keycloak-admin 1.1.3 → 1.1.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (94) hide show
  1. checksums.yaml +4 -4
  2. data/.github/workflows/Dockerfile +24 -24
  3. data/.github/workflows/ci.yml +80 -83
  4. data/.gitignore +9 -9
  5. data/.rspec +2 -2
  6. data/CHANGELOG.md +194 -188
  7. data/Dockerfile +12 -12
  8. data/Gemfile +3 -3
  9. data/Gemfile.lock +51 -49
  10. data/MIT-LICENSE +20 -20
  11. data/README.md +748 -748
  12. data/bin/console +9 -9
  13. data/keycloak-admin.gemspec +24 -24
  14. data/lib/keycloak-admin/client/attack_detection_client.rb +41 -41
  15. data/lib/keycloak-admin/client/client.rb +56 -56
  16. data/lib/keycloak-admin/client/client_authz_permission_client.rb +80 -80
  17. data/lib/keycloak-admin/client/client_authz_policy_client.rb +75 -75
  18. data/lib/keycloak-admin/client/client_authz_resource_client.rb +92 -92
  19. data/lib/keycloak-admin/client/client_authz_scope_client.rb +70 -70
  20. data/lib/keycloak-admin/client/client_client.rb +71 -71
  21. data/lib/keycloak-admin/client/client_role_client.rb +20 -20
  22. data/lib/keycloak-admin/client/client_role_mappings_client.rb +32 -32
  23. data/lib/keycloak-admin/client/configurable_token_client.rb +35 -35
  24. data/lib/keycloak-admin/client/group_client.rb +148 -131
  25. data/lib/keycloak-admin/client/identity_provider_client.rb +51 -51
  26. data/lib/keycloak-admin/client/realm_client.rb +122 -122
  27. data/lib/keycloak-admin/client/role_client.rb +59 -59
  28. data/lib/keycloak-admin/client/role_mapper_client.rb +47 -45
  29. data/lib/keycloak-admin/client/token_client.rb +29 -29
  30. data/lib/keycloak-admin/client/user_client.rb +266 -266
  31. data/lib/keycloak-admin/configuration.rb +52 -52
  32. data/lib/keycloak-admin/representation/attack_detection_representation.rb +17 -17
  33. data/lib/keycloak-admin/representation/camel_json.rb +12 -12
  34. data/lib/keycloak-admin/representation/client_authz_permission_representation.rb +33 -33
  35. data/lib/keycloak-admin/representation/client_authz_policy_config_representation.rb +14 -14
  36. data/lib/keycloak-admin/representation/client_authz_policy_representation.rb +26 -26
  37. data/lib/keycloak-admin/representation/client_authz_resource_representation.rb +25 -25
  38. data/lib/keycloak-admin/representation/client_authz_scope_representation.rb +16 -16
  39. data/lib/keycloak-admin/representation/client_representation.rb +71 -71
  40. data/lib/keycloak-admin/representation/credential_representation.rb +38 -38
  41. data/lib/keycloak-admin/representation/federated_identity_representation.rb +15 -15
  42. data/lib/keycloak-admin/representation/group_representation.rb +21 -21
  43. data/lib/keycloak-admin/representation/identity_provider_mapper_representation.rb +19 -19
  44. data/lib/keycloak-admin/representation/identity_provider_representation.rb +67 -67
  45. data/lib/keycloak-admin/representation/impersonation_redirection_representation.rb +16 -16
  46. data/lib/keycloak-admin/representation/impersonation_representation.rb +43 -43
  47. data/lib/keycloak-admin/representation/protocol_mapper_representation.rb +19 -19
  48. data/lib/keycloak-admin/representation/realm_representation.rb +14 -14
  49. data/lib/keycloak-admin/representation/representation.rb +23 -23
  50. data/lib/keycloak-admin/representation/role_representation.rb +19 -19
  51. data/lib/keycloak-admin/representation/session_representation.rb +22 -22
  52. data/lib/keycloak-admin/representation/token_representation.rb +39 -39
  53. data/lib/keycloak-admin/representation/user_representation.rb +47 -47
  54. data/lib/keycloak-admin/resource/base_role_containing_resource.rb +28 -28
  55. data/lib/keycloak-admin/resource/group_resource.rb +11 -11
  56. data/lib/keycloak-admin/resource/user_resource.rb +7 -7
  57. data/lib/keycloak-admin/version.rb +3 -3
  58. data/lib/keycloak-admin.rb +84 -84
  59. data/spec/client/attack_detection_client_spec.rb +102 -102
  60. data/spec/client/client_authz_permission_client_spec.rb +170 -170
  61. data/spec/client/client_authz_policy_client_spec.rb +169 -169
  62. data/spec/client/client_authz_resource_client_spec.rb +150 -150
  63. data/spec/client/client_authz_scope_client_spec.rb +133 -133
  64. data/spec/client/client_client_spec.rb +133 -133
  65. data/spec/client/client_role_mappings_client_spec.rb +82 -82
  66. data/spec/client/client_spec.rb +28 -28
  67. data/spec/client/configurable_token_client_spec.rb +34 -34
  68. data/spec/client/group_client_spec.rb +328 -258
  69. data/spec/client/identity_provider_client_spec.rb +92 -92
  70. data/spec/client/realm_client_spec.rb +155 -155
  71. data/spec/client/role_client_spec.rb +79 -79
  72. data/spec/client/role_mapper_client_spec.rb +113 -68
  73. data/spec/client/token_client_spec.rb +68 -68
  74. data/spec/client/user_client_spec.rb +373 -373
  75. data/spec/configuration_spec.rb +113 -113
  76. data/spec/integration/client_authorization_spec.rb +93 -95
  77. data/spec/representation/attack_detection_representation_spec.rb +15 -15
  78. data/spec/representation/client_authz_permission_representation_spec.rb +52 -52
  79. data/spec/representation/client_authz_policy_representation_spec.rb +46 -46
  80. data/spec/representation/client_authz_resource_representation_spec.rb +33 -33
  81. data/spec/representation/client_authz_scope_representation_spec.rb +18 -18
  82. data/spec/representation/client_representation_spec.rb +119 -119
  83. data/spec/representation/group_representation_spec.rb +22 -22
  84. data/spec/representation/identity_provider_mapper_representation_spec.rb +24 -24
  85. data/spec/representation/identity_provider_representation_spec.rb +113 -113
  86. data/spec/representation/impersonation_representation_spec.rb +163 -163
  87. data/spec/representation/protocol_mapper_representation_spec.rb +57 -57
  88. data/spec/representation/role_representation_spec.rb +37 -37
  89. data/spec/representation/session_representation_spec.rb +15 -15
  90. data/spec/representation/user_representation_spec.rb +15 -15
  91. data/spec/resource/group_resource_spec.rb +14 -14
  92. data/spec/resource/user_resource_spec.rb +14 -14
  93. data/spec/spec_helper.rb +37 -37
  94. metadata +10 -10
@@ -1,150 +1,150 @@
1
- RSpec.describe KeycloakAdmin::ClientAuthzResourceClient do
2
- describe "#initialize" do
3
- let(:realm_name) { nil }
4
- before(:each) do
5
- @realm = KeycloakAdmin.realm(realm_name)
6
- end
7
-
8
- context "when realm_name is defined" do
9
- let(:realm_name) { "master" }
10
- it "does not raise any error" do
11
- expect { @realm.attack_detections }.to_not raise_error
12
- end
13
- end
14
- context "when realm_name is not defined" do
15
- it "raise argument error" do
16
- expect { @realm.attack_detections }.to raise_error(ArgumentError)
17
- end
18
- end
19
- end
20
-
21
- describe "#list" do
22
- let(:realm_name) { "valid-realm" }
23
- let(:client_id) { "valid-client-id" }
24
- before(:each) do
25
- @client_authz_resource = KeycloakAdmin.realm(realm_name).authz_resources(client_id)
26
- stub_token_client
27
- allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '[{"name":"Default Resource","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":false,"_id":"94643fe2-1973-4a36-8e1f-830ade186398","uris":["/*"]},{"name":"asdfasdf","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":true,"displayName":"asdfasdfasdfa","_id":"385966a2-14b9-4cc4-9539-5f2fe1008222","uris":["/*"],"icon_uri":"http://icon"}]'
28
- end
29
-
30
- it "returns list of authz scopes" do
31
- response = @client_authz_resource.list
32
- expect(response.size).to eq 2
33
- expect(response[1].id).to eq "385966a2-14b9-4cc4-9539-5f2fe1008222"
34
- expect(response[1].name).to eq "asdfasdf"
35
- expect(response[1].type).to eq "urn:delme-client-id:resources:default"
36
- expect(response[1].owner_managed_access).to be_truthy
37
- end
38
- end
39
-
40
- describe '#get' do
41
- let(:realm_name) { "valid-realm" }
42
- let(:client_id) { "valid-client-id" }
43
- let(:resource_id) { "valid-resource-id" }
44
- let(:client_authz_resource) { KeycloakAdmin.realm(realm_name).authz_resources(client_id) }
45
- before(:each) do
46
- stub_token_client
47
- allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '{"name":"Default Resource","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":false,"_id":"94643fe2-1973-4a36-8e1f-830ade186398","uris":["/*"]}'
48
- end
49
-
50
- it "returns authz scope" do
51
- response = client_authz_resource.get(resource_id)
52
- expect(response.id).to eq "94643fe2-1973-4a36-8e1f-830ade186398"
53
- expect(response.name).to eq "Default Resource"
54
- expect(response.type).to eq "urn:delme-client-id:resources:default"
55
- expect(response.owner_managed_access).to be_falsey
56
- end
57
- end
58
-
59
- describe '#update' do
60
- let(:realm_name) { "valid-realm" }
61
- let(:client_id) { "valid-client-id" }
62
- let(:resource_id) { "valid-resource-id" }
63
- let(:client_authz_resource) { KeycloakAdmin.realm(realm_name).authz_resources(client_id) }
64
- before(:each) do
65
- stub_token_client
66
- allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '{"name":"Default Resource","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":false,"_id":"94643fe2-1973-4a36-8e1f-830ade186398","uris":["/*"]}'
67
- allow_any_instance_of(RestClient::Resource).to receive(:put).and_return '{"name":"Default Resource","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":false,"_id":"94643fe2-1973-4a36-8e1f-830ade186398","uris":["/*"]}'
68
- end
69
-
70
- it "returns updated authz scope" do
71
- response = client_authz_resource.update(resource_id, {name: "Default Resource", type: "urn:delme-client-id:resources:default", uris: ["/tmp/*"], owner_managed_access: false, display_name: "Default Resource", scopes: []})
72
- expect(response.id).to eq "94643fe2-1973-4a36-8e1f-830ade186398"
73
- expect(response.name).to eq "Default Resource"
74
- expect(response.type).to eq "urn:delme-client-id:resources:default"
75
- expect(response.owner_managed_access).to be_falsey
76
- end
77
- end
78
-
79
- describe '#create!' do
80
- let(:realm_name) { "valid-realm" }
81
- let(:client_id) { "valid-client-id" }
82
- before(:each) do
83
- @client_authz_resource = KeycloakAdmin.realm(realm_name).authz_resources(client_id)
84
- stub_token_client
85
- allow_any_instance_of(RestClient::Resource).to receive(:post).and_return '{"name":"Default Resource","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":false,"_id":"94643fe2-1973-4a36-8e1f-830ade186398","uris":["/*"]}'
86
- end
87
-
88
- it "returns created authz scope" do
89
- response = @client_authz_resource.create!("Default Resource", "urn:delme-client-id:resources:default", ["/tmp/*"], false, "Default Resource", [])
90
- expect(response.id).to eq "94643fe2-1973-4a36-8e1f-830ade186398"
91
- expect(response.name).to eq "Default Resource"
92
- expect(response.type).to eq "urn:delme-client-id:resources:default"
93
- expect(response.owner_managed_access).to be_falsey
94
- end
95
- end
96
-
97
- describe "#find_by" do
98
- let(:realm_name) { "valid-realm" }
99
- let(:client_id) { "valid-client-id" }
100
- let(:resource_id) { "valid-resource-id" }
101
- let(:client_authz_resource) { KeycloakAdmin.realm(realm_name).authz_resources(client_id) }
102
- before(:each) do
103
- stub_token_client
104
- allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '[{"name":"Default Resource","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":false,"_id":"94643fe2-1973-4a36-8e1f-830ade186398","uris":["/*"]}]'
105
- end
106
-
107
- it "returns list of authz scopes" do
108
- response = client_authz_resource.find_by("Default Resource", "urn:delme-client-id:resources:default", ["/tmp/*"], false, "")
109
- expect(response.size).to eq 1
110
- expect(response[0].id).to eq "94643fe2-1973-4a36-8e1f-830ade186398"
111
- expect(response[0].name).to eq "Default Resource"
112
- expect(response[0].type).to eq "urn:delme-client-id:resources:default"
113
- expect(response[0].owner_managed_access).to be_falsey
114
- end
115
- end
116
-
117
- describe "#authz_scopes_url" do
118
- let(:realm_name) { "valid-realm" }
119
- let(:client_id) { "valid-client-id" }
120
- let(:client_authz_resource){ KeycloakAdmin.realm(realm_name).authz_resources(client_id) }
121
-
122
- context 'when resource_id is nil' do
123
- it "return a proper url" do
124
- expect(client_authz_resource.authz_resources_url(client_id)).to eq "http://auth.service.io/auth/admin/realms/valid-realm/clients/valid-client-id/authz/resource-server/resource"
125
- end
126
- end
127
-
128
- context 'when resource_id is not nil' do
129
- it "return a proper url" do
130
- expect(client_authz_resource.authz_resources_url(client_id, "resource-id")).to eq "http://auth.service.io/auth/admin/realms/valid-realm/clients/valid-client-id/authz/resource-server/resource/resource-id"
131
- end
132
- end
133
- end
134
-
135
- describe "#delete" do
136
- let(:realm_name) { "valid-realm" }
137
- let(:client_id) { "valid-client-id" }
138
- let(:resource_id) { "valid-resource-id" }
139
- let(:client_authz_resource) { KeycloakAdmin.realm(realm_name).authz_resources(client_id) }
140
- before(:each) do
141
- stub_token_client
142
- allow_any_instance_of(RestClient::Resource).to receive(:delete).and_return '{}'
143
- end
144
-
145
- it "returns true" do
146
- response = client_authz_resource.delete(resource_id)
147
- expect(response).to be_truthy
148
- end
149
- end
150
- end
1
+ RSpec.describe KeycloakAdmin::ClientAuthzResourceClient do
2
+ describe "#initialize" do
3
+ let(:realm_name) { nil }
4
+ before(:each) do
5
+ @realm = KeycloakAdmin.realm(realm_name)
6
+ end
7
+
8
+ context "when realm_name is defined" do
9
+ let(:realm_name) { "master" }
10
+ it "does not raise any error" do
11
+ expect { @realm.attack_detections }.to_not raise_error
12
+ end
13
+ end
14
+ context "when realm_name is not defined" do
15
+ it "raise argument error" do
16
+ expect { @realm.attack_detections }.to raise_error(ArgumentError)
17
+ end
18
+ end
19
+ end
20
+
21
+ describe "#list" do
22
+ let(:realm_name) { "valid-realm" }
23
+ let(:client_id) { "valid-client-id" }
24
+ before(:each) do
25
+ @client_authz_resource = KeycloakAdmin.realm(realm_name).authz_resources(client_id)
26
+ stub_token_client
27
+ allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '[{"name":"Default Resource","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":false,"_id":"94643fe2-1973-4a36-8e1f-830ade186398","uris":["/*"]},{"name":"asdfasdf","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":true,"displayName":"asdfasdfasdfa","_id":"385966a2-14b9-4cc4-9539-5f2fe1008222","uris":["/*"],"icon_uri":"http://icon"}]'
28
+ end
29
+
30
+ it "returns list of authz scopes" do
31
+ response = @client_authz_resource.list
32
+ expect(response.size).to eq 2
33
+ expect(response[1].id).to eq "385966a2-14b9-4cc4-9539-5f2fe1008222"
34
+ expect(response[1].name).to eq "asdfasdf"
35
+ expect(response[1].type).to eq "urn:delme-client-id:resources:default"
36
+ expect(response[1].owner_managed_access).to be_truthy
37
+ end
38
+ end
39
+
40
+ describe '#get' do
41
+ let(:realm_name) { "valid-realm" }
42
+ let(:client_id) { "valid-client-id" }
43
+ let(:resource_id) { "valid-resource-id" }
44
+ let(:client_authz_resource) { KeycloakAdmin.realm(realm_name).authz_resources(client_id) }
45
+ before(:each) do
46
+ stub_token_client
47
+ allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '{"name":"Default Resource","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":false,"_id":"94643fe2-1973-4a36-8e1f-830ade186398","uris":["/*"]}'
48
+ end
49
+
50
+ it "returns authz scope" do
51
+ response = client_authz_resource.get(resource_id)
52
+ expect(response.id).to eq "94643fe2-1973-4a36-8e1f-830ade186398"
53
+ expect(response.name).to eq "Default Resource"
54
+ expect(response.type).to eq "urn:delme-client-id:resources:default"
55
+ expect(response.owner_managed_access).to be_falsey
56
+ end
57
+ end
58
+
59
+ describe '#update' do
60
+ let(:realm_name) { "valid-realm" }
61
+ let(:client_id) { "valid-client-id" }
62
+ let(:resource_id) { "valid-resource-id" }
63
+ let(:client_authz_resource) { KeycloakAdmin.realm(realm_name).authz_resources(client_id) }
64
+ before(:each) do
65
+ stub_token_client
66
+ allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '{"name":"Default Resource","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":false,"_id":"94643fe2-1973-4a36-8e1f-830ade186398","uris":["/*"]}'
67
+ allow_any_instance_of(RestClient::Resource).to receive(:put).and_return '{"name":"Default Resource","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":false,"_id":"94643fe2-1973-4a36-8e1f-830ade186398","uris":["/*"]}'
68
+ end
69
+
70
+ it "returns updated authz scope" do
71
+ response = client_authz_resource.update(resource_id, {name: "Default Resource", type: "urn:delme-client-id:resources:default", uris: ["/tmp/*"], owner_managed_access: false, display_name: "Default Resource", scopes: []})
72
+ expect(response.id).to eq "94643fe2-1973-4a36-8e1f-830ade186398"
73
+ expect(response.name).to eq "Default Resource"
74
+ expect(response.type).to eq "urn:delme-client-id:resources:default"
75
+ expect(response.owner_managed_access).to be_falsey
76
+ end
77
+ end
78
+
79
+ describe '#create!' do
80
+ let(:realm_name) { "valid-realm" }
81
+ let(:client_id) { "valid-client-id" }
82
+ before(:each) do
83
+ @client_authz_resource = KeycloakAdmin.realm(realm_name).authz_resources(client_id)
84
+ stub_token_client
85
+ allow_any_instance_of(RestClient::Resource).to receive(:post).and_return '{"name":"Default Resource","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":false,"_id":"94643fe2-1973-4a36-8e1f-830ade186398","uris":["/*"]}'
86
+ end
87
+
88
+ it "returns created authz scope" do
89
+ response = @client_authz_resource.create!("Default Resource", "urn:delme-client-id:resources:default", ["/tmp/*"], false, "Default Resource", [])
90
+ expect(response.id).to eq "94643fe2-1973-4a36-8e1f-830ade186398"
91
+ expect(response.name).to eq "Default Resource"
92
+ expect(response.type).to eq "urn:delme-client-id:resources:default"
93
+ expect(response.owner_managed_access).to be_falsey
94
+ end
95
+ end
96
+
97
+ describe "#find_by" do
98
+ let(:realm_name) { "valid-realm" }
99
+ let(:client_id) { "valid-client-id" }
100
+ let(:resource_id) { "valid-resource-id" }
101
+ let(:client_authz_resource) { KeycloakAdmin.realm(realm_name).authz_resources(client_id) }
102
+ before(:each) do
103
+ stub_token_client
104
+ allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '[{"name":"Default Resource","type":"urn:delme-client-id:resources:default","owner":{"id":"d259b451-371b-432a-a526-3508f3a36f3b","name":"delme-client-id"},"ownerManagedAccess":false,"_id":"94643fe2-1973-4a36-8e1f-830ade186398","uris":["/*"]}]'
105
+ end
106
+
107
+ it "returns list of authz scopes" do
108
+ response = client_authz_resource.find_by("Default Resource", "urn:delme-client-id:resources:default", ["/tmp/*"], false, "")
109
+ expect(response.size).to eq 1
110
+ expect(response[0].id).to eq "94643fe2-1973-4a36-8e1f-830ade186398"
111
+ expect(response[0].name).to eq "Default Resource"
112
+ expect(response[0].type).to eq "urn:delme-client-id:resources:default"
113
+ expect(response[0].owner_managed_access).to be_falsey
114
+ end
115
+ end
116
+
117
+ describe "#authz_scopes_url" do
118
+ let(:realm_name) { "valid-realm" }
119
+ let(:client_id) { "valid-client-id" }
120
+ let(:client_authz_resource){ KeycloakAdmin.realm(realm_name).authz_resources(client_id) }
121
+
122
+ context 'when resource_id is nil' do
123
+ it "return a proper url" do
124
+ expect(client_authz_resource.authz_resources_url(client_id)).to eq "http://auth.service.io/auth/admin/realms/valid-realm/clients/valid-client-id/authz/resource-server/resource"
125
+ end
126
+ end
127
+
128
+ context 'when resource_id is not nil' do
129
+ it "return a proper url" do
130
+ expect(client_authz_resource.authz_resources_url(client_id, "resource-id")).to eq "http://auth.service.io/auth/admin/realms/valid-realm/clients/valid-client-id/authz/resource-server/resource/resource-id"
131
+ end
132
+ end
133
+ end
134
+
135
+ describe "#delete" do
136
+ let(:realm_name) { "valid-realm" }
137
+ let(:client_id) { "valid-client-id" }
138
+ let(:resource_id) { "valid-resource-id" }
139
+ let(:client_authz_resource) { KeycloakAdmin.realm(realm_name).authz_resources(client_id) }
140
+ before(:each) do
141
+ stub_token_client
142
+ allow_any_instance_of(RestClient::Resource).to receive(:delete).and_return '{}'
143
+ end
144
+
145
+ it "returns true" do
146
+ response = client_authz_resource.delete(resource_id)
147
+ expect(response).to be_truthy
148
+ end
149
+ end
150
+ end
@@ -1,134 +1,134 @@
1
- RSpec.describe KeycloakAdmin::ClientAuthzScopeClient do
2
- describe "#initialize" do
3
- let(:realm_name) { nil }
4
- before(:each) do
5
- @realm = KeycloakAdmin.realm(realm_name)
6
- end
7
-
8
- context "when realm_name is defined" do
9
- let(:realm_name) { "master" }
10
- it "does not raise any error" do
11
- expect { @realm.attack_detections }.to_not raise_error
12
- end
13
- end
14
- context "when realm_name is not defined" do
15
- it "raise argument error" do
16
- expect { @realm.attack_detections }.to raise_error(ArgumentError)
17
- end
18
- end
19
- end
20
-
21
- describe "#create" do
22
- let(:realm_name) { "valid-realm" }
23
- let(:client_id) { "valid-client-id" }
24
- before(:each) do
25
- @client_authz_scope = KeycloakAdmin.realm(realm_name).authz_scopes(client_id)
26
- stub_token_client
27
- allow_any_instance_of(RestClient::Resource).to receive(:post).and_return '{"id":"c0779ce3-0900-4ea3-b1d6-b23e1f19c662","name":"GET","iconUri":"http://asdfasd1","displayName":"GET authz scope"}'
28
- end
29
-
30
- it "returns created authz scope" do
31
- response = @client_authz_scope.create!("GET", "GET authz scope", "http://asdfasd1")
32
- expect(response.id).to eq "c0779ce3-0900-4ea3-b1d6-b23e1f19c662"
33
- expect(response.name).to eq "GET"
34
- expect(response.display_name).to eq "GET authz scope"
35
- expect(response.icon_uri).to eq "http://asdfasd1"
36
- end
37
- end
38
-
39
- describe "#list" do
40
- let(:realm_name) { "valid-realm" }
41
- let(:client_id) { "valid-client-id" }
42
- before(:each) do
43
- @client_authz_scope = KeycloakAdmin.realm(realm_name).authz_scopes(client_id)
44
- stub_token_client
45
- allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '[{"id":"c0779ce3-0900-4ea3-b1d6-b23e1f19c662","name":"GET","iconUri":"http://asdfasd1","displayName":"GET authz scope"},{"id":"d0779ce3-0900-4ea3-b1d6-b23e1f19c662","name":"POST","iconUri":"http://asdfasd2","displayName":"POST authz scope"}]'
46
- end
47
-
48
- it "returns list of authz scopes" do
49
- response = @client_authz_scope.list
50
- expect(response.size).to eq 2
51
- expect(response.first.id).to eq "c0779ce3-0900-4ea3-b1d6-b23e1f19c662"
52
- expect(response.first.name).to eq "GET"
53
- expect(response.first.display_name).to eq "GET authz scope"
54
- expect(response.first.icon_uri).to eq "http://asdfasd1"
55
- end
56
- end
57
-
58
-
59
- describe "#delete" do
60
- let(:realm_name) { "valid-realm" }
61
- let(:client_id) { "valid-client-id" }
62
- let(:scope_id) { "valid-scope-id" }
63
- before(:each) do
64
- @client_authz_scope = KeycloakAdmin.realm(realm_name).authz_scopes(client_id)
65
- stub_token_client
66
- allow_any_instance_of(RestClient::Resource).to receive(:delete).and_return ""
67
- end
68
-
69
- it "returns true" do
70
- response = @client_authz_scope.delete(scope_id)
71
- expect(response).to eq true
72
- end
73
- end
74
-
75
- describe '#get' do
76
- let(:realm_name) { "valid-realm" }
77
- let(:client_id) { "valid-client-id" }
78
- let(:scope_id) { "valid-scope-id" }
79
- before(:each) do
80
- @client_authz_scope = KeycloakAdmin.realm(realm_name).authz_scopes(client_id)
81
- stub_token_client
82
- allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '{"id":"c0779ce3-0900-4ea3-b1d6-b23e1f19c662","name":"GET","iconUri":"http://asdfasd1","displayName":"GET authz scope"}'
83
- end
84
-
85
- it "returns authz scope" do
86
- response = @client_authz_scope.get(scope_id)
87
- expect(response.id).to eq "c0779ce3-0900-4ea3-b1d6-b23e1f19c662"
88
- expect(response.name).to eq "GET"
89
- expect(response.display_name).to eq "GET authz scope"
90
- expect(response.icon_uri).to eq "http://asdfasd1"
91
- end
92
- end
93
-
94
- describe '#search' do
95
- let(:realm_name) { "valid-realm" }
96
- let(:client_id) { "valid-client-id" }
97
- let(:name) { "GET" }
98
- before(:each) do
99
- @client_authz_scope = KeycloakAdmin.realm(realm_name).authz_scopes(client_id)
100
- stub_token_client
101
- allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '[{"id":"c0779ce3-0900-4ea3-b1d6-b23e1f19c662","name":"GET","iconUri":"http://asdfasd1","displayName":"GET authz scope"}]'
102
- end
103
-
104
- it "returns list of authz scopes" do
105
- response = @client_authz_scope.search(name)
106
- expect(response.size).to eq 1
107
- expect(response.first.id).to eq "c0779ce3-0900-4ea3-b1d6-b23e1f19c662"
108
- expect(response.first.name).to eq "GET"
109
- expect(response.first.display_name).to eq "GET authz scope"
110
- expect(response.first.icon_uri).to eq "http://asdfasd1"
111
- end
112
- end
113
-
114
- describe "#authz_scopes_url" do
115
- let(:realm_name) { "valid-realm" }
116
- let(:client_id) { "valid-client-id" }
117
- let(:client_authz_scope) { KeycloakAdmin.realm(realm_name).authz_scopes(client_id) }
118
- context 'resource_id is nil and id is nil' do
119
- it "return a proper url" do
120
- expect(client_authz_scope.authz_scopes_url(client_id)).to eq "http://auth.service.io/auth/admin/realms/valid-realm/clients/valid-client-id/authz/resource-server/scope"
121
- end
122
- end
123
- context 'resource_id is not nil' do
124
- it "return a proper url" do
125
- expect(client_authz_scope.authz_scopes_url(client_id, "valid-resource-id")).to eq "http://auth.service.io/auth/admin/realms/valid-realm/clients/valid-client-id/authz/resource-server/resource/valid-resource-id/scopes"
126
- end
127
- end
128
- context 'resource_id is nil and id is not nil' do
129
- it "return a proper url" do
130
- expect(client_authz_scope.authz_scopes_url(client_id, nil, "valid-id")).to eq "http://auth.service.io/auth/admin/realms/valid-realm/clients/valid-client-id/authz/resource-server/scope/valid-id"
131
- end
132
- end
133
- end
1
+ RSpec.describe KeycloakAdmin::ClientAuthzScopeClient do
2
+ describe "#initialize" do
3
+ let(:realm_name) { nil }
4
+ before(:each) do
5
+ @realm = KeycloakAdmin.realm(realm_name)
6
+ end
7
+
8
+ context "when realm_name is defined" do
9
+ let(:realm_name) { "master" }
10
+ it "does not raise any error" do
11
+ expect { @realm.attack_detections }.to_not raise_error
12
+ end
13
+ end
14
+ context "when realm_name is not defined" do
15
+ it "raise argument error" do
16
+ expect { @realm.attack_detections }.to raise_error(ArgumentError)
17
+ end
18
+ end
19
+ end
20
+
21
+ describe "#create" do
22
+ let(:realm_name) { "valid-realm" }
23
+ let(:client_id) { "valid-client-id" }
24
+ before(:each) do
25
+ @client_authz_scope = KeycloakAdmin.realm(realm_name).authz_scopes(client_id)
26
+ stub_token_client
27
+ allow_any_instance_of(RestClient::Resource).to receive(:post).and_return '{"id":"c0779ce3-0900-4ea3-b1d6-b23e1f19c662","name":"GET","iconUri":"http://asdfasd1","displayName":"GET authz scope"}'
28
+ end
29
+
30
+ it "returns created authz scope" do
31
+ response = @client_authz_scope.create!("GET", "GET authz scope", "http://asdfasd1")
32
+ expect(response.id).to eq "c0779ce3-0900-4ea3-b1d6-b23e1f19c662"
33
+ expect(response.name).to eq "GET"
34
+ expect(response.display_name).to eq "GET authz scope"
35
+ expect(response.icon_uri).to eq "http://asdfasd1"
36
+ end
37
+ end
38
+
39
+ describe "#list" do
40
+ let(:realm_name) { "valid-realm" }
41
+ let(:client_id) { "valid-client-id" }
42
+ before(:each) do
43
+ @client_authz_scope = KeycloakAdmin.realm(realm_name).authz_scopes(client_id)
44
+ stub_token_client
45
+ allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '[{"id":"c0779ce3-0900-4ea3-b1d6-b23e1f19c662","name":"GET","iconUri":"http://asdfasd1","displayName":"GET authz scope"},{"id":"d0779ce3-0900-4ea3-b1d6-b23e1f19c662","name":"POST","iconUri":"http://asdfasd2","displayName":"POST authz scope"}]'
46
+ end
47
+
48
+ it "returns list of authz scopes" do
49
+ response = @client_authz_scope.list
50
+ expect(response.size).to eq 2
51
+ expect(response.first.id).to eq "c0779ce3-0900-4ea3-b1d6-b23e1f19c662"
52
+ expect(response.first.name).to eq "GET"
53
+ expect(response.first.display_name).to eq "GET authz scope"
54
+ expect(response.first.icon_uri).to eq "http://asdfasd1"
55
+ end
56
+ end
57
+
58
+
59
+ describe "#delete" do
60
+ let(:realm_name) { "valid-realm" }
61
+ let(:client_id) { "valid-client-id" }
62
+ let(:scope_id) { "valid-scope-id" }
63
+ before(:each) do
64
+ @client_authz_scope = KeycloakAdmin.realm(realm_name).authz_scopes(client_id)
65
+ stub_token_client
66
+ allow_any_instance_of(RestClient::Resource).to receive(:delete).and_return ""
67
+ end
68
+
69
+ it "returns true" do
70
+ response = @client_authz_scope.delete(scope_id)
71
+ expect(response).to eq true
72
+ end
73
+ end
74
+
75
+ describe '#get' do
76
+ let(:realm_name) { "valid-realm" }
77
+ let(:client_id) { "valid-client-id" }
78
+ let(:scope_id) { "valid-scope-id" }
79
+ before(:each) do
80
+ @client_authz_scope = KeycloakAdmin.realm(realm_name).authz_scopes(client_id)
81
+ stub_token_client
82
+ allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '{"id":"c0779ce3-0900-4ea3-b1d6-b23e1f19c662","name":"GET","iconUri":"http://asdfasd1","displayName":"GET authz scope"}'
83
+ end
84
+
85
+ it "returns authz scope" do
86
+ response = @client_authz_scope.get(scope_id)
87
+ expect(response.id).to eq "c0779ce3-0900-4ea3-b1d6-b23e1f19c662"
88
+ expect(response.name).to eq "GET"
89
+ expect(response.display_name).to eq "GET authz scope"
90
+ expect(response.icon_uri).to eq "http://asdfasd1"
91
+ end
92
+ end
93
+
94
+ describe '#search' do
95
+ let(:realm_name) { "valid-realm" }
96
+ let(:client_id) { "valid-client-id" }
97
+ let(:name) { "GET" }
98
+ before(:each) do
99
+ @client_authz_scope = KeycloakAdmin.realm(realm_name).authz_scopes(client_id)
100
+ stub_token_client
101
+ allow_any_instance_of(RestClient::Resource).to receive(:get).and_return '[{"id":"c0779ce3-0900-4ea3-b1d6-b23e1f19c662","name":"GET","iconUri":"http://asdfasd1","displayName":"GET authz scope"}]'
102
+ end
103
+
104
+ it "returns list of authz scopes" do
105
+ response = @client_authz_scope.search(name)
106
+ expect(response.size).to eq 1
107
+ expect(response.first.id).to eq "c0779ce3-0900-4ea3-b1d6-b23e1f19c662"
108
+ expect(response.first.name).to eq "GET"
109
+ expect(response.first.display_name).to eq "GET authz scope"
110
+ expect(response.first.icon_uri).to eq "http://asdfasd1"
111
+ end
112
+ end
113
+
114
+ describe "#authz_scopes_url" do
115
+ let(:realm_name) { "valid-realm" }
116
+ let(:client_id) { "valid-client-id" }
117
+ let(:client_authz_scope) { KeycloakAdmin.realm(realm_name).authz_scopes(client_id) }
118
+ context 'resource_id is nil and id is nil' do
119
+ it "return a proper url" do
120
+ expect(client_authz_scope.authz_scopes_url(client_id)).to eq "http://auth.service.io/auth/admin/realms/valid-realm/clients/valid-client-id/authz/resource-server/scope"
121
+ end
122
+ end
123
+ context 'resource_id is not nil' do
124
+ it "return a proper url" do
125
+ expect(client_authz_scope.authz_scopes_url(client_id, "valid-resource-id")).to eq "http://auth.service.io/auth/admin/realms/valid-realm/clients/valid-client-id/authz/resource-server/resource/valid-resource-id/scopes"
126
+ end
127
+ end
128
+ context 'resource_id is nil and id is not nil' do
129
+ it "return a proper url" do
130
+ expect(client_authz_scope.authz_scopes_url(client_id, nil, "valid-id")).to eq "http://auth.service.io/auth/admin/realms/valid-realm/clients/valid-client-id/authz/resource-server/scope/valid-id"
131
+ end
132
+ end
133
+ end
134
134
  end