* tenants -> brands, init new tenant model, migrate some config to tenants Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * setup logging for tenants Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * configure celery and cache Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * small fixes, runs Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * task fixes, creation of tenant now works by cloning a template schema, some other small stuff Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix-tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * upstream fixes Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix-pylint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix avatar tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * migrate config reputation_expiry as well Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix web rebase Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix migrations for template schema Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix migrations for template schema Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix migrations for template schema 3 Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * revert reputation expiry migration Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix type Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix some more tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * website: tenants -> brands Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * try fixing e2e tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * start frontend :help: Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * add ability to disable tenants api Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * delete embedded outpost if it is disabled Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * make sure embedded outpost is disabled when tenants are enabled Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * management commands: add --schema option where relevant Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * store files per-tenant Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix embedded outpost deletion Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix files migration Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * add tenant api tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * add domain tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * add settings tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * make --schema-name default to public in mgmt commands Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * sources/ldap: make sure lock is per-tenant Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix stuff I broke Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix remaining failing tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * try fixing e2e tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * much better frontend, but save does not refresh form properly Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * update django-tenants with latest fixes Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * i18n-extract Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * review comments Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * move event_retention from brands to tenants Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * wip Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * root: add support for storing media files in S3 Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * use permissions for settings api Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * blueprints: disable tenants management Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix embedded outpost create/delete logic Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * make gen Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * make sure prometheus metrics are correctly served Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * makefile: don't delete the go api client when not regenerating it Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * tenants api: add recovery group and token creation endpoints Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix startup Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix prometheus metrics Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix web stuff Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix migrations from stable Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix oauth source type import Signed-off-by: Jens Langhammer <jens@goauthentik.io> * Revert "fix oauth source type import" This reverts commitd015fd0244. * try with setting_changed signal Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * try with connection_created signal Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix scim tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix web after merge Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix enterprise settings Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * Revert "try with connection_created signal" This reverts commit764a999db8. * Revert "try with setting_changed signal" This reverts commit32b40a3bbb. * lib/expression: refactor expression compilation Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix django version Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix web after merge Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * relock poetry Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix reconcile Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * try running tenant save in a transaction Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * black Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * test: export postgres logs for debugging and use failfast Signed-off-by: Jens Langhammer <jens@goauthentik.io> * test: fix container name for logs Signed-off-by: Jens Langhammer <jens@goauthentik.io> * do not copy tenant data Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * Revert "try running tenant save in a transaction" This reverts commitda6dec5a61. * Revert "do not copy tenant data" This reverts commit d07ae9423672f068b0bd8be409ff9b58452a80f2. * Revert "Revert "do not copy tenant data"" This reverts commit4bffb19704. * fix clone with nodata Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * why not Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * remove failfast Signed-off-by: Jens Langhammer <jens@goauthentik.io> * remove postgres query logging Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update reconcile logic to clearly differentiate between tenant and global Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix reconcile app decorator Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * enable django checks Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * actually nodata was unnecessary as we're cloning from template and not from public Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * pylint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * update django-tenants with sequence fix Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * actually update Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix e2e tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * add tests for settings api Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * add tests for recovery api Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * recovery tests: do them on a new tenant Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * web: fix system status being degraded when embedded outpost is disabled Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix recovery tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix tenants tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint-fix Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint-fix Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * update UI Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add management command to create a tenant Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add docs Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * release notes Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * more docs Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * checklist Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * self review Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * spelling Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * make web after upgrading Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * remove extra xlif file Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * prettier Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * Revert "add management command to create a tenant" This reverts commit39d13c0447. * split api into smaller files, only import urls when tenants is enabled Signed-off-by: Jens Langhammer <jens@goauthentik.io> * rewite some things on the release notes Signed-off-by: Jens Langhammer <jens@goauthentik.io> * root: make sure install_id comes from public schema Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * require a license to use tenants Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * lint Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix tenants tests Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * fix files migration Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * release notes: add warning about user sessions being invalidated Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> * remove api disabled test, we can't test for it Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> --------- Signed-off-by: Marc 'risson' Schmitt <marc.schmitt@risson.space> Signed-off-by: Jens Langhammer <jens@goauthentik.io> Co-authored-by: Jens Langhammer <jens@goauthentik.io>
434 lines
16 KiB
Python
434 lines
16 KiB
Python
"""LDAP and Outpost e2e tests"""
|
|
from dataclasses import asdict
|
|
from time import sleep
|
|
|
|
from docker.client import DockerClient, from_env
|
|
from docker.models.containers import Container
|
|
from guardian.shortcuts import get_anonymous_user
|
|
from ldap3 import ALL, ALL_ATTRIBUTES, ALL_OPERATIONAL_ATTRIBUTES, SUBTREE, Connection, Server
|
|
from ldap3.core.exceptions import LDAPInvalidCredentialsResult
|
|
|
|
from authentik.blueprints.tests import apply_blueprint, reconcile_app
|
|
from authentik.core.models import Application, User
|
|
from authentik.events.models import Event, EventAction
|
|
from authentik.flows.models import Flow
|
|
from authentik.lib.generators import generate_id
|
|
from authentik.outposts.apps import MANAGED_OUTPOST
|
|
from authentik.outposts.models import Outpost, OutpostConfig, OutpostType
|
|
from authentik.providers.ldap.models import APIAccessMode, LDAPProvider
|
|
from tests.e2e.utils import SeleniumTestCase, retry
|
|
|
|
|
|
class TestProviderLDAP(SeleniumTestCase):
|
|
"""LDAP and Outpost e2e tests"""
|
|
|
|
ldap_container: Container
|
|
|
|
def tearDown(self) -> None:
|
|
super().tearDown()
|
|
self.output_container_logs(self.ldap_container)
|
|
self.ldap_container.kill()
|
|
|
|
def start_ldap(self, outpost: Outpost) -> Container:
|
|
"""Start ldap container based on outpost created"""
|
|
client: DockerClient = from_env()
|
|
container = client.containers.run(
|
|
image=self.get_container_image("ghcr.io/goauthentik/dev-ldap"),
|
|
detach=True,
|
|
ports={
|
|
"3389": "3389",
|
|
"6636": "6636",
|
|
},
|
|
environment={
|
|
"AUTHENTIK_HOST": self.live_server_url,
|
|
"AUTHENTIK_TOKEN": outpost.token.key,
|
|
},
|
|
)
|
|
return container
|
|
|
|
def _prepare(self) -> User:
|
|
"""prepare user, provider, app and container"""
|
|
self.user.attributes["extraAttribute"] = "bar"
|
|
self.user.save()
|
|
|
|
ldap: LDAPProvider = LDAPProvider.objects.create(
|
|
name=generate_id(),
|
|
authorization_flow=Flow.objects.get(slug="default-authentication-flow"),
|
|
search_group=self.user.ak_groups.first(),
|
|
search_mode=APIAccessMode.CACHED,
|
|
)
|
|
# we need to create an application to actually access the ldap
|
|
Application.objects.create(name=generate_id(), slug=generate_id(), provider=ldap)
|
|
outpost: Outpost = Outpost.objects.create(
|
|
name=generate_id(),
|
|
type=OutpostType.LDAP,
|
|
_config=asdict(OutpostConfig(log_level="debug")),
|
|
)
|
|
outpost.providers.add(ldap)
|
|
|
|
self.ldap_container = self.start_ldap(outpost)
|
|
|
|
# Wait until outpost healthcheck succeeds
|
|
healthcheck_retries = 0
|
|
while healthcheck_retries < 50:
|
|
if len(outpost.state) > 0:
|
|
state = outpost.state[0]
|
|
if state.last_seen:
|
|
break
|
|
healthcheck_retries += 1
|
|
sleep(0.5)
|
|
sleep(5)
|
|
return outpost
|
|
|
|
@retry()
|
|
@apply_blueprint(
|
|
"default/flow-default-authentication-flow.yaml",
|
|
"default/flow-default-invalidation-flow.yaml",
|
|
)
|
|
def test_ldap_bind_success(self):
|
|
"""Test simple bind"""
|
|
self._prepare()
|
|
server = Server("ldap://localhost:3389", get_info=ALL)
|
|
_connection = Connection(
|
|
server,
|
|
raise_exceptions=True,
|
|
user=f"cn={self.user.username},ou=users,DC=ldap,DC=goauthentik,DC=io",
|
|
password=self.user.username,
|
|
)
|
|
_connection.bind()
|
|
self.assertTrue(
|
|
Event.objects.filter(
|
|
action=EventAction.LOGIN,
|
|
user={
|
|
"pk": self.user.pk,
|
|
"email": self.user.email,
|
|
"username": self.user.username,
|
|
},
|
|
)
|
|
)
|
|
|
|
@retry()
|
|
@apply_blueprint(
|
|
"default/flow-default-authentication-flow.yaml",
|
|
"default/flow-default-invalidation-flow.yaml",
|
|
)
|
|
def test_ldap_bind_success_ssl(self):
|
|
"""Test simple bind with ssl"""
|
|
self._prepare()
|
|
server = Server("ldaps://localhost:6636", get_info=ALL)
|
|
_connection = Connection(
|
|
server,
|
|
raise_exceptions=True,
|
|
user=f"cn={self.user.username},ou=users,DC=ldap,DC=goauthentik,DC=io",
|
|
password=self.user.username,
|
|
)
|
|
_connection.bind()
|
|
self.assertTrue(
|
|
Event.objects.filter(
|
|
action=EventAction.LOGIN,
|
|
user={
|
|
"pk": self.user.pk,
|
|
"email": self.user.email,
|
|
"username": self.user.username,
|
|
},
|
|
)
|
|
)
|
|
|
|
@retry()
|
|
@apply_blueprint(
|
|
"default/flow-default-authentication-flow.yaml",
|
|
"default/flow-default-invalidation-flow.yaml",
|
|
)
|
|
def test_ldap_bind_success_starttls(self):
|
|
"""Test simple bind with ssl"""
|
|
self._prepare()
|
|
server = Server("ldap://localhost:3389")
|
|
_connection = Connection(
|
|
server,
|
|
raise_exceptions=True,
|
|
user=f"cn={self.user.username},ou=users,DC=ldap,DC=goauthentik,DC=io",
|
|
password=self.user.username,
|
|
)
|
|
_connection.start_tls()
|
|
_connection.bind()
|
|
self.assertTrue(
|
|
Event.objects.filter(
|
|
action=EventAction.LOGIN,
|
|
user={
|
|
"pk": self.user.pk,
|
|
"email": self.user.email,
|
|
"username": self.user.username,
|
|
},
|
|
)
|
|
)
|
|
|
|
@retry()
|
|
@apply_blueprint(
|
|
"default/flow-default-authentication-flow.yaml",
|
|
"default/flow-default-invalidation-flow.yaml",
|
|
)
|
|
def test_ldap_bind_fail(self):
|
|
"""Test simple bind (failed)"""
|
|
self._prepare()
|
|
server = Server("ldap://localhost:3389", get_info=ALL)
|
|
_connection = Connection(
|
|
server,
|
|
raise_exceptions=True,
|
|
user=f"cn={self.user.username},ou=users,DC=ldap,DC=goauthentik,DC=io",
|
|
password=self.user.username + "fqwerwqer",
|
|
)
|
|
with self.assertRaises(LDAPInvalidCredentialsResult):
|
|
_connection.bind()
|
|
anon = get_anonymous_user()
|
|
self.assertTrue(
|
|
Event.objects.filter(
|
|
action=EventAction.LOGIN_FAILED,
|
|
user={"pk": anon.pk, "email": anon.email, "username": anon.username},
|
|
).exists(),
|
|
)
|
|
|
|
@retry()
|
|
@apply_blueprint(
|
|
"default/flow-default-authentication-flow.yaml",
|
|
"default/flow-default-invalidation-flow.yaml",
|
|
)
|
|
@reconcile_app("authentik_tenants")
|
|
@reconcile_app("authentik_outposts")
|
|
def test_ldap_bind_search(self):
|
|
"""Test simple bind + search"""
|
|
# Remove akadmin to ensure list is correct
|
|
# Remove user before starting container so it's not cached
|
|
User.objects.filter(username="akadmin").delete()
|
|
|
|
outpost = self._prepare()
|
|
server = Server("ldap://localhost:3389", get_info=ALL)
|
|
_connection = Connection(
|
|
server,
|
|
raise_exceptions=True,
|
|
user=f"cn={self.user.username},ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
password=self.user.username,
|
|
)
|
|
_connection.bind()
|
|
self.assertTrue(
|
|
Event.objects.filter(
|
|
action=EventAction.LOGIN,
|
|
user={
|
|
"pk": self.user.pk,
|
|
"email": self.user.email,
|
|
"username": self.user.username,
|
|
},
|
|
)
|
|
)
|
|
|
|
embedded_account = Outpost.objects.filter(managed=MANAGED_OUTPOST).first().user
|
|
|
|
_connection.search(
|
|
"ou=Users,DC=ldaP,dc=goauthentik,dc=io",
|
|
"(objectClass=user)",
|
|
search_scope=SUBTREE,
|
|
attributes=[ALL_ATTRIBUTES, ALL_OPERATIONAL_ATTRIBUTES],
|
|
)
|
|
response: list = _connection.response
|
|
# Remove raw_attributes to make checking easier
|
|
for obj in response:
|
|
del obj["raw_attributes"]
|
|
del obj["raw_dn"]
|
|
obj["attributes"] = dict(obj["attributes"])
|
|
o_user = outpost.user
|
|
expected = [
|
|
{
|
|
"dn": f"cn={o_user.username},ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
"attributes": {
|
|
"cn": o_user.username,
|
|
"sAMAccountName": o_user.username,
|
|
"uid": o_user.uid,
|
|
"name": o_user.name,
|
|
"displayName": o_user.name,
|
|
"sn": o_user.name,
|
|
"mail": "",
|
|
"objectClass": [
|
|
"top",
|
|
"person",
|
|
"organizationalPerson",
|
|
"inetOrgPerson",
|
|
"user",
|
|
"posixAccount",
|
|
"goauthentik.io/ldap/user",
|
|
],
|
|
"uidNumber": 2000 + o_user.pk,
|
|
"gidNumber": 2000 + o_user.pk,
|
|
"memberOf": [],
|
|
"homeDirectory": f"/home/{o_user.username}",
|
|
"ak-active": True,
|
|
"ak-superuser": False,
|
|
},
|
|
"type": "searchResEntry",
|
|
},
|
|
{
|
|
"dn": f"cn={embedded_account.username},ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
"attributes": {
|
|
"cn": embedded_account.username,
|
|
"sAMAccountName": embedded_account.username,
|
|
"uid": embedded_account.uid,
|
|
"name": embedded_account.name,
|
|
"displayName": embedded_account.name,
|
|
"sn": embedded_account.name,
|
|
"mail": "",
|
|
"objectClass": [
|
|
"top",
|
|
"person",
|
|
"organizationalPerson",
|
|
"inetOrgPerson",
|
|
"user",
|
|
"posixAccount",
|
|
"goauthentik.io/ldap/user",
|
|
],
|
|
"uidNumber": 2000 + embedded_account.pk,
|
|
"gidNumber": 2000 + embedded_account.pk,
|
|
"memberOf": [],
|
|
"homeDirectory": f"/home/{embedded_account.username}",
|
|
"ak-active": True,
|
|
"ak-superuser": False,
|
|
},
|
|
"type": "searchResEntry",
|
|
},
|
|
{
|
|
"dn": f"cn={self.user.username},ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
"attributes": {
|
|
"cn": self.user.username,
|
|
"sAMAccountName": self.user.username,
|
|
"uid": self.user.uid,
|
|
"name": self.user.name,
|
|
"displayName": self.user.name,
|
|
"sn": self.user.name,
|
|
"mail": self.user.email,
|
|
"objectClass": [
|
|
"top",
|
|
"person",
|
|
"organizationalPerson",
|
|
"inetOrgPerson",
|
|
"user",
|
|
"posixAccount",
|
|
"goauthentik.io/ldap/user",
|
|
],
|
|
"uidNumber": 2000 + self.user.pk,
|
|
"gidNumber": 2000 + self.user.pk,
|
|
"memberOf": [
|
|
f"cn={group.name},ou=groups,dc=ldap,dc=goauthentik,dc=io"
|
|
for group in self.user.ak_groups.all()
|
|
],
|
|
"homeDirectory": f"/home/{self.user.username}",
|
|
"ak-active": True,
|
|
"ak-superuser": True,
|
|
"extraAttribute": ["bar"],
|
|
},
|
|
"type": "searchResEntry",
|
|
},
|
|
]
|
|
self.assert_list_dict_equal(expected, response)
|
|
|
|
def assert_list_dict_equal(self, expected: list[dict], actual: list[dict], match_key="dn"):
|
|
"""Assert a list of dictionaries is identical, ignoring the ordering of items"""
|
|
self.assertEqual(len(expected), len(actual))
|
|
for res_item in actual:
|
|
all_matching = [x for x in expected if x[match_key] == res_item[match_key]]
|
|
self.assertEqual(len(all_matching), 1)
|
|
matching = all_matching[0]
|
|
self.assertDictEqual(res_item, matching)
|
|
|
|
@retry()
|
|
@apply_blueprint(
|
|
"default/flow-default-authentication-flow.yaml",
|
|
"default/flow-default-invalidation-flow.yaml",
|
|
)
|
|
@reconcile_app("authentik_tenants")
|
|
@reconcile_app("authentik_outposts")
|
|
def test_ldap_schema(self):
|
|
"""Test LDAP Schema"""
|
|
self._prepare()
|
|
server = Server("ldap://localhost:3389", get_info=ALL)
|
|
_connection = Connection(
|
|
server,
|
|
raise_exceptions=True,
|
|
user=f"cn={self.user.username},ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
password=self.user.username,
|
|
)
|
|
_connection.bind()
|
|
self.assertIsNotNone(server.schema)
|
|
self.assertTrue(server.schema.is_valid())
|
|
self.assertIsNotNone(server.schema.object_classes["goauthentik.io/ldap/user"])
|
|
|
|
@retry()
|
|
@apply_blueprint(
|
|
"default/flow-default-authentication-flow.yaml",
|
|
"default/flow-default-invalidation-flow.yaml",
|
|
)
|
|
@reconcile_app("authentik_tenants")
|
|
@reconcile_app("authentik_outposts")
|
|
def test_ldap_search_attrs_filter(self):
|
|
"""Test search with attributes filtering"""
|
|
# Remove akadmin to ensure list is correct
|
|
# Remove user before starting container so it's not cached
|
|
User.objects.filter(username="akadmin").delete()
|
|
|
|
outpost = self._prepare()
|
|
server = Server("ldap://localhost:3389", get_info=ALL)
|
|
_connection = Connection(
|
|
server,
|
|
raise_exceptions=True,
|
|
user=f"cn={self.user.username},ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
password=self.user.username,
|
|
)
|
|
_connection.bind()
|
|
self.assertTrue(
|
|
Event.objects.filter(
|
|
action=EventAction.LOGIN,
|
|
user={
|
|
"pk": self.user.pk,
|
|
"email": self.user.email,
|
|
"username": self.user.username,
|
|
},
|
|
)
|
|
)
|
|
|
|
embedded_account = Outpost.objects.filter(managed=MANAGED_OUTPOST).first().user
|
|
|
|
_connection.search(
|
|
"ou=Users,DC=ldaP,dc=goauthentik,dc=io",
|
|
"(objectClass=user)",
|
|
search_scope=SUBTREE,
|
|
attributes=["cn"],
|
|
)
|
|
response: list = _connection.response
|
|
# Remove raw_attributes to make checking easier
|
|
for obj in response:
|
|
del obj["raw_attributes"]
|
|
del obj["raw_dn"]
|
|
o_user = outpost.user
|
|
self.assert_list_dict_equal(
|
|
[
|
|
{
|
|
"dn": f"cn={o_user.username},ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
"attributes": {
|
|
"cn": o_user.username,
|
|
},
|
|
"type": "searchResEntry",
|
|
},
|
|
{
|
|
"dn": f"cn={embedded_account.username},ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
"attributes": {
|
|
"cn": embedded_account.username,
|
|
},
|
|
"type": "searchResEntry",
|
|
},
|
|
{
|
|
"dn": f"cn={self.user.username},ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
"attributes": {
|
|
"cn": self.user.username,
|
|
},
|
|
"type": "searchResEntry",
|
|
},
|
|
],
|
|
response,
|
|
)
|