def test_execution_logging_anonymous(self): """Test policy execution creates event with anonymous user""" policy = DummyPolicy.objects.create( name="test-execution-logging-anon", result=False, wait_min=0, wait_max=1, execution_logging=True, ) binding = PolicyBinding(policy=policy, target=Application.objects.create(name="test")) user = AnonymousUser() http_request = self.factory.get("/") http_request.user = user request = PolicyRequest(user) request.set_http_request(http_request) response = PolicyProcess(binding, request, None).execute() self.assertEqual(response.passing, False) self.assertEqual(response.messages, ("dummy",)) events = Event.objects.filter( action=EventAction.POLICY_EXECUTION, context__policy_uuid=policy.policy_uuid.hex, ) self.assertTrue(events.exists()) self.assertEqual(len(events), 1) event = events.first() self.assertEqual(event.user["username"], "AnonymousUser") self.assertEqual(event.context["result"]["passing"], False) self.assertEqual(event.context["result"]["messages"], ["dummy"]) self.assertEqual(event.client_ip, "127.0.0.1")
def test_failed_length(self): """Password too short""" request = PolicyRequest(get_anonymous_user()) request.context["password"] = "******" # nosec result: PolicyResult = self.policy.passes(request) self.assertFalse(result.passing) self.assertEqual(result.messages, ("test message", ))
def test_failed_digits(self): """not enough digits""" request = PolicyRequest(get_anonymous_user()) request.context["password"] = "******" # nosec result: PolicyResult = self.policy.passes(request) self.assertFalse(result.passing) self.assertEqual(result.messages, ("test message", ))
def test_failed_uppercase(self): """not enough uppercase""" request = PolicyRequest(get_anonymous_user()) request.context["password"] = "******" # nosec result: PolicyResult = self.policy.passes(request) self.assertFalse(result.passing) self.assertEqual(result.messages, ("test message", ))
def test_true(self): """Positive password case""" request = PolicyRequest(get_anonymous_user()) request.context["password"] = generate_key() + "1ee!!!" # nosec result: PolicyResult = self.policy.passes(request) self.assertTrue(result.passing) self.assertEqual(result.messages, tuple())
def test_false(self): """Failing password case""" policy = HaveIBeenPwendPolicy.objects.create(name="test_false", ) request = PolicyRequest(get_anonymous_user()) request.context["password"] = "******" # nosec result: PolicyResult = policy.passes(request) self.assertFalse(result.passing) self.assertTrue(result.messages[0].startswith("Password exists on "))
def test_true(self): """Positive password case""" policy = HaveIBeenPwendPolicy.objects.create(name="test_true", ) request = PolicyRequest(get_anonymous_user()) request.context["password"] = generate_key() result: PolicyResult = policy.passes(request) self.assertTrue(result.passing) self.assertEqual(result.messages, tuple())
def test_drop(self): """Test drop event""" event = Event.new(EventAction.LOGIN) event.client_ip = "1.2.3.4" request = PolicyRequest(get_anonymous_user()) request.context["event"] = event policy: EventMatcherPolicy = EventMatcherPolicy.objects.create( client_ip="1.2.3.5") response = policy.passes(request) self.assertFalse(response.passing)
def test_match_action(self): """Test match action""" event = Event.new(EventAction.LOGIN) request = PolicyRequest(get_anonymous_user()) request.context["event"] = event policy: EventMatcherPolicy = EventMatcherPolicy.objects.create( action=EventAction.LOGIN) response = policy.passes(request) self.assertTrue(response.passing) self.assertTupleEqual(response.messages, ("Action matched.", ))
def test_match_client_ip(self): """Test match client_ip""" event = Event.new(EventAction.LOGIN) event.client_ip = "1.2.3.4" request = PolicyRequest(get_anonymous_user()) request.context["event"] = event policy: EventMatcherPolicy = EventMatcherPolicy.objects.create( client_ip="1.2.3.4") response = policy.passes(request) self.assertTrue(response.passing) self.assertTupleEqual(response.messages, ("Client IP matched.", ))
def test_true(self): """Positive password case""" policy = PasswordPolicy.objects.create( name="test_true", amount_uppercase=1, amount_lowercase=2, amount_symbols=3, length_min=3, error_message="test message", ) request = PolicyRequest(get_anonymous_user()) request.context["password"] = "******" result: PolicyResult = policy.passes(request) self.assertTrue(result.passing) self.assertEqual(result.messages, tuple())
def test_false(self): """Failing password case""" policy = PasswordPolicy.objects.create( name="test_false", amount_uppercase=1, amount_lowercase=2, amount_symbols=3, length_min=24, error_message="test message", ) request = PolicyRequest(get_anonymous_user()) request.context["password"] = "******" result: PolicyResult = policy.passes(request) self.assertFalse(result.passing) self.assertEqual(result.messages, ("test message", ))
def test_user_passing(self): """Test binding to user""" binding = PolicyBinding(user=self.user) request = PolicyRequest(self.user) response = PolicyProcess(binding, request, None).execute() self.assertEqual(response.passing, True)
def test_invalid(self): """Test passing event""" request = PolicyRequest(get_anonymous_user()) policy: EventMatcherPolicy = EventMatcherPolicy.objects.create( client_ip="1.2.3.4") response = policy.passes(request) self.assertFalse(response.passing)
def test_empty(self): """Test binding to user""" binding = PolicyBinding() request = PolicyRequest(self.user) response = PolicyProcess(binding, request, None).execute() self.assertEqual(response.passing, False)
def test_user_negative(self): """Test binding to user""" binding = PolicyBinding(user=get_anonymous_user()) request = PolicyRequest(self.user) response = PolicyProcess(binding, request, None).execute() self.assertEqual(response.passing, False)
def test_full(self): """Test full with Policy instance""" policy = ExpressionPolicy(name="test", expression="return 'test'") policy.save() request = PolicyRequest(get_anonymous_user()) result = policy.passes(request) self.assertTrue(result.passing)
def test_invalid(self): """Test without password""" policy = HaveIBeenPwendPolicy.objects.create(name="test_invalid", ) request = PolicyRequest(get_anonymous_user()) result: PolicyResult = policy.passes(request) self.assertFalse(result.passing) self.assertEqual(result.messages[0], "Password not set in context")
def test_exception(self): """Test policy execution""" policy = Policy.objects.create(name="test-execution") binding = PolicyBinding(policy=policy, target=Application.objects.create(name="test")) request = PolicyRequest(self.user) response = PolicyProcess(binding, request, None).execute() self.assertEqual(response.passing, False)
def set_context( self, user: Optional[User], request: Optional[HttpRequest], mapping: PropertyMapping, **kwargs, ): """Update context with context from PropertyMapping's evaluate""" req = PolicyRequest(user=get_anonymous_user()) req.obj = mapping if user: req.user = user self._context["user"] = user if request: req.http_request = request self._context["request"] = req self._context.update(**kwargs)
def test_group_negative(self): """Test binding to group""" group = Group.objects.create(name="test-group") group.save() binding = PolicyBinding(group=group) request = PolicyRequest(self.user) response = PolicyProcess(binding, request, None).execute() self.assertEqual(response.passing, False)
def test_false(self): """Test policy execution""" policy = DummyPolicy.objects.create(result=False, wait_min=0, wait_max=1) binding = PolicyBinding(policy=policy) request = PolicyRequest(self.user) response = PolicyProcess(binding, request, None).execute() self.assertEqual(response.passing, False) self.assertEqual(response.messages, ("dummy",))
def __init__(self, pbm: PolicyBindingModel, user: User, request: HttpRequest = None): self.logger = get_logger().bind() self.mode = pbm.policy_engine_mode # For backwards compatibility, set empty_result to true # objects with no policies attached will pass. self.empty_result = True if not isinstance(pbm, PolicyBindingModel): # pragma: no cover raise ValueError(f"{pbm} is not instance of PolicyBindingModel") self.__pbm = pbm self.request = PolicyRequest(user) self.request.obj = pbm if request: self.request.set_http_request(request) self.__cached_policies: list[PolicyResult] = [] self.__processes: list[PolicyProcessInfo] = [] self.use_cache = True self.__expected_result_count = 0
def test_invalid(self): """Test without password""" policy = PasswordPolicy.objects.create( name="test_invalid", amount_uppercase=1, amount_lowercase=2, amount_symbols=3, length_min=24, error_message="test message", ) request = PolicyRequest(get_anonymous_user()) result: PolicyResult = policy.passes(request) self.assertFalse(result.passing) self.assertEqual(result.messages[0], "Password not set in context")
def test_raises(self): """Test policy that raises error""" policy_raises = ExpressionPolicy.objects.create(name="raises", expression="{{ 0/0 }}") binding = PolicyBinding( policy=policy_raises, target=Application.objects.create(name="test") ) request = PolicyRequest(self.user) response = PolicyProcess(binding, request, None).execute() self.assertEqual(response.passing, False) self.assertEqual(response.messages, ("division by zero",)) events = Event.objects.filter( action=EventAction.POLICY_EXCEPTION, context__policy_uuid=policy_raises.policy_uuid.hex, ) self.assertTrue(events.exists()) self.assertEqual(len(events), 1) event = events.first() self.assertEqual(event.user["username"], self.user.username) self.assertIn("division by zero", event.context["message"])
def test(self, request: Request, pk: str) -> Response: """Test policy""" policy = self.get_object() test_params = PolicyTestSerializer(data=request.data) if not test_params.is_valid(): return Response(test_params.errors, status=400) # User permission check, only allow policy testing for users that are readable users = get_objects_for_user( request.user, "authentik_core.view_user").filter( pk=test_params.validated_data["user"].pk) if not users.exists(): raise PermissionDenied() p_request = PolicyRequest(users.first()) p_request.debug = True p_request.set_http_request(self.request) p_request.context = test_params.validated_data.get("context", {}) proc = PolicyProcess(PolicyBinding(policy=policy), p_request, None) result = proc.execute() response = PolicyTestResultSerializer(result) return Response(response.data)
def setUp(self): self.request = PolicyRequest(user=get_anonymous_user())
def test_invalid(self): """Test without password""" request = PolicyRequest(get_anonymous_user()) result: PolicyResult = self.policy.passes(request) self.assertFalse(result.passing) self.assertEqual(result.messages[0], "Password not set in context")
class PolicyEngine: """Orchestrate policy checking, launch tasks and return result""" use_cache: bool request: PolicyRequest logger: BoundLogger mode: PolicyEngineMode # Allow objects with no policies attached to pass empty_result: bool def __init__(self, pbm: PolicyBindingModel, user: User, request: HttpRequest = None): self.logger = get_logger().bind() self.mode = pbm.policy_engine_mode # For backwards compatibility, set empty_result to true # objects with no policies attached will pass. self.empty_result = True if not isinstance(pbm, PolicyBindingModel): # pragma: no cover raise ValueError(f"{pbm} is not instance of PolicyBindingModel") self.__pbm = pbm self.request = PolicyRequest(user) self.request.obj = pbm if request: self.request.set_http_request(request) self.__cached_policies: list[PolicyResult] = [] self.__processes: list[PolicyProcessInfo] = [] self.use_cache = True self.__expected_result_count = 0 def _iter_bindings(self) -> Iterator[PolicyBinding]: """Make sure all Policies are their respective classes""" return (PolicyBinding.objects.filter( target=self.__pbm, enabled=True).order_by("order").iterator()) def _check_policy_type(self, binding: PolicyBinding): """Check policy type, make sure it's not the root class as that has no logic implemented""" # pyright: reportGeneralTypeIssues=false if binding.policy is not None and binding.policy.__class__ == Policy: raise TypeError(f"Policy '{binding.policy}' is root type") def build(self) -> "PolicyEngine": """Build wrapper which monitors performance""" with Hub.current.start_span( op="authentik.policy.engine.build", description=self.__pbm, ) as span, HIST_POLICIES_BUILD_TIME.labels( object_name=self.__pbm, object_type= f"{self.__pbm._meta.app_label}.{self.__pbm._meta.model_name}", user=self.request.user, ).time(): span: Span span.set_data("pbm", self.__pbm) span.set_data("request", self.request) for binding in self._iter_bindings(): self.__expected_result_count += 1 self._check_policy_type(binding) key = cache_key(binding, self.request) cached_policy = cache.get(key, None) if cached_policy and self.use_cache: self.logger.debug( "P_ENG: Taking result from cache", binding=binding, cache_key=key, request=self.request, ) self.__cached_policies.append(cached_policy) continue self.logger.debug("P_ENG: Evaluating policy", binding=binding, request=self.request) our_end, task_end = Pipe(False) task = PolicyProcess(binding, self.request, task_end) task.daemon = False self.logger.debug("P_ENG: Starting Process", binding=binding, request=self.request) if not CURRENT_PROCESS._config.get("daemon"): task.run() else: task.start() self.__processes.append( PolicyProcessInfo(process=task, connection=our_end, binding=binding)) # If all policies are cached, we have an empty list here. for proc_info in self.__processes: if proc_info.process.is_alive(): proc_info.process.join(proc_info.binding.timeout) # Only call .recv() if no result is saved, otherwise we just deadlock here if not proc_info.result: proc_info.result = proc_info.connection.recv() return self @property def result(self) -> PolicyResult: """Get policy-checking result""" process_results: list[PolicyResult] = [ x.result for x in self.__processes if x.result ] all_results = list(process_results + self.__cached_policies) if len(all_results) < self.__expected_result_count: # pragma: no cover raise AssertionError("Got less results than polices") # No results, no policies attached -> passing if len(all_results) == 0: return PolicyResult(self.empty_result) passing = False if self.mode == PolicyEngineMode.MODE_ALL: passing = all(x.passing for x in all_results) if self.mode == PolicyEngineMode.MODE_ANY: passing = any(x.passing for x in all_results) result = PolicyResult(passing) result.source_results = all_results result.messages = tuple(y for x in all_results for y in x.messages) return result @property def passing(self) -> bool: """Only get true/false if user passes""" return self.result.passing
def test_policy(self): """Test Policy""" request = PolicyRequest(user=self.user) policy: ReputationPolicy = ReputationPolicy.objects.create( name="reputation-test", threshold=0) self.assertTrue(policy.passes(request).passing)