2021-07-01 09:51:00 +00:00
|
|
|
"""LDAP and Outpost e2e tests"""
|
|
|
|
from sys import platform
|
|
|
|
from time import sleep
|
|
|
|
from unittest.case import skipUnless
|
|
|
|
|
|
|
|
from docker.client import DockerClient, from_env
|
|
|
|
from docker.models.containers import Container
|
|
|
|
from guardian.shortcuts import get_anonymous_user
|
2021-08-03 15:45:16 +00:00
|
|
|
from ldap3 import ALL, ALL_ATTRIBUTES, ALL_OPERATIONAL_ATTRIBUTES, SUBTREE, Connection, Server
|
2021-07-18 20:43:35 +00:00
|
|
|
from ldap3.core.exceptions import LDAPInvalidCredentialsResult
|
2021-07-01 09:51:00 +00:00
|
|
|
|
|
|
|
from authentik.core.models import Application, Group, User
|
|
|
|
from authentik.events.models import Event, EventAction
|
|
|
|
from authentik.flows.models import Flow
|
2021-07-29 09:30:30 +00:00
|
|
|
from authentik.outposts.managed import MANAGED_OUTPOST
|
2021-07-01 09:51:00 +00:00
|
|
|
from authentik.outposts.models import Outpost, OutpostType
|
|
|
|
from authentik.providers.ldap.models import LDAPProvider
|
2021-10-03 21:04:59 +00:00
|
|
|
from tests.e2e.utils import USER, SeleniumTestCase, apply_migration, object_manager, retry
|
2021-07-01 09:51:00 +00:00
|
|
|
|
|
|
|
|
|
|
|
@skipUnless(platform.startswith("linux"), "requires local docker")
|
|
|
|
class TestProviderLDAP(SeleniumTestCase):
|
|
|
|
"""LDAP and Outpost e2e tests"""
|
|
|
|
|
|
|
|
ldap_container: Container
|
|
|
|
|
|
|
|
def tearDown(self) -> None:
|
|
|
|
super().tearDown()
|
|
|
|
self.output_container_logs(self.ldap_container)
|
|
|
|
self.ldap_container.kill()
|
|
|
|
|
|
|
|
def start_ldap(self, outpost: Outpost) -> Container:
|
|
|
|
"""Start ldap container based on outpost created"""
|
|
|
|
client: DockerClient = from_env()
|
|
|
|
container = client.containers.run(
|
2021-10-11 12:08:34 +00:00
|
|
|
image=self.get_container_image("ghcr.io/goauthentik/dev-ldap"),
|
2021-07-01 09:51:00 +00:00
|
|
|
detach=True,
|
|
|
|
network_mode="host",
|
|
|
|
auto_remove=True,
|
|
|
|
environment={
|
|
|
|
"AUTHENTIK_HOST": self.live_server_url,
|
|
|
|
"AUTHENTIK_TOKEN": outpost.token.key,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
return container
|
|
|
|
|
|
|
|
def _prepare(self) -> User:
|
|
|
|
"""prepare user, provider, app and container"""
|
|
|
|
# set additionalHeaders to test later
|
|
|
|
user = USER()
|
|
|
|
user.attributes["extraAttribute"] = "bar"
|
|
|
|
user.save()
|
|
|
|
|
|
|
|
ldap: LDAPProvider = LDAPProvider.objects.create(
|
|
|
|
name="ldap_provider",
|
|
|
|
authorization_flow=Flow.objects.get(slug="default-authentication-flow"),
|
|
|
|
search_group=Group.objects.first(),
|
|
|
|
)
|
|
|
|
# we need to create an application to actually access the ldap
|
|
|
|
Application.objects.create(name="ldap", slug="ldap", provider=ldap)
|
|
|
|
outpost: Outpost = Outpost.objects.create(
|
|
|
|
name="ldap_outpost",
|
|
|
|
type=OutpostType.LDAP,
|
|
|
|
)
|
|
|
|
outpost.providers.add(ldap)
|
|
|
|
outpost.save()
|
|
|
|
user = outpost.user
|
|
|
|
|
|
|
|
self.ldap_container = self.start_ldap(outpost)
|
|
|
|
|
|
|
|
# Wait until outpost healthcheck succeeds
|
|
|
|
healthcheck_retries = 0
|
|
|
|
while healthcheck_retries < 50:
|
|
|
|
if len(outpost.state) > 0:
|
|
|
|
state = outpost.state[0]
|
|
|
|
if state.last_seen:
|
|
|
|
break
|
|
|
|
healthcheck_retries += 1
|
|
|
|
sleep(0.5)
|
|
|
|
return user
|
|
|
|
|
|
|
|
@retry()
|
2021-10-11 19:39:35 +00:00
|
|
|
@apply_migration("authentik_core", "0002_auto_20200523_1133_squashed_0011_provider_name_temp")
|
2021-07-01 09:51:00 +00:00
|
|
|
@apply_migration("authentik_flows", "0008_default_flows")
|
|
|
|
@object_manager
|
|
|
|
def test_ldap_bind_success(self):
|
|
|
|
"""Test simple bind"""
|
|
|
|
self._prepare()
|
|
|
|
server = Server("ldap://localhost:3389", get_info=ALL)
|
|
|
|
_connection = Connection(
|
|
|
|
server,
|
|
|
|
raise_exceptions=True,
|
|
|
|
user=f"cn={USER().username},ou=users,DC=ldap,DC=goauthentik,DC=io",
|
|
|
|
password=USER().username,
|
|
|
|
)
|
|
|
|
_connection.bind()
|
2021-07-19 11:26:36 +00:00
|
|
|
self.assertTrue(
|
|
|
|
Event.objects.filter(
|
|
|
|
action=EventAction.LOGIN,
|
|
|
|
user={
|
|
|
|
"pk": USER().pk,
|
|
|
|
"email": USER().email,
|
|
|
|
"username": USER().username,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
@retry()
|
2021-10-11 19:39:35 +00:00
|
|
|
@apply_migration("authentik_core", "0002_auto_20200523_1133_squashed_0011_provider_name_temp")
|
2021-07-19 11:26:36 +00:00
|
|
|
@apply_migration("authentik_flows", "0008_default_flows")
|
|
|
|
@object_manager
|
|
|
|
def test_ldap_bind_success_ssl(self):
|
|
|
|
"""Test simple bind with ssl"""
|
|
|
|
self._prepare()
|
|
|
|
server = Server("ldaps://localhost:6636", get_info=ALL)
|
|
|
|
_connection = Connection(
|
|
|
|
server,
|
|
|
|
raise_exceptions=True,
|
|
|
|
user=f"cn={USER().username},ou=users,DC=ldap,DC=goauthentik,DC=io",
|
|
|
|
password=USER().username,
|
|
|
|
)
|
|
|
|
_connection.bind()
|
2021-07-01 09:51:00 +00:00
|
|
|
self.assertTrue(
|
|
|
|
Event.objects.filter(
|
|
|
|
action=EventAction.LOGIN,
|
|
|
|
user={
|
|
|
|
"pk": USER().pk,
|
|
|
|
"email": USER().email,
|
|
|
|
"username": USER().username,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
@retry()
|
2021-10-11 19:39:35 +00:00
|
|
|
@apply_migration("authentik_core", "0002_auto_20200523_1133_squashed_0011_provider_name_temp")
|
2021-07-01 09:51:00 +00:00
|
|
|
@apply_migration("authentik_flows", "0008_default_flows")
|
|
|
|
@object_manager
|
|
|
|
def test_ldap_bind_fail(self):
|
|
|
|
"""Test simple bind (failed)"""
|
|
|
|
self._prepare()
|
|
|
|
server = Server("ldap://localhost:3389", get_info=ALL)
|
|
|
|
_connection = Connection(
|
|
|
|
server,
|
|
|
|
raise_exceptions=True,
|
|
|
|
user=f"cn={USER().username},ou=users,DC=ldap,DC=goauthentik,DC=io",
|
|
|
|
password=USER().username + "fqwerwqer",
|
|
|
|
)
|
2021-07-18 20:43:35 +00:00
|
|
|
with self.assertRaises(LDAPInvalidCredentialsResult):
|
2021-07-01 09:51:00 +00:00
|
|
|
_connection.bind()
|
|
|
|
anon = get_anonymous_user()
|
|
|
|
self.assertTrue(
|
|
|
|
Event.objects.filter(
|
|
|
|
action=EventAction.LOGIN_FAILED,
|
|
|
|
user={"pk": anon.pk, "email": anon.email, "username": anon.username},
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
@retry()
|
2021-10-11 19:39:35 +00:00
|
|
|
@apply_migration("authentik_core", "0002_auto_20200523_1133_squashed_0011_provider_name_temp")
|
2021-07-01 09:51:00 +00:00
|
|
|
@apply_migration("authentik_flows", "0008_default_flows")
|
|
|
|
@object_manager
|
|
|
|
def test_ldap_bind_search(self):
|
|
|
|
"""Test simple bind + search"""
|
|
|
|
outpost_user = self._prepare()
|
|
|
|
server = Server("ldap://localhost:3389", get_info=ALL)
|
|
|
|
_connection = Connection(
|
|
|
|
server,
|
|
|
|
raise_exceptions=True,
|
|
|
|
user=f"cn={USER().username},ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
|
|
password=USER().username,
|
|
|
|
)
|
|
|
|
_connection.bind()
|
|
|
|
self.assertTrue(
|
|
|
|
Event.objects.filter(
|
|
|
|
action=EventAction.LOGIN,
|
|
|
|
user={
|
|
|
|
"pk": USER().pk,
|
|
|
|
"email": USER().email,
|
|
|
|
"username": USER().username,
|
|
|
|
},
|
|
|
|
)
|
|
|
|
)
|
2021-07-29 09:30:30 +00:00
|
|
|
|
|
|
|
embedded_account = Outpost.objects.filter(managed=MANAGED_OUTPOST).first().user
|
|
|
|
|
2021-07-01 09:51:00 +00:00
|
|
|
_connection.search(
|
|
|
|
"ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
|
|
"(objectClass=user)",
|
|
|
|
search_scope=SUBTREE,
|
|
|
|
attributes=[ALL_ATTRIBUTES, ALL_OPERATIONAL_ATTRIBUTES],
|
|
|
|
)
|
|
|
|
response = _connection.response
|
|
|
|
# Remove raw_attributes to make checking easier
|
|
|
|
for obj in response:
|
|
|
|
del obj["raw_attributes"]
|
|
|
|
del obj["raw_dn"]
|
|
|
|
self.assertCountEqual(
|
|
|
|
response,
|
|
|
|
[
|
|
|
|
{
|
|
|
|
"dn": f"cn={outpost_user.username},ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
|
|
"attributes": {
|
|
|
|
"cn": [outpost_user.username],
|
2021-08-10 12:10:06 +00:00
|
|
|
"sAMAccountName": [outpost_user.username],
|
2021-07-01 09:51:00 +00:00
|
|
|
"uid": [outpost_user.uid],
|
|
|
|
"name": [""],
|
|
|
|
"displayName": [""],
|
|
|
|
"mail": [""],
|
|
|
|
"objectClass": [
|
|
|
|
"user",
|
|
|
|
"organizationalPerson",
|
2021-09-27 07:57:17 +00:00
|
|
|
"inetOrgPerson",
|
2021-07-01 09:51:00 +00:00
|
|
|
"goauthentik.io/ldap/user",
|
|
|
|
],
|
2021-07-14 07:58:40 +00:00
|
|
|
"uidNumber": [str(2000 + outpost_user.pk)],
|
|
|
|
"gidNumber": [str(2000 + outpost_user.pk)],
|
2021-07-01 09:51:00 +00:00
|
|
|
"memberOf": [],
|
2021-07-04 17:13:59 +00:00
|
|
|
"accountStatus": ["true"],
|
|
|
|
"superuser": ["false"],
|
2021-07-01 09:51:00 +00:00
|
|
|
"goauthentik.io/ldap/active": ["true"],
|
|
|
|
"goauthentik.io/ldap/superuser": ["false"],
|
|
|
|
"goauthentik.io/user/override-ips": ["true"],
|
|
|
|
"goauthentik.io/user/service-account": ["true"],
|
|
|
|
},
|
|
|
|
"type": "searchResEntry",
|
|
|
|
},
|
2021-07-29 09:30:30 +00:00
|
|
|
{
|
|
|
|
"dn": f"cn={embedded_account.username},ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
|
|
"attributes": {
|
|
|
|
"cn": [embedded_account.username],
|
2021-08-10 12:10:06 +00:00
|
|
|
"sAMAccountName": [embedded_account.username],
|
2021-07-29 09:30:30 +00:00
|
|
|
"uid": [embedded_account.uid],
|
|
|
|
"name": [""],
|
|
|
|
"displayName": [""],
|
|
|
|
"mail": [""],
|
|
|
|
"objectClass": [
|
|
|
|
"user",
|
|
|
|
"organizationalPerson",
|
2021-09-27 07:57:17 +00:00
|
|
|
"inetOrgPerson",
|
2021-07-29 09:30:30 +00:00
|
|
|
"goauthentik.io/ldap/user",
|
|
|
|
],
|
|
|
|
"uidNumber": [str(2000 + embedded_account.pk)],
|
|
|
|
"gidNumber": [str(2000 + embedded_account.pk)],
|
|
|
|
"memberOf": [],
|
|
|
|
"accountStatus": ["true"],
|
|
|
|
"superuser": ["false"],
|
|
|
|
"goauthentik.io/ldap/active": ["true"],
|
|
|
|
"goauthentik.io/ldap/superuser": ["false"],
|
|
|
|
"goauthentik.io/user/override-ips": ["true"],
|
|
|
|
"goauthentik.io/user/service-account": ["true"],
|
|
|
|
},
|
|
|
|
"type": "searchResEntry",
|
|
|
|
},
|
2021-07-01 09:51:00 +00:00
|
|
|
{
|
|
|
|
"dn": f"cn={USER().username},ou=users,dc=ldap,dc=goauthentik,dc=io",
|
|
|
|
"attributes": {
|
|
|
|
"cn": [USER().username],
|
2021-08-10 12:10:06 +00:00
|
|
|
"sAMAccountName": [USER().username],
|
2021-07-01 09:51:00 +00:00
|
|
|
"uid": [USER().uid],
|
|
|
|
"name": [USER().name],
|
|
|
|
"displayName": [USER().name],
|
|
|
|
"mail": [USER().email],
|
|
|
|
"objectClass": [
|
|
|
|
"user",
|
|
|
|
"organizationalPerson",
|
2021-09-27 07:57:17 +00:00
|
|
|
"inetOrgPerson",
|
2021-07-01 09:51:00 +00:00
|
|
|
"goauthentik.io/ldap/user",
|
|
|
|
],
|
2021-07-14 07:58:40 +00:00
|
|
|
"uidNumber": [str(2000 + USER().pk)],
|
|
|
|
"gidNumber": [str(2000 + USER().pk)],
|
2021-08-03 15:45:16 +00:00
|
|
|
"memberOf": ["cn=authentik Admins,ou=groups,dc=ldap,dc=goauthentik,dc=io"],
|
2021-07-04 17:13:59 +00:00
|
|
|
"accountStatus": ["true"],
|
|
|
|
"superuser": ["true"],
|
2021-07-01 09:51:00 +00:00
|
|
|
"goauthentik.io/ldap/active": ["true"],
|
|
|
|
"goauthentik.io/ldap/superuser": ["true"],
|
|
|
|
"extraAttribute": ["bar"],
|
|
|
|
},
|
|
|
|
"type": "searchResEntry",
|
|
|
|
},
|
|
|
|
],
|
|
|
|
)
|