|
| 1 | +import os |
| 2 | +import functools |
| 3 | + |
| 4 | +import requests |
| 5 | + |
| 6 | + |
| 7 | +class KeyCloakAPIClient: |
| 8 | + def __init__(self): |
| 9 | + self.base_url = os.getenv("KEYCLOAK_BASE_URL") |
| 10 | + self.realm = os.getenv("KEYCLOAK_REALM") |
| 11 | + self.admin_user = os.getenv("KEYCLOAK_ADMIN_USER") |
| 12 | + self.admin_password = os.getenv("KEYCLOAK_ADMIN_PASSWORD") |
| 13 | + self.client_id = os.getenv("KEYCLOAK_CLIENT_ID", "admin-cli") |
| 14 | + |
| 15 | + self.token_url = ( |
| 16 | + f"{self.base_url}/realms/{self.realm}/protocol/openid-connect/token" |
| 17 | + ) |
| 18 | + |
| 19 | + @functools.cached_property |
| 20 | + def api_client(self): |
| 21 | + params = { |
| 22 | + "grant_type": "password", |
| 23 | + "client_id": self.client_id, |
| 24 | + "username": self.admin_user, |
| 25 | + "password": self.admin_password, |
| 26 | + "scope": "openid", |
| 27 | + } |
| 28 | + r = requests.post(self.token_url, data=params).json() |
| 29 | + headers = { |
| 30 | + "Authorization": ("Bearer %s" % r["access_token"]), |
| 31 | + "Content-Type": "application/json", |
| 32 | + } |
| 33 | + session = requests.session() |
| 34 | + session.headers.update(headers) |
| 35 | + return session |
| 36 | + |
| 37 | + def create_group(self, group_name): |
| 38 | + url = f"{self.base_url}/admin/realms/{self.realm}/groups" |
| 39 | + payload = {"name": group_name} |
| 40 | + response = self.api_client.post(url, json=payload) |
| 41 | + |
| 42 | + # If group already exists, ignore and move on |
| 43 | + if response.status_code not in (201, 409): |
| 44 | + response.raise_for_status() |
| 45 | + |
| 46 | + def create_user(self, cf_username): |
| 47 | + """Helper function to create user in Keycloak, for testing purposes only""" |
| 48 | + url = f"{self.base_url}/admin/realms/{self.realm}/users" |
| 49 | + payload = { |
| 50 | + "username": cf_username, |
| 51 | + "enabled": True, |
| 52 | + "email": cf_username, |
| 53 | + } |
| 54 | + r = self.api_client.post(url, json=payload) |
| 55 | + r.raise_for_status() |
| 56 | + |
| 57 | + def get_group_id(self, group_name) -> str | None: |
| 58 | + """Return None if group not found""" |
| 59 | + query = f"search={group_name}&exact=true" |
| 60 | + url = f"{self.base_url}/admin/realms/{self.realm}/groups?{query}" |
| 61 | + r = self.api_client.get(url).json() |
| 62 | + return r[0]["id"] if r else None |
| 63 | + |
| 64 | + def get_user_id(self, cf_username) -> str | None: |
| 65 | + """Return None if user not found""" |
| 66 | + # TODO (Quan): Confirm that Coldfront usernames map to Keycloak emails, not email, or something else? |
| 67 | + query = f"email={cf_username}&exact=true" |
| 68 | + url = f"{self.base_url}/admin/realms/{self.realm}/users?{query}" |
| 69 | + r = self.api_client.get(url).json() |
| 70 | + return r[0]["id"] if r else None |
| 71 | + |
| 72 | + def add_user_to_group(self, user_id, group_id): |
| 73 | + url = f"{self.base_url}/admin/realms/{self.realm}/users/{user_id}/groups/{group_id}" |
| 74 | + r = self.api_client.put(url) |
| 75 | + r.raise_for_status() |
| 76 | + |
| 77 | + def get_user_groups(self, user_id) -> list[str]: |
| 78 | + url = f"{self.base_url}/admin/realms/{self.realm}/users/{user_id}/groups" |
| 79 | + r = self.api_client.get(url) |
| 80 | + r.raise_for_status() |
| 81 | + return [group["name"] for group in r.json()] |
0 commit comments