def test_export_validate_import_policies(self): """Test export and validate it""" flow_slug = generate_client_id() stage_name = generate_client_id() with transaction_rollback(): flow_policy = ExpressionPolicy.objects.create( name=generate_client_id(), expression="return True", ) flow = Flow.objects.create( slug=flow_slug, designation=FlowDesignation.AUTHENTICATION, name=generate_client_id(), title=generate_client_id(), ) PolicyBinding.objects.create(policy=flow_policy, target=flow, order=0) user_login = UserLoginStage.objects.create(name=stage_name) fsb = FlowStageBinding.objects.create( target=flow, stage=user_login, order=0 ) PolicyBinding.objects.create(policy=flow_policy, target=fsb, order=0) exporter = FlowExporter(flow) export = exporter.export() export_json = dumps(export, cls=DataclassEncoder) importer = FlowImporter(export_json) self.assertTrue(importer.validate()) self.assertTrue(importer.apply()) self.assertTrue(UserLoginStage.objects.filter(name=stage_name).exists()) self.assertTrue(Flow.objects.filter(slug=flow_slug).exists())
def test_request_refresh_token(self): """test request param""" provider = OAuth2Provider.objects.create( name="test", client_id=generate_client_id(), client_secret=generate_client_secret(), authorization_flow=Flow.objects.first(), redirect_uris="http://local.invalid", ) header = b64encode( f"{provider.client_id}:{provider.client_secret}".encode() ).decode() user = User.objects.get(username="******") token: RefreshToken = RefreshToken.objects.create( provider=provider, user=user, refresh_token=generate_client_id(), ) request = self.factory.post( "/", data={ "grant_type": GRANT_TYPE_REFRESH_TOKEN, "refresh_token": token.refresh_token, "redirect_uri": "http://local.invalid", }, HTTP_AUTHORIZATION=f"Basic {header}", ) params = TokenParams.from_request(request) self.assertEqual(params.provider, provider)
def test_export_validate_import(self): """Test export and validate it""" flow_slug = generate_client_id() with transaction_rollback(): login_stage = UserLoginStage.objects.create(name=generate_client_id()) flow = Flow.objects.create( slug=flow_slug, designation=FlowDesignation.AUTHENTICATION, name=generate_client_id(), title=generate_client_id(), ) FlowStageBinding.objects.update_or_create( target=flow, stage=login_stage, order=0, ) exporter = FlowExporter(flow) export = exporter.export() self.assertEqual(len(export.entries), 3) export_json = exporter.export_to_string() importer = FlowImporter(export_json) self.assertTrue(importer.validate()) self.assertTrue(importer.apply()) self.assertTrue(Flow.objects.filter(slug=flow_slug).exists())
def test_request_auth_code(self): """test request param""" provider = OAuth2Provider.objects.create( name="test", client_id=generate_client_id(), client_secret=generate_client_secret(), authorization_flow=Flow.objects.first(), redirect_uris="http://local.invalid", ) header = b64encode( f"{provider.client_id}:{provider.client_secret}".encode() ).decode() user = User.objects.get(username="******") code = AuthorizationCode.objects.create( code="foobar", provider=provider, user=user ) request = self.factory.post( "/", data={ "grant_type": GRANT_TYPE_AUTHORIZATION_CODE, "code": code.code, "redirect_uri": "http://local.invalid", }, HTTP_AUTHORIZATION=f"Basic {header}", ) params = TokenParams.from_request(request) self.assertEqual(params.provider, provider)
def test_full_code(self): """Test full authorization""" flow = Flow.objects.create(slug="empty") provider = OAuth2Provider.objects.create( name="test", client_id="test", authorization_flow=flow, redirect_uris="foo://localhost", ) Application.objects.create(name="app", slug="app", provider=provider) state = generate_client_id() user = User.objects.get(username="******") self.client.force_login(user) # Step 1, initiate params and get redirect to flow self.client.get( reverse("authentik_providers_oauth2:authorize"), data={ "response_type": "code", "client_id": "test", "state": state, "redirect_uri": "foo://localhost", }, ) response = self.client.get( reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug}), ) code: AuthorizationCode = AuthorizationCode.objects.filter(user=user).first() self.assertJSONEqual( force_str(response.content), { "type": ChallengeTypes.REDIRECT.value, "to": f"foo://localhost?code={code.code}&state={state}", }, )
def test_refresh_token_view(self): """test request param""" provider = OAuth2Provider.objects.create( name="test", client_id=generate_client_id(), client_secret=generate_client_secret(), authorization_flow=Flow.objects.first(), redirect_uris="http://local.invalid", ) # Needs to be assigned to an application for iss to be set self.app.provider = provider self.app.save() header = b64encode(f"{provider.client_id}:{provider.client_secret}". encode()).decode() user = User.objects.get(username="******") token: RefreshToken = RefreshToken.objects.create( provider=provider, user=user, refresh_token=generate_client_id(), ) response = self.client.post( reverse("authentik_providers_oauth2:token"), data={ "grant_type": GRANT_TYPE_REFRESH_TOKEN, "refresh_token": token.refresh_token, "redirect_uri": "http://local.invalid", }, HTTP_AUTHORIZATION=f"Basic {header}", HTTP_ORIGIN="http://local.invalid", ) new_token: RefreshToken = (RefreshToken.objects.filter( user=user).exclude(pk=token.pk).first()) self.assertEqual(response["Access-Control-Allow-Credentials"], "true") self.assertEqual(response["Access-Control-Allow-Origin"], "http://local.invalid") self.assertJSONEqual( force_str(response.content), { "access_token": new_token.access_token, "refresh_token": new_token.refresh_token, "token_type": "bearer", "expires_in": 600, "id_token": provider.encode(new_token.id_token.to_dict(), ), }, ) self.validate_jwt(new_token, provider)
def test_export_validate_import_prompt(self): """Test export and validate it""" with transaction_rollback(): # First stage fields username_prompt = Prompt.objects.create( field_key="username", label="Username", order=0, type=FieldTypes.TEXT ) password = Prompt.objects.create( field_key="password", label="Password", order=1, type=FieldTypes.PASSWORD, ) password_repeat = Prompt.objects.create( field_key="password_repeat", label="Password (repeat)", order=2, type=FieldTypes.PASSWORD, ) # Stages first_stage = PromptStage.objects.create(name=generate_client_id()) first_stage.fields.set([username_prompt, password, password_repeat]) first_stage.save() flow = Flow.objects.create( name=generate_client_id(), slug=generate_client_id(), designation=FlowDesignation.ENROLLMENT, title=generate_client_id(), ) FlowStageBinding.objects.create(target=flow, stage=first_stage, order=0) exporter = FlowExporter(flow) export = exporter.export() export_json = dumps(export, cls=DataclassEncoder) importer = FlowImporter(export_json) self.assertTrue(importer.validate()) self.assertTrue(importer.apply())
def test_full_implicit(self): """Test full authorization""" flow = Flow.objects.create(slug="empty") provider = OAuth2Provider.objects.create( name="test", client_id="test", client_secret=generate_client_secret(), authorization_flow=flow, redirect_uris="http://localhost", rsa_key=CertificateKeyPair.objects.first(), ) Application.objects.create(name="app", slug="app", provider=provider) state = generate_client_id() user = User.objects.get(username="******") self.client.force_login(user) # Step 1, initiate params and get redirect to flow self.client.get( reverse("authentik_providers_oauth2:authorize"), data={ "response_type": "id_token", "client_id": "test", "state": state, "scope": "openid", "redirect_uri": "http://localhost", }, ) response = self.client.get( reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug}), ) token: RefreshToken = RefreshToken.objects.filter(user=user).first() self.assertJSONEqual( force_str(response.content), { "component": "xak-flow-redirect", "type": ChallengeTypes.REDIRECT.value, "to": (f"http://localhost#access_token={token.access_token}" f"&id_token={provider.encode(token.id_token.to_dict())}&token_type=bearer" f"&expires_in=600&state={state}"), }, ) self.validate_jwt(token, provider)
def test_auth_code_view(self): """test request param""" provider = OAuth2Provider.objects.create( name="test", client_id=generate_client_id(), client_secret=generate_client_secret(), authorization_flow=Flow.objects.first(), redirect_uris="http://local.invalid", ) # Needs to be assigned to an application for iss to be set self.app.provider = provider self.app.save() header = b64encode(f"{provider.client_id}:{provider.client_secret}". encode()).decode() user = User.objects.get(username="******") code = AuthorizationCode.objects.create(code="foobar", provider=provider, user=user, is_open_id=True) response = self.client.post( reverse("authentik_providers_oauth2:token"), data={ "grant_type": GRANT_TYPE_AUTHORIZATION_CODE, "code": code.code, "redirect_uri": "http://local.invalid", }, HTTP_AUTHORIZATION=f"Basic {header}", ) new_token: RefreshToken = RefreshToken.objects.filter( user=user).first() self.assertJSONEqual( force_str(response.content), { "access_token": new_token.access_token, "refresh_token": new_token.refresh_token, "token_type": "bearer", "expires_in": 600, "id_token": provider.encode(new_token.id_token.to_dict(), ), }, ) self.validate_jwt(new_token, provider)
"""Utility script to generate a config for CI runs""" from authentik.providers.oauth2.generators import generate_client_id from yaml import safe_dump with open("local.env.yml", "w") as _config: safe_dump({"secret_key": generate_client_id()}, _config, default_flow_style=False)
def setUp(self): self.client_id = generate_client_id() self.client_secret = generate_client_secret() super().setUp()
def setUp(self): self.client_id = generate_client_id() self.client_secret = generate_client_secret() self.application_slug = "test" super().setUp()
def setUp(self) -> None: self.client_id = generate_client_id() self.client_secret = generate_client_secret() self.source_slug = "oauth1-test" super().setUp()