KEYCLOAK-1678 added invalidation tests for groups and roles, added mroe update tests for realm
This commit is contained in:
parent
acf8549d51
commit
65a840be3d
9 changed files with 386 additions and 80 deletions
|
@ -30,8 +30,10 @@ import java.net.URI;
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
import org.apache.commons.lang.builder.EqualsBuilder;
|
||||||
|
|
||||||
import static org.keycloak.representations.idm.CredentialRepresentation.PASSWORD;
|
import static org.keycloak.representations.idm.CredentialRepresentation.PASSWORD;
|
||||||
|
import org.keycloak.representations.idm.GroupRepresentation;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Created by st on 28.05.15.
|
* Created by st on 28.05.15.
|
||||||
|
@ -126,13 +128,24 @@ public class ApiUtil {
|
||||||
}
|
}
|
||||||
|
|
||||||
UserResource userResource = realm.users().get(userId);
|
UserResource userResource = realm.users().get(userId);
|
||||||
log.debug("assigning roles: " + Arrays.toString(roles) + " to user: \"" +
|
log.debug("assigning roles: " + Arrays.toString(roles) + " to user: \""
|
||||||
userResource.toRepresentation().getUsername() + "\" of client: \"" +
|
+ userResource.toRepresentation().getUsername() + "\" of client: \""
|
||||||
clientName + "\" in realm: \"" + realmName + "\"");
|
+ clientName + "\" in realm: \"" + realmName + "\"");
|
||||||
userResource.roles().clientLevel(clientId).add(roleRepresentations);
|
userResource.roles().clientLevel(clientId).add(roleRepresentations);
|
||||||
} else {
|
} else {
|
||||||
log.warn("client with name " + clientName + "doesn't exist in realm " + realmName);
|
log.warn("client with name " + clientName + "doesn't exist in realm " + realmName);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public static boolean groupContainsSubgroup(GroupRepresentation group, GroupRepresentation subgroup) {
|
||||||
|
boolean contains = false;
|
||||||
|
for (GroupRepresentation sg : group.getSubGroups()) {
|
||||||
|
if (subgroup.getId().equals(sg.getId())) {
|
||||||
|
contains = true;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return contains;
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,9 +1,8 @@
|
||||||
package org.keycloak.testsuite.cluster;
|
package org.keycloak.testsuite.cluster;
|
||||||
|
|
||||||
import java.math.BigInteger;
|
|
||||||
import java.security.SecureRandom;
|
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
import org.apache.commons.lang.RandomStringUtils;
|
||||||
import org.apache.commons.lang.StringUtils;
|
import org.apache.commons.lang.StringUtils;
|
||||||
import org.apache.commons.lang.builder.EqualsBuilder;
|
import org.apache.commons.lang.builder.EqualsBuilder;
|
||||||
import org.apache.commons.lang.builder.ReflectionToStringBuilder;
|
import org.apache.commons.lang.builder.ReflectionToStringBuilder;
|
||||||
|
@ -16,18 +15,14 @@ import org.keycloak.testsuite.arquillian.ContainerInfo;
|
||||||
/**
|
/**
|
||||||
*
|
*
|
||||||
* @author tkyjovsk
|
* @author tkyjovsk
|
||||||
|
* @param <T> entity representation
|
||||||
|
* @param <TR> entity resource
|
||||||
*/
|
*/
|
||||||
public abstract class AbstractInvalidationClusterTest<T> extends AbstractClusterTest {
|
public abstract class AbstractInvalidationClusterTest<T, TR> extends AbstractClusterTest {
|
||||||
|
|
||||||
private final SecureRandom random = new SecureRandom();
|
|
||||||
|
|
||||||
protected String randomString(int length) {
|
|
||||||
return new BigInteger(130, random).toString(length);
|
|
||||||
}
|
|
||||||
|
|
||||||
protected RealmRepresentation createTestRealmRepresentation() {
|
protected RealmRepresentation createTestRealmRepresentation() {
|
||||||
RealmRepresentation testRealm = new RealmRepresentation();
|
RealmRepresentation testRealm = new RealmRepresentation();
|
||||||
testRealm.setRealm("test_" + randomString(5));
|
testRealm.setRealm("test_" + RandomStringUtils.randomAlphabetic(5));
|
||||||
testRealm.setEnabled(true);
|
testRealm.setEnabled(true);
|
||||||
return testRealm;
|
return testRealm;
|
||||||
}
|
}
|
||||||
|
@ -72,6 +67,10 @@ public abstract class AbstractInvalidationClusterTest<T> extends AbstractCluster
|
||||||
assertEntityOnSurvivorNodesIsDeleted(testEntity);
|
assertEntityOnSurvivorNodesIsDeleted(testEntity);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
protected abstract TR entityResource(T testEntity, ContainerInfo node);
|
||||||
|
|
||||||
|
protected abstract TR entityResource(String idOrName, ContainerInfo node);
|
||||||
|
|
||||||
protected abstract T createEntity(T testEntity, ContainerInfo node);
|
protected abstract T createEntity(T testEntity, ContainerInfo node);
|
||||||
|
|
||||||
protected abstract T readEntity(T entity, ContainerInfo node);
|
protected abstract T readEntity(T entity, ContainerInfo node);
|
||||||
|
@ -80,20 +79,36 @@ public abstract class AbstractInvalidationClusterTest<T> extends AbstractCluster
|
||||||
|
|
||||||
protected abstract void deleteEntity(T testEntity, ContainerInfo node);
|
protected abstract void deleteEntity(T testEntity, ContainerInfo node);
|
||||||
|
|
||||||
protected T createEntityOnCurrentFailNode(T testEntity) {
|
protected TR entityResourceOnCurrentFailNode(T testEntity) {
|
||||||
return createEntity(testEntity, getCurrentFailNode());
|
return entityResource(testEntity, getCurrentFailNode());
|
||||||
|
}
|
||||||
|
|
||||||
|
protected String getEntityType(T entity) {
|
||||||
|
return entity.getClass().getSimpleName().replace("Representation", "");
|
||||||
|
}
|
||||||
|
|
||||||
|
protected T createEntityOnCurrentFailNode(T entity) {
|
||||||
|
log.info("Creating " + getEntityType(entity) + " on " + getCurrentFailNode());
|
||||||
|
return createEntity(entity, getCurrentFailNode());
|
||||||
}
|
}
|
||||||
|
|
||||||
protected T readEntityOnCurrentFailNode(T entity) {
|
protected T readEntityOnCurrentFailNode(T entity) {
|
||||||
|
log.debug("Reading " + getEntityType(entity) + " on " + getCurrentFailNode());
|
||||||
return readEntity(entity, getCurrentFailNode());
|
return readEntity(entity, getCurrentFailNode());
|
||||||
}
|
}
|
||||||
|
|
||||||
protected T updateEntityOnCurrentFailNode(T entity) {
|
protected T updateEntityOnCurrentFailNode(T entity) {
|
||||||
|
return updateEntityOnCurrentFailNode(entity, "");
|
||||||
|
}
|
||||||
|
|
||||||
|
protected T updateEntityOnCurrentFailNode(T entity, String updateType) {
|
||||||
|
log.info("Updating " + getEntityType(entity) + " " + updateType + " on " + getCurrentFailNode());
|
||||||
return updateEntity(entity, getCurrentFailNode());
|
return updateEntity(entity, getCurrentFailNode());
|
||||||
}
|
}
|
||||||
|
|
||||||
protected void deleteEntityOnCurrentFailNode(T testEntity) {
|
protected void deleteEntityOnCurrentFailNode(T entity) {
|
||||||
deleteEntity(testEntity, getCurrentFailNode());
|
log.info("Creating " + getEntityType(entity) + " on " + getCurrentFailNode());
|
||||||
|
deleteEntity(entity, getCurrentFailNode());
|
||||||
}
|
}
|
||||||
|
|
||||||
protected abstract T testEntityUpdates(T testEntity, boolean backendFailover);
|
protected abstract T testEntityUpdates(T testEntity, boolean backendFailover);
|
||||||
|
@ -116,15 +131,17 @@ public abstract class AbstractInvalidationClusterTest<T> extends AbstractCluster
|
||||||
for (ContainerInfo survivorNode : getCurrentSurvivorNodes()) {
|
for (ContainerInfo survivorNode : getCurrentSurvivorNodes()) {
|
||||||
T testEntityOnSurvivorNode = readEntity(testEntityOnFailNode, survivorNode);
|
T testEntityOnSurvivorNode = readEntity(testEntityOnFailNode, survivorNode);
|
||||||
if (EqualsBuilder.reflectionEquals(testEntityOnSurvivorNode, testEntityOnFailNode, excludedComparisonFields)) {
|
if (EqualsBuilder.reflectionEquals(testEntityOnSurvivorNode, testEntityOnFailNode, excludedComparisonFields)) {
|
||||||
log.info("Verification on survivor " + survivorNode + " PASSED");
|
log.info(String.format("Verification of %s on survivor %s PASSED", getEntityType(testEntityOnFailNode), survivorNode));
|
||||||
} else {
|
} else {
|
||||||
entityDiffers = true;
|
entityDiffers = true;
|
||||||
log.error("Verification on survivor " + survivorNode + " FAILED");
|
log.error(String.format("Verification of %s on survivor %s FAILED", getEntityType(testEntityOnFailNode), survivorNode));
|
||||||
String tf = ReflectionToStringBuilder.reflectionToString(testEntityOnFailNode, ToStringStyle.SHORT_PREFIX_STYLE);
|
String tf = ReflectionToStringBuilder.reflectionToString(testEntityOnFailNode, ToStringStyle.SHORT_PREFIX_STYLE);
|
||||||
String ts = ReflectionToStringBuilder.reflectionToString(testEntityOnSurvivorNode, ToStringStyle.SHORT_PREFIX_STYLE);
|
String ts = ReflectionToStringBuilder.reflectionToString(testEntityOnSurvivorNode, ToStringStyle.SHORT_PREFIX_STYLE);
|
||||||
log.error("\nEntity on fail node: \n\n" + tf + "\n"
|
log.error(String.format(
|
||||||
+ "\nEntity on survivor node: \n" + ts + "\n"
|
"\nEntity on fail node: \n%s\n"
|
||||||
+ "\nDifference: \n" + StringUtils.difference(tf, ts) + "\n");
|
+ "\nEntity on survivor node: \n%s\n"
|
||||||
|
+ "\nDifference: \n%s\n",
|
||||||
|
tf, ts, StringUtils.difference(tf, ts)));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
assertFalse(entityDiffers);
|
assertFalse(entityDiffers);
|
||||||
|
@ -136,10 +153,10 @@ public abstract class AbstractInvalidationClusterTest<T> extends AbstractCluster
|
||||||
for (ContainerInfo survivorNode : getCurrentSurvivorNodes()) {
|
for (ContainerInfo survivorNode : getCurrentSurvivorNodes()) {
|
||||||
T testEntityOnSurvivorNode = readEntity(testEntityOnFailNode, survivorNode);
|
T testEntityOnSurvivorNode = readEntity(testEntityOnFailNode, survivorNode);
|
||||||
if (testEntityOnSurvivorNode == null) {
|
if (testEntityOnSurvivorNode == null) {
|
||||||
log.info("Verification of deletion on survivor " + survivorNode + " PASSED");
|
log.info(String.format("Verification of %s deletion on survivor %s PASSED", getEntityType(testEntityOnFailNode), survivorNode));
|
||||||
} else {
|
} else {
|
||||||
entityExists = true;
|
entityExists = true;
|
||||||
log.error("Verification of deletion on survivor " + survivorNode + " FAILED");
|
log.error(String.format("Verification of %s deletion on survivor %s FAILED", getEntityType(testEntityOnFailNode), survivorNode));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
assertFalse(entityExists);
|
assertFalse(entityExists);
|
||||||
|
|
|
@ -8,7 +8,7 @@ import org.keycloak.testsuite.arquillian.ContainerInfo;
|
||||||
*
|
*
|
||||||
* @author tkyjovsk
|
* @author tkyjovsk
|
||||||
*/
|
*/
|
||||||
public abstract class AbstractInvalidationClusterTestWithTestRealm<T> extends AbstractInvalidationClusterTest<T> {
|
public abstract class AbstractInvalidationClusterTestWithTestRealm<T, TR> extends AbstractInvalidationClusterTest<T, TR> {
|
||||||
|
|
||||||
protected String testRealmName = null;
|
protected String testRealmName = null;
|
||||||
|
|
||||||
|
|
|
@ -2,8 +2,10 @@ package org.keycloak.testsuite.cluster;
|
||||||
|
|
||||||
import javax.ws.rs.NotFoundException;
|
import javax.ws.rs.NotFoundException;
|
||||||
import javax.ws.rs.core.Response;
|
import javax.ws.rs.core.Response;
|
||||||
|
import org.apache.commons.lang.RandomStringUtils;
|
||||||
import static org.junit.Assert.assertNull;
|
import static org.junit.Assert.assertNull;
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
|
import org.keycloak.admin.client.resource.ClientResource;
|
||||||
import org.keycloak.admin.client.resource.ClientsResource;
|
import org.keycloak.admin.client.resource.ClientsResource;
|
||||||
import org.keycloak.representations.idm.ClientRepresentation;
|
import org.keycloak.representations.idm.ClientRepresentation;
|
||||||
import org.keycloak.testsuite.admin.ApiUtil;
|
import org.keycloak.testsuite.admin.ApiUtil;
|
||||||
|
@ -13,7 +15,7 @@ import org.keycloak.testsuite.arquillian.ContainerInfo;
|
||||||
*
|
*
|
||||||
* @author tkyjovsk
|
* @author tkyjovsk
|
||||||
*/
|
*/
|
||||||
public class ClientInvalidationClusterTest extends AbstractInvalidationClusterTestWithTestRealm<ClientRepresentation> {
|
public class ClientInvalidationClusterTest extends AbstractInvalidationClusterTestWithTestRealm<ClientRepresentation, ClientResource> {
|
||||||
|
|
||||||
@Before
|
@Before
|
||||||
public void setExcludedComparisonFields() {
|
public void setExcludedComparisonFields() {
|
||||||
|
@ -23,7 +25,7 @@ public class ClientInvalidationClusterTest extends AbstractInvalidationClusterTe
|
||||||
@Override
|
@Override
|
||||||
protected ClientRepresentation createTestEntityRepresentation() {
|
protected ClientRepresentation createTestEntityRepresentation() {
|
||||||
ClientRepresentation client = new ClientRepresentation();
|
ClientRepresentation client = new ClientRepresentation();
|
||||||
String s = randomString(5);
|
String s = RandomStringUtils.randomAlphabetic(5);
|
||||||
client.setClientId("client_" + s);
|
client.setClientId("client_" + s);
|
||||||
client.setName("name_" + s);
|
client.setName("name_" + s);
|
||||||
return client;
|
return client;
|
||||||
|
@ -33,6 +35,16 @@ public class ClientInvalidationClusterTest extends AbstractInvalidationClusterTe
|
||||||
return getAdminClientFor(node).realm(testRealmName).clients();
|
return getAdminClientFor(node).realm(testRealmName).clients();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected ClientResource entityResource(ClientRepresentation client, ContainerInfo node) {
|
||||||
|
return entityResource(client.getId(), node);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected ClientResource entityResource(String id, ContainerInfo node) {
|
||||||
|
return clients(node).get(id);
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected ClientRepresentation createEntity(ClientRepresentation client, ContainerInfo node) {
|
protected ClientRepresentation createEntity(ClientRepresentation client, ContainerInfo node) {
|
||||||
Response response = clients(node).create(client);
|
Response response = clients(node).create(client);
|
||||||
|
@ -46,22 +58,22 @@ public class ClientInvalidationClusterTest extends AbstractInvalidationClusterTe
|
||||||
protected ClientRepresentation readEntity(ClientRepresentation client, ContainerInfo node) {
|
protected ClientRepresentation readEntity(ClientRepresentation client, ContainerInfo node) {
|
||||||
ClientRepresentation u = null;
|
ClientRepresentation u = null;
|
||||||
try {
|
try {
|
||||||
u = clients(node).get(client.getId()).toRepresentation();
|
u = entityResource(client, node).toRepresentation();
|
||||||
} catch (NotFoundException nfe) {
|
} catch (NotFoundException nfe) {
|
||||||
// exoected when client doesn't exist
|
// expected when client doesn't exist
|
||||||
}
|
}
|
||||||
return u;
|
return u;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected ClientRepresentation updateEntity(ClientRepresentation client, ContainerInfo node) {
|
protected ClientRepresentation updateEntity(ClientRepresentation client, ContainerInfo node) {
|
||||||
clients(node).get(client.getId()).update(client);
|
entityResource(client, node).update(client);
|
||||||
return readEntity(client, node);
|
return readEntity(client, node);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected void deleteEntity(ClientRepresentation client, ContainerInfo node) {
|
protected void deleteEntity(ClientRepresentation client, ContainerInfo node) {
|
||||||
clients(node).get(client.getId()).remove();
|
entityResource(client, node).remove();
|
||||||
assertNull(readEntity(client, node));
|
assertNull(readEntity(client, node));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -70,12 +82,12 @@ public class ClientInvalidationClusterTest extends AbstractInvalidationClusterTe
|
||||||
|
|
||||||
// clientId
|
// clientId
|
||||||
client.setClientId(client.getClientId() + "_updated");
|
client.setClientId(client.getClientId() + "_updated");
|
||||||
client = updateEntity(client, getCurrentFailNode());
|
client = updateEntityOnCurrentFailNode(client, "clientId");
|
||||||
verifyEntityUpdateDuringFailover(client, backendFailover);
|
verifyEntityUpdateDuringFailover(client, backendFailover);
|
||||||
|
|
||||||
// name
|
// name
|
||||||
client.setName(client.getName() + "_updated");
|
client.setName(client.getName() + "_updated");
|
||||||
client = updateEntity(client, getCurrentFailNode());
|
client = updateEntityOnCurrentFailNode(client, "name");
|
||||||
verifyEntityUpdateDuringFailover(client, backendFailover);
|
verifyEntityUpdateDuringFailover(client, backendFailover);
|
||||||
|
|
||||||
return client;
|
return client;
|
||||||
|
|
|
@ -0,0 +1,136 @@
|
||||||
|
package org.keycloak.testsuite.cluster;
|
||||||
|
|
||||||
|
import java.util.Arrays;
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.List;
|
||||||
|
import javax.ws.rs.NotFoundException;
|
||||||
|
import javax.ws.rs.core.Response;
|
||||||
|
import org.apache.commons.lang.RandomStringUtils;
|
||||||
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.assertNull;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.keycloak.admin.client.resource.GroupResource;
|
||||||
|
import org.keycloak.admin.client.resource.GroupsResource;
|
||||||
|
import org.keycloak.representations.idm.GroupRepresentation;
|
||||||
|
import org.keycloak.testsuite.admin.ApiUtil;
|
||||||
|
import org.keycloak.testsuite.arquillian.ContainerInfo;
|
||||||
|
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
* @author tkyjovsk
|
||||||
|
*/
|
||||||
|
public class GroupInvalidationClusterTest extends AbstractInvalidationClusterTestWithTestRealm<GroupRepresentation, GroupResource> {
|
||||||
|
|
||||||
|
@Before
|
||||||
|
public void setExcludedComparisonFields() {
|
||||||
|
excludedComparisonFields.add("subGroups");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected GroupRepresentation createTestEntityRepresentation() {
|
||||||
|
GroupRepresentation group = new GroupRepresentation();
|
||||||
|
group.setName("group_" + RandomStringUtils.randomAlphabetic(5));
|
||||||
|
group.setAttributes(new HashMap<String, List<String>>());
|
||||||
|
group.getAttributes().put("attr1", Arrays.asList(new String[]{"attr1 value"}));
|
||||||
|
group.getAttributes().put("attr2", Arrays.asList(new String[]{"attr2 value", "attr2 value2"}));
|
||||||
|
return group;
|
||||||
|
}
|
||||||
|
|
||||||
|
protected GroupsResource groups(ContainerInfo node) {
|
||||||
|
return getAdminClientFor(node).realm(testRealmName).groups();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected GroupResource entityResource(GroupRepresentation group, ContainerInfo node) {
|
||||||
|
return entityResource(group.getId(), node);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected GroupResource entityResource(String id, ContainerInfo node) {
|
||||||
|
return groups(node).group(id);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected GroupRepresentation createEntity(GroupRepresentation group, ContainerInfo node) {
|
||||||
|
Response response = groups(node).add(group);
|
||||||
|
String id = ApiUtil.getCreatedId(response);
|
||||||
|
response.close();
|
||||||
|
group.setId(id);
|
||||||
|
return readEntity(group, node);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected GroupRepresentation readEntity(GroupRepresentation group, ContainerInfo node) {
|
||||||
|
GroupRepresentation u = null;
|
||||||
|
try {
|
||||||
|
u = entityResource(group, node).toRepresentation();
|
||||||
|
} catch (NotFoundException nfe) {
|
||||||
|
// expected when group doesn't exist
|
||||||
|
}
|
||||||
|
return u;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected GroupRepresentation updateEntity(GroupRepresentation group, ContainerInfo node) {
|
||||||
|
entityResource(group, node).update(group);
|
||||||
|
return readEntity(group, node);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void deleteEntity(GroupRepresentation group, ContainerInfo node) {
|
||||||
|
entityResource(group, node).remove();
|
||||||
|
assertNull(readEntity(group, node));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected GroupRepresentation testEntityUpdates(GroupRepresentation group, boolean backendFailover) {
|
||||||
|
|
||||||
|
// groupname
|
||||||
|
group.setName(group.getName() + "_updated");
|
||||||
|
group = updateEntityOnCurrentFailNode(group, "name");
|
||||||
|
verifyEntityUpdateDuringFailover(group, backendFailover);
|
||||||
|
|
||||||
|
// attributes - add new
|
||||||
|
group.getAttributes().put("attr3", Arrays.asList(new String[]{"attr3 value"}));
|
||||||
|
group = updateEntityOnCurrentFailNode(group, "attributes - adding");
|
||||||
|
verifyEntityUpdateDuringFailover(group, backendFailover);
|
||||||
|
|
||||||
|
// attributes - remove
|
||||||
|
group.getAttributes().remove("attr3");
|
||||||
|
group = updateEntityOnCurrentFailNode(group, "attributes - removing");
|
||||||
|
verifyEntityUpdateDuringFailover(group, backendFailover);
|
||||||
|
|
||||||
|
// attributes - update 1
|
||||||
|
group.getAttributes().get("attr1").set(0,
|
||||||
|
group.getAttributes().get("attr1").get(0) + " - updated");
|
||||||
|
group = updateEntityOnCurrentFailNode(group, "attributes");
|
||||||
|
verifyEntityUpdateDuringFailover(group, backendFailover);
|
||||||
|
|
||||||
|
// attributes - update 2
|
||||||
|
group.getAttributes().get("attr2").set(1,
|
||||||
|
group.getAttributes().get("attr2").get(1) + " - updated");
|
||||||
|
group = updateEntityOnCurrentFailNode(group, "attributes");
|
||||||
|
verifyEntityUpdateDuringFailover(group, backendFailover);
|
||||||
|
|
||||||
|
// move
|
||||||
|
log.info("Updating Group parent on " + getCurrentFailNode());
|
||||||
|
GroupRepresentation parentGroup = new GroupRepresentation();
|
||||||
|
parentGroup.setName("parent");
|
||||||
|
parentGroup = createEntityOnCurrentFailNode(parentGroup);
|
||||||
|
assertEquals("/" + parentGroup.getName(), parentGroup.getPath());
|
||||||
|
|
||||||
|
Response r = entityResourceOnCurrentFailNode(parentGroup).subGroup(group);
|
||||||
|
r.close();
|
||||||
|
parentGroup = readEntityOnCurrentFailNode(parentGroup);
|
||||||
|
group = readEntityOnCurrentFailNode(group);
|
||||||
|
|
||||||
|
assertTrue(ApiUtil.groupContainsSubgroup(parentGroup, group));
|
||||||
|
assertEquals(parentGroup.getPath() + "/" + group.getName(), group.getPath());
|
||||||
|
|
||||||
|
verifyEntityUpdateDuringFailover(group, backendFailover);
|
||||||
|
|
||||||
|
return group;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -1,7 +1,10 @@
|
||||||
package org.keycloak.testsuite.cluster;
|
package org.keycloak.testsuite.cluster;
|
||||||
|
|
||||||
import javax.ws.rs.NotFoundException;
|
import javax.ws.rs.NotFoundException;
|
||||||
|
import static org.junit.Assert.assertNotEquals;
|
||||||
import static org.junit.Assert.assertNull;
|
import static org.junit.Assert.assertNull;
|
||||||
|
import org.keycloak.admin.client.resource.RealmResource;
|
||||||
|
import org.keycloak.admin.client.resource.RealmsResource;
|
||||||
import org.keycloak.representations.idm.RealmRepresentation;
|
import org.keycloak.representations.idm.RealmRepresentation;
|
||||||
import org.keycloak.testsuite.arquillian.ContainerInfo;
|
import org.keycloak.testsuite.arquillian.ContainerInfo;
|
||||||
|
|
||||||
|
@ -9,18 +12,30 @@ import org.keycloak.testsuite.arquillian.ContainerInfo;
|
||||||
*
|
*
|
||||||
* @author tkyjovsk
|
* @author tkyjovsk
|
||||||
*/
|
*/
|
||||||
public class RealmInvalidationClusterTest extends AbstractInvalidationClusterTest<RealmRepresentation> {
|
public class RealmInvalidationClusterTest extends AbstractInvalidationClusterTest<RealmRepresentation, RealmResource> {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected RealmRepresentation createTestEntityRepresentation() {
|
protected RealmRepresentation createTestEntityRepresentation() {
|
||||||
return createTestRealmRepresentation();
|
return createTestRealmRepresentation();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
protected RealmsResource realms(ContainerInfo node) {
|
||||||
|
return getAdminClientFor(node).realms();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected RealmResource entityResource(RealmRepresentation realm, ContainerInfo node) {
|
||||||
|
return entityResource(realm.getRealm(), node);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected RealmResource entityResource(String name, ContainerInfo node) {
|
||||||
|
return getAdminClientFor(node).realm(name);
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected RealmRepresentation createEntity(RealmRepresentation realm, ContainerInfo node) {
|
protected RealmRepresentation createEntity(RealmRepresentation realm, ContainerInfo node) {
|
||||||
log.info("Creating realm on : " + getCurrentFailNode());
|
realms(node).create(realm);
|
||||||
getAdminClientFor(getCurrentFailNode()).realms().create(realm);
|
|
||||||
// get created entity
|
|
||||||
return readEntity(realm, node);
|
return readEntity(realm, node);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -28,7 +43,7 @@ public class RealmInvalidationClusterTest extends AbstractInvalidationClusterTes
|
||||||
protected RealmRepresentation readEntity(RealmRepresentation realm, ContainerInfo node) {
|
protected RealmRepresentation readEntity(RealmRepresentation realm, ContainerInfo node) {
|
||||||
RealmRepresentation realmOnNode = null;
|
RealmRepresentation realmOnNode = null;
|
||||||
try {
|
try {
|
||||||
realmOnNode = getAdminClientFor(node).realm(realm.getRealm()).toRepresentation();
|
realmOnNode = entityResource(realm, node).toRepresentation();
|
||||||
} catch (NotFoundException nfe) {
|
} catch (NotFoundException nfe) {
|
||||||
// expected if realm not found
|
// expected if realm not found
|
||||||
}
|
}
|
||||||
|
@ -37,14 +52,17 @@ public class RealmInvalidationClusterTest extends AbstractInvalidationClusterTes
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected RealmRepresentation updateEntity(RealmRepresentation realm, ContainerInfo node) {
|
protected RealmRepresentation updateEntity(RealmRepresentation realm, ContainerInfo node) {
|
||||||
getAdminClientFor(node).realms().realm(realm.getRealm()).update(realm);
|
return updateEntity(realm.getRealm(), realm, node);
|
||||||
|
}
|
||||||
|
|
||||||
|
private RealmRepresentation updateEntity(String realmName, RealmRepresentation realm, ContainerInfo node) {
|
||||||
|
entityResource(realmName, node).update(realm);
|
||||||
return readEntity(realm, node);
|
return readEntity(realm, node);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected void deleteEntity(RealmRepresentation realm, ContainerInfo node) {
|
protected void deleteEntity(RealmRepresentation realm, ContainerInfo node) {
|
||||||
log.info("Deleting realm on: " + getCurrentFailNode());
|
entityResource(realm, node).remove();
|
||||||
getAdminClientFor(node).realms().realm(realm.getRealm()).remove();
|
|
||||||
// check if deleted
|
// check if deleted
|
||||||
assertNull(readEntity(realm, node));
|
assertNull(readEntity(realm, node));
|
||||||
}
|
}
|
||||||
|
@ -52,28 +70,40 @@ public class RealmInvalidationClusterTest extends AbstractInvalidationClusterTes
|
||||||
@Override
|
@Override
|
||||||
protected RealmRepresentation testEntityUpdates(RealmRepresentation realm, boolean backendFailover) {
|
protected RealmRepresentation testEntityUpdates(RealmRepresentation realm, boolean backendFailover) {
|
||||||
|
|
||||||
realm = updateRealmName(realm, realm.getRealm() + "_updated");
|
// realm name
|
||||||
|
String originalName = realm.getRealm();
|
||||||
|
realm.setRealm(realm.getRealm() + "_updated");
|
||||||
|
realm = updateEntity(originalName, realm, getCurrentFailNode());
|
||||||
verifyEntityUpdateDuringFailover(realm, backendFailover);
|
verifyEntityUpdateDuringFailover(realm, backendFailover);
|
||||||
|
|
||||||
realm = updateRealmEnabled(realm);
|
// enabled
|
||||||
|
realm.setEnabled(!realm.isEnabled());
|
||||||
|
realm = updateEntityOnCurrentFailNode(realm, "enabled");
|
||||||
|
verifyEntityUpdateDuringFailover(realm, backendFailover);
|
||||||
|
|
||||||
|
// public key
|
||||||
|
realm.setPublicKey("GENERATE");
|
||||||
|
realm = updateEntityOnCurrentFailNode(realm, "public key");
|
||||||
|
assertNotEquals("GENERATE", realm.getPublicKey());
|
||||||
|
verifyEntityUpdateDuringFailover(realm, backendFailover);
|
||||||
|
|
||||||
|
// require ssl
|
||||||
|
realm.setSslRequired("all");
|
||||||
|
realm = updateEntityOnCurrentFailNode(realm, "require ssl");
|
||||||
|
verifyEntityUpdateDuringFailover(realm, backendFailover);
|
||||||
|
|
||||||
|
// brute force detection
|
||||||
|
realm.setBruteForceProtected(!realm.isBruteForceProtected());
|
||||||
|
realm = updateEntityOnCurrentFailNode(realm, "brute force");
|
||||||
|
verifyEntityUpdateDuringFailover(realm, backendFailover);
|
||||||
|
|
||||||
|
// brute force detection - failure factor
|
||||||
|
realm.setBruteForceProtected(true);
|
||||||
|
realm.setFailureFactor(realm.getFailureFactor() + 1);
|
||||||
|
realm = updateEntityOnCurrentFailNode(realm, "brute force failure factor");
|
||||||
verifyEntityUpdateDuringFailover(realm, backendFailover);
|
verifyEntityUpdateDuringFailover(realm, backendFailover);
|
||||||
|
|
||||||
return realm;
|
return realm;
|
||||||
}
|
}
|
||||||
|
|
||||||
protected RealmRepresentation updateRealmName(RealmRepresentation realm, String newName) {
|
|
||||||
log.info("Updating realm on: " + getCurrentFailNode());
|
|
||||||
String originalName = realm.getRealm();
|
|
||||||
realm.setRealm(newName);
|
|
||||||
|
|
||||||
getAdminClientFor(getCurrentFailNode()).realms().realm(originalName).update(realm);
|
|
||||||
return readEntity(realm, getCurrentFailNode());
|
|
||||||
}
|
|
||||||
|
|
||||||
protected RealmRepresentation updateRealmEnabled(RealmRepresentation realm) {
|
|
||||||
log.info("Updating realm on: " + getCurrentFailNode());
|
|
||||||
realm.setEnabled(!realm.isEnabled());
|
|
||||||
return updateEntity(realm, getCurrentFailNode());
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,86 @@
|
||||||
|
package org.keycloak.testsuite.cluster;
|
||||||
|
|
||||||
|
import javax.ws.rs.NotFoundException;
|
||||||
|
import org.apache.commons.lang.RandomStringUtils;
|
||||||
|
import static org.junit.Assert.assertNull;
|
||||||
|
import org.keycloak.admin.client.resource.RoleResource;
|
||||||
|
import org.keycloak.admin.client.resource.RolesResource;
|
||||||
|
import org.keycloak.representations.idm.RoleRepresentation;
|
||||||
|
import org.keycloak.testsuite.arquillian.ContainerInfo;
|
||||||
|
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
* @author tkyjovsk
|
||||||
|
*/
|
||||||
|
public class RoleInvalidationClusterTest extends AbstractInvalidationClusterTestWithTestRealm<RoleRepresentation, RoleResource> {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected RoleRepresentation createTestEntityRepresentation() {
|
||||||
|
RoleRepresentation role = new RoleRepresentation();
|
||||||
|
role.setName("role_" + RandomStringUtils.randomAlphabetic(5));
|
||||||
|
role.setComposite(false);
|
||||||
|
role.setDescription("description of "+role.getName());
|
||||||
|
return role;
|
||||||
|
}
|
||||||
|
|
||||||
|
protected RolesResource roles(ContainerInfo node) {
|
||||||
|
return getAdminClientFor(node).realm(testRealmName).roles();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected RoleResource entityResource(RoleRepresentation role, ContainerInfo node) {
|
||||||
|
return entityResource(role.getName(), node);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected RoleResource entityResource(String name, ContainerInfo node) {
|
||||||
|
return roles(node).get(name);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected RoleRepresentation createEntity(RoleRepresentation role, ContainerInfo node) {
|
||||||
|
roles(node).create(role);
|
||||||
|
return readEntity(role, node);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected RoleRepresentation readEntity(RoleRepresentation role, ContainerInfo node) {
|
||||||
|
RoleRepresentation u = null;
|
||||||
|
try {
|
||||||
|
u = entityResource(role, node).toRepresentation();
|
||||||
|
} catch (NotFoundException nfe) {
|
||||||
|
// expected when role doesn't exist
|
||||||
|
}
|
||||||
|
return u;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected RoleRepresentation updateEntity(RoleRepresentation role, ContainerInfo node) {
|
||||||
|
return updateEntity(role.getName(), role, node);
|
||||||
|
}
|
||||||
|
|
||||||
|
private RoleRepresentation updateEntity(String roleName, RoleRepresentation role, ContainerInfo node) {
|
||||||
|
entityResource(roleName, node).update(role);
|
||||||
|
return readEntity(role, node);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void deleteEntity(RoleRepresentation role, ContainerInfo node) {
|
||||||
|
entityResource(role, node).remove();
|
||||||
|
assertNull(readEntity(role, node));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected RoleRepresentation testEntityUpdates(RoleRepresentation role, boolean backendFailover) {
|
||||||
|
|
||||||
|
// description
|
||||||
|
role.setDescription(role.getDescription()+"_- updated");
|
||||||
|
role = updateEntityOnCurrentFailNode(role, "description");
|
||||||
|
verifyEntityUpdateDuringFailover(role, backendFailover);
|
||||||
|
|
||||||
|
// TODO composites
|
||||||
|
|
||||||
|
return role;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -2,7 +2,9 @@ package org.keycloak.testsuite.cluster;
|
||||||
|
|
||||||
import javax.ws.rs.NotFoundException;
|
import javax.ws.rs.NotFoundException;
|
||||||
import javax.ws.rs.core.Response;
|
import javax.ws.rs.core.Response;
|
||||||
|
import org.apache.commons.lang.RandomStringUtils;
|
||||||
import static org.junit.Assert.assertNull;
|
import static org.junit.Assert.assertNull;
|
||||||
|
import org.keycloak.admin.client.resource.UserResource;
|
||||||
import org.keycloak.admin.client.resource.UsersResource;
|
import org.keycloak.admin.client.resource.UsersResource;
|
||||||
import org.keycloak.representations.idm.UserRepresentation;
|
import org.keycloak.representations.idm.UserRepresentation;
|
||||||
import org.keycloak.testsuite.admin.ApiUtil;
|
import org.keycloak.testsuite.admin.ApiUtil;
|
||||||
|
@ -12,12 +14,12 @@ import org.keycloak.testsuite.arquillian.ContainerInfo;
|
||||||
*
|
*
|
||||||
* @author tkyjovsk
|
* @author tkyjovsk
|
||||||
*/
|
*/
|
||||||
public class UserInvalidationClusterTest extends AbstractInvalidationClusterTestWithTestRealm<UserRepresentation> {
|
public class UserInvalidationClusterTest extends AbstractInvalidationClusterTestWithTestRealm<UserRepresentation, UserResource> {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected UserRepresentation createTestEntityRepresentation() {
|
protected UserRepresentation createTestEntityRepresentation() {
|
||||||
String firstName = "user";
|
String firstName = "user";
|
||||||
String lastName = randomString(5);
|
String lastName = RandomStringUtils.randomAlphabetic(5);
|
||||||
UserRepresentation user = new UserRepresentation();
|
UserRepresentation user = new UserRepresentation();
|
||||||
user.setUsername(firstName + "_" + lastName);
|
user.setUsername(firstName + "_" + lastName);
|
||||||
user.setEmail(user.getUsername() + "@email.test");
|
user.setEmail(user.getUsername() + "@email.test");
|
||||||
|
@ -30,6 +32,16 @@ public class UserInvalidationClusterTest extends AbstractInvalidationClusterTest
|
||||||
return getAdminClientFor(node).realm(testRealmName).users();
|
return getAdminClientFor(node).realm(testRealmName).users();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected UserResource entityResource(UserRepresentation user, ContainerInfo node) {
|
||||||
|
return entityResource(user.getId(), node);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected UserResource entityResource(String id, ContainerInfo node) {
|
||||||
|
return users(node).get(id);
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected UserRepresentation createEntity(UserRepresentation user, ContainerInfo node) {
|
protected UserRepresentation createEntity(UserRepresentation user, ContainerInfo node) {
|
||||||
Response response = users(node).create(user);
|
Response response = users(node).create(user);
|
||||||
|
@ -43,22 +55,22 @@ public class UserInvalidationClusterTest extends AbstractInvalidationClusterTest
|
||||||
protected UserRepresentation readEntity(UserRepresentation user, ContainerInfo node) {
|
protected UserRepresentation readEntity(UserRepresentation user, ContainerInfo node) {
|
||||||
UserRepresentation u = null;
|
UserRepresentation u = null;
|
||||||
try {
|
try {
|
||||||
u = users(node).get(user.getId()).toRepresentation();
|
u = entityResource(user, node).toRepresentation();
|
||||||
} catch (NotFoundException nfe) {
|
} catch (NotFoundException nfe) {
|
||||||
// exoected when user doesn't exist
|
// expected when user doesn't exist
|
||||||
}
|
}
|
||||||
return u;
|
return u;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected UserRepresentation updateEntity(UserRepresentation user, ContainerInfo node) {
|
protected UserRepresentation updateEntity(UserRepresentation user, ContainerInfo node) {
|
||||||
users(node).get(user.getId()).update(user);
|
entityResource(user, node).update(user);
|
||||||
return readEntity(user, node);
|
return readEntity(user, node);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected void deleteEntity(UserRepresentation user, ContainerInfo node) {
|
protected void deleteEntity(UserRepresentation user, ContainerInfo node) {
|
||||||
users(node).get(user.getId()).remove();
|
entityResource(user, node).remove();
|
||||||
assertNull(readEntity(user, node));
|
assertNull(readEntity(user, node));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -67,13 +79,13 @@ public class UserInvalidationClusterTest extends AbstractInvalidationClusterTest
|
||||||
|
|
||||||
// username
|
// username
|
||||||
user.setUsername(user.getUsername() + "_updated");
|
user.setUsername(user.getUsername() + "_updated");
|
||||||
user = updateEntity(user, getCurrentFailNode());
|
user = updateEntityOnCurrentFailNode(user, "username");
|
||||||
verifyEntityUpdateDuringFailover(user, backendFailover);
|
verifyEntityUpdateDuringFailover(user, backendFailover);
|
||||||
|
|
||||||
// first+lastName
|
// first+lastName
|
||||||
user.setFirstName(user.getFirstName() + "_updated");
|
user.setFirstName(user.getFirstName() + "_updated");
|
||||||
user.setLastName(user.getLastName() + "_updated");
|
user.setLastName(user.getLastName() + "_updated");
|
||||||
user = updateEntity(user, getCurrentFailNode());
|
user = updateEntityOnCurrentFailNode(user, "firstName/lastName");
|
||||||
verifyEntityUpdateDuringFailover(user, backendFailover);
|
verifyEntityUpdateDuringFailover(user, backendFailover);
|
||||||
|
|
||||||
return user;
|
return user;
|
||||||
|
|
Loading…
Reference in a new issue