fe7f23238c
* core: initial migration to /if Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * core: move jsi18n to api Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests: fix static URLs in tests Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * web: add new html files to rollup Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * web: fix rollup config and nginx config Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * core: add Impersonation support to user API Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * web: add banner for impersonation Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * tests: fix test_user function for new User API Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * flows: add background to API Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * web: set background from flow API Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * core: make root view login_required for redirect Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * flows: redirect to root-redirect instead of if-admin direct Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * api: add header to prevent Authorization Basic prompt in browser Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * web: redirect to root when user/me request fails Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
157 lines
5.8 KiB
Python
157 lines
5.8 KiB
Python
"""test flow with otp stages"""
|
|
from base64 import b32decode
|
|
from sys import platform
|
|
from time import sleep
|
|
from unittest.case import skipUnless
|
|
from urllib.parse import parse_qs, urlparse
|
|
|
|
from django_otp.oath import TOTP
|
|
from django_otp.plugins.otp_static.models import StaticDevice, StaticToken
|
|
from django_otp.plugins.otp_totp.models import TOTPDevice
|
|
from selenium.webdriver.common.by import By
|
|
from selenium.webdriver.common.keys import Keys
|
|
from selenium.webdriver.support import expected_conditions as ec
|
|
from selenium.webdriver.support.wait import WebDriverWait
|
|
|
|
from authentik.flows.models import Flow, FlowStageBinding
|
|
from authentik.stages.authenticator_static.models import AuthenticatorStaticStage
|
|
from authentik.stages.authenticator_totp.models import AuthenticatorTOTPStage
|
|
from authentik.stages.authenticator_validate.models import AuthenticatorValidateStage
|
|
from tests.e2e.utils import USER, SeleniumTestCase, apply_migration, retry
|
|
|
|
|
|
@skipUnless(platform.startswith("linux"), "requires local docker")
|
|
class TestFlowsAuthenticator(SeleniumTestCase):
|
|
"""test flow with otp stages"""
|
|
|
|
@retry()
|
|
@apply_migration("authentik_core", "0003_default_user")
|
|
@apply_migration("authentik_flows", "0008_default_flows")
|
|
def test_totp_validate(self):
|
|
"""test flow with otp stages"""
|
|
sleep(1)
|
|
# Setup TOTP Device
|
|
user = USER()
|
|
device = TOTPDevice.objects.create(user=user, confirmed=True, digits=6)
|
|
|
|
flow: Flow = Flow.objects.get(slug="default-authentication-flow")
|
|
FlowStageBinding.objects.create(
|
|
target=flow, order=30, stage=AuthenticatorValidateStage.objects.create()
|
|
)
|
|
|
|
self.driver.get(self.url("authentik_core:if-flow", flow_slug=flow.slug))
|
|
self.login()
|
|
|
|
# Get expected token
|
|
totp = TOTP(device.bin_key, device.step, device.t0, device.digits, device.drift)
|
|
|
|
flow_executor = self.get_shadow_root("ak-flow-executor")
|
|
validation_stage = self.get_shadow_root(
|
|
"ak-stage-authenticator-validate", flow_executor
|
|
)
|
|
code_stage = self.get_shadow_root(
|
|
"ak-stage-authenticator-validate-code", validation_stage
|
|
)
|
|
|
|
code_stage.find_element(By.CSS_SELECTOR, "input[name=code]").send_keys(
|
|
totp.token()
|
|
)
|
|
code_stage.find_element(By.CSS_SELECTOR, "input[name=code]").send_keys(
|
|
Keys.ENTER
|
|
)
|
|
self.wait_for_url(self.if_admin_url("/library"))
|
|
self.assert_user(USER())
|
|
|
|
@retry()
|
|
@apply_migration("authentik_core", "0003_default_user")
|
|
@apply_migration("authentik_flows", "0008_default_flows")
|
|
@apply_migration("authentik_stages_authenticator_totp", "0006_default_setup_flow")
|
|
def test_totp_setup(self):
|
|
"""test TOTP Setup stage"""
|
|
flow: Flow = Flow.objects.get(slug="default-authentication-flow")
|
|
|
|
self.driver.get(self.url("authentik_core:if-flow", flow_slug=flow.slug))
|
|
self.login()
|
|
|
|
self.wait_for_url(self.if_admin_url("/library"))
|
|
self.assert_user(USER())
|
|
|
|
self.driver.get(
|
|
self.url(
|
|
"authentik_flows:configure",
|
|
stage_uuid=AuthenticatorTOTPStage.objects.first().stage_uuid,
|
|
)
|
|
)
|
|
|
|
flow_executor = self.get_shadow_root("ak-flow-executor")
|
|
totp_stage = self.get_shadow_root("ak-stage-authenticator-totp", flow_executor)
|
|
wait = WebDriverWait(totp_stage, self.wait_timeout)
|
|
|
|
wait.until(
|
|
ec.presence_of_element_located((By.CSS_SELECTOR, "input[name=otp_uri]"))
|
|
)
|
|
otp_uri = totp_stage.find_element(
|
|
By.CSS_SELECTOR, "input[name=otp_uri]"
|
|
).get_attribute("value")
|
|
|
|
# Parse the OTP URI, extract the secret and get the next token
|
|
otp_args = urlparse(otp_uri)
|
|
self.assertEqual(otp_args.scheme, "otpauth")
|
|
otp_qs = parse_qs(otp_args.query)
|
|
secret_key = b32decode(otp_qs["secret"][0])
|
|
|
|
totp = TOTP(secret_key)
|
|
|
|
totp_stage.find_element(By.CSS_SELECTOR, "input[name=code]").send_keys(
|
|
totp.token()
|
|
)
|
|
totp_stage.find_element(By.CSS_SELECTOR, "input[name=code]").send_keys(
|
|
Keys.ENTER
|
|
)
|
|
sleep(3)
|
|
|
|
self.assertTrue(TOTPDevice.objects.filter(user=USER(), confirmed=True).exists())
|
|
|
|
@retry()
|
|
@apply_migration("authentik_core", "0003_default_user")
|
|
@apply_migration("authentik_flows", "0008_default_flows")
|
|
@apply_migration("authentik_stages_authenticator_static", "0005_default_setup_flow")
|
|
def test_static_setup(self):
|
|
"""test Static OTP Setup stage"""
|
|
flow: Flow = Flow.objects.get(slug="default-authentication-flow")
|
|
|
|
self.driver.get(self.url("authentik_core:if-flow", flow_slug=flow.slug))
|
|
self.login()
|
|
|
|
self.wait_for_url(self.if_admin_url("/library"))
|
|
self.assert_user(USER())
|
|
|
|
self.driver.get(
|
|
self.url(
|
|
"authentik_flows:configure",
|
|
stage_uuid=AuthenticatorStaticStage.objects.first().stage_uuid,
|
|
)
|
|
)
|
|
|
|
# Remember the current URL as we should end up back here
|
|
destination_url = self.driver.current_url
|
|
|
|
flow_executor = self.get_shadow_root("ak-flow-executor")
|
|
authenticator_stage = self.get_shadow_root(
|
|
"ak-stage-authenticator-static", flow_executor
|
|
)
|
|
token = authenticator_stage.find_element(
|
|
By.CSS_SELECTOR, ".ak-otp-tokens li:nth-child(1)"
|
|
).text
|
|
|
|
authenticator_stage.find_element(By.CSS_SELECTOR, "button[type=submit]").click()
|
|
|
|
self.wait_for_url(destination_url)
|
|
sleep(1)
|
|
|
|
self.assertTrue(
|
|
StaticDevice.objects.filter(user=USER(), confirmed=True).exists()
|
|
)
|
|
device = StaticDevice.objects.filter(user=USER(), confirmed=True).first()
|
|
self.assertTrue(StaticToken.objects.filter(token=token, device=device).exists())
|