No commit activity in last 3 years
No release in over 3 years
Keycloak ruby client
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
 Dependencies

Development

~> 2.0
>= 0
~> 10.0
>= 0

Runtime

 Project Readme

Keycloak::Ruby::Client

Gem Version

This is a keycloak client implementation in ruby. I mainly use this in a rails project, so this is written with some methods that derive from rails.

Installation

Add this line to your application's Gemfile:

gem 'keycloak-ruby-client', require: 'keycloak'

And then execute:

$ bundle

Or install it yourself as:

$ gem install keycloak-ruby-client

Usage

Firstly, you need to register your keycloak config:

Keycloak::Realm.register do |config|
  config.installation_file = Rails.root.join("config/keycloak.json")
end

or

Keycloak::Realm.register do |config|
  config.auth_server_url = "http://127.0.0.1:8081/auth"
  
  config.realm = "shundao-admin"
end

Then you can authenticate your keycloak JWT token:

token = "your_bearer_token"
keycloak_token = Keycloak::Realm.shundao_admin.parse_access_token(token) # an instance of Keycloak::AccessToken
raise CanCan::AccessDenied if keycloak_token.expired? || !keycloak_token.has_role?("admin")

# authentication succeeded 

Or you may need asking if permissions are granted from keycloak server, it's also worth noting that this is much expensive than decoding JWT cuz this asks from keycloak server every time. Always use JWT unless there is a compelling reason to use this.

token = "your_bearer_token"
keycloak_token = Keycloak::Realm.shundao_admin.parse_access_token(token)
raise Cancan::AccessDenied unless Keycloak::Realm.shundao_admin.client.granted_by_server("Admin Resources#view", keycloak_token)

# authentication succeeded

Some examples demonstrate how to interact with Keycloak admin REST API:

admin_username = ENV['KEYCLOAK_USERNAME'] || 'admin'
admin_password = ENV['KEYCLOAK_PASSWORD'] || 'admin'
auth_server_url = ENV['KEYCLOAK_SERVER_URL'] || 'http://127.0.0.1:8081/auth'
realm = 'shundao-admin'

# authenticate
client = Keycloak::Client.new(auth_server_url, realm)
client.authenticate(admin_username, admin_password, "password", "admin-cli", "master")

# create the roles
role_store = {}
roles = ['user', 'premium', 'admin']
roles.each do |role|
  role_rep = Keycloak::Model::RoleRepresentation.new({
    name: role
  })
  role_store[role] = client.create_or_find_role(role_rep)
end

# create a user with the roles created above
user_rep = Keycloak::Model::UserRepresentation.new({
  username: "alice",
  credentials: [
    Keycloak::Model::CredentialRepresentation.new({
      type: "password",
      temporary: false,
      value: '123456'
    })
  ],
  enabled: true,
  requiredActions: ['UPDATE_PASSWORD']
})
mapping_roles = role_store.map { |entry| {id: entry[1].id , name: entry[1].name} }
client.create_user(user_rep, mapping_roles)

# NOTE: It's worth noting that `to_a` may be costly if you have a large dataset of users, 
# which could cause out-of-memory, but using `each` instead of `to_a` could save you if 
# you really want iterate all users.
client.find_users.to_a.each { |user| puts user.to_json } # possibly out of memory 
client.find_users.each { |user| puts user.to_json } # no risk of out of memory

For more examples, please take a look at spec/api/

Connect your rails user model with keycloak user entity:

Firstly, we create a user model with bundle exec rails g model user

In you migration file:

class CreateUsers < ActiveRecord::Migration[5.1]
  def change
    create_table :users, id: :string do |t|
      t.string :username
    end
  end
end

Authenticate your client in config/initializers/keycloak.rb:

Keycloak::Realm.shundao_admin.client.authenticate(admin_username, admin_password, "password", "admin-cli", "master", auto: true)

Your model file User.rb as the following:

class User < ApplicationRecord
  include Keycloak::UserEntity
  
  def keycloak_client
    Keycloak::Realm.shundao_admin.client
  end
end

Finally, you can get user info with User model:

user = User.take
puts user.user_info
puts user.realm_roles

GraphQL (optional)

Integrate RepresentationIterator into graphql to support GraphQL Connections

require 'keycloak/graphql'

Now you can implement a GraphQL API to find users as the following:

field :users, Types::KeycloakUserRepresentationType.connection_type, null: true, max_page_size: 30 do
  argument :briefRepresentation, Boolean, required: false
  argument :email, String, required: false
  argument :firstName, String, required: false
  argument :lastName, String, required: false
  argument :search, String, required: false
  argument :username, String, required: false
end

def users(**kwargs)
  Keycloak::Realm.your_realm.client.find_users(**kwargs)
end

Development

After checking out the repo, run bin/setup to install dependencies. You can also run bin/console for an interactive prompt that will allow you to experiment.

To install this gem onto your local machine, run bundle exec rake install. To release a new version, update the version number in version.rb, and then run bundle exec rake release, which will create a git tag for the version, push git commits and tags, and push the .gem file to rubygems.org.

Contributing

Bug reports and pull requests are welcome on GitHub at https://github.com/FX-HAO/keycloak-ruby-client. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the Contributor Covenant code of conduct.

License

The gem is available as open source under the terms of the MIT License.

Code of Conduct

Everyone interacting in the Keycloak::Ruby::Client project’s codebases, issue trackers, chat rooms and mailing lists is expected to follow the code of conduct.