authorization data", authorization);
|
||||||
|
|
||||||
|
return authorization.getPermissions();
|
||||||
|
}
|
||||||
|
|
||||||
|
private RealmResource getRealm() throws Exception {
|
||||||
|
return AdminClientUtil.createAdminClient().realm("authz-test");
|
||||||
|
}
|
||||||
|
|
||||||
|
private ClientResource getClient(RealmResource realm) {
|
||||||
|
ClientsResource clients = realm.clients();
|
||||||
|
return clients.findByClientId("resource-server-test").stream().map(representation -> clients.get(representation.getId())).findFirst().orElseThrow(() -> new RuntimeException("Expected client [resource-server-test]"));
|
||||||
|
}
|
||||||
|
|
||||||
|
private void createPermissions(ClientResource client) throws IOException {
|
||||||
|
createResourcePermission("Resource C Only For Marta Permission", "Resource C", Arrays.asList("Only Marta Policy"), client);
|
||||||
|
createScopePermission("Resource A Scope Read Only For Marta Permission", "Resource A", Arrays.asList("read"), Arrays.asList("Only Marta Policy"), client);
|
||||||
|
createScopePermission("Resource A Scope Read Only For Kolo Permission", "Resource A", Arrays.asList("read"), Arrays.asList("Only Kolo Policy"), client);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void createPolicies(RealmResource realm, ClientResource client) throws IOException {
|
||||||
|
createUserPolicy("Only Marta Policy", realm, client, "marta");
|
||||||
|
createUserPolicy("Only Kolo Policy", realm, client, "kolo");
|
||||||
|
}
|
||||||
|
|
||||||
|
private void createResourcesAndScopes() throws IOException {
|
||||||
|
AuthzClient authzClient = getAuthzClient();
|
||||||
|
Set<ScopeRepresentation> scopes = new HashSet<>();
|
||||||
|
|
||||||
|
scopes.add(new ScopeRepresentation("read"));
|
||||||
|
scopes.add(new ScopeRepresentation("write"));
|
||||||
|
scopes.add(new ScopeRepresentation("execute"));
|
||||||
|
|
||||||
|
List<ResourceRepresentation> resources = new ArrayList<>();
|
||||||
|
|
||||||
|
resources.add(new ResourceRepresentation("Resource A", scopes));
|
||||||
|
resources.add(new ResourceRepresentation("Resource B", scopes));
|
||||||
|
resources.add(new ResourceRepresentation("Resource C", scopes));
|
||||||
|
|
||||||
|
resources.forEach(resource -> authzClient.protection().resource().create(resource));
|
||||||
|
}
|
||||||
|
|
||||||
|
private void createUserPolicy(String name, RealmResource realm, ClientResource client, String username) throws IOException {
|
||||||
|
String userId = realm.users().search(username).stream().map(representation -> representation.getId()).findFirst().orElseThrow(() -> new RuntimeException("Expected user [userId]"));
|
||||||
|
|
||||||
|
PolicyRepresentation representation = new PolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName(name);
|
||||||
|
representation.setType("user");
|
||||||
|
|
||||||
|
Map<String, String> config = new HashMap<>();
|
||||||
|
|
||||||
|
config.put("users", JsonSerialization.writeValueAsString(new String[] {userId}));
|
||||||
|
|
||||||
|
representation.setConfig(config);
|
||||||
|
|
||||||
|
client.authorization().policies().create(representation);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void createResourcePermission(String name, String resourceName, List<String> policies, ClientResource client) throws IOException {
|
||||||
|
ResourcePermissionRepresentation representation = new ResourcePermissionRepresentation();
|
||||||
|
|
||||||
|
representation.setName(name);
|
||||||
|
representation.addResource(resourceName);
|
||||||
|
representation.addPolicy(policies.toArray(new String[policies.size()]));
|
||||||
|
|
||||||
|
client.authorization().permissions().resource().create(representation);
|
||||||
|
}
|
||||||
|
|
||||||
|
private void createScopePermission(String name, String resourceName, List<String> scopes, List<String> policies, ClientResource client) throws IOException {
|
||||||
|
AuthorizationResource authorization = client.authorization();
|
||||||
|
ScopePermissionRepresentation representation = new ScopePermissionRepresentation();
|
||||||
|
|
||||||
|
representation.setName(name);
|
||||||
|
|
||||||
|
if (resourceName != null) {
|
||||||
|
representation.addResource(resourceName);
|
||||||
|
}
|
||||||
|
|
||||||
|
representation.addScope(scopes.toArray(new String[scopes.size()]));
|
||||||
|
representation.addPolicy(scopes.toArray(new String[policies.size()]));
|
||||||
|
|
||||||
|
authorization.permissions().scope().create(representation);
|
||||||
|
}
|
||||||
|
|
||||||
|
private AuthzClient getAuthzClient() {
|
||||||
|
try {
|
||||||
|
return AuthzClient.create(JsonSerialization.readValue(getClass().getResourceAsStream("/authorization-test/default-keycloak.json"), Configuration.class));
|
||||||
|
} catch (IOException cause) {
|
||||||
|
throw new RuntimeException("Failed to create authz client", cause);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -24,9 +24,7 @@ import org.keycloak.authorization.model.Policy;
|
||||||
import org.keycloak.authorization.model.Resource;
|
import org.keycloak.authorization.model.Resource;
|
||||||
import org.keycloak.authorization.model.ResourceServer;
|
import org.keycloak.authorization.model.ResourceServer;
|
||||||
import org.keycloak.authorization.model.Scope;
|
import org.keycloak.authorization.model.Scope;
|
||||||
import org.keycloak.models.AdminRoles;
|
|
||||||
import org.keycloak.models.ClientModel;
|
import org.keycloak.models.ClientModel;
|
||||||
import org.keycloak.models.Constants;
|
|
||||||
import org.keycloak.models.KeycloakSession;
|
import org.keycloak.models.KeycloakSession;
|
||||||
import org.keycloak.models.RealmModel;
|
import org.keycloak.models.RealmModel;
|
||||||
import org.keycloak.models.RoleModel;
|
import org.keycloak.models.RoleModel;
|
||||||
|
@ -38,6 +36,8 @@ import org.keycloak.representations.idm.authorization.DecisionStrategy;
|
||||||
import org.keycloak.representations.idm.authorization.Logic;
|
import org.keycloak.representations.idm.authorization.Logic;
|
||||||
import org.keycloak.representations.idm.authorization.PolicyEvaluationRequest;
|
import org.keycloak.representations.idm.authorization.PolicyEvaluationRequest;
|
||||||
import org.keycloak.representations.idm.authorization.PolicyEvaluationResponse;
|
import org.keycloak.representations.idm.authorization.PolicyEvaluationResponse;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.ScopePermissionRepresentation;
|
||||||
import org.keycloak.testsuite.AbstractKeycloakTest;
|
import org.keycloak.testsuite.AbstractKeycloakTest;
|
||||||
|
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
|
@ -82,34 +82,33 @@ public class PolicyEvaluationCompositeRoleTest extends AbstractKeycloakTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
private static Policy addScopePermission(AuthorizationProvider authz, ResourceServer resourceServer, String name, Resource resource, Scope scope, Policy policy) {
|
private static Policy addScopePermission(AuthorizationProvider authz, ResourceServer resourceServer, String name, Resource resource, Scope scope, Policy policy) {
|
||||||
Policy permission = authz.getStoreFactory().getPolicyStore().create(name, "scope", resourceServer);
|
ScopePermissionRepresentation representation = new ScopePermissionRepresentation();
|
||||||
String resources = "[\"" + resource.getId() + "\"]";
|
|
||||||
String scopes = "[\"" + scope.getId() + "\"]";
|
representation.setName(name);
|
||||||
String applyPolicies = "[\"" + policy.getId() + "\"]";
|
representation.setType("scope");
|
||||||
Map<String, String> config = new HashMap<>();
|
representation.addResource(resource.getName());
|
||||||
config.put("resources", resources);
|
representation.addScope(scope.getName());
|
||||||
config.put("scopes", scopes);
|
representation.addPolicy(policy.getName());
|
||||||
config.put("applyPolicies", applyPolicies);
|
representation.setDecisionStrategy(DecisionStrategy.UNANIMOUS);
|
||||||
permission.setConfig(config);
|
representation.setLogic(Logic.POSITIVE);
|
||||||
permission.setDecisionStrategy(DecisionStrategy.UNANIMOUS);
|
|
||||||
permission.setLogic(Logic.POSITIVE);
|
return authz.getStoreFactory().getPolicyStore().create(representation, resourceServer);
|
||||||
permission.addResource(resource);
|
|
||||||
permission.addScope(scope);
|
|
||||||
permission.addAssociatedPolicy(policy);
|
|
||||||
return permission;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
private static Policy createRolePolicy(AuthorizationProvider authz, ResourceServer resourceServer, RoleModel role) {
|
private static Policy createRolePolicy(AuthorizationProvider authz, ResourceServer resourceServer, RoleModel role) {
|
||||||
Policy policy = authz.getStoreFactory().getPolicyStore().create(role.getName(), "role", resourceServer);
|
PolicyRepresentation representation = new PolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName(role.getName());
|
||||||
|
representation.setType("role");
|
||||||
|
representation.setDecisionStrategy(DecisionStrategy.UNANIMOUS);
|
||||||
|
representation.setLogic(Logic.POSITIVE);
|
||||||
String roleValues = "[{\"id\":\"" + role.getId() + "\",\"required\": true}]";
|
String roleValues = "[{\"id\":\"" + role.getId() + "\",\"required\": true}]";
|
||||||
policy.setDecisionStrategy(DecisionStrategy.UNANIMOUS);
|
|
||||||
policy.setLogic(Logic.POSITIVE);
|
|
||||||
Map<String, String> config = new HashMap<>();
|
Map<String, String> config = new HashMap<>();
|
||||||
config.put("roles", roleValues);
|
config.put("roles", roleValues);
|
||||||
policy.setConfig(config);
|
representation.setConfig(config);
|
||||||
return policy;
|
|
||||||
|
return authz.getStoreFactory().getPolicyStore().create(representation, resourceServer);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -159,4 +159,9 @@ public class ClientBuilder {
|
||||||
rep.setRootUrl(rootUrl);
|
rep.setRootUrl(rootUrl);
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public ClientBuilder authorizationServicesEnabled(boolean enable) {
|
||||||
|
rep.setAuthorizationServicesEnabled(true);
|
||||||
|
return this;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,8 @@
|
||||||
|
{
|
||||||
|
"realm": "authz-test",
|
||||||
|
"auth-server-url" : "http://localhost:8180/auth",
|
||||||
|
"resource" : "resource-server-test",
|
||||||
|
"credentials": {
|
||||||
|
"secret": "secret"
|
||||||
|
}
|
||||||
|
}
|
|
@ -38,7 +38,9 @@ import org.keycloak.models.KeycloakSession;
|
||||||
import org.keycloak.models.RealmModel;
|
import org.keycloak.models.RealmModel;
|
||||||
import org.keycloak.models.RoleModel;
|
import org.keycloak.models.RoleModel;
|
||||||
import org.keycloak.representations.AccessToken;
|
import org.keycloak.representations.AccessToken;
|
||||||
|
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||||
|
import org.keycloak.representations.idm.authorization.RolePolicyRepresentation;
|
||||||
import org.keycloak.representations.idm.authorization.ScopeRepresentation;
|
import org.keycloak.representations.idm.authorization.ScopeRepresentation;
|
||||||
import org.keycloak.util.JsonSerialization;
|
import org.keycloak.util.JsonSerialization;
|
||||||
|
|
||||||
|
@ -246,10 +248,14 @@ public abstract class AbstractPhotozAdminTest extends AbstractAuthorizationTest
|
||||||
return onAuthorizationSession(authorizationProvider -> {
|
return onAuthorizationSession(authorizationProvider -> {
|
||||||
StoreFactory storeFactory = authorizationProvider.getStoreFactory();
|
StoreFactory storeFactory = authorizationProvider.getStoreFactory();
|
||||||
PolicyStore policyStore = storeFactory.getPolicyStore();
|
PolicyStore policyStore = storeFactory.getPolicyStore();
|
||||||
Policy policy = policyStore.create("Administration Policy", "aggregate", resourceServer);
|
PolicyRepresentation representation = new PolicyRepresentation();
|
||||||
|
|
||||||
policy.addAssociatedPolicy(anyAdminPolicy);
|
representation.setName("Administration Policy");
|
||||||
policy.addAssociatedPolicy(onlyFromSpecificAddressPolicy);
|
representation.setType("aggregate");
|
||||||
|
representation.addPolicy(anyAdminPolicy.getName());
|
||||||
|
representation.addPolicy(onlyFromSpecificAddressPolicy.getName());
|
||||||
|
|
||||||
|
Policy policy = policyStore.create(representation, resourceServer);
|
||||||
|
|
||||||
return policy;
|
return policy;
|
||||||
});
|
});
|
||||||
|
@ -259,7 +265,10 @@ public abstract class AbstractPhotozAdminTest extends AbstractAuthorizationTest
|
||||||
return onAuthorizationSession(authorizationProvider -> {
|
return onAuthorizationSession(authorizationProvider -> {
|
||||||
StoreFactory storeFactory = authorizationProvider.getStoreFactory();
|
StoreFactory storeFactory = authorizationProvider.getStoreFactory();
|
||||||
PolicyStore policyStore = storeFactory.getPolicyStore();
|
PolicyStore policyStore = storeFactory.getPolicyStore();
|
||||||
Policy policy = policyStore.create("Only From a Specific Client Address", "js", resourceServer);
|
PolicyRepresentation representation = new PolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Only From a Specific Client Address");
|
||||||
|
representation.setType("js");
|
||||||
HashedMap config = new HashedMap();
|
HashedMap config = new HashedMap();
|
||||||
|
|
||||||
config.put("code",
|
config.put("code",
|
||||||
|
@ -269,9 +278,9 @@ public abstract class AbstractPhotozAdminTest extends AbstractAuthorizationTest
|
||||||
"$evaluation.grant();" +
|
"$evaluation.grant();" +
|
||||||
"}");
|
"}");
|
||||||
|
|
||||||
policy.setConfig(config);
|
representation.setConfig(config);
|
||||||
|
|
||||||
return policy;
|
return policyStore.create(representation, resourceServer);
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -279,24 +288,13 @@ public abstract class AbstractPhotozAdminTest extends AbstractAuthorizationTest
|
||||||
return onAuthorizationSession(authorizationProvider -> {
|
return onAuthorizationSession(authorizationProvider -> {
|
||||||
StoreFactory storeFactory = authorizationProvider.getStoreFactory();
|
StoreFactory storeFactory = authorizationProvider.getStoreFactory();
|
||||||
PolicyStore policyStore = storeFactory.getPolicyStore();
|
PolicyStore policyStore = storeFactory.getPolicyStore();
|
||||||
Policy policy = policyStore.create("Any Admin Policy", "role", resourceServer);
|
RolePolicyRepresentation representation = new RolePolicyRepresentation();
|
||||||
HashedMap config = new HashedMap();
|
|
||||||
RealmModel realm = authorizationProvider.getKeycloakSession().realms().getRealmByName(TEST_REALM_NAME);
|
|
||||||
RoleModel adminRole = realm.getRole("admin");
|
|
||||||
|
|
||||||
Map role = new HashMap();
|
representation.setName("Any Admin Policy");
|
||||||
|
representation.setType("role");
|
||||||
|
representation.addRole("admin", false);
|
||||||
|
|
||||||
role.put("id", adminRole.getId());
|
return policyStore.create(representation, resourceServer);
|
||||||
|
|
||||||
try {
|
|
||||||
config.put("roles", JsonSerialization.writeValueAsString(new Map[] {role}));
|
|
||||||
} catch (IOException e) {
|
|
||||||
throw new RuntimeException(e);
|
|
||||||
}
|
|
||||||
|
|
||||||
policy.setConfig(config);
|
|
||||||
|
|
||||||
return policy;
|
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -358,7 +356,11 @@ public abstract class AbstractPhotozAdminTest extends AbstractAuthorizationTest
|
||||||
return onAuthorizationSession(authorizationProvider -> {
|
return onAuthorizationSession(authorizationProvider -> {
|
||||||
StoreFactory storeFactory = authorizationProvider.getStoreFactory();
|
StoreFactory storeFactory = authorizationProvider.getStoreFactory();
|
||||||
PolicyStore policyStore = storeFactory.getPolicyStore();
|
PolicyStore policyStore = storeFactory.getPolicyStore();
|
||||||
Policy policy = policyStore.create("Any User Policy", "role", resourceServer);
|
PolicyRepresentation representation = new PolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Any User Policy");
|
||||||
|
representation.setType("role");
|
||||||
|
|
||||||
HashedMap config = new HashedMap();
|
HashedMap config = new HashedMap();
|
||||||
RealmModel realm = authorizationProvider.getKeycloakSession().realms().getRealmByName(TEST_REALM_NAME);
|
RealmModel realm = authorizationProvider.getKeycloakSession().realms().getRealmByName(TEST_REALM_NAME);
|
||||||
RoleModel userRole = realm.getRole("user");
|
RoleModel userRole = realm.getRole("user");
|
||||||
|
@ -373,7 +375,9 @@ public abstract class AbstractPhotozAdminTest extends AbstractAuthorizationTest
|
||||||
throw new RuntimeException(e);
|
throw new RuntimeException(e);
|
||||||
}
|
}
|
||||||
|
|
||||||
policy.setConfig(config);
|
representation.setConfig(config);
|
||||||
|
|
||||||
|
Policy policy = policyStore.create(representation, resourceServer);
|
||||||
|
|
||||||
return policy;
|
return policy;
|
||||||
});
|
});
|
||||||
|
|
|
@ -46,12 +46,9 @@ import java.util.HashSet;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import java.util.function.Function;
|
|
||||||
import java.util.function.Predicate;
|
|
||||||
import java.util.stream.Collectors;
|
import java.util.stream.Collectors;
|
||||||
|
|
||||||
import static org.junit.Assert.assertEquals;
|
import static org.junit.Assert.assertEquals;
|
||||||
import static org.junit.Assert.assertFalse;
|
|
||||||
import static org.junit.Assert.assertNotNull;
|
import static org.junit.Assert.assertNotNull;
|
||||||
import static org.junit.Assert.assertTrue;
|
import static org.junit.Assert.assertTrue;
|
||||||
|
|
||||||
|
@ -392,7 +389,10 @@ public class ResourcePermissionManagementTest extends AbstractPhotozAdminTest {
|
||||||
return onAuthorizationSession(authorizationProvider -> {
|
return onAuthorizationSession(authorizationProvider -> {
|
||||||
StoreFactory storeFactory = authorizationProvider.getStoreFactory();
|
StoreFactory storeFactory = authorizationProvider.getStoreFactory();
|
||||||
PolicyStore policyStore = storeFactory.getPolicyStore();
|
PolicyStore policyStore = storeFactory.getPolicyStore();
|
||||||
Policy policy = policyStore.create("Client-Based Policy", "client", resourceServer);
|
PolicyRepresentation representation = new PolicyRepresentation();
|
||||||
|
|
||||||
|
representation.setName("Client-Based Policy");
|
||||||
|
representation.setType("client");
|
||||||
|
|
||||||
List<String> clientIds = new ArrayList<>();
|
List<String> clientIds = new ArrayList<>();
|
||||||
for (ClientModel client : allowedClients) {
|
for (ClientModel client : allowedClients) {
|
||||||
|
@ -408,9 +408,9 @@ public class ResourcePermissionManagementTest extends AbstractPhotozAdminTest {
|
||||||
throw new RuntimeException(e);
|
throw new RuntimeException(e);
|
||||||
}
|
}
|
||||||
|
|
||||||
policy.setConfig(config);
|
representation.setConfig(config);
|
||||||
|
|
||||||
return policy;
|
return policyStore.create(representation, resourceServer);
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -646,7 +646,7 @@ module.controller('ResourceServerPolicyCtrl', function($scope, $http, $route, $l
|
||||||
};
|
};
|
||||||
});
|
});
|
||||||
|
|
||||||
module.controller('ResourceServerPermissionCtrl', function($scope, $http, $route, $location, realm, ResourceServer, ResourceServerPolicy, PolicyProvider, client) {
|
module.controller('ResourceServerPermissionCtrl', function($scope, $http, $route, $location, realm, ResourceServer, ResourceServerPermission, PolicyProvider, client) {
|
||||||
$scope.realm = realm;
|
$scope.realm = realm;
|
||||||
$scope.client = client;
|
$scope.client = client;
|
||||||
$scope.policyProviders = [];
|
$scope.policyProviders = [];
|
||||||
|
@ -654,7 +654,6 @@ module.controller('ResourceServerPermissionCtrl', function($scope, $http, $route
|
||||||
$scope.query = {
|
$scope.query = {
|
||||||
realm: realm.realm,
|
realm: realm.realm,
|
||||||
client : client.id,
|
client : client.id,
|
||||||
permission: true,
|
|
||||||
max : 20,
|
max : 20,
|
||||||
first : 0
|
first : 0
|
||||||
};
|
};
|
||||||
|
@ -705,7 +704,7 @@ module.controller('ResourceServerPermissionCtrl', function($scope, $http, $route
|
||||||
$scope.searchQuery = function() {
|
$scope.searchQuery = function() {
|
||||||
$scope.searchLoaded = false;
|
$scope.searchLoaded = false;
|
||||||
|
|
||||||
ResourceServerPolicy.query($scope.query, function(data) {
|
ResourceServerPermission.query($scope.query, function(data) {
|
||||||
$scope.policies = data;
|
$scope.policies = data;
|
||||||
$scope.searchLoaded = true;
|
$scope.searchLoaded = true;
|
||||||
$scope.lastSearch = $scope.query.search;
|
$scope.lastSearch = $scope.query.search;
|
||||||
|
@ -723,7 +722,7 @@ module.controller('ResourceServerPermissionCtrl', function($scope, $http, $route
|
||||||
|
|
||||||
policy.details = {loaded: false};
|
policy.details = {loaded: false};
|
||||||
|
|
||||||
ResourceServerPolicy.associatedPolicies({
|
ResourceServerPermission.associatedPolicies({
|
||||||
realm : $route.current.params.realm,
|
realm : $route.current.params.realm,
|
||||||
client : client.id,
|
client : client.id,
|
||||||
id : policy.id
|
id : policy.id
|
||||||
|
@ -758,7 +757,7 @@ module.controller('ResourceServerPolicyDroolsDetailCtrl', function($scope, $http
|
||||||
policy = $scope.policy;
|
policy = $scope.policy;
|
||||||
}
|
}
|
||||||
|
|
||||||
$http.post(authUrl + '/admin/realms/'+ $route.current.params.realm + '/clients/' + client.id + '/authz/resource-server/policy/rules/resolveModules'
|
$http.post(authUrl + '/admin/realms/'+ $route.current.params.realm + '/clients/' + client.id + '/authz/resource-server/policy/rules/provider/resolveModules'
|
||||||
, policy).success(function(data) {
|
, policy).success(function(data) {
|
||||||
$scope.drools.moduleNames = data;
|
$scope.drools.moduleNames = data;
|
||||||
$scope.resolveSessions();
|
$scope.resolveSessions();
|
||||||
|
@ -766,7 +765,7 @@ module.controller('ResourceServerPolicyDroolsDetailCtrl', function($scope, $http
|
||||||
}
|
}
|
||||||
|
|
||||||
$scope.resolveSessions = function() {
|
$scope.resolveSessions = function() {
|
||||||
$http.post(authUrl + '/admin/realms/'+ $route.current.params.realm + '/clients/' + client.id + '/authz/resource-server/policy/rules/resolveSessions'
|
$http.post(authUrl + '/admin/realms/'+ $route.current.params.realm + '/clients/' + client.id + '/authz/resource-server/policy/rules/provider/resolveSessions'
|
||||||
, $scope.policy).success(function(data) {
|
, $scope.policy).success(function(data) {
|
||||||
$scope.drools.moduleSessions = data;
|
$scope.drools.moduleSessions = data;
|
||||||
});
|
});
|
||||||
|
@ -789,7 +788,7 @@ module.controller('ResourceServerPolicyDroolsDetailCtrl', function($scope, $http
|
||||||
}, realm, client, $scope);
|
}, realm, client, $scope);
|
||||||
});
|
});
|
||||||
|
|
||||||
module.controller('ResourceServerPolicyResourceDetailCtrl', function($scope, $route, $location, realm, client, PolicyController, ResourceServerPolicy, ResourceServerResource) {
|
module.controller('ResourceServerPolicyResourceDetailCtrl', function($scope, $route, $location, realm, client, PolicyController, ResourceServerPermission, ResourceServerResource) {
|
||||||
PolicyController.onInit({
|
PolicyController.onInit({
|
||||||
getPolicyType : function() {
|
getPolicyType : function() {
|
||||||
return "resource";
|
return "resource";
|
||||||
|
@ -848,7 +847,7 @@ module.controller('ResourceServerPolicyResourceDetailCtrl', function($scope, $ro
|
||||||
max : 20,
|
max : 20,
|
||||||
first : 0
|
first : 0
|
||||||
};
|
};
|
||||||
ResourceServerPolicy.query($scope.query, function(response) {
|
ResourceServerPermission.searchPolicies($scope.query, function(response) {
|
||||||
data.results = response;
|
data.results = response;
|
||||||
query.callback(data);
|
query.callback(data);
|
||||||
});
|
});
|
||||||
|
@ -860,59 +859,89 @@ module.controller('ResourceServerPolicyResourceDetailCtrl', function($scope, $ro
|
||||||
};
|
};
|
||||||
|
|
||||||
$scope.applyToResourceType = function() {
|
$scope.applyToResourceType = function() {
|
||||||
if ($scope.policy.config.default) {
|
if ($scope.applyToResourceTypeFlag) {
|
||||||
$scope.policy.config.resources = [];
|
$scope.selectedResource = null;
|
||||||
} else {
|
} else {
|
||||||
$scope.policy.config.defaultResourceType = null;
|
$scope.policy.resourceType = null;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
|
||||||
onInitUpdate : function(policy) {
|
onInitUpdate : function(policy) {
|
||||||
policy.config.default = eval(policy.config.default);
|
if (!policy.resourceType) {
|
||||||
policy.config.resources = {};
|
$scope.selectedResource = {};
|
||||||
ResourceServerPolicy.resources({
|
ResourceServerPermission.resources({
|
||||||
realm : $route.current.params.realm,
|
realm: $route.current.params.realm,
|
||||||
client : client.id,
|
client: client.id,
|
||||||
id : policy.id
|
id: policy.id
|
||||||
}, function(resources) {
|
}, function (resources) {
|
||||||
resources[0].text = resources[0].name;
|
resources[0].text = resources[0].name;
|
||||||
$scope.policy.config.resources = resources[0];
|
$scope.selectedResource = resources[0];
|
||||||
|
var copy = angular.copy($scope.selectedResource);
|
||||||
|
$scope.$watch('selectedResource', function() {
|
||||||
|
if (!angular.equals($scope.selectedResource, copy)) {
|
||||||
|
$scope.changed = true;
|
||||||
|
}
|
||||||
|
}, true);
|
||||||
});
|
});
|
||||||
|
} else {
|
||||||
|
$scope.applyToResourceTypeFlag = true;
|
||||||
|
}
|
||||||
|
|
||||||
policy.config.applyPolicies = [];
|
$scope.selectedPolicies = [];
|
||||||
ResourceServerPolicy.associatedPolicies({
|
ResourceServerPermission.associatedPolicies({
|
||||||
realm : $route.current.params.realm,
|
realm : $route.current.params.realm,
|
||||||
client : client.id,
|
client : client.id,
|
||||||
id : policy.id
|
id : policy.id
|
||||||
}, function(policies) {
|
}, function(policies) {
|
||||||
for (i = 0; i < policies.length; i++) {
|
for (i = 0; i < policies.length; i++) {
|
||||||
policies[i].text = policies[i].name;
|
policies[i].text = policies[i].name;
|
||||||
$scope.policy.config.applyPolicies.push(policies[i]);
|
$scope.selectedPolicies.push(policies[i]);
|
||||||
|
var copy = angular.copy($scope.selectedPolicies);
|
||||||
|
$scope.$watch('selectedPolicies', function() {
|
||||||
|
if (!angular.equals($scope.selectedPolicies, copy)) {
|
||||||
|
$scope.changed = true;
|
||||||
|
}
|
||||||
|
}, true);
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
onUpdate : function() {
|
onUpdate : function() {
|
||||||
if ($scope.policy.config.resources && $scope.policy.config.resources._id) {
|
if ($scope.selectedResource && $scope.selectedResource._id) {
|
||||||
$scope.policy.config.resources = JSON.stringify([$scope.policy.config.resources._id]);
|
$scope.policy.resources = [];
|
||||||
|
$scope.policy.resources.push($scope.selectedResource._id);
|
||||||
} else {
|
} else {
|
||||||
delete $scope.policy.config.resources
|
delete $scope.policy.resources
|
||||||
}
|
}
|
||||||
|
|
||||||
var policies = [];
|
var policies = [];
|
||||||
|
|
||||||
for (i = 0; i < $scope.policy.config.applyPolicies.length; i++) {
|
for (i = 0; i < $scope.selectedPolicies.length; i++) {
|
||||||
policies.push($scope.policy.config.applyPolicies[i].id);
|
policies.push($scope.selectedPolicies[i].id);
|
||||||
}
|
}
|
||||||
|
|
||||||
$scope.policy.config.applyPolicies = JSON.stringify(policies);
|
$scope.policy.policies = policies;
|
||||||
|
delete $scope.policy.config;
|
||||||
},
|
},
|
||||||
|
|
||||||
onInitCreate : function(newPolicy) {
|
onInitCreate : function(newPolicy) {
|
||||||
newPolicy.decisionStrategy = 'UNANIMOUS';
|
newPolicy.decisionStrategy = 'UNANIMOUS';
|
||||||
newPolicy.config = {};
|
$scope.selectedResource = null;
|
||||||
newPolicy.config.resources = null;
|
var copy = angular.copy($scope.selectedResource);
|
||||||
|
$scope.$watch('selectedResource', function() {
|
||||||
|
if (!angular.equals($scope.selectedResource, copy)) {
|
||||||
|
$scope.changed = true;
|
||||||
|
}
|
||||||
|
}, true);
|
||||||
|
|
||||||
|
$scope.selectedPolicies = null;
|
||||||
|
var copy = angular.copy($scope.selectedPolicies);
|
||||||
|
$scope.$watch('selectedPolicies', function() {
|
||||||
|
if (!angular.equals($scope.selectedPolicies, copy)) {
|
||||||
|
$scope.changed = true;
|
||||||
|
}
|
||||||
|
}, true);
|
||||||
|
|
||||||
var resourceId = $location.search()['rsrid'];
|
var resourceId = $location.search()['rsrid'];
|
||||||
|
|
||||||
|
@ -923,25 +952,27 @@ module.controller('ResourceServerPolicyResourceDetailCtrl', function($scope, $ro
|
||||||
rsrid : resourceId
|
rsrid : resourceId
|
||||||
}, function(data) {
|
}, function(data) {
|
||||||
data.text = data.name;
|
data.text = data.name;
|
||||||
$scope.policy.config.resources = data;
|
$scope.selectedResource = data;
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
|
||||||
onCreate : function() {
|
onCreate : function() {
|
||||||
if ($scope.policy.config.resources && $scope.policy.config.resources._id) {
|
if ($scope.selectedResource && $scope.selectedResource._id) {
|
||||||
$scope.policy.config.resources = JSON.stringify([$scope.policy.config.resources._id]);
|
$scope.policy.resources = [];
|
||||||
|
$scope.policy.resources.push($scope.selectedResource._id);
|
||||||
} else {
|
} else {
|
||||||
delete $scope.policy.config.resources
|
delete $scope.policy.resources
|
||||||
}
|
}
|
||||||
|
|
||||||
var policies = [];
|
var policies = [];
|
||||||
|
|
||||||
for (i = 0; i < $scope.policy.config.applyPolicies.length; i++) {
|
for (i = 0; i < $scope.selectedPolicies.length; i++) {
|
||||||
policies.push($scope.policy.config.applyPolicies[i].id);
|
policies.push($scope.selectedPolicies[i].id);
|
||||||
}
|
}
|
||||||
|
|
||||||
$scope.policy.config.applyPolicies = JSON.stringify(policies);
|
$scope.policy.policies = policies;
|
||||||
|
delete $scope.policy.config;
|
||||||
}
|
}
|
||||||
}, realm, client, $scope);
|
}, realm, client, $scope);
|
||||||
});
|
});
|
||||||
|
@ -1046,14 +1077,14 @@ module.controller('ResourceServerPolicyScopeDetailCtrl', function($scope, $route
|
||||||
};
|
};
|
||||||
|
|
||||||
$scope.selectResource = function() {
|
$scope.selectResource = function() {
|
||||||
$scope.policy.config.scopes = null;
|
$scope.selectedScopes = null;
|
||||||
if ($scope.policy.config.resources) {
|
if ($scope.selectedResource) {
|
||||||
ResourceServerResource.scopes({
|
ResourceServerResource.scopes({
|
||||||
realm: $route.current.params.realm,
|
realm: $route.current.params.realm,
|
||||||
client: client.id,
|
client: client.id,
|
||||||
rsrid: $scope.policy.config.resources._id
|
rsrid: $scope.selectedResource._id
|
||||||
}, function (data) {
|
}, function (data) {
|
||||||
$scope.policy.config.resources.scopes = data;
|
$scope.resourceScopes = data;
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1079,88 +1110,118 @@ module.controller('ResourceServerPolicyScopeDetailCtrl', function($scope, $route
|
||||||
deep: false
|
deep: false
|
||||||
}, function (resource) {
|
}, function (resource) {
|
||||||
resource[0].text = resource[0].name;
|
resource[0].text = resource[0].name;
|
||||||
$scope.policy.config.resources = resource[0];
|
$scope.selectedResource = resource[0];
|
||||||
|
var copy = angular.copy($scope.selectedResource);
|
||||||
|
$scope.$watch('selectedResource', function() {
|
||||||
|
if (!angular.equals($scope.selectedResource, copy)) {
|
||||||
|
$scope.changed = true;
|
||||||
|
}
|
||||||
|
}, true);
|
||||||
ResourceServerResource.scopes({
|
ResourceServerResource.scopes({
|
||||||
realm: $route.current.params.realm,
|
realm: $route.current.params.realm,
|
||||||
client: client.id,
|
client: client.id,
|
||||||
rsrid: resource[0]._id
|
rsrid: resource[0]._id
|
||||||
}, function (scopes) {
|
}, function (scopes) {
|
||||||
$scope.policy.config.resources.scopes = scopes;
|
$scope.resourceScopes = scopes;
|
||||||
});
|
|
||||||
ResourceServerPolicy.scopes({
|
|
||||||
realm: $route.current.params.realm,
|
|
||||||
client: client.id,
|
|
||||||
id: policy.id
|
|
||||||
}, function (scopes) {
|
|
||||||
$scope.policy.config.scopes = [];
|
|
||||||
for (i = 0; i < scopes.length; i++) {
|
|
||||||
$scope.policy.config.scopes.push(scopes[i].id);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
});
|
|
||||||
});
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
$scope.policy.config.resources = null;
|
|
||||||
ResourceServerPolicy.scopes({
|
ResourceServerPolicy.scopes({
|
||||||
realm : $route.current.params.realm,
|
realm : $route.current.params.realm,
|
||||||
client : client.id,
|
client : client.id,
|
||||||
id : policy.id
|
id : policy.id
|
||||||
}, function(scopes) {
|
}, function(scopes) {
|
||||||
$scope.policy.config.scopes = [];
|
$scope.selectedScopes = [];
|
||||||
for (i = 0; i < scopes.length; i++) {
|
for (i = 0; i < scopes.length; i++) {
|
||||||
scopes[i].text = scopes[i].name;
|
scopes[i].text = scopes[i].name;
|
||||||
$scope.policy.config.scopes.push(scopes[i]);
|
$scope.selectedScopes.push(scopes[i].id);
|
||||||
}
|
}
|
||||||
|
var copy = angular.copy($scope.selectedScopes);
|
||||||
|
$scope.$watch('selectedScopes', function() {
|
||||||
|
if (!angular.equals($scope.selectedScopes, copy)) {
|
||||||
|
$scope.changed = true;
|
||||||
|
}
|
||||||
|
}, true);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
});
|
||||||
|
});
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
$scope.selectedResource = null;
|
||||||
|
var copy = angular.copy($scope.selectedResource);
|
||||||
|
$scope.$watch('selectedResource', function() {
|
||||||
|
if (!angular.equals($scope.selectedResource, copy)) {
|
||||||
|
$scope.changed = true;
|
||||||
|
}
|
||||||
|
}, true);
|
||||||
|
ResourceServerPolicy.scopes({
|
||||||
|
realm : $route.current.params.realm,
|
||||||
|
client : client.id,
|
||||||
|
id : policy.id
|
||||||
|
}, function(scopes) {
|
||||||
|
$scope.selectedScopes = [];
|
||||||
|
for (i = 0; i < scopes.length; i++) {
|
||||||
|
scopes[i].text = scopes[i].name;
|
||||||
|
$scope.selectedScopes.push(scopes[i]);
|
||||||
|
}
|
||||||
|
var copy = angular.copy($scope.selectedScopes);
|
||||||
|
$scope.$watch('selectedScopes', function() {
|
||||||
|
if (!angular.equals($scope.selectedScopes, copy)) {
|
||||||
|
$scope.changed = true;
|
||||||
|
}
|
||||||
|
}, true);
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
policy.config.applyPolicies = [];
|
|
||||||
ResourceServerPolicy.associatedPolicies({
|
ResourceServerPolicy.associatedPolicies({
|
||||||
realm : $route.current.params.realm,
|
realm : $route.current.params.realm,
|
||||||
client : client.id,
|
client : client.id,
|
||||||
id : policy.id
|
id : policy.id
|
||||||
}, function(policies) {
|
}, function(policies) {
|
||||||
|
$scope.selectedPolicies = [];
|
||||||
for (i = 0; i < policies.length; i++) {
|
for (i = 0; i < policies.length; i++) {
|
||||||
policies[i].text = policies[i].name;
|
policies[i].text = policies[i].name;
|
||||||
$scope.policy.config.applyPolicies.push(policies[i]);
|
$scope.selectedPolicies.push(policies[i]);
|
||||||
}
|
}
|
||||||
|
var copy = angular.copy($scope.selectedPolicies);
|
||||||
|
$scope.$watch('selectedPolicies', function() {
|
||||||
|
if (!angular.equals($scope.selectedPolicies, copy)) {
|
||||||
|
$scope.changed = true;
|
||||||
|
}
|
||||||
|
}, true);
|
||||||
});
|
});
|
||||||
},
|
},
|
||||||
|
|
||||||
onUpdate : function() {
|
onUpdate : function() {
|
||||||
if ($scope.policy.config.resources != null) {
|
if ($scope.selectedResource != null) {
|
||||||
$scope.policy.config.resources = JSON.stringify([$scope.policy.config.resources._id]);
|
$scope.policy.resources = [$scope.selectedResource._id];
|
||||||
} else {
|
} else {
|
||||||
$scope.policy.config.resources = JSON.stringify([""]);
|
delete $scope.policy.resources;
|
||||||
}
|
}
|
||||||
|
|
||||||
var scopes = [];
|
var scopes = [];
|
||||||
|
|
||||||
for (i = 0; i < $scope.policy.config.scopes.length; i++) {
|
for (i = 0; i < $scope.selectedScopes.length; i++) {
|
||||||
if ($scope.policy.config.scopes[i].id) {
|
if ($scope.selectedScopes[i].id) {
|
||||||
scopes.push($scope.policy.config.scopes[i].id);
|
scopes.push($scope.selectedScopes[i].id);
|
||||||
} else {
|
} else {
|
||||||
scopes.push($scope.policy.config.scopes[i]);
|
scopes.push($scope.selectedScopes[i]);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
$scope.policy.config.scopes = JSON.stringify(scopes);
|
$scope.policy.scopes = scopes;
|
||||||
|
|
||||||
var policies = [];
|
var policies = [];
|
||||||
|
|
||||||
for (i = 0; i < $scope.policy.config.applyPolicies.length; i++) {
|
for (i = 0; i < $scope.selectedPolicies.length; i++) {
|
||||||
policies.push($scope.policy.config.applyPolicies[i].id);
|
policies.push($scope.selectedPolicies[i].id);
|
||||||
}
|
}
|
||||||
|
|
||||||
$scope.policy.config.applyPolicies = JSON.stringify(policies);
|
$scope.policy.policies = policies;
|
||||||
|
delete $scope.policy.config;
|
||||||
},
|
},
|
||||||
|
|
||||||
onInitCreate : function(newPolicy) {
|
onInitCreate : function(newPolicy) {
|
||||||
newPolicy.decisionStrategy = 'UNANIMOUS';
|
newPolicy.decisionStrategy = 'UNANIMOUS';
|
||||||
newPolicy.config = {};
|
|
||||||
newPolicy.config.resources = null;
|
|
||||||
|
|
||||||
var scopeId = $location.search()['scpid'];
|
var scopeId = $location.search()['scpid'];
|
||||||
|
|
||||||
|
@ -1171,38 +1232,39 @@ module.controller('ResourceServerPolicyScopeDetailCtrl', function($scope, $route
|
||||||
id: scopeId,
|
id: scopeId,
|
||||||
}, function (data) {
|
}, function (data) {
|
||||||
data.text = data.name;
|
data.text = data.name;
|
||||||
if (!$scope.policy.config.scopes) {
|
if (!$scope.policy.scopes) {
|
||||||
$scope.policy.config.scopes = [];
|
$scope.selectedScopes = [];
|
||||||
}
|
}
|
||||||
$scope.policy.config.scopes.push(data);
|
$scope.selectedScopes.push(data);
|
||||||
});
|
});
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
|
||||||
onCreate : function() {
|
onCreate : function() {
|
||||||
if ($scope.policy.config.resources != null) {
|
if ($scope.selectedResource != null) {
|
||||||
$scope.policy.config.resources = JSON.stringify([$scope.policy.config.resources._id]);
|
$scope.policy.resources = [$scope.selectedResource._id];
|
||||||
}
|
}
|
||||||
|
|
||||||
var scopes = [];
|
var scopes = [];
|
||||||
|
|
||||||
for (i = 0; i < $scope.policy.config.scopes.length; i++) {
|
for (i = 0; i < $scope.selectedScopes.length; i++) {
|
||||||
if ($scope.policy.config.scopes[i].id) {
|
if ($scope.selectedScopes[i].id) {
|
||||||
scopes.push($scope.policy.config.scopes[i].id);
|
scopes.push($scope.selectedScopes[i].id);
|
||||||
} else {
|
} else {
|
||||||
scopes.push($scope.policy.config.scopes[i]);
|
scopes.push($scope.selectedScopes[i]);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
$scope.policy.config.scopes = JSON.stringify(scopes);
|
$scope.policy.scopes = scopes;
|
||||||
|
|
||||||
var policies = [];
|
var policies = [];
|
||||||
|
|
||||||
for (i = 0; i < $scope.policy.config.applyPolicies.length; i++) {
|
for (i = 0; i < $scope.selectedPolicies.length; i++) {
|
||||||
policies.push($scope.policy.config.applyPolicies[i].id);
|
policies.push($scope.selectedPolicies[i].id);
|
||||||
}
|
}
|
||||||
|
|
||||||
$scope.policy.config.applyPolicies = JSON.stringify(policies);
|
$scope.policy.policies = policies;
|
||||||
|
delete $scope.policy.config;
|
||||||
}
|
}
|
||||||
}, realm, client, $scope);
|
}, realm, client, $scope);
|
||||||
});
|
});
|
||||||
|
@ -1264,8 +1326,8 @@ module.controller('ResourceServerPolicyUserDetailCtrl', function($scope, $route,
|
||||||
onInitUpdate : function(policy) {
|
onInitUpdate : function(policy) {
|
||||||
var selectedUsers = [];
|
var selectedUsers = [];
|
||||||
|
|
||||||
if (policy.config.users) {
|
if (policy.users) {
|
||||||
var users = eval(policy.config.users);
|
var users = policy.users;
|
||||||
|
|
||||||
for (i = 0; i < users.length; i++) {
|
for (i = 0; i < users.length; i++) {
|
||||||
User.get({realm: $route.current.params.realm, userId: users[i]}, function(data) {
|
User.get({realm: $route.current.params.realm, userId: users[i]}, function(data) {
|
||||||
|
@ -1289,7 +1351,8 @@ module.controller('ResourceServerPolicyUserDetailCtrl', function($scope, $route,
|
||||||
users.push($scope.selectedUsers[i].id);
|
users.push($scope.selectedUsers[i].id);
|
||||||
}
|
}
|
||||||
|
|
||||||
$scope.policy.config.users = JSON.stringify(users);
|
$scope.policy.users = users;
|
||||||
|
delete $scope.policy.config;
|
||||||
},
|
},
|
||||||
|
|
||||||
onCreate : function() {
|
onCreate : function() {
|
||||||
|
@ -1299,7 +1362,8 @@ module.controller('ResourceServerPolicyUserDetailCtrl', function($scope, $route,
|
||||||
users.push($scope.selectedUsers[i].id);
|
users.push($scope.selectedUsers[i].id);
|
||||||
}
|
}
|
||||||
|
|
||||||
$scope.policy.config.users = JSON.stringify(users);
|
$scope.policy.users = users;
|
||||||
|
delete $scope.policy.config;
|
||||||
}
|
}
|
||||||
}, realm, client, $scope);
|
}, realm, client, $scope);
|
||||||
});
|
});
|
||||||
|
@ -1483,8 +1547,8 @@ module.controller('ResourceServerPolicyRoleDetailCtrl', function($scope, $route,
|
||||||
onInitUpdate : function(policy) {
|
onInitUpdate : function(policy) {
|
||||||
var selectedRoles = [];
|
var selectedRoles = [];
|
||||||
|
|
||||||
if (policy.config.roles) {
|
if (policy.roles) {
|
||||||
var roles = eval(policy.config.roles);
|
var roles = policy.roles;
|
||||||
|
|
||||||
for (i = 0; i < roles.length; i++) {
|
for (i = 0; i < roles.length; i++) {
|
||||||
RoleById.get({realm: $route.current.params.realm, role: roles[i].id}, function(data) {
|
RoleById.get({realm: $route.current.params.realm, role: roles[i].id}, function(data) {
|
||||||
|
@ -1524,7 +1588,7 @@ module.controller('ResourceServerPolicyRoleDetailCtrl', function($scope, $route,
|
||||||
roles.push(role);
|
roles.push(role);
|
||||||
}
|
}
|
||||||
|
|
||||||
$scope.policy.config.roles = JSON.stringify(roles);
|
$scope.policy.roles = roles;
|
||||||
},
|
},
|
||||||
|
|
||||||
onCreate : function() {
|
onCreate : function() {
|
||||||
|
@ -1539,7 +1603,7 @@ module.controller('ResourceServerPolicyRoleDetailCtrl', function($scope, $route,
|
||||||
roles.push(role);
|
roles.push(role);
|
||||||
}
|
}
|
||||||
|
|
||||||
$scope.policy.config.roles = JSON.stringify(roles);
|
$scope.policy.roles = roles;
|
||||||
}
|
}
|
||||||
}, realm, client, $scope);
|
}, realm, client, $scope);
|
||||||
|
|
||||||
|
@ -1743,7 +1807,7 @@ module.controller('ResourceServerPolicyAggregateDetailCtrl', function($scope, $r
|
||||||
}, realm, client, $scope);
|
}, realm, client, $scope);
|
||||||
});
|
});
|
||||||
|
|
||||||
module.service("PolicyController", function($http, $route, $location, ResourceServer, ResourceServerPolicy, AuthzDialog, Notifications) {
|
module.service("PolicyController", function($http, $route, $location, ResourceServer, ResourceServerPolicy, ResourceServerPermission, AuthzDialog, Notifications) {
|
||||||
|
|
||||||
var PolicyController = {};
|
var PolicyController = {};
|
||||||
|
|
||||||
|
@ -1754,6 +1818,12 @@ module.service("PolicyController", function($http, $route, $location, ResourceSe
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var service = ResourceServerPolicy;
|
||||||
|
|
||||||
|
if (delegate.isPermission()) {
|
||||||
|
service = ResourceServerPermission;
|
||||||
|
}
|
||||||
|
|
||||||
$scope.realm = realm;
|
$scope.realm = realm;
|
||||||
$scope.client = client;
|
$scope.client = client;
|
||||||
|
|
||||||
|
@ -1799,7 +1869,7 @@ module.service("PolicyController", function($http, $route, $location, ResourceSe
|
||||||
if (delegate.onCreate) {
|
if (delegate.onCreate) {
|
||||||
delegate.onCreate();
|
delegate.onCreate();
|
||||||
}
|
}
|
||||||
ResourceServerPolicy.save({realm : realm.realm, client : client.id}, $scope.policy, function(data) {
|
service.save({realm : realm.realm, client : client.id, type: $scope.policy.type}, $scope.policy, function(data) {
|
||||||
if (delegate.isPermission()) {
|
if (delegate.isPermission()) {
|
||||||
$location.url("/realms/" + realm.realm + "/clients/" + client.id + "/authz/resource-server/permission/" + $scope.policy.type + "/" + data.id);
|
$location.url("/realms/" + realm.realm + "/clients/" + client.id + "/authz/resource-server/permission/" + $scope.policy.type + "/" + data.id);
|
||||||
Notifications.success("The permission has been created.");
|
Notifications.success("The permission has been created.");
|
||||||
|
@ -1819,9 +1889,10 @@ module.service("PolicyController", function($http, $route, $location, ResourceSe
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
ResourceServerPolicy.get({
|
service.get({
|
||||||
realm: realm.realm,
|
realm: realm.realm,
|
||||||
client : client.id,
|
client : client.id,
|
||||||
|
type: delegate.getPolicyType(),
|
||||||
id: $route.current.params.id
|
id: $route.current.params.id
|
||||||
}, function(data) {
|
}, function(data) {
|
||||||
$scope.originalPolicy = data;
|
$scope.originalPolicy = data;
|
||||||
|
@ -1845,7 +1916,7 @@ module.service("PolicyController", function($http, $route, $location, ResourceSe
|
||||||
if (delegate.onUpdate) {
|
if (delegate.onUpdate) {
|
||||||
delegate.onUpdate();
|
delegate.onUpdate();
|
||||||
}
|
}
|
||||||
ResourceServerPolicy.update({realm : realm.realm, client : client.id, id : $scope.policy.id}, $scope.policy, function() {
|
service.update({realm : realm.realm, client : client.id, type: $scope.policy.type, id : $scope.policy.id}, $scope.policy, function() {
|
||||||
$route.reload();
|
$route.reload();
|
||||||
if (delegate.isPermission()) {
|
if (delegate.isPermission()) {
|
||||||
Notifications.success("The permission has been updated.");
|
Notifications.success("The permission has been updated.");
|
||||||
|
@ -1871,7 +1942,7 @@ module.service("PolicyController", function($http, $route, $location, ResourceSe
|
||||||
$scope.remove = function() {
|
$scope.remove = function() {
|
||||||
var msg = "";
|
var msg = "";
|
||||||
|
|
||||||
ResourceServerPolicy.dependentPolicies({
|
service.dependentPolicies({
|
||||||
realm : $route.current.params.realm,
|
realm : $route.current.params.realm,
|
||||||
client : client.id,
|
client : client.id,
|
||||||
id : $scope.policy.id
|
id : $scope.policy.id
|
||||||
|
@ -1887,7 +1958,7 @@ module.service("PolicyController", function($http, $route, $location, ResourceSe
|
||||||
}
|
}
|
||||||
|
|
||||||
AuthzDialog.confirmDeleteWithMsg($scope.policy.name, "Policy", msg, function() {
|
AuthzDialog.confirmDeleteWithMsg($scope.policy.name, "Policy", msg, function() {
|
||||||
ResourceServerPolicy.delete({realm : $scope.realm.realm, client : $scope.client.id, id : $scope.policy.id}, null, function() {
|
service.delete({realm : $scope.realm.realm, client : $scope.client.id, id : $scope.policy.id}, null, function() {
|
||||||
if (delegate.isPermission()) {
|
if (delegate.isPermission()) {
|
||||||
$location.url("/realms/" + realm.realm + "/clients/" + client.id + "/authz/resource-server/permission");
|
$location.url("/realms/" + realm.realm + "/clients/" + client.id + "/authz/resource-server/permission");
|
||||||
Notifications.success("The permission has been deleted.");
|
Notifications.success("The permission has been deleted.");
|
||||||
|
|
|
@ -36,10 +36,11 @@ module.factory('ResourceServerScope', function($resource) {
|
||||||
});
|
});
|
||||||
|
|
||||||
module.factory('ResourceServerPolicy', function($resource) {
|
module.factory('ResourceServerPolicy', function($resource) {
|
||||||
return $resource(authUrl + '/admin/realms/:realm/clients/:client/authz/resource-server/policy/:id', {
|
return $resource(authUrl + '/admin/realms/:realm/clients/:client/authz/resource-server/policy/:type/:id', {
|
||||||
realm : '@realm',
|
realm : '@realm',
|
||||||
client: '@client',
|
client: '@client',
|
||||||
id : '@id'
|
id : '@id',
|
||||||
|
type: '@type'
|
||||||
}, {
|
}, {
|
||||||
'update' : {method : 'PUT'},
|
'update' : {method : 'PUT'},
|
||||||
'search' : {url: authUrl + '/admin/realms/:realm/clients/:client/authz/resource-server/policy/search', method : 'GET'},
|
'search' : {url: authUrl + '/admin/realms/:realm/clients/:client/authz/resource-server/policy/search', method : 'GET'},
|
||||||
|
@ -50,6 +51,23 @@ module.factory('ResourceServerPolicy', function($resource) {
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
|
module.factory('ResourceServerPermission', function($resource) {
|
||||||
|
return $resource(authUrl + '/admin/realms/:realm/clients/:client/authz/resource-server/permission/:type/:id', {
|
||||||
|
realm : '@realm',
|
||||||
|
client: '@client',
|
||||||
|
type: '@type',
|
||||||
|
id : '@id'
|
||||||
|
}, {
|
||||||
|
'update' : {method : 'PUT'},
|
||||||
|
'search' : {url: authUrl + '/admin/realms/:realm/clients/:client/authz/resource-server/permission/search', method : 'GET'},
|
||||||
|
'searchPolicies' : {url: authUrl + '/admin/realms/:realm/clients/:client/authz/resource-server/policy', method : 'GET', isArray: true},
|
||||||
|
'associatedPolicies' : {url: authUrl + '/admin/realms/:realm/clients/:client/authz/resource-server/policy/:id/associatedPolicies', method : 'GET', isArray: true},
|
||||||
|
'dependentPolicies' : {url: authUrl + '/admin/realms/:realm/clients/:client/authz/resource-server/policy/:id/dependentPolicies', method : 'GET', isArray: true},
|
||||||
|
'scopes' : {url: authUrl + '/admin/realms/:realm/clients/:client/authz/resource-server/permission/:id/scopes', method : 'GET', isArray: true},
|
||||||
|
'resources' : {url: authUrl + '/admin/realms/:realm/clients/:client/authz/resource-server/permission/:id/resources', method : 'GET', isArray: true}
|
||||||
|
});
|
||||||
|
});
|
||||||
|
|
||||||
module.factory('PolicyProvider', function($resource) {
|
module.factory('PolicyProvider', function($resource) {
|
||||||
return $resource(authUrl + '/admin/realms/:realm/clients/:client/authz/resource-server/policy/providers', {
|
return $resource(authUrl + '/admin/realms/:realm/clients/:client/authz/resource-server/policy/providers', {
|
||||||
realm : '@realm',
|
realm : '@realm',
|
||||||
|
|
|
@ -29,25 +29,25 @@
|
||||||
<kc-tooltip>{{:: 'authz-permission-description.tooltip' | translate}}</kc-tooltip>
|
<kc-tooltip>{{:: 'authz-permission-description.tooltip' | translate}}</kc-tooltip>
|
||||||
</div>
|
</div>
|
||||||
<div class="form-group">
|
<div class="form-group">
|
||||||
<label class="col-md-2 control-label" for="policy.config.default">{{:: 'authz-permission-resource-apply-to-resource-type' | translate}}</label>
|
<label class="col-md-2 control-label" for="applyToResourceTypeFlag">{{:: 'authz-permission-resource-apply-to-resource-type' | translate}}</label>
|
||||||
<div class="col-md-6">
|
<div class="col-md-6">
|
||||||
<input ng-model="policy.config.default" id="policy.config.default" onoffswitch data-ng-click="applyToResourceType()"/>
|
<input ng-model="applyToResourceTypeFlag" id="applyToResourceTypeFlag" onoffswitch data-ng-click="applyToResourceType()"/>
|
||||||
</div>
|
</div>
|
||||||
<kc-tooltip>{{:: 'authz-permission-resource-apply-to-resource-type.tooltip' | translate}}</kc-tooltip>
|
<kc-tooltip>{{:: 'authz-permission-resource-apply-to-resource-type.tooltip' | translate}}</kc-tooltip>
|
||||||
</div>
|
</div>
|
||||||
<div class="form-group clearfix" data-ng-hide="policy.config.default">
|
<div class="form-group clearfix" data-ng-hide="applyToResourceTypeFlag">
|
||||||
<label class="col-md-2 control-label" for="reqActions">{{:: 'authz-resources' | translate}} <span class="required">*</span></label>
|
<label class="col-md-2 control-label" for="reqActions">{{:: 'authz-resources' | translate}} <span class="required">*</span></label>
|
||||||
|
|
||||||
<div class="col-md-6">
|
<div class="col-md-6">
|
||||||
<input type="hidden" ui-select2="resourcesUiSelect" id="reqActions" data-ng-model="policy.config.resources" data-placeholder="{{:: 'authz-select-resource' | translate}}..." data-ng-required="!policy.config.default"/>
|
<input type="hidden" ui-select2="resourcesUiSelect" id="reqActions" data-ng-model="selectedResource" data-placeholder="{{:: 'authz-select-resource' | translate}}..." data-ng-required="!applyToResourceTypeFlag"/>
|
||||||
</div>
|
</div>
|
||||||
<kc-tooltip>{{:: 'authz-permission-resource-resource.tooltip' | translate}}</kc-tooltip>
|
<kc-tooltip>{{:: 'authz-permission-resource-resource.tooltip' | translate}}</kc-tooltip>
|
||||||
</div>
|
</div>
|
||||||
<div class="form-group clearfix" data-ng-show="policy.config.default">
|
<div class="form-group clearfix" data-ng-show="applyToResourceTypeFlag">
|
||||||
<label class="col-md-2 control-label" for="policy.config.defaultResourceType">{{:: 'authz-resource-type' | translate}} <span class="required">*</span></label>
|
<label class="col-md-2 control-label" for="policy.resourceType">{{:: 'authz-resource-type' | translate}} <span class="required">*</span></label>
|
||||||
|
|
||||||
<div class="col-md-6">
|
<div class="col-md-6">
|
||||||
<input class="form-control" type="text" id="policy.config.defaultResourceType" name="policy.config.defaultResourceType" data-ng-model="policy.config.defaultResourceType" data-ng-required="policy.config.default">
|
<input class="form-control" type="text" id="policy.resourceType" name="policy.resourceType" data-ng-model="policy.resourceType" data-ng-required="applyToResourceTypeFlag">
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<kc-tooltip>{{:: 'authz-permission-resource-type.tooltip' | translate}}</kc-tooltip>
|
<kc-tooltip>{{:: 'authz-permission-resource-type.tooltip' | translate}}</kc-tooltip>
|
||||||
|
@ -56,7 +56,7 @@
|
||||||
<label class="col-md-2 control-label" for="reqActions">{{:: 'authz-policy-apply-policy' | translate}} <span class="required">*</span></label>
|
<label class="col-md-2 control-label" for="reqActions">{{:: 'authz-policy-apply-policy' | translate}} <span class="required">*</span></label>
|
||||||
|
|
||||||
<div class="col-md-6">
|
<div class="col-md-6">
|
||||||
<input type="hidden" ui-select2="policiesUiSelect" id="reqActions" data-ng-model="policy.config.applyPolicies" data-placeholder="{{:: 'authz-select-a-policy' | translate}}..." multiple required />
|
<input type="hidden" ui-select2="policiesUiSelect" id="reqActions" data-ng-model="selectedPolicies" data-placeholder="{{:: 'authz-select-a-policy' | translate}}..." multiple required />
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<kc-tooltip>{{:: 'authz-policy-apply-policy.tooltip' | translate}}</kc-tooltip>
|
<kc-tooltip>{{:: 'authz-policy-apply-policy.tooltip' | translate}}</kc-tooltip>
|
||||||
|
|
|
@ -32,27 +32,28 @@
|
||||||
<label class="col-md-2 control-label" for="reqActions">{{:: 'authz-resource' | translate}}</label>
|
<label class="col-md-2 control-label" for="reqActions">{{:: 'authz-resource' | translate}}</label>
|
||||||
|
|
||||||
<div class="col-md-6">
|
<div class="col-md-6">
|
||||||
<input type="hidden" ui-select2="resourcesUiSelect" data-ng-change="selectResource()" id="reqActions" data-ng-model="policy.config.resources" data-placeholder="{{:: 'authz-any-resource' | translate}}..." />
|
<input type="hidden" ui-select2="resourcesUiSelect" data-ng-change="selectResource()" id="reqActions" data-ng-model="selectedResource" data-placeholder="{{:: 'authz-any-resource' | translate}}..." />
|
||||||
</div>
|
</div>
|
||||||
<kc-tooltip>{{:: 'authz-permission-scope-resource.tooltip' | translate}}</kc-tooltip>
|
<kc-tooltip>{{:: 'authz-permission-scope-resource.tooltip' | translate}}</kc-tooltip>
|
||||||
</div>
|
</div>
|
||||||
<div class="form-group clearfix" data-ng-show="policy.config.resources">
|
<div class="form-group clearfix" data-ng-show="selectedResource">
|
||||||
<label class="col-md-2 control-label" for="reqActions">{{:: 'authz-scopes' | translate}} <span class="required">*</span></label>
|
<label class="col-md-2 control-label" for="reqActions">{{:: 'authz-scopes' | translate}} <span class="required">*</span></label>
|
||||||
|
|
||||||
<div class="col-md-6">
|
<div class="col-md-6">
|
||||||
<select ui-select2 id="reqActions2"
|
<select ui-select2 id="reqActions2"
|
||||||
data-ng-model="policy.config.scopes"
|
data-ng-model="selectedScopes"
|
||||||
data-placeholder="{{:: 'authz-any-scope' | translate}}..." multiple
|
data-placeholder="{{:: 'authz-any-scope' | translate}}..." multiple
|
||||||
data-ng-required="policy.config.resources != null"
|
data-ng-required="selectedResource != null">
|
||||||
data-ng-options="scope.id as scope.name for scope in policy.config.resources.scopes track by scope.id"/>
|
<option ng-repeat="scope in resourceScopes" value="{{scope.id}}">{{scope.name}}</option>
|
||||||
|
</select>
|
||||||
</div>
|
</div>
|
||||||
<kc-tooltip>{{:: 'authz-permission-scope-scope.tooltip' | translate}}</kc-tooltip>
|
<kc-tooltip>{{:: 'authz-permission-scope-scope.tooltip' | translate}}</kc-tooltip>
|
||||||
</div>
|
</div>
|
||||||
<div class="form-group clearfix" data-ng-show="!policy.config.resources">
|
<div class="form-group clearfix" data-ng-show="!selectedResource">
|
||||||
<label class="col-md-2 control-label" for="reqActions">{{:: 'authz-scopes' | translate}} <span class="required">*</span></label>
|
<label class="col-md-2 control-label" for="reqActions">{{:: 'authz-scopes' | translate}} <span class="required">*</span></label>
|
||||||
|
|
||||||
<div class="col-md-6">
|
<div class="col-md-6">
|
||||||
<input type="hidden" ui-select2="scopesUiSelect" id="reqActions" data-ng-model="policy.config.scopes" data-placeholder="{{:: 'authz-any-scope' | translate}}..." multiple data-ng-required="policy.config.resources == null" />
|
<input type="hidden" ui-select2="scopesUiSelect" id="reqActions" data-ng-model="selectedScopes" data-placeholder="{{:: 'authz-any-scope' | translate}}..." multiple data-ng-required="selectedResource == null" />
|
||||||
</div>
|
</div>
|
||||||
<kc-tooltip>{{:: 'authz-permission-scope-scope.tooltip' | translate}}</kc-tooltip>
|
<kc-tooltip>{{:: 'authz-permission-scope-scope.tooltip' | translate}}</kc-tooltip>
|
||||||
</div>
|
</div>
|
||||||
|
@ -60,7 +61,7 @@
|
||||||
<label class="col-md-2 control-label" for="reqActions">{{:: 'authz-policy-apply-policy' | translate}} <span class="required">*</span></label>
|
<label class="col-md-2 control-label" for="reqActions">{{:: 'authz-policy-apply-policy' | translate}} <span class="required">*</span></label>
|
||||||
|
|
||||||
<div class="col-md-6">
|
<div class="col-md-6">
|
||||||
<input type="hidden" ui-select2="policiesUiSelect" id="reqActions" data-ng-model="policy.config.applyPolicies" data-placeholder="{{:: 'authz-select-a-policy' | translate}}..." multiple required />
|
<input type="hidden" ui-select2="policiesUiSelect" id="reqActions" data-ng-model="selectedPolicies" data-placeholder="{{:: 'authz-select-a-policy' | translate}}..." multiple required />
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<kc-tooltip>{{:: 'authz-policy-apply-policy.tooltip' | translate}}</kc-tooltip>
|
<kc-tooltip>{{:: 'authz-policy-apply-policy.tooltip' | translate}}</kc-tooltip>
|
||||||
|
|
Loading…
Reference in a new issue