Compare commits
1235 Commits
version/0.
...
version/0.
Author | SHA1 | Date | |
---|---|---|---|
404f5d7912 | |||
8bea99a953 | |||
0b0ba33dce | |||
e3627b2cd9 | |||
37fac3ae00 | |||
17a90adf3e | |||
7c3590f8ef | |||
7471415e7f | |||
9339d496f9 | |||
e72000eb06 | |||
ec5ff7c14d | |||
43cb08b433 | |||
95a1c7b6d5 | |||
031a3d8719 | |||
430905295d | |||
1356a8108b | |||
37dcf264e5 | |||
296e1f4962 | |||
a0e81650d7 | |||
894cee6123 | |||
a7be0379f4 | |||
2d6b57839d | |||
455e39a8bd | |||
a7d8ac888a | |||
349e536d14 | |||
cddc9bc1b7 | |||
6d27408a10 | |||
50a5959f6c | |||
18f42a0edf | |||
860ba994a6 | |||
1776b72356 | |||
8db60b3e83 | |||
3b6341bf41 | |||
3b97389833 | |||
102d536a72 | |||
9712be847c | |||
f0b5e8143e | |||
cc061e5b16 | |||
fd8514331b | |||
1dc63776a5 | |||
87b14e8761 | |||
28893b9695 | |||
bb9ae28be8 | |||
0c05fd47f5 | |||
fea44486c3 | |||
bf4763d946 | |||
219e16f8e5 | |||
6ebefc9f17 | |||
80e8a3d63c | |||
dd017e7190 | |||
268de20872 | |||
14e47f3195 | |||
6d289aea48 | |||
529fd081a0 | |||
02e3c78720 | |||
abc78d6633 | |||
3f3dfc0a28 | |||
5bd27bce3f | |||
c39d136383 | |||
a977184577 | |||
b7ca40d98e | |||
b2cb794865 | |||
874f03e4dd | |||
8f08d78bf1 | |||
2661f2bbb3 | |||
7d321e8aa8 | |||
a732beb72b | |||
0996775ebf | |||
4147e8d1a7 | |||
983bbb622d | |||
885f8bae9f | |||
aaa662199c | |||
0e0898c3cf | |||
8b17e8be99 | |||
a082222b58 | |||
9826bb4d01 | |||
f7c629ec9b | |||
e2aeb96a6a | |||
ff810c689f | |||
0eb94df1f7 | |||
86597df159 | |||
0394adaf46 | |||
c7a2410b1d | |||
b9076b5fd4 | |||
c07a45083f | |||
4b10fa3d93 | |||
c910dc9a3c | |||
882dc60292 | |||
7923468a01 | |||
9ebbb51cf7 | |||
bd25cadb71 | |||
7334599efd | |||
54f0728005 | |||
e0c7637382 | |||
086a3c0548 | |||
65efbbd7ee | |||
5cc045e3c9 | |||
56d259ce75 | |||
8919bade55 | |||
703d511089 | |||
aabedfc3e4 | |||
0f154dee11 | |||
a5c46d7e72 | |||
bbd59698e1 | |||
3b0216bc00 | |||
b4fc32afac | |||
45df127f18 | |||
55cf49bb8a | |||
00ce2a90f1 | |||
de77e1e41e | |||
e40c07e997 | |||
d4b0bbb368 | |||
d05f077ba0 | |||
ca322d1e2c | |||
3c9631b287 | |||
16c2332c14 | |||
2723b2091f | |||
7b454ff72a | |||
4578bf6f29 | |||
a991632396 | |||
81d2f8c728 | |||
b42164a6b6 | |||
5857552b73 | |||
0645dde90c | |||
494a8226a4 | |||
aedd5f3f99 | |||
8a1ff7cb5b | |||
e0a9cc0e26 | |||
8f240b5303 | |||
ea39a5e952 | |||
ac539268cb | |||
ed72a2c959 | |||
e5cd9a4a2a | |||
d4f530f80b | |||
282a518e00 | |||
5d50d99f59 | |||
d56a98e561 | |||
0cfdbd92d8 | |||
6262923398 | |||
f96b1b58f3 | |||
fdf372912a | |||
2e517258fa | |||
316ac78e49 | |||
de2b67b111 | |||
e1bbbe6671 | |||
8b3839343c | |||
7897ca4744 | |||
2fd00c6c9d | |||
80f7f82fa4 | |||
1a21012911 | |||
d4a5269bf1 | |||
fcf70a3cd4 | |||
e9411d856c | |||
1a6dd00681 | |||
330bd0932b | |||
250e77f40f | |||
ef71aba544 | |||
567a8f53da | |||
88c87aa205 | |||
90ac3d56ca | |||
a298e9e2ca | |||
abdf86d9c9 | |||
c58658d820 | |||
a9b5e6ea13 | |||
ddb0fdee98 | |||
83205f1b49 | |||
7221800a16 | |||
4515cb6bbe | |||
7f9da11eba | |||
da69d2611d | |||
3b4be5695a | |||
9d68c9550b | |||
3b2d469780 | |||
ae629d1159 | |||
72a6f9cbe0 | |||
9793b7461b | |||
9c1a824dc4 | |||
738ced3327 | |||
ed1ee1fa55 | |||
95776bbc56 | |||
62a4beb3d6 | |||
466a825f5b | |||
3ffed279d7 | |||
4b6b36b2d2 | |||
2a8f63bf86 | |||
3c12cf96a9 | |||
d787caf0e4 | |||
0fc2f32d3d | |||
894d5da1d8 | |||
985d20d025 | |||
94f3e6d0c5 | |||
0a196608c7 | |||
d33f0fb2cf | |||
ffff69ada0 | |||
37a432267d | |||
88029a4335 | |||
4040eb9619 | |||
c9663a08da | |||
a3d92ebc0a | |||
6fa825e372 | |||
6aefd072c8 | |||
ac2dd3611f | |||
74e628ce9c | |||
d4ee18ee32 | |||
9ff3ee7c0c | |||
418b94a45a | |||
1393078fe6 | |||
50612991fa | |||
37b2400cdb | |||
05c3393669 | |||
c60d1e1f9a | |||
2be7d3191f | |||
aa692fdacb | |||
c163637bfd | |||
5552aca079 | |||
ff2456dcfa | |||
539264c396 | |||
1acfaf1562 | |||
a81e277cfa | |||
b4cb78f33f | |||
35c0a9532f | |||
aff074420b | |||
edbea9ccff | |||
6b26e10ea2 | |||
a737335fdd | |||
e15f7d7f28 | |||
fbf9554a9e | |||
5f34b08433 | |||
f67a03ad66 | |||
6095301337 | |||
4a774b5885 | |||
aa8fac3a06 | |||
b8407f5bf6 | |||
989c426211 | |||
9a888cfcf1 | |||
72ec871729 | |||
8d58842c9b | |||
a90aa5e069 | |||
639020a2e1 | |||
8e6f915ec6 | |||
6631471566 | |||
b452e751ea | |||
a3baa100d4 | |||
f7b9de1261 | |||
47ca566d06 | |||
a943d060d2 | |||
1675dab314 | |||
996aa367d3 | |||
be6f342e58 | |||
464b558a02 | |||
d1151091cd | |||
f8e5383ba2 | |||
06f73512df | |||
0ff4545bab | |||
ff6e270886 | |||
8aa0b72b67 | |||
91766a2162 | |||
a393097504 | |||
2056b86ce7 | |||
1b0c013d8e | |||
92a09be8c0 | |||
1e31cd03ed | |||
dc863a6e87 | |||
d74366f413 | |||
5bcf2aef8c | |||
8de3c4fbd6 | |||
c191b62245 | |||
0babbde00e | |||
b8af312ab1 | |||
38cabfb325 | |||
0a3528b5f4 | |||
30a672758a | |||
723a825085 | |||
40e794099a | |||
111b037512 | |||
52f66717d3 | |||
7ac4242a38 | |||
4caa4be476 | |||
c6d8bae147 | |||
c70310730a | |||
2d2b2d08f4 | |||
8fe6a5b62d | |||
5e6221deb8 | |||
c3b493f7d4 | |||
dbcb5b4f63 | |||
f0640fcea9 | |||
64c47a59f8 | |||
3450b8f1fe | |||
9518cefdd7 | |||
32d5c26577 | |||
ef2cdf27b3 | |||
e58ac7ae90 | |||
d786fa4b7c | |||
0e3e73989d | |||
d831599608 | |||
1e57926603 | |||
1524880eec | |||
0bfb623f97 | |||
429627494c | |||
9feea155fe | |||
2717e02d93 | |||
18bd803b0d | |||
c7f078ffcc | |||
571cb3d65f | |||
8c500c38b1 | |||
5644e57e6a | |||
cfc181eed1 | |||
91bea38b8e | |||
d95c5aa739 | |||
0b250b897e | |||
c6880a0f16 | |||
beb5ffcbdd | |||
0715cac39b | |||
41117d873d | |||
231e448b1a | |||
b3b8cd807d | |||
9021bbd5de | |||
169475ab39 | |||
c00e01626e | |||
05d4a9ef62 | |||
17a2ac73e7 | |||
6bc6f947dd | |||
b048a1fb4f | |||
363940ee8d | |||
a64e53479c | |||
14fdbe7720 | |||
f56332c954 | |||
21c53c748f | |||
b12182c1d1 | |||
d8f27f595a | |||
b25dc2aaa3 | |||
3ec3849e72 | |||
2dc1b65718 | |||
af22f507f4 | |||
9958019bf3 | |||
02d65972cb | |||
24ad893350 | |||
9c5792b1e1 | |||
094d191bff | |||
49fb9f688b | |||
7d161e5aa1 | |||
78e5d471e3 | |||
2e2c9f5287 | |||
d5a3e09a98 | |||
2402cfe29d | |||
26613b6ea9 | |||
e5165abf04 | |||
b26882a450 | |||
94281bee88 | |||
16b966c16e | |||
d3b0992456 | |||
dd74b73b4f | |||
0bdfccc1f3 | |||
ceb0793bc9 | |||
abea85b635 | |||
01c83f6f4a | |||
9167c9c3ba | |||
04add2e52d | |||
1e9241d45b | |||
22ee198a31 | |||
1d9c92d548 | |||
b30b58924f | |||
bead19c64c | |||
76e2ba4764 | |||
8d095d7436 | |||
d3a7fd5818 | |||
247a8dbc8f | |||
9241adfc68 | |||
ae83ee6d31 | |||
4701374021 | |||
bd40585247 | |||
cc0b8164b0 | |||
310b31a8b7 | |||
13900bc603 | |||
6634cc2edf | |||
3478a2cf6d | |||
3b70d12a5f | |||
219acf76d5 | |||
ec6f467fa2 | |||
0e6561987e | |||
62c20b6e67 | |||
13084562c5 | |||
02c1c434a2 | |||
5f04a75878 | |||
3556c76674 | |||
c7d638de2f | |||
143733499f | |||
0d6a0ffe14 | |||
6d4c7312d8 | |||
2cb6a179e8 | |||
7de2ad77b5 | |||
89c33060d4 | |||
b61f595562 | |||
ce2230f774 | |||
d18a78d04d | |||
c59c6aa728 | |||
729910c383 | |||
37fe637422 | |||
3114d064ed | |||
2ca5e1eedb | |||
d2bf579ff6 | |||
3716bda76e | |||
a76eb4d30f | |||
7c191b0984 | |||
9613fcde89 | |||
885a2ed057 | |||
b270fb0742 | |||
285a69d91f | |||
de3b753a26 | |||
34be1dd9f4 | |||
a4c0fb9e75 | |||
f040223646 | |||
bf297b8593 | |||
43eea9e99c | |||
8e38bc87bc | |||
50a57fb3dd | |||
38b8bc182f | |||
9743ad33d6 | |||
b746ce97ba | |||
dbee714dac | |||
d33f632203 | |||
812aa4ced5 | |||
63466e3384 | |||
920858ff72 | |||
56f599e4aa | |||
05183ed937 | |||
8d31eef47d | |||
96a6ac85df | |||
5a60341a6e | |||
21ba969072 | |||
d6a8d8292d | |||
693a92ada5 | |||
ec823aebed | |||
b8654c06bf | |||
9d03c4c7d2 | |||
8c36ab89e8 | |||
e75e71a5ce | |||
bf008e368e | |||
3c1d02bfc4 | |||
c1b2093cf7 | |||
cc7e4ad0e2 | |||
c07bd6e733 | |||
768464dc6a | |||
a2ed53c312 | |||
5a11206fe9 | |||
9675fbb07d | |||
57a7bed99d | |||
2dfec43750 | |||
ab9f6531c2 | |||
b8b5069df1 | |||
7045305aa8 | |||
49c706fde8 | |||
9eaceb9ec6 | |||
05778d8065 | |||
831e228f80 | |||
31e0d74495 | |||
05999cb8c7 | |||
6cb4773916 | |||
ec9b0600e4 | |||
c0d8aa2303 | |||
599fdf193e | |||
db6cb5ad51 | |||
52f138d402 | |||
bc37727758 | |||
547a728130 | |||
178c2b6927 | |||
59b8b1e92a | |||
0210cdadfb | |||
491e507d49 | |||
de1be2df88 | |||
39f51ec33d | |||
f69e20886b | |||
fd0f0c65e9 | |||
ed4daa64fe | |||
887163c45c | |||
1b3c0adf75 | |||
0838f518d4 | |||
5c49cda884 | |||
6643cce841 | |||
3eb2cda37d | |||
6fdaac9a7d | |||
6122dcacc7 | |||
246d00bdde | |||
7e47b64b05 | |||
4285175bba | |||
e4a9a84646 | |||
4d81172a48 | |||
c97b946a00 | |||
3753275453 | |||
e4cb9b7ff9 | |||
a0f05caf8e | |||
42e9ce4f72 | |||
331faa53bc | |||
17424ccc3b | |||
68efcc7bf2 | |||
7b7305607c | |||
f1e6d91289 | |||
0310d46314 | |||
14fd137f89 | |||
e91a8f88a0 | |||
af8cdb34ee | |||
03b1a67b44 | |||
12525051b6 | |||
01f004cec6 | |||
3a40e50fa0 | |||
fa5c2bd85c | |||
b83aa44c4f | |||
73e7158178 | |||
8c6a4a4968 | |||
d12462fe0d | |||
c83216ece0 | |||
133486f07f | |||
b0fec4f3e2 | |||
739a99f16e | |||
f54a1b627c | |||
242d8c2b91 | |||
77065794da | |||
dab53cfd03 | |||
6a4086c490 | |||
5b8bdac84b | |||
c71b150025 | |||
647d56e90c | |||
e85236959b | |||
afe3259e96 | |||
4be2c66cdf | |||
dc8c1ad297 | |||
9dc3b1dca0 | |||
cbfb509ca9 | |||
047361600d | |||
a5b8c91c04 | |||
4d317a21ce | |||
e07b65401e | |||
71df9ea74d | |||
1cbaf865d8 | |||
cf9023269e | |||
5f9e8ac89b | |||
bdf0e74af3 | |||
6dedb17029 | |||
5e8a1e3c0d | |||
703e67a060 | |||
de00f9f41a | |||
a05f841bed | |||
c23646e6f3 | |||
f0600b5482 | |||
afc8baff5f | |||
8a0b3bd299 | |||
3713d111a4 | |||
111459dc25 | |||
cdad8bb0c3 | |||
96c41f399e | |||
c4d7d0213f | |||
2a5ee9b185 | |||
9aa3b16c92 | |||
4c3de09f6a | |||
f4650ead40 | |||
1d59af7491 | |||
8605e62503 | |||
3f779fe766 | |||
1d3460b670 | |||
feba3e2430 | |||
b49d39a685 | |||
34c1b3b68b | |||
e3d6ca6ab4 | |||
6f0e292c43 | |||
9df1e7900d | |||
9920d121e5 | |||
7e77c88407 | |||
3fa982cb2a | |||
4f1e767488 | |||
8e6b503c0d | |||
17f1cad468 | |||
0b8eaff874 | |||
33a6d4cdeb | |||
d3224f4ee8 | |||
2a3166bf7e | |||
62fe4d617b | |||
b86b36f947 | |||
d6b9e67e78 | |||
f589da4e72 | |||
2e5170f631 | |||
bd312b60fc | |||
26aa7e1fef | |||
9495956fae | |||
089ee86d43 | |||
d321e2f52c | |||
5265064b10 | |||
ee8313142f | |||
0963b68f4e | |||
a4a7ecd493 | |||
3b6e414d0f | |||
8859806d64 | |||
56198e503b | |||
b1b3a23d1e | |||
45dd004d00 | |||
c4ebc5c085 | |||
31c42f1104 | |||
8b7f665c82 | |||
0ca7579d19 | |||
2291ae98c3 | |||
16c6e29801 | |||
fc2eb003ea | |||
aa440c17b7 | |||
4915205678 | |||
07da5f7122 | |||
f91e02a0ec | |||
c62794c738 | |||
7664b428e7 | |||
9f3f34389e | |||
30ca926b38 | |||
eeb62f543f | |||
6a7ffa855e | |||
0c5aff21bc | |||
b0f426e51a | |||
57b91eb128 | |||
ed0094eba2 | |||
4c1b6d5f48 | |||
41a7e1ef07 | |||
4ff41be74a | |||
7067d1f236 | |||
73116b9d1a | |||
147212a5f9 | |||
5502c319d4 | |||
d18b76a47d | |||
90ce704def | |||
790139f8bc | |||
f4be007803 | |||
448ca62661 | |||
4824e5c8ba | |||
9882342ed1 | |||
c4facd53b4 | |||
ef913abc7a | |||
55fc5a6068 | |||
f22c89c998 | |||
2a78d2d0a0 | |||
b0ddc6a8c0 | |||
8080b0380e | |||
ddfa2abbaa | |||
5fc5e54f47 | |||
7462d56182 | |||
3f92d1c420 | |||
d4fa60f509 | |||
052bf88c3d | |||
07d047c887 | |||
23193314f1 | |||
1912b29dc5 | |||
46410428d9 | |||
1774e33c24 | |||
c961327d27 | |||
fe1ff7fc76 | |||
82d12ecfdf | |||
6ed822fa38 | |||
4d1658b35e | |||
08302a04bf | |||
1c906b12be | |||
4d835b18cc | |||
e02ff7ec30 | |||
2e67b0194b | |||
8b4558fcd0 | |||
27728abe99 | |||
467b95cf02 | |||
80a36a3441 | |||
b1b63fbb7f | |||
0302a95dd7 | |||
fe6bfb1620 | |||
3cad746407 | |||
e6d64bf5b3 | |||
8dd05d5431 | |||
270739a45a | |||
df8995deed | |||
02f0712934 | |||
7e7ea47f39 | |||
7e52711e3a | |||
40fd1c9c1f | |||
4037a444eb | |||
1ed7e900f2 | |||
cfc8d0a0f7 | |||
df33616544 | |||
fdfc6472d2 | |||
bc495828e7 | |||
fa138a273f | |||
5555dd4dde | |||
084ff2994f | |||
ee8a61d164 | |||
60a363e4bf | |||
e2804b9755 | |||
9330a03273 | |||
beabba2890 | |||
eeeb14a045 | |||
ff3f126832 | |||
73225917cd | |||
8b7a285f4a | |||
3a4c6a5d67 | |||
0664f0b6b2 | |||
fab9f1cb1b | |||
b3c54308b7 | |||
c1a72a0474 | |||
4377d1e86e | |||
cafe2f1e1f | |||
c329a724e8 | |||
969da05437 | |||
c61c84e9f3 | |||
e08c5ff875 | |||
d1fd616b8d | |||
cc4bbc049b | |||
24a3e787dd | |||
13a20478fd | |||
f58ee7fb52 | |||
4d45dc31a9 | |||
f6b5fbc2cf | |||
db69c3e38d | |||
5ba55356a9 | |||
6104b7c9ba | |||
bcef8369ff | |||
0fe555a76e | |||
c903c81bd5 | |||
2c43bfb13f | |||
24ecab0878 | |||
6285c79341 | |||
5f7c56fab4 | |||
6338b14a5b | |||
62ff3667f9 | |||
3b97eef641 | |||
b05d66466b | |||
220144c919 | |||
3b9402420d | |||
1324143146 | |||
595144cdd9 | |||
b3e714a741 | |||
2b3ae1e2d5 | |||
886845306a | |||
de6aaec088 | |||
137e0854ab | |||
b6a0e895bc | |||
05c791b1c0 | |||
669f3051e8 | |||
d945b56561 | |||
27333bbff1 | |||
80c800f233 | |||
5d17d3dd31 | |||
8c64fcd17f | |||
753110583e | |||
4206a8c43e | |||
7cc9ae45bc | |||
09ef58350c | |||
0b70007926 | |||
2c5d6e8187 | |||
10d3f9ac2f | |||
a6301055f0 | |||
9a1b8eb7c8 | |||
2ee45f388c | |||
9a9feea5ff | |||
8540e787d3 | |||
db26ce808e | |||
802d568273 | |||
7b6524357f | |||
83013f063d | |||
333ee3eed4 | |||
e68352b09c | |||
df1cb88abc | |||
5596caedbc | |||
7bd65120b9 | |||
227966e727 | |||
406f69080b | |||
2ce31dfaa5 | |||
b23afcfc3b | |||
7ed3ceb960 | |||
615cd7870d | |||
b907105f4a | |||
023423c6e7 | |||
a5319fc2fe | |||
8cfd3f9a2b | |||
814c797c64 | |||
776ad3cfbf | |||
74ddf70cb7 | |||
a7a839a29c | |||
9859c5db0a | |||
fe503c8de0 | |||
43a583e2d2 | |||
f289025d8e | |||
19cb310446 | |||
47f6d0ac59 | |||
922cbf932d | |||
c104eeebe6 | |||
80c3246333 | |||
461fed5567 | |||
d5f6714ed7 | |||
c42ed6bc99 | |||
57fed2b92b | |||
e45b33c6c2 | |||
137e90355b | |||
7500e622f6 | |||
d49c58f326 | |||
9814d3be03 | |||
fc9f86cccc | |||
6fd19c0a37 | |||
10cb412532 | |||
e12780f78f | |||
9dec13c225 | |||
69120da45c | |||
5b2bf7519a | |||
631cf77f89 | |||
6676e95011 | |||
3219cffb52 | |||
d4f149bc02 | |||
206cf4967d | |||
a67c53f46a | |||
e989c61793 | |||
99bab03cce | |||
a7567ad8c6 | |||
2ffa2fc6b8 | |||
8de87d9acb | |||
1d03b36750 | |||
8dc3c49a2f | |||
f6461b08d7 | |||
a3a3dde1c8 | |||
f111604b70 | |||
4315d1a03c | |||
9def45c8d7 | |||
358922b09b | |||
fbc3ac6b30 | |||
4f785da452 | |||
ff4bd1c91f | |||
7a96f9e894 | |||
c27d257146 | |||
9bccf9bb0a | |||
c0b05a62f4 | |||
c140c39d07 | |||
9a700e506b | |||
8e488670ad | |||
fd5b2298e5 | |||
caeaf8d5a9 | |||
c46f0781fc | |||
0aad0604d8 | |||
131c3fdb32 | |||
8a6009c278 | |||
3456527f10 | |||
28b913136d | |||
f700899640 | |||
5ba45d3037 | |||
212e966dd4 | |||
08c0eb2ec6 | |||
872ecd93a6 | |||
f8af9d6ce0 | |||
c3e43a7c2f | |||
273af0f1cb | |||
2a85e5ae87 | |||
114bb1b0bd | |||
97b5d120f8 | |||
e1f0fe45cb | |||
bc0f4973d8 | |||
5400882d78 | |||
8de66b27ad | |||
179f0097c0 | |||
b40bffdf38 | |||
2e9496bb74 | |||
d9d765c6cd | |||
10cc6856a4 | |||
813dd2894f | |||
80d90b91e8 | |||
fff05e35ac | |||
75bb59a22a | |||
3ce69bb391 | |||
4eb7c5f94b | |||
aac7e6be90 | |||
c77f4204c0 | |||
5f4452470b | |||
9a1270c693 | |||
7b9d1a1159 | |||
cdbe1f6161 | |||
e43db2e065 | |||
d1c74d2160 | |||
f2119ce567 | |||
2c4dcb9cf0 | |||
93b8266821 | |||
443797d9b0 | |||
a4365ca02c | |||
3750083667 | |||
66ef067ecf | |||
b489b0e691 | |||
f2154d9875 | |||
80a50f9bdb | |||
dc8b89a6b9 | |||
8df55f22aa | |||
f6c322be27 | |||
a144552059 | |||
535d529193 | |||
6ed2e137a2 | |||
45bd63c720 | |||
736e13fc35 | |||
966fff008c | |||
64f15eadbd | |||
81b66ecdcd | |||
53e5cf7826 | |||
82654b3fd9 | |||
9b72c604dd | |||
5fb1b8044c | |||
b8daab4377 | |||
c5b91bdae8 | |||
39a208c55f | |||
a5bfef9b6b | |||
f1f4cbef9b | |||
8388120b06 | |||
2bf96828f1 | |||
22838e66fe | |||
484dd6de09 | |||
b743736c26 | |||
af91e2079b | |||
cad1c17f14 | |||
120d32e4dc | |||
238b489e07 | |||
4daa70c894 | |||
f8599438df | |||
155c9a4c3f | |||
8433b5e583 | |||
dc5ba144f1 | |||
521a8b5356 | |||
3453077d7b | |||
70ede8581a | |||
6e9d297f02 | |||
6a7545fd43 | |||
a8926cbd07 | |||
64d7b009ab | |||
2b5fddb7bf | |||
b99d23c119 | |||
03905b74ff | |||
6b8a59cfbd | |||
d6fdcd3ef9 | |||
53ebc551d2 | |||
3d4f43d6e3 | |||
074cde7cd5 | |||
382e563590 | |||
ca61a7cc21 | |||
fa2870afe0 | |||
0f46207ea4 | |||
1e7d912144 | |||
f4a676e2fb | |||
b2c10e2387 | |||
8c329dca7d | |||
83da175749 | |||
995c87938f | |||
40678b2f84 | |||
8dbbe9102b | |||
2f51f354de | |||
04b815a33e | |||
2a4d68911b | |||
4d5a2d61ff | |||
efd88c27ad | |||
80d361ccd2 | |||
6ed4501615 | |||
8d34faa28e | |||
a3ae827839 | |||
88c1ad4c1c | |||
1147c4901b | |||
063181d7a7 | |||
1285ba6fbb | |||
a09a1793ec | |||
50caa3ac3e | |||
9440d24358 | |||
26bf6fd22f | |||
e2f836feae | |||
b6326f399c | |||
ea6a1422f7 | |||
8fd86a28ff | |||
d88283a7a9 | |||
32a15f84c0 | |||
93ba4b7f62 | |||
187780dab2 | |||
d988f37afc | |||
295c0bae3f | |||
38a22ddf13 | |||
d06f1abb89 | |||
027a64fad2 | |||
84fc54ddaa | |||
0b5caa85f5 | |||
14e0a17dbc | |||
3c04afa31f | |||
40a2a26904 | |||
c8b3c6e51a | |||
e0272a6422 | |||
b290bbf6d7 | |||
8d875cb01d | |||
36b1f8ba36 | |||
6c889eff27 | |||
9d8675e54b | |||
22ae986c0b | |||
2bef5f3911 | |||
3c2b8e5ee1 | |||
c96571bdba | |||
2dfd93afb1 | |||
f1d77d475c | |||
1d22e30c70 | |||
07b7951390 | |||
995615d0a0 | |||
ac273aab75 | |||
44cd03654d | |||
3e2375f970 | |||
38ad8e5fd3 | |||
c481558a46 | |||
e27a05a7fc | |||
e4886f0c6f | |||
8b2ce5476a | |||
1b82283a20 | |||
7f3d0113c2 | |||
0f6dd33a6b | |||
5b79b3fd22 | |||
d68c72f1fa | |||
9267d0c1dd | |||
865abc005a | |||
a2725d5b82 | |||
4a05bc6e02 | |||
4e8238603a | |||
ff25c1c057 | |||
78cddca0d7 | |||
4742ee1d93 | |||
0c2dc309e7 | |||
144935d10f | |||
74ad1b6759 | |||
591d2f89a1 | |||
7c353f9297 | |||
cd1af15c56 | |||
878169ea2e | |||
38dfb03668 | |||
e2631cec0e | |||
5dad853f8a | |||
9f00843441 | |||
f31cd7dec6 | |||
1c1afca31f | |||
fbd4bdef33 | |||
5b22f9b6c3 | |||
083e317028 | |||
95416623b3 | |||
813b2676de | |||
aeca66a288 | |||
04a5428148 | |||
73b173b92a | |||
7cbf20a71c | |||
7a98e6d92b | |||
49e915f98b | |||
3aa2f1e892 | |||
bc4b7ef44d | |||
9400b01a55 | |||
e57da71dcf | |||
7268afaaf9 | |||
205183445c | |||
a08bdfdbcd | |||
e6c47fee26 | |||
a5629c5155 | |||
41689fe3ce | |||
8e84208e2c | |||
32a48fa07a | |||
773a9c0692 | |||
8808e3afe0 | |||
ecea85f8ca | |||
5dfa141e35 | |||
447e81d0b8 | |||
e138076e1d | |||
721d133dc3 | |||
75b687ecbe | |||
bdd1863177 | |||
e5b85e8e6a | |||
d7481c9de7 | |||
571373866e | |||
e36d7928e4 | |||
2be026dd44 | |||
d5b9de3569 | |||
e22620b0ec | |||
ba74a3213d | |||
d9ecb7070d | |||
fc4a46bd9c | |||
78301b7bab | |||
7bf7bde856 | |||
9bdff14403 | |||
f124314eab | |||
684e4ffdcf | |||
d9ff5c69c8 | |||
8142e3df45 | |||
73920899de | |||
13666965a7 | |||
86f16e2781 | |||
2ed8e72c62 | |||
edeed18ae8 | |||
d24133d8a2 | |||
b9733e56aa | |||
cd34413914 | |||
c3a4a76d43 | |||
a59a29b256 | |||
dce1edbe53 | |||
264d43827a | |||
6207226bdf | |||
ebf33f39c9 | |||
696cd1f247 | |||
b7b3abc462 | |||
575739d07c | |||
2d7e70eebf | |||
387f3c981f | |||
865435fb25 | |||
b10c5306b9 | |||
7c706369cd | |||
20dd6355c1 | |||
ba8d5d6e27 | |||
c448f87027 | |||
2b8c70a61f | |||
9d7ed9a0ed | |||
ff69b4affe | |||
d77afd1ded | |||
c3909f9196 | |||
fa55ba5ef0 | |||
766518ee0e | |||
74b2b26a20 | |||
4ebbc6f065 | |||
3bd1eadd51 | |||
8eb3f0f708 | |||
31ea2e7139 | |||
323b4b4a5d | |||
7b8e1bea92 | |||
f986dc89ad | |||
b21fd10093 | |||
6f9c19b142 | |||
f45643ca87 | |||
85f8bea784 | |||
b428ec5237 | |||
92428529ad | |||
f6761b5b0b | |||
307b04f4ca | |||
6a520a5697 | |||
f22dbba931 | |||
82cf482fba | |||
a6afb99edd | |||
ac5f8465b9 | |||
218acb9e38 | |||
927c718fdd | |||
b7a6d6e739 | |||
0946d6a25d | |||
c1e98e2f0c | |||
807cbbeaaf | |||
6c358c4e0a | |||
74cd0bc08f | |||
b08ec0477e | |||
328c999cb9 | |||
c37e382c15 | |||
784dd0fdd6 | |||
e6256cb9c8 | |||
4520e3f8b8 | |||
23146de2bf | |||
e24f4fe3a8 | |||
8e6b69f96f | |||
979bea17ed | |||
30dba285d9 | |||
99fadf2e55 | |||
b606e3d0cb | |||
be642bc874 | |||
49a347b32f | |||
089b48aad1 | |||
2997cb83b1 | |||
08f0aca894 | |||
80ea7c40b7 | |||
019a0cb14d | |||
97290755e7 | |||
7f150c96b4 | |||
73558f30d1 | |||
dfcfd87644 | |||
2c0f0a68a8 | |||
3d73aac3ab | |||
e4fbcd3735 | |||
44c0eb37cf | |||
adc3dcc2c4 | |||
bac8227371 | |||
73d4d9dfe0 | |||
afdac5f3f8 | |||
dabce36667 | |||
3bd56ce522 | |||
540419d5c1 | |||
ed1fcc3930 | |||
c22ddc5394 | |||
0544864a3f | |||
0b9fc9e444 | |||
e862b97005 | |||
cffe09b02e | |||
846a86fb62 | |||
463c130351 | |||
ffca957838 | |||
543e949a48 | |||
feb80049aa | |||
5c59c8ccb6 | |||
1fadd82c65 | |||
7e7736126d | |||
5e0915afce | |||
bf6c9e8c4a | |||
3353aa0298 | |||
d4cb1a98c7 | |||
13f4ea0b8b | |||
261d57ad7b | |||
4086252979 | |||
8bdf12cff1 | |||
65a065c4ee | |||
a691ee529c | |||
f1c4a62612 | |||
358e39ced0 | |||
48c3f68cfc | |||
1849a7c383 | |||
82d14f37c3 | |||
a0261eafa3 | |||
2a27325dfd | |||
a6dee2e8ed | |||
2ff1635696 | |||
1cb6b5e984 | |||
1fe420fd80 | |||
50172e58d8 | |||
d7483d129f | |||
34ed0b3594 | |||
f008a3e20c | |||
9de950220f | |||
567c90b4c6 | |||
ae19236366 | |||
f9babe7089 | |||
78c74cd469 | |||
32abb27e61 | |||
8478b03892 | |||
e972f2b289 | |||
22c4fb1414 | |||
0154def916 | |||
fc69b6851d | |||
44a3c7fa5f | |||
37111fd07b | |||
4e6653e299 | |||
143a575369 | |||
c782585287 | |||
7718b3b3b8 | |||
8ff9e72972 | |||
ef6ef68a39 | |||
344a8817c3 | |||
3afb0d4f6d | |||
c9714893bb | |||
3185a86b22 | |||
a53f7a49ac |
@ -1,5 +1,5 @@
|
|||||||
[bumpversion]
|
[bumpversion]
|
||||||
current_version = 0.6.4-beta
|
current_version = 0.10.0-rc6
|
||||||
tag = True
|
tag = True
|
||||||
commit = True
|
commit = True
|
||||||
parse = (?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)\-(?P<release>.*)
|
parse = (?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)\-(?P<release>.*)
|
||||||
@ -15,13 +15,16 @@ values =
|
|||||||
beta
|
beta
|
||||||
stable
|
stable
|
||||||
|
|
||||||
[bumpversion:file:helm/passbook/values.yaml]
|
[bumpversion:file:README.md]
|
||||||
|
|
||||||
[bumpversion:file:helm/passbook/Chart.yaml]
|
[bumpversion:file:docs/installation/docker-compose.md]
|
||||||
|
|
||||||
[bumpversion:file:.gitlab-ci.yml]
|
[bumpversion:file:docker-compose.yml]
|
||||||
|
|
||||||
|
[bumpversion:file:helm/values.yaml]
|
||||||
|
|
||||||
|
[bumpversion:file:helm/Chart.yaml]
|
||||||
|
|
||||||
|
[bumpversion:file:.github/workflows/release.yml]
|
||||||
|
|
||||||
[bumpversion:file:passbook/__init__.py]
|
[bumpversion:file:passbook/__init__.py]
|
||||||
|
|
||||||
[bumpversion:file:docker/nginx.conf]
|
|
||||||
|
|
||||||
|
@ -1,12 +1,10 @@
|
|||||||
[run]
|
[run]
|
||||||
source = passbook
|
source = passbook
|
||||||
omit =
|
omit =
|
||||||
*/wsgi.py
|
*/asgi.py
|
||||||
manage.py
|
manage.py
|
||||||
*/migrations/*
|
*/migrations/*
|
||||||
*/apps.py
|
*/apps.py
|
||||||
passbook/management/commands/web.py
|
|
||||||
passbook/management/commands/worker.py
|
|
||||||
docs/
|
docs/
|
||||||
|
|
||||||
[report]
|
[report]
|
||||||
@ -21,6 +19,7 @@ exclude_lines =
|
|||||||
def __str__
|
def __str__
|
||||||
def __repr__
|
def __repr__
|
||||||
if self\.debug
|
if self\.debug
|
||||||
|
if TYPE_CHECKING
|
||||||
|
|
||||||
# Don't complain if tests don't hit defensive assertion code:
|
# Don't complain if tests don't hit defensive assertion code:
|
||||||
raise AssertionError
|
raise AssertionError
|
||||||
|
@ -3,3 +3,4 @@ helm
|
|||||||
passbook-ui
|
passbook-ui
|
||||||
static
|
static
|
||||||
*.env.yml
|
*.env.yml
|
||||||
|
node_modules/
|
||||||
|
1
.github/FUNDING.yml
vendored
Normal file
@ -0,0 +1 @@
|
|||||||
|
custom: ["https://www.paypal.me/beryju"]
|
54
.github/workflows/codeql-analysis.yml
vendored
Normal file
@ -0,0 +1,54 @@
|
|||||||
|
name: "CodeQL"
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: [master, admin-more-info, ci-deploy-dev, gh-pages, provider-saml-v2]
|
||||||
|
pull_request:
|
||||||
|
# The branches below must be a subset of the branches above
|
||||||
|
branches: [master]
|
||||||
|
schedule:
|
||||||
|
- cron: '0 20 * * 2'
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
analyse:
|
||||||
|
name: Analyse
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- name: Checkout repository
|
||||||
|
uses: actions/checkout@v2
|
||||||
|
with:
|
||||||
|
# We must fetch at least the immediate parents so that if this is
|
||||||
|
# a pull request then we can checkout the head.
|
||||||
|
fetch-depth: 2
|
||||||
|
|
||||||
|
# If this run was triggered by a pull request event, then checkout
|
||||||
|
# the head of the pull request instead of the merge commit.
|
||||||
|
- run: git checkout HEAD^2
|
||||||
|
if: ${{ github.event_name == 'pull_request' }}
|
||||||
|
|
||||||
|
# Initializes the CodeQL tools for scanning.
|
||||||
|
- name: Initialize CodeQL
|
||||||
|
uses: github/codeql-action/init@v1
|
||||||
|
# Override language selection by uncommenting this and choosing your languages
|
||||||
|
# with:
|
||||||
|
# languages: go, javascript, csharp, python, cpp, java
|
||||||
|
|
||||||
|
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
|
||||||
|
# If this step fails, then you should remove it and run the build manually (see below)
|
||||||
|
- name: Autobuild
|
||||||
|
uses: github/codeql-action/autobuild@v1
|
||||||
|
|
||||||
|
# ℹ️ Command-line programs to run using the OS shell.
|
||||||
|
# 📚 https://git.io/JvXDl
|
||||||
|
|
||||||
|
# ✏️ If the Autobuild fails above, remove it and uncomment the following three lines
|
||||||
|
# and modify them (or add more) to build your code if your project
|
||||||
|
# uses a compiled language
|
||||||
|
|
||||||
|
#- run: |
|
||||||
|
# make bootstrap
|
||||||
|
# make release
|
||||||
|
|
||||||
|
- name: Perform CodeQL Analysis
|
||||||
|
uses: github/codeql-action/analyze@v1
|
115
.github/workflows/release.yml
vendored
Normal file
@ -0,0 +1,115 @@
|
|||||||
|
name: passbook-on-release
|
||||||
|
|
||||||
|
on:
|
||||||
|
release:
|
||||||
|
types: [published, created]
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
# Build
|
||||||
|
build-server:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v1
|
||||||
|
- name: Docker Login Registry
|
||||||
|
env:
|
||||||
|
DOCKER_PASSWORD: ${{ secrets.DOCKER_PASSWORD }}
|
||||||
|
DOCKER_USERNAME: ${{ secrets.DOCKER_USERNAME }}
|
||||||
|
run: docker login -u $DOCKER_USERNAME -p $DOCKER_PASSWORD
|
||||||
|
- name: Building Docker Image
|
||||||
|
run: docker build
|
||||||
|
--no-cache
|
||||||
|
-t beryju/passbook:0.10.0-rc6
|
||||||
|
-t beryju/passbook:latest
|
||||||
|
-f Dockerfile .
|
||||||
|
- name: Push Docker Container to Registry (versioned)
|
||||||
|
run: docker push beryju/passbook:0.10.0-rc6
|
||||||
|
- name: Push Docker Container to Registry (latest)
|
||||||
|
run: docker push beryju/passbook:latest
|
||||||
|
build-proxy:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v1
|
||||||
|
- uses: actions/setup-go@v2
|
||||||
|
with:
|
||||||
|
go-version: "^1.15"
|
||||||
|
- name: prepare go api client
|
||||||
|
run: |
|
||||||
|
cd proxy
|
||||||
|
go get -u github.com/go-swagger/go-swagger/cmd/swagger
|
||||||
|
swagger generate client -f ../swagger.yaml -A passbook -t pkg/
|
||||||
|
go build -v .
|
||||||
|
- name: Docker Login Registry
|
||||||
|
env:
|
||||||
|
DOCKER_PASSWORD: ${{ secrets.DOCKER_PASSWORD }}
|
||||||
|
DOCKER_USERNAME: ${{ secrets.DOCKER_USERNAME }}
|
||||||
|
run: docker login -u $DOCKER_USERNAME -p $DOCKER_PASSWORD
|
||||||
|
- name: Building Docker Image
|
||||||
|
run: |
|
||||||
|
cd proxy
|
||||||
|
docker build \
|
||||||
|
--no-cache \
|
||||||
|
-t beryju/passbook-proxy:0.10.0-rc6 \
|
||||||
|
-t beryju/passbook-proxy:latest \
|
||||||
|
-f Dockerfile .
|
||||||
|
- name: Push Docker Container to Registry (versioned)
|
||||||
|
run: docker push beryju/passbook-proxy:0.10.0-rc6
|
||||||
|
- name: Push Docker Container to Registry (latest)
|
||||||
|
run: docker push beryju/passbook-proxy:latest
|
||||||
|
build-static:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
services:
|
||||||
|
postgres:
|
||||||
|
image: postgres:latest
|
||||||
|
env:
|
||||||
|
POSTGRES_DB: passbook
|
||||||
|
POSTGRES_USER: passbook
|
||||||
|
POSTGRES_PASSWORD: "EK-5jnKfjrGRm<77"
|
||||||
|
redis:
|
||||||
|
image: redis:latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v1
|
||||||
|
- name: Docker Login Registry
|
||||||
|
env:
|
||||||
|
DOCKER_PASSWORD: ${{ secrets.DOCKER_PASSWORD }}
|
||||||
|
DOCKER_USERNAME: ${{ secrets.DOCKER_USERNAME }}
|
||||||
|
run: docker login -u $DOCKER_USERNAME -p $DOCKER_PASSWORD
|
||||||
|
- name: Building Docker Image
|
||||||
|
run: docker build
|
||||||
|
--no-cache
|
||||||
|
--network=$(docker network ls | grep github | awk '{print $1}')
|
||||||
|
-t beryju/passbook-static:0.10.0-rc6
|
||||||
|
-t beryju/passbook-static:latest
|
||||||
|
-f static.Dockerfile .
|
||||||
|
- name: Push Docker Container to Registry (versioned)
|
||||||
|
run: docker push beryju/passbook-static:0.10.0-rc6
|
||||||
|
- name: Push Docker Container to Registry (latest)
|
||||||
|
run: docker push beryju/passbook-static:latest
|
||||||
|
test-release:
|
||||||
|
needs:
|
||||||
|
- build-server
|
||||||
|
- build-static
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v1
|
||||||
|
- name: Run test suite in final docker images
|
||||||
|
run: |
|
||||||
|
docker-compose pull -q
|
||||||
|
docker-compose up --no-start
|
||||||
|
docker-compose start postgresql redis
|
||||||
|
docker-compose run -u root --entrypoint /bin/bash server -c "pip install --no-cache -r requirements-dev.txt && ./manage.py test"
|
||||||
|
sentry-release:
|
||||||
|
needs:
|
||||||
|
- test-release
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v1
|
||||||
|
- name: Create a Sentry.io release
|
||||||
|
uses: tclindner/sentry-releases-action@v1.2.0
|
||||||
|
env:
|
||||||
|
SENTRY_AUTH_TOKEN: ${{ secrets.SENTRY_AUTH_TOKEN }}
|
||||||
|
SENTRY_ORG: beryjuorg
|
||||||
|
SENTRY_PROJECT: passbook
|
||||||
|
SENTRY_URL: https://sentry.beryju.org
|
||||||
|
with:
|
||||||
|
tagName: 0.10.0-rc6
|
||||||
|
environment: beryjuorg-prod
|
60
.github/workflows/tag.yml
vendored
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
name: passbook-on-tag
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
tags:
|
||||||
|
- 'version/*'
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build:
|
||||||
|
name: Create Release from Tag
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@master
|
||||||
|
- name: Pre-release test
|
||||||
|
run: |
|
||||||
|
export PASSBOOK_TAG=latest
|
||||||
|
docker-compose pull -q
|
||||||
|
docker build \
|
||||||
|
--no-cache \
|
||||||
|
-t beryju/passbook:latest \
|
||||||
|
-f Dockerfile .
|
||||||
|
docker-compose up --no-start
|
||||||
|
docker-compose start postgresql redis
|
||||||
|
docker-compose run -u root --entrypoint /bin/bash server -c "pip install --no-cache -r requirements-dev.txt && ./manage.py test"
|
||||||
|
- name: Install Helm
|
||||||
|
run: |
|
||||||
|
apt update && apt install -y curl
|
||||||
|
curl https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3 | bash
|
||||||
|
- name: Helm package
|
||||||
|
run: |
|
||||||
|
helm dependency update helm/
|
||||||
|
helm package helm/
|
||||||
|
mv passbook-*.tgz passbook-chart.tgz
|
||||||
|
- name: Extract verison number
|
||||||
|
id: get_version
|
||||||
|
uses: actions/github-script@0.2.0
|
||||||
|
with:
|
||||||
|
github-token: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
script: |
|
||||||
|
return context.payload.ref.replace(/\/refs\/tags\/version\//, '');
|
||||||
|
- name: Create Release
|
||||||
|
id: create_release
|
||||||
|
uses: actions/create-release@v1.0.0
|
||||||
|
env:
|
||||||
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
with:
|
||||||
|
tag_name: ${{ github.ref }}
|
||||||
|
release_name: Release ${{ steps.get_version.outputs.result }}
|
||||||
|
draft: false
|
||||||
|
prerelease: false
|
||||||
|
- name: Upload packaged Helm Chart
|
||||||
|
id: upload-release-asset
|
||||||
|
uses: actions/upload-release-asset@v1.0.1
|
||||||
|
env:
|
||||||
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
with:
|
||||||
|
upload_url: ${{ steps.create_release.outputs.upload_url }}
|
||||||
|
asset_path: ./passbook-chart.tgz
|
||||||
|
asset_name: passbook-chart.tgz
|
||||||
|
asset_content_type: application/gzip
|
9
.gitignore
vendored
@ -63,6 +63,7 @@ coverage.xml
|
|||||||
*.cover
|
*.cover
|
||||||
.hypothesis/
|
.hypothesis/
|
||||||
.pytest_cache/
|
.pytest_cache/
|
||||||
|
unittest.xml
|
||||||
|
|
||||||
# Translations
|
# Translations
|
||||||
*.mo
|
*.mo
|
||||||
@ -184,7 +185,6 @@ dmypy.json
|
|||||||
[Ii]nclude
|
[Ii]nclude
|
||||||
[Ll]ib64
|
[Ll]ib64
|
||||||
[Ll]ocal
|
[Ll]ocal
|
||||||
[Ss]cripts
|
|
||||||
pyvenv.cfg
|
pyvenv.cfg
|
||||||
pip-selfcheck.json
|
pip-selfcheck.json
|
||||||
|
|
||||||
@ -192,3 +192,10 @@ pip-selfcheck.json
|
|||||||
/static/
|
/static/
|
||||||
local.env.yml
|
local.env.yml
|
||||||
.vscode/
|
.vscode/
|
||||||
|
|
||||||
|
### Helm ###
|
||||||
|
# Chart dependencies
|
||||||
|
**/charts/*.tgz
|
||||||
|
|
||||||
|
# Selenium Screenshots
|
||||||
|
selenium_screenshots/**
|
||||||
|
135
.gitlab-ci.yml
@ -1,135 +0,0 @@
|
|||||||
# Global Variables
|
|
||||||
stages:
|
|
||||||
- build-base-image
|
|
||||||
- build-dev-image
|
|
||||||
- test
|
|
||||||
- build
|
|
||||||
- package
|
|
||||||
image: docker.beryju.org/passbook/dev:latest
|
|
||||||
|
|
||||||
variables:
|
|
||||||
POSTGRES_DB: passbook
|
|
||||||
POSTGRES_USER: passbook
|
|
||||||
POSTGRES_PASSWORD: "EK-5jnKfjrGRm<77"
|
|
||||||
|
|
||||||
before_script:
|
|
||||||
- pip install pipenv
|
|
||||||
# Ensure all dependencies are installed, even those not included in passbook/dev
|
|
||||||
# According to pipenv docs, -d outputs all packages, however it actually does not
|
|
||||||
- pipenv lock -r > requirements-all.txt
|
|
||||||
- pipenv lock -rd >> requirements-all.txt
|
|
||||||
- pip install -r requirements-all.txt
|
|
||||||
|
|
||||||
create-base-image:
|
|
||||||
image:
|
|
||||||
name: gcr.io/kaniko-project/executor:debug
|
|
||||||
entrypoint: [""]
|
|
||||||
before_script:
|
|
||||||
- echo "{\"auths\":{\"docker.beryju.org\":{\"auth\":\"$DOCKER_AUTH\"}}}" > /kaniko/.docker/config.json
|
|
||||||
script:
|
|
||||||
- /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/base.Dockerfile --destination docker.beryju.org/passbook/base:latest --destination docker.beryju.org/passbook/base:0.6.4-beta
|
|
||||||
stage: build-base-image
|
|
||||||
only:
|
|
||||||
refs:
|
|
||||||
- tags
|
|
||||||
- /^version/.*$/
|
|
||||||
|
|
||||||
build-dev-image:
|
|
||||||
image:
|
|
||||||
name: gcr.io/kaniko-project/executor:debug
|
|
||||||
entrypoint: [""]
|
|
||||||
before_script:
|
|
||||||
- echo "{\"auths\":{\"docker.beryju.org\":{\"auth\":\"$DOCKER_AUTH\"}}}" > /kaniko/.docker/config.json
|
|
||||||
script:
|
|
||||||
- /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/dev.Dockerfile --destination docker.beryju.org/passbook/dev:latest --destination docker.beryju.org/passbook/dev:0.6.4-beta
|
|
||||||
stage: build-dev-image
|
|
||||||
only:
|
|
||||||
refs:
|
|
||||||
- tags
|
|
||||||
- /^version/.*$/
|
|
||||||
|
|
||||||
|
|
||||||
isort:
|
|
||||||
script:
|
|
||||||
- isort -c -sg env
|
|
||||||
stage: test
|
|
||||||
services:
|
|
||||||
- postgres:latest
|
|
||||||
- redis:latest
|
|
||||||
migrations:
|
|
||||||
script:
|
|
||||||
- python manage.py migrate
|
|
||||||
stage: test
|
|
||||||
services:
|
|
||||||
- postgres:latest
|
|
||||||
- redis:latest
|
|
||||||
# prospector:
|
|
||||||
# script:
|
|
||||||
# - prospector
|
|
||||||
# stage: test
|
|
||||||
# services:
|
|
||||||
# - postgres:latest
|
|
||||||
# - redis:latest
|
|
||||||
# pylint:
|
|
||||||
# script:
|
|
||||||
# - pylint passbook
|
|
||||||
# stage: test
|
|
||||||
# services:
|
|
||||||
# - postgres:latest
|
|
||||||
# - redis:latest
|
|
||||||
coverage:
|
|
||||||
script:
|
|
||||||
- coverage run manage.py test
|
|
||||||
- coverage report
|
|
||||||
- coverage html
|
|
||||||
stage: test
|
|
||||||
services:
|
|
||||||
- postgres:latest
|
|
||||||
- redis:latest
|
|
||||||
|
|
||||||
build-passbook-server:
|
|
||||||
stage: build
|
|
||||||
image:
|
|
||||||
name: gcr.io/kaniko-project/executor:debug
|
|
||||||
entrypoint: [""]
|
|
||||||
before_script:
|
|
||||||
- echo "{\"auths\":{\"docker.beryju.org\":{\"auth\":\"$DOCKER_AUTH\"}}}" > /kaniko/.docker/config.json
|
|
||||||
script:
|
|
||||||
- /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --destination docker.beryju.org/passbook/server:latest --destination docker.beryju.org/passbook/server:0.6.4-beta
|
|
||||||
only:
|
|
||||||
- tags
|
|
||||||
- /^version/.*$/
|
|
||||||
build-passbook-static:
|
|
||||||
stage: build
|
|
||||||
image:
|
|
||||||
name: gcr.io/kaniko-project/executor:debug
|
|
||||||
entrypoint: [""]
|
|
||||||
before_script:
|
|
||||||
- echo "{\"auths\":{\"docker.beryju.org\":{\"auth\":\"$DOCKER_AUTH\"}}}" > /kaniko/.docker/config.json
|
|
||||||
script:
|
|
||||||
- /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/static.Dockerfile --destination docker.beryju.org/passbook/static:latest --destination docker.beryju.org/passbook/static:0.6.4-beta
|
|
||||||
only:
|
|
||||||
- tags
|
|
||||||
- /^version/.*$/
|
|
||||||
# running collectstatic fully initialises django, hence we need that databases
|
|
||||||
services:
|
|
||||||
- postgres:latest
|
|
||||||
- redis:latest
|
|
||||||
|
|
||||||
package-helm:
|
|
||||||
image: debian:stretch-slim
|
|
||||||
stage: package
|
|
||||||
before_script:
|
|
||||||
- apt update && apt install -y curl
|
|
||||||
- curl https://raw.githubusercontent.com/helm/helm/master/scripts/get | bash
|
|
||||||
script:
|
|
||||||
- helm init --client-only
|
|
||||||
- helm dependency update helm/passbook
|
|
||||||
- helm package helm/passbook
|
|
||||||
artifacts:
|
|
||||||
paths:
|
|
||||||
- passbook-*.tgz
|
|
||||||
expire_in: 1 week
|
|
||||||
only:
|
|
||||||
- tags
|
|
||||||
- /^version/.*$/
|
|
6
.isort.cfg
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
[settings]
|
||||||
|
multi_line_output=3
|
||||||
|
include_trailing_comma=True
|
||||||
|
force_grid_wrap=0
|
||||||
|
use_parentheses=True
|
||||||
|
line_length=88
|
@ -8,4 +8,4 @@ ignore-paths:
|
|||||||
- node_modules
|
- node_modules
|
||||||
|
|
||||||
uses:
|
uses:
|
||||||
- django
|
- django
|
||||||
|
10
.pylintrc
@ -1,13 +1,9 @@
|
|||||||
[MASTER]
|
[MASTER]
|
||||||
|
|
||||||
disable=redefined-outer-name,arguments-differ,no-self-use,cyclic-import,fixme,locally-disabled,unpacking-non-sequence,too-many-ancestors,too-many-branches,too-few-public-methods
|
disable=arguments-differ,no-self-use,fixme,locally-disabled,too-many-ancestors,too-few-public-methods,import-outside-toplevel,bad-continuation,signature-differs,similarities,cyclic-import
|
||||||
load-plugins=pylint_django,pylint.extensions.bad_builtin
|
load-plugins=pylint_django,pylint.extensions.bad_builtin
|
||||||
extension-pkg-whitelist=lxml
|
extension-pkg-whitelist=lxml
|
||||||
const-rgx=[a-zA-Z0-9_]{1,40}$
|
const-rgx=[a-zA-Z0-9_]{1,40}$
|
||||||
ignored-modules=django-otp
|
ignored-modules=django-otp
|
||||||
jobs=4
|
jobs=12
|
||||||
|
ignore=migrations
|
||||||
[SIMILARITIES]
|
|
||||||
|
|
||||||
# Minimum lines number of a similarity.
|
|
||||||
min-similarity-lines=20
|
|
||||||
|
31
Dockerfile
@ -1,9 +1,32 @@
|
|||||||
FROM docker.beryju.org/passbook/base:latest
|
FROM python:3.8-slim-buster as locker
|
||||||
|
|
||||||
COPY --chown=passbook:passbook ./passbook/ /app/passbook
|
COPY ./Pipfile /app/
|
||||||
COPY ./manage.py /app/
|
COPY ./Pipfile.lock /app/
|
||||||
COPY ./docker/uwsgi.ini /app/
|
|
||||||
|
|
||||||
WORKDIR /app/
|
WORKDIR /app/
|
||||||
|
|
||||||
|
RUN pip install pipenv && \
|
||||||
|
pipenv lock -r > requirements.txt && \
|
||||||
|
pipenv lock -rd > requirements-dev.txt
|
||||||
|
|
||||||
|
FROM python:3.8-slim-buster
|
||||||
|
|
||||||
|
WORKDIR /
|
||||||
|
COPY --from=locker /app/requirements.txt /
|
||||||
|
COPY --from=locker /app/requirements-dev.txt /
|
||||||
|
|
||||||
|
RUN apt-get update && \
|
||||||
|
apt-get install -y --no-install-recommends postgresql-client-11 build-essential && \
|
||||||
|
rm -rf /var/lib/apt/ && \
|
||||||
|
pip install -r /requirements.txt --no-cache-dir && \
|
||||||
|
apt-get remove --purge -y build-essential && \
|
||||||
|
apt-get autoremove --purge && \
|
||||||
|
adduser --system --no-create-home --uid 1000 --group --home /passbook passbook
|
||||||
|
|
||||||
|
COPY ./passbook/ /passbook
|
||||||
|
COPY ./manage.py /
|
||||||
|
COPY ./lifecycle/ /lifecycle
|
||||||
|
|
||||||
USER passbook
|
USER passbook
|
||||||
|
|
||||||
|
ENTRYPOINT [ "/lifecycle/bootstrap.sh" ]
|
||||||
|
20
Makefile
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
all: lint-fix lint coverage gen
|
||||||
|
|
||||||
|
coverage:
|
||||||
|
coverage run --concurrency=multiprocessing manage.py test passbook --failfast
|
||||||
|
coverage combine
|
||||||
|
coverage html
|
||||||
|
coverage report
|
||||||
|
|
||||||
|
lint-fix:
|
||||||
|
isort -rc .
|
||||||
|
black .
|
||||||
|
|
||||||
|
lint:
|
||||||
|
pyright
|
||||||
|
bandit -r .
|
||||||
|
pylint passbook
|
||||||
|
prospector
|
||||||
|
|
||||||
|
gen: coverage
|
||||||
|
./manage.py generate_swagger -o swagger.yaml -f yaml
|
47
Pipfile
@ -4,51 +4,60 @@ url = "https://pypi.org/simple"
|
|||||||
verify_ssl = true
|
verify_ssl = true
|
||||||
|
|
||||||
[packages]
|
[packages]
|
||||||
|
boto3 = "*"
|
||||||
celery = "*"
|
celery = "*"
|
||||||
cherrypy = "*"
|
|
||||||
defusedxml = "*"
|
defusedxml = "*"
|
||||||
django = "*"
|
django = "*"
|
||||||
kombu = "==4.5.0"
|
|
||||||
django-cors-middleware = "*"
|
django-cors-middleware = "*"
|
||||||
django-filters = "*"
|
django-dbbackup = "*"
|
||||||
django-ipware = "*"
|
django-filter = "*"
|
||||||
|
django-guardian = "*"
|
||||||
django-model-utils = "*"
|
django-model-utils = "*"
|
||||||
django-oauth-toolkit = "*"
|
|
||||||
django-oidc-provider = "*"
|
|
||||||
django-otp = "*"
|
django-otp = "*"
|
||||||
|
django-prometheus = "*"
|
||||||
django-recaptcha = "*"
|
django-recaptcha = "*"
|
||||||
django-redis = "*"
|
django-redis = "*"
|
||||||
django-rest-framework = "*"
|
django-rest-framework = "*"
|
||||||
|
django-storages = "*"
|
||||||
|
djangorestframework-guardian = "*"
|
||||||
drf-yasg = "*"
|
drf-yasg = "*"
|
||||||
|
facebook-sdk = "*"
|
||||||
ldap3 = "*"
|
ldap3 = "*"
|
||||||
lxml = "*"
|
lxml = "*"
|
||||||
markdown = "*"
|
|
||||||
oauthlib = "*"
|
|
||||||
packaging = "*"
|
packaging = "*"
|
||||||
psycopg2-binary = "*"
|
psycopg2-binary = "*"
|
||||||
pycryptodome = "*"
|
pycryptodome = "*"
|
||||||
|
pyjwkest = "*"
|
||||||
|
uvicorn = "*"
|
||||||
|
gunicorn = "*"
|
||||||
pyyaml = "*"
|
pyyaml = "*"
|
||||||
qrcode = "*"
|
qrcode = "*"
|
||||||
requests-oauthlib = "*"
|
requests-oauthlib = "*"
|
||||||
sentry-sdk = "*"
|
sentry-sdk = "*"
|
||||||
service_identity = "*"
|
service_identity = "*"
|
||||||
signxml = "*"
|
signxml = "*"
|
||||||
urllib3 = {extras = ["secure"],version = "*"}
|
|
||||||
structlog = "*"
|
structlog = "*"
|
||||||
|
swagger-spec-validator = "*"
|
||||||
|
urllib3 = {extras = ["secure"],version = "*"}
|
||||||
|
dacite = "*"
|
||||||
|
channels = "*"
|
||||||
|
channels-redis = "*"
|
||||||
|
kubernetes = "*"
|
||||||
|
|
||||||
[requires]
|
[requires]
|
||||||
python_version = "3.7"
|
python_version = "3.8"
|
||||||
|
|
||||||
[dev-packages]
|
[dev-packages]
|
||||||
astroid = "==2.2.5"
|
|
||||||
coverage = "*"
|
|
||||||
isort = "*"
|
|
||||||
pylint = "==2.3.1"
|
|
||||||
pylint-django = "==2.0.10"
|
|
||||||
prospector = "==1.1.7"
|
|
||||||
django-debug-toolbar = "*"
|
|
||||||
bumpversion = "*"
|
|
||||||
unittest-xml-reporting = "*"
|
|
||||||
autopep8 = "*"
|
autopep8 = "*"
|
||||||
bandit = "*"
|
bandit = "*"
|
||||||
|
black = "==19.10b0"
|
||||||
|
bumpversion = "*"
|
||||||
colorama = "*"
|
colorama = "*"
|
||||||
|
coverage = "*"
|
||||||
|
django-debug-toolbar = "*"
|
||||||
|
docker = "*"
|
||||||
|
pylint = "*"
|
||||||
|
pylint-django = "*"
|
||||||
|
selenium = "*"
|
||||||
|
unittest-xml-reporting = "*"
|
||||||
|
prospector = "*"
|
||||||
|
1683
Pipfile.lock
generated
66
README.md
@ -1,11 +1,67 @@
|
|||||||
# passbook
|
<img src="passbook/static/static/passbook/logo.svg" height="50" alt="passbook logo"><img src="passbook/static/static/passbook/brand_inverted.svg" height="50" alt="passbook">
|
||||||
|
|
||||||
## Quick instance
|
[](https://dev.azure.com/beryjuorg/passbook/_build?definitionId=1)
|
||||||
|

|
||||||
|
[](https://codecov.io/gh/BeryJu/passbook)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
## What is passbook?
|
||||||
|
|
||||||
|
passbook is an open-source Identity Provider focused on flexibility and versatility. You can use passbook in an existing environment to add support for new protocols. passbook is also a great solution for implementing signup/recovery/etc in your application, so you don't have to deal with it.
|
||||||
|
|
||||||
|
## Installation
|
||||||
|
|
||||||
|
For small/test setups it is recommended to use docker-compose.
|
||||||
|
|
||||||
```
|
```
|
||||||
export PASSBOOK_DOMAIN=domain.tld
|
wget https://raw.githubusercontent.com/BeryJu/passbook/master/docker-compose.yml
|
||||||
|
# Optionally enable Error-reporting
|
||||||
|
# export PASSBOOK_ERROR_REPORTING=true
|
||||||
|
# Optionally deploy a different version
|
||||||
|
# export PASSBOOK_TAG=0.10.0-rc6
|
||||||
|
# If this is a productive installation, set a different PostgreSQL Password
|
||||||
|
# export PG_PASS=$(pwgen 40 1)
|
||||||
docker-compose pull
|
docker-compose pull
|
||||||
docker-compose up -d
|
docker-compose up -d
|
||||||
docker-compose exec server ./manage.py migrate
|
docker-compose run --rm server migrate
|
||||||
docker-compose exec server ./manage.py createsuperuser
|
|
||||||
```
|
```
|
||||||
|
|
||||||
|
For bigger setups, there is a Helm Chart in the `helm/` directory. This is documented [here](https://passbook.beryju.org//installation/kubernetes/)
|
||||||
|
|
||||||
|
## Screenshots
|
||||||
|
|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
## Development
|
||||||
|
|
||||||
|
To develop on passbook, you need a system with Python 3.7+ (3.8 is recommended). passbook uses [pipenv](https://pipenv.pypa.io/en/latest/) for managing dependencies.
|
||||||
|
|
||||||
|
To get started, run
|
||||||
|
|
||||||
|
```
|
||||||
|
python3 -m pip install pipenv
|
||||||
|
git clone https://github.com/BeryJu/passbook.git
|
||||||
|
cd passbook
|
||||||
|
pipenv shell
|
||||||
|
pipenv sync -d
|
||||||
|
```
|
||||||
|
|
||||||
|
Since passbook uses PostgreSQL-specific fields, you also need a local PostgreSQL instance to develop. passbook also uses redis for caching and message queueing.
|
||||||
|
For these databases you can use [Postgres.app](https://postgresapp.com/) and [Redis.app](https://jpadilla.github.io/redisapp/) on macOS or use it the docker-compose file in `scripts/docker-compose.yml`.
|
||||||
|
|
||||||
|
To tell passbook about these databases, create a file in the project root called `local.env.yml` with the following contents:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
debug: true
|
||||||
|
postgresql:
|
||||||
|
user: postgres
|
||||||
|
|
||||||
|
log_level: debug
|
||||||
|
```
|
||||||
|
|
||||||
|
## Security
|
||||||
|
|
||||||
|
See [SECURITY.md](SECURITY.md)
|
||||||
|
13
SECURITY.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
## Supported Versions
|
||||||
|
|
||||||
|
As passbook is currently in a pre-stable, only the latest "stable" version is supported. After passbook 1.0, this will change.
|
||||||
|
|
||||||
|
| Version | Supported |
|
||||||
|
| -------- | ------------------ |
|
||||||
|
| 0.8.15 | :white_check_mark: |
|
||||||
|
|
||||||
|
## Reporting a Vulnerability
|
||||||
|
|
||||||
|
To report a vulnerability, send an email to [security@beryju.org](mailto:security@beryju.org)
|
303
azure-pipelines.yml
Normal file
@ -0,0 +1,303 @@
|
|||||||
|
trigger:
|
||||||
|
- master
|
||||||
|
|
||||||
|
resources:
|
||||||
|
- repo: self
|
||||||
|
|
||||||
|
variables:
|
||||||
|
POSTGRES_DB: passbook
|
||||||
|
POSTGRES_USER: passbook
|
||||||
|
POSTGRES_PASSWORD: "EK-5jnKfjrGRm<77"
|
||||||
|
|
||||||
|
stages:
|
||||||
|
- stage: Lint
|
||||||
|
jobs:
|
||||||
|
- job: pylint
|
||||||
|
pool:
|
||||||
|
vmImage: 'ubuntu-latest'
|
||||||
|
steps:
|
||||||
|
- task: UsePythonVersion@0
|
||||||
|
inputs:
|
||||||
|
versionSpec: '3.8'
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: |
|
||||||
|
sudo pip install -U wheel pipenv
|
||||||
|
pipenv install --dev
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: pipenv run pylint passbook
|
||||||
|
- job: black
|
||||||
|
pool:
|
||||||
|
vmImage: 'ubuntu-latest'
|
||||||
|
steps:
|
||||||
|
- task: UsePythonVersion@0
|
||||||
|
inputs:
|
||||||
|
versionSpec: '3.8'
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: |
|
||||||
|
sudo pip install -U wheel pipenv
|
||||||
|
pipenv install --dev
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: pipenv run black --check passbook
|
||||||
|
- job: prospector
|
||||||
|
pool:
|
||||||
|
vmImage: 'ubuntu-latest'
|
||||||
|
steps:
|
||||||
|
- task: UsePythonVersion@0
|
||||||
|
inputs:
|
||||||
|
versionSpec: '3.8'
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: |
|
||||||
|
sudo pip install -U wheel pipenv
|
||||||
|
pipenv install --dev
|
||||||
|
pipenv install --dev prospector --skip-lock
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: pipenv run prospector passbook
|
||||||
|
- job: bandit
|
||||||
|
pool:
|
||||||
|
vmImage: 'ubuntu-latest'
|
||||||
|
steps:
|
||||||
|
- task: UsePythonVersion@0
|
||||||
|
inputs:
|
||||||
|
versionSpec: '3.8'
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: |
|
||||||
|
sudo pip install -U wheel pipenv
|
||||||
|
pipenv install --dev
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: pipenv run bandit -r passbook
|
||||||
|
- job: pyright
|
||||||
|
pool:
|
||||||
|
vmImage: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- task: UseNode@1
|
||||||
|
inputs:
|
||||||
|
version: '12.x'
|
||||||
|
- task: UsePythonVersion@0
|
||||||
|
inputs:
|
||||||
|
versionSpec: '3.8'
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: npm install -g pyright
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: |
|
||||||
|
sudo pip install -U wheel pipenv
|
||||||
|
pipenv install --dev
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: pipenv run pyright
|
||||||
|
- stage: Test
|
||||||
|
jobs:
|
||||||
|
- job: migrations
|
||||||
|
pool:
|
||||||
|
vmImage: 'ubuntu-latest'
|
||||||
|
steps:
|
||||||
|
- task: UsePythonVersion@0
|
||||||
|
inputs:
|
||||||
|
versionSpec: '3.8'
|
||||||
|
- task: DockerCompose@0
|
||||||
|
displayName: Run services
|
||||||
|
inputs:
|
||||||
|
dockerComposeFile: 'scripts/ci.docker-compose.yml'
|
||||||
|
action: 'Run services'
|
||||||
|
buildImages: false
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: |
|
||||||
|
sudo pip install -U wheel pipenv
|
||||||
|
pipenv install --dev
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: pipenv run ./manage.py migrate
|
||||||
|
- job: coverage_unittest
|
||||||
|
pool:
|
||||||
|
vmImage: 'ubuntu-latest'
|
||||||
|
steps:
|
||||||
|
- task: UsePythonVersion@0
|
||||||
|
inputs:
|
||||||
|
versionSpec: '3.8'
|
||||||
|
- task: DockerCompose@0
|
||||||
|
displayName: Run services
|
||||||
|
inputs:
|
||||||
|
dockerComposeFile: 'scripts/ci.docker-compose.yml'
|
||||||
|
action: 'Run services'
|
||||||
|
buildImages: false
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: |
|
||||||
|
sudo pip install -U wheel pipenv
|
||||||
|
pipenv install --dev
|
||||||
|
- task: CmdLine@2
|
||||||
|
displayName: Run full test suite
|
||||||
|
inputs:
|
||||||
|
script: |
|
||||||
|
pipenv run coverage run ./manage.py test passbook
|
||||||
|
mkdir output-unittest
|
||||||
|
mv unittest.xml output-unittest/unittest.xml
|
||||||
|
mv .coverage output-unittest/coverage
|
||||||
|
- task: PublishPipelineArtifact@1
|
||||||
|
inputs:
|
||||||
|
targetPath: 'output-unittest/'
|
||||||
|
artifact: 'coverage-unittest'
|
||||||
|
publishLocation: 'pipeline'
|
||||||
|
- job: coverage_e2e
|
||||||
|
pool:
|
||||||
|
vmImage: 'ubuntu-latest'
|
||||||
|
steps:
|
||||||
|
- task: UsePythonVersion@0
|
||||||
|
inputs:
|
||||||
|
versionSpec: '3.8'
|
||||||
|
- task: DockerCompose@0
|
||||||
|
displayName: Run services
|
||||||
|
inputs:
|
||||||
|
dockerComposeFile: 'scripts/ci.docker-compose.yml'
|
||||||
|
action: 'Run services'
|
||||||
|
buildImages: false
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: |
|
||||||
|
sudo pip install -U wheel pipenv
|
||||||
|
pipenv install --dev
|
||||||
|
- task: DockerCompose@0
|
||||||
|
displayName: Run ChromeDriver
|
||||||
|
inputs:
|
||||||
|
dockerComposeFile: 'e2e/ci.docker-compose.yml'
|
||||||
|
action: 'Run a specific service'
|
||||||
|
serviceName: 'chrome'
|
||||||
|
- task: CmdLine@2
|
||||||
|
displayName: Build static files for e2e
|
||||||
|
inputs:
|
||||||
|
script: |
|
||||||
|
cd passbook/static/static
|
||||||
|
yarn
|
||||||
|
- task: CmdLine@2
|
||||||
|
displayName: Run full test suite
|
||||||
|
inputs:
|
||||||
|
script: pipenv run coverage run ./manage.py test e2e
|
||||||
|
- task: CmdLine@2
|
||||||
|
displayName: Prepare unittests and coverage for upload
|
||||||
|
inputs:
|
||||||
|
script: |
|
||||||
|
mkdir output-e2e
|
||||||
|
mv unittest.xml output-e2e/unittest.xml
|
||||||
|
mv .coverage output-e2e/coverage
|
||||||
|
- task: PublishPipelineArtifact@1
|
||||||
|
condition: failed()
|
||||||
|
displayName: Upload screenshots if selenium tests fail
|
||||||
|
inputs:
|
||||||
|
targetPath: 'selenium_screenshots/'
|
||||||
|
artifact: 'selenium screenshots'
|
||||||
|
publishLocation: 'pipeline'
|
||||||
|
- task: PublishPipelineArtifact@1
|
||||||
|
inputs:
|
||||||
|
targetPath: 'output-e2e/'
|
||||||
|
artifact: 'coverage-e2e'
|
||||||
|
publishLocation: 'pipeline'
|
||||||
|
- stage: test_combine
|
||||||
|
jobs:
|
||||||
|
- job: test_coverage_combine
|
||||||
|
pool:
|
||||||
|
vmImage: 'ubuntu-latest'
|
||||||
|
steps:
|
||||||
|
- task: DownloadPipelineArtifact@2
|
||||||
|
inputs:
|
||||||
|
buildType: 'current'
|
||||||
|
artifactName: 'coverage-e2e'
|
||||||
|
path: "coverage-e2e/"
|
||||||
|
- task: DownloadPipelineArtifact@2
|
||||||
|
inputs:
|
||||||
|
buildType: 'current'
|
||||||
|
artifactName: 'coverage-unittest'
|
||||||
|
path: "coverage-unittest/"
|
||||||
|
- task: UsePythonVersion@0
|
||||||
|
inputs:
|
||||||
|
versionSpec: '3.8'
|
||||||
|
- task: CmdLine@2
|
||||||
|
inputs:
|
||||||
|
script: |
|
||||||
|
sudo pip install -U wheel pipenv
|
||||||
|
pipenv install --dev
|
||||||
|
find .
|
||||||
|
pipenv run coverage combine coverage-e2e/coverage coverage-unittest/coverage
|
||||||
|
pipenv run coverage xml
|
||||||
|
pipenv run coverage html
|
||||||
|
find .
|
||||||
|
- task: PublishCodeCoverageResults@1
|
||||||
|
inputs:
|
||||||
|
codeCoverageTool: 'Cobertura'
|
||||||
|
summaryFileLocation: 'coverage.xml'
|
||||||
|
pathToSources: '$(System.DefaultWorkingDirectory)'
|
||||||
|
- task: PublishTestResults@2
|
||||||
|
condition: succeededOrFailed()
|
||||||
|
inputs:
|
||||||
|
testResultsFormat: 'JUnit'
|
||||||
|
testResultsFiles: |
|
||||||
|
coverage-e2e/unittest.xml
|
||||||
|
coverage-unittest/unittest.xml
|
||||||
|
mergeTestResults: true
|
||||||
|
- task: CmdLine@2
|
||||||
|
env:
|
||||||
|
CODECOV_TOKEN: $(CODECOV_TOKEN)
|
||||||
|
inputs:
|
||||||
|
script: bash <(curl -s https://codecov.io/bash)
|
||||||
|
- stage: Build
|
||||||
|
jobs:
|
||||||
|
- job: build_server
|
||||||
|
pool:
|
||||||
|
vmImage: 'ubuntu-latest'
|
||||||
|
steps:
|
||||||
|
- task: Docker@2
|
||||||
|
inputs:
|
||||||
|
containerRegistry: 'dockerhub'
|
||||||
|
repository: 'beryju/passbook'
|
||||||
|
command: 'buildAndPush'
|
||||||
|
Dockerfile: 'Dockerfile'
|
||||||
|
tags: 'gh-$(Build.SourceBranchName)'
|
||||||
|
- job: build_static
|
||||||
|
pool:
|
||||||
|
vmImage: 'ubuntu-latest'
|
||||||
|
steps:
|
||||||
|
- task: DockerCompose@0
|
||||||
|
displayName: Run services
|
||||||
|
inputs:
|
||||||
|
dockerComposeFile: 'scripts/ci.docker-compose.yml'
|
||||||
|
action: 'Run services'
|
||||||
|
buildImages: false
|
||||||
|
- task: Docker@2
|
||||||
|
inputs:
|
||||||
|
containerRegistry: 'dockerhub'
|
||||||
|
repository: 'beryju/passbook-static'
|
||||||
|
command: 'build'
|
||||||
|
Dockerfile: 'static.Dockerfile'
|
||||||
|
tags: 'gh-$(Build.SourceBranchName)'
|
||||||
|
arguments: "--network=beryjupassbook_default"
|
||||||
|
- task: Docker@2
|
||||||
|
inputs:
|
||||||
|
containerRegistry: 'dockerhub'
|
||||||
|
repository: 'beryju/passbook-static'
|
||||||
|
command: 'push'
|
||||||
|
tags: 'gh-$(Build.SourceBranchName)'
|
||||||
|
- stage: Deploy
|
||||||
|
jobs:
|
||||||
|
- job: deploy_dev
|
||||||
|
pool:
|
||||||
|
vmImage: 'ubuntu-latest'
|
||||||
|
steps:
|
||||||
|
- task: HelmDeploy@0
|
||||||
|
inputs:
|
||||||
|
connectionType: 'Kubernetes Service Connection'
|
||||||
|
kubernetesServiceConnection: 'k8s-beryjuorg-prd'
|
||||||
|
namespace: 'passbook-dev'
|
||||||
|
command: 'upgrade'
|
||||||
|
chartType: 'FilePath'
|
||||||
|
chartPath: 'helm/'
|
||||||
|
releaseName: 'passbook-dev'
|
||||||
|
recreate: true
|
@ -1,18 +0,0 @@
|
|||||||
FROM python:3.7-slim-stretch
|
|
||||||
|
|
||||||
COPY ./Pipfile /app/
|
|
||||||
COPY ./Pipfile.lock /app/
|
|
||||||
|
|
||||||
WORKDIR /app/
|
|
||||||
|
|
||||||
RUN apt-get update && \
|
|
||||||
apt-get install -y --no-install-recommends build-essential && \
|
|
||||||
pip install pipenv uwsgi --no-cache-dir && \
|
|
||||||
apt-get remove -y --purge build-essential && \
|
|
||||||
apt-get autoremove -y --purge && \
|
|
||||||
rm -rf /var/lib/apt/lists/*
|
|
||||||
|
|
||||||
RUN pipenv lock -r > requirements.txt && \
|
|
||||||
pipenv --rm && \
|
|
||||||
pip install -r requirements.txt --no-cache-dir && \
|
|
||||||
adduser --system --no-create-home --uid 1000 --group --home /app passbook
|
|
@ -1,5 +0,0 @@
|
|||||||
FROM docker.beryju.org/passbook/base:latest
|
|
||||||
|
|
||||||
RUN pipenv lock --dev -r > requirements-dev.txt && \
|
|
||||||
pipenv --rm && \
|
|
||||||
pip install -r /app/requirements-dev.txt --no-cache-dir
|
|
@ -21,17 +21,14 @@ services:
|
|||||||
labels:
|
labels:
|
||||||
- traefik.enable=false
|
- traefik.enable=false
|
||||||
server:
|
server:
|
||||||
build:
|
image: beryju/passbook:${PASSBOOK_TAG:-0.10.0-rc6}
|
||||||
context: .
|
command: server
|
||||||
image: docker.beryju.org/passbook/server:${SERVER_TAG:-latest}
|
|
||||||
command:
|
|
||||||
- uwsgi
|
|
||||||
- uwsgi.ini
|
|
||||||
environment:
|
environment:
|
||||||
- PASSBOOK_DOMAIN=${PASSBOOK_DOMAIN}
|
PASSBOOK_REDIS__HOST: redis
|
||||||
- PASSBOOK_REDIS__HOST=redis
|
PASSBOOK_ERROR_REPORTING: ${PASSBOOK_ERROR_REPORTING:-false}
|
||||||
- PASSBOOK_POSTGRESQL__HOST=postgresql
|
PASSBOOK_POSTGRESQL__HOST: postgresql
|
||||||
- PASSBOOK_POSTGRESQL__PASSWORD=${PG_PASS:-thisisnotagoodpassword}
|
PASSBOOK_POSTGRESQL__PASSWORD: ${PG_PASS:-thisisnotagoodpassword}
|
||||||
|
PASSBOOK_LOG_LEVEL: debug
|
||||||
ports:
|
ports:
|
||||||
- 8000
|
- 8000
|
||||||
networks:
|
networks:
|
||||||
@ -41,43 +38,35 @@ services:
|
|||||||
- traefik.docker.network=internal
|
- traefik.docker.network=internal
|
||||||
- traefik.frontend.rule=PathPrefix:/
|
- traefik.frontend.rule=PathPrefix:/
|
||||||
worker:
|
worker:
|
||||||
image: docker.beryju.org/passbook/server:${SERVER_TAG:-latest}
|
image: beryju/passbook:${PASSBOOK_TAG:-0.10.0-rc6}
|
||||||
command:
|
command: worker
|
||||||
- celery
|
|
||||||
- worker
|
|
||||||
- --autoscale=10,3
|
|
||||||
- -E
|
|
||||||
- -B
|
|
||||||
- -A=passbook.root.celery
|
|
||||||
networks:
|
networks:
|
||||||
- internal
|
- internal
|
||||||
labels:
|
labels:
|
||||||
- traefik.enable=false
|
- traefik.enable=false
|
||||||
environment:
|
environment:
|
||||||
- PASSBOOK_DOMAIN=${PASSBOOK_DOMAIN}
|
PASSBOOK_REDIS__HOST: redis
|
||||||
- PASSBOOK_REDIS__HOST=redis
|
PASSBOOK_ERROR_REPORTING: ${PASSBOOK_ERROR_REPORTING:-false}
|
||||||
- PASSBOOK_POSTGRESQL__HOST=postgresql
|
PASSBOOK_POSTGRESQL__HOST: postgresql
|
||||||
- PASSBOOK_POSTGRESQL__PASSWORD=${PG_PASS:-thisisnotagoodpassword}
|
PASSBOOK_POSTGRESQL__PASSWORD: ${PG_PASS:-thisisnotagoodpassword}
|
||||||
|
PASSBOOK_LOG_LEVEL: debug
|
||||||
static:
|
static:
|
||||||
build:
|
image: beryju/passbook-static:${PASSBOOK_TAG:-0.10.0-rc6}
|
||||||
context: .
|
|
||||||
dockerfile: static.Dockerfile
|
|
||||||
image: docker.beryju.org/passbook/static:latest
|
|
||||||
networks:
|
networks:
|
||||||
- internal
|
- internal
|
||||||
labels:
|
labels:
|
||||||
- traefik.frontend.rule=PathPrefix:/static, /robots.txt
|
- traefik.frontend.rule=PathPrefix:/static, /robots.txt, /favicon.ico
|
||||||
- traefik.port=80
|
- traefik.port=80
|
||||||
- traefik.docker.network=internal
|
- traefik.docker.network=internal
|
||||||
traefik:
|
traefik:
|
||||||
image: traefik:1.7
|
image: traefik:1.7
|
||||||
command: --api --docker
|
command: --api --docker --defaultentrypoints=https --entryPoints='Name:http Address::80 Redirect.EntryPoint:https' --entryPoints='Name:https Address::443 TLS'
|
||||||
volumes:
|
volumes:
|
||||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||||
ports:
|
ports:
|
||||||
- "0.0.0.0:80:80"
|
- "0.0.0.0:80:80"
|
||||||
- "0.0.0.0:443:443"
|
- "0.0.0.0:443:443"
|
||||||
- "0.0.0.0:8080:8080"
|
- "127.0.0.1:8080:8080"
|
||||||
networks:
|
networks:
|
||||||
- internal
|
- internal
|
||||||
|
|
||||||
|
9
docker.env.yml
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
debug: true
|
||||||
|
postgresql:
|
||||||
|
user: postgres
|
||||||
|
host: postgresql
|
||||||
|
|
||||||
|
redis:
|
||||||
|
host: redis
|
||||||
|
|
||||||
|
log_level: debug
|
@ -1,66 +0,0 @@
|
|||||||
user nginx;
|
|
||||||
worker_processes 1;
|
|
||||||
|
|
||||||
error_log stderr warn;
|
|
||||||
pid /var/run/nginx.pid;
|
|
||||||
|
|
||||||
events {
|
|
||||||
worker_connections 1024;
|
|
||||||
}
|
|
||||||
|
|
||||||
http {
|
|
||||||
include /etc/nginx/mime.types;
|
|
||||||
default_type application/octet-stream;
|
|
||||||
|
|
||||||
log_format json_combined escape=json
|
|
||||||
'{'
|
|
||||||
'"time_local":"$time_local",'
|
|
||||||
'"remote_addr":"$remote_addr",'
|
|
||||||
'"remote_user":"$remote_user",'
|
|
||||||
'"request":"$request",'
|
|
||||||
'"status": "$status",'
|
|
||||||
'"body_bytes_sent":"$body_bytes_sent",'
|
|
||||||
'"request_time":"$request_time",'
|
|
||||||
'"http_referrer":"$http_referer",'
|
|
||||||
'"http_user_agent":"$http_user_agent"'
|
|
||||||
'}';
|
|
||||||
|
|
||||||
access_log /dev/stdout json_combined;
|
|
||||||
|
|
||||||
sendfile on;
|
|
||||||
tcp_nopush on;
|
|
||||||
|
|
||||||
keepalive_timeout 65;
|
|
||||||
|
|
||||||
server {
|
|
||||||
|
|
||||||
server_name _;
|
|
||||||
|
|
||||||
gzip on;
|
|
||||||
gzip_types application/javascript image/* text/css;
|
|
||||||
gunzip on;
|
|
||||||
add_header X-passbook-Version 0.6.4-beta;
|
|
||||||
add_header Vary X-passbook-Version;
|
|
||||||
root /data/;
|
|
||||||
|
|
||||||
location /_/healthz {
|
|
||||||
return 204;
|
|
||||||
}
|
|
||||||
location ~* \.(jpg|jpeg|png|gif|ico)$ {
|
|
||||||
expires 30d;
|
|
||||||
}
|
|
||||||
location ~* \.(css|js)$ {
|
|
||||||
expires 7d;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
server {
|
|
||||||
|
|
||||||
listen 8080;
|
|
||||||
|
|
||||||
location = /stub_status {
|
|
||||||
stub_status;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,10 +0,0 @@
|
|||||||
[uwsgi]
|
|
||||||
http = 0.0.0.0:8000
|
|
||||||
chdir = /app
|
|
||||||
wsgi-file = passbook/root/wsgi.py
|
|
||||||
processes = 2
|
|
||||||
master = true
|
|
||||||
threads = 2
|
|
||||||
enable-threads = true
|
|
||||||
uid = passbook
|
|
||||||
gid = passbook
|
|
66
docs/expressions/index.md
Normal file
@ -0,0 +1,66 @@
|
|||||||
|
# Expressions
|
||||||
|
|
||||||
|
Expressions allow you to write custom logic using Python code.
|
||||||
|
|
||||||
|
Expressions are used in different places throughout passbook, and can do different things.
|
||||||
|
|
||||||
|
!!! info
|
||||||
|
These functions/objects are available wherever expressions are used. For more specific information, see [Expression Policies](../policies/expression.md) and [Property Mappings](../property-mappings/expression.md)
|
||||||
|
|
||||||
|
## Global objects
|
||||||
|
|
||||||
|
- `pb_logger`: structlog BoundLogger. ([ref](https://www.structlog.org/en/stable/api.html#structlog.BoundLogger))
|
||||||
|
- `requests`: requests Session object. ([ref](https://requests.readthedocs.io/en/master/user/advanced/))
|
||||||
|
|
||||||
|
## Generally available functions
|
||||||
|
|
||||||
|
### `regex_match(value: Any, regex: str) -> bool`
|
||||||
|
|
||||||
|
Check if `value` matches Regular Expression `regex`.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
```python
|
||||||
|
return regex_match(request.user.username, '.*admin.*')
|
||||||
|
```
|
||||||
|
|
||||||
|
### `regex_replace(value: Any, regex: str, repl: str) -> str`
|
||||||
|
|
||||||
|
Replace anything matching `regex` within `value` with `repl` and return it.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
```python
|
||||||
|
user_email_local = regex_replace(request.user.email, '(.+)@.+', '')
|
||||||
|
```
|
||||||
|
|
||||||
|
### `pb_is_group_member(user: User, **group_filters) -> bool`
|
||||||
|
|
||||||
|
Check if `user` is member of a group matching `**group_filters`.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
```python
|
||||||
|
return pb_is_group_member(request.user, name="test_group")
|
||||||
|
```
|
||||||
|
|
||||||
|
### `pb_user_by(**filters) -> Optional[User]`
|
||||||
|
|
||||||
|
Fetch a user matching `**filters`. Returns "None" if no user was found.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
```python
|
||||||
|
other_user = pb_user_by(username="other_user")
|
||||||
|
```
|
||||||
|
|
||||||
|
## Comparing IP Addresses
|
||||||
|
|
||||||
|
To compare IP Addresses or check if an IP Address is within a given subnet, you can use the functions `ip_address('192.0.2.1')` and `ip_network('192.0.2.0/24')`. With these objects you can do [arithmetic operations](https://docs.python.org/3/library/ipaddress.html#operators).
|
||||||
|
|
||||||
|
You can also check if an IP Address is within a subnet by writing the following:
|
||||||
|
|
||||||
|
```python
|
||||||
|
ip_address('192.0.2.1') in ip_network('192.0.2.0/24')
|
||||||
|
# evaluates to True
|
||||||
|
```
|
21
docs/expressions/reference/user-object.md
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
# Passbook User Object
|
||||||
|
|
||||||
|
The User object has the following attributes:
|
||||||
|
|
||||||
|
- `username`: User's username.
|
||||||
|
- `email` User's email.
|
||||||
|
- `name` User's display mame.
|
||||||
|
- `is_staff` Boolean field if user is staff.
|
||||||
|
- `is_active` Boolean field if user is active.
|
||||||
|
- `date_joined` Date user joined/was created.
|
||||||
|
- `password_change_date` Date password was last changed.
|
||||||
|
- `attributes` Dynamic attributes.
|
||||||
|
|
||||||
|
## Examples
|
||||||
|
|
||||||
|
List all the User's group names:
|
||||||
|
|
||||||
|
```python
|
||||||
|
for group in user.groups.all():
|
||||||
|
yield group.name
|
||||||
|
```
|
180
docs/flow/examples/enrollment-2-stage.json
Normal file
@ -0,0 +1,180 @@
|
|||||||
|
{
|
||||||
|
"version": 1,
|
||||||
|
"entries": [
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "773c6673-e4a2-423f-8d32-95b7b4a41cf3",
|
||||||
|
"slug": "default-enrollment-flow"
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flow",
|
||||||
|
"attrs": {
|
||||||
|
"name": "Default enrollment Flow",
|
||||||
|
"title": "Welcome to passbook!",
|
||||||
|
"designation": "enrollment"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "cb954fd4-65a5-4ad9-b1ee-180ee9559cf4"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.prompt",
|
||||||
|
"attrs": {
|
||||||
|
"field_key": "username",
|
||||||
|
"label": "Username",
|
||||||
|
"type": "text",
|
||||||
|
"required": true,
|
||||||
|
"placeholder": "Username",
|
||||||
|
"order": 0
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "7db91ee8-4290-4e08-8d39-63f132402515"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.prompt",
|
||||||
|
"attrs": {
|
||||||
|
"field_key": "password",
|
||||||
|
"label": "Password",
|
||||||
|
"type": "password",
|
||||||
|
"required": true,
|
||||||
|
"placeholder": "Password",
|
||||||
|
"order": 0
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "d30b5eb4-7787-4072-b1ba-65b46e928920"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.prompt",
|
||||||
|
"attrs": {
|
||||||
|
"field_key": "password_repeat",
|
||||||
|
"label": "Password (repeat)",
|
||||||
|
"type": "password",
|
||||||
|
"required": true,
|
||||||
|
"placeholder": "Password (repeat)",
|
||||||
|
"order": 1
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "f78d977a-efa6-4cc2-9a0f-2621a9fd94d2"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.prompt",
|
||||||
|
"attrs": {
|
||||||
|
"field_key": "name",
|
||||||
|
"label": "Name",
|
||||||
|
"type": "text",
|
||||||
|
"required": true,
|
||||||
|
"placeholder": "Name",
|
||||||
|
"order": 0
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "1ff91927-e33d-4615-95b0-c258e5f0df62"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.prompt",
|
||||||
|
"attrs": {
|
||||||
|
"field_key": "email",
|
||||||
|
"label": "Email",
|
||||||
|
"type": "email",
|
||||||
|
"required": true,
|
||||||
|
"placeholder": "Email",
|
||||||
|
"order": 1
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "6c342b94-790d-425a-ae31-6196b6570722",
|
||||||
|
"name": "default-enrollment-prompt-second"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.promptstage",
|
||||||
|
"attrs": {
|
||||||
|
"fields": [
|
||||||
|
"f78d977a-efa6-4cc2-9a0f-2621a9fd94d2",
|
||||||
|
"1ff91927-e33d-4615-95b0-c258e5f0df62"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "20375f30-7fa7-4562-8f6e-0f61889f2963",
|
||||||
|
"name": "default-enrollment-prompt-first"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.promptstage",
|
||||||
|
"attrs": {
|
||||||
|
"fields": [
|
||||||
|
"cb954fd4-65a5-4ad9-b1ee-180ee9559cf4",
|
||||||
|
"7db91ee8-4290-4e08-8d39-63f132402515",
|
||||||
|
"d30b5eb4-7787-4072-b1ba-65b46e928920"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "77090897-eb3f-40db-81e6-b4074b1998c4",
|
||||||
|
"name": "default-enrollment-user-login"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_user_login.userloginstage",
|
||||||
|
"attrs": {
|
||||||
|
"session_duration": 0
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "a4090add-f483-4ac6-8917-10b493ef843e",
|
||||||
|
"name": "default-enrollment-user-write"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_user_write.userwritestage",
|
||||||
|
"attrs": {}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "34e1e7d5-8eed-4549-bc7a-305069ff7df0",
|
||||||
|
"target": "773c6673-e4a2-423f-8d32-95b7b4a41cf3",
|
||||||
|
"stage": "20375f30-7fa7-4562-8f6e-0f61889f2963",
|
||||||
|
"order": 0
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "e40467a6-3052-488c-a1b5-1ad7a80fe7b3",
|
||||||
|
"target": "773c6673-e4a2-423f-8d32-95b7b4a41cf3",
|
||||||
|
"stage": "6c342b94-790d-425a-ae31-6196b6570722",
|
||||||
|
"order": 1
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "76bc594e-2715-49ab-bd40-994abd9a7b70",
|
||||||
|
"target": "773c6673-e4a2-423f-8d32-95b7b4a41cf3",
|
||||||
|
"stage": "a4090add-f483-4ac6-8917-10b493ef843e",
|
||||||
|
"order": 2
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "2f324f6d-7646-4108-a6e2-e7f90985477f",
|
||||||
|
"target": "773c6673-e4a2-423f-8d32-95b7b4a41cf3",
|
||||||
|
"stage": "77090897-eb3f-40db-81e6-b4074b1998c4",
|
||||||
|
"order": 3
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
223
docs/flow/examples/enrollment-email-verification.json
Normal file
@ -0,0 +1,223 @@
|
|||||||
|
{
|
||||||
|
"version": 1,
|
||||||
|
"entries": [
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "773c6673-e4a2-423f-8d32-95b7b4a41cf3",
|
||||||
|
"slug": "default-enrollment-flow"
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flow",
|
||||||
|
"attrs": {
|
||||||
|
"name": "Default enrollment Flow",
|
||||||
|
"title": "Welcome to passbook!",
|
||||||
|
"designation": "enrollment"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "cb954fd4-65a5-4ad9-b1ee-180ee9559cf4"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.prompt",
|
||||||
|
"attrs": {
|
||||||
|
"field_key": "username",
|
||||||
|
"label": "Username",
|
||||||
|
"type": "text",
|
||||||
|
"required": true,
|
||||||
|
"placeholder": "Username",
|
||||||
|
"order": 0
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "7db91ee8-4290-4e08-8d39-63f132402515"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.prompt",
|
||||||
|
"attrs": {
|
||||||
|
"field_key": "password",
|
||||||
|
"label": "Password",
|
||||||
|
"type": "password",
|
||||||
|
"required": true,
|
||||||
|
"placeholder": "Password",
|
||||||
|
"order": 0
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "d30b5eb4-7787-4072-b1ba-65b46e928920"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.prompt",
|
||||||
|
"attrs": {
|
||||||
|
"field_key": "password_repeat",
|
||||||
|
"label": "Password (repeat)",
|
||||||
|
"type": "password",
|
||||||
|
"required": true,
|
||||||
|
"placeholder": "Password (repeat)",
|
||||||
|
"order": 1
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "f78d977a-efa6-4cc2-9a0f-2621a9fd94d2"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.prompt",
|
||||||
|
"attrs": {
|
||||||
|
"field_key": "name",
|
||||||
|
"label": "Name",
|
||||||
|
"type": "text",
|
||||||
|
"required": true,
|
||||||
|
"placeholder": "Name",
|
||||||
|
"order": 0
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "1ff91927-e33d-4615-95b0-c258e5f0df62"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.prompt",
|
||||||
|
"attrs": {
|
||||||
|
"field_key": "email",
|
||||||
|
"label": "Email",
|
||||||
|
"type": "email",
|
||||||
|
"required": true,
|
||||||
|
"placeholder": "Email",
|
||||||
|
"order": 1
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "9922212c-47a2-475a-9905-abeb5e621652"
|
||||||
|
},
|
||||||
|
"model": "passbook_policies_expression.expressionpolicy",
|
||||||
|
"attrs": {
|
||||||
|
"name": "policy-enrollment-password-equals",
|
||||||
|
"expression": "# Verifies that the passwords are equal\r\nreturn request.context['password'] == request.context['password_repeat']"
|
||||||
|
}
|
||||||
|
},{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "096e6282-6b30-4695-bd03-3b143eab5580",
|
||||||
|
"name": "default-enrollment-email-verficiation"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_email.emailstage",
|
||||||
|
"attrs": {
|
||||||
|
"host": "localhost",
|
||||||
|
"port": 25,
|
||||||
|
"username": "",
|
||||||
|
"use_tls": false,
|
||||||
|
"use_ssl": false,
|
||||||
|
"timeout": 10,
|
||||||
|
"from_address": "system@passbook.local",
|
||||||
|
"token_expiry": 30,
|
||||||
|
"subject": "passbook",
|
||||||
|
"template": "stages/email/for_email/account_confirmation.html"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "6c342b94-790d-425a-ae31-6196b6570722",
|
||||||
|
"name": "default-enrollment-prompt-second"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.promptstage",
|
||||||
|
"attrs": {
|
||||||
|
"fields": [
|
||||||
|
"f78d977a-efa6-4cc2-9a0f-2621a9fd94d2",
|
||||||
|
"1ff91927-e33d-4615-95b0-c258e5f0df62"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "20375f30-7fa7-4562-8f6e-0f61889f2963",
|
||||||
|
"name": "default-enrollment-prompt-first"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.promptstage",
|
||||||
|
"attrs": {
|
||||||
|
"fields": [
|
||||||
|
"cb954fd4-65a5-4ad9-b1ee-180ee9559cf4",
|
||||||
|
"7db91ee8-4290-4e08-8d39-63f132402515",
|
||||||
|
"d30b5eb4-7787-4072-b1ba-65b46e928920"
|
||||||
|
],
|
||||||
|
"validation_policies": [
|
||||||
|
"9922212c-47a2-475a-9905-abeb5e621652"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "77090897-eb3f-40db-81e6-b4074b1998c4",
|
||||||
|
"name": "default-enrollment-user-login"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_user_login.userloginstage",
|
||||||
|
"attrs": {
|
||||||
|
"session_duration": 0
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "a4090add-f483-4ac6-8917-10b493ef843e",
|
||||||
|
"name": "default-enrollment-user-write"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_user_write.userwritestage",
|
||||||
|
"attrs": {}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "34e1e7d5-8eed-4549-bc7a-305069ff7df0",
|
||||||
|
"target": "773c6673-e4a2-423f-8d32-95b7b4a41cf3",
|
||||||
|
"stage": "20375f30-7fa7-4562-8f6e-0f61889f2963",
|
||||||
|
"order": 0
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "e40467a6-3052-488c-a1b5-1ad7a80fe7b3",
|
||||||
|
"target": "773c6673-e4a2-423f-8d32-95b7b4a41cf3",
|
||||||
|
"stage": "6c342b94-790d-425a-ae31-6196b6570722",
|
||||||
|
"order": 1
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "76bc594e-2715-49ab-bd40-994abd9a7b70",
|
||||||
|
"target": "773c6673-e4a2-423f-8d32-95b7b4a41cf3",
|
||||||
|
"stage": "a4090add-f483-4ac6-8917-10b493ef843e",
|
||||||
|
"order": 2
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "1db34a14-8985-4184-b5c9-254cd585d94f",
|
||||||
|
"target": "773c6673-e4a2-423f-8d32-95b7b4a41cf3",
|
||||||
|
"stage": "096e6282-6b30-4695-bd03-3b143eab5580",
|
||||||
|
"order": 3
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "2f324f6d-7646-4108-a6e2-e7f90985477f",
|
||||||
|
"target": "773c6673-e4a2-423f-8d32-95b7b4a41cf3",
|
||||||
|
"stage": "77090897-eb3f-40db-81e6-b4074b1998c4",
|
||||||
|
"order": 4
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
49
docs/flow/examples/examples.md
Normal file
@ -0,0 +1,49 @@
|
|||||||
|
# Example Flows
|
||||||
|
|
||||||
|
!!! info
|
||||||
|
You can apply theses flows multiple times to stay updated, however this will discard all changes you've made.
|
||||||
|
|
||||||
|
|
||||||
|
## Enrollment (2 Stage)
|
||||||
|
|
||||||
|
Flow: right-click [here](enrollment-2-stage.json) and save the file.
|
||||||
|
|
||||||
|
Sign-up flow for new users, which prompts them for their username, email, password and name. No verification is done. Users are also immediately logged on after this flow.
|
||||||
|
|
||||||
|
## Enrollment with email verification
|
||||||
|
|
||||||
|
Flow: right-click [here](enrollment-email-verification.json) and save the file.
|
||||||
|
|
||||||
|
Same flow as above, with an extra email verification stage.
|
||||||
|
|
||||||
|
You'll probably have to adjust the Email stage and set your connection details.
|
||||||
|
|
||||||
|
## Two-factor Login
|
||||||
|
|
||||||
|
Flow: right-click [here](login-2fa.json) and save the file.
|
||||||
|
|
||||||
|
Login flow which follows the default pattern (username/email, then password), but also checks for the user's OTP token, if they have one configured
|
||||||
|
|
||||||
|
## Login with conditional Captcha
|
||||||
|
|
||||||
|
Flow: right-click [here](login-conditional-captcha.json) and save the file.
|
||||||
|
|
||||||
|
Login flow which conditionally shows the users a captcha, based on the reputation of their IP and Username.
|
||||||
|
|
||||||
|
By default, the captcha test keys are used. You can get a proper key [here](https://www.google.com/recaptcha/intro/v3.html)
|
||||||
|
|
||||||
|
## Recovery with email verification
|
||||||
|
|
||||||
|
Flow: right-click [here](recovery-email-verification.json) and save the file.
|
||||||
|
|
||||||
|
Recovery flow, the user is sent an email after they've identified themselves. After they click on the link in the email, they are prompted for a new password and immediately logged on.
|
||||||
|
|
||||||
|
## User deletion
|
||||||
|
|
||||||
|
Flow: right-click [here](unenrollment.json) and save the file.
|
||||||
|
|
||||||
|
Flow for users to delete their account,
|
||||||
|
|
||||||
|
!!! warning
|
||||||
|
This is done without any warning.
|
||||||
|
|
111
docs/flow/examples/login-2fa.json
Normal file
@ -0,0 +1,111 @@
|
|||||||
|
{
|
||||||
|
"version": 1,
|
||||||
|
"entries": [
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"slug": "default-authentication-flow",
|
||||||
|
"pk": "563ece21-e9a4-47e5-a264-23ffd923e393"
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flow",
|
||||||
|
"attrs": {
|
||||||
|
"name": "Default Authentication Flow",
|
||||||
|
"title": "Welcome to passbook!",
|
||||||
|
"designation": "authentication"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "69d41125-3987-499b-8d74-ef27b54b88c8",
|
||||||
|
"name": "default-authentication-login"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_user_login.userloginstage",
|
||||||
|
"attrs": {
|
||||||
|
"session_duration": 0
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "5f594f27-0def-488d-9855-fe604eb13de5",
|
||||||
|
"name": "default-authentication-identification"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_identification.identificationstage",
|
||||||
|
"attrs": {
|
||||||
|
"user_fields": [
|
||||||
|
"email",
|
||||||
|
"username"
|
||||||
|
],
|
||||||
|
"template": "stages/identification/login.html",
|
||||||
|
"enrollment_flow": null,
|
||||||
|
"recovery_flow": null
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "37f709c3-8817-45e8-9a93-80a925d293c2",
|
||||||
|
"name": "default-authentication-flow-totp"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_otp_validate.otpvalidatestage",
|
||||||
|
"attrs": {}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "d8affa62-500c-4c5c-a01f-5835e1ffdf40",
|
||||||
|
"name": "default-authentication-password"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_password.passwordstage",
|
||||||
|
"attrs": {
|
||||||
|
"backends": [
|
||||||
|
"django.contrib.auth.backends.ModelBackend"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "a3056482-b692-4e3a-93f1-7351c6a351c7",
|
||||||
|
"target": "563ece21-e9a4-47e5-a264-23ffd923e393",
|
||||||
|
"stage": "5f594f27-0def-488d-9855-fe604eb13de5",
|
||||||
|
"order": 0
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "4e8538cf-3e18-4a68-82ae-6df6725fa2e6",
|
||||||
|
"target": "563ece21-e9a4-47e5-a264-23ffd923e393",
|
||||||
|
"stage": "d8affa62-500c-4c5c-a01f-5835e1ffdf40",
|
||||||
|
"order": 1
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "688aec6f-5622-42c6-83a5-d22072d7e798",
|
||||||
|
"target": "563ece21-e9a4-47e5-a264-23ffd923e393",
|
||||||
|
"stage": "37f709c3-8817-45e8-9a93-80a925d293c2",
|
||||||
|
"order": 2
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "f3fede3a-a9b5-4232-9ec7-be7ff4194b27",
|
||||||
|
"target": "563ece21-e9a4-47e5-a264-23ffd923e393",
|
||||||
|
"stage": "69d41125-3987-499b-8d74-ef27b54b88c8",
|
||||||
|
"order": 3
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
139
docs/flow/examples/login-conditional-captcha.json
Normal file
@ -0,0 +1,139 @@
|
|||||||
|
{
|
||||||
|
"version": 1,
|
||||||
|
"entries": [
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"slug": "default-authentication-flow",
|
||||||
|
"pk": "563ece21-e9a4-47e5-a264-23ffd923e393"
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flow",
|
||||||
|
"attrs": {
|
||||||
|
"name": "Default Authentication Flow",
|
||||||
|
"title": "Welcome to passbook!",
|
||||||
|
"designation": "authentication"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"name": "default-authentication-login",
|
||||||
|
"pk": "69d41125-3987-499b-8d74-ef27b54b88c8"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_user_login.userloginstage",
|
||||||
|
"attrs": {
|
||||||
|
"session_duration": 0
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"name": "default-authentication-flow-captcha",
|
||||||
|
"pk": "a368cafc-1494-45e9-b75b-b5e7ac2bd3e4"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_captcha.captchastage",
|
||||||
|
"attrs": {
|
||||||
|
"public_key": "6LeIxAcTAAAAAJcZVRqyHh71UMIEGNQ_MXjiZKhI",
|
||||||
|
"private_key": "6LeIxAcTAAAAAGG-vFI1TnRWxMZNFuojJ4WifJWe"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"name": "default-authentication-identification",
|
||||||
|
"pk": "5f594f27-0def-488d-9855-fe604eb13de5"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_identification.identificationstage",
|
||||||
|
"attrs": {
|
||||||
|
"user_fields": [
|
||||||
|
"email",
|
||||||
|
"username"
|
||||||
|
],
|
||||||
|
"template": "stages/identification/login.html",
|
||||||
|
"enrollment_flow": null,
|
||||||
|
"recovery_flow": null
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"name": "default-authentication-password",
|
||||||
|
"pk": "d8affa62-500c-4c5c-a01f-5835e1ffdf40"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_password.passwordstage",
|
||||||
|
"attrs": {
|
||||||
|
"backends": [
|
||||||
|
"django.contrib.auth.backends.ModelBackend"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "a3056482-b692-4e3a-93f1-7351c6a351c7",
|
||||||
|
"target": "563ece21-e9a4-47e5-a264-23ffd923e393",
|
||||||
|
"stage": "5f594f27-0def-488d-9855-fe604eb13de5",
|
||||||
|
"order": 0
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "4e8538cf-3e18-4a68-82ae-6df6725fa2e6",
|
||||||
|
"target": "563ece21-e9a4-47e5-a264-23ffd923e393",
|
||||||
|
"stage": "d8affa62-500c-4c5c-a01f-5835e1ffdf40",
|
||||||
|
"order": 1
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "3bcd6af0-48a6-4e18-87f3-d251a1a58226",
|
||||||
|
"target": "563ece21-e9a4-47e5-a264-23ffd923e393",
|
||||||
|
"stage": "a368cafc-1494-45e9-b75b-b5e7ac2bd3e4",
|
||||||
|
"order": 2
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "f3fede3a-a9b5-4232-9ec7-be7ff4194b27",
|
||||||
|
"target": "563ece21-e9a4-47e5-a264-23ffd923e393",
|
||||||
|
"stage": "69d41125-3987-499b-8d74-ef27b54b88c8",
|
||||||
|
"order": 3
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "688c9890-47ad-4327-a9e5-380e88d34be5"
|
||||||
|
},
|
||||||
|
"model": "passbook_policies_reputation.reputationpolicy",
|
||||||
|
"attrs": {
|
||||||
|
"name": "default-authentication-flow-conditional-captcha",
|
||||||
|
"check_ip": true,
|
||||||
|
"check_username": true,
|
||||||
|
"threshold": -5
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "02e4d220-3448-44db-822e-c5255cf7c250",
|
||||||
|
"policy": "688c9890-47ad-4327-a9e5-380e88d34be5",
|
||||||
|
"target": "3bcd6af0-48a6-4e18-87f3-d251a1a58226",
|
||||||
|
"order": 0
|
||||||
|
},
|
||||||
|
"model": "passbook_policies.policybinding",
|
||||||
|
"attrs": {
|
||||||
|
"enabled": true,
|
||||||
|
"timeout": 30
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
198
docs/flow/examples/recovery-email-verification.json
Normal file
@ -0,0 +1,198 @@
|
|||||||
|
{
|
||||||
|
"version": 1,
|
||||||
|
"entries": [
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "a5993183-89c0-43d2-a7f4-ddffb17baba7",
|
||||||
|
"slug": "default-recovery-flow"
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flow",
|
||||||
|
"attrs": {
|
||||||
|
"name": "Default recovery flow",
|
||||||
|
"title": "Reset your password",
|
||||||
|
"designation": "recovery"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "1ff91927-e33d-4615-95b0-c258e5f0df62"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.prompt",
|
||||||
|
"attrs": {
|
||||||
|
"field_key": "email",
|
||||||
|
"label": "Email",
|
||||||
|
"type": "email",
|
||||||
|
"required": true,
|
||||||
|
"placeholder": "Email",
|
||||||
|
"order": 1
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "7db91ee8-4290-4e08-8d39-63f132402515"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.prompt",
|
||||||
|
"attrs": {
|
||||||
|
"field_key": "password",
|
||||||
|
"label": "Password",
|
||||||
|
"type": "password",
|
||||||
|
"required": true,
|
||||||
|
"placeholder": "Password",
|
||||||
|
"order": 0
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "d30b5eb4-7787-4072-b1ba-65b46e928920"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.prompt",
|
||||||
|
"attrs": {
|
||||||
|
"field_key": "password_repeat",
|
||||||
|
"label": "Password (repeat)",
|
||||||
|
"type": "password",
|
||||||
|
"required": true,
|
||||||
|
"placeholder": "Password (repeat)",
|
||||||
|
"order": 1
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "cd042fc6-cc92-4b98-b7e6-f4729df798d8"
|
||||||
|
},
|
||||||
|
"model": "passbook_policies_expression.expressionpolicy",
|
||||||
|
"attrs": {
|
||||||
|
"name": "default-password-change-password-equal",
|
||||||
|
"expression": "# Check that both passwords are equal.\nreturn request.context['password'] == request.context['password_repeat']"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "e54045a7-6ecb-4ad9-ad37-28e72d8e565e",
|
||||||
|
"name": "default-recovery-identification"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_identification.identificationstage",
|
||||||
|
"attrs": {
|
||||||
|
"user_fields": [
|
||||||
|
"email",
|
||||||
|
"username"
|
||||||
|
],
|
||||||
|
"template": "stages/identification/recovery.html",
|
||||||
|
"enrollment_flow": null,
|
||||||
|
"recovery_flow": null
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "3909fd60-b013-4668-8806-12e9507dab97",
|
||||||
|
"name": "default-recovery-user-write"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_user_write.userwritestage",
|
||||||
|
"attrs": {}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "66f948dc-3f74-42b2-b26b-b8b9df109efb",
|
||||||
|
"name": "default-recovery-email"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_email.emailstage",
|
||||||
|
"attrs": {
|
||||||
|
"host": "localhost",
|
||||||
|
"port": 25,
|
||||||
|
"username": "",
|
||||||
|
"use_tls": false,
|
||||||
|
"use_ssl": false,
|
||||||
|
"timeout": 10,
|
||||||
|
"from_address": "system@passbook.local",
|
||||||
|
"token_expiry": 30,
|
||||||
|
"subject": "passbook",
|
||||||
|
"template": "stages/email/for_email/password_reset.html"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "975d5502-1e22-4d10-b560-fbc5bd70ff4d",
|
||||||
|
"name": "default-password-change-prompt"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_prompt.promptstage",
|
||||||
|
"attrs": {
|
||||||
|
"fields": [
|
||||||
|
"7db91ee8-4290-4e08-8d39-63f132402515",
|
||||||
|
"d30b5eb4-7787-4072-b1ba-65b46e928920"
|
||||||
|
],
|
||||||
|
"validation_policies": [
|
||||||
|
"cd042fc6-cc92-4b98-b7e6-f4729df798d8"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "fcdd4206-0d35-4ad2-a59f-5a72422936bb",
|
||||||
|
"name": "default-recovery-user-login"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_user_login.userloginstage",
|
||||||
|
"attrs": {
|
||||||
|
"session_duration": 0
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "7af7558e-2196-4b9f-a08e-d38420b7cfbb",
|
||||||
|
"target": "a5993183-89c0-43d2-a7f4-ddffb17baba7",
|
||||||
|
"stage": "e54045a7-6ecb-4ad9-ad37-28e72d8e565e",
|
||||||
|
"order": 0
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "29446fd6-dd93-4e92-9830-2d81debad5ae",
|
||||||
|
"target": "a5993183-89c0-43d2-a7f4-ddffb17baba7",
|
||||||
|
"stage": "66f948dc-3f74-42b2-b26b-b8b9df109efb",
|
||||||
|
"order": 1
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "1219d06e-2c06-4c5b-a162-78e3959c6cf0",
|
||||||
|
"target": "a5993183-89c0-43d2-a7f4-ddffb17baba7",
|
||||||
|
"stage": "975d5502-1e22-4d10-b560-fbc5bd70ff4d",
|
||||||
|
"order": 2
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "66de86ba-0707-46a0-8475-ff2e260d6935",
|
||||||
|
"target": "a5993183-89c0-43d2-a7f4-ddffb17baba7",
|
||||||
|
"stage": "3909fd60-b013-4668-8806-12e9507dab97",
|
||||||
|
"order": 3
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "9cec2334-d4a2-4895-a2b2-bc5ae4e9639a",
|
||||||
|
"target": "a5993183-89c0-43d2-a7f4-ddffb17baba7",
|
||||||
|
"stage": "fcdd4206-0d35-4ad2-a59f-5a72422936bb",
|
||||||
|
"order": 4
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
37
docs/flow/examples/unenrollment.json
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
{
|
||||||
|
"version": 1,
|
||||||
|
"entries": [
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "59a576ce-2f23-4a63-b63a-d18dc7e550f5",
|
||||||
|
"slug": "default-unenrollment-flow"
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flow",
|
||||||
|
"attrs": {
|
||||||
|
"name": "Default unenrollment flow",
|
||||||
|
"title": "Delete your account",
|
||||||
|
"designation": "unenrollment"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "c62ac2a4-2735-4a0f-abd0-8523d68c1209",
|
||||||
|
"name": "default-unenrollment-user-delete"
|
||||||
|
},
|
||||||
|
"model": "passbook_stages_user_delete.userdeletestage",
|
||||||
|
"attrs": {}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"identifiers": {
|
||||||
|
"pk": "eb9aff2b-b95d-40b3-ad08-233aa77bbcf3",
|
||||||
|
"target": "59a576ce-2f23-4a63-b63a-d18dc7e550f5",
|
||||||
|
"stage": "c62ac2a4-2735-4a0f-abd0-8523d68c1209",
|
||||||
|
"order": 0
|
||||||
|
},
|
||||||
|
"model": "passbook_flows.flowstagebinding",
|
||||||
|
"attrs": {
|
||||||
|
"re_evaluate_policies": false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
45
docs/flow/flows.md
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
# Flows
|
||||||
|
|
||||||
|
Flows are a method of describing a sequence of stages. A stage represents a single verification or logic step. They are used to authenticate users, enroll them, and more.
|
||||||
|
|
||||||
|
Upon flow execution, a plan containing all stages is generated. This means that all attached policies are evaluated upon execution. This behaviour can be altered by enabling the **Re-evaluate Policies** option on the binding.
|
||||||
|
|
||||||
|
To determine which flow is linked, passbook searches all flows with the required designation and chooses the first instance the current user has access to.
|
||||||
|
|
||||||
|
## Permissions
|
||||||
|
|
||||||
|
Flows can have policies assigned to them. These policies determine if the current user is allowed to see and use this flow.
|
||||||
|
|
||||||
|
## Designation
|
||||||
|
|
||||||
|
Flows are designated for a single purpose. This designation changes when a flow is used. The following designations are available:
|
||||||
|
|
||||||
|
### Authentication
|
||||||
|
|
||||||
|
This is designates a flow to be used for authentication.
|
||||||
|
|
||||||
|
The authentication flow should always contain a [**User Login**](stages/user_login.md) stage, which attaches the staged user to the current session.
|
||||||
|
|
||||||
|
### Invalidation
|
||||||
|
|
||||||
|
This designates a flow to be used to invalidate a session.
|
||||||
|
|
||||||
|
This stage should always contain a [**User Logout**](stages/user_logout.md) stage, which resets the current session.
|
||||||
|
|
||||||
|
### Enrollment
|
||||||
|
|
||||||
|
This designates a flow for enrollment. This flow can contain any amount of verification stages, such as [**email**](stages/email/index.md) or [**captcha**](stages/captcha/index.md). At the end, to create the user, you can use the [**user_write**](stages/user_write.md) stage, which either updates the currently staged user, or if none exists, creates a new one.
|
||||||
|
|
||||||
|
### Unenrollment
|
||||||
|
|
||||||
|
This designates a flow for unenrollment. This flow can contain any amount of verification stages, such as [**email**](stages/email/index.md) or [**captcha**](stages/captcha/index.md). As a final stage, to delete the account, use the [**user_delete**](stages/user_delete.md) stage.
|
||||||
|
|
||||||
|
### Recovery
|
||||||
|
|
||||||
|
This designates a flow for recovery. This flow normally contains an [**identification**](stages/identification/index.md) stage to find the user. It can also contain any amount of verification stages, such as [**email**](stages/email/index.md) or [**captcha**](stages/captcha/index.md).
|
||||||
|
Afterwards, use the [**prompt**](stages/prompt/index.md) stage to ask the user for a new password and the [**user_write**](stages/user_write.md) stage to update the password.
|
||||||
|
|
||||||
|
### Change Password
|
||||||
|
|
||||||
|
This designates a flow for password changes. This flow can contain any amount of verification stages, such as [**email**](stages/email/index.md) or [**captcha**](stages/captcha/index.md).
|
||||||
|
Afterwards, use the [**prompt**](stages/prompt/index.md) stage to ask the user for a new password and the [**user_write**](stages/user_write.md) stage to update the password.
|
BIN
docs/flow/stages/captcha/captcha-admin.png
Normal file
After Width: | Height: | Size: 140 KiB |
7
docs/flow/stages/captcha/index.md
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
# Captcha stage
|
||||||
|
|
||||||
|
This stage adds a form of verification using [Google's ReCaptcha](https://www.google.com/recaptcha/intro/v3.html).
|
||||||
|
|
||||||
|
This stage has two required fields: Public key and private key. These can both be acquired at https://www.google.com/recaptcha/admin.
|
||||||
|
|
||||||
|

|
BIN
docs/flow/stages/dummy/dummy.png
Normal file
After Width: | Height: | Size: 1.3 MiB |
5
docs/flow/stages/dummy/index.md
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# Dummy stage
|
||||||
|
|
||||||
|
This stage is used for development and has no function. It presents the user with a form which requires a single confirmation.
|
||||||
|
|
||||||
|

|
BIN
docs/flow/stages/email/email-recovery.png
Normal file
After Width: | Height: | Size: 51 KiB |
5
docs/flow/stages/email/index.md
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# Email
|
||||||
|
|
||||||
|
This stage can be used for email verification. passbook's background worker will send an email using the specified connection details. When an email can't be delivered, delivery is automatically retried periodically.
|
||||||
|
|
||||||
|

|
25
docs/flow/stages/identification/index.md
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
# Identification
|
||||||
|
|
||||||
|
This stage provides a ready-to-go form for users to identify themselves.
|
||||||
|
|
||||||
|
## Options
|
||||||
|
|
||||||
|
### User Fields
|
||||||
|
|
||||||
|
Select which fields the user can use to identify themselves. Multiple fields can be specified and separated with a comma.
|
||||||
|
Valid choices:
|
||||||
|
|
||||||
|
- email
|
||||||
|
- username
|
||||||
|
|
||||||
|
### Template
|
||||||
|
|
||||||
|
This specifies which template is rendered. Currently there are two templates:
|
||||||
|
|
||||||
|
The `Login` template shows configured Sources below the login form, as well as linking to the defined Enrollment and Recovery flows.
|
||||||
|
|
||||||
|
The `Recovery` template shows only the form.
|
||||||
|
|
||||||
|
### Enrollment/Recovery Flow
|
||||||
|
|
||||||
|
These fields specify if and which flows are linked on the form. The enrollment flow is linked as `Need an account? Sign up.`, and the recovery flow is linked as `Forgot username or password?`.
|
7
docs/flow/stages/invitation/index.md
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
# Invitation Stage
|
||||||
|
|
||||||
|
This stage can be used to invite users. You can use this to enroll users with preset values.
|
||||||
|
|
||||||
|
If the option `Continue Flow without Invitation` is enabled, this stage will continue even when no invitation token is present.
|
||||||
|
|
||||||
|
To check if a user has used an invitation within a policy, you can check `request.context.invitation_in_effect`.
|
7
docs/flow/stages/otp/index.md
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
# OTP Stage
|
||||||
|
|
||||||
|
This stage offers a generic Time-based One-time Password authentication step.
|
||||||
|
|
||||||
|
You can optionally enforce this step, which will force every user without OTP setup to configure it.
|
||||||
|
|
||||||
|
This stage uses a 6-digit Code with a 30 second time-drift. This is currently not changeable.
|
3
docs/flow/stages/password/index.md
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# Password Stage
|
||||||
|
|
||||||
|
This is a generic password prompt which authenticates the current `pending_user`. This stage allows the selection of the source the user is authenticated against.
|
42
docs/flow/stages/prompt/index.md
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
# Prompt Stage
|
||||||
|
|
||||||
|
This stage is used to show the user arbitrary prompts.
|
||||||
|
|
||||||
|
## Prompt
|
||||||
|
|
||||||
|
The prompt can be any of the following types:
|
||||||
|
|
||||||
|
| Type | Description |
|
||||||
|
|----------|------------------------------------------------------------------|
|
||||||
|
| text | Arbitrary text. No client-side validation is done. |
|
||||||
|
| email | Email input. Requires a valid email adress. |
|
||||||
|
| password | Password input. |
|
||||||
|
| number | Number input. Any number is allowed. |
|
||||||
|
| checkbox | Simple checkbox. |
|
||||||
|
| hidden | Hidden input field. Allows for the pre-setting of default values.|
|
||||||
|
|
||||||
|
A prompt has the following attributes:
|
||||||
|
|
||||||
|
### `field_key`
|
||||||
|
|
||||||
|
The HTML name used for the prompt. This key is also used to later retrieve the data in expression policies:
|
||||||
|
|
||||||
|
```python
|
||||||
|
request.context.get('prompt_data').get('<field_key>')
|
||||||
|
```
|
||||||
|
|
||||||
|
### `label`
|
||||||
|
|
||||||
|
The label used to describe the field. Depending on the selected template, this may not be shown.
|
||||||
|
|
||||||
|
### `required`
|
||||||
|
|
||||||
|
A flag which decides whether or not this field is required.
|
||||||
|
|
||||||
|
### `placeholder`
|
||||||
|
|
||||||
|
A field placeholder, shown within the input field. This field is also used by the `hidden` type as the actual value.
|
||||||
|
|
||||||
|
### `order`
|
||||||
|
|
||||||
|
The numerical index of the prompt. This applies to all stages which this prompt is a part of.
|
16
docs/flow/stages/prompt/validation.md
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
# Prompt Validation
|
||||||
|
|
||||||
|
Further validation of prompts can be done using policies.
|
||||||
|
|
||||||
|
To validate that two password fields are identical, create the following expression policy:
|
||||||
|
|
||||||
|
```python
|
||||||
|
if request.context.get('prompt_data').get('password') == request.context.get('prompt_data').get('password_repeat'):
|
||||||
|
return True
|
||||||
|
|
||||||
|
pb_message("Passwords don't match.")
|
||||||
|
return False
|
||||||
|
```
|
||||||
|
This policy expects you to have two password fields with `field_key` set to `password` and `password_repeat`.
|
||||||
|
|
||||||
|
Afterwards, bind this policy to the prompt stage you want to validate.
|
8
docs/flow/stages/user_delete.md
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
# User Delete Stage
|
||||||
|
|
||||||
|
!!! danger
|
||||||
|
This stage deletes the `pending_user` without any confirmation. You have to make sure the user is aware of this.
|
||||||
|
|
||||||
|
This stage is intended for an unenrollment flow. It deletes the currently pending user.
|
||||||
|
|
||||||
|
The pending user is also removed from the current session.
|
5
docs/flow/stages/user_login.md
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# User Login Stage
|
||||||
|
|
||||||
|
This stage attaches a currently pending user to the current session.
|
||||||
|
|
||||||
|
It can be used after `user_write` during an enrollment flow, or after a `password` stage during an authentication flow.
|
3
docs/flow/stages/user_logout.md
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# User Logout Stage
|
||||||
|
|
||||||
|
Opposite stage of [User Login Stages](user_login.md). It removes the user from the current session.
|
3
docs/flow/stages/user_write.md
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# User Write Stage
|
||||||
|
|
||||||
|
This stages writes data from the current context to the current pending user. If no user is pending, a new one is created.
|
@ -1,2 +1,2 @@
|
|||||||
<svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px"
|
<svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px"
|
||||||
width="270px" height="20px" viewBox="0 0 270 10" enable-background="new 0 0 270 10" xml:space="preserve"><defs><style>.cls-1{isolation:isolate;}.cls-2{fill:#fff;}</style></defs><g class="cls-1"><path class="cls-2" d="M1.65,11V2.45H2.87V3a2.81,2.81,0,0,1,.47-.45A1.13,1.13,0,0,1,4,2.38,1.11,1.11,0,0,1,5.1,3a1.55,1.55,0,0,1,.16.5,5.61,5.61,0,0,1,0,.81V6.58c0,.45,0,.77,0,1a1.17,1.17,0,0,1-.55.9,1.23,1.23,0,0,1-.7.16,1.35,1.35,0,0,1-.64-.16A1.53,1.53,0,0,1,2.89,8h0v3ZM4.08,4.43a1.21,1.21,0,0,0-.14-.6.51.51,0,0,0-.46-.22A.54.54,0,0,0,3,3.82a.8.8,0,0,0-.17.54V6.73A.68.68,0,0,0,3,7.2a.6.6,0,0,0,.44.18A.53.53,0,0,0,4,7.17a1,1,0,0,0,.12-.5Z"/><path class="cls-2" d="M8.63,8.54V7.91h0a2.24,2.24,0,0,1-.48.52,1.13,1.13,0,0,1-.69.18A1.39,1.39,0,0,1,7,8.54a1.09,1.09,0,0,1-.43-.24,1.32,1.32,0,0,1-.33-.49A2.33,2.33,0,0,1,6.11,7a4.89,4.89,0,0,1,.08-.91,1.51,1.51,0,0,1,.31-.65,1.44,1.44,0,0,1,.59-.38A3.19,3.19,0,0,1,8,4.93h.59V4.33a1,1,0,0,0-.13-.52A.52.52,0,0,0,8,3.61a.71.71,0,0,0-.44.15.78.78,0,0,0-.26.46H6.13A2,2,0,0,1,6.69,2.9a1.73,1.73,0,0,1,.57-.38A2,2,0,0,1,8,2.38a2.18,2.18,0,0,1,.72.12,1.71,1.71,0,0,1,.59.36,2,2,0,0,1,.38.6,2.18,2.18,0,0,1,.14.84V8.54Zm0-2.62-.34,0a1.2,1.2,0,0,0-.67.18.76.76,0,0,0-.29.68.89.89,0,0,0,.17.56A.55.55,0,0,0,8,7.53a.63.63,0,0,0,.49-.2.91.91,0,0,0,.17-.58Z"/><path class="cls-2" d="M13,4.16a.59.59,0,0,0-.2-.47.65.65,0,0,0-.42-.16.59.59,0,0,0-.45.19.66.66,0,0,0-.15.43.8.8,0,0,0,.08.33.85.85,0,0,0,.44.29l.71.29a1.73,1.73,0,0,1,.95.72,2,2,0,0,1,.26,1,1.85,1.85,0,0,1-.52,1.3,1.56,1.56,0,0,1-.58.39,1.88,1.88,0,0,1-2-.32,1.58,1.58,0,0,1-.4-.57,1.81,1.81,0,0,1-.17-.8h1.15a1.11,1.11,0,0,0,.17.47.56.56,0,0,0,.49.22.71.71,0,0,0,.47-.18A.59.59,0,0,0,13,6.8a.69.69,0,0,0-.13-.43,1.08,1.08,0,0,0-.48-.32l-.59-.21a2.08,2.08,0,0,1-.9-.64,1.66,1.66,0,0,1-.33-1,1.89,1.89,0,0,1,.14-.72,1.78,1.78,0,0,1,.4-.57,1.5,1.5,0,0,1,.56-.36,1.82,1.82,0,0,1,.7-.13,1.93,1.93,0,0,1,.69.13,1.6,1.6,0,0,1,.54.38,1.85,1.85,0,0,1,.36.57,1.82,1.82,0,0,1,.13.7Z"/><path class="cls-2" d="M17.2,4.16a.63.63,0,0,0-.2-.47.69.69,0,0,0-.43-.16.55.55,0,0,0-.44.19.62.62,0,0,0-.16.43.68.68,0,0,0,.09.33.81.81,0,0,0,.43.29l.72.29a1.7,1.7,0,0,1,.94.72,2,2,0,0,1,.26,1,1.85,1.85,0,0,1-.52,1.3,1.61,1.61,0,0,1-.57.39,1.81,1.81,0,0,1-.74.15,1.76,1.76,0,0,1-1.24-.47,1.61,1.61,0,0,1-.41-.57,2,2,0,0,1-.17-.8h1.15a1.12,1.12,0,0,0,.18.47.53.53,0,0,0,.48.22.72.72,0,0,0,.48-.18.59.59,0,0,0,.21-.48.69.69,0,0,0-.14-.43,1,1,0,0,0-.48-.32l-.58-.21a2.06,2.06,0,0,1-.91-.64,1.66,1.66,0,0,1-.33-1A1.89,1.89,0,0,1,15,3.44a1.78,1.78,0,0,1,.4-.57,1.58,1.58,0,0,1,.56-.36,1.82,1.82,0,0,1,.7-.13,1.93,1.93,0,0,1,.69.13,1.75,1.75,0,0,1,.55.38,1.85,1.85,0,0,1,.36.57,2,2,0,0,1,.13.7Z"/><path class="cls-2" d="M19.2,8.54V0h1.22V3h0a1.53,1.53,0,0,1,.48-.47,1.39,1.39,0,0,1,.65-.16,1.26,1.26,0,0,1,.69.16,1.35,1.35,0,0,1,.4.39,1.18,1.18,0,0,1,.15.51,7.72,7.72,0,0,1,0,1V6.73a5.56,5.56,0,0,1-.05.8,1.56,1.56,0,0,1-.15.5,1.12,1.12,0,0,1-1.07.58,1.15,1.15,0,0,1-.7-.18A3.79,3.79,0,0,1,20.42,8v.55Zm2.44-4.21a1,1,0,0,0-.13-.51A.5.5,0,0,0,21,3.61a.57.57,0,0,0-.44.18.66.66,0,0,0-.18.48V6.63a.83.83,0,0,0,.17.54.52.52,0,0,0,.45.21.49.49,0,0,0,.45-.22,1.11,1.11,0,0,0,.15-.6Z"/><path class="cls-2" d="M23.76,4.49a4.83,4.83,0,0,1,0-.68A1.55,1.55,0,0,1,24,3.26a1.59,1.59,0,0,1,.62-.64,1.84,1.84,0,0,1,1-.24,1.87,1.87,0,0,1,1,.24,1.59,1.59,0,0,1,.62.64,1.55,1.55,0,0,1,.18.55,4.83,4.83,0,0,1,.05.68v2a4.72,4.72,0,0,1-.05.68,1.55,1.55,0,0,1-.18.55,1.59,1.59,0,0,1-.62.64,1.87,1.87,0,0,1-1,.24,1.84,1.84,0,0,1-1-.24A1.59,1.59,0,0,1,24,7.73a1.55,1.55,0,0,1-.18-.55,4.72,4.72,0,0,1,0-.68ZM25,6.69a.72.72,0,0,0,.17.52.53.53,0,0,0,.43.17A.55.55,0,0,0,26,7.21a.72.72,0,0,0,.16-.52V4.3A.74.74,0,0,0,26,3.78a.55.55,0,0,0-.44-.17.53.53,0,0,0-.43.17A.74.74,0,0,0,25,4.3Z"/><path class="cls-2" d="M28.2,4.49a4.83,4.83,0,0,1,.05-.68,1.55,1.55,0,0,1,.18-.55,1.59,1.59,0,0,1,.62-.64,1.84,1.84,0,0,1,1-.24,1.87,1.87,0,0,1,1,.24,1.59,1.59,0,0,1,.62.64,1.55,1.55,0,0,1,.18.55,4.83,4.83,0,0,1,.05.68v2a4.72,4.72,0,0,1-.05.68,1.55,1.55,0,0,1-.18.55,1.59,1.59,0,0,1-.62.64,1.87,1.87,0,0,1-1,.24,1.84,1.84,0,0,1-1-.24,1.59,1.59,0,0,1-.62-.64,1.55,1.55,0,0,1-.18-.55,4.72,4.72,0,0,1-.05-.68Zm1.22,2.2a.72.72,0,0,0,.17.52.53.53,0,0,0,.43.17.55.55,0,0,0,.44-.17.72.72,0,0,0,.16-.52V4.3a.74.74,0,0,0-.16-.52A.55.55,0,0,0,30,3.61a.53.53,0,0,0-.43.17.74.74,0,0,0-.17.52Z"/><path class="cls-2" d="M32.75,8.54V0H34V5.11h0l1.47-2.66H36.7L35.24,4.93,37,8.54H35.66l-1.1-2.63L34,6.83V8.54Z"/></g></svg>
|
width="120px" height="20px" viewBox="15 0 10 10" enable-background="new 0 0 270 10" xml:space="preserve"><defs><style>.cls-1{isolation:isolate;}.cls-2{fill:#fff;}</style></defs><g class="cls-1"><path class="cls-2" d="M1.65,11V2.45H2.87V3a2.81,2.81,0,0,1,.47-.45A1.13,1.13,0,0,1,4,2.38,1.11,1.11,0,0,1,5.1,3a1.55,1.55,0,0,1,.16.5,5.61,5.61,0,0,1,0,.81V6.58c0,.45,0,.77,0,1a1.17,1.17,0,0,1-.55.9,1.23,1.23,0,0,1-.7.16,1.35,1.35,0,0,1-.64-.16A1.53,1.53,0,0,1,2.89,8h0v3ZM4.08,4.43a1.21,1.21,0,0,0-.14-.6.51.51,0,0,0-.46-.22A.54.54,0,0,0,3,3.82a.8.8,0,0,0-.17.54V6.73A.68.68,0,0,0,3,7.2a.6.6,0,0,0,.44.18A.53.53,0,0,0,4,7.17a1,1,0,0,0,.12-.5Z"/><path class="cls-2" d="M8.63,8.54V7.91h0a2.24,2.24,0,0,1-.48.52,1.13,1.13,0,0,1-.69.18A1.39,1.39,0,0,1,7,8.54a1.09,1.09,0,0,1-.43-.24,1.32,1.32,0,0,1-.33-.49A2.33,2.33,0,0,1,6.11,7a4.89,4.89,0,0,1,.08-.91,1.51,1.51,0,0,1,.31-.65,1.44,1.44,0,0,1,.59-.38A3.19,3.19,0,0,1,8,4.93h.59V4.33a1,1,0,0,0-.13-.52A.52.52,0,0,0,8,3.61a.71.71,0,0,0-.44.15.78.78,0,0,0-.26.46H6.13A2,2,0,0,1,6.69,2.9a1.73,1.73,0,0,1,.57-.38A2,2,0,0,1,8,2.38a2.18,2.18,0,0,1,.72.12,1.71,1.71,0,0,1,.59.36,2,2,0,0,1,.38.6,2.18,2.18,0,0,1,.14.84V8.54Zm0-2.62-.34,0a1.2,1.2,0,0,0-.67.18.76.76,0,0,0-.29.68.89.89,0,0,0,.17.56A.55.55,0,0,0,8,7.53a.63.63,0,0,0,.49-.2.91.91,0,0,0,.17-.58Z"/><path class="cls-2" d="M13,4.16a.59.59,0,0,0-.2-.47.65.65,0,0,0-.42-.16.59.59,0,0,0-.45.19.66.66,0,0,0-.15.43.8.8,0,0,0,.08.33.85.85,0,0,0,.44.29l.71.29a1.73,1.73,0,0,1,.95.72,2,2,0,0,1,.26,1,1.85,1.85,0,0,1-.52,1.3,1.56,1.56,0,0,1-.58.39,1.88,1.88,0,0,1-2-.32,1.58,1.58,0,0,1-.4-.57,1.81,1.81,0,0,1-.17-.8h1.15a1.11,1.11,0,0,0,.17.47.56.56,0,0,0,.49.22.71.71,0,0,0,.47-.18A.59.59,0,0,0,13,6.8a.69.69,0,0,0-.13-.43,1.08,1.08,0,0,0-.48-.32l-.59-.21a2.08,2.08,0,0,1-.9-.64,1.66,1.66,0,0,1-.33-1,1.89,1.89,0,0,1,.14-.72,1.78,1.78,0,0,1,.4-.57,1.5,1.5,0,0,1,.56-.36,1.82,1.82,0,0,1,.7-.13,1.93,1.93,0,0,1,.69.13,1.6,1.6,0,0,1,.54.38,1.85,1.85,0,0,1,.36.57,1.82,1.82,0,0,1,.13.7Z"/><path class="cls-2" d="M17.2,4.16a.63.63,0,0,0-.2-.47.69.69,0,0,0-.43-.16.55.55,0,0,0-.44.19.62.62,0,0,0-.16.43.68.68,0,0,0,.09.33.81.81,0,0,0,.43.29l.72.29a1.7,1.7,0,0,1,.94.72,2,2,0,0,1,.26,1,1.85,1.85,0,0,1-.52,1.3,1.61,1.61,0,0,1-.57.39,1.81,1.81,0,0,1-.74.15,1.76,1.76,0,0,1-1.24-.47,1.61,1.61,0,0,1-.41-.57,2,2,0,0,1-.17-.8h1.15a1.12,1.12,0,0,0,.18.47.53.53,0,0,0,.48.22.72.72,0,0,0,.48-.18.59.59,0,0,0,.21-.48.69.69,0,0,0-.14-.43,1,1,0,0,0-.48-.32l-.58-.21a2.06,2.06,0,0,1-.91-.64,1.66,1.66,0,0,1-.33-1A1.89,1.89,0,0,1,15,3.44a1.78,1.78,0,0,1,.4-.57,1.58,1.58,0,0,1,.56-.36,1.82,1.82,0,0,1,.7-.13,1.93,1.93,0,0,1,.69.13,1.75,1.75,0,0,1,.55.38,1.85,1.85,0,0,1,.36.57,2,2,0,0,1,.13.7Z"/><path class="cls-2" d="M19.2,8.54V0h1.22V3h0a1.53,1.53,0,0,1,.48-.47,1.39,1.39,0,0,1,.65-.16,1.26,1.26,0,0,1,.69.16,1.35,1.35,0,0,1,.4.39,1.18,1.18,0,0,1,.15.51,7.72,7.72,0,0,1,0,1V6.73a5.56,5.56,0,0,1-.05.8,1.56,1.56,0,0,1-.15.5,1.12,1.12,0,0,1-1.07.58,1.15,1.15,0,0,1-.7-.18A3.79,3.79,0,0,1,20.42,8v.55Zm2.44-4.21a1,1,0,0,0-.13-.51A.5.5,0,0,0,21,3.61a.57.57,0,0,0-.44.18.66.66,0,0,0-.18.48V6.63a.83.83,0,0,0,.17.54.52.52,0,0,0,.45.21.49.49,0,0,0,.45-.22,1.11,1.11,0,0,0,.15-.6Z"/><path class="cls-2" d="M23.76,4.49a4.83,4.83,0,0,1,0-.68A1.55,1.55,0,0,1,24,3.26a1.59,1.59,0,0,1,.62-.64,1.84,1.84,0,0,1,1-.24,1.87,1.87,0,0,1,1,.24,1.59,1.59,0,0,1,.62.64,1.55,1.55,0,0,1,.18.55,4.83,4.83,0,0,1,.05.68v2a4.72,4.72,0,0,1-.05.68,1.55,1.55,0,0,1-.18.55,1.59,1.59,0,0,1-.62.64,1.87,1.87,0,0,1-1,.24,1.84,1.84,0,0,1-1-.24A1.59,1.59,0,0,1,24,7.73a1.55,1.55,0,0,1-.18-.55,4.72,4.72,0,0,1,0-.68ZM25,6.69a.72.72,0,0,0,.17.52.53.53,0,0,0,.43.17A.55.55,0,0,0,26,7.21a.72.72,0,0,0,.16-.52V4.3A.74.74,0,0,0,26,3.78a.55.55,0,0,0-.44-.17.53.53,0,0,0-.43.17A.74.74,0,0,0,25,4.3Z"/><path class="cls-2" d="M28.2,4.49a4.83,4.83,0,0,1,.05-.68,1.55,1.55,0,0,1,.18-.55,1.59,1.59,0,0,1,.62-.64,1.84,1.84,0,0,1,1-.24,1.87,1.87,0,0,1,1,.24,1.59,1.59,0,0,1,.62.64,1.55,1.55,0,0,1,.18.55,4.83,4.83,0,0,1,.05.68v2a4.72,4.72,0,0,1-.05.68,1.55,1.55,0,0,1-.18.55,1.59,1.59,0,0,1-.62.64,1.87,1.87,0,0,1-1,.24,1.84,1.84,0,0,1-1-.24,1.59,1.59,0,0,1-.62-.64,1.55,1.55,0,0,1-.18-.55,4.72,4.72,0,0,1-.05-.68Zm1.22,2.2a.72.72,0,0,0,.17.52.53.53,0,0,0,.43.17.55.55,0,0,0,.44-.17.72.72,0,0,0,.16-.52V4.3a.74.74,0,0,0-.16-.52A.55.55,0,0,0,30,3.61a.53.53,0,0,0-.43.17.74.74,0,0,0-.17.52Z"/><path class="cls-2" d="M32.75,8.54V0H34V5.11h0l1.47-2.66H36.7L35.24,4.93,37,8.54H35.66l-1.1-2.63L34,6.83V8.54Z"/></g></svg>
|
Before Width: | Height: | Size: 4.5 KiB After Width: | Height: | Size: 4.5 KiB |
2
docs/images/brand_inverted.svg
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
<svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px"
|
||||||
|
width="120px" height="20px" viewBox="15 0 10 10" enable-background="new 0 0 270 10" xml:space="preserve"><defs><style>.cls-1{isolation:isolate;}.cls-2{fill:#000;}</style></defs><g class="cls-1"><path class="cls-2" d="M1.65,11V2.45H2.87V3a2.81,2.81,0,0,1,.47-.45A1.13,1.13,0,0,1,4,2.38,1.11,1.11,0,0,1,5.1,3a1.55,1.55,0,0,1,.16.5,5.61,5.61,0,0,1,0,.81V6.58c0,.45,0,.77,0,1a1.17,1.17,0,0,1-.55.9,1.23,1.23,0,0,1-.7.16,1.35,1.35,0,0,1-.64-.16A1.53,1.53,0,0,1,2.89,8h0v3ZM4.08,4.43a1.21,1.21,0,0,0-.14-.6.51.51,0,0,0-.46-.22A.54.54,0,0,0,3,3.82a.8.8,0,0,0-.17.54V6.73A.68.68,0,0,0,3,7.2a.6.6,0,0,0,.44.18A.53.53,0,0,0,4,7.17a1,1,0,0,0,.12-.5Z"/><path class="cls-2" d="M8.63,8.54V7.91h0a2.24,2.24,0,0,1-.48.52,1.13,1.13,0,0,1-.69.18A1.39,1.39,0,0,1,7,8.54a1.09,1.09,0,0,1-.43-.24,1.32,1.32,0,0,1-.33-.49A2.33,2.33,0,0,1,6.11,7a4.89,4.89,0,0,1,.08-.91,1.51,1.51,0,0,1,.31-.65,1.44,1.44,0,0,1,.59-.38A3.19,3.19,0,0,1,8,4.93h.59V4.33a1,1,0,0,0-.13-.52A.52.52,0,0,0,8,3.61a.71.71,0,0,0-.44.15.78.78,0,0,0-.26.46H6.13A2,2,0,0,1,6.69,2.9a1.73,1.73,0,0,1,.57-.38A2,2,0,0,1,8,2.38a2.18,2.18,0,0,1,.72.12,1.71,1.71,0,0,1,.59.36,2,2,0,0,1,.38.6,2.18,2.18,0,0,1,.14.84V8.54Zm0-2.62-.34,0a1.2,1.2,0,0,0-.67.18.76.76,0,0,0-.29.68.89.89,0,0,0,.17.56A.55.55,0,0,0,8,7.53a.63.63,0,0,0,.49-.2.91.91,0,0,0,.17-.58Z"/><path class="cls-2" d="M13,4.16a.59.59,0,0,0-.2-.47.65.65,0,0,0-.42-.16.59.59,0,0,0-.45.19.66.66,0,0,0-.15.43.8.8,0,0,0,.08.33.85.85,0,0,0,.44.29l.71.29a1.73,1.73,0,0,1,.95.72,2,2,0,0,1,.26,1,1.85,1.85,0,0,1-.52,1.3,1.56,1.56,0,0,1-.58.39,1.88,1.88,0,0,1-2-.32,1.58,1.58,0,0,1-.4-.57,1.81,1.81,0,0,1-.17-.8h1.15a1.11,1.11,0,0,0,.17.47.56.56,0,0,0,.49.22.71.71,0,0,0,.47-.18A.59.59,0,0,0,13,6.8a.69.69,0,0,0-.13-.43,1.08,1.08,0,0,0-.48-.32l-.59-.21a2.08,2.08,0,0,1-.9-.64,1.66,1.66,0,0,1-.33-1,1.89,1.89,0,0,1,.14-.72,1.78,1.78,0,0,1,.4-.57,1.5,1.5,0,0,1,.56-.36,1.82,1.82,0,0,1,.7-.13,1.93,1.93,0,0,1,.69.13,1.6,1.6,0,0,1,.54.38,1.85,1.85,0,0,1,.36.57,1.82,1.82,0,0,1,.13.7Z"/><path class="cls-2" d="M17.2,4.16a.63.63,0,0,0-.2-.47.69.69,0,0,0-.43-.16.55.55,0,0,0-.44.19.62.62,0,0,0-.16.43.68.68,0,0,0,.09.33.81.81,0,0,0,.43.29l.72.29a1.7,1.7,0,0,1,.94.72,2,2,0,0,1,.26,1,1.85,1.85,0,0,1-.52,1.3,1.61,1.61,0,0,1-.57.39,1.81,1.81,0,0,1-.74.15,1.76,1.76,0,0,1-1.24-.47,1.61,1.61,0,0,1-.41-.57,2,2,0,0,1-.17-.8h1.15a1.12,1.12,0,0,0,.18.47.53.53,0,0,0,.48.22.72.72,0,0,0,.48-.18.59.59,0,0,0,.21-.48.69.69,0,0,0-.14-.43,1,1,0,0,0-.48-.32l-.58-.21a2.06,2.06,0,0,1-.91-.64,1.66,1.66,0,0,1-.33-1A1.89,1.89,0,0,1,15,3.44a1.78,1.78,0,0,1,.4-.57,1.58,1.58,0,0,1,.56-.36,1.82,1.82,0,0,1,.7-.13,1.93,1.93,0,0,1,.69.13,1.75,1.75,0,0,1,.55.38,1.85,1.85,0,0,1,.36.57,2,2,0,0,1,.13.7Z"/><path class="cls-2" d="M19.2,8.54V0h1.22V3h0a1.53,1.53,0,0,1,.48-.47,1.39,1.39,0,0,1,.65-.16,1.26,1.26,0,0,1,.69.16,1.35,1.35,0,0,1,.4.39,1.18,1.18,0,0,1,.15.51,7.72,7.72,0,0,1,0,1V6.73a5.56,5.56,0,0,1-.05.8,1.56,1.56,0,0,1-.15.5,1.12,1.12,0,0,1-1.07.58,1.15,1.15,0,0,1-.7-.18A3.79,3.79,0,0,1,20.42,8v.55Zm2.44-4.21a1,1,0,0,0-.13-.51A.5.5,0,0,0,21,3.61a.57.57,0,0,0-.44.18.66.66,0,0,0-.18.48V6.63a.83.83,0,0,0,.17.54.52.52,0,0,0,.45.21.49.49,0,0,0,.45-.22,1.11,1.11,0,0,0,.15-.6Z"/><path class="cls-2" d="M23.76,4.49a4.83,4.83,0,0,1,0-.68A1.55,1.55,0,0,1,24,3.26a1.59,1.59,0,0,1,.62-.64,1.84,1.84,0,0,1,1-.24,1.87,1.87,0,0,1,1,.24,1.59,1.59,0,0,1,.62.64,1.55,1.55,0,0,1,.18.55,4.83,4.83,0,0,1,.05.68v2a4.72,4.72,0,0,1-.05.68,1.55,1.55,0,0,1-.18.55,1.59,1.59,0,0,1-.62.64,1.87,1.87,0,0,1-1,.24,1.84,1.84,0,0,1-1-.24A1.59,1.59,0,0,1,24,7.73a1.55,1.55,0,0,1-.18-.55,4.72,4.72,0,0,1,0-.68ZM25,6.69a.72.72,0,0,0,.17.52.53.53,0,0,0,.43.17A.55.55,0,0,0,26,7.21a.72.72,0,0,0,.16-.52V4.3A.74.74,0,0,0,26,3.78a.55.55,0,0,0-.44-.17.53.53,0,0,0-.43.17A.74.74,0,0,0,25,4.3Z"/><path class="cls-2" d="M28.2,4.49a4.83,4.83,0,0,1,.05-.68,1.55,1.55,0,0,1,.18-.55,1.59,1.59,0,0,1,.62-.64,1.84,1.84,0,0,1,1-.24,1.87,1.87,0,0,1,1,.24,1.59,1.59,0,0,1,.62.64,1.55,1.55,0,0,1,.18.55,4.83,4.83,0,0,1,.05.68v2a4.72,4.72,0,0,1-.05.68,1.55,1.55,0,0,1-.18.55,1.59,1.59,0,0,1-.62.64,1.87,1.87,0,0,1-1,.24,1.84,1.84,0,0,1-1-.24,1.59,1.59,0,0,1-.62-.64,1.55,1.55,0,0,1-.18-.55,4.72,4.72,0,0,1-.05-.68Zm1.22,2.2a.72.72,0,0,0,.17.52.53.53,0,0,0,.43.17.55.55,0,0,0,.44-.17.72.72,0,0,0,.16-.52V4.3a.74.74,0,0,0-.16-.52A.55.55,0,0,0,30,3.61a.53.53,0,0,0-.43.17.74.74,0,0,0-.17.52Z"/><path class="cls-2" d="M32.75,8.54V0H34V5.11h0l1.47-2.66H36.7L35.24,4.93,37,8.54H35.66l-1.1-2.63L34,6.83V8.54Z"/></g></svg>
|
After Width: | Height: | Size: 4.5 KiB |
Before Width: | Height: | Size: 2.2 KiB After Width: | Height: | Size: 2.2 KiB |
BIN
docs/images/screen_admin.png
Normal file
After Width: | Height: | Size: 253 KiB |
BIN
docs/images/screen_apps.png
Normal file
After Width: | Height: | Size: 338 KiB |
16
docs/index.md
Executable file
@ -0,0 +1,16 @@
|
|||||||
|
#
|
||||||
|
{: style="height:50px"}
|
||||||
|
{: style="height:50px"}
|
||||||
|
|
||||||
|
## What is passbook?
|
||||||
|
|
||||||
|
passbook is an open-source Identity Provider focused on flexibility and versatility. You can use passbook in an existing environment to add support for new protocols. passbook is also a great solution for implementing signup/recovery/etc in your application, so you don't have to deal with it.
|
||||||
|
|
||||||
|
## Installation
|
||||||
|
|
||||||
|
See [Docker-compose](installation/docker-compose.md) or [Kubernetes](installation/kubernetes.md)
|
||||||
|
|
||||||
|
## Screenshots
|
||||||
|
|
||||||
|

|
||||||
|

|
35
docs/installation/docker-compose.md
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
# docker-compose
|
||||||
|
|
||||||
|
This installation method is for test-setups and small-scale productive setups.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
|
- docker
|
||||||
|
- docker-compose
|
||||||
|
|
||||||
|
## Install
|
||||||
|
|
||||||
|
Download the latest `docker-compose.yml` from [here](https://raw.githubusercontent.com/BeryJu/passbook/master/docker-compose.yml). Place it in a directory of your choice.
|
||||||
|
|
||||||
|
```
|
||||||
|
wget https://raw.githubusercontent.com/BeryJu/passbook/master/docker-compose.yml
|
||||||
|
# Optionally enable Error-reporting
|
||||||
|
# export PASSBOOK_ERROR_REPORTING=true
|
||||||
|
# Optionally deploy a different version
|
||||||
|
# export PASSBOOK_TAG=0.10.0-rc6
|
||||||
|
# If this is a productive installation, set a different PostgreSQL Password
|
||||||
|
# export PG_PASS=$(pwgen 40 1)
|
||||||
|
docker-compose pull
|
||||||
|
docker-compose up -d
|
||||||
|
docker-compose run --rm server migrate
|
||||||
|
```
|
||||||
|
|
||||||
|
The compose file statically references the latest version available at the time of downloading, which can be overridden with the `SERVER_TAG` environment variable.
|
||||||
|
|
||||||
|
If you plan to use this setup for production, it is also advised to change the PostgreSQL password by setting `PG_PASS` to a password of your choice.
|
||||||
|
|
||||||
|
Now you can pull the Docker images needed by running `docker-compose pull`. After this has finished, run `docker-compose up -d` to start passbook.
|
||||||
|
|
||||||
|
passbook will then be reachable via HTTP on port 80, and HTTPS on port 443. You can optionally configure the packaged traefik to use Let's Encrypt certificates for TLS Encryption.
|
||||||
|
|
||||||
|
The initial setup process also creates a default admin user, the username and password for which is `pbadmin`. It is highly recommended to change this password as soon as you log in.
|
72
docs/installation/kubernetes.md
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
# Kubernetes
|
||||||
|
|
||||||
|
For a mid to high-load installation, Kubernetes is recommended. passbook is installed using a helm-chart.
|
||||||
|
|
||||||
|
This installation automatically applies database migrations on startup. After the installation is done, you can use `pbadmin` as username and password.
|
||||||
|
|
||||||
|
```
|
||||||
|
###################################
|
||||||
|
# Values directly affecting passbook
|
||||||
|
###################################
|
||||||
|
image:
|
||||||
|
name: beryju/passbook
|
||||||
|
name_static: beryju/passbook-static
|
||||||
|
tag: 0.9.0-stable
|
||||||
|
|
||||||
|
nameOverride: ""
|
||||||
|
|
||||||
|
serverReplicas: 1
|
||||||
|
workerReplicas: 1
|
||||||
|
|
||||||
|
config:
|
||||||
|
# Optionally specify fixed secret_key, otherwise generated automatically
|
||||||
|
# secret_key: _k*@6h2u2@q-dku57hhgzb7tnx*ba9wodcb^s9g0j59@=y(@_o
|
||||||
|
# Enable error reporting
|
||||||
|
error_reporting:
|
||||||
|
enabled: false
|
||||||
|
environment: customer
|
||||||
|
send_pii: false
|
||||||
|
# Log level used by web and worker
|
||||||
|
# Can be either debug, info, warning, error
|
||||||
|
log_level: warning
|
||||||
|
|
||||||
|
# Enable Database Backups to S3
|
||||||
|
# backup:
|
||||||
|
# access_key: access-key
|
||||||
|
# secret_key: secret-key
|
||||||
|
# bucket: s3-bucket
|
||||||
|
# host: s3-host
|
||||||
|
|
||||||
|
###################################
|
||||||
|
# Values controlling dependencies
|
||||||
|
###################################
|
||||||
|
|
||||||
|
install:
|
||||||
|
postgresql: true
|
||||||
|
redis: true
|
||||||
|
|
||||||
|
# These values influence the bundled postgresql and redis charts, but are also used by passbook to connect
|
||||||
|
postgresql:
|
||||||
|
postgresqlDatabase: passbook
|
||||||
|
|
||||||
|
redis:
|
||||||
|
cluster:
|
||||||
|
enabled: false
|
||||||
|
master:
|
||||||
|
persistence:
|
||||||
|
enabled: false
|
||||||
|
# https://stackoverflow.com/a/59189742
|
||||||
|
disableCommands: []
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
annotations: {}
|
||||||
|
# kubernetes.io/ingress.class: nginx
|
||||||
|
# kubernetes.io/tls-acme: "true"
|
||||||
|
path: /
|
||||||
|
hosts:
|
||||||
|
- passbook.k8s.local
|
||||||
|
tls: []
|
||||||
|
# - secretName: chart-example-tls
|
||||||
|
# hosts:
|
||||||
|
# - passbook.k8s.local
|
||||||
|
```
|
33
docs/integrations/services/aws/index.md
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
# Amazon Web Services Integration
|
||||||
|
|
||||||
|
## What is AWS
|
||||||
|
|
||||||
|
!!! note ""
|
||||||
|
Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster.
|
||||||
|
|
||||||
|
## Preparation
|
||||||
|
|
||||||
|
The following placeholders will be used:
|
||||||
|
|
||||||
|
- `passbook.company` is the FQDN of the passbook install.
|
||||||
|
|
||||||
|
Create an application in passbook and note the slug, as this will be used later. Create a SAML provider with the following parameters:
|
||||||
|
|
||||||
|
- ACS URL: `https://signin.aws.amazon.com/saml`
|
||||||
|
- Audience: `urn:amazon:webservices`
|
||||||
|
- Issuer: `passbook`
|
||||||
|
- Binding: `Post`
|
||||||
|
|
||||||
|
You can of course use a custom signing certificate, and adjust durations.
|
||||||
|
|
||||||
|
## AWS
|
||||||
|
|
||||||
|
Create a role with the permissions you desire, and note the ARN.
|
||||||
|
|
||||||
|
AWS requires two custom PropertyMappings; `Role` and `RoleSessionName`. Create them as following:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Afterwards export the metadata from passbook, and create an Identity Provider [here](https://console.aws.amazon.com/iam/home#/providers).
|
After Width: | Height: | Size: 65 KiB |
BIN
docs/integrations/services/aws/property-mapping-role.png
Normal file
After Width: | Height: | Size: 66 KiB |
58
docs/integrations/services/gitlab/index.md
Normal file
@ -0,0 +1,58 @@
|
|||||||
|
# GitLab Integration
|
||||||
|
|
||||||
|
## What is GitLab
|
||||||
|
|
||||||
|
From https://about.gitlab.com/what-is-gitlab/
|
||||||
|
|
||||||
|
!!! note ""
|
||||||
|
GitLab is a complete DevOps platform, delivered as a single application. This makes GitLab unique and makes Concurrent DevOps possible, unlocking your organization from the constraints of a pieced together toolchain. Join us for a live Q&A to learn how GitLab can give you unmatched visibility and higher levels of efficiency in a single application across the DevOps lifecycle.
|
||||||
|
|
||||||
|
## Preparation
|
||||||
|
|
||||||
|
The following placeholders will be used:
|
||||||
|
|
||||||
|
- `gitlab.company` is the FQDN of the GitLab Install
|
||||||
|
- `passbook.company` is the FQDN of the passbook Install
|
||||||
|
|
||||||
|
Create an application in passbook and note the slug, as this will be used later. Create a SAML provider with the following parameters:
|
||||||
|
|
||||||
|
- ACS URL: `https://gitlab.company/users/auth/saml/callback`
|
||||||
|
- Audience: `https://gitlab.company`
|
||||||
|
- Issuer: `https://gitlab.company`
|
||||||
|
|
||||||
|
You can of course use a custom signing certificate, and adjust durations. To get the value for `idp_cert_fingerprint`, you can use a tool like [this](https://www.samltool.com/fingerprint.php).
|
||||||
|
|
||||||
|
## GitLab Configuration
|
||||||
|
|
||||||
|
Paste the following block in your `gitlab.rb` file, after replacing the placeholder values from above. The file is located in `/etc/gitlab`.
|
||||||
|
|
||||||
|
```ruby
|
||||||
|
gitlab_rails['omniauth_enabled'] = true
|
||||||
|
gitlab_rails['omniauth_allow_single_sign_on'] = ['saml']
|
||||||
|
gitlab_rails['omniauth_sync_email_from_provider'] = 'saml'
|
||||||
|
gitlab_rails['omniauth_sync_profile_from_provider'] = ['saml']
|
||||||
|
gitlab_rails['omniauth_sync_profile_attributes'] = ['email']
|
||||||
|
gitlab_rails['omniauth_auto_sign_in_with_provider'] = 'saml'
|
||||||
|
gitlab_rails['omniauth_block_auto_created_users'] = false
|
||||||
|
gitlab_rails['omniauth_auto_link_saml_user'] = true
|
||||||
|
gitlab_rails['omniauth_providers'] = [
|
||||||
|
{
|
||||||
|
name: 'saml',
|
||||||
|
args: {
|
||||||
|
assertion_consumer_service_url: 'https://gitlab.company/users/auth/saml/callback',
|
||||||
|
idp_cert_fingerprint: '4E:1E:CD:67:4A:67:5A:E9:6A:D0:3C:E6:DD:7A:F2:44:2E:76:00:6A',
|
||||||
|
idp_sso_target_url: 'https://passbook.company/application/saml/<passbook application slug>/login/',
|
||||||
|
issuer: 'https://gitlab.company',
|
||||||
|
name_identifier_format: 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress',
|
||||||
|
attribute_statements: {
|
||||||
|
email: ['urn:oid:1.3.6.1.4.1.5923.1.1.1.6'],
|
||||||
|
first_name: ['urn:oid:2.5.4.3'],
|
||||||
|
nickname: ['urn:oid:2.16.840.1.113730.3.1.241']
|
||||||
|
}
|
||||||
|
},
|
||||||
|
label: 'passbook'
|
||||||
|
}
|
||||||
|
]
|
||||||
|
```
|
||||||
|
|
||||||
|
Afterwards, either run `gitlab-ctl reconfigure` if you're running GitLab Omnibus, or restart the container if you're using the container.
|
BIN
docs/integrations/services/harbor/harbor.png
Normal file
After Width: | Height: | Size: 348 KiB |
27
docs/integrations/services/harbor/index.md
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
# Harbor Integration
|
||||||
|
|
||||||
|
## What is Harbor
|
||||||
|
|
||||||
|
From https://goharbor.io
|
||||||
|
|
||||||
|
!!! note ""
|
||||||
|
Harbor is an open source container image registry that secures images with role-based access control, scans images for vulnerabilities, and signs images as trusted. A CNCF Incubating project, Harbor delivers compliance, performance, and interoperability to help you consistently and securely manage images across cloud native compute platforms like Kubernetes and Docker.
|
||||||
|
|
||||||
|
## Preparation
|
||||||
|
|
||||||
|
The following placeholders will be used:
|
||||||
|
|
||||||
|
- `harbor.company` is the FQDN of the Harbor install.
|
||||||
|
- `passbook.company` is the FQDN of the passbook install.
|
||||||
|
|
||||||
|
Create an application in passbook. Create an OpenID provider with the following parameters:
|
||||||
|
|
||||||
|
- Client Type: `Confidential`
|
||||||
|
- Response types: `code (Authorization Code Flow)`
|
||||||
|
- JWT Algorithm: `RS256`
|
||||||
|
- Redirect URIs: `https://harbor.company/c/oidc/callback`
|
||||||
|
- Scopes: `openid`
|
||||||
|
|
||||||
|
## Harbor
|
||||||
|
|
||||||
|

|
28
docs/integrations/services/rancher/index.md
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
# Rancher Integration
|
||||||
|
|
||||||
|
## What is Rancher
|
||||||
|
|
||||||
|
From https://rancher.com/products/rancher
|
||||||
|
|
||||||
|
!!! note ""
|
||||||
|
An enterprise platform for managing Kubernetes Everywhere
|
||||||
|
Rancher is a platform built to address the needs of the DevOps teams deploying applications with Kubernetes, and the IT staff responsible for delivering an enterprise-critical service.
|
||||||
|
|
||||||
|
## Preparation
|
||||||
|
|
||||||
|
The following placeholders will be used:
|
||||||
|
|
||||||
|
- `rancher.company` is the FQDN of the Rancher install.
|
||||||
|
- `passbook.company` is the FQDN of the passbook install.
|
||||||
|
|
||||||
|
Create an application in passbook and note the slug, as this will be used later. Create a SAML provider with the following parameters:
|
||||||
|
|
||||||
|
- ACS URL: `https://rancher.company/v1-saml/adfs/saml/acs`
|
||||||
|
- Audience: `https://rancher.company/v1-saml/adfs/saml/metadata`
|
||||||
|
- Issuer: `passbook`
|
||||||
|
|
||||||
|
You can of course use a custom signing certificate, and adjust durations.
|
||||||
|
|
||||||
|
## Rancher
|
||||||
|
|
||||||
|

|
BIN
docs/integrations/services/rancher/rancher.png
Normal file
After Width: | Height: | Size: 525 KiB |
41
docs/integrations/services/sentry/index.md
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
# Sentry Integration
|
||||||
|
|
||||||
|
## What is Sentry
|
||||||
|
|
||||||
|
From https://sentry.io
|
||||||
|
|
||||||
|
!!! note ""
|
||||||
|
Sentry provides self-hosted and cloud-based error monitoring that helps all software
|
||||||
|
teams discover, triage, and prioritize errors in real-time.
|
||||||
|
|
||||||
|
One million developers at over fifty thousand companies already ship
|
||||||
|
better software faster with Sentry. Won’t you join them?
|
||||||
|
|
||||||
|
## Preparation
|
||||||
|
|
||||||
|
The following placeholders will be used:
|
||||||
|
|
||||||
|
- `sentry.company` is the FQDN of the Sentry install.
|
||||||
|
- `passbook.company` is the FQDN of the passbook install.
|
||||||
|
|
||||||
|
Create an application in passbook. Create an OpenID provider with the following parameters:
|
||||||
|
|
||||||
|
- Client Type: `Confidential`
|
||||||
|
- Response types: `code (Authorization Code Flow)`
|
||||||
|
- JWT Algorithm: `RS256`
|
||||||
|
- Redirect URIs: `https://sentry.company/auth/sso/`
|
||||||
|
- Scopes: `openid email`
|
||||||
|
|
||||||
|
## Sentry
|
||||||
|
|
||||||
|
**This guide assumes you've installed Sentry using [getsentry/onpremise](https://github.com/getsentry/onpremise)**
|
||||||
|
|
||||||
|
- Add `sentry-auth-oidc` to `onpremise/sentry/requirements.txt` (Create the file if it doesn't exist yet)
|
||||||
|
- Add the following block to your `onpremise/sentry/sentry.conf.py`:
|
||||||
|
```
|
||||||
|
OIDC_ISSUER = "passbook"
|
||||||
|
OIDC_CLIENT_ID = "<Client ID from passbook>"
|
||||||
|
OIDC_CLIENT_SECRET = "<Client Secret from passbook>"
|
||||||
|
OIDC_SCOPE = "openid email"
|
||||||
|
OIDC_DOMAIN = "https://passbook.company/application/oidc/"
|
||||||
|
```
|
74
docs/integrations/services/tower-awx/index.md
Normal file
@ -0,0 +1,74 @@
|
|||||||
|
# Ansible Tower / AWX Integration
|
||||||
|
|
||||||
|
## What is Tower
|
||||||
|
|
||||||
|
From https://docs.ansible.com/ansible/2.5/reference_appendices/tower.html
|
||||||
|
|
||||||
|
!!! note ""
|
||||||
|
Ansible Tower (formerly ‘AWX’) is a web-based solution that makes Ansible even more easy to use for IT teams of all kinds. It’s designed to be the hub for all of your automation tasks.
|
||||||
|
|
||||||
|
Tower allows you to control access to who can access what, even allowing sharing of SSH credentials without someone being able to transfer those credentials. Inventory can be graphically managed or synced with a wide variety of cloud sources. It logs all of your jobs, integrates well with LDAP, and has an amazing browsable REST API. Command line tools are available for easy integration with Jenkins as well. Provisioning callbacks provide great support for autoscaling topologies.
|
||||||
|
|
||||||
|
!!! note
|
||||||
|
AWX is the open-source version of Tower. The term "AWX" will be used interchangeably throughout this document.
|
||||||
|
|
||||||
|
## Preparation
|
||||||
|
|
||||||
|
The following placeholders will be used:
|
||||||
|
|
||||||
|
- `awx.company` is the FQDN of the AWX/Tower install.
|
||||||
|
- `passbook.company` is the FQDN of the passbook install.
|
||||||
|
|
||||||
|
Create an application in passbook and note the slug, as this will be used later. Create a SAML provider with the following parameters:
|
||||||
|
|
||||||
|
- ACS URL: `https://awx.company/sso/complete/saml/`
|
||||||
|
- Audience: `awx`
|
||||||
|
- Issuer: `https://awx.company/sso/metadata/saml/`
|
||||||
|
|
||||||
|
You can of course use a custom signing certificate, and adjust durations.
|
||||||
|
|
||||||
|
## AWX Configuration
|
||||||
|
|
||||||
|
Navigate to `https://awx.company/#/settings/auth` to configure SAML. Set the Field `SAML SERVICE PROVIDER ENTITY ID` to `awx`.
|
||||||
|
|
||||||
|
For the fields `SAML SERVICE PROVIDER PUBLIC CERTIFICATE` and `SAML SERVICE PROVIDER PRIVATE KEY`, you can either use custom certificates, or use the self-signed pair generated by passbook.
|
||||||
|
|
||||||
|
Provide metadata in the `SAML Service Provider Organization Info` field:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"en-US": {
|
||||||
|
"name": "passbook",
|
||||||
|
"url": "https://passbook.company",
|
||||||
|
"displayname": "passbook"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
Provide metadata in the `SAML Service Provider Technical Contact` and `SAML Service Provider Technical Contact` fields:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"givenName": "Admin Name",
|
||||||
|
"emailAddress": "admin@company"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
In the `SAML Enabled Identity Providers` paste the following configuration:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"passbook": {
|
||||||
|
"attr_username": "urn:oid:2.16.840.1.113730.3.1.241",
|
||||||
|
"attr_user_permanent_id": "urn:oid:0.9.2342.19200300.100.1.1",
|
||||||
|
"x509cert": "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",
|
||||||
|
"url": "https://passbook.company/application/saml/awx/login/",
|
||||||
|
"attr_last_name": "User.LastName",
|
||||||
|
"entity_id": "https://awx.company/sso/metadata/saml/",
|
||||||
|
"attr_email": "urn:oid:0.9.2342.19200300.100.1.3",
|
||||||
|
"attr_first_name": "urn:oid:2.5.4.3"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
`x509cert` is the certificate configured in passbook. Remove the `--BEGIN CERTIFICATE--` and `--END CERTIFICATE--` headers, then enter the cert as one non-breaking string.
|
26
docs/outposts/outposts.md
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
# Outposts
|
||||||
|
|
||||||
|
An outpost is a single deployment of a passbook component, which can be deployed in a completely separate environment. Currently, only the Proxy Provider is supported as outpost.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Upon creation, a service account and a token is generated. The service account only has permissions to read the outpost and provider configuration. This token is used by the Outpost to connect to passbook.
|
||||||
|
|
||||||
|
To deploy an outpost, you can for example use this docker-compose snippet:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
version: 3.5
|
||||||
|
|
||||||
|
services:
|
||||||
|
passbook_proxy:
|
||||||
|
image: beryju/passbook-proxy:0.10.0-stable
|
||||||
|
ports:
|
||||||
|
- 4180:4180
|
||||||
|
- 4443:4443
|
||||||
|
environment:
|
||||||
|
PASSBOOK_HOST: https://your-passbook.tld
|
||||||
|
PASSBOOK_INSECURE: 'true'
|
||||||
|
PASSBOOK_TOKEN: token-generated-by-passbook
|
||||||
|
```
|
||||||
|
|
||||||
|
In future versions, this snippet will be automatically generated. You will also be able to deploy an outpost directly into a kubernetes cluster.w
|
BIN
docs/outposts/outposts.png
Normal file
After Width: | Height: | Size: 122 KiB |
30
docs/policies/expression.md
Normal file
@ -0,0 +1,30 @@
|
|||||||
|
# Expression Policies
|
||||||
|
|
||||||
|
!!! notice
|
||||||
|
These variables are available in addition to the common variables/functions defined in [**Expressions**](../expressions/index.md)
|
||||||
|
|
||||||
|
The passing of the policy is determined by the return value of the code. Use `return True` to pass a policy and `return False` to fail it.
|
||||||
|
|
||||||
|
### Available Functions
|
||||||
|
|
||||||
|
#### `pb_message(message: str)`
|
||||||
|
|
||||||
|
Add a message, visible by the end user. This can be used to show the reason why they were denied.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
```python
|
||||||
|
pb_message("Access denied")
|
||||||
|
return False
|
||||||
|
```
|
||||||
|
|
||||||
|
### Context variables
|
||||||
|
|
||||||
|
- `request`: A PolicyRequest object, which has the following properties:
|
||||||
|
- `request.user`: The current user, against which the policy is applied. ([ref](../expressions/reference/user-object.md))
|
||||||
|
- `request.http_request`: The Django HTTP Request. ([ref](https://docs.djangoproject.com/en/3.0/ref/request-response/#httprequest-objects))
|
||||||
|
- `request.obj`: A Django Model instance. This is only set if the policy is ran against an object.
|
||||||
|
- `request.context`: A dictionary with dynamic data. This depends on the origin of the execution.
|
||||||
|
- `pb_is_sso_flow`: Boolean which is true if request was initiated by authenticating through an external provider.
|
||||||
|
- `pb_client_ip`: Client's IP Address or '255.255.255.255' if no IP Address could be extracted. Can be [compared](../expressions/index.md#comparing-ip-addresses)
|
||||||
|
- `pb_flow_plan`: Current Plan if Policy is called from the Flow Planner.
|
42
docs/policies/index.md
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
# Policies
|
||||||
|
|
||||||
|
## Kinds
|
||||||
|
|
||||||
|
There are two different kinds of policies; Standard Policy and Password Policy. Normal policies evaluate to True or False, and can be used everywhere. Password policies apply when a password is set (during user enrollment, recovery or anywhere else). These policies can be used to apply password rules such as length, complexity, etc. They can also be used to expire passwords after a certain amount of time.
|
||||||
|
|
||||||
|
## Standard Policies
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### Reputation Policy
|
||||||
|
|
||||||
|
passbook keeps track of failed login attempts by source IP and attempted username. These values are saved as scores. Each failed login decreases the score for the client IP as well as the targeted username by 1 (one).
|
||||||
|
|
||||||
|
This policy can be used, for example, to prompt clients with a low score to pass a captcha before they can continue.
|
||||||
|
|
||||||
|
## Expression Policy
|
||||||
|
|
||||||
|
See [Expression Policy](expression.md).
|
||||||
|
|
||||||
|
## Password Policies
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### Password Policy
|
||||||
|
|
||||||
|
This policy allows you to specify password rules, such as length and required characters.
|
||||||
|
The following rules can be set:
|
||||||
|
|
||||||
|
- Minimum amount of uppercase characters.
|
||||||
|
- Minimum amount of lowercase characters.
|
||||||
|
- Minimum amount of symbols characters.
|
||||||
|
- Minimum length.
|
||||||
|
- Symbol charset (define which characters are counted as symbols).
|
||||||
|
|
||||||
|
### Have I Been Pwned Policy
|
||||||
|
|
||||||
|
This policy checks the hashed password against the [Have I Been Pwned](https://haveibeenpwned.com/) API. This only sends the first 5 characters of the hashed password. The remaining comparison is done within passbook.
|
||||||
|
|
||||||
|
### Password-Expiry Policy
|
||||||
|
|
||||||
|
This policy can enforce regular password rotation by expiring set passwords after a finite amount of time. This forces users to set a new password.
|
12
docs/property-mappings/expression.md
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
# Property Mapping Expressions
|
||||||
|
|
||||||
|
The property mapping should return a value that is expected by the Provider/Source. Supported types are documented in the individual Provider/Source. Returning `None` is always accepted and would simply skip the mapping for which `None` was returned.
|
||||||
|
|
||||||
|
!!! notice
|
||||||
|
These variables are available in addition to the common variables/functions defined in [**Expressions**](../expressions/index.md)
|
||||||
|
|
||||||
|
### Context Variables
|
||||||
|
|
||||||
|
- `user`: The current user. This may be `None` if there is no contextual user. ([ref](../expressions/reference/user-object.md))
|
||||||
|
- `request`: The current request. This may be `None` if there is no contextual request. ([ref](https://docs.djangoproject.com/en/3.0/ref/request-response/#httprequest-objects))
|
||||||
|
- Other arbitrary arguments given by the provider, this is documented on the Provider/Source.
|
25
docs/property-mappings/index.md
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
# Property Mappings
|
||||||
|
|
||||||
|
Property Mappings allow you to pass information to external applications. For example, pass the current user's groups as a SAML parameter. Property Mappings are also used to map Source fields to passbook fields, for example when using LDAP.
|
||||||
|
|
||||||
|
## SAML Property Mapping
|
||||||
|
|
||||||
|
SAML Property Mappings allow you embed information into the SAML AuthN request. This information can then be used by the application to, for example, assign permissions to the object.
|
||||||
|
|
||||||
|
You can find examples [here](integrations/).
|
||||||
|
|
||||||
|
## LDAP Property Mapping
|
||||||
|
|
||||||
|
LDAP Property Mappings are used when you define a LDAP Source. These mappings define which LDAP property maps to which passbook property. By default, the following mappings are created:
|
||||||
|
|
||||||
|
- Autogenerated LDAP Mapping: givenName -> first_name
|
||||||
|
- Autogenerated LDAP Mapping: mail -> email
|
||||||
|
- Autogenerated LDAP Mapping: name -> name
|
||||||
|
- Autogenerated LDAP Mapping: sAMAccountName -> username
|
||||||
|
- Autogenerated LDAP Mapping: sn -> last_name
|
||||||
|
|
||||||
|
These are configured with most common LDAP setups.
|
||||||
|
|
||||||
|
## Scope Mapping
|
||||||
|
|
||||||
|
Scope Mappings are used by the OAuth2 Provider to map information from passbook to OAuth2/OpenID Claims.
|
31
docs/providers/oauth2.md
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
# OAuth2 Provider
|
||||||
|
|
||||||
|
This provider supports both generic OAuth2 as well as OpenID Connect
|
||||||
|
|
||||||
|
Scopes can be configured using Scope Mappings, a type of [Property Mappings](../property-mappings/index.md#scope-mapping).
|
||||||
|
|
||||||
|
Endpoint | URL
|
||||||
|
---------|---
|
||||||
|
Authorization | `/application/o/authorize/`
|
||||||
|
Token | `/application/o/token/`
|
||||||
|
User Info | `/application/o/userinfo/`
|
||||||
|
End Session | `/application/o/end-session/`
|
||||||
|
Introspect | `/application/o/end-session/`
|
||||||
|
JWKS | `/application/o/<application slug>/jwks/`
|
||||||
|
OpenID Configuration | `/application/o/<application slug>/.well-known/openid-configuration`
|
||||||
|
|
||||||
|
## GitHub Compatibility
|
||||||
|
|
||||||
|
This provider also exposes a GitHub-compatible endpoint. This endpoint can be used by applications, which support authenticating against GitHub Enterprise, but not generic OpenID Connect.
|
||||||
|
|
||||||
|
To use any of the GitHub Compatibility scopes, you have to use the GitHub Compatibility Endpoints.
|
||||||
|
|
||||||
|
|
||||||
|
Endpoint | URL
|
||||||
|
---------|---
|
||||||
|
Authorization | `/login/oauth/authorize`
|
||||||
|
Token | `/login/oauth/access_token`
|
||||||
|
User Info | `/user`
|
||||||
|
User Teams Info | `/user/teams`
|
||||||
|
|
||||||
|
To access the user's email address, a scope of `user:email` is required. To access their groups, `read:org` is required. Because these scopes are handled by a different endpoint, they are not customisable as a Scope Mapping.
|
16
docs/providers/proxy.md
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
# Proxy Provider
|
||||||
|
|
||||||
|
!!! info
|
||||||
|
This provider is to be used in conjunction with [Outposts](../outposts/outposts.md)
|
||||||
|
|
||||||
|
This provider protects applications, which have no built-in support for OAuth2 or SAML. This is done by running a lightweight Reverse Proxy in front of the application, which authenticates the requests.
|
||||||
|
|
||||||
|
passbook Proxy is based on [oauth2_proxy](https://github.com/oauth2-proxy/oauth2-proxy), but has been integrated more tightly with passbook.
|
||||||
|
|
||||||
|
The Proxy these extra headers to the application:
|
||||||
|
|
||||||
|
Header Name | Value
|
||||||
|
-------------|-------
|
||||||
|
X-Auth-Request-User | The user's unique identifier
|
||||||
|
X-Auth-Request-Email | The user's email address
|
||||||
|
X-Auth-Request-Preferred-Username | The user's username
|
12
docs/providers/saml.md
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
# SAML Provider
|
||||||
|
|
||||||
|
This provider allows you to integrate enterprise software using the SAML2 Protocol. It supports signed requests and uses [Property Mappings](../property-mappings/index.md#saml-property-mapping) to determine which fields are exposed and what values they return. This makes it possible to expose vendor-specific fields.
|
||||||
|
Default fields are exposed through auto-generated Property Mappings, which are prefixed with "Autogenerated".
|
||||||
|
|
||||||
|
|
||||||
|
Endpoint | URL
|
||||||
|
---------|---
|
||||||
|
SSO (Redirect binding) | `/application/saml/<application slug>/sso/binding/redirect/`
|
||||||
|
SSO (POST binding) | `/application/saml/<application slug>/sso/binding/post/`
|
||||||
|
IdP-initiated login | `/application/saml/<application slug>/sso/binding/init/`
|
||||||
|
Metadata Download | `/application/saml/<application slug>/metadata/`
|
2
docs/requirements.txt
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
mkdocs
|
||||||
|
mkdocs-material
|
1
docs/runtime.txt
Normal file
@ -0,0 +1 @@
|
|||||||
|
3.7
|
39
docs/sources.md
Normal file
@ -0,0 +1,39 @@
|
|||||||
|
# Sources
|
||||||
|
|
||||||
|
Sources allow you to connect passbook to an existing user directory. They can also be used for social logins, using external providers such as Facebook, Twitter, etc.
|
||||||
|
|
||||||
|
## Generic OAuth Source
|
||||||
|
|
||||||
|
**All Integration-specific Sources are documented in the Integrations Section**
|
||||||
|
|
||||||
|
This source allows users to enroll themselves with an external OAuth-based Identity Provider. The generic provider expects the endpoint to return OpenID-Connect compatible information. Vendor-specific implementations have their own OAuth Source.
|
||||||
|
|
||||||
|
- Policies: Allow/Forbid users from linking their accounts with this provider.
|
||||||
|
- Request Token URL: This field is used for OAuth v1 implementations and will be provided by the provider.
|
||||||
|
- Authorization URL: This value will be provided by the provider.
|
||||||
|
- Access Token URL: This value will be provided by the provider.
|
||||||
|
- Profile URL: This URL is called by passbook to retrieve user information upon successful authentication.
|
||||||
|
- Consumer key/Consumer secret: These values will be provided by the provider.
|
||||||
|
|
||||||
|
## SAML Source
|
||||||
|
|
||||||
|
This source allows passbook to act as a SAML Service Provider. Just like the SAML Provider, it supports signed requests. Vendor-specific documentation can be found in the Integrations Section.
|
||||||
|
|
||||||
|
## LDAP Source
|
||||||
|
|
||||||
|
This source allows you to import users and groups from an LDAP Server.
|
||||||
|
|
||||||
|
- Server URI: URI to your LDAP server/Domain Controller.
|
||||||
|
- Bind CN: CN of the bind user. This can also be a UPN in the format of `user@domain.tld`.
|
||||||
|
- Bind password: Password used during the bind process.
|
||||||
|
- Enable StartTLS: Enables StartTLS functionality. To use LDAPS instead, use port `636`.
|
||||||
|
- Base DN: Base DN used for all LDAP queries.
|
||||||
|
- Addition User DN: Prepended to the base DN for user queries.
|
||||||
|
- Addition Group DN: Prepended to the base DN for group queries.
|
||||||
|
- User object filter: Consider objects matching this filter to be users.
|
||||||
|
- Group object filter: Consider objects matching this filter to be groups.
|
||||||
|
- User group membership field: This field contains the user's group memberships.
|
||||||
|
- Object uniqueness field: This field contains a unique identifier.
|
||||||
|
- Sync groups: Enable/disable group synchronization. Groups are synced in the background every 5 minutes.
|
||||||
|
- Sync parent group: Optionally set this group as the parent group for all synced groups. An example use case of this would be to import Active Directory groups under a root `imported-from-ad` group.
|
||||||
|
- Property mappings: Define which LDAP properties map to which passbook properties. The default set of property mappings is generated for Active Directory. See also [LDAP Property Mappings](property-mappings/index.md#ldap-property-mapping)
|
27
docs/terminology.md
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
### Policy
|
||||||
|
|
||||||
|
At a base level a policy is a yes/no gate. It will either evaluate to True or False depending on the Policy Kind and settings. For example, a "Group Membership Policy" evaluates to True if the user is member of the specified Group and False if not. This can be used to conditionally apply Stages, grant/deny access to various objects, and for other custom logic.
|
||||||
|
|
||||||
|
### Provider
|
||||||
|
|
||||||
|
A Provider is a way for other applications to authenticate against passbook. Common Providers are OpenID Connect (OIDC) and SAML.
|
||||||
|
|
||||||
|
### Source
|
||||||
|
|
||||||
|
Sources are locations from which users can be added to passbook. For example, an LDAP Connection to import Users from Active Directory, or an OAuth2 Connection to allow Social Logins.
|
||||||
|
|
||||||
|
### Application
|
||||||
|
|
||||||
|
An application links together Policies with a Provider, allowing you to control access. It also holds Information like UI Name, Icon and more.
|
||||||
|
|
||||||
|
### Stages
|
||||||
|
|
||||||
|
A stage represents a single verification or logic step. They are used to authenticate users, enroll users, and more. These stages can optionally be applied to a flow via policies.
|
||||||
|
|
||||||
|
### Flows
|
||||||
|
|
||||||
|
Flows are an ordered sequence of stages. These flows can be used to define how a user authenticates, enrolls, etc.
|
||||||
|
|
||||||
|
### Property Mappings
|
||||||
|
|
||||||
|
Property Mappings allow you to make information available for external applications. For example, if you want to login to AWS with passbook, you'd use Property Mappings to set the user's roles in AWS based on their group memberships in passbook.
|
73
docs/upgrading/to-0.10.md
Normal file
@ -0,0 +1,73 @@
|
|||||||
|
# Upgrading to 0.10
|
||||||
|
|
||||||
|
This update brings a lot of big features, such as:
|
||||||
|
|
||||||
|
- New OAuth2/OpenID Provider
|
||||||
|
|
||||||
|
This new provider merges both OAuth2 and OpenID. It is based on the codebase of the old provider, which has been simplified and cleaned from the ground up. Support for Property Mappings has also been added. Because of this change, OpenID and OAuth2 Providers will have to be re-created.
|
||||||
|
|
||||||
|
- Proxy Provider
|
||||||
|
|
||||||
|
Due to this new OAuth2 Provider, the Application Gateway Provider, now simply called "Proxy Provider" has been revamped as well. The new passbook Proxy integrates more tightly with passbook via the new Outposts system. The new proxy also supports multiple applications per proxy instance, can configure TLS based on passbook Keypairs, and more.
|
||||||
|
|
||||||
|
See [Proxy](../providers/proxy.md)
|
||||||
|
|
||||||
|
- Outpost System
|
||||||
|
|
||||||
|
This is a new Object type, currently used only by the Proxy Provider. It manages the creation and permissions of service accounts, which are used by the outposts to communicate with passbook.
|
||||||
|
|
||||||
|
See [Outposts](../outposts/outposts.md)
|
||||||
|
|
||||||
|
- Flow Import/Export
|
||||||
|
|
||||||
|
Flows can now be imported and exported. This feature can be used as a backup system, or to share complex flows with other people. Example flows have also been added to the documentation to help you get going with passbook.
|
||||||
|
|
||||||
|
## Under the hood
|
||||||
|
|
||||||
|
- passbook now runs on Django 3.1 and Channels with complete ASGI enabled
|
||||||
|
- uwsgi has been replaced with Gunicorn and uvicorn
|
||||||
|
- Elastic APM has been replaced with Sentry Performance metrics
|
||||||
|
- Flow title is now configurable separately from the name
|
||||||
|
- All logging output is now json
|
||||||
|
|
||||||
|
## Upgrading
|
||||||
|
|
||||||
|
### docker-compose
|
||||||
|
|
||||||
|
The docker-compose file has been updated, please download the latest from `https://raw.githubusercontent.com/BeryJu/passbook/master/docker-compose.yml`.
|
||||||
|
By default, the new compose file uses a fixed version to prevent unintended updates.
|
||||||
|
|
||||||
|
Before updating the file, stop all containers. Then download the file, pull the new containers and start the database.
|
||||||
|
|
||||||
|
```
|
||||||
|
docker-compose down
|
||||||
|
docker-compose pull
|
||||||
|
docker-compose up --no-start
|
||||||
|
docker-compose start redis postgrseql
|
||||||
|
docker-compose run --rm server migrate
|
||||||
|
docker-compose up -d
|
||||||
|
```
|
||||||
|
|
||||||
|
### Helm
|
||||||
|
|
||||||
|
A few options have changed:
|
||||||
|
|
||||||
|
- `error_reporting` was changed from a simple boolean to a dictionary:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
error_reporting:
|
||||||
|
enabled: false
|
||||||
|
environment: customer
|
||||||
|
send_pii: false
|
||||||
|
```
|
||||||
|
|
||||||
|
- The `apm` and `monitoring` blocks have been removed.
|
||||||
|
- `serverReplicas` and `workerReplicas` have been added
|
||||||
|
|
||||||
|
### Upgrading
|
||||||
|
|
||||||
|
This upgrade only applies if you are upgrading from a running 0.9 instance. Passbook detects this on startup, and automatically executes this upgrade.
|
||||||
|
|
||||||
|
Because this upgrade brings the new OAuth2 Provider, the old providers will be lost in the process. Make sure to take note of the providers you want to bring over.
|
||||||
|
|
||||||
|
Another side-effect of this upgrade is the change of OAuth2 URLs, see [here](../providers/oauth2.md).
|
33
docs/upgrading/to-0.9.md
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
# Upgrading to 0.9
|
||||||
|
|
||||||
|
Due to some database changes that had to be rather sooner than later, there is no possibility to directly upgrade. You must extract the data before hand and import it again. It is recommended to spin up a second instance of passbook to do this.
|
||||||
|
|
||||||
|
To export data from your old instance, run this command:
|
||||||
|
|
||||||
|
- docker-compose
|
||||||
|
```
|
||||||
|
docker-compose exec server ./manage.py dumpdata -o /tmp/passbook_dump.json passbook_core.User passbook_core.Group passbook_crypto.CertificateKeyPair passbook_audit.Event otp_totp.totpdevice otp_static.staticdevice otp_static.statictoken
|
||||||
|
docker cp passbook_server_1:/tmp/passbook_dump.json passbook_dump.json
|
||||||
|
```
|
||||||
|
|
||||||
|
- kubernetes
|
||||||
|
```
|
||||||
|
kubectl exec -it passbook-web-... -- ./manage.py dumpdata -o /tmp/passbook_dump.json passbook_core.User passbook_core.Group passbook_crypto.CertificateKeyPair passbook_audit.Event otp_totp.totpdevice otp_static.staticdevice otp_static.statictoken
|
||||||
|
kubectl cp passbook-web-...:/tmp/passbook_dump.json passbook_dump.json
|
||||||
|
```
|
||||||
|
|
||||||
|
After that, create a new passbook instance in a different namespace (kubernetes) or in a different folder (docker-compose). Once this instance is running, you can use the following commands to restore the data. On docker-compose, you still have to run the `migrate` command, to create all database structures.
|
||||||
|
|
||||||
|
- docker-compose
|
||||||
|
```
|
||||||
|
docker cp passbook_dump.json new_passbook_server_1:/tmp/passbook_dump.json
|
||||||
|
docker-compose exec server ./manage.py loaddata /tmp/passbook_dump.json
|
||||||
|
```
|
||||||
|
|
||||||
|
- kubernetes
|
||||||
|
```
|
||||||
|
kubectl cp passbook_dump.json passbook-web-...:/tmp/passbook_dump.json
|
||||||
|
kubectl exec -it passbook-web-... -- ./manage.py loaddata /tmp/passbook_dump.json
|
||||||
|
```
|
||||||
|
|
||||||
|
Now, you should be able to login to the new passbook instance, and migrate the rest of the data over.
|
8
e2e/ci.docker-compose.yml
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
version: '3.7'
|
||||||
|
|
||||||
|
services:
|
||||||
|
chrome:
|
||||||
|
image: selenium/standalone-chrome:3.141.59-20200525
|
||||||
|
volumes:
|
||||||
|
- /dev/shm:/dev/shm
|
||||||
|
network_mode: host
|
9
e2e/docker-compose.yml
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
version: '3.7'
|
||||||
|
|
||||||
|
services:
|
||||||
|
chrome:
|
||||||
|
image: selenium/standalone-chrome-debug:3.141.59-20200525
|
||||||
|
volumes:
|
||||||
|
- /dev/shm:/dev/shm
|
||||||
|
network_mode: host
|
||||||
|
restart: always
|
20
e2e/setup.sh
Executable file
@ -0,0 +1,20 @@
|
|||||||
|
#!/bin/bash -x
|
||||||
|
# Setup docker & compose
|
||||||
|
curl -fsSL https://get.docker.com | bash
|
||||||
|
sudo usermod -a -G docker ubuntu
|
||||||
|
sudo curl -L "https://github.com/docker/compose/releases/download/1.26.0/docker-compose-$(uname -s)-$(uname -m)" -o /usr/local/bin/docker-compose
|
||||||
|
sudo chmod +x /usr/local/bin/docker-compose
|
||||||
|
# Setup nodejs
|
||||||
|
curl -sL https://deb.nodesource.com/setup_12.x | sudo -E bash -
|
||||||
|
sudo apt-get install -y nodejs
|
||||||
|
sudo npm install -g yarn
|
||||||
|
# Setup python
|
||||||
|
sudo apt install -y python3.8 python3-pip
|
||||||
|
# Setup docker
|
||||||
|
sudo pip3 install pipenv
|
||||||
|
|
||||||
|
cd e2e
|
||||||
|
sudo docker-compose up -d
|
||||||
|
cd ..
|
||||||
|
pipenv sync --dev
|
||||||
|
pipenv shell
|
259
e2e/test_flows_enroll.py
Normal file
@ -0,0 +1,259 @@
|
|||||||
|
"""Test Enroll flow"""
|
||||||
|
from time import sleep
|
||||||
|
|
||||||
|
from django.test import override_settings
|
||||||
|
from docker import DockerClient, from_env
|
||||||
|
from docker.models.containers import Container
|
||||||
|
from docker.types import Healthcheck
|
||||||
|
from selenium.webdriver.common.by import By
|
||||||
|
from selenium.webdriver.support import expected_conditions as ec
|
||||||
|
from structlog import get_logger
|
||||||
|
|
||||||
|
from e2e.utils import USER, SeleniumTestCase
|
||||||
|
from passbook.flows.models import Flow, FlowDesignation, FlowStageBinding
|
||||||
|
from passbook.policies.expression.models import ExpressionPolicy
|
||||||
|
from passbook.stages.email.models import EmailStage, EmailTemplates
|
||||||
|
from passbook.stages.identification.models import IdentificationStage
|
||||||
|
from passbook.stages.prompt.models import FieldTypes, Prompt, PromptStage
|
||||||
|
from passbook.stages.user_login.models import UserLoginStage
|
||||||
|
from passbook.stages.user_write.models import UserWriteStage
|
||||||
|
|
||||||
|
LOGGER = get_logger()
|
||||||
|
|
||||||
|
|
||||||
|
class TestFlowsEnroll(SeleniumTestCase):
|
||||||
|
"""Test Enroll flow"""
|
||||||
|
|
||||||
|
def setUp(self):
|
||||||
|
self.container = self.setup_client()
|
||||||
|
super().setUp()
|
||||||
|
|
||||||
|
def setup_client(self) -> Container:
|
||||||
|
"""Setup test IdP container"""
|
||||||
|
client: DockerClient = from_env()
|
||||||
|
container = client.containers.run(
|
||||||
|
image="mailhog/mailhog:v1.0.1",
|
||||||
|
detach=True,
|
||||||
|
network_mode="host",
|
||||||
|
auto_remove=True,
|
||||||
|
healthcheck=Healthcheck(
|
||||||
|
test=["CMD", "wget", "--spider", "http://localhost:8025"],
|
||||||
|
interval=5 * 100 * 1000000,
|
||||||
|
start_period=1 * 100 * 1000000,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
while True:
|
||||||
|
container.reload()
|
||||||
|
status = container.attrs.get("State", {}).get("Health", {}).get("Status")
|
||||||
|
if status == "healthy":
|
||||||
|
return container
|
||||||
|
LOGGER.info("Container failed healthcheck")
|
||||||
|
sleep(1)
|
||||||
|
|
||||||
|
def tearDown(self):
|
||||||
|
self.container.kill()
|
||||||
|
super().tearDown()
|
||||||
|
|
||||||
|
def test_enroll_2_step(self):
|
||||||
|
"""Test 2-step enroll flow"""
|
||||||
|
# First stage fields
|
||||||
|
username_prompt = Prompt.objects.create(
|
||||||
|
field_key="username", label="Username", order=0, type=FieldTypes.TEXT
|
||||||
|
)
|
||||||
|
password = Prompt.objects.create(
|
||||||
|
field_key="password", label="Password", order=1, type=FieldTypes.PASSWORD
|
||||||
|
)
|
||||||
|
password_repeat = Prompt.objects.create(
|
||||||
|
field_key="password_repeat",
|
||||||
|
label="Password (repeat)",
|
||||||
|
order=2,
|
||||||
|
type=FieldTypes.PASSWORD,
|
||||||
|
)
|
||||||
|
|
||||||
|
# Second stage fields
|
||||||
|
name_field = Prompt.objects.create(
|
||||||
|
field_key="name", label="Name", order=0, type=FieldTypes.TEXT
|
||||||
|
)
|
||||||
|
email = Prompt.objects.create(
|
||||||
|
field_key="email", label="E-Mail", order=1, type=FieldTypes.EMAIL
|
||||||
|
)
|
||||||
|
|
||||||
|
# Password checking policy
|
||||||
|
password_policy = ExpressionPolicy.objects.create(
|
||||||
|
name="policy-enrollment-password-equals",
|
||||||
|
expression="return request.context['password'] == request.context['password_repeat']",
|
||||||
|
)
|
||||||
|
|
||||||
|
# Stages
|
||||||
|
first_stage = PromptStage.objects.create(name="prompt-stage-first")
|
||||||
|
first_stage.fields.set([username_prompt, password, password_repeat])
|
||||||
|
first_stage.validation_policies.set([password_policy])
|
||||||
|
first_stage.save()
|
||||||
|
second_stage = PromptStage.objects.create(name="prompt-stage-second")
|
||||||
|
second_stage.fields.set([name_field, email])
|
||||||
|
second_stage.save()
|
||||||
|
user_write = UserWriteStage.objects.create(name="enroll-user-write")
|
||||||
|
user_login = UserLoginStage.objects.create(name="enroll-user-login")
|
||||||
|
|
||||||
|
flow = Flow.objects.create(
|
||||||
|
name="default-enrollment-flow",
|
||||||
|
slug="default-enrollment-flow",
|
||||||
|
designation=FlowDesignation.ENROLLMENT,
|
||||||
|
)
|
||||||
|
|
||||||
|
# Attach enrollment flow to identification stage
|
||||||
|
ident_stage: IdentificationStage = IdentificationStage.objects.first()
|
||||||
|
ident_stage.enrollment_flow = flow
|
||||||
|
ident_stage.save()
|
||||||
|
|
||||||
|
FlowStageBinding.objects.create(target=flow, stage=first_stage, order=0)
|
||||||
|
FlowStageBinding.objects.create(target=flow, stage=second_stage, order=1)
|
||||||
|
FlowStageBinding.objects.create(target=flow, stage=user_write, order=2)
|
||||||
|
FlowStageBinding.objects.create(target=flow, stage=user_login, order=3)
|
||||||
|
|
||||||
|
self.driver.get(self.live_server_url)
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located((By.CSS_SELECTOR, "[role=enroll]"))
|
||||||
|
)
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "[role=enroll]").click()
|
||||||
|
|
||||||
|
self.wait.until(ec.presence_of_element_located((By.ID, "id_username")))
|
||||||
|
self.driver.find_element(By.ID, "id_username").send_keys("foo")
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password_repeat").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, ".pf-c-button").click()
|
||||||
|
self.driver.find_element(By.ID, "id_name").send_keys("some name")
|
||||||
|
self.driver.find_element(By.ID, "id_email").send_keys("foo@bar.baz")
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, ".pf-c-button").click()
|
||||||
|
|
||||||
|
self.wait.until(ec.presence_of_element_located((By.LINK_TEXT, "foo")))
|
||||||
|
self.driver.find_element(By.LINK_TEXT, "foo").click()
|
||||||
|
|
||||||
|
self.wait_for_url(self.url("passbook_core:user-settings"))
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/-/user/')]").text,
|
||||||
|
"foo",
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_username").get_attribute("value"), "foo"
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_name").get_attribute("value"),
|
||||||
|
"some name",
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_email").get_attribute("value"),
|
||||||
|
"foo@bar.baz",
|
||||||
|
)
|
||||||
|
|
||||||
|
@override_settings(EMAIL_BACKEND="django.core.mail.backends.smtp.EmailBackend")
|
||||||
|
def test_enroll_email(self):
|
||||||
|
"""Test enroll with Email verification"""
|
||||||
|
# First stage fields
|
||||||
|
username_prompt = Prompt.objects.create(
|
||||||
|
field_key="username", label="Username", order=0, type=FieldTypes.TEXT
|
||||||
|
)
|
||||||
|
password = Prompt.objects.create(
|
||||||
|
field_key="password", label="Password", order=1, type=FieldTypes.PASSWORD
|
||||||
|
)
|
||||||
|
password_repeat = Prompt.objects.create(
|
||||||
|
field_key="password_repeat",
|
||||||
|
label="Password (repeat)",
|
||||||
|
order=2,
|
||||||
|
type=FieldTypes.PASSWORD,
|
||||||
|
)
|
||||||
|
|
||||||
|
# Second stage fields
|
||||||
|
name_field = Prompt.objects.create(
|
||||||
|
field_key="name", label="Name", order=0, type=FieldTypes.TEXT
|
||||||
|
)
|
||||||
|
email = Prompt.objects.create(
|
||||||
|
field_key="email", label="E-Mail", order=1, type=FieldTypes.EMAIL
|
||||||
|
)
|
||||||
|
|
||||||
|
# Password checking policy
|
||||||
|
password_policy = ExpressionPolicy.objects.create(
|
||||||
|
name="policy-enrollment-password-equals",
|
||||||
|
expression="return request.context['password'] == request.context['password_repeat']",
|
||||||
|
)
|
||||||
|
|
||||||
|
# Stages
|
||||||
|
first_stage = PromptStage.objects.create(name="prompt-stage-first")
|
||||||
|
first_stage.fields.set([username_prompt, password, password_repeat])
|
||||||
|
first_stage.validation_policies.set([password_policy])
|
||||||
|
first_stage.save()
|
||||||
|
second_stage = PromptStage.objects.create(name="prompt-stage-second")
|
||||||
|
second_stage.fields.set([name_field, email])
|
||||||
|
second_stage.save()
|
||||||
|
email_stage = EmailStage.objects.create(
|
||||||
|
name="enroll-email",
|
||||||
|
host="localhost",
|
||||||
|
port=1025,
|
||||||
|
template=EmailTemplates.ACCOUNT_CONFIRM,
|
||||||
|
)
|
||||||
|
user_write = UserWriteStage.objects.create(name="enroll-user-write")
|
||||||
|
user_login = UserLoginStage.objects.create(name="enroll-user-login")
|
||||||
|
|
||||||
|
flow = Flow.objects.create(
|
||||||
|
name="default-enrollment-flow",
|
||||||
|
slug="default-enrollment-flow",
|
||||||
|
designation=FlowDesignation.ENROLLMENT,
|
||||||
|
)
|
||||||
|
|
||||||
|
# Attach enrollment flow to identification stage
|
||||||
|
ident_stage: IdentificationStage = IdentificationStage.objects.first()
|
||||||
|
ident_stage.enrollment_flow = flow
|
||||||
|
ident_stage.save()
|
||||||
|
|
||||||
|
FlowStageBinding.objects.create(target=flow, stage=first_stage, order=0)
|
||||||
|
FlowStageBinding.objects.create(target=flow, stage=second_stage, order=1)
|
||||||
|
FlowStageBinding.objects.create(target=flow, stage=user_write, order=2)
|
||||||
|
FlowStageBinding.objects.create(target=flow, stage=email_stage, order=3)
|
||||||
|
FlowStageBinding.objects.create(target=flow, stage=user_login, order=4)
|
||||||
|
|
||||||
|
self.driver.get(self.live_server_url)
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "[role=enroll]").click()
|
||||||
|
self.driver.find_element(By.ID, "id_username").send_keys("foo")
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password_repeat").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, ".pf-c-button").click()
|
||||||
|
self.driver.find_element(By.ID, "id_name").send_keys("some name")
|
||||||
|
self.driver.find_element(By.ID, "id_email").send_keys("foo@bar.baz")
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, ".pf-c-button").click()
|
||||||
|
sleep(3)
|
||||||
|
|
||||||
|
# Open Mailhog
|
||||||
|
self.driver.get("http://localhost:8025")
|
||||||
|
|
||||||
|
# Click on first message
|
||||||
|
self.driver.find_element(By.CLASS_NAME, "msglist-message").click()
|
||||||
|
sleep(3)
|
||||||
|
self.driver.switch_to.frame(self.driver.find_element(By.CLASS_NAME, "tab-pane"))
|
||||||
|
self.driver.find_element(By.ID, "confirm").click()
|
||||||
|
self.driver.close()
|
||||||
|
self.driver.switch_to.window(self.driver.window_handles[0])
|
||||||
|
|
||||||
|
# We're now logged in
|
||||||
|
sleep(3)
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located(
|
||||||
|
(By.XPATH, "//a[contains(@href, '/-/user/')]")
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/-/user/')]").click()
|
||||||
|
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/-/user/')]").text,
|
||||||
|
"foo",
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_username").get_attribute("value"), "foo"
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_name").get_attribute("value"),
|
||||||
|
"some name",
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_email").get_attribute("value"),
|
||||||
|
"foo@bar.baz",
|
||||||
|
)
|
22
e2e/test_flows_login.py
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
"""test default login flow"""
|
||||||
|
from selenium.webdriver.common.by import By
|
||||||
|
from selenium.webdriver.common.keys import Keys
|
||||||
|
|
||||||
|
from e2e.utils import USER, SeleniumTestCase
|
||||||
|
|
||||||
|
|
||||||
|
class TestFlowsLogin(SeleniumTestCase):
|
||||||
|
"""test default login flow"""
|
||||||
|
|
||||||
|
def test_login(self):
|
||||||
|
"""test default login flow"""
|
||||||
|
self.driver.get(f"{self.live_server_url}/flows/default-authentication-flow/")
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/-/user/')]").text,
|
||||||
|
USER().username,
|
||||||
|
)
|
54
e2e/test_flows_stage_setup.py
Normal file
@ -0,0 +1,54 @@
|
|||||||
|
"""test stage setup flows (password change)"""
|
||||||
|
import string
|
||||||
|
from random import SystemRandom
|
||||||
|
from time import sleep
|
||||||
|
|
||||||
|
from selenium.webdriver.common.by import By
|
||||||
|
from selenium.webdriver.common.keys import Keys
|
||||||
|
|
||||||
|
from e2e.utils import USER, SeleniumTestCase
|
||||||
|
from passbook.core.models import User
|
||||||
|
from passbook.flows.models import Flow, FlowDesignation
|
||||||
|
from passbook.stages.password.models import PasswordStage
|
||||||
|
|
||||||
|
|
||||||
|
class TestFlowsStageSetup(SeleniumTestCase):
|
||||||
|
"""test stage setup flows"""
|
||||||
|
|
||||||
|
def test_password_change(self):
|
||||||
|
"""test password change flow"""
|
||||||
|
# Ensure that password stage has change_flow set
|
||||||
|
flow = Flow.objects.get(
|
||||||
|
slug="default-password-change", designation=FlowDesignation.STAGE_SETUP,
|
||||||
|
)
|
||||||
|
|
||||||
|
stages = PasswordStage.objects.filter(name="default-authentication-password")
|
||||||
|
stage = stages.first()
|
||||||
|
stage.change_flow = flow
|
||||||
|
stage.save()
|
||||||
|
|
||||||
|
new_password = "".join(
|
||||||
|
SystemRandom().choice(string.ascii_uppercase + string.digits)
|
||||||
|
for _ in range(8)
|
||||||
|
)
|
||||||
|
|
||||||
|
self.driver.get(
|
||||||
|
f"{self.live_server_url}/flows/default-authentication-flow/?next=%2F"
|
||||||
|
)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, ".pf-c-page__header").click()
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/-/user/')]").click()
|
||||||
|
self.wait_for_url(self.url("passbook_core:user-settings"))
|
||||||
|
self.driver.find_element(By.LINK_TEXT, "Change password").click()
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(new_password)
|
||||||
|
self.driver.find_element(By.ID, "id_password_repeat").click()
|
||||||
|
self.driver.find_element(By.ID, "id_password_repeat").send_keys(new_password)
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, ".pf-c-button").click()
|
||||||
|
|
||||||
|
sleep(2)
|
||||||
|
# Because USER() is cached, we need to get the user manually here
|
||||||
|
user = User.objects.get(username=USER().username)
|
||||||
|
self.assertTrue(user.check_password(new_password))
|
234
e2e/test_provider_oauth2_github.py
Normal file
@ -0,0 +1,234 @@
|
|||||||
|
"""test OAuth Provider flow"""
|
||||||
|
from time import sleep
|
||||||
|
|
||||||
|
from docker import DockerClient, from_env
|
||||||
|
from docker.models.containers import Container
|
||||||
|
from docker.types import Healthcheck
|
||||||
|
from selenium.webdriver.common.by import By
|
||||||
|
from selenium.webdriver.common.keys import Keys
|
||||||
|
from structlog import get_logger
|
||||||
|
|
||||||
|
from e2e.utils import USER, SeleniumTestCase
|
||||||
|
from passbook.core.models import Application
|
||||||
|
from passbook.flows.models import Flow
|
||||||
|
from passbook.policies.expression.models import ExpressionPolicy
|
||||||
|
from passbook.policies.models import PolicyBinding
|
||||||
|
from passbook.providers.oauth2.generators import (
|
||||||
|
generate_client_id,
|
||||||
|
generate_client_secret,
|
||||||
|
)
|
||||||
|
from passbook.providers.oauth2.models import ClientTypes, OAuth2Provider, ResponseTypes
|
||||||
|
|
||||||
|
LOGGER = get_logger()
|
||||||
|
|
||||||
|
|
||||||
|
class TestProviderOAuth2Github(SeleniumTestCase):
|
||||||
|
"""test OAuth Provider flow"""
|
||||||
|
|
||||||
|
def setUp(self):
|
||||||
|
self.client_id = generate_client_id()
|
||||||
|
self.client_secret = generate_client_secret()
|
||||||
|
self.container = self.setup_client()
|
||||||
|
super().setUp()
|
||||||
|
|
||||||
|
def setup_client(self) -> Container:
|
||||||
|
"""Setup client grafana container which we test OAuth against"""
|
||||||
|
client: DockerClient = from_env()
|
||||||
|
container = client.containers.run(
|
||||||
|
image="grafana/grafana:7.1.0",
|
||||||
|
detach=True,
|
||||||
|
network_mode="host",
|
||||||
|
auto_remove=True,
|
||||||
|
healthcheck=Healthcheck(
|
||||||
|
test=["CMD", "wget", "--spider", "http://localhost:3000"],
|
||||||
|
interval=5 * 100 * 1000000,
|
||||||
|
start_period=1 * 100 * 1000000,
|
||||||
|
),
|
||||||
|
environment={
|
||||||
|
"GF_AUTH_GITHUB_ENABLED": "true",
|
||||||
|
"GF_AUTH_GITHUB_ALLOW_SIGN_UP": "true",
|
||||||
|
"GF_AUTH_GITHUB_CLIENT_ID": self.client_id,
|
||||||
|
"GF_AUTH_GITHUB_CLIENT_SECRET": self.client_secret,
|
||||||
|
"GF_AUTH_GITHUB_SCOPES": "user:email,read:org",
|
||||||
|
"GF_AUTH_GITHUB_AUTH_URL": self.url(
|
||||||
|
"passbook_providers_oauth2_github:github-authorize"
|
||||||
|
),
|
||||||
|
"GF_AUTH_GITHUB_TOKEN_URL": self.url(
|
||||||
|
"passbook_providers_oauth2_github:github-access-token"
|
||||||
|
),
|
||||||
|
"GF_AUTH_GITHUB_API_URL": self.url(
|
||||||
|
"passbook_providers_oauth2_github:github-user"
|
||||||
|
),
|
||||||
|
"GF_LOG_LEVEL": "debug",
|
||||||
|
},
|
||||||
|
)
|
||||||
|
while True:
|
||||||
|
container.reload()
|
||||||
|
status = container.attrs.get("State", {}).get("Health", {}).get("Status")
|
||||||
|
if status == "healthy":
|
||||||
|
return container
|
||||||
|
LOGGER.info("Container failed healthcheck")
|
||||||
|
sleep(1)
|
||||||
|
|
||||||
|
def tearDown(self):
|
||||||
|
self.container.kill()
|
||||||
|
super().tearDown()
|
||||||
|
|
||||||
|
def test_authorization_consent_implied(self):
|
||||||
|
"""test OAuth Provider flow (default authorization flow with implied consent)"""
|
||||||
|
sleep(1)
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authorization_flow = Flow.objects.get(
|
||||||
|
slug="default-provider-authorization-implicit-consent"
|
||||||
|
)
|
||||||
|
provider = OAuth2Provider.objects.create(
|
||||||
|
name="grafana",
|
||||||
|
client_id=self.client_id,
|
||||||
|
client_secret=self.client_secret,
|
||||||
|
client_type=ClientTypes.CONFIDENTIAL,
|
||||||
|
response_type=ResponseTypes.CODE,
|
||||||
|
redirect_uris="http://localhost:3000/login/github",
|
||||||
|
authorization_flow=authorization_flow,
|
||||||
|
)
|
||||||
|
Application.objects.create(
|
||||||
|
name="Grafana", slug="grafana", provider=provider,
|
||||||
|
)
|
||||||
|
|
||||||
|
self.driver.get("http://localhost:3000")
|
||||||
|
self.driver.find_element(By.CLASS_NAME, "btn-service--github").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
|
||||||
|
|
||||||
|
self.wait_for_url("http://localhost:3000/?orgId=1")
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/profile')]").click()
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.CLASS_NAME, "page-header__title").text,
|
||||||
|
USER().username,
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "input[name=name]").get_attribute(
|
||||||
|
"value"
|
||||||
|
),
|
||||||
|
USER().username,
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(
|
||||||
|
By.CSS_SELECTOR, "input[name=email]"
|
||||||
|
).get_attribute("value"),
|
||||||
|
USER().email,
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(
|
||||||
|
By.CSS_SELECTOR, "input[name=login]"
|
||||||
|
).get_attribute("value"),
|
||||||
|
USER().username,
|
||||||
|
)
|
||||||
|
|
||||||
|
def test_authorization_consent_explicit(self):
|
||||||
|
"""test OAuth Provider flow (default authorization flow with explicit consent)"""
|
||||||
|
sleep(1)
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authorization_flow = Flow.objects.get(
|
||||||
|
slug="default-provider-authorization-explicit-consent"
|
||||||
|
)
|
||||||
|
provider = OAuth2Provider.objects.create(
|
||||||
|
name="grafana",
|
||||||
|
client_id=self.client_id,
|
||||||
|
client_secret=self.client_secret,
|
||||||
|
client_type=ClientTypes.CONFIDENTIAL,
|
||||||
|
response_type=ResponseTypes.CODE,
|
||||||
|
redirect_uris="http://localhost:3000/login/github",
|
||||||
|
authorization_flow=authorization_flow,
|
||||||
|
)
|
||||||
|
app = Application.objects.create(
|
||||||
|
name="Grafana", slug="grafana", provider=provider,
|
||||||
|
)
|
||||||
|
|
||||||
|
self.driver.get("http://localhost:3000")
|
||||||
|
self.driver.find_element(By.CLASS_NAME, "btn-service--github").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
|
||||||
|
|
||||||
|
self.assertIn(
|
||||||
|
app.name,
|
||||||
|
self.driver.find_element(
|
||||||
|
By.XPATH, "/html/body/div[2]/div/main/div/form/div[2]/p[1]"
|
||||||
|
).text,
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
"GitHub Compatibility: Access you Email addresses",
|
||||||
|
self.driver.find_element(
|
||||||
|
By.XPATH, "/html/body/div[2]/div/main/div/form/div[2]/ul/li[1]"
|
||||||
|
).text,
|
||||||
|
)
|
||||||
|
sleep(1)
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "[type=submit]").click()
|
||||||
|
|
||||||
|
self.wait_for_url("http://localhost:3000/?orgId=1")
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/profile')]").click()
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.CLASS_NAME, "page-header__title").text,
|
||||||
|
USER().username,
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "input[name=name]").get_attribute(
|
||||||
|
"value"
|
||||||
|
),
|
||||||
|
USER().username,
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(
|
||||||
|
By.CSS_SELECTOR, "input[name=email]"
|
||||||
|
).get_attribute("value"),
|
||||||
|
USER().email,
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(
|
||||||
|
By.CSS_SELECTOR, "input[name=login]"
|
||||||
|
).get_attribute("value"),
|
||||||
|
USER().username,
|
||||||
|
)
|
||||||
|
|
||||||
|
def test_denied(self):
|
||||||
|
"""test OAuth Provider flow (default authorization flow, denied)"""
|
||||||
|
sleep(1)
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authorization_flow = Flow.objects.get(
|
||||||
|
slug="default-provider-authorization-explicit-consent"
|
||||||
|
)
|
||||||
|
provider = OAuth2Provider.objects.create(
|
||||||
|
name="grafana",
|
||||||
|
client_id=self.client_id,
|
||||||
|
client_secret=self.client_secret,
|
||||||
|
client_type=ClientTypes.CONFIDENTIAL,
|
||||||
|
response_type=ResponseTypes.CODE,
|
||||||
|
redirect_uris="http://localhost:3000/login/github",
|
||||||
|
authorization_flow=authorization_flow,
|
||||||
|
)
|
||||||
|
app = Application.objects.create(
|
||||||
|
name="Grafana", slug="grafana", provider=provider,
|
||||||
|
)
|
||||||
|
|
||||||
|
negative_policy = ExpressionPolicy.objects.create(
|
||||||
|
name="negative-static", expression="return False"
|
||||||
|
)
|
||||||
|
PolicyBinding.objects.create(target=app, policy=negative_policy, order=0)
|
||||||
|
|
||||||
|
self.driver.get("http://localhost:3000")
|
||||||
|
self.driver.find_element(By.CLASS_NAME, "btn-service--github").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
|
||||||
|
self.wait_for_url(self.url("passbook_flows:denied"))
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "header > h1").text,
|
||||||
|
"Permission denied",
|
||||||
|
)
|
304
e2e/test_provider_oauth2_oidc.py
Normal file
@ -0,0 +1,304 @@
|
|||||||
|
"""test OAuth2 OpenID Provider flow"""
|
||||||
|
from time import sleep
|
||||||
|
|
||||||
|
from docker import DockerClient, from_env
|
||||||
|
from docker.models.containers import Container
|
||||||
|
from docker.types import Healthcheck
|
||||||
|
from selenium.webdriver.common.by import By
|
||||||
|
from selenium.webdriver.common.keys import Keys
|
||||||
|
from selenium.webdriver.support import expected_conditions as ec
|
||||||
|
from structlog import get_logger
|
||||||
|
|
||||||
|
from e2e.utils import USER, SeleniumTestCase
|
||||||
|
from passbook.core.models import Application
|
||||||
|
from passbook.crypto.models import CertificateKeyPair
|
||||||
|
from passbook.flows.models import Flow
|
||||||
|
from passbook.policies.expression.models import ExpressionPolicy
|
||||||
|
from passbook.policies.models import PolicyBinding
|
||||||
|
from passbook.providers.oauth2.constants import (
|
||||||
|
SCOPE_OPENID,
|
||||||
|
SCOPE_OPENID_EMAIL,
|
||||||
|
SCOPE_OPENID_PROFILE,
|
||||||
|
)
|
||||||
|
from passbook.providers.oauth2.generators import (
|
||||||
|
generate_client_id,
|
||||||
|
generate_client_secret,
|
||||||
|
)
|
||||||
|
from passbook.providers.oauth2.models import (
|
||||||
|
ClientTypes,
|
||||||
|
OAuth2Provider,
|
||||||
|
ResponseTypes,
|
||||||
|
ScopeMapping,
|
||||||
|
)
|
||||||
|
|
||||||
|
LOGGER = get_logger()
|
||||||
|
|
||||||
|
|
||||||
|
class TestProviderOAuth2OIDC(SeleniumTestCase):
|
||||||
|
"""test OAuth with OpenID Provider flow"""
|
||||||
|
|
||||||
|
def setUp(self):
|
||||||
|
self.client_id = generate_client_id()
|
||||||
|
self.client_secret = generate_client_secret()
|
||||||
|
self.container = self.setup_client()
|
||||||
|
super().setUp()
|
||||||
|
|
||||||
|
def setup_client(self) -> Container:
|
||||||
|
"""Setup client grafana container which we test OIDC against"""
|
||||||
|
client: DockerClient = from_env()
|
||||||
|
container = client.containers.run(
|
||||||
|
image="grafana/grafana:7.1.0",
|
||||||
|
detach=True,
|
||||||
|
network_mode="host",
|
||||||
|
auto_remove=True,
|
||||||
|
healthcheck=Healthcheck(
|
||||||
|
test=["CMD", "wget", "--spider", "http://localhost:3000"],
|
||||||
|
interval=5 * 100 * 1000000,
|
||||||
|
start_period=1 * 100 * 1000000,
|
||||||
|
),
|
||||||
|
environment={
|
||||||
|
"GF_AUTH_GENERIC_OAUTH_ENABLED": "true",
|
||||||
|
"GF_AUTH_GENERIC_OAUTH_CLIENT_ID": self.client_id,
|
||||||
|
"GF_AUTH_GENERIC_OAUTH_CLIENT_SECRET": self.client_secret,
|
||||||
|
"GF_AUTH_GENERIC_OAUTH_SCOPES": "openid email profile",
|
||||||
|
"GF_AUTH_GENERIC_OAUTH_AUTH_URL": (
|
||||||
|
self.url("passbook_providers_oauth2:authorize")
|
||||||
|
),
|
||||||
|
"GF_AUTH_GENERIC_OAUTH_TOKEN_URL": (
|
||||||
|
self.url("passbook_providers_oauth2:token")
|
||||||
|
),
|
||||||
|
"GF_AUTH_GENERIC_OAUTH_API_URL": (
|
||||||
|
self.url("passbook_providers_oauth2:userinfo")
|
||||||
|
),
|
||||||
|
"GF_LOG_LEVEL": "debug",
|
||||||
|
},
|
||||||
|
)
|
||||||
|
while True:
|
||||||
|
container.reload()
|
||||||
|
status = container.attrs.get("State", {}).get("Health", {}).get("Status")
|
||||||
|
if status == "healthy":
|
||||||
|
return container
|
||||||
|
LOGGER.info("Container failed healthcheck")
|
||||||
|
sleep(1)
|
||||||
|
|
||||||
|
def tearDown(self):
|
||||||
|
self.container.kill()
|
||||||
|
super().tearDown()
|
||||||
|
|
||||||
|
def test_redirect_uri_error(self):
|
||||||
|
"""test OpenID Provider flow (invalid redirect URI, check error message)"""
|
||||||
|
sleep(1)
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authorization_flow = Flow.objects.get(
|
||||||
|
slug="default-provider-authorization-implicit-consent"
|
||||||
|
)
|
||||||
|
provider = OAuth2Provider.objects.create(
|
||||||
|
name="grafana",
|
||||||
|
client_type=ClientTypes.CONFIDENTIAL,
|
||||||
|
client_id=self.client_id,
|
||||||
|
client_secret=self.client_secret,
|
||||||
|
rsa_key=CertificateKeyPair.objects.first(),
|
||||||
|
redirect_uris="http://localhost:3000/",
|
||||||
|
authorization_flow=authorization_flow,
|
||||||
|
response_type=ResponseTypes.CODE,
|
||||||
|
)
|
||||||
|
provider.property_mappings.set(
|
||||||
|
ScopeMapping.objects.filter(
|
||||||
|
scope_name__in=[SCOPE_OPENID, SCOPE_OPENID_EMAIL, SCOPE_OPENID_PROFILE]
|
||||||
|
)
|
||||||
|
)
|
||||||
|
provider.save()
|
||||||
|
Application.objects.create(
|
||||||
|
name="Grafana", slug="grafana", provider=provider,
|
||||||
|
)
|
||||||
|
|
||||||
|
self.driver.get("http://localhost:3000")
|
||||||
|
self.driver.find_element(By.CLASS_NAME, "btn-service--oauth").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
|
||||||
|
sleep(2)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.CLASS_NAME, "pf-c-title").text,
|
||||||
|
"Redirect URI Error",
|
||||||
|
)
|
||||||
|
|
||||||
|
def test_authorization_consent_implied(self):
|
||||||
|
"""test OpenID Provider flow (default authorization flow with implied consent)"""
|
||||||
|
sleep(1)
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authorization_flow = Flow.objects.get(
|
||||||
|
slug="default-provider-authorization-implicit-consent"
|
||||||
|
)
|
||||||
|
provider = OAuth2Provider.objects.create(
|
||||||
|
name="grafana",
|
||||||
|
client_type=ClientTypes.CONFIDENTIAL,
|
||||||
|
client_id=self.client_id,
|
||||||
|
client_secret=self.client_secret,
|
||||||
|
rsa_key=CertificateKeyPair.objects.first(),
|
||||||
|
redirect_uris="http://localhost:3000/login/generic_oauth",
|
||||||
|
authorization_flow=authorization_flow,
|
||||||
|
response_type=ResponseTypes.CODE,
|
||||||
|
)
|
||||||
|
provider.property_mappings.set(
|
||||||
|
ScopeMapping.objects.filter(
|
||||||
|
scope_name__in=[SCOPE_OPENID, SCOPE_OPENID_EMAIL, SCOPE_OPENID_PROFILE]
|
||||||
|
)
|
||||||
|
)
|
||||||
|
provider.save()
|
||||||
|
Application.objects.create(
|
||||||
|
name="Grafana", slug="grafana", provider=provider,
|
||||||
|
)
|
||||||
|
|
||||||
|
self.driver.get("http://localhost:3000")
|
||||||
|
self.driver.find_element(By.CLASS_NAME, "btn-service--oauth").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/profile')]").click()
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.CLASS_NAME, "page-header__title").text,
|
||||||
|
USER().name,
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "input[name=name]").get_attribute(
|
||||||
|
"value"
|
||||||
|
),
|
||||||
|
USER().name,
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(
|
||||||
|
By.CSS_SELECTOR, "input[name=email]"
|
||||||
|
).get_attribute("value"),
|
||||||
|
USER().email,
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(
|
||||||
|
By.CSS_SELECTOR, "input[name=login]"
|
||||||
|
).get_attribute("value"),
|
||||||
|
USER().email,
|
||||||
|
)
|
||||||
|
|
||||||
|
def test_authorization_consent_explicit(self):
|
||||||
|
"""test OpenID Provider flow (default authorization flow with explicit consent)"""
|
||||||
|
sleep(1)
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authorization_flow = Flow.objects.get(
|
||||||
|
slug="default-provider-authorization-explicit-consent"
|
||||||
|
)
|
||||||
|
provider = OAuth2Provider.objects.create(
|
||||||
|
name="grafana",
|
||||||
|
authorization_flow=authorization_flow,
|
||||||
|
response_type=ResponseTypes.CODE,
|
||||||
|
client_type=ClientTypes.CONFIDENTIAL,
|
||||||
|
client_id=self.client_id,
|
||||||
|
client_secret=self.client_secret,
|
||||||
|
rsa_key=CertificateKeyPair.objects.first(),
|
||||||
|
redirect_uris="http://localhost:3000/login/generic_oauth",
|
||||||
|
)
|
||||||
|
provider.property_mappings.set(
|
||||||
|
ScopeMapping.objects.filter(
|
||||||
|
scope_name__in=[SCOPE_OPENID, SCOPE_OPENID_EMAIL, SCOPE_OPENID_PROFILE]
|
||||||
|
)
|
||||||
|
)
|
||||||
|
provider.save()
|
||||||
|
app = Application.objects.create(
|
||||||
|
name="Grafana", slug="grafana", provider=provider,
|
||||||
|
)
|
||||||
|
|
||||||
|
self.driver.get("http://localhost:3000")
|
||||||
|
self.driver.find_element(By.CLASS_NAME, "btn-service--oauth").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
|
||||||
|
|
||||||
|
self.assertIn(
|
||||||
|
app.name,
|
||||||
|
self.driver.find_element(
|
||||||
|
By.XPATH, "/html/body/div[2]/div/main/div/form/div[2]/p[1]"
|
||||||
|
).text,
|
||||||
|
)
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located((By.CSS_SELECTOR, "[type=submit]"))
|
||||||
|
)
|
||||||
|
sleep(1)
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "[type=submit]").click()
|
||||||
|
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located(
|
||||||
|
(By.XPATH, "//a[contains(@href, '/profile')]")
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/profile')]").click()
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.CLASS_NAME, "page-header__title").text,
|
||||||
|
USER().name,
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "input[name=name]").get_attribute(
|
||||||
|
"value"
|
||||||
|
),
|
||||||
|
USER().name,
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(
|
||||||
|
By.CSS_SELECTOR, "input[name=email]"
|
||||||
|
).get_attribute("value"),
|
||||||
|
USER().email,
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(
|
||||||
|
By.CSS_SELECTOR, "input[name=login]"
|
||||||
|
).get_attribute("value"),
|
||||||
|
USER().email,
|
||||||
|
)
|
||||||
|
|
||||||
|
def test_authorization_denied(self):
|
||||||
|
"""test OpenID Provider flow (default authorization with access deny)"""
|
||||||
|
sleep(1)
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authorization_flow = Flow.objects.get(
|
||||||
|
slug="default-provider-authorization-explicit-consent"
|
||||||
|
)
|
||||||
|
provider = OAuth2Provider.objects.create(
|
||||||
|
name="grafana",
|
||||||
|
authorization_flow=authorization_flow,
|
||||||
|
response_type=ResponseTypes.CODE,
|
||||||
|
client_type=ClientTypes.CONFIDENTIAL,
|
||||||
|
client_id=self.client_id,
|
||||||
|
client_secret=self.client_secret,
|
||||||
|
rsa_key=CertificateKeyPair.objects.first(),
|
||||||
|
redirect_uris="http://localhost:3000/login/generic_oauth",
|
||||||
|
)
|
||||||
|
provider.property_mappings.set(
|
||||||
|
ScopeMapping.objects.filter(
|
||||||
|
scope_name__in=[SCOPE_OPENID, SCOPE_OPENID_EMAIL, SCOPE_OPENID_PROFILE]
|
||||||
|
)
|
||||||
|
)
|
||||||
|
provider.save()
|
||||||
|
app = Application.objects.create(
|
||||||
|
name="Grafana", slug="grafana", provider=provider,
|
||||||
|
)
|
||||||
|
|
||||||
|
negative_policy = ExpressionPolicy.objects.create(
|
||||||
|
name="negative-static", expression="return False"
|
||||||
|
)
|
||||||
|
PolicyBinding.objects.create(target=app, policy=negative_policy, order=0)
|
||||||
|
self.driver.get("http://localhost:3000")
|
||||||
|
self.driver.find_element(By.CLASS_NAME, "btn-service--oauth").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
|
||||||
|
self.wait_for_url(self.url("passbook_flows:denied"))
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "header > h1").text,
|
||||||
|
"Permission denied",
|
||||||
|
)
|
214
e2e/test_provider_saml.py
Normal file
@ -0,0 +1,214 @@
|
|||||||
|
"""test SAML Provider flow"""
|
||||||
|
from time import sleep
|
||||||
|
|
||||||
|
from docker import DockerClient, from_env
|
||||||
|
from docker.models.containers import Container
|
||||||
|
from docker.types import Healthcheck
|
||||||
|
from selenium.webdriver.common.by import By
|
||||||
|
from selenium.webdriver.common.keys import Keys
|
||||||
|
from structlog import get_logger
|
||||||
|
|
||||||
|
from e2e.utils import USER, SeleniumTestCase
|
||||||
|
from passbook.core.models import Application
|
||||||
|
from passbook.crypto.models import CertificateKeyPair
|
||||||
|
from passbook.flows.models import Flow
|
||||||
|
from passbook.policies.expression.models import ExpressionPolicy
|
||||||
|
from passbook.policies.models import PolicyBinding
|
||||||
|
from passbook.providers.saml.models import (
|
||||||
|
SAMLBindings,
|
||||||
|
SAMLPropertyMapping,
|
||||||
|
SAMLProvider,
|
||||||
|
)
|
||||||
|
|
||||||
|
LOGGER = get_logger()
|
||||||
|
|
||||||
|
|
||||||
|
class TestProviderSAML(SeleniumTestCase):
|
||||||
|
"""test SAML Provider flow"""
|
||||||
|
|
||||||
|
container: Container
|
||||||
|
|
||||||
|
def setup_client(self, provider: SAMLProvider) -> Container:
|
||||||
|
"""Setup client saml-sp container which we test SAML against"""
|
||||||
|
client: DockerClient = from_env()
|
||||||
|
container = client.containers.run(
|
||||||
|
image="beryju/saml-test-sp",
|
||||||
|
detach=True,
|
||||||
|
network_mode="host",
|
||||||
|
auto_remove=True,
|
||||||
|
healthcheck=Healthcheck(
|
||||||
|
test=["CMD", "wget", "--spider", "http://localhost:9009/health"],
|
||||||
|
interval=5 * 100 * 1000000,
|
||||||
|
start_period=1 * 100 * 1000000,
|
||||||
|
),
|
||||||
|
environment={
|
||||||
|
"SP_ENTITY_ID": provider.issuer,
|
||||||
|
"SP_SSO_BINDING": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
|
||||||
|
"SP_METADATA_URL": (
|
||||||
|
self.url(
|
||||||
|
"passbook_providers_saml:metadata",
|
||||||
|
application_slug=provider.application.slug,
|
||||||
|
)
|
||||||
|
),
|
||||||
|
},
|
||||||
|
)
|
||||||
|
while True:
|
||||||
|
container.reload()
|
||||||
|
status = container.attrs.get("State", {}).get("Health", {}).get("Status")
|
||||||
|
if status == "healthy":
|
||||||
|
return container
|
||||||
|
LOGGER.info("Container failed healthcheck")
|
||||||
|
sleep(1)
|
||||||
|
|
||||||
|
def tearDown(self):
|
||||||
|
self.container.kill()
|
||||||
|
super().tearDown()
|
||||||
|
|
||||||
|
def test_sp_initiated_implicit(self):
|
||||||
|
"""test SAML Provider flow SP-initiated flow (implicit consent)"""
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authorization_flow = Flow.objects.get(
|
||||||
|
slug="default-provider-authorization-implicit-consent"
|
||||||
|
)
|
||||||
|
provider: SAMLProvider = SAMLProvider.objects.create(
|
||||||
|
name="saml-test",
|
||||||
|
acs_url="http://localhost:9009/saml/acs",
|
||||||
|
audience="passbook-e2e",
|
||||||
|
issuer="passbook-e2e",
|
||||||
|
sp_binding=SAMLBindings.POST,
|
||||||
|
authorization_flow=authorization_flow,
|
||||||
|
signing_kp=CertificateKeyPair.objects.first(),
|
||||||
|
)
|
||||||
|
provider.property_mappings.set(SAMLPropertyMapping.objects.all())
|
||||||
|
provider.save()
|
||||||
|
Application.objects.create(
|
||||||
|
name="SAML", slug="passbook-saml", provider=provider,
|
||||||
|
)
|
||||||
|
self.container = self.setup_client(provider)
|
||||||
|
self.driver.get("http://localhost:9009")
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
|
||||||
|
self.wait_for_url("http://localhost:9009/")
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.XPATH, "/html/body/pre").text,
|
||||||
|
f"Hello, {USER().name}!",
|
||||||
|
)
|
||||||
|
|
||||||
|
def test_sp_initiated_explicit(self):
|
||||||
|
"""test SAML Provider flow SP-initiated flow (explicit consent)"""
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authorization_flow = Flow.objects.get(
|
||||||
|
slug="default-provider-authorization-explicit-consent"
|
||||||
|
)
|
||||||
|
provider: SAMLProvider = SAMLProvider.objects.create(
|
||||||
|
name="saml-test",
|
||||||
|
acs_url="http://localhost:9009/saml/acs",
|
||||||
|
audience="passbook-e2e",
|
||||||
|
issuer="passbook-e2e",
|
||||||
|
sp_binding=SAMLBindings.POST,
|
||||||
|
authorization_flow=authorization_flow,
|
||||||
|
signing_kp=CertificateKeyPair.objects.first(),
|
||||||
|
)
|
||||||
|
provider.property_mappings.set(SAMLPropertyMapping.objects.all())
|
||||||
|
provider.save()
|
||||||
|
app = Application.objects.create(
|
||||||
|
name="SAML", slug="passbook-saml", provider=provider,
|
||||||
|
)
|
||||||
|
self.container = self.setup_client(provider)
|
||||||
|
self.driver.get("http://localhost:9009")
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
|
||||||
|
self.assertIn(
|
||||||
|
app.name,
|
||||||
|
self.driver.find_element(
|
||||||
|
By.XPATH, "/html/body/div[2]/div/main/div/form/div[2]/p[1]"
|
||||||
|
).text,
|
||||||
|
)
|
||||||
|
sleep(1)
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "[type=submit]").click()
|
||||||
|
self.wait_for_url("http://localhost:9009/")
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.XPATH, "/html/body/pre").text,
|
||||||
|
f"Hello, {USER().name}!",
|
||||||
|
)
|
||||||
|
|
||||||
|
def test_idp_initiated_implicit(self):
|
||||||
|
"""test SAML Provider flow IdP-initiated flow (implicit consent)"""
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authorization_flow = Flow.objects.get(
|
||||||
|
slug="default-provider-authorization-implicit-consent"
|
||||||
|
)
|
||||||
|
provider: SAMLProvider = SAMLProvider.objects.create(
|
||||||
|
name="saml-test",
|
||||||
|
acs_url="http://localhost:9009/saml/acs",
|
||||||
|
audience="passbook-e2e",
|
||||||
|
issuer="passbook-e2e",
|
||||||
|
sp_binding=SAMLBindings.POST,
|
||||||
|
authorization_flow=authorization_flow,
|
||||||
|
signing_kp=CertificateKeyPair.objects.first(),
|
||||||
|
)
|
||||||
|
provider.property_mappings.set(SAMLPropertyMapping.objects.all())
|
||||||
|
provider.save()
|
||||||
|
Application.objects.create(
|
||||||
|
name="SAML", slug="passbook-saml", provider=provider,
|
||||||
|
)
|
||||||
|
self.container = self.setup_client(provider)
|
||||||
|
self.driver.get(
|
||||||
|
self.url(
|
||||||
|
"passbook_providers_saml:sso-init",
|
||||||
|
application_slug=provider.application.slug,
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
|
||||||
|
self.wait_for_url("http://localhost:9009/")
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.XPATH, "/html/body/pre").text,
|
||||||
|
f"Hello, {USER().name}!",
|
||||||
|
)
|
||||||
|
|
||||||
|
def test_sp_initiated_denied(self):
|
||||||
|
"""test SAML Provider flow SP-initiated flow (Policy denies access)"""
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authorization_flow = Flow.objects.get(
|
||||||
|
slug="default-provider-authorization-implicit-consent"
|
||||||
|
)
|
||||||
|
negative_policy = ExpressionPolicy.objects.create(
|
||||||
|
name="negative-static", expression="return False"
|
||||||
|
)
|
||||||
|
provider: SAMLProvider = SAMLProvider.objects.create(
|
||||||
|
name="saml-test",
|
||||||
|
acs_url="http://localhost:9009/saml/acs",
|
||||||
|
audience="passbook-e2e",
|
||||||
|
issuer="passbook-e2e",
|
||||||
|
sp_binding=SAMLBindings.POST,
|
||||||
|
authorization_flow=authorization_flow,
|
||||||
|
signing_kp=CertificateKeyPair.objects.first(),
|
||||||
|
)
|
||||||
|
provider.property_mappings.set(SAMLPropertyMapping.objects.all())
|
||||||
|
provider.save()
|
||||||
|
app = Application.objects.create(
|
||||||
|
name="SAML", slug="passbook-saml", provider=provider,
|
||||||
|
)
|
||||||
|
PolicyBinding.objects.create(target=app, policy=negative_policy, order=0)
|
||||||
|
self.container = self.setup_client(provider)
|
||||||
|
self.driver.get("http://localhost:9009/")
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").click()
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
|
||||||
|
self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
|
||||||
|
self.wait_for_url(self.url("passbook_flows:denied"))
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "header > h1").text,
|
||||||
|
"Permission denied",
|
||||||
|
)
|
266
e2e/test_source_saml.py
Normal file
@ -0,0 +1,266 @@
|
|||||||
|
"""test SAML Source"""
|
||||||
|
from time import sleep
|
||||||
|
|
||||||
|
from docker import DockerClient, from_env
|
||||||
|
from docker.models.containers import Container
|
||||||
|
from docker.types import Healthcheck
|
||||||
|
from selenium.webdriver.common.by import By
|
||||||
|
from selenium.webdriver.common.keys import Keys
|
||||||
|
from selenium.webdriver.support import expected_conditions as ec
|
||||||
|
from structlog import get_logger
|
||||||
|
|
||||||
|
from e2e.utils import SeleniumTestCase
|
||||||
|
from passbook.crypto.models import CertificateKeyPair
|
||||||
|
from passbook.flows.models import Flow
|
||||||
|
from passbook.sources.saml.models import SAMLBindingTypes, SAMLSource
|
||||||
|
|
||||||
|
LOGGER = get_logger()
|
||||||
|
|
||||||
|
IDP_CERT = """-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDXTCCAkWgAwIBAgIJALmVVuDWu4NYMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV
|
||||||
|
BAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBX
|
||||||
|
aWRnaXRzIFB0eSBMdGQwHhcNMTYxMjMxMTQzNDQ3WhcNNDgwNjI1MTQzNDQ3WjBF
|
||||||
|
MQswCQYDVQQGEwJBVTETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50
|
||||||
|
ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
|
||||||
|
CgKCAQEAzUCFozgNb1h1M0jzNRSCjhOBnR+uVbVpaWfXYIR+AhWDdEe5ryY+Cgav
|
||||||
|
Og8bfLybyzFdehlYdDRgkedEB/GjG8aJw06l0qF4jDOAw0kEygWCu2mcH7XOxRt+
|
||||||
|
YAH3TVHa/Hu1W3WjzkobqqqLQ8gkKWWM27fOgAZ6GieaJBN6VBSMMcPey3HWLBmc
|
||||||
|
+TYJmv1dbaO2jHhKh8pfKw0W12VM8P1PIO8gv4Phu/uuJYieBWKixBEyy0lHjyix
|
||||||
|
YFCR12xdh4CA47q958ZRGnnDUGFVE1QhgRacJCOZ9bd5t9mr8KLaVBYTCJo5ERE8
|
||||||
|
jymab5dPqe5qKfJsCZiqWglbjUo9twIDAQABo1AwTjAdBgNVHQ4EFgQUxpuwcs/C
|
||||||
|
YQOyui+r1G+3KxBNhxkwHwYDVR0jBBgwFoAUxpuwcs/CYQOyui+r1G+3KxBNhxkw
|
||||||
|
DAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEAAiWUKs/2x/viNCKi3Y6b
|
||||||
|
lEuCtAGhzOOZ9EjrvJ8+COH3Rag3tVBWrcBZ3/uhhPq5gy9lqw4OkvEws99/5jFs
|
||||||
|
X1FJ6MKBgqfuy7yh5s1YfM0ANHYczMmYpZeAcQf2CGAaVfwTTfSlzNLsF2lW/ly7
|
||||||
|
yapFzlYSJLGoVE+OHEu8g5SlNACUEfkXw+5Eghh+KzlIN7R6Q7r2ixWNFBC/jWf7
|
||||||
|
NKUfJyX8qIG5md1YUeT6GBW9Bm2/1/RiO24JTaYlfLdKK9TYb8sG5B+OLab2DImG
|
||||||
|
99CJ25RkAcSobWNF5zD0O6lgOo3cEdB/ksCq3hmtlC/DlLZ/D8CJ+7VuZnS1rR2n
|
||||||
|
aQ==
|
||||||
|
-----END CERTIFICATE-----"""
|
||||||
|
|
||||||
|
IDP_KEY = """-----BEGIN PRIVATE KEY-----
|
||||||
|
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDNQIWjOA1vWHUz
|
||||||
|
SPM1FIKOE4GdH65VtWlpZ9dghH4CFYN0R7mvJj4KBq86Dxt8vJvLMV16GVh0NGCR
|
||||||
|
50QH8aMbxonDTqXSoXiMM4DDSQTKBYK7aZwftc7FG35gAfdNUdr8e7VbdaPOShuq
|
||||||
|
qotDyCQpZYzbt86ABnoaJ5okE3pUFIwxw97LcdYsGZz5Ngma/V1to7aMeEqHyl8r
|
||||||
|
DRbXZUzw/U8g7yC/g+G7+64liJ4FYqLEETLLSUePKLFgUJHXbF2HgIDjur3nxlEa
|
||||||
|
ecNQYVUTVCGBFpwkI5n1t3m32avwotpUFhMImjkRETyPKZpvl0+p7mop8mwJmKpa
|
||||||
|
CVuNSj23AgMBAAECggEABn4I/B20xxXcNzASiVZJvua9DdRHtmxTlkLznBj0x2oY
|
||||||
|
y1/Nbs3d3oFRn5uEuhBZOTcphsgwdRSHDXZsP3gUObew+d2N/zieUIj8hLDVlvJP
|
||||||
|
rU/s4U/l53Q0LiNByE9ThvL+zJLPCKJtd5uHZjB5fFm69+Q7gu8xg4xHIub+0pP5
|
||||||
|
PHanmHCDrbgNN/oqlar4FZ2MXTgekW6Amyc/koE9hIn4Baa2Ke/B/AUGY4pMRLqp
|
||||||
|
TArt+GTVeWeoFY9QACUpaHpJhGb/Piou6tlU57e42cLoki1f0+SARsBBKyXA7BB1
|
||||||
|
1fMH10KQYFA68dTYWlKzQau/K4xaqg4FKmtwF66GQQKBgQD9OpNUS7oRxMHVJaBR
|
||||||
|
TNWW+V1FXycqojekFpDijPb2X5CWV16oeWgaXp0nOHFdy9EWs3GtGpfZasaRVHsX
|
||||||
|
SHtPh4Nb8JqHdGE0/CD6t0+4Dns8Bn9cSqtdQB7R3Jn7IMXi9X/U8LDKo+A18/Jq
|
||||||
|
V8VgUngMny9YjMkQIbK8TRWkYQKBgQDPf4nxO6ju+tOHHORQty3bYDD0+OV3I0+L
|
||||||
|
0yz0uPreryBVi9nY43KakH52D7UZEwwsBjjGXD+WH8xEsmBWsGNXJu025PvzIJoz
|
||||||
|
lAEiXvMp/NmYp+tY4rDmO8RhyVocBqWHzh38m0IFOd4ByFD5nLEDrA3pDVo0aNgY
|
||||||
|
n0GwRysZFwKBgQDkCj3m6ZMUsUWEty+aR0EJhmKyODBDOnY09IVhH2S/FexVFzUN
|
||||||
|
LtfK9206hp/Awez3Ln2uT4Zzqq5K7fMzUniJdBWdVB004l8voeXpIe9OZuwfcBJ9
|
||||||
|
gFi1zypx/uFDv421BzQpBN+QfOdKbvbdQVFjnqCxbSDr80yVlGMrI5fbwQKBgG09
|
||||||
|
oRrepO7EIO8GN/GCruLK/ptKGkyhy3Q6xnVEmdb47hX7ncJA5IoZPmrblCVSUNsw
|
||||||
|
n11XHabksL8OBgg9rt8oQEThQv/aDzTOW9aDlJNragejiBTwq99aYeZ1gjo1CZq4
|
||||||
|
2jKubpCfyZC4rGDtrIfZYi1q+S2UcQhtd8DdhwQbAoGAAM4EpDA4yHB5yiek1p/o
|
||||||
|
CbqRCta/Dx6Eyo0KlNAyPuFPAshupG4NBx7mT2ASfL+2VBHoi6mHSri+BDX5ryYF
|
||||||
|
fMYvp7URYoq7w7qivRlvvEg5yoYrK13F2+Gj6xJ4jEN9m0KdM/g3mJGq0HBTIQrp
|
||||||
|
Sm75WXsflOxuTn08LbgGc4s=
|
||||||
|
-----END PRIVATE KEY-----"""
|
||||||
|
|
||||||
|
|
||||||
|
class TestSourceSAML(SeleniumTestCase):
|
||||||
|
"""test SAML Source flow"""
|
||||||
|
|
||||||
|
def setUp(self):
|
||||||
|
self.container = self.setup_client()
|
||||||
|
super().setUp()
|
||||||
|
|
||||||
|
def setup_client(self) -> Container:
|
||||||
|
"""Setup test IdP container"""
|
||||||
|
client: DockerClient = from_env()
|
||||||
|
container = client.containers.run(
|
||||||
|
image="kristophjunge/test-saml-idp:1.15",
|
||||||
|
detach=True,
|
||||||
|
network_mode="host",
|
||||||
|
auto_remove=True,
|
||||||
|
healthcheck=Healthcheck(
|
||||||
|
test=["CMD", "curl", "http://localhost:8080"],
|
||||||
|
interval=5 * 100 * 1000000,
|
||||||
|
start_period=1 * 100 * 1000000,
|
||||||
|
),
|
||||||
|
environment={
|
||||||
|
"SIMPLESAMLPHP_SP_ENTITY_ID": "entity-id",
|
||||||
|
"SIMPLESAMLPHP_SP_ASSERTION_CONSUMER_SERVICE": (
|
||||||
|
f"{self.live_server_url}/source/saml/saml-idp-test/acs/"
|
||||||
|
),
|
||||||
|
},
|
||||||
|
)
|
||||||
|
while True:
|
||||||
|
container.reload()
|
||||||
|
status = container.attrs.get("State", {}).get("Health", {}).get("Status")
|
||||||
|
if status == "healthy":
|
||||||
|
return container
|
||||||
|
LOGGER.info("Container failed healthcheck")
|
||||||
|
sleep(1)
|
||||||
|
|
||||||
|
def tearDown(self):
|
||||||
|
self.container.kill()
|
||||||
|
super().tearDown()
|
||||||
|
|
||||||
|
def test_idp_redirect(self):
|
||||||
|
"""test SAML Source With redirect binding"""
|
||||||
|
sleep(1)
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authentication_flow = Flow.objects.get(slug="default-source-authentication")
|
||||||
|
enrollment_flow = Flow.objects.get(slug="default-source-enrollment")
|
||||||
|
keypair = CertificateKeyPair.objects.create(
|
||||||
|
name="test-idp-cert", certificate_data=IDP_CERT, key_data=IDP_KEY,
|
||||||
|
)
|
||||||
|
|
||||||
|
SAMLSource.objects.create(
|
||||||
|
name="saml-idp-test",
|
||||||
|
slug="saml-idp-test",
|
||||||
|
authentication_flow=authentication_flow,
|
||||||
|
enrollment_flow=enrollment_flow,
|
||||||
|
issuer="entity-id",
|
||||||
|
sso_url="http://localhost:8080/simplesaml/saml2/idp/SSOService.php",
|
||||||
|
binding_type=SAMLBindingTypes.Redirect,
|
||||||
|
signing_kp=keypair,
|
||||||
|
)
|
||||||
|
|
||||||
|
self.driver.get(self.live_server_url)
|
||||||
|
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located(
|
||||||
|
(By.CLASS_NAME, "pf-c-login__main-footer-links-item-link")
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.driver.find_element(
|
||||||
|
By.CLASS_NAME, "pf-c-login__main-footer-links-item-link"
|
||||||
|
).click()
|
||||||
|
|
||||||
|
# Now we should be at the IDP, wait for the username field
|
||||||
|
self.wait.until(ec.presence_of_element_located((By.ID, "username")))
|
||||||
|
self.driver.find_element(By.ID, "username").send_keys("user1")
|
||||||
|
self.driver.find_element(By.ID, "password").send_keys("user1pass")
|
||||||
|
self.driver.find_element(By.ID, "password").send_keys(Keys.ENTER)
|
||||||
|
|
||||||
|
# Wait until we're logged in
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located(
|
||||||
|
(By.XPATH, "//a[contains(@href, '/-/user/')]")
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/-/user/')]").click()
|
||||||
|
|
||||||
|
# Wait until we've loaded the user info page
|
||||||
|
self.wait.until(ec.presence_of_element_located((By.ID, "id_username")))
|
||||||
|
self.assertNotEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_username").get_attribute("value"), ""
|
||||||
|
)
|
||||||
|
|
||||||
|
def test_idp_post(self):
|
||||||
|
"""test SAML Source With post binding"""
|
||||||
|
sleep(1)
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authentication_flow = Flow.objects.get(slug="default-source-authentication")
|
||||||
|
enrollment_flow = Flow.objects.get(slug="default-source-enrollment")
|
||||||
|
keypair = CertificateKeyPair.objects.create(
|
||||||
|
name="test-idp-cert", certificate_data=IDP_CERT, key_data=IDP_KEY,
|
||||||
|
)
|
||||||
|
|
||||||
|
SAMLSource.objects.create(
|
||||||
|
name="saml-idp-test",
|
||||||
|
slug="saml-idp-test",
|
||||||
|
authentication_flow=authentication_flow,
|
||||||
|
enrollment_flow=enrollment_flow,
|
||||||
|
issuer="entity-id",
|
||||||
|
sso_url="http://localhost:8080/simplesaml/saml2/idp/SSOService.php",
|
||||||
|
binding_type=SAMLBindingTypes.POST,
|
||||||
|
signing_kp=keypair,
|
||||||
|
)
|
||||||
|
|
||||||
|
self.driver.get(self.live_server_url)
|
||||||
|
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located(
|
||||||
|
(By.CLASS_NAME, "pf-c-login__main-footer-links-item-link")
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.driver.find_element(
|
||||||
|
By.CLASS_NAME, "pf-c-login__main-footer-links-item-link"
|
||||||
|
).click()
|
||||||
|
sleep(1)
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, ".pf-c-button").click()
|
||||||
|
|
||||||
|
# Now we should be at the IDP, wait for the username field
|
||||||
|
self.wait.until(ec.presence_of_element_located((By.ID, "username")))
|
||||||
|
self.driver.find_element(By.ID, "username").send_keys("user1")
|
||||||
|
self.driver.find_element(By.ID, "password").send_keys("user1pass")
|
||||||
|
self.driver.find_element(By.ID, "password").send_keys(Keys.ENTER)
|
||||||
|
|
||||||
|
# Wait until we're logged in
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located(
|
||||||
|
(By.XPATH, "//a[contains(@href, '/-/user/')]")
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/-/user/')]").click()
|
||||||
|
|
||||||
|
# Wait until we've loaded the user info page
|
||||||
|
self.wait.until(ec.presence_of_element_located((By.ID, "id_username")))
|
||||||
|
self.assertNotEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_username").get_attribute("value"), ""
|
||||||
|
)
|
||||||
|
|
||||||
|
def test_idp_post_auto(self):
|
||||||
|
"""test SAML Source With post binding (auto redirect)"""
|
||||||
|
sleep(1)
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authentication_flow = Flow.objects.get(slug="default-source-authentication")
|
||||||
|
enrollment_flow = Flow.objects.get(slug="default-source-enrollment")
|
||||||
|
keypair = CertificateKeyPair.objects.create(
|
||||||
|
name="test-idp-cert", certificate_data=IDP_CERT, key_data=IDP_KEY,
|
||||||
|
)
|
||||||
|
|
||||||
|
SAMLSource.objects.create(
|
||||||
|
name="saml-idp-test",
|
||||||
|
slug="saml-idp-test",
|
||||||
|
authentication_flow=authentication_flow,
|
||||||
|
enrollment_flow=enrollment_flow,
|
||||||
|
issuer="entity-id",
|
||||||
|
sso_url="http://localhost:8080/simplesaml/saml2/idp/SSOService.php",
|
||||||
|
binding_type=SAMLBindingTypes.POST_AUTO,
|
||||||
|
signing_kp=keypair,
|
||||||
|
)
|
||||||
|
|
||||||
|
self.driver.get(self.live_server_url)
|
||||||
|
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located(
|
||||||
|
(By.CLASS_NAME, "pf-c-login__main-footer-links-item-link")
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.driver.find_element(
|
||||||
|
By.CLASS_NAME, "pf-c-login__main-footer-links-item-link"
|
||||||
|
).click()
|
||||||
|
|
||||||
|
# Now we should be at the IDP, wait for the username field
|
||||||
|
self.wait.until(ec.presence_of_element_located((By.ID, "username")))
|
||||||
|
self.driver.find_element(By.ID, "username").send_keys("user1")
|
||||||
|
self.driver.find_element(By.ID, "password").send_keys("user1pass")
|
||||||
|
self.driver.find_element(By.ID, "password").send_keys(Keys.ENTER)
|
||||||
|
|
||||||
|
# Wait until we're logged in
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located(
|
||||||
|
(By.XPATH, "//a[contains(@href, '/-/user/')]")
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/-/user/')]").click()
|
||||||
|
|
||||||
|
# Wait until we've loaded the user info page
|
||||||
|
self.wait.until(ec.presence_of_element_located((By.ID, "id_username")))
|
||||||
|
self.assertNotEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_username").get_attribute("value"), ""
|
||||||
|
)
|
215
e2e/test_sources_oauth.py
Normal file
@ -0,0 +1,215 @@
|
|||||||
|
"""test OAuth Source"""
|
||||||
|
from os.path import abspath
|
||||||
|
from time import sleep
|
||||||
|
|
||||||
|
from docker import DockerClient, from_env
|
||||||
|
from docker.models.containers import Container
|
||||||
|
from docker.types import Healthcheck
|
||||||
|
from selenium.webdriver.common.by import By
|
||||||
|
from selenium.webdriver.common.keys import Keys
|
||||||
|
from selenium.webdriver.support import expected_conditions as ec
|
||||||
|
from structlog import get_logger
|
||||||
|
from yaml import safe_dump
|
||||||
|
|
||||||
|
from e2e.utils import SeleniumTestCase
|
||||||
|
from passbook.flows.models import Flow
|
||||||
|
from passbook.providers.oauth2.generators import generate_client_secret
|
||||||
|
from passbook.sources.oauth.models import OAuthSource
|
||||||
|
|
||||||
|
TOKEN_URL = "http://127.0.0.1:5556/dex/token"
|
||||||
|
CONFIG_PATH = "/tmp/dex.yml"
|
||||||
|
LOGGER = get_logger()
|
||||||
|
|
||||||
|
|
||||||
|
class TestSourceOAuth(SeleniumTestCase):
|
||||||
|
"""test OAuth Source flow"""
|
||||||
|
|
||||||
|
container: Container
|
||||||
|
|
||||||
|
def setUp(self):
|
||||||
|
self.client_secret = generate_client_secret()
|
||||||
|
self.container = self.setup_client()
|
||||||
|
super().setUp()
|
||||||
|
|
||||||
|
def prepare_dex_config(self):
|
||||||
|
"""Since Dex does not document which environment
|
||||||
|
variables can be used to configure clients"""
|
||||||
|
config = {
|
||||||
|
"enablePasswordDB": True,
|
||||||
|
"issuer": "http://127.0.0.1:5556/dex",
|
||||||
|
"logger": {"level": "debug"},
|
||||||
|
"staticClients": [
|
||||||
|
{
|
||||||
|
"id": "example-app",
|
||||||
|
"name": "Example App",
|
||||||
|
"redirectURIs": [
|
||||||
|
self.url(
|
||||||
|
"passbook_sources_oauth:oauth-client-callback",
|
||||||
|
source_slug="dex",
|
||||||
|
)
|
||||||
|
],
|
||||||
|
"secret": self.client_secret,
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"staticPasswords": [
|
||||||
|
{
|
||||||
|
"email": "admin@example.com",
|
||||||
|
# hash for password
|
||||||
|
"hash": "$2a$10$2b2cU8CPhOTaGrs1HRQuAueS7JTT5ZHsHSzYiFPm1leZck7Mc8T4W",
|
||||||
|
"userID": "08a8684b-db88-4b73-90a9-3cd1661f5466",
|
||||||
|
"username": "admin",
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"storage": {"config": {"file": "/tmp/dex.db"}, "type": "sqlite3"},
|
||||||
|
"web": {"http": "0.0.0.0:5556"},
|
||||||
|
}
|
||||||
|
with open(CONFIG_PATH, "w+") as _file:
|
||||||
|
safe_dump(config, _file)
|
||||||
|
|
||||||
|
def setup_client(self) -> Container:
|
||||||
|
"""Setup test Dex container"""
|
||||||
|
self.prepare_dex_config()
|
||||||
|
client: DockerClient = from_env()
|
||||||
|
container = client.containers.run(
|
||||||
|
image="quay.io/dexidp/dex:v2.24.0",
|
||||||
|
detach=True,
|
||||||
|
network_mode="host",
|
||||||
|
auto_remove=True,
|
||||||
|
command="serve /config.yml",
|
||||||
|
healthcheck=Healthcheck(
|
||||||
|
test=["CMD", "wget", "--spider", "http://localhost:5556/dex/healthz"],
|
||||||
|
interval=5 * 100 * 1000000,
|
||||||
|
start_period=1 * 100 * 1000000,
|
||||||
|
),
|
||||||
|
volumes={abspath(CONFIG_PATH): {"bind": "/config.yml", "mode": "ro"}},
|
||||||
|
)
|
||||||
|
while True:
|
||||||
|
container.reload()
|
||||||
|
status = container.attrs.get("State", {}).get("Health", {}).get("Status")
|
||||||
|
if status == "healthy":
|
||||||
|
return container
|
||||||
|
LOGGER.info("Container failed healthcheck")
|
||||||
|
sleep(1)
|
||||||
|
|
||||||
|
def create_objects(self):
|
||||||
|
"""Create required objects"""
|
||||||
|
sleep(1)
|
||||||
|
# Bootstrap all needed objects
|
||||||
|
authentication_flow = Flow.objects.get(slug="default-source-authentication")
|
||||||
|
enrollment_flow = Flow.objects.get(slug="default-source-enrollment")
|
||||||
|
|
||||||
|
OAuthSource.objects.create(
|
||||||
|
name="dex",
|
||||||
|
slug="dex",
|
||||||
|
authentication_flow=authentication_flow,
|
||||||
|
enrollment_flow=enrollment_flow,
|
||||||
|
provider_type="openid-connect",
|
||||||
|
authorization_url="http://127.0.0.1:5556/dex/auth",
|
||||||
|
access_token_url=TOKEN_URL,
|
||||||
|
profile_url="http://127.0.0.1:5556/dex/userinfo",
|
||||||
|
consumer_key="example-app",
|
||||||
|
consumer_secret=self.client_secret,
|
||||||
|
)
|
||||||
|
|
||||||
|
def tearDown(self):
|
||||||
|
self.container.kill()
|
||||||
|
super().tearDown()
|
||||||
|
|
||||||
|
def test_oauth_enroll(self):
|
||||||
|
"""test OAuth Source With With OIDC"""
|
||||||
|
self.create_objects()
|
||||||
|
self.driver.get(self.live_server_url)
|
||||||
|
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located(
|
||||||
|
(By.CLASS_NAME, "pf-c-login__main-footer-links-item-link")
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.driver.find_element(
|
||||||
|
By.CLASS_NAME, "pf-c-login__main-footer-links-item-link"
|
||||||
|
).click()
|
||||||
|
|
||||||
|
# Now we should be at the IDP, wait for the login field
|
||||||
|
self.wait.until(ec.presence_of_element_located((By.ID, "login")))
|
||||||
|
self.driver.find_element(By.ID, "login").send_keys("admin@example.com")
|
||||||
|
self.driver.find_element(By.ID, "password").send_keys("password")
|
||||||
|
self.driver.find_element(By.ID, "password").send_keys(Keys.ENTER)
|
||||||
|
|
||||||
|
# Wait until we're logged in
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located((By.CSS_SELECTOR, "button[type=submit]"))
|
||||||
|
)
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "button[type=submit]").click()
|
||||||
|
|
||||||
|
# At this point we've been redirected back
|
||||||
|
# and we're asked for the username
|
||||||
|
self.driver.find_element(By.NAME, "username").click()
|
||||||
|
self.driver.find_element(By.NAME, "username").send_keys("foo")
|
||||||
|
self.driver.find_element(By.NAME, "username").send_keys(Keys.ENTER)
|
||||||
|
|
||||||
|
# Wait until we've loaded the user info page
|
||||||
|
self.wait.until(ec.presence_of_element_located((By.LINK_TEXT, "foo")))
|
||||||
|
self.driver.find_element(By.LINK_TEXT, "foo").click()
|
||||||
|
|
||||||
|
self.wait_for_url(self.url("passbook_core:user-settings"))
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/-/user/')]").text,
|
||||||
|
"foo",
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_username").get_attribute("value"), "foo"
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_name").get_attribute("value"), "admin",
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_email").get_attribute("value"),
|
||||||
|
"admin@example.com",
|
||||||
|
)
|
||||||
|
|
||||||
|
def test_oauth_enroll_auth(self):
|
||||||
|
"""test OAuth Source With With OIDC (enroll and authenticate again)"""
|
||||||
|
self.test_oauth_enroll()
|
||||||
|
# We're logged in at the end of this, log out and re-login
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "[aria-label=logout]").click()
|
||||||
|
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located(
|
||||||
|
(By.CLASS_NAME, "pf-c-login__main-footer-links-item-link")
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.driver.find_element(
|
||||||
|
By.CLASS_NAME, "pf-c-login__main-footer-links-item-link"
|
||||||
|
).click()
|
||||||
|
|
||||||
|
# Now we should be at the IDP, wait for the login field
|
||||||
|
self.wait.until(ec.presence_of_element_located((By.ID, "login")))
|
||||||
|
self.driver.find_element(By.ID, "login").send_keys("admin@example.com")
|
||||||
|
self.driver.find_element(By.ID, "password").send_keys("password")
|
||||||
|
self.driver.find_element(By.ID, "password").send_keys(Keys.ENTER)
|
||||||
|
|
||||||
|
# Wait until we're logged in
|
||||||
|
self.wait.until(
|
||||||
|
ec.presence_of_element_located((By.CSS_SELECTOR, "button[type=submit]"))
|
||||||
|
)
|
||||||
|
self.driver.find_element(By.CSS_SELECTOR, "button[type=submit]").click()
|
||||||
|
|
||||||
|
# Wait until we've loaded the user info page
|
||||||
|
self.wait.until(ec.presence_of_element_located((By.LINK_TEXT, "foo")))
|
||||||
|
self.driver.find_element(By.LINK_TEXT, "foo").click()
|
||||||
|
|
||||||
|
self.wait_for_url(self.url("passbook_core:user-settings"))
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.XPATH, "//a[contains(@href, '/-/user/')]").text,
|
||||||
|
"foo",
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_username").get_attribute("value"), "foo"
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_name").get_attribute("value"), "admin",
|
||||||
|
)
|
||||||
|
self.assertEqual(
|
||||||
|
self.driver.find_element(By.ID, "id_email").get_attribute("value"),
|
||||||
|
"admin@example.com",
|
||||||
|
)
|
99
e2e/utils.py
Normal file
@ -0,0 +1,99 @@
|
|||||||
|
"""passbook e2e testing utilities"""
|
||||||
|
from functools import lru_cache
|
||||||
|
from glob import glob
|
||||||
|
from importlib.util import module_from_spec, spec_from_file_location
|
||||||
|
from inspect import getmembers, isfunction
|
||||||
|
from os import environ, makedirs
|
||||||
|
from time import time
|
||||||
|
|
||||||
|
from django.apps import apps
|
||||||
|
from django.contrib.staticfiles.testing import StaticLiveServerTestCase
|
||||||
|
from django.db import connection, transaction
|
||||||
|
from django.db.utils import IntegrityError
|
||||||
|
from django.shortcuts import reverse
|
||||||
|
from selenium import webdriver
|
||||||
|
from selenium.webdriver.common.desired_capabilities import DesiredCapabilities
|
||||||
|
from selenium.webdriver.remote.webdriver import WebDriver
|
||||||
|
from selenium.webdriver.support.ui import WebDriverWait
|
||||||
|
from structlog import get_logger
|
||||||
|
|
||||||
|
from passbook.core.models import User
|
||||||
|
|
||||||
|
|
||||||
|
@lru_cache
|
||||||
|
# pylint: disable=invalid-name
|
||||||
|
def USER() -> User: # noqa
|
||||||
|
"""Cached function that always returns pbadmin"""
|
||||||
|
return User.objects.get(username="pbadmin")
|
||||||
|
|
||||||
|
|
||||||
|
class SeleniumTestCase(StaticLiveServerTestCase):
|
||||||
|
"""StaticLiveServerTestCase which automatically creates a Webdriver instance"""
|
||||||
|
|
||||||
|
def setUp(self):
|
||||||
|
super().setUp()
|
||||||
|
makedirs("selenium_screenshots/", exist_ok=True)
|
||||||
|
self.driver = self._get_driver()
|
||||||
|
self.driver.maximize_window()
|
||||||
|
self.driver.implicitly_wait(30)
|
||||||
|
self.wait = WebDriverWait(self.driver, 50)
|
||||||
|
self.apply_default_data()
|
||||||
|
self.logger = get_logger()
|
||||||
|
|
||||||
|
def _get_driver(self) -> WebDriver:
|
||||||
|
return webdriver.Remote(
|
||||||
|
command_executor="http://localhost:4444/wd/hub",
|
||||||
|
desired_capabilities=DesiredCapabilities.CHROME,
|
||||||
|
)
|
||||||
|
|
||||||
|
def tearDown(self):
|
||||||
|
if "TF_BUILD" in environ:
|
||||||
|
screenshot_file = (
|
||||||
|
f"selenium_screenshots/{self.__class__.__name__}_{time()}.png"
|
||||||
|
)
|
||||||
|
self.driver.save_screenshot(screenshot_file)
|
||||||
|
self.logger.warning("Saved screenshot", file=screenshot_file)
|
||||||
|
for line in self.driver.get_log("browser"):
|
||||||
|
self.logger.warning(
|
||||||
|
line["message"], source=line["source"], level=line["level"]
|
||||||
|
)
|
||||||
|
self.driver.quit()
|
||||||
|
super().tearDown()
|
||||||
|
|
||||||
|
def wait_for_url(self, desired_url):
|
||||||
|
"""Wait until URL is `desired_url`."""
|
||||||
|
self.wait.until(
|
||||||
|
lambda driver: driver.current_url == desired_url,
|
||||||
|
f"URL {self.driver.current_url} doesn't match expected URL {desired_url}",
|
||||||
|
)
|
||||||
|
|
||||||
|
def url(self, view, **kwargs) -> str:
|
||||||
|
"""reverse `view` with `**kwargs` into full URL using live_server_url"""
|
||||||
|
return self.live_server_url + reverse(view, kwargs=kwargs)
|
||||||
|
|
||||||
|
def apply_default_data(self):
|
||||||
|
"""apply objects created by migrations after tables have been truncated"""
|
||||||
|
# Find all migration files
|
||||||
|
# load all functions
|
||||||
|
migration_files = glob("**/migrations/*.py", recursive=True)
|
||||||
|
matches = []
|
||||||
|
for migration in migration_files:
|
||||||
|
with open(migration, "r+") as migration_file:
|
||||||
|
# Check if they have a `RunPython`
|
||||||
|
if "RunPython" in migration_file.read():
|
||||||
|
matches.append(migration)
|
||||||
|
|
||||||
|
with connection.schema_editor() as schema_editor:
|
||||||
|
for match in matches:
|
||||||
|
# Load module from file path
|
||||||
|
spec = spec_from_file_location("", match)
|
||||||
|
migration_module = module_from_spec(spec)
|
||||||
|
# pyright: reportGeneralTypeIssues=false
|
||||||
|
spec.loader.exec_module(migration_module)
|
||||||
|
# Call all functions from module
|
||||||
|
for _, func in getmembers(migration_module, isfunction):
|
||||||
|
with transaction.atomic():
|
||||||
|
try:
|
||||||
|
func(apps, schema_editor)
|
||||||
|
except IntegrityError:
|
||||||
|
pass
|
9
helm/Chart.lock
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
dependencies:
|
||||||
|
- name: postgresql
|
||||||
|
repository: https://charts.bitnami.com/bitnami
|
||||||
|
version: 9.3.2
|
||||||
|
- name: redis
|
||||||
|
repository: https://charts.bitnami.com/bitnami
|
||||||
|
version: 10.7.16
|
||||||
|
digest: sha256:fd31e2e2b9ff17a5ed906a77a4f15ffa1ab7f5aecaea1e5db77f0d199ae4f19e
|
||||||
|
generated: "2020-08-25T17:57:49.684549+02:00"
|
15
helm/Chart.yaml
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
apiVersion: v2
|
||||||
|
appVersion: "0.10.0-rc6"
|
||||||
|
description: A Helm chart for passbook.
|
||||||
|
name: passbook
|
||||||
|
version: "0.10.0-rc6"
|
||||||
|
icon: https://github.com/BeryJu/passbook/blob/master/passbook/static/static/passbook/logo.svg
|
||||||
|
dependencies:
|
||||||
|
- name: postgresql
|
||||||
|
version: 9.3.2
|
||||||
|
repository: https://charts.bitnami.com/bitnami
|
||||||
|
condition: install.postgresql
|
||||||
|
- name: redis
|
||||||
|
version: 10.7.16
|
||||||
|
repository: https://charts.bitnami.com/bitnami
|
||||||
|
condition: install.redis
|