Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Keycloak support #44

Draft
wants to merge 1 commit into
base: 2.5.x
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions gradle/libs.versions.toml
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,7 @@ micronaut-test = "3.1.1"
micronaut-gradle-plugin = "3.4.1"
groovy = "3.0.10"
spock = "2.1-groovy-3.0"
testcontainers-oauth2-keycloak = "2.2.2"

# Managed versions appear in the BOM
managed-testcontainers = "1.17.2"
Expand All @@ -39,6 +40,7 @@ testcontainers-mongodb = { module = "org.testcontainers:mongodb", version = "" }
testcontainers-mssql = { module = "org.testcontainers:mssqlserver", version = "" }
testcontainers-mysql = { module = "org.testcontainers:mysql", version = "" }
testcontainers-neo4j = { module = "org.testcontainers:neo4j", version = "" }
testcontainers-oauth2-keycloak = { module = "com.github.dasniko:testcontainers-keycloak", version.ref = "testcontainers-oauth2-keycloak"}
testcontainers-oracle-xe = { module = "org.testcontainers:oracle-xe", version = "" }
testcontainers-postgres = { module = "org.testcontainers:postgresql", version = "" }
testcontainers-rabbitmq = { module = "org.testcontainers:rabbitmq", version = "" }
Expand Down
1 change: 1 addition & 0 deletions settings.gradle
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,7 @@ include 'test-resources-hivemq'
include 'test-resources-kafka'
include 'test-resources-mongodb'
include 'test-resources-neo4j'
include 'test-resources-oauth2'
include 'test-resources-redis'
include 'test-resources-rabbitmq'
include 'test-resources-server'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ public final class TestResourcesClasspath implements KnownModules {
private static final String MICRONAUT_RABBITMQ = "micronaut-rabbitmq";
private static final String MICRONAUT_REDIS = "micronaut-redis-lettuce";
private static final String MICRONAUT_DISCOVERY_CLIENT = "micronaut-discovery-client";

private static final String MICRONAUT_OAUTH2 = "micronaut-security-oauth2";
private static final String MICRONAUT_NEO4J = "micronaut-neo4j";
private static final String MICRONAUT_DATA_MONGODB = "micronaut-data-mongodb";
private static final String MICRONAUT_DATA_R2DBC = "micronaut-data-r2dbc";
Expand Down Expand Up @@ -94,6 +94,7 @@ public final class TestResourcesClasspath implements KnownModules {
private static final String REACTIVE_MSSQL_MODULE = "r2dbc-mssql";
private static final String HASHICORP_VAULT_MODULE = "hashicorp-vault";
private static final String REACTIVE_POOL_MODULE = "r2dbc-pool";
private static final String OAUTH2_MODULE = "oauth2";

private TestResourcesClasspath() {

Expand Down Expand Up @@ -138,6 +139,7 @@ private static Stream<MavenDependency> inferSingle(MavenDependency input, List<M
m.onArtifact(MICRONAUT_RABBITMQ, RABBITMQ_MODULE);
m.onArtifact(MICRONAUT_REDIS, REDIS_MODULE);
m.onArtifact(MICRONAUT_DISCOVERY_CLIENT, HASHICORP_VAULT_MODULE);
m.onArtifact(MICRONAUT_OAUTH2, OAUTH2_MODULE);
m.onModule(REACTIVE_POOL_DRIVER, REACTIVE_POOL_MODULE);
m.onArtifact(name -> name.startsWith(MICRONAUT_NEO4J), deps -> true, NEO4J_MODULE);
m.onArtifact(name -> name.startsWith(MICRONAUT_DATA_PREFIX), deps -> deps.anyMatch(artifactEquals(MYSQL_CONNECTOR_JAVA)), MYSQL_MODULE);
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,7 @@ class TestResourcesClasspathTest extends Specification {
'redis-lettuce' | 'redis'
'elasticsearch' | 'elasticsearch'
'discovery-client' | 'hashicorp-vault'
'security-oauth2' | 'oauth2'
}

def "passes through driver #driver"() {
Expand Down
17 changes: 17 additions & 0 deletions test-resources-oauth2/build.gradle
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
plugins {
id 'io.micronaut.build.internal.testcontainers-module'
}

description = """
Provides support for OAuth2 test containers.
"""

dependencies {
implementation libs.testcontainers.oauth2.keycloak

testImplementation mn.micronaut.security
testImplementation mn.micronaut.http.server.netty
testImplementation mn.micronaut.http.client

testRuntimeOnly mn.micronaut.security.oauth2
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,145 @@
/*
* Copyright 2017-2021 original authors
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package io.micronaut.testresources.oauth2.keycloak;

import dasniko.testcontainers.keycloak.KeycloakContainer;
import io.micronaut.testresources.testcontainers.AbstractTestContainersProvider;
import org.keycloak.admin.client.Keycloak;
import org.keycloak.representations.idm.ClientRepresentation;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.testcontainers.utility.DockerImageName;

import javax.ws.rs.core.Response;
import java.util.ArrayList;
import java.util.Collection;
import java.util.Collections;
import java.util.HashSet;
import java.util.List;
import java.util.Map;
import java.util.Optional;
import java.util.Set;
import java.util.concurrent.atomic.AtomicBoolean;

/**
* A test resource provider which will spawn a Keycloak test container.
*/
public class KeycloakTestResourceProvider extends AbstractTestContainersProvider<KeycloakContainer> {
private static final Logger LOGGER = LoggerFactory.getLogger(KeycloakTestResourceProvider.class);

private static final String KEYCLOAK_PREFIX = "micronaut.security.oauth2.clients.keycloak.";
private static final String CLIENT_SECRET = KEYCLOAK_PREFIX + "client-secret";
private static final String CLIENT_ID = KEYCLOAK_PREFIX + "client-id";
private static final String ISSUER = KEYCLOAK_PREFIX + "openid.issuer";
private static final String JWT_TOKEN_URL = "micronaut.security.token.jwt.signatures.jwks.keycloak.url";

private static final String DEFAULT_IMAGE = "quay.io/keycloak/keycloak";

private static final List<String> SUPPORTED_PROPERTIES_LIST;
private static final Set<String> SUPPORTED_PROPERTIES_SET;

private static final String TEST_REALM = "realm";
private static final String TEST_REALM_DEFAULT = "master";
private static final String TEST_CLIENT = "client-id";
private static final String TEST_CLIENT_DEFAULT = "client-id";
private static final String TEST_SECRET = "client-secret";
private static final String TEST_SECRET_DEFAULT = "test-secret";

static {
List<String> supported = new ArrayList<>();
supported.add(CLIENT_SECRET);
supported.add(CLIENT_ID);
supported.add(ISSUER);
supported.add(JWT_TOKEN_URL);
SUPPORTED_PROPERTIES_LIST = Collections.unmodifiableList(supported);
SUPPORTED_PROPERTIES_SET = Collections.unmodifiableSet(new HashSet<>(supported));
}

private final AtomicBoolean clientConfigured = new AtomicBoolean();
private String realm;
private String clientId;
private String clientSecret;

@Override
public List<String> getResolvableProperties(Map<String, Collection<String>> propertyEntries, Map<String, Object> testResourcesConfig) {
return SUPPORTED_PROPERTIES_LIST;
}

@Override
protected String getSimpleName() {
return "keycloak";
}

@Override
protected String getDefaultImageName() {
return DEFAULT_IMAGE;
}

@Override
protected KeycloakContainer createContainer(DockerImageName imageName, Map<String, Object> requestedProperties, Map<String, Object> testResourcesConfiguration) {
return new KeycloakContainer(imageName.asCanonicalNameString()) {
@Override
public void start() {
super.start();
assertConfigured(this, testResourcesConfiguration);
}
};
}

@Override
protected Optional<String> resolveProperty(String propertyName, KeycloakContainer container) {
switch (propertyName) {
case CLIENT_SECRET:
return Optional.of(clientSecret);
case CLIENT_ID:
return Optional.of(clientId);
case ISSUER:
return Optional.of(container.getAuthServerUrl() + "/realm/" + realm);
case JWT_TOKEN_URL:
return Optional.of(container.getAuthServerUrl() + "/realm/" + realm + "/protocol/openid-connect/certs");
default:
}
return Optional.empty();
}

private void assertConfigured(KeycloakContainer container, Map<String, Object> testResourcesConfiguration) {
if (clientConfigured.compareAndSet(false, true)) {
Keycloak keycloakAdminClient = container.getKeycloakAdminClient();
ClientRepresentation clientRepresentation = new ClientRepresentation();
realm = fromConfigurationOrDefault(testResourcesConfiguration, TEST_REALM, TEST_REALM_DEFAULT);
clientId = fromConfigurationOrDefault(testResourcesConfiguration, TEST_CLIENT, TEST_CLIENT_DEFAULT);
clientSecret = fromConfigurationOrDefault(testResourcesConfiguration, TEST_SECRET, TEST_SECRET_DEFAULT);
clientRepresentation.setClientId(clientId);
clientRepresentation.setClientId(clientSecret);
try (Response response = keycloakAdminClient.realm(realm).clients().create(clientRepresentation)) {
LOGGER.debug("Keycloak admin client answered: {}", response.getStatusInfo());
}
}
}

@Override
protected boolean shouldAnswer(String propertyName, Map<String, Object> requestedProperties, Map<String, Object> testResourcesConfiguration) {
return SUPPORTED_PROPERTIES_SET.contains(propertyName);
}

private static String fromConfigurationOrDefault(Map<String, Object> testResourcesConfiguration, String key, String defaultValue) {
Object value = testResourcesConfiguration.get("containers.keycloak." + key);
if (value != null) {
return String.valueOf(value);
}
return defaultValue;
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
io.micronaut.testresources.oauth2.keycloak.KeycloakTestResourceProvider
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
package io.micronaut.testresources.oauth2.keycloak

import io.micronaut.testresources.testcontainers.AbstractTestContainersSpec

abstract class AbstractKeycloakSpec extends AbstractTestContainersSpec {

@Override
String getScopeName() {
'keycloak'
}

}
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
package io.micronaut.testresources.oauth2.keycloak

import io.micronaut.http.annotation.Controller
import io.micronaut.http.annotation.Get
import io.micronaut.http.client.annotation.Client
import io.micronaut.security.annotation.Secured
import io.micronaut.security.rules.SecurityRule
import io.micronaut.test.extensions.spock.annotation.MicronautTest
import jakarta.inject.Inject

@MicronautTest
class KeycloakTest extends AbstractKeycloakSpec {

@Inject
MyClient client

def "starts a keycloak server"() {
when:
String message = client.index()

then:
message == "Hello, Keycloak!"

listContainers().size() == 1
}

static interface MyApi {
@Get("/")
String index()
}

@Controller("/")
static class MyController implements MyApi {
@Secured(SecurityRule.IS_ANONYMOUS)
@Get("/")
String index() {
"Hello, Keycloak!"
}
}

@Client("/")
static interface MyClient extends MyApi {
}
}
5 changes: 5 additions & 0 deletions test-resources-oauth2/src/test/resources/application-test.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
micronaut:
application:
name: keycloak-test
security:
authentication: idtoken
14 changes: 14 additions & 0 deletions test-resources-oauth2/src/test/resources/logback.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
<configuration>

<appender name="STDOUT" class="ch.qos.logback.core.ConsoleAppender">
<!-- encoders are assigned the type
ch.qos.logback.classic.encoder.PatternLayoutEncoder by default -->
<encoder>
<pattern>%d{HH:mm:ss.SSS} [%thread] %-5level %logger{36} - %msg%n</pattern>
</encoder>
</appender>

<root level="info">
<appender-ref ref="STDOUT" />
</root>
</configuration>