 1cfe1aff13
			
		
	
	1cfe1aff13
	
	
	
		
			
			* root: initial rename * web: rename custom element prefix * root: rename external functions with pb_ prefix * root: fix formatting * root: replace domain with goauthentik.io * proxy: update path * root: rename remaining prefixes * flows: rename file extension * root: pbadmin -> akadmin * docs: fix image filenames * lifecycle: ignore migration files * ci: copy default config from current source before loading last tagged * *: new sentry dsn * tests: fix missing python3.9-dev package * root: add additional migrations for service accounts created by outposts * core: mark system-created service accounts with attribute * policies/expression: fix pb_ replacement not working * web: fix last linting errors, add lit-analyse * policies/expressions: fix lint errors * web: fix sidebar display on screens where not all items fit * proxy: attempt to fix proxy pipeline * proxy: use go env GOPATH to get gopath * lib: fix user_default naming inconsistency * docs: add upgrade docs * docs: update screenshots to use authentik * admin: fix create button on empty-state of outpost * web: fix modal submit not refreshing SiteShell and Table * web: fix height of app-card and height of generic icon * web: fix rendering of subtext * admin: fix version check error not being caught * web: fix worker count not being shown * docs: update screenshots * root: new icon * web: fix lint error * admin: fix linting error * root: migrate coverage config to pyproject
		
			
				
	
	
		
			136 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			136 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| """test flow with otp stages"""
 | |
| from base64 import b32decode
 | |
| from sys import platform
 | |
| from time import sleep
 | |
| from unittest.case import skipUnless
 | |
| from urllib.parse import parse_qs, urlparse
 | |
| 
 | |
| from django_otp.oath import TOTP
 | |
| from django_otp.plugins.otp_static.models import StaticDevice, StaticToken
 | |
| from django_otp.plugins.otp_totp.models import TOTPDevice
 | |
| from selenium.webdriver.common.by import By
 | |
| from selenium.webdriver.common.keys import Keys
 | |
| from selenium.webdriver.support import expected_conditions as ec
 | |
| 
 | |
| from authentik.flows.models import Flow, FlowStageBinding
 | |
| from authentik.stages.otp_static.models import OTPStaticStage
 | |
| from authentik.stages.otp_time.models import OTPTimeStage
 | |
| from authentik.stages.otp_validate.models import OTPValidateStage
 | |
| from tests.e2e.utils import USER, SeleniumTestCase, retry
 | |
| 
 | |
| 
 | |
| @skipUnless(platform.startswith("linux"), "requires local docker")
 | |
| class TestFlowsOTP(SeleniumTestCase):
 | |
|     """test flow with otp stages"""
 | |
| 
 | |
|     @retry()
 | |
|     def test_otp_validate(self):
 | |
|         """test flow with otp stages"""
 | |
|         sleep(1)
 | |
|         # Setup TOTP Device
 | |
|         user = USER()
 | |
|         device = TOTPDevice.objects.create(user=user, confirmed=True, digits=6)
 | |
| 
 | |
|         flow: Flow = Flow.objects.get(slug="default-authentication-flow")
 | |
|         # Move the user_login stage to order 3
 | |
|         FlowStageBinding.objects.filter(target=flow, order=2).update(order=3)
 | |
|         FlowStageBinding.objects.create(
 | |
|             target=flow, order=2, stage=OTPValidateStage.objects.create()
 | |
|         )
 | |
| 
 | |
|         self.driver.get(f"{self.live_server_url}/flows/{flow.slug}/")
 | |
|         self.driver.find_element(By.ID, "id_uid_field").click()
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
 | |
| 
 | |
|         # Get expected token
 | |
|         totp = TOTP(device.bin_key, device.step, device.t0, device.digits, device.drift)
 | |
|         self.driver.find_element(By.ID, "id_code").send_keys(totp.token())
 | |
|         self.driver.find_element(By.ID, "id_code").send_keys(Keys.ENTER)
 | |
|         self.wait_for_url(self.shell_url("authentik_core:overview"))
 | |
|         self.assert_user(USER())
 | |
| 
 | |
|     @retry()
 | |
|     def test_otp_totp_setup(self):
 | |
|         """test TOTP Setup stage"""
 | |
|         flow: Flow = Flow.objects.get(slug="default-authentication-flow")
 | |
| 
 | |
|         self.driver.get(f"{self.live_server_url}/flows/{flow.slug}/")
 | |
|         self.driver.find_element(By.ID, "id_uid_field").click()
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
 | |
|         self.wait_for_url(self.shell_url("authentik_core:overview"))
 | |
|         self.assert_user(USER())
 | |
| 
 | |
|         self.driver.get(
 | |
|             self.url(
 | |
|                 "authentik_flows:configure",
 | |
|                 stage_uuid=OTPTimeStage.objects.first().stage_uuid,
 | |
|             )
 | |
|         )
 | |
| 
 | |
|         # Remember the current URL as we should end up back here
 | |
|         destination_url = self.driver.current_url
 | |
| 
 | |
|         self.wait.until(ec.presence_of_element_located((By.ID, "qr")))
 | |
|         otp_uri = self.driver.find_element(By.ID, "qr").get_attribute("data-otpuri")
 | |
| 
 | |
|         # Parse the OTP URI, extract the secret and get the next token
 | |
|         otp_args = urlparse(otp_uri)
 | |
|         self.assertEqual(otp_args.scheme, "otpauth")
 | |
|         otp_qs = parse_qs(otp_args.query)
 | |
|         secret_key = b32decode(otp_qs["secret"][0])
 | |
| 
 | |
|         totp = TOTP(secret_key)
 | |
| 
 | |
|         self.driver.find_element(By.ID, "id_code").send_keys(totp.token())
 | |
|         self.driver.find_element(By.ID, "id_code").send_keys(Keys.ENTER)
 | |
| 
 | |
|         self.wait_for_url(destination_url)
 | |
|         sleep(1)
 | |
| 
 | |
|         self.assertTrue(TOTPDevice.objects.filter(user=USER(), confirmed=True).exists())
 | |
| 
 | |
|     @retry()
 | |
|     def test_otp_static_setup(self):
 | |
|         """test Static OTP Setup stage"""
 | |
|         flow: Flow = Flow.objects.get(slug="default-authentication-flow")
 | |
| 
 | |
|         self.driver.get(f"{self.live_server_url}/flows/{flow.slug}/")
 | |
|         self.driver.find_element(By.ID, "id_uid_field").click()
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
 | |
|         self.wait_for_url(self.shell_url("authentik_core:overview"))
 | |
|         self.assert_user(USER())
 | |
| 
 | |
|         self.driver.get(
 | |
|             self.url(
 | |
|                 "authentik_flows:configure",
 | |
|                 stage_uuid=OTPStaticStage.objects.first().stage_uuid,
 | |
|             )
 | |
|         )
 | |
| 
 | |
|         # Remember the current URL as we should end up back here
 | |
|         destination_url = self.driver.current_url
 | |
| 
 | |
|         token = self.driver.find_element(
 | |
|             By.CSS_SELECTOR, ".ak-otp-tokens li:nth-child(1)"
 | |
|         ).text
 | |
| 
 | |
|         self.driver.find_element(By.CSS_SELECTOR, "button[type=submit]").click()
 | |
| 
 | |
|         self.wait_for_url(destination_url)
 | |
|         sleep(1)
 | |
| 
 | |
|         self.assertTrue(
 | |
|             StaticDevice.objects.filter(user=USER(), confirmed=True).exists()
 | |
|         )
 | |
|         device = StaticDevice.objects.filter(user=USER(), confirmed=True).first()
 | |
|         self.assertTrue(StaticToken.objects.filter(token=token, device=device).exists())
 |