299 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			299 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| """test OpenID Provider flow"""
 | |
| from time import sleep
 | |
| 
 | |
| from django.shortcuts import reverse
 | |
| from oauth2_provider.generators import generate_client_id, generate_client_secret
 | |
| from oidc_provider.models import Client, ResponseType
 | |
| from selenium.webdriver.common.by import By
 | |
| from selenium.webdriver.common.keys import Keys
 | |
| from selenium.webdriver.support import expected_conditions as ec
 | |
| 
 | |
| from docker import DockerClient, from_env
 | |
| from docker.models.containers import Container
 | |
| from docker.types import Healthcheck
 | |
| from e2e.utils import USER, SeleniumTestCase, ensure_rsa_key
 | |
| from passbook.core.models import Application
 | |
| from passbook.flows.models import Flow
 | |
| from passbook.policies.expression.models import ExpressionPolicy
 | |
| from passbook.policies.models import PolicyBinding
 | |
| from passbook.providers.oidc.models import OpenIDProvider
 | |
| 
 | |
| 
 | |
| class TestProviderOIDC(SeleniumTestCase):
 | |
|     """test OpenID Provider flow"""
 | |
| 
 | |
|     def setUp(self):
 | |
|         self.client_id = generate_client_id()
 | |
|         self.client_secret = generate_client_secret()
 | |
|         self.container = self.setup_client()
 | |
|         super().setUp()
 | |
| 
 | |
|     def setup_client(self) -> Container:
 | |
|         """Setup client grafana container which we test OIDC against"""
 | |
|         client: DockerClient = from_env()
 | |
|         container = client.containers.run(
 | |
|             image="grafana/grafana:7.1.0",
 | |
|             detach=True,
 | |
|             network_mode="host",
 | |
|             auto_remove=True,
 | |
|             healthcheck=Healthcheck(
 | |
|                 test=["CMD", "wget", "--spider", "http://localhost:3000"],
 | |
|                 interval=5 * 100 * 1000000,
 | |
|                 start_period=1 * 100 * 1000000,
 | |
|             ),
 | |
|             environment={
 | |
|                 "GF_AUTH_GENERIC_OAUTH_ENABLED": "true",
 | |
|                 "GF_AUTH_GENERIC_OAUTH_CLIENT_ID": self.client_id,
 | |
|                 "GF_AUTH_GENERIC_OAUTH_CLIENT_SECRET": self.client_secret,
 | |
|                 "GF_AUTH_GENERIC_OAUTH_SCOPES": "openid email profile",
 | |
|                 "GF_AUTH_GENERIC_OAUTH_AUTH_URL": (
 | |
|                     self.live_server_url + reverse("passbook_providers_oidc:authorize")
 | |
|                 ),
 | |
|                 "GF_AUTH_GENERIC_OAUTH_TOKEN_URL": (
 | |
|                     self.live_server_url + reverse("oidc_provider:token")
 | |
|                 ),
 | |
|                 "GF_AUTH_GENERIC_OAUTH_API_URL": (
 | |
|                     self.live_server_url + reverse("oidc_provider:userinfo")
 | |
|                 ),
 | |
|                 "GF_LOG_LEVEL": "debug",
 | |
|             },
 | |
|         )
 | |
|         while True:
 | |
|             container.reload()
 | |
|             status = container.attrs.get("State", {}).get("Health", {}).get("Status")
 | |
|             if status == "healthy":
 | |
|                 return container
 | |
|             sleep(1)
 | |
| 
 | |
|     def tearDown(self):
 | |
|         self.container.kill()
 | |
|         super().tearDown()
 | |
| 
 | |
|     def test_redirect_uri_error(self):
 | |
|         """test OpenID Provider flow (invalid redirect URI, check error message)"""
 | |
|         sleep(1)
 | |
|         # Bootstrap all needed objects
 | |
|         authorization_flow = Flow.objects.get(
 | |
|             slug="default-provider-authorization-implicit-consent"
 | |
|         )
 | |
|         client = Client.objects.create(
 | |
|             name="grafana",
 | |
|             client_type="confidential",
 | |
|             client_id=self.client_id,
 | |
|             client_secret=self.client_secret,
 | |
|             _redirect_uris="http://localhost:3000/",
 | |
|             _scope="openid userinfo",
 | |
|         )
 | |
|         # At least one of these objects must exist
 | |
|         ensure_rsa_key()
 | |
|         # This response_code object might exist or not, depending on the order the tests are run
 | |
|         rp_type, _ = ResponseType.objects.get_or_create(value="code")
 | |
|         client.response_types.set([rp_type])
 | |
|         client.save()
 | |
|         provider = OpenIDProvider.objects.create(
 | |
|             oidc_client=client, authorization_flow=authorization_flow,
 | |
|         )
 | |
|         Application.objects.create(
 | |
|             name="Grafana", slug="grafana", provider=provider,
 | |
|         )
 | |
| 
 | |
|         self.driver.get("http://localhost:3000")
 | |
|         self.driver.find_element(By.CLASS_NAME, "btn-service--oauth").click()
 | |
|         self.driver.find_element(By.ID, "id_uid_field").click()
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
 | |
|         sleep(2)
 | |
|         self.assertEqual(
 | |
|             self.driver.find_element(By.CLASS_NAME, "pf-c-title").text,
 | |
|             "Redirect URI Error",
 | |
|         )
 | |
| 
 | |
|     def test_authorization_consent_implied(self):
 | |
|         """test OpenID Provider flow (default authorization flow with implied consent)"""
 | |
|         sleep(1)
 | |
|         # Bootstrap all needed objects
 | |
|         authorization_flow = Flow.objects.get(
 | |
|             slug="default-provider-authorization-implicit-consent"
 | |
|         )
 | |
|         client = Client.objects.create(
 | |
|             name="grafana",
 | |
|             client_type="confidential",
 | |
|             client_id=self.client_id,
 | |
|             client_secret=self.client_secret,
 | |
|             _redirect_uris="http://localhost:3000/login/generic_oauth",
 | |
|             _scope="openid profile email",
 | |
|             reuse_consent=False,
 | |
|             require_consent=False,
 | |
|         )
 | |
|         # At least one of these objects must exist
 | |
|         ensure_rsa_key()
 | |
|         # This response_code object might exist or not, depending on the order the tests are run
 | |
|         rp_type, _ = ResponseType.objects.get_or_create(value="code")
 | |
|         client.response_types.set([rp_type])
 | |
|         client.save()
 | |
|         provider = OpenIDProvider.objects.create(
 | |
|             oidc_client=client, authorization_flow=authorization_flow,
 | |
|         )
 | |
|         Application.objects.create(
 | |
|             name="Grafana", slug="grafana", provider=provider,
 | |
|         )
 | |
| 
 | |
|         self.driver.get("http://localhost:3000")
 | |
|         self.driver.find_element(By.CLASS_NAME, "btn-service--oauth").click()
 | |
|         self.driver.find_element(By.ID, "id_uid_field").click()
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
 | |
|         self.driver.find_element(By.XPATH, "//a[contains(@href, '/profile')]").click()
 | |
|         self.assertEqual(
 | |
|             self.driver.find_element(By.CLASS_NAME, "page-header__title").text,
 | |
|             USER().name,
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             self.driver.find_element(By.CSS_SELECTOR, "input[name=name]").get_attribute(
 | |
|                 "value"
 | |
|             ),
 | |
|             USER().name,
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             self.driver.find_element(
 | |
|                 By.CSS_SELECTOR, "input[name=email]"
 | |
|             ).get_attribute("value"),
 | |
|             USER().email,
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             self.driver.find_element(
 | |
|                 By.CSS_SELECTOR, "input[name=login]"
 | |
|             ).get_attribute("value"),
 | |
|             USER().email,
 | |
|         )
 | |
| 
 | |
|     def test_authorization_consent_explicit(self):
 | |
|         """test OpenID Provider flow (default authorization flow with explicit consent)"""
 | |
|         sleep(1)
 | |
|         # Bootstrap all needed objects
 | |
|         authorization_flow = Flow.objects.get(
 | |
|             slug="default-provider-authorization-explicit-consent"
 | |
|         )
 | |
|         client = Client.objects.create(
 | |
|             name="grafana",
 | |
|             client_type="confidential",
 | |
|             client_id=self.client_id,
 | |
|             client_secret=self.client_secret,
 | |
|             _redirect_uris="http://localhost:3000/login/generic_oauth",
 | |
|             _scope="openid profile email",
 | |
|             reuse_consent=False,
 | |
|             require_consent=False,
 | |
|         )
 | |
|         # At least one of these objects must exist
 | |
|         ensure_rsa_key()
 | |
|         # This response_code object might exist or not, depending on the order the tests are run
 | |
|         rp_type, _ = ResponseType.objects.get_or_create(value="code")
 | |
|         client.response_types.set([rp_type])
 | |
|         client.save()
 | |
|         provider = OpenIDProvider.objects.create(
 | |
|             oidc_client=client, authorization_flow=authorization_flow,
 | |
|         )
 | |
|         app = Application.objects.create(
 | |
|             name="Grafana", slug="grafana", provider=provider,
 | |
|         )
 | |
| 
 | |
|         self.driver.get("http://localhost:3000")
 | |
|         self.driver.find_element(By.CLASS_NAME, "btn-service--oauth").click()
 | |
|         self.driver.find_element(By.ID, "id_uid_field").click()
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
 | |
| 
 | |
|         self.assertIn(
 | |
|             app.name,
 | |
|             self.driver.find_element(
 | |
|                 By.XPATH, "/html/body/div[2]/div/main/div/form/div[2]/p[1]"
 | |
|             ).text,
 | |
|         )
 | |
|         self.wait.until(
 | |
|             ec.presence_of_element_located((By.CSS_SELECTOR, "[type=submit]"))
 | |
|         )
 | |
|         sleep(1)
 | |
|         self.driver.find_element(By.CSS_SELECTOR, "[type=submit]").click()
 | |
| 
 | |
|         self.wait.until(
 | |
|             ec.presence_of_element_located(
 | |
|                 (By.XPATH, "//a[contains(@href, '/profile')]")
 | |
|             )
 | |
|         )
 | |
|         self.driver.find_element(By.XPATH, "//a[contains(@href, '/profile')]").click()
 | |
|         self.assertEqual(
 | |
|             self.driver.find_element(By.CLASS_NAME, "page-header__title").text,
 | |
|             USER().name,
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             self.driver.find_element(By.CSS_SELECTOR, "input[name=name]").get_attribute(
 | |
|                 "value"
 | |
|             ),
 | |
|             USER().name,
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             self.driver.find_element(
 | |
|                 By.CSS_SELECTOR, "input[name=email]"
 | |
|             ).get_attribute("value"),
 | |
|             USER().email,
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             self.driver.find_element(
 | |
|                 By.CSS_SELECTOR, "input[name=login]"
 | |
|             ).get_attribute("value"),
 | |
|             USER().email,
 | |
|         )
 | |
| 
 | |
|     def test_authorization_denied(self):
 | |
|         """test OpenID Provider flow (default authorization with access deny)"""
 | |
|         sleep(1)
 | |
|         # Bootstrap all needed objects
 | |
|         authorization_flow = Flow.objects.get(
 | |
|             slug="default-provider-authorization-explicit-consent"
 | |
|         )
 | |
|         client = Client.objects.create(
 | |
|             name="grafana",
 | |
|             client_type="confidential",
 | |
|             client_id=self.client_id,
 | |
|             client_secret=self.client_secret,
 | |
|             _redirect_uris="http://localhost:3000/login/generic_oauth",
 | |
|             _scope="openid profile email",
 | |
|             reuse_consent=False,
 | |
|             require_consent=False,
 | |
|         )
 | |
|         # At least one of these objects must exist
 | |
|         ensure_rsa_key()
 | |
|         # This response_code object might exist or not, depending on the order the tests are run
 | |
|         rp_type, _ = ResponseType.objects.get_or_create(value="code")
 | |
|         client.response_types.set([rp_type])
 | |
|         client.save()
 | |
|         provider = OpenIDProvider.objects.create(
 | |
|             oidc_client=client, authorization_flow=authorization_flow,
 | |
|         )
 | |
|         app = Application.objects.create(
 | |
|             name="Grafana", slug="grafana", provider=provider,
 | |
|         )
 | |
| 
 | |
|         negative_policy = ExpressionPolicy.objects.create(
 | |
|             name="negative-static", expression="return False"
 | |
|         )
 | |
|         PolicyBinding.objects.create(target=app, policy=negative_policy, order=0)
 | |
|         self.driver.get("http://localhost:3000")
 | |
|         self.driver.find_element(By.CLASS_NAME, "btn-service--oauth").click()
 | |
|         self.driver.find_element(By.ID, "id_uid_field").click()
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
 | |
|         self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
 | |
|         self.wait_for_url(self.url("passbook_flows:denied"))
 | |
|         self.assertEqual(
 | |
|             self.driver.find_element(By.CSS_SELECTOR, "header > h1").text,
 | |
|             "Permission denied",
 | |
|         )
 | 
