KEYCLOAK-5273
This commit is contained in:
parent
74f5c1c160
commit
8c1a3253fb
1 changed files with 176 additions and 0 deletions
|
@ -0,0 +1,176 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.keycloak.testsuite.federation.storage;
|
||||||
|
|
||||||
|
import org.jboss.arquillian.container.test.api.Deployment;
|
||||||
|
import org.jboss.arquillian.graphene.page.Page;
|
||||||
|
import org.jboss.shrinkwrap.api.spec.WebArchive;
|
||||||
|
import org.junit.Assert;
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.keycloak.OAuth2Constants;
|
||||||
|
import org.keycloak.common.util.MultivaluedHashMap;
|
||||||
|
import org.keycloak.models.ClientModel;
|
||||||
|
import org.keycloak.models.ClientTemplateModel;
|
||||||
|
import org.keycloak.models.KeycloakSession;
|
||||||
|
import org.keycloak.models.ProtocolMapperModel;
|
||||||
|
import org.keycloak.models.RealmModel;
|
||||||
|
import org.keycloak.models.UserModel;
|
||||||
|
import org.keycloak.protocol.oidc.OIDCLoginProtocol;
|
||||||
|
import org.keycloak.protocol.oidc.OIDCLoginProtocolFactory;
|
||||||
|
import org.keycloak.protocol.oidc.OIDCLoginProtocolService;
|
||||||
|
import org.keycloak.representations.idm.ComponentRepresentation;
|
||||||
|
import org.keycloak.representations.idm.RoleRepresentation;
|
||||||
|
import org.keycloak.representations.idm.UserRepresentation;
|
||||||
|
import org.keycloak.storage.UserStorageProvider;
|
||||||
|
import org.keycloak.testsuite.adapter.AbstractServletsAdapterTest;
|
||||||
|
import org.keycloak.testsuite.adapter.page.ProductPortal;
|
||||||
|
import org.keycloak.testsuite.adapter.servlet.ProductServlet;
|
||||||
|
import org.keycloak.testsuite.admin.ApiUtil;
|
||||||
|
import org.keycloak.testsuite.arquillian.annotation.AppServerContainer;
|
||||||
|
import org.keycloak.testsuite.federation.UserMapStorageFactory;
|
||||||
|
import org.keycloak.testsuite.pages.ConsentPage;
|
||||||
|
|
||||||
|
import javax.ws.rs.core.Response;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.net.URISyntaxException;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.List;
|
||||||
|
import java.util.Map;
|
||||||
|
|
||||||
|
import static org.keycloak.testsuite.util.URLAssert.assertCurrentUrlEquals;
|
||||||
|
import static org.keycloak.testsuite.util.URLAssert.assertCurrentUrlStartsWithLoginUrlOf;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
||||||
|
* @version $Revision: 1 $
|
||||||
|
*/
|
||||||
|
@AppServerContainer("auth-server-undertow")
|
||||||
|
public class UserStorageConsentTest extends AbstractServletsAdapterTest {
|
||||||
|
|
||||||
|
@Page
|
||||||
|
private ProductPortal productPortal;
|
||||||
|
|
||||||
|
@Page
|
||||||
|
protected ConsentPage consentPage;
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@Deployment(name = ProductPortal.DEPLOYMENT_NAME)
|
||||||
|
protected static WebArchive productPortal() {
|
||||||
|
return servletDeployment(ProductPortal.DEPLOYMENT_NAME, ProductServlet.class);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Before
|
||||||
|
public void addProvidersBeforeTest() throws URISyntaxException, IOException {
|
||||||
|
ComponentRepresentation memProvider = new ComponentRepresentation();
|
||||||
|
memProvider.setName("memory");
|
||||||
|
memProvider.setProviderId(UserMapStorageFactory.PROVIDER_ID);
|
||||||
|
memProvider.setProviderType(UserStorageProvider.class.getName());
|
||||||
|
memProvider.setConfig(new MultivaluedHashMap<>());
|
||||||
|
memProvider.getConfig().putSingle("priority", Integer.toString(0));
|
||||||
|
|
||||||
|
addComponent(memProvider);
|
||||||
|
}
|
||||||
|
|
||||||
|
protected String addComponent(ComponentRepresentation component) {
|
||||||
|
Response resp = testRealmResource().components().add(component);
|
||||||
|
resp.close();
|
||||||
|
String id = ApiUtil.getCreatedId(resp);
|
||||||
|
getCleanup().addComponentId(id);
|
||||||
|
return id;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
public static void setupConsent(KeycloakSession session) {
|
||||||
|
RealmModel realm = session.realms().getRealmByName("demo");
|
||||||
|
ClientModel product = session.realms().getClientByClientId("product-portal", realm);
|
||||||
|
product.setConsentRequired(true);
|
||||||
|
ClientTemplateModel clientTemplate = realm.addClientTemplate("template");
|
||||||
|
clientTemplate.setFullScopeAllowed(true);
|
||||||
|
System.err.println("client template protocol mappers size: " + clientTemplate.getProtocolMappers().size());
|
||||||
|
|
||||||
|
for (ProtocolMapperModel mapper : product.getProtocolMappers()) {
|
||||||
|
if (mapper.getProtocol().equals(OIDCLoginProtocol.LOGIN_PROTOCOL)) {
|
||||||
|
if (mapper.getName().equals(OIDCLoginProtocolFactory.USERNAME)
|
||||||
|
|| mapper.getName().equals(OIDCLoginProtocolFactory.EMAIL)
|
||||||
|
|| mapper.getName().equals(OIDCLoginProtocolFactory.GIVEN_NAME)
|
||||||
|
) {
|
||||||
|
ProtocolMapperModel copy = new ProtocolMapperModel();
|
||||||
|
copy.setName(mapper.getName());
|
||||||
|
copy.setProtocol(mapper.getProtocol());
|
||||||
|
Map<String, String> config = new HashMap<>();
|
||||||
|
config.putAll(mapper.getConfig());
|
||||||
|
copy.setConfig(config);
|
||||||
|
copy.setProtocolMapper(mapper.getProtocolMapper());
|
||||||
|
copy.setConsentText(mapper.getConsentText());
|
||||||
|
clientTemplate.addProtocolMapper(copy);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
product.removeProtocolMapper(mapper);
|
||||||
|
}
|
||||||
|
product.setClientTemplate(clientTemplate);
|
||||||
|
product.setUseTemplateMappers(true);
|
||||||
|
product.setUseTemplateScope(true);
|
||||||
|
product.setUseTemplateConfig(false);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* KEYCLOAK-5273
|
||||||
|
*
|
||||||
|
* @throws Exception
|
||||||
|
*/
|
||||||
|
@Test
|
||||||
|
public void testLogin() throws Exception {
|
||||||
|
testingClient.server().run(UserStorageConsentTest::setupConsent);
|
||||||
|
UserRepresentation memuser = new UserRepresentation();
|
||||||
|
memuser.setUsername("memuser");
|
||||||
|
String uid = ApiUtil.createUserAndResetPasswordWithAdminClient(testRealmResource(), memuser, "password");
|
||||||
|
System.out.println("uid: " + uid);
|
||||||
|
Assert.assertTrue(uid.startsWith("f:")); // make sure its federated
|
||||||
|
RoleRepresentation roleRep = adminClient.realm("demo").roles().get("user").toRepresentation();
|
||||||
|
List<RoleRepresentation> roleList = new ArrayList<>();
|
||||||
|
roleList.add(roleRep);
|
||||||
|
adminClient.realm("demo").users().get(uid).roles().realmLevel().add(roleList);
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
productPortal.navigateTo();
|
||||||
|
assertCurrentUrlStartsWithLoginUrlOf(testRealmPage);
|
||||||
|
testRealmLoginPage.form().login("memuser", "password");
|
||||||
|
org.keycloak.testsuite.Assert.assertTrue(consentPage.isCurrent());
|
||||||
|
consentPage.confirm();
|
||||||
|
assertCurrentUrlEquals(productPortal.toString());
|
||||||
|
Assert.assertTrue(driver.getPageSource().contains("iPhone"));
|
||||||
|
String logoutUri = OIDCLoginProtocolService.logoutUrl(authServerPage.createUriBuilder())
|
||||||
|
.queryParam(OAuth2Constants.REDIRECT_URI, productPortal.toString())
|
||||||
|
.build("demo").toString();
|
||||||
|
|
||||||
|
driver.navigate().to(logoutUri);
|
||||||
|
assertCurrentUrlStartsWithLoginUrlOf(testRealmPage);
|
||||||
|
productPortal.navigateTo();
|
||||||
|
assertCurrentUrlStartsWithLoginUrlOf(testRealmPage);
|
||||||
|
testRealmLoginPage.form().login("memuser", "password");
|
||||||
|
assertCurrentUrlEquals(productPortal.toString());
|
||||||
|
Assert.assertTrue(driver.getPageSource().contains("iPhone")); }
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
}
|
Loading…
Reference in a new issue