299 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			299 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
"""test OpenID Provider flow"""
 | 
						|
from time import sleep
 | 
						|
 | 
						|
from django.shortcuts import reverse
 | 
						|
from oauth2_provider.generators import generate_client_id, generate_client_secret
 | 
						|
from oidc_provider.models import Client, ResponseType
 | 
						|
from selenium.webdriver.common.by import By
 | 
						|
from selenium.webdriver.common.keys import Keys
 | 
						|
from selenium.webdriver.support import expected_conditions as ec
 | 
						|
 | 
						|
from docker import DockerClient, from_env
 | 
						|
from docker.models.containers import Container
 | 
						|
from docker.types import Healthcheck
 | 
						|
from e2e.utils import USER, SeleniumTestCase, ensure_rsa_key
 | 
						|
from passbook.core.models import Application
 | 
						|
from passbook.flows.models import Flow
 | 
						|
from passbook.policies.expression.models import ExpressionPolicy
 | 
						|
from passbook.policies.models import PolicyBinding
 | 
						|
from passbook.providers.oidc.models import OpenIDProvider
 | 
						|
 | 
						|
 | 
						|
class TestProviderOIDC(SeleniumTestCase):
 | 
						|
    """test OpenID Provider flow"""
 | 
						|
 | 
						|
    def setUp(self):
 | 
						|
        self.client_id = generate_client_id()
 | 
						|
        self.client_secret = generate_client_secret()
 | 
						|
        self.container = self.setup_client()
 | 
						|
        super().setUp()
 | 
						|
 | 
						|
    def setup_client(self) -> Container:
 | 
						|
        """Setup client grafana container which we test OIDC against"""
 | 
						|
        client: DockerClient = from_env()
 | 
						|
        container = client.containers.run(
 | 
						|
            image="grafana/grafana:7.1.0",
 | 
						|
            detach=True,
 | 
						|
            network_mode="host",
 | 
						|
            auto_remove=True,
 | 
						|
            healthcheck=Healthcheck(
 | 
						|
                test=["CMD", "wget", "--spider", "http://localhost:3000"],
 | 
						|
                interval=5 * 100 * 1000000,
 | 
						|
                start_period=1 * 100 * 1000000,
 | 
						|
            ),
 | 
						|
            environment={
 | 
						|
                "GF_AUTH_GENERIC_OAUTH_ENABLED": "true",
 | 
						|
                "GF_AUTH_GENERIC_OAUTH_CLIENT_ID": self.client_id,
 | 
						|
                "GF_AUTH_GENERIC_OAUTH_CLIENT_SECRET": self.client_secret,
 | 
						|
                "GF_AUTH_GENERIC_OAUTH_SCOPES": "openid email profile",
 | 
						|
                "GF_AUTH_GENERIC_OAUTH_AUTH_URL": (
 | 
						|
                    self.live_server_url + reverse("passbook_providers_oidc:authorize")
 | 
						|
                ),
 | 
						|
                "GF_AUTH_GENERIC_OAUTH_TOKEN_URL": (
 | 
						|
                    self.live_server_url + reverse("oidc_provider:token")
 | 
						|
                ),
 | 
						|
                "GF_AUTH_GENERIC_OAUTH_API_URL": (
 | 
						|
                    self.live_server_url + reverse("oidc_provider:userinfo")
 | 
						|
                ),
 | 
						|
                "GF_LOG_LEVEL": "debug",
 | 
						|
            },
 | 
						|
        )
 | 
						|
        while True:
 | 
						|
            container.reload()
 | 
						|
            status = container.attrs.get("State", {}).get("Health", {}).get("Status")
 | 
						|
            if status == "healthy":
 | 
						|
                return container
 | 
						|
            sleep(1)
 | 
						|
 | 
						|
    def tearDown(self):
 | 
						|
        self.container.kill()
 | 
						|
        super().tearDown()
 | 
						|
 | 
						|
    def test_redirect_uri_error(self):
 | 
						|
        """test OpenID Provider flow (invalid redirect URI, check error message)"""
 | 
						|
        sleep(1)
 | 
						|
        # Bootstrap all needed objects
 | 
						|
        authorization_flow = Flow.objects.get(
 | 
						|
            slug="default-provider-authorization-implicit-consent"
 | 
						|
        )
 | 
						|
        client = Client.objects.create(
 | 
						|
            name="grafana",
 | 
						|
            client_type="confidential",
 | 
						|
            client_id=self.client_id,
 | 
						|
            client_secret=self.client_secret,
 | 
						|
            _redirect_uris="http://localhost:3000/",
 | 
						|
            _scope="openid userinfo",
 | 
						|
        )
 | 
						|
        # At least one of these objects must exist
 | 
						|
        ensure_rsa_key()
 | 
						|
        # This response_code object might exist or not, depending on the order the tests are run
 | 
						|
        rp_type, _ = ResponseType.objects.get_or_create(value="code")
 | 
						|
        client.response_types.set([rp_type])
 | 
						|
        client.save()
 | 
						|
        provider = OpenIDProvider.objects.create(
 | 
						|
            oidc_client=client, authorization_flow=authorization_flow,
 | 
						|
        )
 | 
						|
        Application.objects.create(
 | 
						|
            name="Grafana", slug="grafana", provider=provider,
 | 
						|
        )
 | 
						|
 | 
						|
        self.driver.get("http://localhost:3000")
 | 
						|
        self.driver.find_element(By.CLASS_NAME, "btn-service--oauth").click()
 | 
						|
        self.driver.find_element(By.ID, "id_uid_field").click()
 | 
						|
        self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
 | 
						|
        self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
 | 
						|
        self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
 | 
						|
        self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
 | 
						|
        sleep(2)
 | 
						|
        self.assertEqual(
 | 
						|
            self.driver.find_element(By.CLASS_NAME, "pf-c-title").text,
 | 
						|
            "Redirect URI Error",
 | 
						|
        )
 | 
						|
 | 
						|
    def test_authorization_consent_implied(self):
 | 
						|
        """test OpenID Provider flow (default authorization flow with implied consent)"""
 | 
						|
        sleep(1)
 | 
						|
        # Bootstrap all needed objects
 | 
						|
        authorization_flow = Flow.objects.get(
 | 
						|
            slug="default-provider-authorization-implicit-consent"
 | 
						|
        )
 | 
						|
        client = Client.objects.create(
 | 
						|
            name="grafana",
 | 
						|
            client_type="confidential",
 | 
						|
            client_id=self.client_id,
 | 
						|
            client_secret=self.client_secret,
 | 
						|
            _redirect_uris="http://localhost:3000/login/generic_oauth",
 | 
						|
            _scope="openid profile email",
 | 
						|
            reuse_consent=False,
 | 
						|
            require_consent=False,
 | 
						|
        )
 | 
						|
        # At least one of these objects must exist
 | 
						|
        ensure_rsa_key()
 | 
						|
        # This response_code object might exist or not, depending on the order the tests are run
 | 
						|
        rp_type, _ = ResponseType.objects.get_or_create(value="code")
 | 
						|
        client.response_types.set([rp_type])
 | 
						|
        client.save()
 | 
						|
        provider = OpenIDProvider.objects.create(
 | 
						|
            oidc_client=client, authorization_flow=authorization_flow,
 | 
						|
        )
 | 
						|
        Application.objects.create(
 | 
						|
            name="Grafana", slug="grafana", provider=provider,
 | 
						|
        )
 | 
						|
 | 
						|
        self.driver.get("http://localhost:3000")
 | 
						|
        self.driver.find_element(By.CLASS_NAME, "btn-service--oauth").click()
 | 
						|
        self.driver.find_element(By.ID, "id_uid_field").click()
 | 
						|
        self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
 | 
						|
        self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
 | 
						|
        self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
 | 
						|
        self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
 | 
						|
        self.driver.find_element(By.XPATH, "//a[contains(@href, '/profile')]").click()
 | 
						|
        self.assertEqual(
 | 
						|
            self.driver.find_element(By.CLASS_NAME, "page-header__title").text,
 | 
						|
            USER().name,
 | 
						|
        )
 | 
						|
        self.assertEqual(
 | 
						|
            self.driver.find_element(By.CSS_SELECTOR, "input[name=name]").get_attribute(
 | 
						|
                "value"
 | 
						|
            ),
 | 
						|
            USER().name,
 | 
						|
        )
 | 
						|
        self.assertEqual(
 | 
						|
            self.driver.find_element(
 | 
						|
                By.CSS_SELECTOR, "input[name=email]"
 | 
						|
            ).get_attribute("value"),
 | 
						|
            USER().email,
 | 
						|
        )
 | 
						|
        self.assertEqual(
 | 
						|
            self.driver.find_element(
 | 
						|
                By.CSS_SELECTOR, "input[name=login]"
 | 
						|
            ).get_attribute("value"),
 | 
						|
            USER().email,
 | 
						|
        )
 | 
						|
 | 
						|
    def test_authorization_consent_explicit(self):
 | 
						|
        """test OpenID Provider flow (default authorization flow with explicit consent)"""
 | 
						|
        sleep(1)
 | 
						|
        # Bootstrap all needed objects
 | 
						|
        authorization_flow = Flow.objects.get(
 | 
						|
            slug="default-provider-authorization-explicit-consent"
 | 
						|
        )
 | 
						|
        client = Client.objects.create(
 | 
						|
            name="grafana",
 | 
						|
            client_type="confidential",
 | 
						|
            client_id=self.client_id,
 | 
						|
            client_secret=self.client_secret,
 | 
						|
            _redirect_uris="http://localhost:3000/login/generic_oauth",
 | 
						|
            _scope="openid profile email",
 | 
						|
            reuse_consent=False,
 | 
						|
            require_consent=False,
 | 
						|
        )
 | 
						|
        # At least one of these objects must exist
 | 
						|
        ensure_rsa_key()
 | 
						|
        # This response_code object might exist or not, depending on the order the tests are run
 | 
						|
        rp_type, _ = ResponseType.objects.get_or_create(value="code")
 | 
						|
        client.response_types.set([rp_type])
 | 
						|
        client.save()
 | 
						|
        provider = OpenIDProvider.objects.create(
 | 
						|
            oidc_client=client, authorization_flow=authorization_flow,
 | 
						|
        )
 | 
						|
        app = Application.objects.create(
 | 
						|
            name="Grafana", slug="grafana", provider=provider,
 | 
						|
        )
 | 
						|
 | 
						|
        self.driver.get("http://localhost:3000")
 | 
						|
        self.driver.find_element(By.CLASS_NAME, "btn-service--oauth").click()
 | 
						|
        self.driver.find_element(By.ID, "id_uid_field").click()
 | 
						|
        self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
 | 
						|
        self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
 | 
						|
        self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
 | 
						|
        self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
 | 
						|
 | 
						|
        self.assertIn(
 | 
						|
            app.name,
 | 
						|
            self.driver.find_element(
 | 
						|
                By.XPATH, "/html/body/div[2]/div/main/div/form/div[2]/p[1]"
 | 
						|
            ).text,
 | 
						|
        )
 | 
						|
        self.wait.until(
 | 
						|
            ec.presence_of_element_located((By.CSS_SELECTOR, "[type=submit]"))
 | 
						|
        )
 | 
						|
        sleep(1)
 | 
						|
        self.driver.find_element(By.CSS_SELECTOR, "[type=submit]").click()
 | 
						|
 | 
						|
        self.wait.until(
 | 
						|
            ec.presence_of_element_located(
 | 
						|
                (By.XPATH, "//a[contains(@href, '/profile')]")
 | 
						|
            )
 | 
						|
        )
 | 
						|
        self.driver.find_element(By.XPATH, "//a[contains(@href, '/profile')]").click()
 | 
						|
        self.assertEqual(
 | 
						|
            self.driver.find_element(By.CLASS_NAME, "page-header__title").text,
 | 
						|
            USER().name,
 | 
						|
        )
 | 
						|
        self.assertEqual(
 | 
						|
            self.driver.find_element(By.CSS_SELECTOR, "input[name=name]").get_attribute(
 | 
						|
                "value"
 | 
						|
            ),
 | 
						|
            USER().name,
 | 
						|
        )
 | 
						|
        self.assertEqual(
 | 
						|
            self.driver.find_element(
 | 
						|
                By.CSS_SELECTOR, "input[name=email]"
 | 
						|
            ).get_attribute("value"),
 | 
						|
            USER().email,
 | 
						|
        )
 | 
						|
        self.assertEqual(
 | 
						|
            self.driver.find_element(
 | 
						|
                By.CSS_SELECTOR, "input[name=login]"
 | 
						|
            ).get_attribute("value"),
 | 
						|
            USER().email,
 | 
						|
        )
 | 
						|
 | 
						|
    def test_authorization_denied(self):
 | 
						|
        """test OpenID Provider flow (default authorization with access deny)"""
 | 
						|
        sleep(1)
 | 
						|
        # Bootstrap all needed objects
 | 
						|
        authorization_flow = Flow.objects.get(
 | 
						|
            slug="default-provider-authorization-explicit-consent"
 | 
						|
        )
 | 
						|
        client = Client.objects.create(
 | 
						|
            name="grafana",
 | 
						|
            client_type="confidential",
 | 
						|
            client_id=self.client_id,
 | 
						|
            client_secret=self.client_secret,
 | 
						|
            _redirect_uris="http://localhost:3000/login/generic_oauth",
 | 
						|
            _scope="openid profile email",
 | 
						|
            reuse_consent=False,
 | 
						|
            require_consent=False,
 | 
						|
        )
 | 
						|
        # At least one of these objects must exist
 | 
						|
        ensure_rsa_key()
 | 
						|
        # This response_code object might exist or not, depending on the order the tests are run
 | 
						|
        rp_type, _ = ResponseType.objects.get_or_create(value="code")
 | 
						|
        client.response_types.set([rp_type])
 | 
						|
        client.save()
 | 
						|
        provider = OpenIDProvider.objects.create(
 | 
						|
            oidc_client=client, authorization_flow=authorization_flow,
 | 
						|
        )
 | 
						|
        app = Application.objects.create(
 | 
						|
            name="Grafana", slug="grafana", provider=provider,
 | 
						|
        )
 | 
						|
 | 
						|
        negative_policy = ExpressionPolicy.objects.create(
 | 
						|
            name="negative-static", expression="return False"
 | 
						|
        )
 | 
						|
        PolicyBinding.objects.create(target=app, policy=negative_policy, order=0)
 | 
						|
        self.driver.get("http://localhost:3000")
 | 
						|
        self.driver.find_element(By.CLASS_NAME, "btn-service--oauth").click()
 | 
						|
        self.driver.find_element(By.ID, "id_uid_field").click()
 | 
						|
        self.driver.find_element(By.ID, "id_uid_field").send_keys(USER().username)
 | 
						|
        self.driver.find_element(By.ID, "id_uid_field").send_keys(Keys.ENTER)
 | 
						|
        self.driver.find_element(By.ID, "id_password").send_keys(USER().username)
 | 
						|
        self.driver.find_element(By.ID, "id_password").send_keys(Keys.ENTER)
 | 
						|
        self.wait_for_url(self.url("passbook_flows:denied"))
 | 
						|
        self.assertEqual(
 | 
						|
            self.driver.find_element(By.CSS_SELECTOR, "header > h1").text,
 | 
						|
            "Permission denied",
 | 
						|
        )
 |