RED-4515 - kc createRealm

This commit is contained in:
Timo Bejan 2023-03-23 17:24:26 +02:00
parent 91efd63311
commit 883ecf6461
5 changed files with 19 additions and 24 deletions

View File

@ -119,7 +119,7 @@ public class SwaggerAutoConfiguration {
OAuthFlow flow = createAuthorizationCodeFlow();
return new OAuthFlows().authorizationCode(flow);
return new OAuthFlows().implicit(flow);
}

View File

@ -222,29 +222,8 @@ public class TenantManagementService {
redactionClient.setImplicitFlowEnabled(true);
redactionClient.setDirectAccessGrantsEnabled(true);
var swaggerClient = new ClientRepresentation();
swaggerClient.setEnabled(true);
swaggerClient.setName("swagger-ui-client");
swaggerClient.setClientId("swagger-ui-client");
swaggerClient.setStandardFlowEnabled(true);
swaggerClient.setImplicitFlowEnabled(false);
swaggerClient.setDirectAccessGrantsEnabled(false);
swaggerClient.setServiceAccountsEnabled(true);
swaggerClient.setAuthorizationServicesEnabled(true);
swaggerClient.setSecret("OsloImWinter!23");
var redactionSystemClient = new ClientRepresentation();
redactionSystemClient.setEnabled(true);
redactionSystemClient.setName(keyCloakSettings.getClientId());
redactionSystemClient.setClientId(keyCloakSettings.getClientId());
redactionSystemClient.setSecret(keyCloakSettings.getClientSecret());
swaggerClient.setStandardFlowEnabled(true);
swaggerClient.setImplicitFlowEnabled(true);
swaggerClient.setDirectAccessGrantsEnabled(true);
swaggerClient.setServiceAccountsEnabled(true);
swaggerClient.setAuthorizationServicesEnabled(true);
redaction.setClients(List.of(redactionClient, redactionSystemClient, swaggerClient));
redaction.setClients(List.of(redactionClient));
var redUserRole = new RoleRepresentation();
redUserRole.setComposite(true);
redUserRole.setName(RED_USER_ROLE);

View File

@ -154,7 +154,7 @@ springdoc:
operations-sorter: alpha
tags-sorter: alpha
oauth:
client-id: swagger-ui-client
client-id: redaction
doc-expansion: none
enabled: ${swagger.enabled}
config-url: /redaction-gateway-v1/docs/swagger-config

View File

@ -16,6 +16,7 @@ import org.junit.jupiter.api.AfterEach;
import org.junit.jupiter.api.BeforeEach;
import org.junit.jupiter.api.extension.ExtendWith;
import org.keycloak.adapters.springboot.KeycloakSpringBootProperties;
import org.keycloak.representations.idm.ClientRepresentation;
import org.mockito.Mockito;
import org.springframework.amqp.core.AmqpAdmin;
import org.springframework.amqp.rabbit.core.RabbitTemplate;
@ -210,6 +211,8 @@ public abstract class AbstractPersistenceServerServiceTest {
private UserService userService;
@Autowired
private TokenService tokenService;
@Autowired
private KeyCloakSettings keyCloakSettings;
@BeforeEach
@ -237,6 +240,15 @@ public abstract class AbstractPersistenceServerServiceTest {
if (allUsers.isEmpty()) {
var redactionSystemClient = new ClientRepresentation();
redactionSystemClient.setEnabled(true);
redactionSystemClient.setName(keyCloakSettings.getClientId());
redactionSystemClient.setClientId(keyCloakSettings.getClientId());
redactionSystemClient.setSecret(keyCloakSettings.getClientSecret());
KeyCloakTestContainer.getInstance().getKeycloakAdminClient().realm("redaction").clients().create(redactionSystemClient);
var admin1 = createUser("manageradmin1@test.com");
var admin2 = createUser("manageradmin2@test.com");

View File

@ -2,6 +2,7 @@ package com.iqser.red.service.peristence.v1.server.integration.utils;
import java.util.concurrent.TimeUnit;
import javax.ws.rs.BadRequestException;
import javax.ws.rs.NotAuthorizedException;
import org.jboss.resteasy.client.jaxrs.ResteasyClientBuilder;
@ -48,6 +49,9 @@ public class TokenService {
try {
return tokenClient.tokenManager().getAccessTokenString();
} catch (BadRequestException e) {
var response = e.getResponse().getEntity();
System.out.println(response);
} catch (NotAuthorizedException e) {
throw new AuthenticationFailedException(e);
} finally {