 89f251d559
			
		
	
	89f251d559
	
	
	
		
			
			* add nginx forward_auth e2e tests Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add envoy Signed-off-by: Jens Langhammer <jens@goauthentik.io> * cleanup Signed-off-by: Jens Langhammer <jens@goauthentik.io> * remove even more duplicate code Signed-off-by: Jens Langhammer <jens@goauthentik.io> * cleanup more Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add traefik static config Signed-off-by: Jens Langhammer <jens@goauthentik.io> * more cleanup, don't generate dex config cause they support env variables Signed-off-by: Jens Langhammer <jens@goauthentik.io> * use default dex entrypoint to use templating Signed-off-by: Jens Langhammer <jens@goauthentik.io> * remove options that are always set as default Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix compose flag Signed-off-by: Jens Langhammer <jens@goauthentik.io> * add caddy Signed-off-by: Jens Langhammer <jens@goauthentik.io> * merge python files Signed-off-by: Jens Langhammer <jens@goauthentik.io> * use whoami api to check better Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix envoy config Signed-off-by: Jens Langhammer <jens@goauthentik.io> * set invalidation flow Signed-off-by: Jens Langhammer <jens@goauthentik.io> * fix logout checks Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			109 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			109 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| """Radius e2e tests"""
 | |
| 
 | |
| from dataclasses import asdict
 | |
| from time import sleep
 | |
| 
 | |
| from pyrad.client import Client
 | |
| from pyrad.dictionary import Dictionary
 | |
| from pyrad.packet import AccessAccept, AccessReject, AccessRequest
 | |
| 
 | |
| from authentik.blueprints.tests import apply_blueprint
 | |
| from authentik.core.models import Application, User
 | |
| from authentik.flows.models import Flow
 | |
| from authentik.lib.generators import generate_id, generate_key
 | |
| from authentik.outposts.models import Outpost, OutpostConfig, OutpostType
 | |
| from authentik.providers.radius.models import RadiusProvider
 | |
| from tests.e2e.utils import SeleniumTestCase, retry
 | |
| 
 | |
| 
 | |
| class TestProviderRadius(SeleniumTestCase):
 | |
|     """Radius Outpost e2e tests"""
 | |
| 
 | |
|     def setUp(self):
 | |
|         super().setUp()
 | |
|         self.shared_secret = generate_key()
 | |
| 
 | |
|     def start_radius(self, outpost: Outpost):
 | |
|         """Start radius container based on outpost created"""
 | |
|         self.run_container(
 | |
|             image=self.get_container_image("ghcr.io/goauthentik/dev-radius"),
 | |
|             ports={"1812/udp": "1812/udp"},
 | |
|             environment={
 | |
|                 "AUTHENTIK_TOKEN": outpost.token.key,
 | |
|             },
 | |
|         )
 | |
| 
 | |
|     def _prepare(self) -> User:
 | |
|         """prepare user, provider, app and container"""
 | |
|         radius: RadiusProvider = RadiusProvider.objects.create(
 | |
|             name=generate_id(),
 | |
|             authorization_flow=Flow.objects.get(slug="default-authentication-flow"),
 | |
|             shared_secret=self.shared_secret,
 | |
|         )
 | |
|         # we need to create an application to actually access radius
 | |
|         Application.objects.create(name="radius", slug=generate_id(), provider=radius)
 | |
|         outpost: Outpost = Outpost.objects.create(
 | |
|             name=generate_id(),
 | |
|             type=OutpostType.RADIUS,
 | |
|             _config=asdict(OutpostConfig(log_level="debug")),
 | |
|         )
 | |
|         outpost.providers.add(radius)
 | |
| 
 | |
|         self.start_radius(outpost)
 | |
| 
 | |
|         # Wait until outpost healthcheck succeeds
 | |
|         healthcheck_retries = 0
 | |
|         while healthcheck_retries < 50:  # noqa: PLR2004
 | |
|             if len(outpost.state) > 0:
 | |
|                 state = outpost.state[0]
 | |
|                 if state.last_seen:
 | |
|                     break
 | |
|             healthcheck_retries += 1
 | |
|             sleep(0.5)
 | |
|         sleep(5)
 | |
|         return outpost
 | |
| 
 | |
|     @retry()
 | |
|     @apply_blueprint(
 | |
|         "default/flow-default-authentication-flow.yaml",
 | |
|         "default/flow-default-invalidation-flow.yaml",
 | |
|     )
 | |
|     def test_radius_bind_success(self):
 | |
|         """Test simple bind"""
 | |
|         self._prepare()
 | |
|         srv = Client(
 | |
|             server="localhost",
 | |
|             secret=self.shared_secret.encode(),
 | |
|             dict=Dictionary("authentik/providers/radius/dictionaries/dictionary"),
 | |
|         )
 | |
| 
 | |
|         req = srv.CreateAuthPacket(
 | |
|             code=AccessRequest, User_Name=self.user.username, NAS_Identifier="localhost"
 | |
|         )
 | |
|         req["User-Password"] = req.PwCrypt(self.user.username)
 | |
| 
 | |
|         reply = srv.SendPacket(req)
 | |
|         self.assertEqual(reply.code, AccessAccept)
 | |
| 
 | |
|     @retry()
 | |
|     @apply_blueprint(
 | |
|         "default/flow-default-authentication-flow.yaml",
 | |
|         "default/flow-default-invalidation-flow.yaml",
 | |
|     )
 | |
|     def test_radius_bind_fail(self):
 | |
|         """Test simple bind (failed)"""
 | |
|         self._prepare()
 | |
|         srv = Client(
 | |
|             server="localhost",
 | |
|             secret=self.shared_secret.encode(),
 | |
|             dict=Dictionary("authentik/providers/radius/dictionaries/dictionary"),
 | |
|         )
 | |
| 
 | |
|         req = srv.CreateAuthPacket(
 | |
|             code=AccessRequest, User_Name=self.user.username, NAS_Identifier="localhost"
 | |
|         )
 | |
|         req["User-Password"] = req.PwCrypt(self.user.username + "foo")
 | |
| 
 | |
|         reply = srv.SendPacket(req)
 | |
|         self.assertEqual(reply.code, AccessReject)
 |