diff --git a/testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/java/org/keycloak/testsuite/rest/TestingResourceProvider.java b/testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/java/org/keycloak/testsuite/rest/TestingResourceProvider.java
index ca5156b926..e484645326 100644
--- a/testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/java/org/keycloak/testsuite/rest/TestingResourceProvider.java
+++ b/testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/java/org/keycloak/testsuite/rest/TestingResourceProvider.java
@@ -61,7 +61,19 @@ import org.keycloak.events.EventType;
import org.keycloak.events.admin.AdminEventQuery;
import org.keycloak.events.admin.AuthDetails;
import org.keycloak.events.admin.OperationType;
+import org.keycloak.exportimport.ExportImportManager;
+import org.keycloak.models.AuthenticationFlowModel;
+import org.keycloak.models.ClientModel;
+import org.keycloak.models.FederatedIdentityModel;
+import org.keycloak.models.RealmProvider;
+import org.keycloak.models.UserCredentialModel;
+import org.keycloak.models.UserFederationProvider;
+import org.keycloak.models.UserFederationProviderFactory;
+import org.keycloak.models.UserModel;
+import org.keycloak.models.UserProvider;
import org.keycloak.representations.idm.AuthDetailsRepresentation;
+import org.keycloak.representations.idm.AuthenticationFlowRepresentation;
+import org.keycloak.representations.idm.UserRepresentation;
/**
* @author Stian Thorgersen
@@ -544,4 +556,93 @@ public class TestingResourceProvider implements RealmResourceProvider {
result.setUsername(PassThroughAuthenticator.username);
return result;
}
+
+ @GET
+ @Path("/run-import")
+ @Produces(MediaType.APPLICATION_JSON)
+ public Response runImport() {
+ new ExportImportManager(session).runImport();
+ return Response.ok().build();
+ }
+
+ @GET
+ @Path("/run-export")
+ @Produces(MediaType.APPLICATION_JSON)
+ public Response runExport() {
+ new ExportImportManager(session).runExport();
+ return Response.ok().build();
+ }
+
+ @GET
+ @Path("/valid-credentials")
+ @Produces(MediaType.APPLICATION_JSON)
+ public boolean validCredentials(@QueryParam("realmName") String realmName, @QueryParam("userName") String userName, @QueryParam("password") String password) {
+ RealmModel realm = session.realms().getRealm(realmName);
+ if (realm == null) return false;
+ UserProvider userProvider = session.getProvider(UserProvider.class);
+ UserModel user = userProvider.getUserByUsername(userName, realm);
+ return userProvider.validCredentials(session, realm, user, UserCredentialModel.password(password));
+ }
+
+ @GET
+ @Path("/user-by-federated-identity")
+ @Produces(MediaType.APPLICATION_JSON)
+ public UserRepresentation getUserByFederatedIdentity(@QueryParam("realmName") String realmName,
+ @QueryParam("identityProvider") String identityProvider,
+ @QueryParam("userId") String userId,
+ @QueryParam("userName") String userName) {
+ RealmModel realm = getRealmByName(realmName);
+ UserModel foundFederatedUser = session.users().getUserByFederatedIdentity(new FederatedIdentityModel(identityProvider, userId, userName), realm);
+ if (foundFederatedUser == null) return null;
+ return ModelToRepresentation.toRepresentation(foundFederatedUser);
+ }
+
+ @GET
+ @Path("/user-by-username-from-fed-factory")
+ @Produces(MediaType.APPLICATION_JSON)
+ public UserRepresentation getUserByUsernameFromFedProviderFactory(@QueryParam("realmName") String realmName,
+ @QueryParam("userName") String userName) {
+ RealmModel realm = getRealmByName(realmName);
+ UserFederationProviderFactory factory = (UserFederationProviderFactory)session.getKeycloakSessionFactory().getProviderFactory(UserFederationProvider.class, "dummy");
+ UserModel user = factory.getInstance(session, null).getUserByUsername(realm, userName);
+ if (user == null) return null;
+ return ModelToRepresentation.toRepresentation(user);
+ }
+
+ @GET
+ @Path("/get-client-auth-flow")
+ @Produces(MediaType.APPLICATION_JSON)
+ public AuthenticationFlowRepresentation getClientAuthFlow(@QueryParam("realmName") String realmName) {
+ RealmModel realm = getRealmByName(realmName);
+ AuthenticationFlowModel flow = realm.getClientAuthenticationFlow();
+ if (flow == null) return null;
+ return ModelToRepresentation.toRepresentation(realm, flow);
+ }
+
+ @GET
+ @Path("/get-reset-cred-flow")
+ @Produces(MediaType.APPLICATION_JSON)
+ public AuthenticationFlowRepresentation getResetCredFlow(@QueryParam("realmName") String realmName) {
+ RealmModel realm = getRealmByName(realmName);
+ AuthenticationFlowModel flow = realm.getResetCredentialsFlow();
+ if (flow == null) return null;
+ return ModelToRepresentation.toRepresentation(realm, flow);
+ }
+
+ @GET
+ @Path("/get-user-by-service-account-client")
+ @Produces(MediaType.APPLICATION_JSON)
+ public UserRepresentation getUserByServiceAccountClient(@QueryParam("realmName") String realmName, @QueryParam("clientId") String clientId) {
+ RealmModel realm = getRealmByName(realmName);
+ ClientModel client = realm.getClientByClientId(clientId);
+ UserModel user = session.users().getUserByServiceAccountClient(client);
+ if (user == null) return null;
+ return ModelToRepresentation.toRepresentation(user);
+ }
+
+ private RealmModel getRealmByName(String realmName) {
+ RealmProvider realmProvider = session.getProvider(RealmProvider.class);
+ return realmProvider.getRealmByName(realmName);
+ }
+
}
diff --git a/testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/client/resources/TestingResource.java b/testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/client/resources/TestingResource.java
index 23d2d012b8..8bd36f3f64 100644
--- a/testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/client/resources/TestingResource.java
+++ b/testsuite/integration-arquillian/tests/base/src/main/java/org/keycloak/testsuite/client/resources/TestingResource.java
@@ -20,7 +20,9 @@ package org.keycloak.testsuite.client.resources;
import java.util.Date;
import java.util.List;
import org.keycloak.representations.idm.AdminEventRepresentation;
+import org.keycloak.representations.idm.AuthenticationFlowRepresentation;
import org.keycloak.representations.idm.EventRepresentation;
+import org.keycloak.representations.idm.UserRepresentation;
import org.keycloak.testsuite.rest.representation.AuthenticatorState;
import javax.ws.rs.Consumes;
@@ -35,6 +37,7 @@ import javax.ws.rs.core.MediaType;
import javax.ws.rs.core.Response;
import java.util.Map;
import org.jboss.resteasy.annotations.cache.NoCache;
+import org.keycloak.exportimport.ExportImportManager;
/**
* @author Marko Strukelj
@@ -202,4 +205,48 @@ public interface TestingResource {
@Path("/update-pass-through-auth-state")
@Produces(MediaType.APPLICATION_JSON)
AuthenticatorState updateAuthenticator(AuthenticatorState state);
+
+ @GET
+ @Path("/run-import")
+ @Produces(MediaType.APPLICATION_JSON)
+ public Response runImport();
+
+ @GET
+ @Path("/run-export")
+ @Produces(MediaType.APPLICATION_JSON)
+ public Response runExport();
+
+ @GET
+ @Path("/valid-credentials")
+ @Produces(MediaType.APPLICATION_JSON)
+ public boolean validCredentials(@QueryParam("realmName") String realmName, @QueryParam("userName") String userName, @QueryParam("password") String password);
+
+ @GET
+ @Path("/user-by-federated-identity")
+ @Produces(MediaType.APPLICATION_JSON)
+ public UserRepresentation getUserByFederatedIdentity(@QueryParam("realmName") String realmName,
+ @QueryParam("identityProvider") String identityProvider,
+ @QueryParam("userId") String userId,
+ @QueryParam("userName") String userName);
+
+ @GET
+ @Path("/user-by-username-from-fed-factory")
+ @Produces(MediaType.APPLICATION_JSON)
+ public UserRepresentation getUserByUsernameFromFedProviderFactory(@QueryParam("realmName") String realmName,
+ @QueryParam("userName") String userName);
+
+ @GET
+ @Path("/get-client-auth-flow")
+ @Produces(MediaType.APPLICATION_JSON)
+ public AuthenticationFlowRepresentation getClientAuthFlow(@QueryParam("realmName") String realmName);
+
+ @GET
+ @Path("/get-reset-cred-flow")
+ @Produces(MediaType.APPLICATION_JSON)
+ public AuthenticationFlowRepresentation getResetCredFlow(@QueryParam("realmName") String realmName);
+
+ @GET
+ @Path("/get-user-by-service-account-client")
+ @Produces(MediaType.APPLICATION_JSON)
+ public UserRepresentation getUserByServiceAccountClient(@QueryParam("realmName") String realmName, @QueryParam("clientId") String clientId);
}
diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/TestRealmKeycloakTest.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/TestRealmKeycloakTest.java
index 0e41cee957..4eaba86045 100644
--- a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/TestRealmKeycloakTest.java
+++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/TestRealmKeycloakTest.java
@@ -28,28 +28,12 @@ import static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;
/**
* This class provides loading of the testRealm called "test". It also
- * provides an OAuthClient for the testRealm.
+ * provides a few utility methods for the testRealm.
*
* @author Stan Silvert ssilvert@redhat.com (C) 2016 Red Hat Inc.
*/
public abstract class TestRealmKeycloakTest extends AbstractKeycloakTest {
- protected UserRepresentation findUserInRealmRep(RealmRepresentation testRealm, String userName) {
- for (UserRepresentation user : testRealm.getUsers()) {
- if (user.getUsername().equals(userName)) return user;
- }
-
- return null;
- }
-
- protected ClientRepresentation findClientInRealmRep(RealmRepresentation testRealm, String clientId) {
- for (ClientRepresentation client : testRealm.getClients()) {
- if (client.getClientId().equals(clientId)) return client;
- }
-
- return null;
- }
-
protected RealmResource testRealm() {
return adminClient.realm("test");
}
diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/account/ProfileTest.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/account/ProfileTest.java
index 670e340919..a1a1813f01 100755
--- a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/account/ProfileTest.java
+++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/account/ProfileTest.java
@@ -53,6 +53,7 @@ import org.keycloak.testsuite.TestRealmKeycloakTest;
import org.keycloak.testsuite.admin.ApiUtil;
import org.keycloak.testsuite.util.ClientBuilder;
import org.keycloak.testsuite.util.RealmBuilder;
+import org.keycloak.testsuite.util.RealmRepUtil;
import org.keycloak.testsuite.util.UserBuilder;
import twitter4j.JSONArray;
import twitter4j.JSONObject;
@@ -68,7 +69,7 @@ public class ProfileTest extends TestRealmKeycloakTest {
@Override
public void configureTestRealm(RealmRepresentation testRealm) {
- UserRepresentation user = findUserInRealmRep(testRealm, "test-user@localhost");
+ UserRepresentation user = RealmRepUtil.findUser(testRealm, "test-user@localhost");
user.setFirstName("First");
user.setLastName("Last");
Map attributes = user.getAttributes();
@@ -87,7 +88,7 @@ public class ProfileTest extends TestRealmKeycloakTest {
RealmBuilder.edit(testRealm)
.user(user2);
- ClientBuilder.edit(findClientInRealmRep(testRealm, "test-app"))
+ ClientBuilder.edit(RealmRepUtil.findClientByClientId(testRealm, "test-app"))
.addWebOrigin("http://localtest.me:8180");
}
diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/account/TrustStoreEmailTest.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/account/TrustStoreEmailTest.java
index 499e387741..75ba24ebf1 100644
--- a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/account/TrustStoreEmailTest.java
+++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/account/TrustStoreEmailTest.java
@@ -59,7 +59,7 @@ public class TrustStoreEmailTest extends TestRealmKeycloakTest {
public void configureTestRealm(RealmRepresentation testRealm) {
log.info("enable verify email and configure smtp server to run with ssl in test realm");
- user = findUserInRealmRep(testRealm, "test-user@localhost");
+ user = RealmRepUtil.findUser(testRealm, "test-user@localhost");
testRealm.setSmtpServer(SslMailServer.getServerConfiguration());
testRealm.setVerifyEmail(true);
}
diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/ApiUtil.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/ApiUtil.java
index dca666fab9..d7946ce6c7 100644
--- a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/ApiUtil.java
+++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/ApiUtil.java
@@ -60,6 +60,15 @@ public class ApiUtil {
return path.substring(path.lastIndexOf('/') + 1);
}
+ public static ClientResource findClientResourceById(RealmResource realm, String id) {
+ for (ClientRepresentation c : realm.clients().findAll()) {
+ if (c.getId().equals(id)) {
+ return realm.clients().get(c.getId());
+ }
+ }
+ return null;
+ }
+
public static ClientResource findClientResourceByClientId(RealmResource realm, String clientId) {
for (ClientRepresentation c : realm.clients().findAll()) {
if (c.getClientId().equals(clientId)) {
diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/ExportImportTest.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/ExportImportTest.java
new file mode 100755
index 0000000000..3a6a1bbe2b
--- /dev/null
+++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/ExportImportTest.java
@@ -0,0 +1,240 @@
+/*
+ * Copyright 2016 Red Hat, Inc. and/or its affiliates
+ * and other contributors as indicated by the @author tags.
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.keycloak.testsuite.exportimport;
+
+import org.junit.Assert;
+import org.junit.Test;
+import org.keycloak.exportimport.ExportImportConfig;
+import org.keycloak.exportimport.dir.DirExportProvider;
+import org.keycloak.exportimport.dir.DirExportProviderFactory;
+import org.keycloak.exportimport.singlefile.SingleFileExportProviderFactory;
+import org.keycloak.representations.idm.RealmRepresentation;
+
+import java.io.File;
+import java.net.URL;
+import java.util.List;
+import java.util.regex.Matcher;
+import org.jboss.arquillian.container.spi.client.container.LifecycleException;
+import org.junit.After;
+import org.keycloak.admin.client.resource.RealmResource;
+import org.keycloak.representations.idm.UserRepresentation;
+import org.keycloak.testsuite.util.UserBuilder;
+
+import static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;
+
+/**
+ *
+ *
+ * @author Marek Posolda
+ * @author Stan Silvert ssilvert@redhat.com (C) 2016 Red Hat Inc.
+ */
+public class ExportImportTest extends AbstractExportImportTest {
+
+ @Override
+ public void addTestRealms(List testRealms) {
+ RealmRepresentation testRealm1 = loadJson(getClass().getResourceAsStream("/testrealm.json"), RealmRepresentation.class);
+ testRealm1.getUsers().add(makeUser("user1"));
+ testRealm1.getUsers().add(makeUser("user2"));
+ testRealm1.getUsers().add(makeUser("user3"));
+ testRealms.add(testRealm1);
+
+ RealmRepresentation testRealm2 = loadJson(getClass().getResourceAsStream("/model/testrealm.json"), RealmRepresentation.class);
+ testRealm2.setId("test-realm");
+ testRealms.add(testRealm2);
+ }
+
+ private UserRepresentation makeUser(String userName) {
+ return UserBuilder.create()
+ .username(userName)
+ .email(userName + "@test.com")
+ .password("password")
+ .build();
+ }
+
+ @After
+ public void clearExportImportProps() throws LifecycleException {
+ clearExportImportProperties();
+ }
+
+ @Test
+ public void testDirFullExportImport() throws Throwable {
+ ExportImportConfig.setProvider(DirExportProviderFactory.PROVIDER_ID);
+ String targetDirPath = getExportImportTestDirectory() + File.separator + "dirExport";
+ DirExportProvider.recursiveDeleteDir(new File(targetDirPath));
+ ExportImportConfig.setDir(targetDirPath);
+ ExportImportConfig.setUsersPerFile(ExportImportConfig.DEFAULT_USERS_PER_FILE);
+
+ testFullExportImport();
+
+ // There should be 6 files in target directory (3 realm, 3 user)
+ Assert.assertEquals(6, new File(targetDirPath).listFiles().length);
+ }
+
+ @Test
+ public void testDirRealmExportImport() throws Throwable {
+ ExportImportConfig.setProvider(DirExportProviderFactory.PROVIDER_ID);
+ String targetDirPath = getExportImportTestDirectory() + File.separator + "dirRealmExport";
+ DirExportProvider.recursiveDeleteDir(new File(targetDirPath));
+ ExportImportConfig.setDir(targetDirPath);
+ ExportImportConfig.setUsersPerFile(3);
+
+ testRealmExportImport();
+
+ // There should be 3 files in target directory (1 realm, 3 user)
+ File[] files = new File(targetDirPath).listFiles();
+ Assert.assertEquals(4, files.length);
+ }
+
+ @Test
+ public void testSingleFileFullExportImport() throws Throwable {
+ ExportImportConfig.setProvider(SingleFileExportProviderFactory.PROVIDER_ID);
+ String targetFilePath = getExportImportTestDirectory() + File.separator + "singleFile-full.json";
+ ExportImportConfig.setFile(targetFilePath);
+
+ testFullExportImport();
+ }
+
+ @Test
+ public void testSingleFileRealmExportImport() throws Throwable {
+ ExportImportConfig.setProvider(SingleFileExportProviderFactory.PROVIDER_ID);
+ String targetFilePath = getExportImportTestDirectory() + File.separator + "singleFile-realm.json";
+ ExportImportConfig.setFile(targetFilePath);
+
+ testRealmExportImport();
+ }
+
+ @Test
+ public void testSingleFileRealmWithoutBuiltinsImport() throws Throwable {
+ // Remove test realm
+ removeRealm("test-realm");
+
+ // Set the realm, which doesn't have builtin clients/roles inside JSON
+ ExportImportConfig.setProvider(SingleFileExportProviderFactory.PROVIDER_ID);
+ URL url = ExportImportTest.class.getResource("/model/testrealm.json");
+ String targetFilePath = new File(url.getFile()).getAbsolutePath();
+ ExportImportConfig.setFile(targetFilePath);
+
+ ExportImportConfig.setAction(ExportImportConfig.ACTION_IMPORT);
+
+ testingClient.testing().runImport();
+
+ RealmResource testRealmRealm = adminClient.realm("test-realm");
+
+ ExportImportUtil.assertDataImportedInRealm(adminClient, testingClient, testRealmRealm.toRepresentation());
+ }
+
+
+ private void removeRealm(String realmName) {
+ adminClient.realm(realmName).remove();
+ }
+
+ private void testFullExportImport() throws LifecycleException {
+ ExportImportConfig.setAction(ExportImportConfig.ACTION_EXPORT);
+ ExportImportConfig.setRealmName(null);
+
+ testingClient.testing().runExport();
+
+ removeRealm("test");
+ removeRealm("test-realm");
+ Assert.assertEquals(1, adminClient.realms().findAll().size());
+
+ assertNotAuthenticated("test", "test-user@localhost", "password");
+ assertNotAuthenticated("test", "user1", "password");
+ assertNotAuthenticated("test", "user2", "password");
+ assertNotAuthenticated("test", "user3", "password");
+
+ // Configure import
+ ExportImportConfig.setAction(ExportImportConfig.ACTION_IMPORT);
+
+ testingClient.testing().runImport();
+
+ // Ensure data are imported back
+ Assert.assertEquals(3, adminClient.realms().findAll().size());
+
+ assertAuthenticated("test", "test-user@localhost", "password");
+ assertAuthenticated("test", "user1", "password");
+ assertAuthenticated("test", "user2", "password");
+ assertAuthenticated("test", "user3", "password");
+ }
+
+ private void testRealmExportImport() throws LifecycleException {
+ ExportImportConfig.setAction(ExportImportConfig.ACTION_EXPORT);
+ ExportImportConfig.setRealmName("test");
+
+ testingClient.testing().runExport();
+
+ // Delete some realm (and some data in admin realm)
+ adminClient.realm("test").remove();
+
+ Assert.assertEquals(2, adminClient.realms().findAll().size());
+
+ assertNotAuthenticated("test", "test-user@localhost", "password");
+ assertNotAuthenticated("test", "user1", "password");
+ assertNotAuthenticated("test", "user2", "password");
+ assertNotAuthenticated("test", "user3", "password");
+
+ // Configure import
+ ExportImportConfig.setAction(ExportImportConfig.ACTION_IMPORT);
+
+ testingClient.testing().runImport();
+
+ // Ensure data are imported back, but just for "test" realm
+ Assert.assertEquals(3, adminClient.realms().findAll().size());
+
+ assertAuthenticated("test", "test-user@localhost", "password");
+ assertAuthenticated("test", "user1", "password");
+ assertAuthenticated("test", "user2", "password");
+ assertAuthenticated("test", "user3", "password");
+ }
+
+ private void assertAuthenticated(String realmName, String username, String password) {
+ assertAuth(true, realmName, username, password);
+ }
+
+ private void assertNotAuthenticated(String realmName, String username, String password) {
+ assertAuth(false, realmName, username, password);
+ }
+
+ private void assertAuth(boolean expectedResult, String realmName, String username, String password) {
+ Assert.assertEquals(expectedResult, testingClient.testing().validCredentials(realmName, username, password));
+ }
+
+ private static String getExportImportTestDirectory() {
+ String dirPath = null;
+ String relativeDirExportImportPath = "testsuite" + File.separator +
+ "integration-arquillian" + File.separator +
+ "tests" + File.separator +
+ "base" + File.separator +
+ "target" + File.separator +
+ "export-import";
+
+ if (System.getProperties().containsKey("maven.home")) {
+ dirPath = System.getProperty("user.dir").replaceFirst("testsuite.integration.*", Matcher.quoteReplacement(relativeDirExportImportPath));
+ } else {
+ for (String c : System.getProperty("java.class.path").split(File.pathSeparator)) {
+ if (c.contains(File.separator + "testsuite" + File.separator + "integration-arquillian" + File.separator)) {
+ dirPath = c.replaceFirst("testsuite.integration-arquillian.*", Matcher.quoteReplacement(relativeDirExportImportPath));
+ }
+ }
+ }
+
+ String absolutePath = new File(dirPath).getAbsolutePath();
+ return absolutePath;
+ }
+
+}
diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/ExportImportUtil.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/ExportImportUtil.java
new file mode 100644
index 0000000000..d09a96f8b8
--- /dev/null
+++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/exportimport/ExportImportUtil.java
@@ -0,0 +1,549 @@
+/*
+ * Copyright 2016 Red Hat Inc. and/or its affiliates and other contributors
+ * as indicated by the @author tags. All rights reserved.
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License"); you may not
+ * use this file except in compliance with the License. You may obtain a copy of
+ * the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+ * License for the specific language governing permissions and limitations under
+ * the License.
+ */
+
+package org.keycloak.testsuite.exportimport;
+
+import java.util.Collection;
+import java.util.HashSet;
+import java.util.LinkedList;
+import java.util.List;
+import java.util.Map;
+import java.util.Set;
+import org.junit.Assert;
+import org.keycloak.admin.client.Keycloak;
+import org.keycloak.admin.client.resource.ClientResource;
+import org.keycloak.admin.client.resource.ClientTemplateResource;
+import org.keycloak.admin.client.resource.RealmResource;
+import org.keycloak.admin.client.resource.UserResource;
+import org.keycloak.common.constants.KerberosConstants;
+import org.keycloak.federation.ldap.mappers.FullNameLDAPFederationMapper;
+import org.keycloak.federation.ldap.mappers.FullNameLDAPFederationMapperFactory;
+import org.keycloak.models.Constants;
+import org.keycloak.models.LDAPConstants;
+import org.keycloak.models.utils.DefaultAuthenticationFlows;
+import org.keycloak.protocol.oidc.OIDCLoginProtocol;
+import org.keycloak.protocol.oidc.mappers.OIDCAttributeMapperHelper;
+import org.keycloak.protocol.oidc.mappers.UserSessionNoteMapper;
+import org.keycloak.representations.idm.AuthenticationFlowRepresentation;
+import org.keycloak.representations.idm.ClientMappingsRepresentation;
+import org.keycloak.representations.idm.ClientRepresentation;
+import org.keycloak.representations.idm.ClientTemplateRepresentation;
+import org.keycloak.representations.idm.FederatedIdentityRepresentation;
+import org.keycloak.representations.idm.IdentityProviderRepresentation;
+import org.keycloak.representations.idm.ProtocolMapperRepresentation;
+import org.keycloak.representations.idm.RealmRepresentation;
+import org.keycloak.representations.idm.RoleRepresentation;
+import org.keycloak.representations.idm.UserFederationMapperRepresentation;
+import org.keycloak.representations.idm.UserFederationProviderRepresentation;
+import org.keycloak.representations.idm.UserRepresentation;
+import org.keycloak.testsuite.admin.ApiUtil;
+import org.keycloak.testsuite.client.KeycloakTestingClient;
+import org.keycloak.testsuite.util.RealmRepUtil;
+
+/**
+ *
+ * @author Stan Silvert ssilvert@redhat.com (C) 2016 Red Hat Inc.
+ */
+public class ExportImportUtil {
+
+ // In the old testsuite, this method exists as a public method of ImportTest from the model package.
+ // However, model package is not ready to be migrated yet.
+ public static void assertDataImportedInRealm(Keycloak adminClient, KeycloakTestingClient testingClient, RealmRepresentation realm) {
+ Assert.assertTrue(realm.isVerifyEmail());
+ Assert.assertEquals((Integer)3600000, realm.getOfflineSessionIdleTimeout());
+ Assert.assertEquals((Integer)1500, realm.getAccessTokenLifespanForImplicitFlow());
+
+ Set creds = realm.getRequiredCredentials();
+ Assert.assertEquals(1, creds.size());
+ String cred = (String)creds.iterator().next();
+ Assert.assertEquals("password", cred);
+ Assert.assertEquals(3, realm.getDefaultRoles().size());
+
+ //Assert.assertNotNull(realm.getRole("foo"));
+ Assert.assertNotNull(RealmRepUtil.findDefaultRole(realm, "foo"));
+ //Assert.assertNotNull(realm.getRole("bar"));
+ Assert.assertNotNull(RealmRepUtil.findDefaultRole(realm, "bar"));
+
+ RealmResource realmRsc = adminClient.realm(realm.getRealm());
+
+ /* See KEYCLOAK-3104*/
+ UserRepresentation user = findByUsername(realmRsc, "loginclient");//RealmRepUtil.findUser(realm, "loginclient");
+ Assert.assertNotNull(user);
+
+ // I haven't found a way to do this from the adminClient
+ //Assert.assertEquals(0, session.users().getFederatedIdentities(user, realm).size());
+
+ List resources = realmRsc.clients().findAll();
+ Assert.assertEquals(8, resources.size());
+
+ // Test applications imported
+ ClientRepresentation application = ApiUtil.findClientByClientId(realmRsc, "Application").toRepresentation();
+ ClientRepresentation otherApp = ApiUtil.findClientByClientId(realmRsc, "OtherApp").toRepresentation();
+ ClientRepresentation accountApp = ApiUtil.findClientByClientId(realmRsc, Constants.ACCOUNT_MANAGEMENT_CLIENT_ID).toRepresentation();
+ ClientResource nonExisting = ApiUtil.findClientByClientId(realmRsc, "NonExisting");
+ Assert.assertNotNull(application);
+ Assert.assertNotNull(otherApp);
+ Assert.assertNull(nonExisting);
+ List clients = realmRsc.clients().findAll();
+ Assert.assertEquals(8, clients.size());
+ Assert.assertTrue(hasClient(clients, application));
+ Assert.assertTrue(hasClient(clients, otherApp));
+ Assert.assertTrue(hasClient(clients, accountApp));
+
+ Assert.assertEquals("Applicationn", application.getName());
+ Assert.assertEquals((Integer)50, application.getNodeReRegistrationTimeout());
+ Map appRegisteredNodes = application.getRegisteredNodes();
+ Assert.assertEquals(2, appRegisteredNodes.size());
+ Assert.assertTrue(10 == appRegisteredNodes.get("node1"));
+ Assert.assertTrue(20 == appRegisteredNodes.get("172.10.15.20"));
+
+ // test clientAuthenticatorType
+ Assert.assertEquals("client-secret", application.getClientAuthenticatorType());
+ Assert.assertEquals("client-jwt", otherApp.getClientAuthenticatorType());
+
+ // Test finding applications by ID
+ Assert.assertNull(ApiUtil.findClientResourceById(realmRsc, "982734"));
+ Assert.assertEquals(application.getId(), ApiUtil.findClientResourceById(realmRsc, application.getId()).toRepresentation().getId());
+
+
+ // Test role mappings
+ UserRepresentation admin = findByUsername(realmRsc, "admin");
+ // user without creation timestamp in import
+ Assert.assertNull(admin.getCreatedTimestamp());
+ Set allRoles = allRoles(realmRsc, admin);
+ Assert.assertEquals(3, allRoles.size());
+ Assert.assertTrue(containsRole(allRoles, findRealmRole(realmRsc, "admin")));
+ Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, application.getId(), "app-admin")));
+ Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, otherApp.getId(), "otherapp-admin")));
+
+ Assert.assertTrue(findClientRole(realmRsc, application.getId(), "app-admin").isScopeParamRequired());
+ Assert.assertFalse(findClientRole(realmRsc, otherApp.getId(), "otherapp-admin").isScopeParamRequired());
+ Assert.assertFalse(findClientRole(realmRsc, otherApp.getId(), "otherapp-user").isScopeParamRequired());
+
+ UserRepresentation wburke = findByUsername(realmRsc, "wburke");
+ // user with creation timestamp in import
+ Assert.assertEquals(new Long(123654), wburke.getCreatedTimestamp());
+ allRoles = allRoles(realmRsc, wburke);
+ Assert.assertEquals(2, allRoles.size());
+ Assert.assertFalse(containsRole(allRoles, findRealmRole(realmRsc, "admin")));
+ Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, application.getId(), "app-user")));
+ Assert.assertTrue(containsRole(allRoles, findClientRole(realmRsc, otherApp.getId(), "otherapp-user")));
+
+ Assert.assertNull(realmRsc.users().get(wburke.getId()).roles().getAll().getRealmMappings());
+
+ UserRepresentation loginclient = findByUsername(realmRsc, "loginclient");
+ // user with creation timestamp as string in import
+ Assert.assertEquals(new Long(123655), loginclient.getCreatedTimestamp());
+
+ List realmRoles = realmRolesForUser(realmRsc, admin);
+ Assert.assertEquals(1, realmRoles.size());
+ Assert.assertEquals("admin", realmRoles.iterator().next().getName());
+
+ List appRoles = clientRolesForUser(realmRsc, application, admin);
+ Assert.assertEquals(1, appRoles.size());
+ Assert.assertEquals("app-admin", appRoles.iterator().next().getName());
+
+ // Test attributes
+ Map> attrs = wburke.getAttributesAsListValues();
+ Assert.assertEquals(1, attrs.size());
+ List attrVals = attrs.get("email");
+ Assert.assertEquals(1, attrVals.size());
+ Assert.assertEquals("bburke@redhat.com", attrVals.get(0));
+
+ attrs = admin.getAttributesAsListValues();
+ Assert.assertEquals(2, attrs.size());
+ attrVals = attrs.get("key1");
+ Assert.assertEquals(1, attrVals.size());
+ Assert.assertEquals("val1", attrVals.get(0));
+ attrVals = attrs.get("key2");
+ Assert.assertEquals(2, attrVals.size());
+ Assert.assertTrue(attrVals.contains("val21") && attrVals.contains("val22"));
+
+ // Test client
+ ClientResource oauthClient = ApiUtil.findClientResourceByClientId(realmRsc, "oauthclient");
+ ClientRepresentation oauthClientRep = oauthClient.toRepresentation();
+ Assert.assertEquals("clientpassword", oauthClient.getSecret().getValue());
+ Assert.assertTrue(oauthClientRep.isEnabled());
+ Assert.assertNotNull(oauthClientRep);
+
+ // Test scope relationship
+ Set allScopes = allScopeMappings(oauthClient);
+ Assert.assertEquals(2, allScopes.size());
+ Assert.assertTrue(containsRole(allScopes, findRealmRole(realmRsc, "admin")));
+ Assert.assertTrue(containsRole(allScopes, findClientRole(realmRsc, application.getId(), "app-user")));
+
+ List realmScopes = realmScopeMappings(oauthClient);
+ Assert.assertTrue(containsRole(realmScopes, findRealmRole(realmRsc, "admin")));
+
+ List appScopes = clientScopeMappings(oauthClient);
+ Assert.assertTrue(containsRole(appScopes, findClientRole(realmRsc, application.getId(), "app-user")));
+
+ // Test social linking
+ UserResource socialUser = realmRsc.users().get(findByUsername(realmRsc, "mySocialUser").getId());
+ List socialLinks = socialUser.getFederatedIdentity();
+ Assert.assertEquals(3, socialLinks.size());
+ boolean facebookFound = false;
+ boolean googleFound = false;
+ boolean twitterFound = false;
+ FederatedIdentityRepresentation facebookIdentityRep = null;
+ for (FederatedIdentityRepresentation federatedIdentityRep : socialLinks) {
+ if ("facebook1".equals(federatedIdentityRep.getIdentityProvider())) {
+ facebookFound = true;
+ facebookIdentityRep = federatedIdentityRep;
+ Assert.assertEquals("facebook1",federatedIdentityRep.getUserId());
+ Assert.assertEquals("fbuser1", federatedIdentityRep.getUserName());
+ } else if ("google1".equals(federatedIdentityRep.getIdentityProvider())) {
+ googleFound = true;
+ Assert.assertEquals("google1", federatedIdentityRep.getUserId());
+ Assert.assertEquals("mysocialuser@gmail.com", federatedIdentityRep.getUserName());
+ } else if ("twitter1".equals(federatedIdentityRep.getIdentityProvider())) {
+ twitterFound = true;
+ Assert.assertEquals("twitter1", federatedIdentityRep.getUserId());
+ Assert.assertEquals("twuser1", federatedIdentityRep.getUserName());
+ }
+ }
+ Assert.assertTrue(facebookFound && twitterFound && googleFound);
+
+ UserRepresentation foundSocialUser = testingClient.testing().getUserByFederatedIdentity(realm.getRealm(), "facebook1", "facebook1", "fbuser1");
+ Assert.assertEquals(foundSocialUser.getUsername(), socialUser.toRepresentation().getUsername());
+ Assert.assertNull(testingClient.testing().getUserByFederatedIdentity(realm.getRealm(), "facebook", "not-existing", "not-existing"));
+
+ Assert.assertEquals("facebook1", facebookIdentityRep.getUserId());
+ Assert.assertEquals("fbuser1", facebookIdentityRep.getUserName());
+ Assert.assertEquals("facebook1", facebookIdentityRep.getIdentityProvider());
+
+ // Test remove/add social link
+ socialUser.removeFederatedIdentity("facebook1");
+ Assert.assertEquals(2, socialUser.getFederatedIdentity().size());
+ socialUser.addFederatedIdentity("facebook1", facebookIdentityRep);
+ Assert.assertEquals(3, socialUser.getFederatedIdentity().size());
+
+ // Test smtp config
+ Map smtpConfig = realm.getSmtpServer();
+ Assert.assertTrue(smtpConfig.size() == 3);
+ Assert.assertEquals("auto@keycloak.org", smtpConfig.get("from"));
+ Assert.assertEquals("localhost", smtpConfig.get("host"));
+ Assert.assertEquals("3025", smtpConfig.get("port"));
+
+ // Test identity providers
+ List identityProviders = realm.getIdentityProviders();
+ Assert.assertEquals(3, identityProviders.size());
+ IdentityProviderRepresentation google = null;
+ for (IdentityProviderRepresentation idpRep : identityProviders) {
+ if (idpRep.getAlias().equals("google1")) google = idpRep;
+ }
+ Assert.assertNotNull(google);
+ Assert.assertEquals("google1", google.getAlias());
+ Assert.assertEquals("google", google.getProviderId());
+ Assert.assertTrue(google.isEnabled());
+ Assert.assertEquals("googleId", google.getConfig().get("clientId"));
+ Assert.assertEquals("googleSecret", google.getConfig().get("clientSecret"));
+
+ // Test federation providers
+ List fedProviders = realm.getUserFederationProviders();
+ Assert.assertTrue(fedProviders.size() == 2);
+ UserFederationProviderRepresentation ldap1 = fedProviders.get(0);
+ Assert.assertEquals("MyLDAPProvider1", ldap1.getDisplayName());
+ Assert.assertEquals("ldap", ldap1.getProviderName());
+ Assert.assertEquals(1, ldap1.getPriority());
+ Assert.assertEquals("ldap://foo", ldap1.getConfig().get(LDAPConstants.CONNECTION_URL));
+
+ UserFederationProviderRepresentation ldap2 = fedProviders.get(1);
+ Assert.assertEquals("MyLDAPProvider2", ldap2.getDisplayName());
+ Assert.assertEquals("ldap://bar", ldap2.getConfig().get(LDAPConstants.CONNECTION_URL));
+
+ // Test federation mappers
+ List fedMappers1 = realmRsc.userFederation().get(ldap1.getId()).getMappers();
+ Assert.assertTrue(fedMappers1.size() == 1);
+ UserFederationMapperRepresentation fullNameMapper = fedMappers1.iterator().next();
+ Assert.assertEquals("FullNameMapper", fullNameMapper.getName());
+ Assert.assertEquals(FullNameLDAPFederationMapperFactory.PROVIDER_ID, fullNameMapper.getFederationMapperType());
+ //Assert.assertEquals(ldap1.getId(), fullNameMapper.getFederationProviderId());
+ Assert.assertEquals("cn", fullNameMapper.getConfig().get(FullNameLDAPFederationMapper.LDAP_FULL_NAME_ATTRIBUTE));
+
+ // All builtin LDAP mappers should be here
+ List fedMappers2 = realmRsc.userFederation().get(ldap2.getId()).getMappers();
+ Assert.assertTrue(fedMappers2.size() > 3);
+ List allMappers = realm.getUserFederationMappers();
+ Assert.assertEquals(allMappers.size(), fedMappers1.size() + fedMappers2.size());
+
+ // Assert that federation link wasn't created during import
+ Assert.assertNull(testingClient.testing().getUserByUsernameFromFedProviderFactory(realm.getRealm(), "wburke"));
+
+ // Test builtin authentication flows
+ AuthenticationFlowRepresentation clientFlow = testingClient.testing().getClientAuthFlow(realm.getRealm());
+ Assert.assertEquals(DefaultAuthenticationFlows.CLIENT_AUTHENTICATION_FLOW, clientFlow.getAlias());
+ Assert.assertNotNull(realmRsc.flows().getFlow(clientFlow.getId()));
+ Assert.assertTrue(realmRsc.flows().getExecutions(clientFlow.getAlias()).size() > 0);
+
+ AuthenticationFlowRepresentation resetFlow = testingClient.testing().getResetCredFlow(realm.getRealm());
+ Assert.assertEquals(DefaultAuthenticationFlows.RESET_CREDENTIALS_FLOW, resetFlow.getAlias());
+ Assert.assertNotNull(realmRsc.flows().getFlow(resetFlow.getId()));
+ Assert.assertTrue(realmRsc.flows().getExecutions(resetFlow.getAlias()).size() > 0);
+
+ // Test protocol mappers. Default application has all the builtin protocol mappers. OtherApp just gss credential
+ List applicationMappers = application.getProtocolMappers();
+ Assert.assertNotNull(findMapperByName(applicationMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, "username"));//application.getProtocolMapperByName(OIDCLoginProtocol.LOGIN_PROTOCOL, "username"));
+ Assert.assertNotNull(findMapperByName(applicationMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, "email"));
+ Assert.assertNotNull(findMapperByName(applicationMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, "given name"));
+ Assert.assertNull(findMapperByName(applicationMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, KerberosConstants.GSS_DELEGATION_CREDENTIAL_DISPLAY_NAME));
+
+ Assert.assertEquals(1, otherApp.getProtocolMappers().size());
+ List otherAppMappers = otherApp.getProtocolMappers();
+ Assert.assertNull(findMapperByName(otherAppMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, "username"));
+ ProtocolMapperRepresentation gssCredentialMapper = findMapperByName(otherAppMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, KerberosConstants.GSS_DELEGATION_CREDENTIAL_DISPLAY_NAME);
+ assertGssProtocolMapper(gssCredentialMapper);
+
+ // Test clientTemplates
+ List clientTemplates = realmRsc.clientTemplates().findAll();
+ Assert.assertEquals(1, clientTemplates.size());
+ ClientTemplateRepresentation clientTemplate = clientTemplates.get(0);
+ Assert.assertEquals("foo-template", clientTemplate.getName());
+ Assert.assertEquals("foo-template-desc", clientTemplate.getDescription());
+ Assert.assertEquals(OIDCLoginProtocol.LOGIN_PROTOCOL, clientTemplate.getProtocol());
+ Assert.assertEquals(1, clientTemplate.getProtocolMappers().size());
+ List clientTemplateMappers = clientTemplate.getProtocolMappers();
+ ProtocolMapperRepresentation templateGssCredentialMapper = findMapperByName(clientTemplateMappers, OIDCLoginProtocol.LOGIN_PROTOCOL, KerberosConstants.GSS_DELEGATION_CREDENTIAL_DISPLAY_NAME);
+ assertGssProtocolMapper(templateGssCredentialMapper);
+
+ // Test client template scopes
+ Set allClientTemplateScopes = allScopeMappings(realmRsc.clientTemplates().get(clientTemplate.getId()));
+ Assert.assertEquals(3, allClientTemplateScopes.size());
+ Assert.assertTrue(containsRole(allClientTemplateScopes, findRealmRole(realmRsc, "admin")));//allClientTemplateScopes.contains(realm.getRole("admin")));
+ Assert.assertTrue(containsRole(allClientTemplateScopes, findClientRole(realmRsc, application.getId(), "app-user")));//allClientTemplateScopes.contains(application.getRole("app-user")));
+ Assert.assertTrue(containsRole(allClientTemplateScopes, findClientRole(realmRsc, application.getId(), "app-admin")));//allClientTemplateScopes.contains(application.getRole("app-admin")));
+
+ List clientTemplateRealmScopes = realmScopeMappings(realmRsc.clientTemplates().get(clientTemplate.getId()));
+ Assert.assertTrue(containsRole(clientTemplateRealmScopes, findRealmRole(realmRsc, "admin")));//clientTemplateRealmScopes.contains(realm.getRole("admin")));
+
+ List clientTemplateAppScopes = clientScopeMappings(realmRsc.clientTemplates().get(clientTemplate.getId()));//application.getClientScopeMappings(oauthClient);
+ Assert.assertTrue(containsRole(clientTemplateAppScopes, findClientRole(realmRsc, application.getId(), "app-user")));//clientTemplateAppScopes.contains(application.getRole("app-user")));
+ Assert.assertTrue(containsRole(clientTemplateAppScopes, findClientRole(realmRsc, application.getId(), "app-admin")));//clientTemplateAppScopes.contains(application.getRole("app-admin")));
+
+ // Test user consents
+ //admin = session.users().getUserByUsername("admin", realm);
+
+ UserResource adminRsc = realmRsc.users().get(admin.getId());
+ List