KEYCLOAK-16249 Client Policy - Condition : Client - Any Client
This commit is contained in:
parent
1402d021de
commit
f423c0dc51
4 changed files with 161 additions and 1 deletions
|
@ -0,0 +1,53 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2020 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.keycloak.services.clientpolicy.condition;
|
||||||
|
|
||||||
|
import org.jboss.logging.Logger;
|
||||||
|
import org.keycloak.component.ComponentModel;
|
||||||
|
import org.keycloak.models.KeycloakSession;
|
||||||
|
import org.keycloak.services.clientpolicy.ClientPolicyContext;
|
||||||
|
import org.keycloak.services.clientpolicy.ClientPolicyException;
|
||||||
|
import org.keycloak.services.clientpolicy.ClientPolicyVote;
|
||||||
|
|
||||||
|
public class AnyClientCondition implements ClientPolicyConditionProvider {
|
||||||
|
private static final Logger logger = Logger.getLogger(AnyClientCondition.class);
|
||||||
|
|
||||||
|
private final KeycloakSession session;
|
||||||
|
private final ComponentModel componentModel;
|
||||||
|
|
||||||
|
public AnyClientCondition(KeycloakSession session, ComponentModel componentModel) {
|
||||||
|
this.session = session;
|
||||||
|
this.componentModel = componentModel;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ClientPolicyVote applyPolicy(ClientPolicyContext context) throws ClientPolicyException {
|
||||||
|
return ClientPolicyVote.YES;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getName() {
|
||||||
|
return componentModel.getName();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getProviderId() {
|
||||||
|
return componentModel.getProviderId();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -0,0 +1,65 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2020 Red Hat, Inc. and/or its affiliates
|
||||||
|
* and other contributors as indicated by the @author tags.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.keycloak.services.clientpolicy.condition;
|
||||||
|
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import org.keycloak.Config.Scope;
|
||||||
|
import org.keycloak.component.ComponentModel;
|
||||||
|
import org.keycloak.models.KeycloakSession;
|
||||||
|
import org.keycloak.models.KeycloakSessionFactory;
|
||||||
|
import org.keycloak.provider.ProviderConfigProperty;
|
||||||
|
|
||||||
|
public class AnyClientConditionFactory implements ClientPolicyConditionProviderFactory {
|
||||||
|
|
||||||
|
public static final String PROVIDER_ID = "anyclient-condition";
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ClientPolicyConditionProvider create(KeycloakSession session, ComponentModel model) {
|
||||||
|
return new AnyClientCondition(session, model);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void init(Scope config) {
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void postInit(KeycloakSessionFactory factory) {
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void close() {
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getId() {
|
||||||
|
return PROVIDER_ID;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getHelpText() {
|
||||||
|
return "The condition is satisfied by any client on any event.";
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public List<ProviderConfigProperty> getConfigProperties() {
|
||||||
|
return Collections.emptyList();
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -5,3 +5,4 @@ org.keycloak.services.clientpolicy.condition.ClientAccessTypeConditionFactory
|
||||||
org.keycloak.services.clientpolicy.condition.ClientUpdateSourceHostsConditionFactory
|
org.keycloak.services.clientpolicy.condition.ClientUpdateSourceHostsConditionFactory
|
||||||
org.keycloak.services.clientpolicy.condition.ClientUpdateSourceGroupsConditionFactory
|
org.keycloak.services.clientpolicy.condition.ClientUpdateSourceGroupsConditionFactory
|
||||||
org.keycloak.services.clientpolicy.condition.ClientUpdateSourceRolesConditionFactory
|
org.keycloak.services.clientpolicy.condition.ClientUpdateSourceRolesConditionFactory
|
||||||
|
org.keycloak.services.clientpolicy.condition.AnyClientConditionFactory
|
|
@ -114,6 +114,7 @@ import org.keycloak.services.Urls;
|
||||||
import org.keycloak.services.clientpolicy.ClientPolicyException;
|
import org.keycloak.services.clientpolicy.ClientPolicyException;
|
||||||
import org.keycloak.services.clientpolicy.ClientPolicyProvider;
|
import org.keycloak.services.clientpolicy.ClientPolicyProvider;
|
||||||
import org.keycloak.services.clientpolicy.DefaultClientPolicyProviderFactory;
|
import org.keycloak.services.clientpolicy.DefaultClientPolicyProviderFactory;
|
||||||
|
import org.keycloak.services.clientpolicy.condition.AnyClientConditionFactory;
|
||||||
import org.keycloak.services.clientpolicy.condition.ClientAccessTypeConditionFactory;
|
import org.keycloak.services.clientpolicy.condition.ClientAccessTypeConditionFactory;
|
||||||
import org.keycloak.services.clientpolicy.condition.ClientPolicyConditionProvider;
|
import org.keycloak.services.clientpolicy.condition.ClientPolicyConditionProvider;
|
||||||
import org.keycloak.services.clientpolicy.condition.ClientUpdateContextConditionFactory;
|
import org.keycloak.services.clientpolicy.condition.ClientUpdateContextConditionFactory;
|
||||||
|
@ -1310,6 +1311,46 @@ public class ClientPolicyBasicsTest extends AbstractKeycloakTest {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testAnyClientCondition() throws ClientRegistrationException, ClientPolicyException {
|
||||||
|
String policyName = "MyPolicy";
|
||||||
|
createPolicy(policyName, DefaultClientPolicyProviderFactory.PROVIDER_ID, null, null, null);
|
||||||
|
logger.info("... Created Policy : " + policyName);
|
||||||
|
createCondition("AnyClientCondition", AnyClientConditionFactory.PROVIDER_ID, null, (ComponentRepresentation provider) -> {
|
||||||
|
});
|
||||||
|
registerCondition("AnyClientCondition", policyName);
|
||||||
|
logger.info("... Registered Condition : " + "AnyClientCondition");
|
||||||
|
|
||||||
|
createExecutor("SecureSessionEnforceExecutor", SecureSessionEnforceExecutorFactory.PROVIDER_ID, null, (ComponentRepresentation provider) -> {
|
||||||
|
});
|
||||||
|
registerExecutor("SecureSessionEnforceExecutor", policyName);
|
||||||
|
logger.info("... Registered Executor : SecureSessionEnforceExecutor-beta");
|
||||||
|
|
||||||
|
String clientAlphaId = "Alpha-App";
|
||||||
|
String clientAlphaSecret = "secretAlpha";
|
||||||
|
String cAlphaId = createClientByAdmin(clientAlphaId, (ClientRepresentation clientRep) -> {
|
||||||
|
clientRep.setDefaultRoles((String[]) Arrays.asList("sample-client-role-alpha").toArray(new String[1]));
|
||||||
|
clientRep.setSecret(clientAlphaSecret);
|
||||||
|
});
|
||||||
|
|
||||||
|
String clientBetaId = "Beta-App";
|
||||||
|
String clientBetaSecret = "secretBeta";
|
||||||
|
String cBetaId = createClientByAdmin(clientBetaId, (ClientRepresentation clientRep) -> {
|
||||||
|
clientRep.setSecret(clientBetaSecret);
|
||||||
|
});
|
||||||
|
|
||||||
|
try {
|
||||||
|
failLoginWithoutSecureSessionParameter(clientBetaId, "Missing parameter: nonce");
|
||||||
|
oauth.nonce("yesitisnonce");
|
||||||
|
successfulLoginAndLogout(clientAlphaId, clientAlphaSecret);
|
||||||
|
} catch (Exception e) {
|
||||||
|
fail();
|
||||||
|
} finally {
|
||||||
|
deleteClientByAdmin(cAlphaId);
|
||||||
|
deleteClientByAdmin(cBetaId);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
private CloseableHttpResponse sendRequest(String requestUrl, List<NameValuePair> parameters) throws Exception {
|
private CloseableHttpResponse sendRequest(String requestUrl, List<NameValuePair> parameters) throws Exception {
|
||||||
CloseableHttpClient client = new DefaultHttpClient();
|
CloseableHttpClient client = new DefaultHttpClient();
|
||||||
try {
|
try {
|
||||||
|
|
Loading…
Reference in a new issue