Compare commits
49 Commits
events/mig
...
trustchain
Author | SHA1 | Date |
---|---|---|
Jens Langhammer | 1cd000dfe2 | |
gcp-cherry-pick-bot[bot] | 00ae97944a | |
gcp-cherry-pick-bot[bot] | 9f3ccfb7c7 | |
gcp-cherry-pick-bot[bot] | 9ed9c39ac8 | |
gcp-cherry-pick-bot[bot] | 30b6eeee9f | |
gcp-cherry-pick-bot[bot] | afe2621783 | |
gcp-cherry-pick-bot[bot] | 8b12c6a01a | |
Jens Langhammer | f63adfed96 | |
gcp-cherry-pick-bot[bot] | 9c8fec21cf | |
Jens L | 4776d2bcc5 | |
Jens Langhammer | a15a040362 | |
Jens L | fcd6dc1d60 | |
gcp-cherry-pick-bot[bot] | acc3b59869 | |
gcp-cherry-pick-bot[bot] | d9d5ac10e6 | |
gcp-cherry-pick-bot[bot] | 750669dcab | |
gcp-cherry-pick-bot[bot] | 88a3eed67e | |
gcp-cherry-pick-bot[bot] | 6c214fffc4 | |
gcp-cherry-pick-bot[bot] | 70100fc105 | |
gcp-cherry-pick-bot[bot] | 3c1163fabd | |
gcp-cherry-pick-bot[bot] | 539e8242ff | |
gcp-cherry-pick-bot[bot] | 2648333590 | |
gcp-cherry-pick-bot[bot] | fe828ef993 | |
Jens L | 29a6530742 | |
Jens L | a6b9274c4f | |
Jens Langhammer | a2a67161ac | |
Jens Langhammer | 2e8263a99b | |
gcp-cherry-pick-bot[bot] | 6b9afed21f | |
Jens L | 1eb1f4e0b8 | |
gcp-cherry-pick-bot[bot] | 7c3d60ec3a | |
Jens L | a494c6b6e8 | |
gcp-cherry-pick-bot[bot] | 6604d3577f | |
gcp-cherry-pick-bot[bot] | f8bfa7e16a | |
gcp-cherry-pick-bot[bot] | ea6cf6eabf | |
gcp-cherry-pick-bot[bot] | 769ce3ce7b | |
gcp-cherry-pick-bot[bot] | 3891fb3fa8 | |
gcp-cherry-pick-bot[bot] | 41eb965350 | |
gcp-cherry-pick-bot[bot] | 8d95612287 | |
Jens Langhammer | 82b5274b15 | |
gcp-cherry-pick-bot[bot] | af56ce3d78 | |
gcp-cherry-pick-bot[bot] | f5c6e7aeb0 | |
gcp-cherry-pick-bot[bot] | 3809400e93 | |
gcp-cherry-pick-bot[bot] | 1def9865cf | |
gcp-cherry-pick-bot[bot] | 3716298639 | |
gcp-cherry-pick-bot[bot] | c16317d7cf | |
gcp-cherry-pick-bot[bot] | bbb8fa8269 | |
gcp-cherry-pick-bot[bot] | e4c251a178 | |
gcp-cherry-pick-bot[bot] | 0fefd5f522 | |
gcp-cherry-pick-bot[bot] | 88057db0b0 | |
gcp-cherry-pick-bot[bot] | 91cb6c9beb |
|
@ -9,4 +9,3 @@ blueprints/local
|
||||||
.git
|
.git
|
||||||
!gen-ts-api/node_modules
|
!gen-ts-api/node_modules
|
||||||
!gen-ts-api/dist/**
|
!gen-ts-api/dist/**
|
||||||
!gen-go-api/
|
|
||||||
|
|
|
@ -4,7 +4,7 @@ description: "Setup authentik testing environment"
|
||||||
inputs:
|
inputs:
|
||||||
postgresql_version:
|
postgresql_version:
|
||||||
description: "Optional postgresql image tag"
|
description: "Optional postgresql image tag"
|
||||||
default: "16"
|
default: "12"
|
||||||
|
|
||||||
runs:
|
runs:
|
||||||
using: "composite"
|
using: "composite"
|
||||||
|
@ -18,7 +18,7 @@ runs:
|
||||||
- name: Setup python and restore poetry
|
- name: Setup python and restore poetry
|
||||||
uses: actions/setup-python@v4
|
uses: actions/setup-python@v4
|
||||||
with:
|
with:
|
||||||
python-version-file: "pyproject.toml"
|
python-version-file: 'pyproject.toml'
|
||||||
cache: "poetry"
|
cache: "poetry"
|
||||||
- name: Setup node
|
- name: Setup node
|
||||||
uses: actions/setup-node@v3
|
uses: actions/setup-node@v3
|
||||||
|
|
|
@ -2,7 +2,7 @@ version: "3.7"
|
||||||
|
|
||||||
services:
|
services:
|
||||||
postgresql:
|
postgresql:
|
||||||
image: docker.io/library/postgres:${PSQL_TAG:-16}
|
image: docker.io/library/postgres:${PSQL_TAG:-12}
|
||||||
volumes:
|
volumes:
|
||||||
- db-data:/var/lib/postgresql/data
|
- db-data:/var/lib/postgresql/data
|
||||||
environment:
|
environment:
|
||||||
|
|
|
@ -2,4 +2,3 @@ keypair
|
||||||
keypairs
|
keypairs
|
||||||
hass
|
hass
|
||||||
warmup
|
warmup
|
||||||
ontext
|
|
||||||
|
|
|
@ -35,7 +35,6 @@ updates:
|
||||||
sentry:
|
sentry:
|
||||||
patterns:
|
patterns:
|
||||||
- "@sentry/*"
|
- "@sentry/*"
|
||||||
- "@spotlightjs/*"
|
|
||||||
babel:
|
babel:
|
||||||
patterns:
|
patterns:
|
||||||
- "@babel/*"
|
- "@babel/*"
|
||||||
|
@ -67,7 +66,6 @@ updates:
|
||||||
sentry:
|
sentry:
|
||||||
patterns:
|
patterns:
|
||||||
- "@sentry/*"
|
- "@sentry/*"
|
||||||
- "@spotlightjs/*"
|
|
||||||
babel:
|
babel:
|
||||||
patterns:
|
patterns:
|
||||||
- "@babel/*"
|
- "@babel/*"
|
||||||
|
|
|
@ -61,6 +61,10 @@ jobs:
|
||||||
- uses: actions/checkout@v4
|
- uses: actions/checkout@v4
|
||||||
with:
|
with:
|
||||||
fetch-depth: 0
|
fetch-depth: 0
|
||||||
|
- name: Setup authentik env
|
||||||
|
uses: ./.github/actions/setup
|
||||||
|
with:
|
||||||
|
postgresql_version: ${{ matrix.psql }}
|
||||||
- name: checkout stable
|
- name: checkout stable
|
||||||
run: |
|
run: |
|
||||||
# Delete all poetry envs
|
# Delete all poetry envs
|
||||||
|
@ -72,7 +76,7 @@ jobs:
|
||||||
git checkout version/$(python -c "from authentik import __version__; print(__version__)")
|
git checkout version/$(python -c "from authentik import __version__; print(__version__)")
|
||||||
rm -rf .github/ scripts/
|
rm -rf .github/ scripts/
|
||||||
mv ../.github ../scripts .
|
mv ../.github ../scripts .
|
||||||
- name: Setup authentik env (stable)
|
- name: Setup authentik env (ensure stable deps are installed)
|
||||||
uses: ./.github/actions/setup
|
uses: ./.github/actions/setup
|
||||||
with:
|
with:
|
||||||
postgresql_version: ${{ matrix.psql }}
|
postgresql_version: ${{ matrix.psql }}
|
||||||
|
@ -86,20 +90,14 @@ jobs:
|
||||||
git clean -d -fx .
|
git clean -d -fx .
|
||||||
git checkout $GITHUB_SHA
|
git checkout $GITHUB_SHA
|
||||||
# Delete previous poetry env
|
# Delete previous poetry env
|
||||||
rm -rf /home/runner/.cache/pypoetry/virtualenvs/*
|
rm -rf $(poetry env info --path)
|
||||||
|
poetry install
|
||||||
- name: Setup authentik env (ensure latest deps are installed)
|
- name: Setup authentik env (ensure latest deps are installed)
|
||||||
uses: ./.github/actions/setup
|
uses: ./.github/actions/setup
|
||||||
with:
|
with:
|
||||||
postgresql_version: ${{ matrix.psql }}
|
postgresql_version: ${{ matrix.psql }}
|
||||||
- name: migrate to latest
|
- name: migrate to latest
|
||||||
run: |
|
run: poetry run python -m lifecycle.migrate
|
||||||
poetry run python -m lifecycle.migrate
|
|
||||||
- name: run tests
|
|
||||||
env:
|
|
||||||
# Test in the main database that we just migrated from the previous stable version
|
|
||||||
AUTHENTIK_POSTGRESQL__TEST__NAME: authentik
|
|
||||||
run: |
|
|
||||||
poetry run make test
|
|
||||||
test-unittest:
|
test-unittest:
|
||||||
name: test-unittest - PostgreSQL ${{ matrix.psql }}
|
name: test-unittest - PostgreSQL ${{ matrix.psql }}
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
|
@ -249,6 +247,12 @@ jobs:
|
||||||
VERSION_FAMILY=${{ steps.ev.outputs.versionFamily }}
|
VERSION_FAMILY=${{ steps.ev.outputs.versionFamily }}
|
||||||
cache-from: type=gha
|
cache-from: type=gha
|
||||||
cache-to: type=gha,mode=max
|
cache-to: type=gha,mode=max
|
||||||
|
- name: Comment on PR
|
||||||
|
if: github.event_name == 'pull_request'
|
||||||
|
continue-on-error: true
|
||||||
|
uses: ./.github/actions/comment-pr-instructions
|
||||||
|
with:
|
||||||
|
tag: gh-${{ steps.ev.outputs.branchNameContainer }}-${{ steps.ev.outputs.timestamp }}-${{ steps.ev.outputs.shortHash }}
|
||||||
build-arm64:
|
build-arm64:
|
||||||
needs: ci-core-mark
|
needs: ci-core-mark
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
|
@ -297,26 +301,3 @@ jobs:
|
||||||
platforms: linux/arm64
|
platforms: linux/arm64
|
||||||
cache-from: type=gha
|
cache-from: type=gha
|
||||||
cache-to: type=gha,mode=max
|
cache-to: type=gha,mode=max
|
||||||
pr-comment:
|
|
||||||
needs:
|
|
||||||
- build
|
|
||||||
- build-arm64
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
if: ${{ github.event_name == 'pull_request' }}
|
|
||||||
permissions:
|
|
||||||
# Needed to write comments on PRs
|
|
||||||
pull-requests: write
|
|
||||||
timeout-minutes: 120
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
ref: ${{ github.event.pull_request.head.sha }}
|
|
||||||
- name: prepare variables
|
|
||||||
uses: ./.github/actions/docker-push-variables
|
|
||||||
id: ev
|
|
||||||
env:
|
|
||||||
DOCKER_USERNAME: ${{ secrets.DOCKER_USERNAME }}
|
|
||||||
- name: Comment on PR
|
|
||||||
uses: ./.github/actions/comment-pr-instructions
|
|
||||||
with:
|
|
||||||
tag: gh-${{ steps.ev.outputs.branchNameContainer }}-${{ steps.ev.outputs.timestamp }}-${{ steps.ev.outputs.shortHash }}
|
|
||||||
|
|
|
@ -16,7 +16,7 @@ jobs:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v4
|
- uses: actions/checkout@v4
|
||||||
- uses: actions/setup-go@v5
|
- uses: actions/setup-go@v4
|
||||||
with:
|
with:
|
||||||
go-version-file: "go.mod"
|
go-version-file: "go.mod"
|
||||||
- name: Prepare and generate API
|
- name: Prepare and generate API
|
||||||
|
@ -37,7 +37,7 @@ jobs:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v4
|
- uses: actions/checkout@v4
|
||||||
- uses: actions/setup-go@v5
|
- uses: actions/setup-go@v4
|
||||||
with:
|
with:
|
||||||
go-version-file: "go.mod"
|
go-version-file: "go.mod"
|
||||||
- name: Setup authentik env
|
- name: Setup authentik env
|
||||||
|
@ -65,7 +65,6 @@ jobs:
|
||||||
- proxy
|
- proxy
|
||||||
- ldap
|
- ldap
|
||||||
- radius
|
- radius
|
||||||
- rac
|
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
permissions:
|
permissions:
|
||||||
# Needed to upload contianer images to ghcr.io
|
# Needed to upload contianer images to ghcr.io
|
||||||
|
@ -120,14 +119,13 @@ jobs:
|
||||||
- proxy
|
- proxy
|
||||||
- ldap
|
- ldap
|
||||||
- radius
|
- radius
|
||||||
- rac
|
|
||||||
goos: [linux]
|
goos: [linux]
|
||||||
goarch: [amd64, arm64]
|
goarch: [amd64, arm64]
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v4
|
- uses: actions/checkout@v4
|
||||||
with:
|
with:
|
||||||
ref: ${{ github.event.pull_request.head.sha }}
|
ref: ${{ github.event.pull_request.head.sha }}
|
||||||
- uses: actions/setup-go@v5
|
- uses: actions/setup-go@v4
|
||||||
with:
|
with:
|
||||||
go-version-file: "go.mod"
|
go-version-file: "go.mod"
|
||||||
- uses: actions/setup-node@v4
|
- uses: actions/setup-node@v4
|
||||||
|
|
|
@ -27,10 +27,10 @@ jobs:
|
||||||
- name: Setup authentik env
|
- name: Setup authentik env
|
||||||
uses: ./.github/actions/setup
|
uses: ./.github/actions/setup
|
||||||
- name: Initialize CodeQL
|
- name: Initialize CodeQL
|
||||||
uses: github/codeql-action/init@v3
|
uses: github/codeql-action/init@v2
|
||||||
with:
|
with:
|
||||||
languages: ${{ matrix.language }}
|
languages: ${{ matrix.language }}
|
||||||
- name: Autobuild
|
- name: Autobuild
|
||||||
uses: github/codeql-action/autobuild@v3
|
uses: github/codeql-action/autobuild@v2
|
||||||
- name: Perform CodeQL Analysis
|
- name: Perform CodeQL Analysis
|
||||||
uses: github/codeql-action/analyze@v3
|
uses: github/codeql-action/analyze@v2
|
||||||
|
|
|
@ -6,10 +6,6 @@ on:
|
||||||
types:
|
types:
|
||||||
- closed
|
- closed
|
||||||
|
|
||||||
permissions:
|
|
||||||
# Permission to delete cache
|
|
||||||
actions: write
|
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
cleanup:
|
cleanup:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
|
|
|
@ -65,10 +65,9 @@ jobs:
|
||||||
- proxy
|
- proxy
|
||||||
- ldap
|
- ldap
|
||||||
- radius
|
- radius
|
||||||
- rac
|
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v4
|
- uses: actions/checkout@v4
|
||||||
- uses: actions/setup-go@v5
|
- uses: actions/setup-go@v4
|
||||||
with:
|
with:
|
||||||
go-version-file: "go.mod"
|
go-version-file: "go.mod"
|
||||||
- name: Set up QEMU
|
- name: Set up QEMU
|
||||||
|
@ -127,7 +126,7 @@ jobs:
|
||||||
goarch: [amd64, arm64]
|
goarch: [amd64, arm64]
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v4
|
- uses: actions/checkout@v4
|
||||||
- uses: actions/setup-go@v5
|
- uses: actions/setup-go@v4
|
||||||
with:
|
with:
|
||||||
go-version-file: "go.mod"
|
go-version-file: "go.mod"
|
||||||
- uses: actions/setup-node@v4
|
- uses: actions/setup-node@v4
|
||||||
|
|
|
@ -30,7 +30,7 @@ jobs:
|
||||||
private_key: ${{ secrets.GH_APP_PRIVATE_KEY }}
|
private_key: ${{ secrets.GH_APP_PRIVATE_KEY }}
|
||||||
- name: Extract version number
|
- name: Extract version number
|
||||||
id: get_version
|
id: get_version
|
||||||
uses: actions/github-script@v7
|
uses: actions/github-script@v6
|
||||||
with:
|
with:
|
||||||
github-token: ${{ steps.generate_token.outputs.token }}
|
github-token: ${{ steps.generate_token.outputs.token }}
|
||||||
script: |
|
script: |
|
||||||
|
|
|
@ -18,7 +18,7 @@ jobs:
|
||||||
with:
|
with:
|
||||||
app_id: ${{ secrets.GH_APP_ID }}
|
app_id: ${{ secrets.GH_APP_ID }}
|
||||||
private_key: ${{ secrets.GH_APP_PRIVATE_KEY }}
|
private_key: ${{ secrets.GH_APP_PRIVATE_KEY }}
|
||||||
- uses: actions/stale@v9
|
- uses: actions/stale@v8
|
||||||
with:
|
with:
|
||||||
repo-token: ${{ steps.generate_token.outputs.token }}
|
repo-token: ${{ steps.generate_token.outputs.token }}
|
||||||
days-before-stale: 60
|
days-before-stale: 60
|
||||||
|
|
|
@ -7,12 +7,7 @@ on:
|
||||||
paths:
|
paths:
|
||||||
- "!**"
|
- "!**"
|
||||||
- "locale/**"
|
- "locale/**"
|
||||||
- "!locale/en/**"
|
- "web/src/locales/**"
|
||||||
- "web/xliff/**"
|
|
||||||
|
|
||||||
permissions:
|
|
||||||
# Permission to write comment
|
|
||||||
pull-requests: write
|
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
post-comment:
|
post-comment:
|
||||||
|
|
|
@ -6,10 +6,6 @@ on:
|
||||||
pull_request:
|
pull_request:
|
||||||
types: [opened, reopened]
|
types: [opened, reopened]
|
||||||
|
|
||||||
permissions:
|
|
||||||
# Permission to rename PR
|
|
||||||
pull-requests: write
|
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
rename_pr:
|
rename_pr:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
|
|
|
@ -14,7 +14,6 @@
|
||||||
"ms-python.pylint",
|
"ms-python.pylint",
|
||||||
"ms-python.python",
|
"ms-python.python",
|
||||||
"ms-python.vscode-pylance",
|
"ms-python.vscode-pylance",
|
||||||
"ms-python.black-formatter",
|
|
||||||
"redhat.vscode-yaml",
|
"redhat.vscode-yaml",
|
||||||
"Tobermory.es6-string-html",
|
"Tobermory.es6-string-html",
|
||||||
"unifiedjs.vscode-mdx",
|
"unifiedjs.vscode-mdx",
|
||||||
|
|
|
@ -19,8 +19,10 @@
|
||||||
"slo",
|
"slo",
|
||||||
"scim",
|
"scim",
|
||||||
],
|
],
|
||||||
|
"python.linting.pylintEnabled": true,
|
||||||
"todo-tree.tree.showCountsInTree": true,
|
"todo-tree.tree.showCountsInTree": true,
|
||||||
"todo-tree.tree.showBadges": true,
|
"todo-tree.tree.showBadges": true,
|
||||||
|
"python.formatting.provider": "black",
|
||||||
"yaml.customTags": [
|
"yaml.customTags": [
|
||||||
"!Find sequence",
|
"!Find sequence",
|
||||||
"!KeyOf scalar",
|
"!KeyOf scalar",
|
||||||
|
|
12
Dockerfile
12
Dockerfile
|
@ -37,7 +37,7 @@ COPY ./gen-ts-api /work/web/node_modules/@goauthentik/api
|
||||||
RUN npm run build
|
RUN npm run build
|
||||||
|
|
||||||
# Stage 3: Build go proxy
|
# Stage 3: Build go proxy
|
||||||
FROM --platform=${BUILDPLATFORM} docker.io/golang:1.21.6-bookworm AS go-builder
|
FROM --platform=${BUILDPLATFORM} docker.io/golang:1.21.4-bookworm AS go-builder
|
||||||
|
|
||||||
ARG TARGETOS
|
ARG TARGETOS
|
||||||
ARG TARGETARCH
|
ARG TARGETARCH
|
||||||
|
@ -69,9 +69,9 @@ RUN --mount=type=cache,sharing=locked,target=/go/pkg/mod \
|
||||||
GOARM="${TARGETVARIANT#v}" go build -o /go/authentik ./cmd/server
|
GOARM="${TARGETVARIANT#v}" go build -o /go/authentik ./cmd/server
|
||||||
|
|
||||||
# Stage 4: MaxMind GeoIP
|
# Stage 4: MaxMind GeoIP
|
||||||
FROM --platform=${BUILDPLATFORM} ghcr.io/maxmind/geoipupdate:v6.1 as geoip
|
FROM --platform=${BUILDPLATFORM} ghcr.io/maxmind/geoipupdate:v6.0 as geoip
|
||||||
|
|
||||||
ENV GEOIPUPDATE_EDITION_IDS="GeoLite2-City GeoLite2-ASN"
|
ENV GEOIPUPDATE_EDITION_IDS="GeoLite2-City"
|
||||||
ENV GEOIPUPDATE_VERBOSE="true"
|
ENV GEOIPUPDATE_VERBOSE="true"
|
||||||
ENV GEOIPUPDATE_ACCOUNT_ID_FILE="/run/secrets/GEOIPUPDATE_ACCOUNT_ID"
|
ENV GEOIPUPDATE_ACCOUNT_ID_FILE="/run/secrets/GEOIPUPDATE_ACCOUNT_ID"
|
||||||
ENV GEOIPUPDATE_LICENSE_KEY_FILE="/run/secrets/GEOIPUPDATE_LICENSE_KEY"
|
ENV GEOIPUPDATE_LICENSE_KEY_FILE="/run/secrets/GEOIPUPDATE_LICENSE_KEY"
|
||||||
|
@ -83,7 +83,7 @@ RUN --mount=type=secret,id=GEOIPUPDATE_ACCOUNT_ID \
|
||||||
/bin/sh -c "/usr/bin/entry.sh || echo 'Failed to get GeoIP database, disabling'; exit 0"
|
/bin/sh -c "/usr/bin/entry.sh || echo 'Failed to get GeoIP database, disabling'; exit 0"
|
||||||
|
|
||||||
# Stage 5: Python dependencies
|
# Stage 5: Python dependencies
|
||||||
FROM docker.io/python:3.12.1-slim-bookworm AS python-deps
|
FROM docker.io/python:3.11.5-bookworm AS python-deps
|
||||||
|
|
||||||
WORKDIR /ak-root/poetry
|
WORKDIR /ak-root/poetry
|
||||||
|
|
||||||
|
@ -108,7 +108,7 @@ RUN --mount=type=bind,target=./pyproject.toml,src=./pyproject.toml \
|
||||||
poetry install --only=main --no-ansi --no-interaction
|
poetry install --only=main --no-ansi --no-interaction
|
||||||
|
|
||||||
# Stage 6: Run
|
# Stage 6: Run
|
||||||
FROM docker.io/python:3.12.1-slim-bookworm AS final-image
|
FROM docker.io/python:3.11.5-slim-bookworm AS final-image
|
||||||
|
|
||||||
ARG GIT_BUILD_HASH
|
ARG GIT_BUILD_HASH
|
||||||
ARG VERSION
|
ARG VERSION
|
||||||
|
@ -125,7 +125,7 @@ WORKDIR /
|
||||||
# We cannot cache this layer otherwise we'll end up with a bigger image
|
# We cannot cache this layer otherwise we'll end up with a bigger image
|
||||||
RUN apt-get update && \
|
RUN apt-get update && \
|
||||||
# Required for runtime
|
# Required for runtime
|
||||||
apt-get install -y --no-install-recommends libpq5 openssl libxmlsec1-openssl libmaxminddb0 ca-certificates && \
|
apt-get install -y --no-install-recommends libpq5 openssl libxmlsec1-openssl libmaxminddb0 && \
|
||||||
# Required for bootstrap & healtcheck
|
# Required for bootstrap & healtcheck
|
||||||
apt-get install -y --no-install-recommends runit && \
|
apt-get install -y --no-install-recommends runit && \
|
||||||
apt-get clean && \
|
apt-get clean && \
|
||||||
|
|
9
Makefile
9
Makefile
|
@ -58,7 +58,7 @@ test: ## Run the server tests and produce a coverage report (locally)
|
||||||
lint-fix: ## Lint and automatically fix errors in the python source code. Reports spelling errors.
|
lint-fix: ## Lint and automatically fix errors in the python source code. Reports spelling errors.
|
||||||
isort $(PY_SOURCES)
|
isort $(PY_SOURCES)
|
||||||
black $(PY_SOURCES)
|
black $(PY_SOURCES)
|
||||||
ruff --fix $(PY_SOURCES)
|
ruff $(PY_SOURCES)
|
||||||
codespell -w $(CODESPELL_ARGS)
|
codespell -w $(CODESPELL_ARGS)
|
||||||
|
|
||||||
lint: ## Lint the python and golang sources
|
lint: ## Lint the python and golang sources
|
||||||
|
@ -110,14 +110,11 @@ gen-diff: ## (Release) generate the changelog diff between the current schema a
|
||||||
--markdown /local/diff.md \
|
--markdown /local/diff.md \
|
||||||
/local/old_schema.yml /local/schema.yml
|
/local/old_schema.yml /local/schema.yml
|
||||||
rm old_schema.yml
|
rm old_schema.yml
|
||||||
sed -i 's/{/{/g' diff.md
|
|
||||||
sed -i 's/}/}/g' diff.md
|
|
||||||
npx prettier --write diff.md
|
npx prettier --write diff.md
|
||||||
|
|
||||||
gen-clean:
|
gen-clean:
|
||||||
rm -rf gen-go-api/
|
rm -rf web/api/src/
|
||||||
rm -rf gen-ts-api/
|
rm -rf api/
|
||||||
rm -rf web/node_modules/@goauthentik/api/
|
|
||||||
|
|
||||||
gen-client-ts: ## Build and install the authentik API for Typescript into the authentik UI Application
|
gen-client-ts: ## Build and install the authentik API for Typescript into the authentik UI Application
|
||||||
docker run \
|
docker run \
|
||||||
|
|
|
@ -1,9 +1,5 @@
|
||||||
authentik takes security very seriously. We follow the rules of [responsible disclosure](https://en.wikipedia.org/wiki/Responsible_disclosure), and we urge our community to do so as well, instead of reporting vulnerabilities publicly. This allows us to patch the issue quickly, announce it's existence and release the fixed version.
|
authentik takes security very seriously. We follow the rules of [responsible disclosure](https://en.wikipedia.org/wiki/Responsible_disclosure), and we urge our community to do so as well, instead of reporting vulnerabilities publicly. This allows us to patch the issue quickly, announce it's existence and release the fixed version.
|
||||||
|
|
||||||
## Independent audits and pentests
|
|
||||||
|
|
||||||
In May/June of 2023 [Cure53](https://cure53.de) conducted an audit and pentest. The [results](https://cure53.de/pentest-report_authentik.pdf) are published on the [Cure53 website](https://cure53.de/#publications-2023). For more details about authentik's response to the findings of the audit refer to [2023-06 Cure53 Code audit](https://goauthentik.io/docs/security/2023-06-cure53).
|
|
||||||
|
|
||||||
## What authentik classifies as a CVE
|
## What authentik classifies as a CVE
|
||||||
|
|
||||||
CVE (Common Vulnerability and Exposure) is a system designed to aggregate all vulnerabilities. As such, a CVE will be issued when there is a either vulnerability or exposure. Per NIST, A vulnerability is:
|
CVE (Common Vulnerability and Exposure) is a system designed to aggregate all vulnerabilities. As such, a CVE will be issued when there is a either vulnerability or exposure. Per NIST, A vulnerability is:
|
||||||
|
|
|
@ -30,7 +30,7 @@ class RuntimeDict(TypedDict):
|
||||||
uname: str
|
uname: str
|
||||||
|
|
||||||
|
|
||||||
class SystemInfoSerializer(PassiveSerializer):
|
class SystemSerializer(PassiveSerializer):
|
||||||
"""Get system information."""
|
"""Get system information."""
|
||||||
|
|
||||||
http_headers = SerializerMethodField()
|
http_headers = SerializerMethodField()
|
||||||
|
@ -91,14 +91,14 @@ class SystemView(APIView):
|
||||||
permission_classes = [HasPermission("authentik_rbac.view_system_info")]
|
permission_classes = [HasPermission("authentik_rbac.view_system_info")]
|
||||||
pagination_class = None
|
pagination_class = None
|
||||||
filter_backends = []
|
filter_backends = []
|
||||||
serializer_class = SystemInfoSerializer
|
serializer_class = SystemSerializer
|
||||||
|
|
||||||
@extend_schema(responses={200: SystemInfoSerializer(many=False)})
|
@extend_schema(responses={200: SystemSerializer(many=False)})
|
||||||
def get(self, request: Request) -> Response:
|
def get(self, request: Request) -> Response:
|
||||||
"""Get system information."""
|
"""Get system information."""
|
||||||
return Response(SystemInfoSerializer(request).data)
|
return Response(SystemSerializer(request).data)
|
||||||
|
|
||||||
@extend_schema(responses={200: SystemInfoSerializer(many=False)})
|
@extend_schema(responses={200: SystemSerializer(many=False)})
|
||||||
def post(self, request: Request) -> Response:
|
def post(self, request: Request) -> Response:
|
||||||
"""Get system information."""
|
"""Get system information."""
|
||||||
return Response(SystemInfoSerializer(request).data)
|
return Response(SystemSerializer(request).data)
|
||||||
|
|
|
@ -0,0 +1,134 @@
|
||||||
|
"""Tasks API"""
|
||||||
|
from importlib import import_module
|
||||||
|
|
||||||
|
from django.contrib import messages
|
||||||
|
from django.http.response import Http404
|
||||||
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
from drf_spectacular.types import OpenApiTypes
|
||||||
|
from drf_spectacular.utils import OpenApiParameter, OpenApiResponse, extend_schema
|
||||||
|
from rest_framework.decorators import action
|
||||||
|
from rest_framework.fields import (
|
||||||
|
CharField,
|
||||||
|
ChoiceField,
|
||||||
|
DateTimeField,
|
||||||
|
ListField,
|
||||||
|
SerializerMethodField,
|
||||||
|
)
|
||||||
|
from rest_framework.request import Request
|
||||||
|
from rest_framework.response import Response
|
||||||
|
from rest_framework.viewsets import ViewSet
|
||||||
|
from structlog.stdlib import get_logger
|
||||||
|
|
||||||
|
from authentik.api.decorators import permission_required
|
||||||
|
from authentik.core.api.utils import PassiveSerializer
|
||||||
|
from authentik.events.monitored_tasks import TaskInfo, TaskResultStatus
|
||||||
|
from authentik.rbac.permissions import HasPermission
|
||||||
|
|
||||||
|
LOGGER = get_logger()
|
||||||
|
|
||||||
|
|
||||||
|
class TaskSerializer(PassiveSerializer):
|
||||||
|
"""Serialize TaskInfo and TaskResult"""
|
||||||
|
|
||||||
|
task_name = CharField()
|
||||||
|
task_description = CharField()
|
||||||
|
task_finish_timestamp = DateTimeField(source="finish_time")
|
||||||
|
task_duration = SerializerMethodField()
|
||||||
|
|
||||||
|
status = ChoiceField(
|
||||||
|
source="result.status.name",
|
||||||
|
choices=[(x.name, x.name) for x in TaskResultStatus],
|
||||||
|
)
|
||||||
|
messages = ListField(source="result.messages")
|
||||||
|
|
||||||
|
def get_task_duration(self, instance: TaskInfo) -> int:
|
||||||
|
"""Get the duration a task took to run"""
|
||||||
|
return max(instance.finish_timestamp - instance.start_timestamp, 0)
|
||||||
|
|
||||||
|
def to_representation(self, instance: TaskInfo):
|
||||||
|
"""When a new version of authentik adds fields to TaskInfo,
|
||||||
|
the API will fail with an AttributeError, as the classes
|
||||||
|
are pickled in cache. In that case, just delete the info"""
|
||||||
|
try:
|
||||||
|
return super().to_representation(instance)
|
||||||
|
# pylint: disable=broad-except
|
||||||
|
except Exception: # pragma: no cover
|
||||||
|
if isinstance(self.instance, list):
|
||||||
|
for inst in self.instance:
|
||||||
|
inst.delete()
|
||||||
|
else:
|
||||||
|
self.instance.delete()
|
||||||
|
return {}
|
||||||
|
|
||||||
|
|
||||||
|
class TaskViewSet(ViewSet):
|
||||||
|
"""Read-only view set that returns all background tasks"""
|
||||||
|
|
||||||
|
permission_classes = [HasPermission("authentik_rbac.view_system_tasks")]
|
||||||
|
serializer_class = TaskSerializer
|
||||||
|
|
||||||
|
@extend_schema(
|
||||||
|
responses={
|
||||||
|
200: TaskSerializer(many=False),
|
||||||
|
404: OpenApiResponse(description="Task not found"),
|
||||||
|
},
|
||||||
|
parameters=[
|
||||||
|
OpenApiParameter(
|
||||||
|
"id",
|
||||||
|
type=OpenApiTypes.STR,
|
||||||
|
location=OpenApiParameter.PATH,
|
||||||
|
required=True,
|
||||||
|
),
|
||||||
|
],
|
||||||
|
)
|
||||||
|
def retrieve(self, request: Request, pk=None) -> Response:
|
||||||
|
"""Get a single system task"""
|
||||||
|
task = TaskInfo.by_name(pk)
|
||||||
|
if not task:
|
||||||
|
raise Http404
|
||||||
|
return Response(TaskSerializer(task, many=False).data)
|
||||||
|
|
||||||
|
@extend_schema(responses={200: TaskSerializer(many=True)})
|
||||||
|
def list(self, request: Request) -> Response:
|
||||||
|
"""List system tasks"""
|
||||||
|
tasks = sorted(TaskInfo.all().values(), key=lambda task: task.task_name)
|
||||||
|
return Response(TaskSerializer(tasks, many=True).data)
|
||||||
|
|
||||||
|
@permission_required(None, ["authentik_rbac.run_system_tasks"])
|
||||||
|
@extend_schema(
|
||||||
|
request=OpenApiTypes.NONE,
|
||||||
|
responses={
|
||||||
|
204: OpenApiResponse(description="Task retried successfully"),
|
||||||
|
404: OpenApiResponse(description="Task not found"),
|
||||||
|
500: OpenApiResponse(description="Failed to retry task"),
|
||||||
|
},
|
||||||
|
parameters=[
|
||||||
|
OpenApiParameter(
|
||||||
|
"id",
|
||||||
|
type=OpenApiTypes.STR,
|
||||||
|
location=OpenApiParameter.PATH,
|
||||||
|
required=True,
|
||||||
|
),
|
||||||
|
],
|
||||||
|
)
|
||||||
|
@action(detail=True, methods=["post"])
|
||||||
|
def retry(self, request: Request, pk=None) -> Response:
|
||||||
|
"""Retry task"""
|
||||||
|
task = TaskInfo.by_name(pk)
|
||||||
|
if not task:
|
||||||
|
raise Http404
|
||||||
|
try:
|
||||||
|
task_module = import_module(task.task_call_module)
|
||||||
|
task_func = getattr(task_module, task.task_call_func)
|
||||||
|
LOGGER.debug("Running task", task=task_func)
|
||||||
|
task_func.delay(*task.task_call_args, **task.task_call_kwargs)
|
||||||
|
messages.success(
|
||||||
|
self.request,
|
||||||
|
_("Successfully re-scheduled Task %(name)s!" % {"name": task.task_name}),
|
||||||
|
)
|
||||||
|
return Response(status=204)
|
||||||
|
except (ImportError, AttributeError): # pragma: no cover
|
||||||
|
LOGGER.warning("Failed to run task, remove state", task=task)
|
||||||
|
# if we get an import error, the module path has probably changed
|
||||||
|
task.delete()
|
||||||
|
return Response(status=500)
|
|
@ -1,6 +1,7 @@
|
||||||
"""admin signals"""
|
"""admin signals"""
|
||||||
from django.dispatch import receiver
|
from django.dispatch import receiver
|
||||||
|
|
||||||
|
from authentik.admin.api.tasks import TaskInfo
|
||||||
from authentik.admin.apps import GAUGE_WORKERS
|
from authentik.admin.apps import GAUGE_WORKERS
|
||||||
from authentik.root.celery import CELERY_APP
|
from authentik.root.celery import CELERY_APP
|
||||||
from authentik.root.monitoring import monitoring_set
|
from authentik.root.monitoring import monitoring_set
|
||||||
|
@ -11,3 +12,10 @@ def monitoring_set_workers(sender, **kwargs):
|
||||||
"""Set worker gauge"""
|
"""Set worker gauge"""
|
||||||
count = len(CELERY_APP.control.ping(timeout=0.5))
|
count = len(CELERY_APP.control.ping(timeout=0.5))
|
||||||
GAUGE_WORKERS.set(count)
|
GAUGE_WORKERS.set(count)
|
||||||
|
|
||||||
|
|
||||||
|
@receiver(monitoring_set)
|
||||||
|
def monitoring_set_tasks(sender, **kwargs):
|
||||||
|
"""Set task gauges"""
|
||||||
|
for task in TaskInfo.all().values():
|
||||||
|
task.update_metrics()
|
||||||
|
|
|
@ -11,7 +11,12 @@ from structlog.stdlib import get_logger
|
||||||
from authentik import __version__, get_build_hash
|
from authentik import __version__, get_build_hash
|
||||||
from authentik.admin.apps import PROM_INFO
|
from authentik.admin.apps import PROM_INFO
|
||||||
from authentik.events.models import Event, EventAction, Notification
|
from authentik.events.models import Event, EventAction, Notification
|
||||||
from authentik.events.system_tasks import SystemTask, TaskStatus, prefill_task
|
from authentik.events.monitored_tasks import (
|
||||||
|
MonitoredTask,
|
||||||
|
TaskResult,
|
||||||
|
TaskResultStatus,
|
||||||
|
prefill_task,
|
||||||
|
)
|
||||||
from authentik.lib.config import CONFIG
|
from authentik.lib.config import CONFIG
|
||||||
from authentik.lib.utils.http import get_http_session
|
from authentik.lib.utils.http import get_http_session
|
||||||
from authentik.root.celery import CELERY_APP
|
from authentik.root.celery import CELERY_APP
|
||||||
|
@ -49,13 +54,13 @@ def clear_update_notifications():
|
||||||
notification.delete()
|
notification.delete()
|
||||||
|
|
||||||
|
|
||||||
@CELERY_APP.task(bind=True, base=SystemTask)
|
@CELERY_APP.task(bind=True, base=MonitoredTask)
|
||||||
@prefill_task
|
@prefill_task
|
||||||
def update_latest_version(self: SystemTask):
|
def update_latest_version(self: MonitoredTask):
|
||||||
"""Update latest version info"""
|
"""Update latest version info"""
|
||||||
if CONFIG.get_bool("disable_update_check"):
|
if CONFIG.get_bool("disable_update_check"):
|
||||||
cache.set(VERSION_CACHE_KEY, "0.0.0", VERSION_CACHE_TIMEOUT)
|
cache.set(VERSION_CACHE_KEY, "0.0.0", VERSION_CACHE_TIMEOUT)
|
||||||
self.set_status(TaskStatus.WARNING, "Version check disabled.")
|
self.set_status(TaskResult(TaskResultStatus.WARNING, messages=["Version check disabled."]))
|
||||||
return
|
return
|
||||||
try:
|
try:
|
||||||
response = get_http_session().get(
|
response = get_http_session().get(
|
||||||
|
@ -65,7 +70,9 @@ def update_latest_version(self: SystemTask):
|
||||||
data = response.json()
|
data = response.json()
|
||||||
upstream_version = data.get("stable", {}).get("version")
|
upstream_version = data.get("stable", {}).get("version")
|
||||||
cache.set(VERSION_CACHE_KEY, upstream_version, VERSION_CACHE_TIMEOUT)
|
cache.set(VERSION_CACHE_KEY, upstream_version, VERSION_CACHE_TIMEOUT)
|
||||||
self.set_status(TaskStatus.SUCCESSFUL, "Successfully updated latest Version")
|
self.set_status(
|
||||||
|
TaskResult(TaskResultStatus.SUCCESSFUL, ["Successfully updated latest Version"])
|
||||||
|
)
|
||||||
_set_prom_info()
|
_set_prom_info()
|
||||||
# Check if upstream version is newer than what we're running,
|
# Check if upstream version is newer than what we're running,
|
||||||
# and if no event exists yet, create one.
|
# and if no event exists yet, create one.
|
||||||
|
@ -82,7 +89,7 @@ def update_latest_version(self: SystemTask):
|
||||||
Event.new(EventAction.UPDATE_AVAILABLE, **event_dict).save()
|
Event.new(EventAction.UPDATE_AVAILABLE, **event_dict).save()
|
||||||
except (RequestException, IndexError) as exc:
|
except (RequestException, IndexError) as exc:
|
||||||
cache.set(VERSION_CACHE_KEY, "0.0.0", VERSION_CACHE_TIMEOUT)
|
cache.set(VERSION_CACHE_KEY, "0.0.0", VERSION_CACHE_TIMEOUT)
|
||||||
self.set_error(exc)
|
self.set_status(TaskResult(TaskResultStatus.ERROR).with_error(exc))
|
||||||
|
|
||||||
|
|
||||||
_set_prom_info()
|
_set_prom_info()
|
||||||
|
|
|
@ -7,6 +7,8 @@ from django.urls import reverse
|
||||||
from authentik import __version__
|
from authentik import __version__
|
||||||
from authentik.blueprints.tests import reconcile_app
|
from authentik.blueprints.tests import reconcile_app
|
||||||
from authentik.core.models import Group, User
|
from authentik.core.models import Group, User
|
||||||
|
from authentik.core.tasks import clean_expired_models
|
||||||
|
from authentik.events.monitored_tasks import TaskResultStatus
|
||||||
from authentik.lib.generators import generate_id
|
from authentik.lib.generators import generate_id
|
||||||
|
|
||||||
|
|
||||||
|
@ -21,6 +23,53 @@ class TestAdminAPI(TestCase):
|
||||||
self.group.save()
|
self.group.save()
|
||||||
self.client.force_login(self.user)
|
self.client.force_login(self.user)
|
||||||
|
|
||||||
|
def test_tasks(self):
|
||||||
|
"""Test Task API"""
|
||||||
|
clean_expired_models.delay()
|
||||||
|
response = self.client.get(reverse("authentik_api:admin_system_tasks-list"))
|
||||||
|
self.assertEqual(response.status_code, 200)
|
||||||
|
body = loads(response.content)
|
||||||
|
self.assertTrue(any(task["task_name"] == "clean_expired_models" for task in body))
|
||||||
|
|
||||||
|
def test_tasks_single(self):
|
||||||
|
"""Test Task API (read single)"""
|
||||||
|
clean_expired_models.delay()
|
||||||
|
response = self.client.get(
|
||||||
|
reverse(
|
||||||
|
"authentik_api:admin_system_tasks-detail",
|
||||||
|
kwargs={"pk": "clean_expired_models"},
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.assertEqual(response.status_code, 200)
|
||||||
|
body = loads(response.content)
|
||||||
|
self.assertEqual(body["status"], TaskResultStatus.SUCCESSFUL.name)
|
||||||
|
self.assertEqual(body["task_name"], "clean_expired_models")
|
||||||
|
response = self.client.get(
|
||||||
|
reverse("authentik_api:admin_system_tasks-detail", kwargs={"pk": "qwerqwer"})
|
||||||
|
)
|
||||||
|
self.assertEqual(response.status_code, 404)
|
||||||
|
|
||||||
|
def test_tasks_retry(self):
|
||||||
|
"""Test Task API (retry)"""
|
||||||
|
clean_expired_models.delay()
|
||||||
|
response = self.client.post(
|
||||||
|
reverse(
|
||||||
|
"authentik_api:admin_system_tasks-retry",
|
||||||
|
kwargs={"pk": "clean_expired_models"},
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.assertEqual(response.status_code, 204)
|
||||||
|
|
||||||
|
def test_tasks_retry_404(self):
|
||||||
|
"""Test Task API (retry, 404)"""
|
||||||
|
response = self.client.post(
|
||||||
|
reverse(
|
||||||
|
"authentik_api:admin_system_tasks-retry",
|
||||||
|
kwargs={"pk": "qwerqewrqrqewrqewr"},
|
||||||
|
)
|
||||||
|
)
|
||||||
|
self.assertEqual(response.status_code, 404)
|
||||||
|
|
||||||
def test_version(self):
|
def test_version(self):
|
||||||
"""Test Version API"""
|
"""Test Version API"""
|
||||||
response = self.client.get(reverse("authentik_api:admin_version"))
|
response = self.client.get(reverse("authentik_api:admin_version"))
|
||||||
|
|
|
@ -4,10 +4,12 @@ from django.urls import path
|
||||||
from authentik.admin.api.meta import AppsViewSet, ModelViewSet
|
from authentik.admin.api.meta import AppsViewSet, ModelViewSet
|
||||||
from authentik.admin.api.metrics import AdministrationMetricsViewSet
|
from authentik.admin.api.metrics import AdministrationMetricsViewSet
|
||||||
from authentik.admin.api.system import SystemView
|
from authentik.admin.api.system import SystemView
|
||||||
|
from authentik.admin.api.tasks import TaskViewSet
|
||||||
from authentik.admin.api.version import VersionView
|
from authentik.admin.api.version import VersionView
|
||||||
from authentik.admin.api.workers import WorkerView
|
from authentik.admin.api.workers import WorkerView
|
||||||
|
|
||||||
api_urlpatterns = [
|
api_urlpatterns = [
|
||||||
|
("admin/system_tasks", TaskViewSet, "admin_system_tasks"),
|
||||||
("admin/apps", AppsViewSet, "apps"),
|
("admin/apps", AppsViewSet, "apps"),
|
||||||
("admin/models", ModelViewSet, "models"),
|
("admin/models", ModelViewSet, "models"),
|
||||||
path(
|
path(
|
||||||
|
|
|
@ -12,8 +12,6 @@ from authentik.blueprints.tests import reconcile_app
|
||||||
from authentik.core.models import Token, TokenIntents, User, UserTypes
|
from authentik.core.models import Token, TokenIntents, User, UserTypes
|
||||||
from authentik.core.tests.utils import create_test_admin_user, create_test_flow
|
from authentik.core.tests.utils import create_test_admin_user, create_test_flow
|
||||||
from authentik.lib.generators import generate_id
|
from authentik.lib.generators import generate_id
|
||||||
from authentik.outposts.apps import MANAGED_OUTPOST
|
|
||||||
from authentik.outposts.models import Outpost
|
|
||||||
from authentik.providers.oauth2.constants import SCOPE_AUTHENTIK_API
|
from authentik.providers.oauth2.constants import SCOPE_AUTHENTIK_API
|
||||||
from authentik.providers.oauth2.models import AccessToken, OAuth2Provider
|
from authentik.providers.oauth2.models import AccessToken, OAuth2Provider
|
||||||
|
|
||||||
|
@ -51,12 +49,8 @@ class TestAPIAuth(TestCase):
|
||||||
with self.assertRaises(AuthenticationFailed):
|
with self.assertRaises(AuthenticationFailed):
|
||||||
bearer_auth(f"Bearer {token.key}".encode())
|
bearer_auth(f"Bearer {token.key}".encode())
|
||||||
|
|
||||||
@reconcile_app("authentik_outposts")
|
def test_managed_outpost(self):
|
||||||
def test_managed_outpost_fail(self):
|
|
||||||
"""Test managed outpost"""
|
"""Test managed outpost"""
|
||||||
outpost = Outpost.objects.filter(managed=MANAGED_OUTPOST).first()
|
|
||||||
outpost.user.delete()
|
|
||||||
outpost.delete()
|
|
||||||
with self.assertRaises(AuthenticationFailed):
|
with self.assertRaises(AuthenticationFailed):
|
||||||
bearer_auth(f"Bearer {settings.SECRET_KEY}".encode())
|
bearer_auth(f"Bearer {settings.SECRET_KEY}".encode())
|
||||||
|
|
||||||
|
|
|
@ -19,7 +19,7 @@ from rest_framework.response import Response
|
||||||
from rest_framework.views import APIView
|
from rest_framework.views import APIView
|
||||||
|
|
||||||
from authentik.core.api.utils import PassiveSerializer
|
from authentik.core.api.utils import PassiveSerializer
|
||||||
from authentik.events.context_processors.base import get_context_processors
|
from authentik.events.geo import GEOIP_READER
|
||||||
from authentik.lib.config import CONFIG
|
from authentik.lib.config import CONFIG
|
||||||
|
|
||||||
capabilities = Signal()
|
capabilities = Signal()
|
||||||
|
@ -30,7 +30,6 @@ class Capabilities(models.TextChoices):
|
||||||
|
|
||||||
CAN_SAVE_MEDIA = "can_save_media"
|
CAN_SAVE_MEDIA = "can_save_media"
|
||||||
CAN_GEO_IP = "can_geo_ip"
|
CAN_GEO_IP = "can_geo_ip"
|
||||||
CAN_ASN = "can_asn"
|
|
||||||
CAN_IMPERSONATE = "can_impersonate"
|
CAN_IMPERSONATE = "can_impersonate"
|
||||||
CAN_DEBUG = "can_debug"
|
CAN_DEBUG = "can_debug"
|
||||||
IS_ENTERPRISE = "is_enterprise"
|
IS_ENTERPRISE = "is_enterprise"
|
||||||
|
@ -69,9 +68,8 @@ class ConfigView(APIView):
|
||||||
deb_test = settings.DEBUG or settings.TEST
|
deb_test = settings.DEBUG or settings.TEST
|
||||||
if Path(settings.MEDIA_ROOT).is_mount() or deb_test:
|
if Path(settings.MEDIA_ROOT).is_mount() or deb_test:
|
||||||
caps.append(Capabilities.CAN_SAVE_MEDIA)
|
caps.append(Capabilities.CAN_SAVE_MEDIA)
|
||||||
for processor in get_context_processors():
|
if GEOIP_READER.enabled:
|
||||||
if cap := processor.capability():
|
caps.append(Capabilities.CAN_GEO_IP)
|
||||||
caps.append(cap)
|
|
||||||
if CONFIG.get_bool("impersonation"):
|
if CONFIG.get_bool("impersonation"):
|
||||||
caps.append(Capabilities.CAN_IMPERSONATE)
|
caps.append(Capabilities.CAN_IMPERSONATE)
|
||||||
if settings.DEBUG: # pragma: no cover
|
if settings.DEBUG: # pragma: no cover
|
||||||
|
@ -95,10 +93,10 @@ class ConfigView(APIView):
|
||||||
"traces_sample_rate": float(CONFIG.get("error_reporting.sample_rate", 0.4)),
|
"traces_sample_rate": float(CONFIG.get("error_reporting.sample_rate", 0.4)),
|
||||||
},
|
},
|
||||||
"capabilities": self.get_capabilities(),
|
"capabilities": self.get_capabilities(),
|
||||||
"cache_timeout": CONFIG.get_int("cache.timeout"),
|
"cache_timeout": CONFIG.get_int("redis.cache_timeout"),
|
||||||
"cache_timeout_flows": CONFIG.get_int("cache.timeout_flows"),
|
"cache_timeout_flows": CONFIG.get_int("redis.cache_timeout_flows"),
|
||||||
"cache_timeout_policies": CONFIG.get_int("cache.timeout_policies"),
|
"cache_timeout_policies": CONFIG.get_int("redis.cache_timeout_policies"),
|
||||||
"cache_timeout_reputation": CONFIG.get_int("cache.timeout_reputation"),
|
"cache_timeout_reputation": CONFIG.get_int("redis.cache_timeout_reputation"),
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
|
@ -3,7 +3,7 @@ from django.utils.translation import gettext_lazy as _
|
||||||
from drf_spectacular.utils import extend_schema, inline_serializer
|
from drf_spectacular.utils import extend_schema, inline_serializer
|
||||||
from rest_framework.decorators import action
|
from rest_framework.decorators import action
|
||||||
from rest_framework.exceptions import ValidationError
|
from rest_framework.exceptions import ValidationError
|
||||||
from rest_framework.fields import CharField, DateTimeField
|
from rest_framework.fields import CharField, DateTimeField, JSONField
|
||||||
from rest_framework.request import Request
|
from rest_framework.request import Request
|
||||||
from rest_framework.response import Response
|
from rest_framework.response import Response
|
||||||
from rest_framework.serializers import ListSerializer, ModelSerializer
|
from rest_framework.serializers import ListSerializer, ModelSerializer
|
||||||
|
@ -15,7 +15,7 @@ from authentik.blueprints.v1.importer import Importer
|
||||||
from authentik.blueprints.v1.oci import OCI_PREFIX
|
from authentik.blueprints.v1.oci import OCI_PREFIX
|
||||||
from authentik.blueprints.v1.tasks import apply_blueprint, blueprints_find_dict
|
from authentik.blueprints.v1.tasks import apply_blueprint, blueprints_find_dict
|
||||||
from authentik.core.api.used_by import UsedByMixin
|
from authentik.core.api.used_by import UsedByMixin
|
||||||
from authentik.core.api.utils import JSONDictField, PassiveSerializer
|
from authentik.core.api.utils import PassiveSerializer
|
||||||
|
|
||||||
|
|
||||||
class ManagedSerializer:
|
class ManagedSerializer:
|
||||||
|
@ -28,7 +28,7 @@ class MetadataSerializer(PassiveSerializer):
|
||||||
"""Serializer for blueprint metadata"""
|
"""Serializer for blueprint metadata"""
|
||||||
|
|
||||||
name = CharField()
|
name = CharField()
|
||||||
labels = JSONDictField()
|
labels = JSONField()
|
||||||
|
|
||||||
|
|
||||||
class BlueprintInstanceSerializer(ModelSerializer):
|
class BlueprintInstanceSerializer(ModelSerializer):
|
||||||
|
|
|
@ -11,11 +11,11 @@ from structlog.stdlib import BoundLogger, get_logger
|
||||||
class ManagedAppConfig(AppConfig):
|
class ManagedAppConfig(AppConfig):
|
||||||
"""Basic reconciliation logic for apps"""
|
"""Basic reconciliation logic for apps"""
|
||||||
|
|
||||||
logger: BoundLogger
|
_logger: BoundLogger
|
||||||
|
|
||||||
def __init__(self, app_name: str, *args, **kwargs) -> None:
|
def __init__(self, app_name: str, *args, **kwargs) -> None:
|
||||||
super().__init__(app_name, *args, **kwargs)
|
super().__init__(app_name, *args, **kwargs)
|
||||||
self.logger = get_logger().bind(app_name=app_name)
|
self._logger = get_logger().bind(app_name=app_name)
|
||||||
|
|
||||||
def ready(self) -> None:
|
def ready(self) -> None:
|
||||||
self.reconcile()
|
self.reconcile()
|
||||||
|
@ -36,11 +36,11 @@ class ManagedAppConfig(AppConfig):
|
||||||
continue
|
continue
|
||||||
name = meth_name.replace(prefix, "")
|
name = meth_name.replace(prefix, "")
|
||||||
try:
|
try:
|
||||||
self.logger.debug("Starting reconciler", name=name)
|
self._logger.debug("Starting reconciler", name=name)
|
||||||
meth()
|
meth()
|
||||||
self.logger.debug("Successfully reconciled", name=name)
|
self._logger.debug("Successfully reconciled", name=name)
|
||||||
except (DatabaseError, ProgrammingError, InternalError) as exc:
|
except (DatabaseError, ProgrammingError, InternalError) as exc:
|
||||||
self.logger.warning("Failed to run reconcile", name=name, exc=exc)
|
self._logger.warning("Failed to run reconcile", name=name, exc=exc)
|
||||||
|
|
||||||
|
|
||||||
class AuthentikBlueprintsConfig(ManagedAppConfig):
|
class AuthentikBlueprintsConfig(ManagedAppConfig):
|
||||||
|
|
|
@ -2,11 +2,11 @@
|
||||||
from typing import TYPE_CHECKING
|
from typing import TYPE_CHECKING
|
||||||
|
|
||||||
from rest_framework.exceptions import ValidationError
|
from rest_framework.exceptions import ValidationError
|
||||||
from rest_framework.fields import BooleanField
|
from rest_framework.fields import BooleanField, JSONField
|
||||||
from structlog.stdlib import get_logger
|
from structlog.stdlib import get_logger
|
||||||
|
|
||||||
from authentik.blueprints.v1.meta.registry import BaseMetaModel, MetaResult, registry
|
from authentik.blueprints.v1.meta.registry import BaseMetaModel, MetaResult, registry
|
||||||
from authentik.core.api.utils import JSONDictField, PassiveSerializer
|
from authentik.core.api.utils import PassiveSerializer, is_dict
|
||||||
|
|
||||||
if TYPE_CHECKING:
|
if TYPE_CHECKING:
|
||||||
from authentik.blueprints.models import BlueprintInstance
|
from authentik.blueprints.models import BlueprintInstance
|
||||||
|
@ -17,7 +17,7 @@ LOGGER = get_logger()
|
||||||
class ApplyBlueprintMetaSerializer(PassiveSerializer):
|
class ApplyBlueprintMetaSerializer(PassiveSerializer):
|
||||||
"""Serializer for meta apply blueprint model"""
|
"""Serializer for meta apply blueprint model"""
|
||||||
|
|
||||||
identifiers = JSONDictField()
|
identifiers = JSONField(validators=[is_dict])
|
||||||
required = BooleanField(default=True)
|
required = BooleanField(default=True)
|
||||||
|
|
||||||
# We cannot override `instance` as that will confuse rest_framework
|
# We cannot override `instance` as that will confuse rest_framework
|
||||||
|
|
|
@ -29,8 +29,12 @@ from authentik.blueprints.v1.common import BlueprintLoader, BlueprintMetadata, E
|
||||||
from authentik.blueprints.v1.importer import Importer
|
from authentik.blueprints.v1.importer import Importer
|
||||||
from authentik.blueprints.v1.labels import LABEL_AUTHENTIK_INSTANTIATE
|
from authentik.blueprints.v1.labels import LABEL_AUTHENTIK_INSTANTIATE
|
||||||
from authentik.blueprints.v1.oci import OCI_PREFIX
|
from authentik.blueprints.v1.oci import OCI_PREFIX
|
||||||
from authentik.events.models import TaskStatus
|
from authentik.events.monitored_tasks import (
|
||||||
from authentik.events.system_tasks import SystemTask, prefill_task
|
MonitoredTask,
|
||||||
|
TaskResult,
|
||||||
|
TaskResultStatus,
|
||||||
|
prefill_task,
|
||||||
|
)
|
||||||
from authentik.events.utils import sanitize_dict
|
from authentik.events.utils import sanitize_dict
|
||||||
from authentik.lib.config import CONFIG
|
from authentik.lib.config import CONFIG
|
||||||
from authentik.root.celery import CELERY_APP
|
from authentik.root.celery import CELERY_APP
|
||||||
|
@ -124,10 +128,10 @@ def blueprints_find() -> list[BlueprintFile]:
|
||||||
|
|
||||||
|
|
||||||
@CELERY_APP.task(
|
@CELERY_APP.task(
|
||||||
throws=(DatabaseError, ProgrammingError, InternalError), base=SystemTask, bind=True
|
throws=(DatabaseError, ProgrammingError, InternalError), base=MonitoredTask, bind=True
|
||||||
)
|
)
|
||||||
@prefill_task
|
@prefill_task
|
||||||
def blueprints_discovery(self: SystemTask, path: Optional[str] = None):
|
def blueprints_discovery(self: MonitoredTask, path: Optional[str] = None):
|
||||||
"""Find blueprints and check if they need to be created in the database"""
|
"""Find blueprints and check if they need to be created in the database"""
|
||||||
count = 0
|
count = 0
|
||||||
for blueprint in blueprints_find():
|
for blueprint in blueprints_find():
|
||||||
|
@ -136,7 +140,10 @@ def blueprints_discovery(self: SystemTask, path: Optional[str] = None):
|
||||||
check_blueprint_v1_file(blueprint)
|
check_blueprint_v1_file(blueprint)
|
||||||
count += 1
|
count += 1
|
||||||
self.set_status(
|
self.set_status(
|
||||||
TaskStatus.SUCCESSFUL, _("Successfully imported %(count)d files." % {"count": count})
|
TaskResult(
|
||||||
|
TaskResultStatus.SUCCESSFUL,
|
||||||
|
messages=[_("Successfully imported %(count)d files." % {"count": count})],
|
||||||
|
)
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@ -169,9 +176,9 @@ def check_blueprint_v1_file(blueprint: BlueprintFile):
|
||||||
|
|
||||||
@CELERY_APP.task(
|
@CELERY_APP.task(
|
||||||
bind=True,
|
bind=True,
|
||||||
base=SystemTask,
|
base=MonitoredTask,
|
||||||
)
|
)
|
||||||
def apply_blueprint(self: SystemTask, instance_pk: str):
|
def apply_blueprint(self: MonitoredTask, instance_pk: str):
|
||||||
"""Apply single blueprint"""
|
"""Apply single blueprint"""
|
||||||
self.save_on_success = False
|
self.save_on_success = False
|
||||||
instance: Optional[BlueprintInstance] = None
|
instance: Optional[BlueprintInstance] = None
|
||||||
|
@ -189,18 +196,18 @@ def apply_blueprint(self: SystemTask, instance_pk: str):
|
||||||
if not valid:
|
if not valid:
|
||||||
instance.status = BlueprintInstanceStatus.ERROR
|
instance.status = BlueprintInstanceStatus.ERROR
|
||||||
instance.save()
|
instance.save()
|
||||||
self.set_status(TaskStatus.ERROR, *[x["event"] for x in logs])
|
self.set_status(TaskResult(TaskResultStatus.ERROR, [x["event"] for x in logs]))
|
||||||
return
|
return
|
||||||
applied = importer.apply()
|
applied = importer.apply()
|
||||||
if not applied:
|
if not applied:
|
||||||
instance.status = BlueprintInstanceStatus.ERROR
|
instance.status = BlueprintInstanceStatus.ERROR
|
||||||
instance.save()
|
instance.save()
|
||||||
self.set_status(TaskStatus.ERROR, "Failed to apply")
|
self.set_status(TaskResult(TaskResultStatus.ERROR, "Failed to apply"))
|
||||||
return
|
return
|
||||||
instance.status = BlueprintInstanceStatus.SUCCESSFUL
|
instance.status = BlueprintInstanceStatus.SUCCESSFUL
|
||||||
instance.last_applied_hash = file_hash
|
instance.last_applied_hash = file_hash
|
||||||
instance.last_applied = now()
|
instance.last_applied = now()
|
||||||
self.set_status(TaskStatus.SUCCESSFUL)
|
self.set_status(TaskResult(TaskResultStatus.SUCCESSFUL))
|
||||||
except (
|
except (
|
||||||
DatabaseError,
|
DatabaseError,
|
||||||
ProgrammingError,
|
ProgrammingError,
|
||||||
|
@ -211,7 +218,7 @@ def apply_blueprint(self: SystemTask, instance_pk: str):
|
||||||
) as exc:
|
) as exc:
|
||||||
if instance:
|
if instance:
|
||||||
instance.status = BlueprintInstanceStatus.ERROR
|
instance.status = BlueprintInstanceStatus.ERROR
|
||||||
self.set_error(exc)
|
self.set_status(TaskResult(TaskResultStatus.ERROR).with_error(exc))
|
||||||
finally:
|
finally:
|
||||||
if instance:
|
if instance:
|
||||||
instance.save()
|
instance.save()
|
||||||
|
|
|
@ -14,8 +14,7 @@ from ua_parser import user_agent_parser
|
||||||
from authentik.api.authorization import OwnerSuperuserPermissions
|
from authentik.api.authorization import OwnerSuperuserPermissions
|
||||||
from authentik.core.api.used_by import UsedByMixin
|
from authentik.core.api.used_by import UsedByMixin
|
||||||
from authentik.core.models import AuthenticatedSession
|
from authentik.core.models import AuthenticatedSession
|
||||||
from authentik.events.context_processors.asn import ASN_CONTEXT_PROCESSOR, ASNDict
|
from authentik.events.geo import GEOIP_READER, GeoIPDict
|
||||||
from authentik.events.context_processors.geoip import GEOIP_CONTEXT_PROCESSOR, GeoIPDict
|
|
||||||
|
|
||||||
|
|
||||||
class UserAgentDeviceDict(TypedDict):
|
class UserAgentDeviceDict(TypedDict):
|
||||||
|
@ -60,7 +59,6 @@ class AuthenticatedSessionSerializer(ModelSerializer):
|
||||||
current = SerializerMethodField()
|
current = SerializerMethodField()
|
||||||
user_agent = SerializerMethodField()
|
user_agent = SerializerMethodField()
|
||||||
geo_ip = SerializerMethodField()
|
geo_ip = SerializerMethodField()
|
||||||
asn = SerializerMethodField()
|
|
||||||
|
|
||||||
def get_current(self, instance: AuthenticatedSession) -> bool:
|
def get_current(self, instance: AuthenticatedSession) -> bool:
|
||||||
"""Check if session is currently active session"""
|
"""Check if session is currently active session"""
|
||||||
|
@ -72,12 +70,8 @@ class AuthenticatedSessionSerializer(ModelSerializer):
|
||||||
return user_agent_parser.Parse(instance.last_user_agent)
|
return user_agent_parser.Parse(instance.last_user_agent)
|
||||||
|
|
||||||
def get_geo_ip(self, instance: AuthenticatedSession) -> Optional[GeoIPDict]: # pragma: no cover
|
def get_geo_ip(self, instance: AuthenticatedSession) -> Optional[GeoIPDict]: # pragma: no cover
|
||||||
"""Get GeoIP Data"""
|
"""Get parsed user agent"""
|
||||||
return GEOIP_CONTEXT_PROCESSOR.city_dict(instance.last_ip)
|
return GEOIP_READER.city_dict(instance.last_ip)
|
||||||
|
|
||||||
def get_asn(self, instance: AuthenticatedSession) -> Optional[ASNDict]: # pragma: no cover
|
|
||||||
"""Get ASN Data"""
|
|
||||||
return ASN_CONTEXT_PROCESSOR.asn_dict(instance.last_ip)
|
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
model = AuthenticatedSession
|
model = AuthenticatedSession
|
||||||
|
@ -86,7 +80,6 @@ class AuthenticatedSessionSerializer(ModelSerializer):
|
||||||
"current",
|
"current",
|
||||||
"user_agent",
|
"user_agent",
|
||||||
"geo_ip",
|
"geo_ip",
|
||||||
"asn",
|
|
||||||
"user",
|
"user",
|
||||||
"last_ip",
|
"last_ip",
|
||||||
"last_user_agent",
|
"last_user_agent",
|
||||||
|
|
|
@ -8,7 +8,7 @@ from django_filters.filterset import FilterSet
|
||||||
from drf_spectacular.utils import OpenApiResponse, extend_schema
|
from drf_spectacular.utils import OpenApiResponse, extend_schema
|
||||||
from guardian.shortcuts import get_objects_for_user
|
from guardian.shortcuts import get_objects_for_user
|
||||||
from rest_framework.decorators import action
|
from rest_framework.decorators import action
|
||||||
from rest_framework.fields import CharField, IntegerField
|
from rest_framework.fields import CharField, IntegerField, JSONField
|
||||||
from rest_framework.request import Request
|
from rest_framework.request import Request
|
||||||
from rest_framework.response import Response
|
from rest_framework.response import Response
|
||||||
from rest_framework.serializers import ListSerializer, ModelSerializer, ValidationError
|
from rest_framework.serializers import ListSerializer, ModelSerializer, ValidationError
|
||||||
|
@ -16,7 +16,7 @@ from rest_framework.viewsets import ModelViewSet
|
||||||
|
|
||||||
from authentik.api.decorators import permission_required
|
from authentik.api.decorators import permission_required
|
||||||
from authentik.core.api.used_by import UsedByMixin
|
from authentik.core.api.used_by import UsedByMixin
|
||||||
from authentik.core.api.utils import JSONDictField, PassiveSerializer
|
from authentik.core.api.utils import PassiveSerializer, is_dict
|
||||||
from authentik.core.models import Group, User
|
from authentik.core.models import Group, User
|
||||||
from authentik.rbac.api.roles import RoleSerializer
|
from authentik.rbac.api.roles import RoleSerializer
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ from authentik.rbac.api.roles import RoleSerializer
|
||||||
class GroupMemberSerializer(ModelSerializer):
|
class GroupMemberSerializer(ModelSerializer):
|
||||||
"""Stripped down user serializer to show relevant users for groups"""
|
"""Stripped down user serializer to show relevant users for groups"""
|
||||||
|
|
||||||
attributes = JSONDictField(required=False)
|
attributes = JSONField(validators=[is_dict], required=False)
|
||||||
uid = CharField(read_only=True)
|
uid = CharField(read_only=True)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
@ -44,7 +44,7 @@ class GroupMemberSerializer(ModelSerializer):
|
||||||
class GroupSerializer(ModelSerializer):
|
class GroupSerializer(ModelSerializer):
|
||||||
"""Group Serializer"""
|
"""Group Serializer"""
|
||||||
|
|
||||||
attributes = JSONDictField(required=False)
|
attributes = JSONField(validators=[is_dict], required=False)
|
||||||
users_obj = ListSerializer(
|
users_obj = ListSerializer(
|
||||||
child=GroupMemberSerializer(), read_only=True, source="users", required=False
|
child=GroupMemberSerializer(), read_only=True, source="users", required=False
|
||||||
)
|
)
|
||||||
|
|
|
@ -19,7 +19,6 @@ from authentik.core.api.used_by import UsedByMixin
|
||||||
from authentik.core.api.utils import MetaNameSerializer, PassiveSerializer, TypeCreateSerializer
|
from authentik.core.api.utils import MetaNameSerializer, PassiveSerializer, TypeCreateSerializer
|
||||||
from authentik.core.expression.evaluator import PropertyMappingEvaluator
|
from authentik.core.expression.evaluator import PropertyMappingEvaluator
|
||||||
from authentik.core.models import PropertyMapping
|
from authentik.core.models import PropertyMapping
|
||||||
from authentik.enterprise.apps import EnterpriseConfig
|
|
||||||
from authentik.events.utils import sanitize_item
|
from authentik.events.utils import sanitize_item
|
||||||
from authentik.lib.utils.reflection import all_subclasses
|
from authentik.lib.utils.reflection import all_subclasses
|
||||||
from authentik.policies.api.exec import PolicyTestSerializer
|
from authentik.policies.api.exec import PolicyTestSerializer
|
||||||
|
@ -96,7 +95,6 @@ class PropertyMappingViewSet(
|
||||||
"description": subclass.__doc__,
|
"description": subclass.__doc__,
|
||||||
"component": subclass().component,
|
"component": subclass().component,
|
||||||
"model_name": subclass._meta.model_name,
|
"model_name": subclass._meta.model_name,
|
||||||
"requires_enterprise": isinstance(subclass._meta.app_config, EnterpriseConfig),
|
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
return Response(TypeCreateSerializer(data, many=True).data)
|
return Response(TypeCreateSerializer(data, many=True).data)
|
||||||
|
|
|
@ -16,7 +16,6 @@ from rest_framework.viewsets import GenericViewSet
|
||||||
from authentik.core.api.used_by import UsedByMixin
|
from authentik.core.api.used_by import UsedByMixin
|
||||||
from authentik.core.api.utils import MetaNameSerializer, TypeCreateSerializer
|
from authentik.core.api.utils import MetaNameSerializer, TypeCreateSerializer
|
||||||
from authentik.core.models import Provider
|
from authentik.core.models import Provider
|
||||||
from authentik.enterprise.apps import EnterpriseConfig
|
|
||||||
from authentik.lib.utils.reflection import all_subclasses
|
from authentik.lib.utils.reflection import all_subclasses
|
||||||
|
|
||||||
|
|
||||||
|
@ -114,7 +113,6 @@ class ProviderViewSet(
|
||||||
"description": subclass.__doc__,
|
"description": subclass.__doc__,
|
||||||
"component": subclass().component,
|
"component": subclass().component,
|
||||||
"model_name": subclass._meta.model_name,
|
"model_name": subclass._meta.model_name,
|
||||||
"requires_enterprise": isinstance(subclass._meta.app_config, EnterpriseConfig),
|
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
data.append(
|
data.append(
|
||||||
|
|
|
@ -31,7 +31,7 @@ class UsedBySerializer(PassiveSerializer):
|
||||||
model_name = CharField()
|
model_name = CharField()
|
||||||
pk = CharField()
|
pk = CharField()
|
||||||
name = CharField()
|
name = CharField()
|
||||||
action = ChoiceField(choices=[(x.value, x.name) for x in DeleteAction])
|
action = ChoiceField(choices=[(x.name, x.name) for x in DeleteAction])
|
||||||
|
|
||||||
|
|
||||||
def get_delete_action(manager: Manager) -> str:
|
def get_delete_action(manager: Manager) -> str:
|
||||||
|
|
|
@ -32,7 +32,13 @@ from drf_spectacular.utils import (
|
||||||
)
|
)
|
||||||
from guardian.shortcuts import get_anonymous_user, get_objects_for_user
|
from guardian.shortcuts import get_anonymous_user, get_objects_for_user
|
||||||
from rest_framework.decorators import action
|
from rest_framework.decorators import action
|
||||||
from rest_framework.fields import CharField, IntegerField, ListField, SerializerMethodField
|
from rest_framework.fields import (
|
||||||
|
CharField,
|
||||||
|
IntegerField,
|
||||||
|
JSONField,
|
||||||
|
ListField,
|
||||||
|
SerializerMethodField,
|
||||||
|
)
|
||||||
from rest_framework.request import Request
|
from rest_framework.request import Request
|
||||||
from rest_framework.response import Response
|
from rest_framework.response import Response
|
||||||
from rest_framework.serializers import (
|
from rest_framework.serializers import (
|
||||||
|
@ -51,7 +57,7 @@ from authentik.admin.api.metrics import CoordinateSerializer
|
||||||
from authentik.api.decorators import permission_required
|
from authentik.api.decorators import permission_required
|
||||||
from authentik.blueprints.v1.importer import SERIALIZER_CONTEXT_BLUEPRINT
|
from authentik.blueprints.v1.importer import SERIALIZER_CONTEXT_BLUEPRINT
|
||||||
from authentik.core.api.used_by import UsedByMixin
|
from authentik.core.api.used_by import UsedByMixin
|
||||||
from authentik.core.api.utils import JSONDictField, LinkSerializer, PassiveSerializer
|
from authentik.core.api.utils import LinkSerializer, PassiveSerializer, is_dict
|
||||||
from authentik.core.middleware import (
|
from authentik.core.middleware import (
|
||||||
SESSION_KEY_IMPERSONATE_ORIGINAL_USER,
|
SESSION_KEY_IMPERSONATE_ORIGINAL_USER,
|
||||||
SESSION_KEY_IMPERSONATE_USER,
|
SESSION_KEY_IMPERSONATE_USER,
|
||||||
|
@ -83,7 +89,7 @@ LOGGER = get_logger()
|
||||||
class UserGroupSerializer(ModelSerializer):
|
class UserGroupSerializer(ModelSerializer):
|
||||||
"""Simplified Group Serializer for user's groups"""
|
"""Simplified Group Serializer for user's groups"""
|
||||||
|
|
||||||
attributes = JSONDictField(required=False)
|
attributes = JSONField(required=False)
|
||||||
parent_name = CharField(source="parent.name", read_only=True)
|
parent_name = CharField(source="parent.name", read_only=True)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
@ -104,7 +110,7 @@ class UserSerializer(ModelSerializer):
|
||||||
|
|
||||||
is_superuser = BooleanField(read_only=True)
|
is_superuser = BooleanField(read_only=True)
|
||||||
avatar = CharField(read_only=True)
|
avatar = CharField(read_only=True)
|
||||||
attributes = JSONDictField(required=False)
|
attributes = JSONField(validators=[is_dict], required=False)
|
||||||
groups = PrimaryKeyRelatedField(
|
groups = PrimaryKeyRelatedField(
|
||||||
allow_empty=True, many=True, source="ak_groups", queryset=Group.objects.all(), default=list
|
allow_empty=True, many=True, source="ak_groups", queryset=Group.objects.all(), default=list
|
||||||
)
|
)
|
||||||
|
|
|
@ -2,10 +2,7 @@
|
||||||
from typing import Any
|
from typing import Any
|
||||||
|
|
||||||
from django.db.models import Model
|
from django.db.models import Model
|
||||||
from drf_spectacular.extensions import OpenApiSerializerFieldExtension
|
from rest_framework.fields import CharField, IntegerField, JSONField
|
||||||
from drf_spectacular.plumbing import build_basic_type
|
|
||||||
from drf_spectacular.types import OpenApiTypes
|
|
||||||
from rest_framework.fields import BooleanField, CharField, IntegerField, JSONField
|
|
||||||
from rest_framework.serializers import Serializer, SerializerMethodField, ValidationError
|
from rest_framework.serializers import Serializer, SerializerMethodField, ValidationError
|
||||||
|
|
||||||
|
|
||||||
|
@ -16,21 +13,6 @@ def is_dict(value: Any):
|
||||||
raise ValidationError("Value must be a dictionary, and not have any duplicate keys.")
|
raise ValidationError("Value must be a dictionary, and not have any duplicate keys.")
|
||||||
|
|
||||||
|
|
||||||
class JSONDictField(JSONField):
|
|
||||||
"""JSON Field which only allows dictionaries"""
|
|
||||||
|
|
||||||
default_validators = [is_dict]
|
|
||||||
|
|
||||||
|
|
||||||
class JSONExtension(OpenApiSerializerFieldExtension):
|
|
||||||
"""Generate API Schema for JSON fields as"""
|
|
||||||
|
|
||||||
target_class = "authentik.core.api.utils.JSONDictField"
|
|
||||||
|
|
||||||
def map_serializer_field(self, auto_schema, direction):
|
|
||||||
return build_basic_type(OpenApiTypes.OBJECT)
|
|
||||||
|
|
||||||
|
|
||||||
class PassiveSerializer(Serializer):
|
class PassiveSerializer(Serializer):
|
||||||
"""Base serializer class which doesn't implement create/update methods"""
|
"""Base serializer class which doesn't implement create/update methods"""
|
||||||
|
|
||||||
|
@ -44,7 +26,7 @@ class PassiveSerializer(Serializer):
|
||||||
class PropertyMappingPreviewSerializer(PassiveSerializer):
|
class PropertyMappingPreviewSerializer(PassiveSerializer):
|
||||||
"""Preview how the current user is mapped via the property mappings selected in a provider"""
|
"""Preview how the current user is mapped via the property mappings selected in a provider"""
|
||||||
|
|
||||||
preview = JSONDictField(read_only=True)
|
preview = JSONField(read_only=True)
|
||||||
|
|
||||||
|
|
||||||
class MetaNameSerializer(PassiveSerializer):
|
class MetaNameSerializer(PassiveSerializer):
|
||||||
|
@ -74,7 +56,6 @@ class TypeCreateSerializer(PassiveSerializer):
|
||||||
description = CharField(required=True)
|
description = CharField(required=True)
|
||||||
component = CharField(required=True)
|
component = CharField(required=True)
|
||||||
model_name = CharField(required=True)
|
model_name = CharField(required=True)
|
||||||
requires_enterprise = BooleanField(default=False)
|
|
||||||
|
|
||||||
|
|
||||||
class CacheSerializer(PassiveSerializer):
|
class CacheSerializer(PassiveSerializer):
|
||||||
|
|
|
@ -1,29 +1,22 @@
|
||||||
"""Channels base classes"""
|
"""Channels base classes"""
|
||||||
from channels.db import database_sync_to_async
|
|
||||||
from channels.exceptions import DenyConnection
|
from channels.exceptions import DenyConnection
|
||||||
|
from channels.generic.websocket import JsonWebsocketConsumer
|
||||||
from rest_framework.exceptions import AuthenticationFailed
|
from rest_framework.exceptions import AuthenticationFailed
|
||||||
from structlog.stdlib import get_logger
|
from structlog.stdlib import get_logger
|
||||||
|
|
||||||
from authentik.api.authentication import bearer_auth
|
from authentik.api.authentication import bearer_auth
|
||||||
|
from authentik.core.models import User
|
||||||
|
|
||||||
LOGGER = get_logger()
|
LOGGER = get_logger()
|
||||||
|
|
||||||
|
|
||||||
class TokenOutpostMiddleware:
|
class AuthJsonConsumer(JsonWebsocketConsumer):
|
||||||
"""Authorize a client with a token"""
|
"""Authorize a client with a token"""
|
||||||
|
|
||||||
def __init__(self, inner):
|
user: User
|
||||||
self.inner = inner
|
|
||||||
|
|
||||||
async def __call__(self, scope, receive, send):
|
def connect(self):
|
||||||
scope = dict(scope)
|
headers = dict(self.scope["headers"])
|
||||||
await self.auth(scope)
|
|
||||||
return await self.inner(scope, receive, send)
|
|
||||||
|
|
||||||
@database_sync_to_async
|
|
||||||
def auth(self, scope):
|
|
||||||
"""Authenticate request from header"""
|
|
||||||
headers = dict(scope["headers"])
|
|
||||||
if b"authorization" not in headers:
|
if b"authorization" not in headers:
|
||||||
LOGGER.warning("WS Request without authorization header")
|
LOGGER.warning("WS Request without authorization header")
|
||||||
raise DenyConnection()
|
raise DenyConnection()
|
||||||
|
@ -39,4 +32,4 @@ class TokenOutpostMiddleware:
|
||||||
LOGGER.warning("Failed to authenticate", exc=exc)
|
LOGGER.warning("Failed to authenticate", exc=exc)
|
||||||
raise DenyConnection()
|
raise DenyConnection()
|
||||||
|
|
||||||
scope["user"] = user
|
self.user = user
|
||||||
|
|
|
@ -30,6 +30,7 @@ from authentik.lib.models import (
|
||||||
DomainlessFormattedURLValidator,
|
DomainlessFormattedURLValidator,
|
||||||
SerializerModel,
|
SerializerModel,
|
||||||
)
|
)
|
||||||
|
from authentik.lib.utils.http import get_client_ip
|
||||||
from authentik.policies.models import PolicyBindingModel
|
from authentik.policies.models import PolicyBindingModel
|
||||||
from authentik.root.install_id import get_install_id
|
from authentik.root.install_id import get_install_id
|
||||||
|
|
||||||
|
@ -516,7 +517,7 @@ class Source(ManagedModel, SerializerModel, PolicyBindingModel):
|
||||||
objects = InheritanceManager()
|
objects = InheritanceManager()
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def icon_url(self) -> Optional[str]:
|
def get_icon(self) -> Optional[str]:
|
||||||
"""Get the URL to the Icon. If the name is /static or
|
"""Get the URL to the Icon. If the name is /static or
|
||||||
starts with http it is returned as-is"""
|
starts with http it is returned as-is"""
|
||||||
if not self.icon:
|
if not self.icon:
|
||||||
|
@ -747,14 +748,12 @@ class AuthenticatedSession(ExpiringModel):
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def from_request(request: HttpRequest, user: User) -> Optional["AuthenticatedSession"]:
|
def from_request(request: HttpRequest, user: User) -> Optional["AuthenticatedSession"]:
|
||||||
"""Create a new session from a http request"""
|
"""Create a new session from a http request"""
|
||||||
from authentik.root.middleware import ClientIPMiddleware
|
|
||||||
|
|
||||||
if not hasattr(request, "session") or not request.session.session_key:
|
if not hasattr(request, "session") or not request.session.session_key:
|
||||||
return None
|
return None
|
||||||
return AuthenticatedSession(
|
return AuthenticatedSession(
|
||||||
session_key=request.session.session_key,
|
session_key=request.session.session_key,
|
||||||
user=user,
|
user=user,
|
||||||
last_ip=ClientIPMiddleware.get_client_ip(request),
|
last_ip=get_client_ip(request),
|
||||||
last_user_agent=request.META.get("HTTP_USER_AGENT", ""),
|
last_user_agent=request.META.get("HTTP_USER_AGENT", ""),
|
||||||
expires=request.session.get_expiry_date(),
|
expires=request.session.get_expiry_date(),
|
||||||
)
|
)
|
||||||
|
|
|
@ -13,15 +13,20 @@ from authentik.core.models import (
|
||||||
ExpiringModel,
|
ExpiringModel,
|
||||||
User,
|
User,
|
||||||
)
|
)
|
||||||
from authentik.events.system_tasks import SystemTask, TaskStatus, prefill_task
|
from authentik.events.monitored_tasks import (
|
||||||
|
MonitoredTask,
|
||||||
|
TaskResult,
|
||||||
|
TaskResultStatus,
|
||||||
|
prefill_task,
|
||||||
|
)
|
||||||
from authentik.root.celery import CELERY_APP
|
from authentik.root.celery import CELERY_APP
|
||||||
|
|
||||||
LOGGER = get_logger()
|
LOGGER = get_logger()
|
||||||
|
|
||||||
|
|
||||||
@CELERY_APP.task(bind=True, base=SystemTask)
|
@CELERY_APP.task(bind=True, base=MonitoredTask)
|
||||||
@prefill_task
|
@prefill_task
|
||||||
def clean_expired_models(self: SystemTask):
|
def clean_expired_models(self: MonitoredTask):
|
||||||
"""Remove expired objects"""
|
"""Remove expired objects"""
|
||||||
messages = []
|
messages = []
|
||||||
for cls in ExpiringModel.__subclasses__():
|
for cls in ExpiringModel.__subclasses__():
|
||||||
|
@ -49,12 +54,12 @@ def clean_expired_models(self: SystemTask):
|
||||||
amount += 1
|
amount += 1
|
||||||
LOGGER.debug("Expired sessions", model=AuthenticatedSession, amount=amount)
|
LOGGER.debug("Expired sessions", model=AuthenticatedSession, amount=amount)
|
||||||
messages.append(f"Expired {amount} {AuthenticatedSession._meta.verbose_name_plural}")
|
messages.append(f"Expired {amount} {AuthenticatedSession._meta.verbose_name_plural}")
|
||||||
self.set_status(TaskStatus.SUCCESSFUL, *messages)
|
self.set_status(TaskResult(TaskResultStatus.SUCCESSFUL, messages))
|
||||||
|
|
||||||
|
|
||||||
@CELERY_APP.task(bind=True, base=SystemTask)
|
@CELERY_APP.task(bind=True, base=MonitoredTask)
|
||||||
@prefill_task
|
@prefill_task
|
||||||
def clean_temporary_users(self: SystemTask):
|
def clean_temporary_users(self: MonitoredTask):
|
||||||
"""Remove temporary users created by SAML Sources"""
|
"""Remove temporary users created by SAML Sources"""
|
||||||
_now = datetime.now()
|
_now = datetime.now()
|
||||||
messages = []
|
messages = []
|
||||||
|
@ -70,4 +75,4 @@ def clean_temporary_users(self: SystemTask):
|
||||||
user.delete()
|
user.delete()
|
||||||
deleted_users += 1
|
deleted_users += 1
|
||||||
messages.append(f"Successfully deleted {deleted_users} users.")
|
messages.append(f"Successfully deleted {deleted_users} users.")
|
||||||
self.set_status(TaskStatus.SUCCESSFUL, *messages)
|
self.set_status(TaskResult(TaskResultStatus.SUCCESSFUL, messages))
|
||||||
|
|
|
@ -27,7 +27,7 @@ window.authentik.flow = {
|
||||||
|
|
||||||
{% block body %}
|
{% block body %}
|
||||||
<ak-message-container></ak-message-container>
|
<ak-message-container></ak-message-container>
|
||||||
<ak-flow-executor flowSlug="{{ flow.slug }}">
|
<ak-flow-executor>
|
||||||
<ak-loading></ak-loading>
|
<ak-loading></ak-loading>
|
||||||
</ak-flow-executor>
|
</ak-flow-executor>
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
|
|
|
@ -44,14 +44,28 @@
|
||||||
|
|
||||||
{% block body %}
|
{% block body %}
|
||||||
<div class="pf-c-background-image">
|
<div class="pf-c-background-image">
|
||||||
|
<svg xmlns="http://www.w3.org/2000/svg" class="pf-c-background-image__filter" width="0" height="0">
|
||||||
|
<filter id="image_overlay">
|
||||||
|
<feColorMatrix in="SourceGraphic" type="matrix" values="1.3 0 0 0 0 0 1.3 0 0 0 0 0 1.3 0 0 0 0 0 1 0" />
|
||||||
|
<feComponentTransfer color-interpolation-filters="sRGB" result="duotone">
|
||||||
|
<feFuncR type="table" tableValues="0.086274509803922 0.43921568627451"></feFuncR>
|
||||||
|
<feFuncG type="table" tableValues="0.086274509803922 0.43921568627451"></feFuncG>
|
||||||
|
<feFuncB type="table" tableValues="0.086274509803922 0.43921568627451"></feFuncB>
|
||||||
|
<feFuncA type="table" tableValues="0 1"></feFuncA>
|
||||||
|
</feComponentTransfer>
|
||||||
|
</filter>
|
||||||
|
</svg>
|
||||||
</div>
|
</div>
|
||||||
<ak-message-container></ak-message-container>
|
<ak-message-container></ak-message-container>
|
||||||
<div class="pf-c-login stacked">
|
<div class="pf-c-login">
|
||||||
<div class="ak-login-container">
|
<div class="ak-login-container">
|
||||||
<main class="pf-c-login__main">
|
<header class="pf-c-login__header">
|
||||||
<div class="pf-c-login__main-header pf-c-brand ak-brand">
|
<div class="pf-c-brand ak-brand">
|
||||||
<img src="{{ tenant.branding_logo }}" alt="authentik Logo" />
|
<img src="{{ tenant.branding_logo }}" alt="authentik Logo" />
|
||||||
</div>
|
</div>
|
||||||
|
</header>
|
||||||
|
{% block main_container %}
|
||||||
|
<main class="pf-c-login__main">
|
||||||
<header class="pf-c-login__main-header">
|
<header class="pf-c-login__main-header">
|
||||||
<h1 class="pf-c-title pf-m-3xl">
|
<h1 class="pf-c-title pf-m-3xl">
|
||||||
{% block card_title %}
|
{% block card_title %}
|
||||||
|
@ -63,6 +77,7 @@
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
</div>
|
</div>
|
||||||
</main>
|
</main>
|
||||||
|
{% endblock %}
|
||||||
<footer class="pf-c-login__footer">
|
<footer class="pf-c-login__footer">
|
||||||
<ul class="pf-c-list pf-m-inline">
|
<ul class="pf-c-list pf-m-inline">
|
||||||
{% for link in footer_links %}
|
{% for link in footer_links %}
|
||||||
|
|
|
@ -22,7 +22,6 @@ class InterfaceView(TemplateView):
|
||||||
kwargs["version_family"] = f"{LOCAL_VERSION.major}.{LOCAL_VERSION.minor}"
|
kwargs["version_family"] = f"{LOCAL_VERSION.major}.{LOCAL_VERSION.minor}"
|
||||||
kwargs["version_subdomain"] = f"version-{LOCAL_VERSION.major}-{LOCAL_VERSION.minor}"
|
kwargs["version_subdomain"] = f"version-{LOCAL_VERSION.major}-{LOCAL_VERSION.minor}"
|
||||||
kwargs["build"] = get_build_hash()
|
kwargs["build"] = get_build_hash()
|
||||||
kwargs["url_kwargs"] = self.kwargs
|
|
||||||
return super().get_context_data(**kwargs)
|
return super().get_context_data(**kwargs)
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -9,8 +9,12 @@ from django.utils.translation import gettext_lazy as _
|
||||||
from structlog.stdlib import get_logger
|
from structlog.stdlib import get_logger
|
||||||
|
|
||||||
from authentik.crypto.models import CertificateKeyPair
|
from authentik.crypto.models import CertificateKeyPair
|
||||||
from authentik.events.models import TaskStatus
|
from authentik.events.monitored_tasks import (
|
||||||
from authentik.events.system_tasks import SystemTask, prefill_task
|
MonitoredTask,
|
||||||
|
TaskResult,
|
||||||
|
TaskResultStatus,
|
||||||
|
prefill_task,
|
||||||
|
)
|
||||||
from authentik.lib.config import CONFIG
|
from authentik.lib.config import CONFIG
|
||||||
from authentik.root.celery import CELERY_APP
|
from authentik.root.celery import CELERY_APP
|
||||||
|
|
||||||
|
@ -35,9 +39,9 @@ def ensure_certificate_valid(body: str):
|
||||||
return body
|
return body
|
||||||
|
|
||||||
|
|
||||||
@CELERY_APP.task(bind=True, base=SystemTask)
|
@CELERY_APP.task(bind=True, base=MonitoredTask)
|
||||||
@prefill_task
|
@prefill_task
|
||||||
def certificate_discovery(self: SystemTask):
|
def certificate_discovery(self: MonitoredTask):
|
||||||
"""Discover, import and update certificates from the filesystem"""
|
"""Discover, import and update certificates from the filesystem"""
|
||||||
certs = {}
|
certs = {}
|
||||||
private_keys = {}
|
private_keys = {}
|
||||||
|
@ -84,5 +88,8 @@ def certificate_discovery(self: SystemTask):
|
||||||
if dirty:
|
if dirty:
|
||||||
cert.save()
|
cert.save()
|
||||||
self.set_status(
|
self.set_status(
|
||||||
TaskStatus.SUCCESSFUL, _("Successfully imported %(count)d files." % {"count": discovered})
|
TaskResult(
|
||||||
|
TaskResultStatus.SUCCESSFUL,
|
||||||
|
messages=[_("Successfully imported %(count)d files." % {"count": discovered})],
|
||||||
|
)
|
||||||
)
|
)
|
||||||
|
|
|
@ -2,11 +2,9 @@
|
||||||
from datetime import datetime, timedelta
|
from datetime import datetime, timedelta
|
||||||
|
|
||||||
from django.utils.timezone import now
|
from django.utils.timezone import now
|
||||||
from django.utils.translation import gettext as _
|
|
||||||
from drf_spectacular.types import OpenApiTypes
|
from drf_spectacular.types import OpenApiTypes
|
||||||
from drf_spectacular.utils import extend_schema, inline_serializer
|
from drf_spectacular.utils import extend_schema, inline_serializer
|
||||||
from rest_framework.decorators import action
|
from rest_framework.decorators import action
|
||||||
from rest_framework.exceptions import ValidationError
|
|
||||||
from rest_framework.fields import BooleanField, CharField, DateTimeField, IntegerField
|
from rest_framework.fields import BooleanField, CharField, DateTimeField, IntegerField
|
||||||
from rest_framework.permissions import IsAuthenticated
|
from rest_framework.permissions import IsAuthenticated
|
||||||
from rest_framework.request import Request
|
from rest_framework.request import Request
|
||||||
|
@ -22,18 +20,6 @@ from authentik.enterprise.models import License, LicenseKey
|
||||||
from authentik.root.install_id import get_install_id
|
from authentik.root.install_id import get_install_id
|
||||||
|
|
||||||
|
|
||||||
class EnterpriseRequiredMixin:
|
|
||||||
"""Mixin to validate that a valid enterprise license
|
|
||||||
exists before allowing to safe the object"""
|
|
||||||
|
|
||||||
def validate(self, attrs: dict) -> dict:
|
|
||||||
"""Check that a valid license exists"""
|
|
||||||
total = LicenseKey.get_total()
|
|
||||||
if not total.is_valid():
|
|
||||||
raise ValidationError(_("Enterprise is required to create/update this object."))
|
|
||||||
return super().validate(attrs)
|
|
||||||
|
|
||||||
|
|
||||||
class LicenseSerializer(ModelSerializer):
|
class LicenseSerializer(ModelSerializer):
|
||||||
"""License Serializer"""
|
"""License Serializer"""
|
||||||
|
|
||||||
|
|
|
@ -2,11 +2,7 @@
|
||||||
from authentik.blueprints.apps import ManagedAppConfig
|
from authentik.blueprints.apps import ManagedAppConfig
|
||||||
|
|
||||||
|
|
||||||
class EnterpriseConfig(ManagedAppConfig):
|
class AuthentikEnterpriseConfig(ManagedAppConfig):
|
||||||
"""Base app config for all enterprise apps"""
|
|
||||||
|
|
||||||
|
|
||||||
class AuthentikEnterpriseConfig(EnterpriseConfig):
|
|
||||||
"""Enterprise app config"""
|
"""Enterprise app config"""
|
||||||
|
|
||||||
name = "authentik.enterprise"
|
name = "authentik.enterprise"
|
||||||
|
|
|
@ -1,8 +1,6 @@
|
||||||
"""Enterprise license policies"""
|
"""Enterprise license policies"""
|
||||||
from typing import Optional
|
from typing import Optional
|
||||||
|
|
||||||
from django.utils.translation import gettext_lazy as _
|
|
||||||
|
|
||||||
from authentik.core.models import User, UserTypes
|
from authentik.core.models import User, UserTypes
|
||||||
from authentik.enterprise.models import LicenseKey
|
from authentik.enterprise.models import LicenseKey
|
||||||
from authentik.policies.types import PolicyRequest, PolicyResult
|
from authentik.policies.types import PolicyRequest, PolicyResult
|
||||||
|
@ -15,10 +13,10 @@ class EnterprisePolicyAccessView(PolicyAccessView):
|
||||||
def check_license(self):
|
def check_license(self):
|
||||||
"""Check license"""
|
"""Check license"""
|
||||||
if not LicenseKey.get_total().is_valid():
|
if not LicenseKey.get_total().is_valid():
|
||||||
return PolicyResult(False, _("Enterprise required to access this feature."))
|
return False
|
||||||
if self.request.user.type != UserTypes.INTERNAL:
|
if self.request.user.type != UserTypes.INTERNAL:
|
||||||
return PolicyResult(False, _("Feature only accessible for internal users."))
|
return False
|
||||||
return PolicyResult(True)
|
return True
|
||||||
|
|
||||||
def user_has_access(self, user: Optional[User] = None) -> PolicyResult:
|
def user_has_access(self, user: Optional[User] = None) -> PolicyResult:
|
||||||
user = user or self.request.user
|
user = user or self.request.user
|
||||||
|
@ -26,7 +24,7 @@ class EnterprisePolicyAccessView(PolicyAccessView):
|
||||||
request.http_request = self.request
|
request.http_request = self.request
|
||||||
result = super().user_has_access(user)
|
result = super().user_has_access(user)
|
||||||
enterprise_result = self.check_license()
|
enterprise_result = self.check_license()
|
||||||
if not enterprise_result.passing:
|
if not enterprise_result:
|
||||||
return enterprise_result
|
return enterprise_result
|
||||||
return result
|
return result
|
||||||
|
|
||||||
|
|
|
@ -1,135 +0,0 @@
|
||||||
"""RAC Provider API Views"""
|
|
||||||
from typing import Optional
|
|
||||||
|
|
||||||
from django.core.cache import cache
|
|
||||||
from django.db.models import QuerySet
|
|
||||||
from django.urls import reverse
|
|
||||||
from drf_spectacular.types import OpenApiTypes
|
|
||||||
from drf_spectacular.utils import OpenApiParameter, OpenApiResponse, extend_schema
|
|
||||||
from rest_framework.fields import SerializerMethodField
|
|
||||||
from rest_framework.request import Request
|
|
||||||
from rest_framework.response import Response
|
|
||||||
from rest_framework.serializers import ModelSerializer
|
|
||||||
from rest_framework.viewsets import ModelViewSet
|
|
||||||
from structlog.stdlib import get_logger
|
|
||||||
|
|
||||||
from authentik.core.api.used_by import UsedByMixin
|
|
||||||
from authentik.core.models import Provider
|
|
||||||
from authentik.enterprise.api import EnterpriseRequiredMixin
|
|
||||||
from authentik.enterprise.providers.rac.api.providers import RACProviderSerializer
|
|
||||||
from authentik.enterprise.providers.rac.models import Endpoint
|
|
||||||
from authentik.policies.engine import PolicyEngine
|
|
||||||
from authentik.rbac.filters import ObjectFilter
|
|
||||||
|
|
||||||
LOGGER = get_logger()
|
|
||||||
|
|
||||||
|
|
||||||
def user_endpoint_cache_key(user_pk: str) -> str:
|
|
||||||
"""Cache key where endpoint list for user is saved"""
|
|
||||||
return f"goauthentik.io/providers/rac/endpoint_access/{user_pk}"
|
|
||||||
|
|
||||||
|
|
||||||
class EndpointSerializer(EnterpriseRequiredMixin, ModelSerializer):
|
|
||||||
"""Endpoint Serializer"""
|
|
||||||
|
|
||||||
provider_obj = RACProviderSerializer(source="provider", read_only=True)
|
|
||||||
launch_url = SerializerMethodField()
|
|
||||||
|
|
||||||
def get_launch_url(self, endpoint: Endpoint) -> Optional[str]:
|
|
||||||
"""Build actual launch URL (the provider itself does not have one, just
|
|
||||||
individual endpoints)"""
|
|
||||||
try:
|
|
||||||
# pylint: disable=no-member
|
|
||||||
return reverse(
|
|
||||||
"authentik_providers_rac:start",
|
|
||||||
kwargs={"app": endpoint.provider.application.slug, "endpoint": endpoint.pk},
|
|
||||||
)
|
|
||||||
except Provider.application.RelatedObjectDoesNotExist:
|
|
||||||
return None
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
model = Endpoint
|
|
||||||
fields = [
|
|
||||||
"pk",
|
|
||||||
"name",
|
|
||||||
"provider",
|
|
||||||
"provider_obj",
|
|
||||||
"protocol",
|
|
||||||
"host",
|
|
||||||
"settings",
|
|
||||||
"property_mappings",
|
|
||||||
"auth_mode",
|
|
||||||
"launch_url",
|
|
||||||
"maximum_connections",
|
|
||||||
]
|
|
||||||
|
|
||||||
|
|
||||||
class EndpointViewSet(UsedByMixin, ModelViewSet):
|
|
||||||
"""Endpoint Viewset"""
|
|
||||||
|
|
||||||
queryset = Endpoint.objects.all()
|
|
||||||
serializer_class = EndpointSerializer
|
|
||||||
filterset_fields = ["name", "provider"]
|
|
||||||
search_fields = ["name", "protocol"]
|
|
||||||
ordering = ["name", "protocol"]
|
|
||||||
|
|
||||||
def _filter_queryset_for_list(self, queryset: QuerySet) -> QuerySet:
|
|
||||||
"""Custom filter_queryset method which ignores guardian, but still supports sorting"""
|
|
||||||
for backend in list(self.filter_backends):
|
|
||||||
if backend == ObjectFilter:
|
|
||||||
continue
|
|
||||||
queryset = backend().filter_queryset(self.request, queryset, self)
|
|
||||||
return queryset
|
|
||||||
|
|
||||||
def _get_allowed_endpoints(self, queryset: QuerySet) -> list[Endpoint]:
|
|
||||||
endpoints = []
|
|
||||||
for endpoint in queryset:
|
|
||||||
engine = PolicyEngine(endpoint, self.request.user, self.request)
|
|
||||||
engine.build()
|
|
||||||
if engine.passing:
|
|
||||||
endpoints.append(endpoint)
|
|
||||||
return endpoints
|
|
||||||
|
|
||||||
@extend_schema(
|
|
||||||
parameters=[
|
|
||||||
OpenApiParameter(
|
|
||||||
"search",
|
|
||||||
OpenApiTypes.STR,
|
|
||||||
),
|
|
||||||
OpenApiParameter(
|
|
||||||
name="superuser_full_list",
|
|
||||||
location=OpenApiParameter.QUERY,
|
|
||||||
type=OpenApiTypes.BOOL,
|
|
||||||
),
|
|
||||||
],
|
|
||||||
responses={
|
|
||||||
200: EndpointSerializer(many=True),
|
|
||||||
400: OpenApiResponse(description="Bad request"),
|
|
||||||
},
|
|
||||||
)
|
|
||||||
def list(self, request: Request, *args, **kwargs) -> Response:
|
|
||||||
"""List accessible endpoints"""
|
|
||||||
should_cache = request.GET.get("search", "") == ""
|
|
||||||
|
|
||||||
superuser_full_list = str(request.GET.get("superuser_full_list", "false")).lower() == "true"
|
|
||||||
if superuser_full_list and request.user.is_superuser:
|
|
||||||
return super().list(request)
|
|
||||||
|
|
||||||
queryset = self._filter_queryset_for_list(self.get_queryset())
|
|
||||||
self.paginate_queryset(queryset)
|
|
||||||
|
|
||||||
allowed_endpoints = []
|
|
||||||
if not should_cache:
|
|
||||||
allowed_endpoints = self._get_allowed_endpoints(queryset)
|
|
||||||
if should_cache:
|
|
||||||
allowed_endpoints = cache.get(user_endpoint_cache_key(self.request.user.pk))
|
|
||||||
if not allowed_endpoints:
|
|
||||||
LOGGER.debug("Caching allowed endpoint list")
|
|
||||||
allowed_endpoints = self._get_allowed_endpoints(queryset)
|
|
||||||
cache.set(
|
|
||||||
user_endpoint_cache_key(self.request.user.pk),
|
|
||||||
allowed_endpoints,
|
|
||||||
timeout=86400,
|
|
||||||
)
|
|
||||||
serializer = self.get_serializer(allowed_endpoints, many=True)
|
|
||||||
return self.get_paginated_response(serializer.data)
|
|
|
@ -1,36 +0,0 @@
|
||||||
"""RAC Provider API Views"""
|
|
||||||
from rest_framework.fields import CharField
|
|
||||||
from rest_framework.viewsets import ModelViewSet
|
|
||||||
|
|
||||||
from authentik.core.api.propertymappings import PropertyMappingSerializer
|
|
||||||
from authentik.core.api.used_by import UsedByMixin
|
|
||||||
from authentik.core.api.utils import JSONDictField
|
|
||||||
from authentik.enterprise.api import EnterpriseRequiredMixin
|
|
||||||
from authentik.enterprise.providers.rac.models import RACPropertyMapping
|
|
||||||
|
|
||||||
|
|
||||||
class RACPropertyMappingSerializer(EnterpriseRequiredMixin, PropertyMappingSerializer):
|
|
||||||
"""RACPropertyMapping Serializer"""
|
|
||||||
|
|
||||||
static_settings = JSONDictField()
|
|
||||||
expression = CharField(allow_blank=True, required=False)
|
|
||||||
|
|
||||||
def validate_expression(self, expression: str) -> str:
|
|
||||||
"""Test Syntax"""
|
|
||||||
if expression == "":
|
|
||||||
return expression
|
|
||||||
return super().validate_expression(expression)
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
model = RACPropertyMapping
|
|
||||||
fields = PropertyMappingSerializer.Meta.fields + ["static_settings"]
|
|
||||||
|
|
||||||
|
|
||||||
class RACPropertyMappingViewSet(UsedByMixin, ModelViewSet):
|
|
||||||
"""RACPropertyMapping Viewset"""
|
|
||||||
|
|
||||||
queryset = RACPropertyMapping.objects.all()
|
|
||||||
serializer_class = RACPropertyMappingSerializer
|
|
||||||
search_fields = ["name"]
|
|
||||||
ordering = ["name"]
|
|
||||||
filterset_fields = ["name", "managed"]
|
|
|
@ -1,32 +0,0 @@
|
||||||
"""RAC Provider API Views"""
|
|
||||||
from rest_framework.fields import CharField, ListField
|
|
||||||
from rest_framework.viewsets import ModelViewSet
|
|
||||||
|
|
||||||
from authentik.core.api.providers import ProviderSerializer
|
|
||||||
from authentik.core.api.used_by import UsedByMixin
|
|
||||||
from authentik.enterprise.api import EnterpriseRequiredMixin
|
|
||||||
from authentik.enterprise.providers.rac.models import RACProvider
|
|
||||||
|
|
||||||
|
|
||||||
class RACProviderSerializer(EnterpriseRequiredMixin, ProviderSerializer):
|
|
||||||
"""RACProvider Serializer"""
|
|
||||||
|
|
||||||
outpost_set = ListField(child=CharField(), read_only=True, source="outpost_set.all")
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
model = RACProvider
|
|
||||||
fields = ProviderSerializer.Meta.fields + ["settings", "outpost_set", "connection_expiry"]
|
|
||||||
extra_kwargs = ProviderSerializer.Meta.extra_kwargs
|
|
||||||
|
|
||||||
|
|
||||||
class RACProviderViewSet(UsedByMixin, ModelViewSet):
|
|
||||||
"""RACProvider Viewset"""
|
|
||||||
|
|
||||||
queryset = RACProvider.objects.all()
|
|
||||||
serializer_class = RACProviderSerializer
|
|
||||||
filterset_fields = {
|
|
||||||
"application": ["isnull"],
|
|
||||||
"name": ["iexact"],
|
|
||||||
}
|
|
||||||
search_fields = ["name"]
|
|
||||||
ordering = ["name"]
|
|
|
@ -1,17 +0,0 @@
|
||||||
"""RAC app config"""
|
|
||||||
from authentik.enterprise.apps import EnterpriseConfig
|
|
||||||
|
|
||||||
|
|
||||||
class AuthentikEnterpriseProviderRAC(EnterpriseConfig):
|
|
||||||
"""authentik enterprise rac app config"""
|
|
||||||
|
|
||||||
name = "authentik.enterprise.providers.rac"
|
|
||||||
label = "authentik_providers_rac"
|
|
||||||
verbose_name = "authentik Enterprise.Providers.RAC"
|
|
||||||
default = True
|
|
||||||
mountpoint = ""
|
|
||||||
ws_mountpoint = "authentik.enterprise.providers.rac.urls"
|
|
||||||
|
|
||||||
def reconcile_load_rac_signals(self):
|
|
||||||
"""Load rac signals"""
|
|
||||||
self.import_module("authentik.enterprise.providers.rac.signals")
|
|
|
@ -1,163 +0,0 @@
|
||||||
"""RAC Client consumer"""
|
|
||||||
from asgiref.sync import async_to_sync
|
|
||||||
from channels.db import database_sync_to_async
|
|
||||||
from channels.exceptions import ChannelFull, DenyConnection
|
|
||||||
from channels.generic.websocket import AsyncWebsocketConsumer
|
|
||||||
from django.http.request import QueryDict
|
|
||||||
from structlog.stdlib import BoundLogger, get_logger
|
|
||||||
|
|
||||||
from authentik.enterprise.providers.rac.models import ConnectionToken, RACProvider
|
|
||||||
from authentik.outposts.consumer import OUTPOST_GROUP_INSTANCE
|
|
||||||
from authentik.outposts.models import Outpost, OutpostState, OutpostType
|
|
||||||
|
|
||||||
# Global broadcast group, which messages are sent to when the outpost connects back
|
|
||||||
# to authentik for a specific connection
|
|
||||||
# The `RACClientConsumer` consumer adds itself to this group on connection,
|
|
||||||
# and removes itself once it has been assigned a specific outpost channel
|
|
||||||
RAC_CLIENT_GROUP = "group_enterprise_rac_client"
|
|
||||||
# A group for all connections in a given authentik session ID
|
|
||||||
# A disconnect message is sent to this group when the session expires/is deleted
|
|
||||||
RAC_CLIENT_GROUP_SESSION = "group_enterprise_rac_client_%(session)s"
|
|
||||||
# A group for all connections with a specific token, which in almost all cases
|
|
||||||
# is just one connection, however this is used to disconnect the connection
|
|
||||||
# when the token is deleted
|
|
||||||
RAC_CLIENT_GROUP_TOKEN = "group_enterprise_rac_token_%(token)s" # nosec
|
|
||||||
|
|
||||||
# Step 1: Client connects to this websocket endpoint
|
|
||||||
# Step 2: We prepare all the connection args for Guac
|
|
||||||
# Step 3: Send a websocket message to a single outpost that has this provider assigned
|
|
||||||
# (Currently sending to all of them)
|
|
||||||
# (Should probably do different load balancing algorithms)
|
|
||||||
# Step 4: Outpost creates a websocket connection back to authentik
|
|
||||||
# with /ws/outpost_rac/<our_channel_id>/
|
|
||||||
# Step 5: This consumer transfers data between the two channels
|
|
||||||
|
|
||||||
|
|
||||||
class RACClientConsumer(AsyncWebsocketConsumer):
|
|
||||||
"""RAC client consumer the browser connects to"""
|
|
||||||
|
|
||||||
dest_channel_id: str = ""
|
|
||||||
provider: RACProvider
|
|
||||||
token: ConnectionToken
|
|
||||||
logger: BoundLogger
|
|
||||||
|
|
||||||
async def connect(self):
|
|
||||||
await self.accept("guacamole")
|
|
||||||
await self.channel_layer.group_add(RAC_CLIENT_GROUP, self.channel_name)
|
|
||||||
await self.channel_layer.group_add(
|
|
||||||
RAC_CLIENT_GROUP_SESSION % {"session": self.scope["session"].session_key},
|
|
||||||
self.channel_name,
|
|
||||||
)
|
|
||||||
await self.init_outpost_connection()
|
|
||||||
|
|
||||||
async def disconnect(self, code):
|
|
||||||
self.logger.debug("Disconnecting")
|
|
||||||
# Tell the outpost we're disconnecting
|
|
||||||
await self.channel_layer.send(
|
|
||||||
self.dest_channel_id,
|
|
||||||
{
|
|
||||||
"type": "event.disconnect",
|
|
||||||
},
|
|
||||||
)
|
|
||||||
|
|
||||||
@database_sync_to_async
|
|
||||||
def init_outpost_connection(self):
|
|
||||||
"""Initialize guac connection settings"""
|
|
||||||
self.token = ConnectionToken.filter_not_expired(
|
|
||||||
token=self.scope["url_route"]["kwargs"]["token"]
|
|
||||||
).first()
|
|
||||||
if not self.token:
|
|
||||||
raise DenyConnection()
|
|
||||||
self.provider = self.token.provider
|
|
||||||
params = self.token.get_settings()
|
|
||||||
self.logger = get_logger().bind(
|
|
||||||
endpoint=self.token.endpoint.name, user=self.scope["user"].username
|
|
||||||
)
|
|
||||||
msg = {
|
|
||||||
"type": "event.provider.specific",
|
|
||||||
"sub_type": "init_connection",
|
|
||||||
"dest_channel_id": self.channel_name,
|
|
||||||
"params": params,
|
|
||||||
"protocol": self.token.endpoint.protocol,
|
|
||||||
}
|
|
||||||
query = QueryDict(self.scope["query_string"].decode())
|
|
||||||
for key in ["screen_width", "screen_height", "screen_dpi", "audio"]:
|
|
||||||
value = query.get(key, None)
|
|
||||||
if not value:
|
|
||||||
continue
|
|
||||||
msg[key] = str(value)
|
|
||||||
outposts = Outpost.objects.filter(
|
|
||||||
type=OutpostType.RAC,
|
|
||||||
providers__in=[self.provider],
|
|
||||||
)
|
|
||||||
if not outposts.exists():
|
|
||||||
self.logger.warning("Provider has no outpost")
|
|
||||||
raise DenyConnection()
|
|
||||||
for outpost in outposts:
|
|
||||||
# Sort all states for the outpost by connection count
|
|
||||||
states = sorted(
|
|
||||||
OutpostState.for_outpost(outpost),
|
|
||||||
key=lambda state: int(state.args.get("active_connections", 0)),
|
|
||||||
)
|
|
||||||
if len(states) < 1:
|
|
||||||
continue
|
|
||||||
self.logger.debug("Sending out connection broadcast")
|
|
||||||
async_to_sync(self.channel_layer.group_send)(
|
|
||||||
OUTPOST_GROUP_INSTANCE % {"outpost_pk": str(outpost.pk), "instance": states[0].uid},
|
|
||||||
msg,
|
|
||||||
)
|
|
||||||
|
|
||||||
async def receive(self, text_data=None, bytes_data=None):
|
|
||||||
"""Mirror data received from client to the dest_channel_id
|
|
||||||
which is the channel talking to guacd"""
|
|
||||||
if self.dest_channel_id == "":
|
|
||||||
return
|
|
||||||
if self.token.is_expired:
|
|
||||||
await self.event_disconnect({"reason": "token_expiry"})
|
|
||||||
return
|
|
||||||
try:
|
|
||||||
await self.channel_layer.send(
|
|
||||||
self.dest_channel_id,
|
|
||||||
{
|
|
||||||
"type": "event.send",
|
|
||||||
"text_data": text_data,
|
|
||||||
"bytes_data": bytes_data,
|
|
||||||
},
|
|
||||||
)
|
|
||||||
except ChannelFull:
|
|
||||||
pass
|
|
||||||
|
|
||||||
async def event_outpost_connected(self, event: dict):
|
|
||||||
"""Handle event broadcasted from outpost consumer, and check if they
|
|
||||||
created a connection for us"""
|
|
||||||
outpost_channel = event.get("outpost_channel")
|
|
||||||
if event.get("client_channel") != self.channel_name:
|
|
||||||
return
|
|
||||||
if self.dest_channel_id != "":
|
|
||||||
# We've already selected an outpost channel, so tell the other channel to disconnect
|
|
||||||
# This should never happen since we remove ourselves from the broadcast group
|
|
||||||
await self.channel_layer.send(
|
|
||||||
outpost_channel,
|
|
||||||
{
|
|
||||||
"type": "event.disconnect",
|
|
||||||
},
|
|
||||||
)
|
|
||||||
return
|
|
||||||
self.logger.debug("Connected to a single outpost instance")
|
|
||||||
self.dest_channel_id = outpost_channel
|
|
||||||
# Since we have a specific outpost channel now, we can remove
|
|
||||||
# ourselves from the global broadcast group
|
|
||||||
await self.channel_layer.group_discard(RAC_CLIENT_GROUP, self.channel_name)
|
|
||||||
|
|
||||||
async def event_send(self, event: dict):
|
|
||||||
"""Handler called by outpost websocket that sends data to this specific
|
|
||||||
client connection"""
|
|
||||||
if self.token.is_expired:
|
|
||||||
await self.event_disconnect({"reason": "token_expiry"})
|
|
||||||
return
|
|
||||||
await self.send(text_data=event.get("text_data"), bytes_data=event.get("bytes_data"))
|
|
||||||
|
|
||||||
async def event_disconnect(self, event: dict):
|
|
||||||
"""Disconnect when the session ends"""
|
|
||||||
self.logger.info("Disconnecting RAC connection", reason=event.get("reason"))
|
|
||||||
await self.close()
|
|
|
@ -1,48 +0,0 @@
|
||||||
"""RAC consumer"""
|
|
||||||
from channels.exceptions import ChannelFull
|
|
||||||
from channels.generic.websocket import AsyncWebsocketConsumer
|
|
||||||
|
|
||||||
from authentik.enterprise.providers.rac.consumer_client import RAC_CLIENT_GROUP
|
|
||||||
|
|
||||||
|
|
||||||
class RACOutpostConsumer(AsyncWebsocketConsumer):
|
|
||||||
"""Consumer the outpost connects to, to send specific data back to a client connection"""
|
|
||||||
|
|
||||||
dest_channel_id: str
|
|
||||||
|
|
||||||
async def connect(self):
|
|
||||||
self.dest_channel_id = self.scope["url_route"]["kwargs"]["channel"]
|
|
||||||
await self.accept()
|
|
||||||
await self.channel_layer.group_send(
|
|
||||||
RAC_CLIENT_GROUP,
|
|
||||||
{
|
|
||||||
"type": "event.outpost.connected",
|
|
||||||
"outpost_channel": self.channel_name,
|
|
||||||
"client_channel": self.dest_channel_id,
|
|
||||||
},
|
|
||||||
)
|
|
||||||
|
|
||||||
async def receive(self, text_data=None, bytes_data=None):
|
|
||||||
"""Mirror data received from guacd running in the outpost
|
|
||||||
to the dest_channel_id which is the channel talking to the browser"""
|
|
||||||
try:
|
|
||||||
await self.channel_layer.send(
|
|
||||||
self.dest_channel_id,
|
|
||||||
{
|
|
||||||
"type": "event.send",
|
|
||||||
"text_data": text_data,
|
|
||||||
"bytes_data": bytes_data,
|
|
||||||
},
|
|
||||||
)
|
|
||||||
except ChannelFull:
|
|
||||||
pass
|
|
||||||
|
|
||||||
async def event_send(self, event: dict):
|
|
||||||
"""Handler called by client websocket that sends data to this specific
|
|
||||||
outpost connection"""
|
|
||||||
await self.send(text_data=event.get("text_data"), bytes_data=event.get("bytes_data"))
|
|
||||||
|
|
||||||
async def event_disconnect(self, event: dict):
|
|
||||||
"""Tell outpost we're about to disconnect"""
|
|
||||||
await self.send(text_data="0.authentik.disconnect")
|
|
||||||
await self.close()
|
|
|
@ -1,11 +0,0 @@
|
||||||
"""RAC Provider Docker Controller"""
|
|
||||||
from authentik.outposts.controllers.docker import DockerController
|
|
||||||
from authentik.outposts.models import DockerServiceConnection, Outpost
|
|
||||||
|
|
||||||
|
|
||||||
class RACDockerController(DockerController):
|
|
||||||
"""RAC Provider Docker Controller"""
|
|
||||||
|
|
||||||
def __init__(self, outpost: Outpost, connection: DockerServiceConnection):
|
|
||||||
super().__init__(outpost, connection)
|
|
||||||
self.deployment_ports = []
|
|
|
@ -1,13 +0,0 @@
|
||||||
"""RAC Provider Kubernetes Controller"""
|
|
||||||
from authentik.outposts.controllers.k8s.service import ServiceReconciler
|
|
||||||
from authentik.outposts.controllers.kubernetes import KubernetesController
|
|
||||||
from authentik.outposts.models import KubernetesServiceConnection, Outpost
|
|
||||||
|
|
||||||
|
|
||||||
class RACKubernetesController(KubernetesController):
|
|
||||||
"""RAC Provider Kubernetes Controller"""
|
|
||||||
|
|
||||||
def __init__(self, outpost: Outpost, connection: KubernetesServiceConnection):
|
|
||||||
super().__init__(outpost, connection)
|
|
||||||
self.deployment_ports = []
|
|
||||||
del self.reconcilers[ServiceReconciler.reconciler_name()]
|
|
|
@ -1,164 +0,0 @@
|
||||||
# Generated by Django 4.2.8 on 2023-12-29 15:58
|
|
||||||
|
|
||||||
import uuid
|
|
||||||
|
|
||||||
import django.db.models.deletion
|
|
||||||
from django.db import migrations, models
|
|
||||||
|
|
||||||
import authentik.core.models
|
|
||||||
import authentik.lib.utils.time
|
|
||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
|
||||||
initial = True
|
|
||||||
|
|
||||||
dependencies = [
|
|
||||||
("authentik_policies", "0011_policybinding_failure_result_and_more"),
|
|
||||||
("authentik_core", "0032_group_roles"),
|
|
||||||
]
|
|
||||||
|
|
||||||
operations = [
|
|
||||||
migrations.CreateModel(
|
|
||||||
name="RACPropertyMapping",
|
|
||||||
fields=[
|
|
||||||
(
|
|
||||||
"propertymapping_ptr",
|
|
||||||
models.OneToOneField(
|
|
||||||
auto_created=True,
|
|
||||||
on_delete=django.db.models.deletion.CASCADE,
|
|
||||||
parent_link=True,
|
|
||||||
primary_key=True,
|
|
||||||
serialize=False,
|
|
||||||
to="authentik_core.propertymapping",
|
|
||||||
),
|
|
||||||
),
|
|
||||||
("static_settings", models.JSONField(default=dict)),
|
|
||||||
],
|
|
||||||
options={
|
|
||||||
"verbose_name": "RAC Property Mapping",
|
|
||||||
"verbose_name_plural": "RAC Property Mappings",
|
|
||||||
},
|
|
||||||
bases=("authentik_core.propertymapping",),
|
|
||||||
),
|
|
||||||
migrations.CreateModel(
|
|
||||||
name="RACProvider",
|
|
||||||
fields=[
|
|
||||||
(
|
|
||||||
"provider_ptr",
|
|
||||||
models.OneToOneField(
|
|
||||||
auto_created=True,
|
|
||||||
on_delete=django.db.models.deletion.CASCADE,
|
|
||||||
parent_link=True,
|
|
||||||
primary_key=True,
|
|
||||||
serialize=False,
|
|
||||||
to="authentik_core.provider",
|
|
||||||
),
|
|
||||||
),
|
|
||||||
("settings", models.JSONField(default=dict)),
|
|
||||||
(
|
|
||||||
"auth_mode",
|
|
||||||
models.TextField(
|
|
||||||
choices=[("static", "Static"), ("prompt", "Prompt")], default="prompt"
|
|
||||||
),
|
|
||||||
),
|
|
||||||
(
|
|
||||||
"connection_expiry",
|
|
||||||
models.TextField(
|
|
||||||
default="hours=8",
|
|
||||||
help_text="Determines how long a session lasts. Default of 0 means that the sessions lasts until the browser is closed. (Format: hours=-1;minutes=-2;seconds=-3)",
|
|
||||||
validators=[authentik.lib.utils.time.timedelta_string_validator],
|
|
||||||
),
|
|
||||||
),
|
|
||||||
],
|
|
||||||
options={
|
|
||||||
"verbose_name": "RAC Provider",
|
|
||||||
"verbose_name_plural": "RAC Providers",
|
|
||||||
},
|
|
||||||
bases=("authentik_core.provider",),
|
|
||||||
),
|
|
||||||
migrations.CreateModel(
|
|
||||||
name="Endpoint",
|
|
||||||
fields=[
|
|
||||||
(
|
|
||||||
"policybindingmodel_ptr",
|
|
||||||
models.OneToOneField(
|
|
||||||
auto_created=True,
|
|
||||||
on_delete=django.db.models.deletion.CASCADE,
|
|
||||||
parent_link=True,
|
|
||||||
primary_key=True,
|
|
||||||
serialize=False,
|
|
||||||
to="authentik_policies.policybindingmodel",
|
|
||||||
),
|
|
||||||
),
|
|
||||||
("name", models.TextField()),
|
|
||||||
("host", models.TextField()),
|
|
||||||
(
|
|
||||||
"protocol",
|
|
||||||
models.TextField(choices=[("rdp", "Rdp"), ("vnc", "Vnc"), ("ssh", "Ssh")]),
|
|
||||||
),
|
|
||||||
("settings", models.JSONField(default=dict)),
|
|
||||||
(
|
|
||||||
"auth_mode",
|
|
||||||
models.TextField(choices=[("static", "Static"), ("prompt", "Prompt")]),
|
|
||||||
),
|
|
||||||
(
|
|
||||||
"property_mappings",
|
|
||||||
models.ManyToManyField(
|
|
||||||
blank=True, default=None, to="authentik_core.propertymapping"
|
|
||||||
),
|
|
||||||
),
|
|
||||||
(
|
|
||||||
"provider",
|
|
||||||
models.ForeignKey(
|
|
||||||
on_delete=django.db.models.deletion.CASCADE,
|
|
||||||
to="authentik_providers_rac.racprovider",
|
|
||||||
),
|
|
||||||
),
|
|
||||||
],
|
|
||||||
options={
|
|
||||||
"verbose_name": "RAC Endpoint",
|
|
||||||
"verbose_name_plural": "RAC Endpoints",
|
|
||||||
},
|
|
||||||
bases=("authentik_policies.policybindingmodel", models.Model),
|
|
||||||
),
|
|
||||||
migrations.CreateModel(
|
|
||||||
name="ConnectionToken",
|
|
||||||
fields=[
|
|
||||||
(
|
|
||||||
"expires",
|
|
||||||
models.DateTimeField(default=authentik.core.models.default_token_duration),
|
|
||||||
),
|
|
||||||
("expiring", models.BooleanField(default=True)),
|
|
||||||
(
|
|
||||||
"connection_token_uuid",
|
|
||||||
models.UUIDField(default=uuid.uuid4, primary_key=True, serialize=False),
|
|
||||||
),
|
|
||||||
("token", models.TextField(default=authentik.core.models.default_token_key)),
|
|
||||||
("settings", models.JSONField(default=dict)),
|
|
||||||
(
|
|
||||||
"endpoint",
|
|
||||||
models.ForeignKey(
|
|
||||||
on_delete=django.db.models.deletion.CASCADE,
|
|
||||||
to="authentik_providers_rac.endpoint",
|
|
||||||
),
|
|
||||||
),
|
|
||||||
(
|
|
||||||
"provider",
|
|
||||||
models.ForeignKey(
|
|
||||||
on_delete=django.db.models.deletion.CASCADE,
|
|
||||||
to="authentik_providers_rac.racprovider",
|
|
||||||
),
|
|
||||||
),
|
|
||||||
(
|
|
||||||
"session",
|
|
||||||
models.ForeignKey(
|
|
||||||
on_delete=django.db.models.deletion.CASCADE,
|
|
||||||
to="authentik_core.authenticatedsession",
|
|
||||||
),
|
|
||||||
),
|
|
||||||
],
|
|
||||||
options={
|
|
||||||
"abstract": False,
|
|
||||||
},
|
|
||||||
),
|
|
||||||
]
|
|
|
@ -1,17 +0,0 @@
|
||||||
# Generated by Django 5.0 on 2024-01-03 23:44
|
|
||||||
|
|
||||||
from django.db import migrations, models
|
|
||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
|
||||||
dependencies = [
|
|
||||||
("authentik_providers_rac", "0001_initial"),
|
|
||||||
]
|
|
||||||
|
|
||||||
operations = [
|
|
||||||
migrations.AddField(
|
|
||||||
model_name="endpoint",
|
|
||||||
name="maximum_connections",
|
|
||||||
field=models.IntegerField(default=1),
|
|
||||||
),
|
|
||||||
]
|
|
|
@ -1,192 +0,0 @@
|
||||||
"""RAC Models"""
|
|
||||||
from typing import Optional
|
|
||||||
from uuid import uuid4
|
|
||||||
|
|
||||||
from deepmerge import always_merger
|
|
||||||
from django.db import models
|
|
||||||
from django.db.models import QuerySet
|
|
||||||
from django.utils.translation import gettext as _
|
|
||||||
from rest_framework.serializers import Serializer
|
|
||||||
from structlog.stdlib import get_logger
|
|
||||||
|
|
||||||
from authentik.core.exceptions import PropertyMappingExpressionException
|
|
||||||
from authentik.core.models import ExpiringModel, PropertyMapping, Provider, default_token_key
|
|
||||||
from authentik.events.models import Event, EventAction
|
|
||||||
from authentik.lib.models import SerializerModel
|
|
||||||
from authentik.lib.utils.time import timedelta_string_validator
|
|
||||||
from authentik.policies.models import PolicyBindingModel
|
|
||||||
|
|
||||||
LOGGER = get_logger()
|
|
||||||
|
|
||||||
|
|
||||||
class Protocols(models.TextChoices):
|
|
||||||
"""Supported protocols"""
|
|
||||||
|
|
||||||
RDP = "rdp"
|
|
||||||
VNC = "vnc"
|
|
||||||
SSH = "ssh"
|
|
||||||
|
|
||||||
|
|
||||||
class AuthenticationMode(models.TextChoices):
|
|
||||||
"""Authentication modes"""
|
|
||||||
|
|
||||||
STATIC = "static"
|
|
||||||
PROMPT = "prompt"
|
|
||||||
|
|
||||||
|
|
||||||
class RACProvider(Provider):
|
|
||||||
"""Remotely access computers/servers via RDP/SSH/VNC."""
|
|
||||||
|
|
||||||
settings = models.JSONField(default=dict)
|
|
||||||
auth_mode = models.TextField(
|
|
||||||
choices=AuthenticationMode.choices, default=AuthenticationMode.PROMPT
|
|
||||||
)
|
|
||||||
connection_expiry = models.TextField(
|
|
||||||
default="hours=8",
|
|
||||||
validators=[timedelta_string_validator],
|
|
||||||
help_text=_(
|
|
||||||
"Determines how long a session lasts. Default of 0 means "
|
|
||||||
"that the sessions lasts until the browser is closed. "
|
|
||||||
"(Format: hours=-1;minutes=-2;seconds=-3)"
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
@property
|
|
||||||
def launch_url(self) -> Optional[str]:
|
|
||||||
"""URL to this provider and initiate authorization for the user.
|
|
||||||
Can return None for providers that are not URL-based"""
|
|
||||||
return "goauthentik.io://providers/rac/launch"
|
|
||||||
|
|
||||||
@property
|
|
||||||
def component(self) -> str:
|
|
||||||
return "ak-provider-rac-form"
|
|
||||||
|
|
||||||
@property
|
|
||||||
def serializer(self) -> type[Serializer]:
|
|
||||||
from authentik.enterprise.providers.rac.api.providers import RACProviderSerializer
|
|
||||||
|
|
||||||
return RACProviderSerializer
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
verbose_name = _("RAC Provider")
|
|
||||||
verbose_name_plural = _("RAC Providers")
|
|
||||||
|
|
||||||
|
|
||||||
class Endpoint(SerializerModel, PolicyBindingModel):
|
|
||||||
"""Remote-accessible endpoint"""
|
|
||||||
|
|
||||||
name = models.TextField()
|
|
||||||
host = models.TextField()
|
|
||||||
protocol = models.TextField(choices=Protocols.choices)
|
|
||||||
settings = models.JSONField(default=dict)
|
|
||||||
auth_mode = models.TextField(choices=AuthenticationMode.choices)
|
|
||||||
provider = models.ForeignKey("RACProvider", on_delete=models.CASCADE)
|
|
||||||
maximum_connections = models.IntegerField(default=1)
|
|
||||||
|
|
||||||
property_mappings = models.ManyToManyField(
|
|
||||||
"authentik_core.PropertyMapping", default=None, blank=True
|
|
||||||
)
|
|
||||||
|
|
||||||
@property
|
|
||||||
def serializer(self) -> type[Serializer]:
|
|
||||||
from authentik.enterprise.providers.rac.api.endpoints import EndpointSerializer
|
|
||||||
|
|
||||||
return EndpointSerializer
|
|
||||||
|
|
||||||
def __str__(self):
|
|
||||||
return f"RAC Endpoint {self.name}"
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
verbose_name = _("RAC Endpoint")
|
|
||||||
verbose_name_plural = _("RAC Endpoints")
|
|
||||||
|
|
||||||
|
|
||||||
class RACPropertyMapping(PropertyMapping):
|
|
||||||
"""Configure settings for remote access endpoints."""
|
|
||||||
|
|
||||||
static_settings = models.JSONField(default=dict)
|
|
||||||
|
|
||||||
@property
|
|
||||||
def component(self) -> str:
|
|
||||||
return "ak-property-mapping-rac-form"
|
|
||||||
|
|
||||||
@property
|
|
||||||
def serializer(self) -> type[Serializer]:
|
|
||||||
from authentik.enterprise.providers.rac.api.property_mappings import (
|
|
||||||
RACPropertyMappingSerializer,
|
|
||||||
)
|
|
||||||
|
|
||||||
return RACPropertyMappingSerializer
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
verbose_name = _("RAC Property Mapping")
|
|
||||||
verbose_name_plural = _("RAC Property Mappings")
|
|
||||||
|
|
||||||
|
|
||||||
class ConnectionToken(ExpiringModel):
|
|
||||||
"""Token for a single connection to a specified endpoint"""
|
|
||||||
|
|
||||||
connection_token_uuid = models.UUIDField(default=uuid4, primary_key=True)
|
|
||||||
provider = models.ForeignKey(RACProvider, on_delete=models.CASCADE)
|
|
||||||
endpoint = models.ForeignKey(Endpoint, on_delete=models.CASCADE)
|
|
||||||
token = models.TextField(default=default_token_key)
|
|
||||||
settings = models.JSONField(default=dict)
|
|
||||||
session = models.ForeignKey("authentik_core.AuthenticatedSession", on_delete=models.CASCADE)
|
|
||||||
|
|
||||||
def get_settings(self) -> dict:
|
|
||||||
"""Get settings"""
|
|
||||||
default_settings = {}
|
|
||||||
if ":" in self.endpoint.host:
|
|
||||||
host, _, port = self.endpoint.host.partition(":")
|
|
||||||
default_settings["hostname"] = host
|
|
||||||
default_settings["port"] = str(port)
|
|
||||||
else:
|
|
||||||
default_settings["hostname"] = self.endpoint.host
|
|
||||||
default_settings["client-name"] = "authentik"
|
|
||||||
# default_settings["enable-drive"] = "true"
|
|
||||||
# default_settings["drive-name"] = "authentik"
|
|
||||||
settings = {}
|
|
||||||
always_merger.merge(settings, default_settings)
|
|
||||||
always_merger.merge(settings, self.endpoint.provider.settings)
|
|
||||||
always_merger.merge(settings, self.endpoint.settings)
|
|
||||||
always_merger.merge(settings, self.settings)
|
|
||||||
|
|
||||||
def mapping_evaluator(mappings: QuerySet):
|
|
||||||
for mapping in mappings:
|
|
||||||
mapping: RACPropertyMapping
|
|
||||||
if len(mapping.static_settings) > 0:
|
|
||||||
always_merger.merge(settings, mapping.static_settings)
|
|
||||||
continue
|
|
||||||
try:
|
|
||||||
mapping_settings = mapping.evaluate(
|
|
||||||
self.session.user, None, endpoint=self.endpoint, provider=self.provider
|
|
||||||
)
|
|
||||||
always_merger.merge(settings, mapping_settings)
|
|
||||||
except PropertyMappingExpressionException as exc:
|
|
||||||
Event.new(
|
|
||||||
EventAction.CONFIGURATION_ERROR,
|
|
||||||
message=f"Failed to evaluate property-mapping: '{mapping.name}'",
|
|
||||||
provider=self.provider,
|
|
||||||
mapping=mapping,
|
|
||||||
).set_user(self.session.user).save()
|
|
||||||
LOGGER.warning("Failed to evaluate property mapping", exc=exc)
|
|
||||||
|
|
||||||
mapping_evaluator(
|
|
||||||
RACPropertyMapping.objects.filter(provider__in=[self.provider]).order_by("name")
|
|
||||||
)
|
|
||||||
mapping_evaluator(
|
|
||||||
RACPropertyMapping.objects.filter(endpoint__in=[self.endpoint]).order_by("name")
|
|
||||||
)
|
|
||||||
|
|
||||||
settings["drive-path"] = f"/tmp/connection/{self.token}" # nosec
|
|
||||||
settings["create-drive-path"] = "true"
|
|
||||||
# Ensure all values of the settings dict are strings
|
|
||||||
for key, value in settings.items():
|
|
||||||
if isinstance(value, str):
|
|
||||||
continue
|
|
||||||
# Special case for bools
|
|
||||||
if isinstance(value, bool):
|
|
||||||
settings[key] = str(value).lower()
|
|
||||||
continue
|
|
||||||
settings[key] = str(value)
|
|
||||||
return settings
|
|
|
@ -1,54 +0,0 @@
|
||||||
"""RAC Signals"""
|
|
||||||
from asgiref.sync import async_to_sync
|
|
||||||
from channels.layers import get_channel_layer
|
|
||||||
from django.contrib.auth.signals import user_logged_out
|
|
||||||
from django.core.cache import cache
|
|
||||||
from django.db.models import Model
|
|
||||||
from django.db.models.signals import post_save, pre_delete
|
|
||||||
from django.dispatch import receiver
|
|
||||||
from django.http import HttpRequest
|
|
||||||
|
|
||||||
from authentik.core.models import User
|
|
||||||
from authentik.enterprise.providers.rac.api.endpoints import user_endpoint_cache_key
|
|
||||||
from authentik.enterprise.providers.rac.consumer_client import (
|
|
||||||
RAC_CLIENT_GROUP_SESSION,
|
|
||||||
RAC_CLIENT_GROUP_TOKEN,
|
|
||||||
)
|
|
||||||
from authentik.enterprise.providers.rac.models import ConnectionToken, Endpoint
|
|
||||||
|
|
||||||
|
|
||||||
@receiver(user_logged_out)
|
|
||||||
def user_logged_out_session(sender, request: HttpRequest, user: User, **_):
|
|
||||||
"""Disconnect any open RAC connections"""
|
|
||||||
layer = get_channel_layer()
|
|
||||||
async_to_sync(layer.group_send)(
|
|
||||||
RAC_CLIENT_GROUP_SESSION
|
|
||||||
% {
|
|
||||||
"session": request.session.session_key,
|
|
||||||
},
|
|
||||||
{"type": "event.disconnect", "reason": "session_logout"},
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
@receiver(pre_delete, sender=ConnectionToken)
|
|
||||||
def pre_delete_connection_token_disconnect(sender, instance: ConnectionToken, **_):
|
|
||||||
"""Disconnect session when connection token is deleted"""
|
|
||||||
layer = get_channel_layer()
|
|
||||||
async_to_sync(layer.group_send)(
|
|
||||||
RAC_CLIENT_GROUP_TOKEN
|
|
||||||
% {
|
|
||||||
"token": instance.token,
|
|
||||||
},
|
|
||||||
{"type": "event.disconnect", "reason": "token_delete"},
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
@receiver(post_save, sender=Endpoint)
|
|
||||||
def post_save_application(sender: type[Model], instance, created: bool, **_):
|
|
||||||
"""Clear user's application cache upon application creation"""
|
|
||||||
if not created: # pragma: no cover
|
|
||||||
return
|
|
||||||
|
|
||||||
# Delete user endpoint cache
|
|
||||||
keys = cache.keys(user_endpoint_cache_key("*"))
|
|
||||||
cache.delete_many(keys)
|
|
|
@ -1,18 +0,0 @@
|
||||||
{% extends "base/skeleton.html" %}
|
|
||||||
|
|
||||||
{% load static %}
|
|
||||||
|
|
||||||
{% block head %}
|
|
||||||
<script src="{% static 'dist/enterprise/rac/index.js' %}?version={{ version }}" type="module"></script>
|
|
||||||
<meta name="theme-color" content="#18191a" media="(prefers-color-scheme: dark)">
|
|
||||||
<meta name="theme-color" content="#ffffff" media="(prefers-color-scheme: light)">
|
|
||||||
<link rel="icon" href="{{ tenant.branding_favicon }}">
|
|
||||||
<link rel="shortcut icon" href="{{ tenant.branding_favicon }}">
|
|
||||||
{% include "base/header_js.html" %}
|
|
||||||
{% endblock %}
|
|
||||||
|
|
||||||
{% block body %}
|
|
||||||
<ak-rac token="{{ url_kwargs.token }}" endpointName="{{ token.endpoint.name }}">
|
|
||||||
<ak-loading></ak-loading>
|
|
||||||
</ak-rac>
|
|
||||||
{% endblock %}
|
|
|
@ -1,171 +0,0 @@
|
||||||
"""Test Endpoints API"""
|
|
||||||
|
|
||||||
from django.urls import reverse
|
|
||||||
from rest_framework.test import APITestCase
|
|
||||||
|
|
||||||
from authentik.core.models import Application
|
|
||||||
from authentik.core.tests.utils import create_test_admin_user
|
|
||||||
from authentik.enterprise.providers.rac.models import Endpoint, Protocols, RACProvider
|
|
||||||
from authentik.lib.generators import generate_id
|
|
||||||
from authentik.policies.dummy.models import DummyPolicy
|
|
||||||
from authentik.policies.models import PolicyBinding
|
|
||||||
|
|
||||||
|
|
||||||
class TestEndpointsAPI(APITestCase):
|
|
||||||
"""Test endpoints API"""
|
|
||||||
|
|
||||||
def setUp(self) -> None:
|
|
||||||
self.user = create_test_admin_user()
|
|
||||||
self.provider = RACProvider.objects.create(
|
|
||||||
name=generate_id(),
|
|
||||||
)
|
|
||||||
self.app = Application.objects.create(
|
|
||||||
name=generate_id(),
|
|
||||||
slug=generate_id(),
|
|
||||||
provider=self.provider,
|
|
||||||
)
|
|
||||||
self.allowed = Endpoint.objects.create(
|
|
||||||
name=f"a-{generate_id()}",
|
|
||||||
host=generate_id(),
|
|
||||||
protocol=Protocols.RDP,
|
|
||||||
provider=self.provider,
|
|
||||||
)
|
|
||||||
self.denied = Endpoint.objects.create(
|
|
||||||
name=f"b-{generate_id()}",
|
|
||||||
host=generate_id(),
|
|
||||||
protocol=Protocols.RDP,
|
|
||||||
provider=self.provider,
|
|
||||||
)
|
|
||||||
PolicyBinding.objects.create(
|
|
||||||
target=self.denied,
|
|
||||||
policy=DummyPolicy.objects.create(name="deny", result=False, wait_min=1, wait_max=2),
|
|
||||||
order=0,
|
|
||||||
)
|
|
||||||
|
|
||||||
def test_list(self):
|
|
||||||
"""Test list operation without superuser_full_list"""
|
|
||||||
self.client.force_login(self.user)
|
|
||||||
response = self.client.get(reverse("authentik_api:endpoint-list"))
|
|
||||||
self.assertJSONEqual(
|
|
||||||
response.content.decode(),
|
|
||||||
{
|
|
||||||
"pagination": {
|
|
||||||
"next": 0,
|
|
||||||
"previous": 0,
|
|
||||||
"count": 2,
|
|
||||||
"current": 1,
|
|
||||||
"total_pages": 1,
|
|
||||||
"start_index": 1,
|
|
||||||
"end_index": 2,
|
|
||||||
},
|
|
||||||
"results": [
|
|
||||||
{
|
|
||||||
"pk": str(self.allowed.pk),
|
|
||||||
"name": self.allowed.name,
|
|
||||||
"provider": self.provider.pk,
|
|
||||||
"provider_obj": {
|
|
||||||
"pk": self.provider.pk,
|
|
||||||
"name": self.provider.name,
|
|
||||||
"authentication_flow": None,
|
|
||||||
"authorization_flow": None,
|
|
||||||
"property_mappings": [],
|
|
||||||
"connection_expiry": "hours=8",
|
|
||||||
"component": "ak-provider-rac-form",
|
|
||||||
"assigned_application_slug": self.app.slug,
|
|
||||||
"assigned_application_name": self.app.name,
|
|
||||||
"verbose_name": "RAC Provider",
|
|
||||||
"verbose_name_plural": "RAC Providers",
|
|
||||||
"meta_model_name": "authentik_providers_rac.racprovider",
|
|
||||||
"settings": {},
|
|
||||||
"outpost_set": [],
|
|
||||||
},
|
|
||||||
"protocol": "rdp",
|
|
||||||
"host": self.allowed.host,
|
|
||||||
"maximum_connections": 1,
|
|
||||||
"settings": {},
|
|
||||||
"property_mappings": [],
|
|
||||||
"auth_mode": "",
|
|
||||||
"launch_url": f"/application/rac/{self.app.slug}/{str(self.allowed.pk)}/",
|
|
||||||
},
|
|
||||||
],
|
|
||||||
},
|
|
||||||
)
|
|
||||||
|
|
||||||
def test_list_superuser_full_list(self):
|
|
||||||
"""Test list operation with superuser_full_list"""
|
|
||||||
self.client.force_login(self.user)
|
|
||||||
response = self.client.get(
|
|
||||||
reverse("authentik_api:endpoint-list") + "?superuser_full_list=true"
|
|
||||||
)
|
|
||||||
self.assertJSONEqual(
|
|
||||||
response.content.decode(),
|
|
||||||
{
|
|
||||||
"pagination": {
|
|
||||||
"next": 0,
|
|
||||||
"previous": 0,
|
|
||||||
"count": 2,
|
|
||||||
"current": 1,
|
|
||||||
"total_pages": 1,
|
|
||||||
"start_index": 1,
|
|
||||||
"end_index": 2,
|
|
||||||
},
|
|
||||||
"results": [
|
|
||||||
{
|
|
||||||
"pk": str(self.allowed.pk),
|
|
||||||
"name": self.allowed.name,
|
|
||||||
"provider": self.provider.pk,
|
|
||||||
"provider_obj": {
|
|
||||||
"pk": self.provider.pk,
|
|
||||||
"name": self.provider.name,
|
|
||||||
"authentication_flow": None,
|
|
||||||
"authorization_flow": None,
|
|
||||||
"property_mappings": [],
|
|
||||||
"component": "ak-provider-rac-form",
|
|
||||||
"assigned_application_slug": self.app.slug,
|
|
||||||
"assigned_application_name": self.app.name,
|
|
||||||
"connection_expiry": "hours=8",
|
|
||||||
"verbose_name": "RAC Provider",
|
|
||||||
"verbose_name_plural": "RAC Providers",
|
|
||||||
"meta_model_name": "authentik_providers_rac.racprovider",
|
|
||||||
"settings": {},
|
|
||||||
"outpost_set": [],
|
|
||||||
},
|
|
||||||
"protocol": "rdp",
|
|
||||||
"host": self.allowed.host,
|
|
||||||
"maximum_connections": 1,
|
|
||||||
"settings": {},
|
|
||||||
"property_mappings": [],
|
|
||||||
"auth_mode": "",
|
|
||||||
"launch_url": f"/application/rac/{self.app.slug}/{str(self.allowed.pk)}/",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"pk": str(self.denied.pk),
|
|
||||||
"name": self.denied.name,
|
|
||||||
"provider": self.provider.pk,
|
|
||||||
"provider_obj": {
|
|
||||||
"pk": self.provider.pk,
|
|
||||||
"name": self.provider.name,
|
|
||||||
"authentication_flow": None,
|
|
||||||
"authorization_flow": None,
|
|
||||||
"property_mappings": [],
|
|
||||||
"component": "ak-provider-rac-form",
|
|
||||||
"assigned_application_slug": self.app.slug,
|
|
||||||
"assigned_application_name": self.app.name,
|
|
||||||
"connection_expiry": "hours=8",
|
|
||||||
"verbose_name": "RAC Provider",
|
|
||||||
"verbose_name_plural": "RAC Providers",
|
|
||||||
"meta_model_name": "authentik_providers_rac.racprovider",
|
|
||||||
"settings": {},
|
|
||||||
"outpost_set": [],
|
|
||||||
},
|
|
||||||
"protocol": "rdp",
|
|
||||||
"host": self.denied.host,
|
|
||||||
"maximum_connections": 1,
|
|
||||||
"settings": {},
|
|
||||||
"property_mappings": [],
|
|
||||||
"auth_mode": "",
|
|
||||||
"launch_url": f"/application/rac/{self.app.slug}/{str(self.denied.pk)}/",
|
|
||||||
},
|
|
||||||
],
|
|
||||||
},
|
|
||||||
)
|
|
|
@ -1,144 +0,0 @@
|
||||||
"""Test RAC Models"""
|
|
||||||
from django.test import TransactionTestCase
|
|
||||||
|
|
||||||
from authentik.core.models import Application, AuthenticatedSession
|
|
||||||
from authentik.core.tests.utils import create_test_admin_user
|
|
||||||
from authentik.enterprise.providers.rac.models import (
|
|
||||||
ConnectionToken,
|
|
||||||
Endpoint,
|
|
||||||
Protocols,
|
|
||||||
RACPropertyMapping,
|
|
||||||
RACProvider,
|
|
||||||
)
|
|
||||||
from authentik.lib.generators import generate_id
|
|
||||||
|
|
||||||
|
|
||||||
class TestModels(TransactionTestCase):
|
|
||||||
"""Test RAC Models"""
|
|
||||||
|
|
||||||
def setUp(self):
|
|
||||||
self.user = create_test_admin_user()
|
|
||||||
self.provider = RACProvider.objects.create(
|
|
||||||
name=generate_id(),
|
|
||||||
)
|
|
||||||
self.app = Application.objects.create(
|
|
||||||
name=generate_id(),
|
|
||||||
slug=generate_id(),
|
|
||||||
provider=self.provider,
|
|
||||||
)
|
|
||||||
self.endpoint = Endpoint.objects.create(
|
|
||||||
name=generate_id(),
|
|
||||||
host=f"{generate_id()}:1324",
|
|
||||||
protocol=Protocols.RDP,
|
|
||||||
provider=self.provider,
|
|
||||||
)
|
|
||||||
|
|
||||||
def test_settings_merge(self):
|
|
||||||
"""Test settings merge"""
|
|
||||||
token = ConnectionToken.objects.create(
|
|
||||||
provider=self.provider,
|
|
||||||
endpoint=self.endpoint,
|
|
||||||
session=AuthenticatedSession.objects.create(
|
|
||||||
user=self.user,
|
|
||||||
session_key=generate_id(),
|
|
||||||
),
|
|
||||||
)
|
|
||||||
path = f"/tmp/connection/{token.token}" # nosec
|
|
||||||
self.assertEqual(
|
|
||||||
token.get_settings(),
|
|
||||||
{
|
|
||||||
"hostname": self.endpoint.host.split(":")[0],
|
|
||||||
"port": "1324",
|
|
||||||
"client-name": "authentik",
|
|
||||||
"drive-path": path,
|
|
||||||
"create-drive-path": "true",
|
|
||||||
},
|
|
||||||
)
|
|
||||||
# Set settings in provider
|
|
||||||
self.provider.settings = {"level": "provider"}
|
|
||||||
self.provider.save()
|
|
||||||
self.assertEqual(
|
|
||||||
token.get_settings(),
|
|
||||||
{
|
|
||||||
"hostname": self.endpoint.host.split(":")[0],
|
|
||||||
"port": "1324",
|
|
||||||
"client-name": "authentik",
|
|
||||||
"drive-path": path,
|
|
||||||
"create-drive-path": "true",
|
|
||||||
"level": "provider",
|
|
||||||
},
|
|
||||||
)
|
|
||||||
# Set settings in endpoint
|
|
||||||
self.endpoint.settings = {
|
|
||||||
"level": "endpoint",
|
|
||||||
}
|
|
||||||
self.endpoint.save()
|
|
||||||
self.assertEqual(
|
|
||||||
token.get_settings(),
|
|
||||||
{
|
|
||||||
"hostname": self.endpoint.host.split(":")[0],
|
|
||||||
"port": "1324",
|
|
||||||
"client-name": "authentik",
|
|
||||||
"drive-path": path,
|
|
||||||
"create-drive-path": "true",
|
|
||||||
"level": "endpoint",
|
|
||||||
},
|
|
||||||
)
|
|
||||||
# Set settings in token
|
|
||||||
token.settings = {
|
|
||||||
"level": "token",
|
|
||||||
}
|
|
||||||
token.save()
|
|
||||||
self.assertEqual(
|
|
||||||
token.get_settings(),
|
|
||||||
{
|
|
||||||
"hostname": self.endpoint.host.split(":")[0],
|
|
||||||
"port": "1324",
|
|
||||||
"client-name": "authentik",
|
|
||||||
"drive-path": path,
|
|
||||||
"create-drive-path": "true",
|
|
||||||
"level": "token",
|
|
||||||
},
|
|
||||||
)
|
|
||||||
# Set settings in property mapping (provider)
|
|
||||||
mapping = RACPropertyMapping.objects.create(
|
|
||||||
name=generate_id(),
|
|
||||||
expression="""return {
|
|
||||||
"level": "property_mapping_provider"
|
|
||||||
}""",
|
|
||||||
)
|
|
||||||
self.provider.property_mappings.add(mapping)
|
|
||||||
self.assertEqual(
|
|
||||||
token.get_settings(),
|
|
||||||
{
|
|
||||||
"hostname": self.endpoint.host.split(":")[0],
|
|
||||||
"port": "1324",
|
|
||||||
"client-name": "authentik",
|
|
||||||
"drive-path": path,
|
|
||||||
"create-drive-path": "true",
|
|
||||||
"level": "property_mapping_provider",
|
|
||||||
},
|
|
||||||
)
|
|
||||||
# Set settings in property mapping (endpoint)
|
|
||||||
mapping = RACPropertyMapping.objects.create(
|
|
||||||
name=generate_id(),
|
|
||||||
static_settings={
|
|
||||||
"level": "property_mapping_endpoint",
|
|
||||||
"foo": True,
|
|
||||||
"bar": 6,
|
|
||||||
},
|
|
||||||
)
|
|
||||||
self.endpoint.property_mappings.add(mapping)
|
|
||||||
self.assertEqual(
|
|
||||||
token.get_settings(),
|
|
||||||
{
|
|
||||||
"hostname": self.endpoint.host.split(":")[0],
|
|
||||||
"port": "1324",
|
|
||||||
"client-name": "authentik",
|
|
||||||
"drive-path": path,
|
|
||||||
"create-drive-path": "true",
|
|
||||||
"level": "property_mapping_endpoint",
|
|
||||||
"foo": "true",
|
|
||||||
"bar": "6",
|
|
||||||
},
|
|
||||||
)
|
|
|
@ -1,132 +0,0 @@
|
||||||
"""RAC Views tests"""
|
|
||||||
from datetime import timedelta
|
|
||||||
from json import loads
|
|
||||||
from time import mktime
|
|
||||||
from unittest.mock import MagicMock, patch
|
|
||||||
|
|
||||||
from django.urls import reverse
|
|
||||||
from django.utils.timezone import now
|
|
||||||
from rest_framework.test import APITestCase
|
|
||||||
|
|
||||||
from authentik.core.models import Application
|
|
||||||
from authentik.core.tests.utils import create_test_admin_user, create_test_flow
|
|
||||||
from authentik.enterprise.models import License, LicenseKey
|
|
||||||
from authentik.enterprise.providers.rac.models import Endpoint, Protocols, RACProvider
|
|
||||||
from authentik.lib.generators import generate_id
|
|
||||||
from authentik.policies.denied import AccessDeniedResponse
|
|
||||||
from authentik.policies.dummy.models import DummyPolicy
|
|
||||||
from authentik.policies.models import PolicyBinding
|
|
||||||
|
|
||||||
|
|
||||||
class TestRACViews(APITestCase):
|
|
||||||
"""RAC Views tests"""
|
|
||||||
|
|
||||||
def setUp(self):
|
|
||||||
self.user = create_test_admin_user()
|
|
||||||
self.flow = create_test_flow()
|
|
||||||
self.provider = RACProvider.objects.create(name=generate_id(), authorization_flow=self.flow)
|
|
||||||
self.app = Application.objects.create(
|
|
||||||
name=generate_id(),
|
|
||||||
slug=generate_id(),
|
|
||||||
provider=self.provider,
|
|
||||||
)
|
|
||||||
self.endpoint = Endpoint.objects.create(
|
|
||||||
name=generate_id(),
|
|
||||||
host=f"{generate_id()}:1324",
|
|
||||||
protocol=Protocols.RDP,
|
|
||||||
provider=self.provider,
|
|
||||||
)
|
|
||||||
|
|
||||||
@patch(
|
|
||||||
"authentik.enterprise.models.LicenseKey.validate",
|
|
||||||
MagicMock(
|
|
||||||
return_value=LicenseKey(
|
|
||||||
aud="",
|
|
||||||
exp=int(mktime((now() + timedelta(days=3000)).timetuple())),
|
|
||||||
name=generate_id(),
|
|
||||||
internal_users=100,
|
|
||||||
external_users=100,
|
|
||||||
)
|
|
||||||
),
|
|
||||||
)
|
|
||||||
def test_no_policy(self):
|
|
||||||
"""Test request"""
|
|
||||||
License.objects.create(key=generate_id())
|
|
||||||
self.client.force_login(self.user)
|
|
||||||
response = self.client.get(
|
|
||||||
reverse(
|
|
||||||
"authentik_providers_rac:start",
|
|
||||||
kwargs={"app": self.app.slug, "endpoint": str(self.endpoint.pk)},
|
|
||||||
)
|
|
||||||
)
|
|
||||||
self.assertEqual(response.status_code, 302)
|
|
||||||
flow_response = self.client.get(
|
|
||||||
reverse("authentik_api:flow-executor", kwargs={"flow_slug": self.flow.slug})
|
|
||||||
)
|
|
||||||
body = loads(flow_response.content)
|
|
||||||
next_url = body["to"]
|
|
||||||
final_response = self.client.get(next_url)
|
|
||||||
self.assertEqual(final_response.status_code, 200)
|
|
||||||
|
|
||||||
@patch(
|
|
||||||
"authentik.enterprise.models.LicenseKey.validate",
|
|
||||||
MagicMock(
|
|
||||||
return_value=LicenseKey(
|
|
||||||
aud="",
|
|
||||||
exp=int(mktime((now() + timedelta(days=3000)).timetuple())),
|
|
||||||
name=generate_id(),
|
|
||||||
internal_users=100,
|
|
||||||
external_users=100,
|
|
||||||
)
|
|
||||||
),
|
|
||||||
)
|
|
||||||
def test_app_deny(self):
|
|
||||||
"""Test request (deny on app level)"""
|
|
||||||
PolicyBinding.objects.create(
|
|
||||||
target=self.app,
|
|
||||||
policy=DummyPolicy.objects.create(name="deny", result=False, wait_min=1, wait_max=2),
|
|
||||||
order=0,
|
|
||||||
)
|
|
||||||
License.objects.create(key=generate_id())
|
|
||||||
self.client.force_login(self.user)
|
|
||||||
response = self.client.get(
|
|
||||||
reverse(
|
|
||||||
"authentik_providers_rac:start",
|
|
||||||
kwargs={"app": self.app.slug, "endpoint": str(self.endpoint.pk)},
|
|
||||||
)
|
|
||||||
)
|
|
||||||
self.assertIsInstance(response, AccessDeniedResponse)
|
|
||||||
|
|
||||||
@patch(
|
|
||||||
"authentik.enterprise.models.LicenseKey.validate",
|
|
||||||
MagicMock(
|
|
||||||
return_value=LicenseKey(
|
|
||||||
aud="",
|
|
||||||
exp=int(mktime((now() + timedelta(days=3000)).timetuple())),
|
|
||||||
name=generate_id(),
|
|
||||||
internal_users=100,
|
|
||||||
external_users=100,
|
|
||||||
)
|
|
||||||
),
|
|
||||||
)
|
|
||||||
def test_endpoint_deny(self):
|
|
||||||
"""Test request (deny on endpoint level)"""
|
|
||||||
PolicyBinding.objects.create(
|
|
||||||
target=self.endpoint,
|
|
||||||
policy=DummyPolicy.objects.create(name="deny", result=False, wait_min=1, wait_max=2),
|
|
||||||
order=0,
|
|
||||||
)
|
|
||||||
License.objects.create(key=generate_id())
|
|
||||||
self.client.force_login(self.user)
|
|
||||||
response = self.client.get(
|
|
||||||
reverse(
|
|
||||||
"authentik_providers_rac:start",
|
|
||||||
kwargs={"app": self.app.slug, "endpoint": str(self.endpoint.pk)},
|
|
||||||
)
|
|
||||||
)
|
|
||||||
self.assertEqual(response.status_code, 302)
|
|
||||||
flow_response = self.client.get(
|
|
||||||
reverse("authentik_api:flow-executor", kwargs={"flow_slug": self.flow.slug})
|
|
||||||
)
|
|
||||||
body = loads(flow_response.content)
|
|
||||||
self.assertEqual(body["component"], "ak-stage-access-denied")
|
|
|
@ -1,47 +0,0 @@
|
||||||
"""rac urls"""
|
|
||||||
from channels.auth import AuthMiddleware
|
|
||||||
from channels.sessions import CookieMiddleware
|
|
||||||
from django.urls import path
|
|
||||||
from django.views.decorators.csrf import ensure_csrf_cookie
|
|
||||||
|
|
||||||
from authentik.core.channels import TokenOutpostMiddleware
|
|
||||||
from authentik.enterprise.providers.rac.api.endpoints import EndpointViewSet
|
|
||||||
from authentik.enterprise.providers.rac.api.property_mappings import RACPropertyMappingViewSet
|
|
||||||
from authentik.enterprise.providers.rac.api.providers import RACProviderViewSet
|
|
||||||
from authentik.enterprise.providers.rac.consumer_client import RACClientConsumer
|
|
||||||
from authentik.enterprise.providers.rac.consumer_outpost import RACOutpostConsumer
|
|
||||||
from authentik.enterprise.providers.rac.views import RACInterface, RACStartView
|
|
||||||
from authentik.root.asgi_middleware import SessionMiddleware
|
|
||||||
from authentik.root.middleware import ChannelsLoggingMiddleware
|
|
||||||
|
|
||||||
urlpatterns = [
|
|
||||||
path(
|
|
||||||
"application/rac/<slug:app>/<uuid:endpoint>/",
|
|
||||||
ensure_csrf_cookie(RACStartView.as_view()),
|
|
||||||
name="start",
|
|
||||||
),
|
|
||||||
path(
|
|
||||||
"if/rac/<str:token>/",
|
|
||||||
ensure_csrf_cookie(RACInterface.as_view()),
|
|
||||||
name="if-rac",
|
|
||||||
),
|
|
||||||
]
|
|
||||||
|
|
||||||
websocket_urlpatterns = [
|
|
||||||
path(
|
|
||||||
"ws/rac/<str:token>/",
|
|
||||||
ChannelsLoggingMiddleware(
|
|
||||||
CookieMiddleware(SessionMiddleware(AuthMiddleware(RACClientConsumer.as_asgi())))
|
|
||||||
),
|
|
||||||
),
|
|
||||||
path(
|
|
||||||
"ws/outpost_rac/<str:channel>/",
|
|
||||||
ChannelsLoggingMiddleware(TokenOutpostMiddleware(RACOutpostConsumer.as_asgi())),
|
|
||||||
),
|
|
||||||
]
|
|
||||||
|
|
||||||
api_urlpatterns = [
|
|
||||||
("providers/rac", RACProviderViewSet),
|
|
||||||
("propertymappings/rac", RACPropertyMappingViewSet),
|
|
||||||
("rac/endpoints", EndpointViewSet),
|
|
||||||
]
|
|
|
@ -1,140 +0,0 @@
|
||||||
"""RAC Views"""
|
|
||||||
from typing import Any
|
|
||||||
|
|
||||||
from django.http import Http404, HttpRequest, HttpResponse
|
|
||||||
from django.shortcuts import get_object_or_404, redirect
|
|
||||||
from django.urls import reverse
|
|
||||||
from django.utils.timezone import now
|
|
||||||
from django.utils.translation import gettext as _
|
|
||||||
|
|
||||||
from authentik.core.models import Application, AuthenticatedSession
|
|
||||||
from authentik.core.views.interface import InterfaceView
|
|
||||||
from authentik.enterprise.policy import EnterprisePolicyAccessView
|
|
||||||
from authentik.enterprise.providers.rac.models import ConnectionToken, Endpoint, RACProvider
|
|
||||||
from authentik.events.models import Event, EventAction
|
|
||||||
from authentik.flows.challenge import RedirectChallenge
|
|
||||||
from authentik.flows.exceptions import FlowNonApplicableException
|
|
||||||
from authentik.flows.models import in_memory_stage
|
|
||||||
from authentik.flows.planner import FlowPlanner
|
|
||||||
from authentik.flows.stage import RedirectStage
|
|
||||||
from authentik.flows.views.executor import SESSION_KEY_PLAN
|
|
||||||
from authentik.lib.utils.time import timedelta_from_string
|
|
||||||
from authentik.lib.utils.urls import redirect_with_qs
|
|
||||||
from authentik.policies.engine import PolicyEngine
|
|
||||||
|
|
||||||
|
|
||||||
class RACStartView(EnterprisePolicyAccessView):
|
|
||||||
"""Start a RAC connection by checking access and creating a connection token"""
|
|
||||||
|
|
||||||
endpoint: Endpoint
|
|
||||||
|
|
||||||
def resolve_provider_application(self):
|
|
||||||
self.application = get_object_or_404(Application, slug=self.kwargs["app"])
|
|
||||||
# Endpoint permissions are validated in the RACFinalStage below
|
|
||||||
self.endpoint = get_object_or_404(Endpoint, pk=self.kwargs["endpoint"])
|
|
||||||
self.provider = RACProvider.objects.get(application=self.application)
|
|
||||||
|
|
||||||
def get(self, request: HttpRequest, *args, **kwargs) -> HttpResponse:
|
|
||||||
"""Start flow planner for RAC provider"""
|
|
||||||
planner = FlowPlanner(self.provider.authorization_flow)
|
|
||||||
planner.allow_empty_flows = True
|
|
||||||
try:
|
|
||||||
plan = planner.plan(self.request)
|
|
||||||
except FlowNonApplicableException:
|
|
||||||
raise Http404
|
|
||||||
plan.insert_stage(
|
|
||||||
in_memory_stage(
|
|
||||||
RACFinalStage,
|
|
||||||
application=self.application,
|
|
||||||
endpoint=self.endpoint,
|
|
||||||
provider=self.provider,
|
|
||||||
)
|
|
||||||
)
|
|
||||||
request.session[SESSION_KEY_PLAN] = plan
|
|
||||||
return redirect_with_qs(
|
|
||||||
"authentik_core:if-flow",
|
|
||||||
request.GET,
|
|
||||||
flow_slug=self.provider.authorization_flow.slug,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
class RACInterface(InterfaceView):
|
|
||||||
"""Start RAC connection"""
|
|
||||||
|
|
||||||
template_name = "if/rac.html"
|
|
||||||
token: ConnectionToken
|
|
||||||
|
|
||||||
def dispatch(self, request: HttpRequest, *args: Any, **kwargs: Any) -> HttpResponse:
|
|
||||||
# Early sanity check to ensure token still exists
|
|
||||||
token = ConnectionToken.filter_not_expired(token=self.kwargs["token"]).first()
|
|
||||||
if not token:
|
|
||||||
return redirect("authentik_core:if-user")
|
|
||||||
self.token = token
|
|
||||||
return super().dispatch(request, *args, **kwargs)
|
|
||||||
|
|
||||||
def get_context_data(self, **kwargs: Any) -> dict[str, Any]:
|
|
||||||
kwargs["token"] = self.token
|
|
||||||
return super().get_context_data(**kwargs)
|
|
||||||
|
|
||||||
|
|
||||||
class RACFinalStage(RedirectStage):
|
|
||||||
"""RAC Connection final stage, set the connection token in the stage"""
|
|
||||||
|
|
||||||
endpoint: Endpoint
|
|
||||||
provider: RACProvider
|
|
||||||
application: Application
|
|
||||||
|
|
||||||
def dispatch(self, request: HttpRequest, *args: Any, **kwargs: Any) -> HttpResponse:
|
|
||||||
self.endpoint = self.executor.current_stage.endpoint
|
|
||||||
self.provider = self.executor.current_stage.provider
|
|
||||||
self.application = self.executor.current_stage.application
|
|
||||||
# Check policies bound to endpoint directly
|
|
||||||
engine = PolicyEngine(self.endpoint, self.request.user, self.request)
|
|
||||||
engine.use_cache = False
|
|
||||||
engine.build()
|
|
||||||
passing = engine.result
|
|
||||||
if not passing.passing:
|
|
||||||
return self.executor.stage_invalid(", ".join(passing.messages))
|
|
||||||
# Check if we're already at the maximum connection limit
|
|
||||||
all_tokens = ConnectionToken.filter_not_expired(
|
|
||||||
endpoint=self.endpoint,
|
|
||||||
).exclude(endpoint__maximum_connections__lte=-1)
|
|
||||||
if all_tokens.count() >= self.endpoint.maximum_connections:
|
|
||||||
msg = [_("Maximum connection limit reached.")]
|
|
||||||
# Check if any other tokens exist for the current user, and inform them
|
|
||||||
# they are already connected
|
|
||||||
if all_tokens.filter(session__user=self.request.user).exists():
|
|
||||||
msg.append(_("(You are already connected in another tab/window)"))
|
|
||||||
return self.executor.stage_invalid(" ".join(msg))
|
|
||||||
return super().dispatch(request, *args, **kwargs)
|
|
||||||
|
|
||||||
def get_challenge(self, *args, **kwargs) -> RedirectChallenge:
|
|
||||||
token = ConnectionToken.objects.create(
|
|
||||||
provider=self.provider,
|
|
||||||
endpoint=self.endpoint,
|
|
||||||
settings=self.executor.plan.context.get("connection_settings", {}),
|
|
||||||
session=AuthenticatedSession.objects.filter(
|
|
||||||
session_key=self.request.session.session_key
|
|
||||||
).first(),
|
|
||||||
expires=now() + timedelta_from_string(self.provider.connection_expiry),
|
|
||||||
expiring=True,
|
|
||||||
)
|
|
||||||
Event.new(
|
|
||||||
EventAction.AUTHORIZE_APPLICATION,
|
|
||||||
authorized_application=self.application,
|
|
||||||
flow=self.executor.plan.flow_pk,
|
|
||||||
endpoint=self.endpoint.name,
|
|
||||||
).from_http(self.request)
|
|
||||||
setattr(
|
|
||||||
self.executor.current_stage,
|
|
||||||
"destination",
|
|
||||||
self.request.build_absolute_uri(
|
|
||||||
reverse(
|
|
||||||
"authentik_providers_rac:if-rac",
|
|
||||||
kwargs={
|
|
||||||
"token": str(token.token),
|
|
||||||
},
|
|
||||||
)
|
|
||||||
),
|
|
||||||
)
|
|
||||||
return super().get_challenge(*args, **kwargs)
|
|
|
@ -10,7 +10,3 @@ CELERY_BEAT_SCHEDULE = {
|
||||||
"options": {"queue": "authentik_scheduled"},
|
"options": {"queue": "authentik_scheduled"},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
INSTALLED_APPS = [
|
|
||||||
"authentik.enterprise.providers.rac",
|
|
||||||
]
|
|
||||||
|
|
|
@ -5,8 +5,7 @@ from json import loads
|
||||||
import django_filters
|
import django_filters
|
||||||
from django.db.models.aggregates import Count
|
from django.db.models.aggregates import Count
|
||||||
from django.db.models.fields.json import KeyTextTransform, KeyTransform
|
from django.db.models.fields.json import KeyTextTransform, KeyTransform
|
||||||
from django.db.models.functions import ExtractDay, ExtractHour
|
from django.db.models.functions import ExtractDay
|
||||||
from django.db.models.query_utils import Q
|
|
||||||
from drf_spectacular.types import OpenApiTypes
|
from drf_spectacular.types import OpenApiTypes
|
||||||
from drf_spectacular.utils import OpenApiParameter, extend_schema
|
from drf_spectacular.utils import OpenApiParameter, extend_schema
|
||||||
from guardian.shortcuts import get_objects_for_user
|
from guardian.shortcuts import get_objects_for_user
|
||||||
|
@ -88,12 +87,7 @@ class EventsFilter(django_filters.FilterSet):
|
||||||
we need to remove the dashes that a client may send. We can't use a
|
we need to remove the dashes that a client may send. We can't use a
|
||||||
UUIDField for this, as some models might not have a UUID PK"""
|
UUIDField for this, as some models might not have a UUID PK"""
|
||||||
value = str(value).replace("-", "")
|
value = str(value).replace("-", "")
|
||||||
query = Q(context__model__pk=value)
|
return queryset.filter(context__model__pk=value)
|
||||||
try:
|
|
||||||
query |= Q(context__model__pk=int(value))
|
|
||||||
except ValueError:
|
|
||||||
pass
|
|
||||||
return queryset.filter(query)
|
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
model = Event
|
model = Event
|
||||||
|
@ -155,15 +149,7 @@ class EventViewSet(ModelViewSet):
|
||||||
return Response(EventTopPerUserSerializer(instance=events, many=True).data)
|
return Response(EventTopPerUserSerializer(instance=events, many=True).data)
|
||||||
|
|
||||||
@extend_schema(
|
@extend_schema(
|
||||||
responses={200: CoordinateSerializer(many=True)},
|
methods=["GET"],
|
||||||
)
|
|
||||||
@action(detail=False, methods=["GET"], pagination_class=None)
|
|
||||||
def volume(self, request: Request) -> Response:
|
|
||||||
"""Get event volume for specified filters and timeframe"""
|
|
||||||
queryset = self.filter_queryset(self.get_queryset())
|
|
||||||
return Response(queryset.get_events_per(timedelta(days=7), ExtractHour, 7 * 3))
|
|
||||||
|
|
||||||
@extend_schema(
|
|
||||||
responses={200: CoordinateSerializer(many=True)},
|
responses={200: CoordinateSerializer(many=True)},
|
||||||
filters=[],
|
filters=[],
|
||||||
parameters=[
|
parameters=[
|
||||||
|
|
|
@ -1,107 +0,0 @@
|
||||||
"""Tasks API"""
|
|
||||||
from datetime import datetime, timezone
|
|
||||||
from importlib import import_module
|
|
||||||
|
|
||||||
from django.contrib import messages
|
|
||||||
from django.utils.translation import gettext_lazy as _
|
|
||||||
from drf_spectacular.types import OpenApiTypes
|
|
||||||
from drf_spectacular.utils import OpenApiResponse, extend_schema
|
|
||||||
from rest_framework.decorators import action
|
|
||||||
from rest_framework.fields import CharField, ChoiceField, ListField, SerializerMethodField
|
|
||||||
from rest_framework.request import Request
|
|
||||||
from rest_framework.response import Response
|
|
||||||
from rest_framework.serializers import ModelSerializer
|
|
||||||
from rest_framework.viewsets import ReadOnlyModelViewSet
|
|
||||||
from structlog.stdlib import get_logger
|
|
||||||
|
|
||||||
from authentik.api.decorators import permission_required
|
|
||||||
from authentik.events.models import SystemTask, TaskStatus
|
|
||||||
|
|
||||||
LOGGER = get_logger()
|
|
||||||
|
|
||||||
|
|
||||||
class SystemTaskSerializer(ModelSerializer):
|
|
||||||
"""Serialize TaskInfo and TaskResult"""
|
|
||||||
|
|
||||||
name = CharField()
|
|
||||||
full_name = SerializerMethodField()
|
|
||||||
uid = CharField(required=False)
|
|
||||||
description = CharField()
|
|
||||||
start_timestamp = SerializerMethodField()
|
|
||||||
finish_timestamp = SerializerMethodField()
|
|
||||||
duration = SerializerMethodField()
|
|
||||||
|
|
||||||
status = ChoiceField(choices=[(x.value, x.name) for x in TaskStatus])
|
|
||||||
messages = ListField(child=CharField())
|
|
||||||
|
|
||||||
def get_full_name(self, instance: SystemTask) -> str:
|
|
||||||
"""Get full name with UID"""
|
|
||||||
if instance.uid:
|
|
||||||
return f"{instance.name}:{instance.uid}"
|
|
||||||
return instance.name
|
|
||||||
|
|
||||||
def get_start_timestamp(self, instance: SystemTask) -> datetime:
|
|
||||||
"""Timestamp when the task started"""
|
|
||||||
return datetime.fromtimestamp(instance.start_timestamp, tz=timezone.utc)
|
|
||||||
|
|
||||||
def get_finish_timestamp(self, instance: SystemTask) -> datetime:
|
|
||||||
"""Timestamp when the task finished"""
|
|
||||||
return datetime.fromtimestamp(instance.finish_timestamp, tz=timezone.utc)
|
|
||||||
|
|
||||||
def get_duration(self, instance: SystemTask) -> float:
|
|
||||||
"""Get the duration a task took to run"""
|
|
||||||
return max(instance.finish_timestamp - instance.start_timestamp, 0)
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
model = SystemTask
|
|
||||||
fields = [
|
|
||||||
"uuid",
|
|
||||||
"name",
|
|
||||||
"full_name",
|
|
||||||
"uid",
|
|
||||||
"description",
|
|
||||||
"start_timestamp",
|
|
||||||
"finish_timestamp",
|
|
||||||
"duration",
|
|
||||||
"status",
|
|
||||||
"messages",
|
|
||||||
]
|
|
||||||
|
|
||||||
|
|
||||||
class SystemTaskViewSet(ReadOnlyModelViewSet):
|
|
||||||
"""Read-only view set that returns all background tasks"""
|
|
||||||
|
|
||||||
queryset = SystemTask.objects.all()
|
|
||||||
serializer_class = SystemTaskSerializer
|
|
||||||
filterset_fields = ["name", "uid", "status"]
|
|
||||||
ordering = ["name", "uid", "status"]
|
|
||||||
search_fields = ["name", "description", "uid", "status"]
|
|
||||||
|
|
||||||
@permission_required(None, ["authentik_events.run_task"])
|
|
||||||
@extend_schema(
|
|
||||||
request=OpenApiTypes.NONE,
|
|
||||||
responses={
|
|
||||||
204: OpenApiResponse(description="Task retried successfully"),
|
|
||||||
404: OpenApiResponse(description="Task not found"),
|
|
||||||
500: OpenApiResponse(description="Failed to retry task"),
|
|
||||||
},
|
|
||||||
)
|
|
||||||
@action(detail=True, methods=["post"])
|
|
||||||
def run(self, request: Request, pk=None) -> Response:
|
|
||||||
"""Run task"""
|
|
||||||
task: SystemTask = self.get_object()
|
|
||||||
try:
|
|
||||||
task_module = import_module(task.task_call_module)
|
|
||||||
task_func = getattr(task_module, task.task_call_func)
|
|
||||||
LOGGER.info("Running task", task=task_func)
|
|
||||||
task_func.delay(*task.task_call_args, **task.task_call_kwargs)
|
|
||||||
messages.success(
|
|
||||||
self.request,
|
|
||||||
_("Successfully started task %(name)s." % {"name": task.name}),
|
|
||||||
)
|
|
||||||
return Response(status=204)
|
|
||||||
except (ImportError, AttributeError) as exc: # pragma: no cover
|
|
||||||
LOGGER.warning("Failed to run task, remove state", task=task.name, exc=exc)
|
|
||||||
# if we get an import error, the module path has probably changed
|
|
||||||
task.delete()
|
|
||||||
return Response(status=500)
|
|
|
@ -1,26 +1,14 @@
|
||||||
"""authentik events app"""
|
"""authentik events app"""
|
||||||
from prometheus_client import Gauge, Histogram
|
from prometheus_client import Gauge
|
||||||
|
|
||||||
from authentik.blueprints.apps import ManagedAppConfig
|
from authentik.blueprints.apps import ManagedAppConfig
|
||||||
from authentik.lib.config import CONFIG, ENV_PREFIX
|
|
||||||
|
|
||||||
# TODO: Deprecated metric - remove in 2024.2 or later
|
|
||||||
GAUGE_TASKS = Gauge(
|
GAUGE_TASKS = Gauge(
|
||||||
"authentik_system_tasks",
|
"authentik_system_tasks",
|
||||||
"System tasks and their status",
|
"System tasks and their status",
|
||||||
["task_name", "task_uid", "status"],
|
["task_name", "task_uid", "status"],
|
||||||
)
|
)
|
||||||
|
|
||||||
SYSTEM_TASK_TIME = Histogram(
|
|
||||||
"authentik_system_tasks_time_seconds",
|
|
||||||
"Runtime of system tasks",
|
|
||||||
)
|
|
||||||
SYSTEM_TASK_STATUS = Gauge(
|
|
||||||
"authentik_system_tasks_status",
|
|
||||||
"System task status",
|
|
||||||
["task_name", "task_uid", "status"],
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
class AuthentikEventsConfig(ManagedAppConfig):
|
class AuthentikEventsConfig(ManagedAppConfig):
|
||||||
"""authentik events app"""
|
"""authentik events app"""
|
||||||
|
@ -33,35 +21,3 @@ class AuthentikEventsConfig(ManagedAppConfig):
|
||||||
def reconcile_load_events_signals(self):
|
def reconcile_load_events_signals(self):
|
||||||
"""Load events signals"""
|
"""Load events signals"""
|
||||||
self.import_module("authentik.events.signals")
|
self.import_module("authentik.events.signals")
|
||||||
|
|
||||||
def reconcile_check_deprecations(self):
|
|
||||||
"""Check for config deprecations"""
|
|
||||||
from authentik.events.models import Event, EventAction
|
|
||||||
|
|
||||||
for key_replace, msg in CONFIG.deprecations.items():
|
|
||||||
key, replace = key_replace
|
|
||||||
key_env = f"{ENV_PREFIX}_{key.replace('.', '__')}".upper()
|
|
||||||
replace_env = f"{ENV_PREFIX}_{replace.replace('.', '__')}".upper()
|
|
||||||
if Event.objects.filter(
|
|
||||||
action=EventAction.CONFIGURATION_ERROR, context__deprecated_option=key
|
|
||||||
).exists():
|
|
||||||
continue
|
|
||||||
Event.new(
|
|
||||||
EventAction.CONFIGURATION_ERROR,
|
|
||||||
deprecated_option=key,
|
|
||||||
deprecated_env=key_env,
|
|
||||||
replacement_option=replace,
|
|
||||||
replacement_env=replace_env,
|
|
||||||
message=msg,
|
|
||||||
).save()
|
|
||||||
|
|
||||||
def reconcile_prefill_tasks(self):
|
|
||||||
"""Prefill tasks"""
|
|
||||||
from authentik.events.models import SystemTask
|
|
||||||
from authentik.events.system_tasks import _prefill_tasks
|
|
||||||
|
|
||||||
for task in _prefill_tasks:
|
|
||||||
if SystemTask.objects.filter(name=task.name).exists():
|
|
||||||
continue
|
|
||||||
task.save()
|
|
||||||
self.logger.debug("prefilled task", task_name=task.name)
|
|
||||||
|
|
|
@ -1,81 +0,0 @@
|
||||||
"""ASN Enricher"""
|
|
||||||
from typing import TYPE_CHECKING, Optional, TypedDict
|
|
||||||
|
|
||||||
from django.http import HttpRequest
|
|
||||||
from geoip2.errors import GeoIP2Error
|
|
||||||
from geoip2.models import ASN
|
|
||||||
from sentry_sdk import Hub
|
|
||||||
|
|
||||||
from authentik.events.context_processors.mmdb import MMDBContextProcessor
|
|
||||||
from authentik.lib.config import CONFIG
|
|
||||||
from authentik.root.middleware import ClientIPMiddleware
|
|
||||||
|
|
||||||
if TYPE_CHECKING:
|
|
||||||
from authentik.api.v3.config import Capabilities
|
|
||||||
from authentik.events.models import Event
|
|
||||||
|
|
||||||
|
|
||||||
class ASNDict(TypedDict):
|
|
||||||
"""ASN Details"""
|
|
||||||
|
|
||||||
asn: int
|
|
||||||
as_org: str | None
|
|
||||||
network: str | None
|
|
||||||
|
|
||||||
|
|
||||||
class ASNContextProcessor(MMDBContextProcessor):
|
|
||||||
"""ASN Database reader wrapper"""
|
|
||||||
|
|
||||||
def capability(self) -> Optional["Capabilities"]:
|
|
||||||
from authentik.api.v3.config import Capabilities
|
|
||||||
|
|
||||||
return Capabilities.CAN_ASN
|
|
||||||
|
|
||||||
def path(self) -> str | None:
|
|
||||||
return CONFIG.get("events.context_processors.asn")
|
|
||||||
|
|
||||||
def enrich_event(self, event: "Event"):
|
|
||||||
asn = self.asn_dict(event.client_ip)
|
|
||||||
if not asn:
|
|
||||||
return
|
|
||||||
event.context["asn"] = asn
|
|
||||||
|
|
||||||
def enrich_context(self, request: HttpRequest) -> dict:
|
|
||||||
return {
|
|
||||||
"asn": self.asn_dict(ClientIPMiddleware.get_client_ip(request)),
|
|
||||||
}
|
|
||||||
|
|
||||||
def asn(self, ip_address: str) -> Optional[ASN]:
|
|
||||||
"""Wrapper for Reader.asn"""
|
|
||||||
with Hub.current.start_span(
|
|
||||||
op="authentik.events.asn.asn",
|
|
||||||
description=ip_address,
|
|
||||||
):
|
|
||||||
if not self.configured():
|
|
||||||
return None
|
|
||||||
self.check_expired()
|
|
||||||
try:
|
|
||||||
return self.reader.asn(ip_address)
|
|
||||||
except (GeoIP2Error, ValueError):
|
|
||||||
return None
|
|
||||||
|
|
||||||
def asn_to_dict(self, asn: ASN | None) -> ASNDict:
|
|
||||||
"""Convert ASN to dict"""
|
|
||||||
if not asn:
|
|
||||||
return {}
|
|
||||||
asn_dict: ASNDict = {
|
|
||||||
"asn": asn.autonomous_system_number,
|
|
||||||
"as_org": asn.autonomous_system_organization,
|
|
||||||
"network": str(asn.network) if asn.network else None,
|
|
||||||
}
|
|
||||||
return asn_dict
|
|
||||||
|
|
||||||
def asn_dict(self, ip_address: str) -> Optional[ASNDict]:
|
|
||||||
"""Wrapper for self.asn that returns a dict"""
|
|
||||||
asn = self.asn(ip_address)
|
|
||||||
if not asn:
|
|
||||||
return None
|
|
||||||
return self.asn_to_dict(asn)
|
|
||||||
|
|
||||||
|
|
||||||
ASN_CONTEXT_PROCESSOR = ASNContextProcessor()
|
|
|
@ -1,43 +0,0 @@
|
||||||
"""Base event enricher"""
|
|
||||||
from functools import cache
|
|
||||||
from typing import TYPE_CHECKING, Optional
|
|
||||||
|
|
||||||
from django.http import HttpRequest
|
|
||||||
|
|
||||||
if TYPE_CHECKING:
|
|
||||||
from authentik.api.v3.config import Capabilities
|
|
||||||
from authentik.events.models import Event
|
|
||||||
|
|
||||||
|
|
||||||
class EventContextProcessor:
|
|
||||||
"""Base event enricher"""
|
|
||||||
|
|
||||||
def capability(self) -> Optional["Capabilities"]:
|
|
||||||
"""Return the capability this context processor provides"""
|
|
||||||
return None
|
|
||||||
|
|
||||||
def configured(self) -> bool:
|
|
||||||
"""Return true if this context processor is configured"""
|
|
||||||
return False
|
|
||||||
|
|
||||||
def enrich_event(self, event: "Event"):
|
|
||||||
"""Modify event"""
|
|
||||||
raise NotImplementedError
|
|
||||||
|
|
||||||
def enrich_context(self, request: HttpRequest) -> dict:
|
|
||||||
"""Modify context"""
|
|
||||||
raise NotImplementedError
|
|
||||||
|
|
||||||
|
|
||||||
@cache
|
|
||||||
def get_context_processors() -> list[EventContextProcessor]:
|
|
||||||
"""Get a list of all configured context processors"""
|
|
||||||
from authentik.events.context_processors.asn import ASN_CONTEXT_PROCESSOR
|
|
||||||
from authentik.events.context_processors.geoip import GEOIP_CONTEXT_PROCESSOR
|
|
||||||
|
|
||||||
processors_types = [ASN_CONTEXT_PROCESSOR, GEOIP_CONTEXT_PROCESSOR]
|
|
||||||
processors = []
|
|
||||||
for _type in processors_types:
|
|
||||||
if _type.configured():
|
|
||||||
processors.append(_type)
|
|
||||||
return processors
|
|
|
@ -1,86 +0,0 @@
|
||||||
"""events GeoIP Reader"""
|
|
||||||
from typing import TYPE_CHECKING, Optional, TypedDict
|
|
||||||
|
|
||||||
from django.http import HttpRequest
|
|
||||||
from geoip2.errors import GeoIP2Error
|
|
||||||
from geoip2.models import City
|
|
||||||
from sentry_sdk.hub import Hub
|
|
||||||
|
|
||||||
from authentik.events.context_processors.mmdb import MMDBContextProcessor
|
|
||||||
from authentik.lib.config import CONFIG
|
|
||||||
from authentik.root.middleware import ClientIPMiddleware
|
|
||||||
|
|
||||||
if TYPE_CHECKING:
|
|
||||||
from authentik.api.v3.config import Capabilities
|
|
||||||
from authentik.events.models import Event
|
|
||||||
|
|
||||||
|
|
||||||
class GeoIPDict(TypedDict):
|
|
||||||
"""GeoIP Details"""
|
|
||||||
|
|
||||||
continent: str
|
|
||||||
country: str
|
|
||||||
lat: float
|
|
||||||
long: float
|
|
||||||
city: str
|
|
||||||
|
|
||||||
|
|
||||||
class GeoIPContextProcessor(MMDBContextProcessor):
|
|
||||||
"""Slim wrapper around GeoIP API"""
|
|
||||||
|
|
||||||
def capability(self) -> Optional["Capabilities"]:
|
|
||||||
from authentik.api.v3.config import Capabilities
|
|
||||||
|
|
||||||
return Capabilities.CAN_GEO_IP
|
|
||||||
|
|
||||||
def path(self) -> str | None:
|
|
||||||
return CONFIG.get("events.context_processors.geoip")
|
|
||||||
|
|
||||||
def enrich_event(self, event: "Event"):
|
|
||||||
city = self.city_dict(event.client_ip)
|
|
||||||
if not city:
|
|
||||||
return
|
|
||||||
event.context["geo"] = city
|
|
||||||
|
|
||||||
def enrich_context(self, request: HttpRequest) -> dict:
|
|
||||||
# Different key `geoip` vs `geo` for legacy reasons
|
|
||||||
return {"geoip": self.city(ClientIPMiddleware.get_client_ip(request))}
|
|
||||||
|
|
||||||
def city(self, ip_address: str) -> Optional[City]:
|
|
||||||
"""Wrapper for Reader.city"""
|
|
||||||
with Hub.current.start_span(
|
|
||||||
op="authentik.events.geo.city",
|
|
||||||
description=ip_address,
|
|
||||||
):
|
|
||||||
if not self.configured():
|
|
||||||
return None
|
|
||||||
self.check_expired()
|
|
||||||
try:
|
|
||||||
return self.reader.city(ip_address)
|
|
||||||
except (GeoIP2Error, ValueError):
|
|
||||||
return None
|
|
||||||
|
|
||||||
def city_to_dict(self, city: City | None) -> GeoIPDict:
|
|
||||||
"""Convert City to dict"""
|
|
||||||
if not city:
|
|
||||||
return {}
|
|
||||||
city_dict: GeoIPDict = {
|
|
||||||
"continent": city.continent.code,
|
|
||||||
"country": city.country.iso_code,
|
|
||||||
"lat": city.location.latitude,
|
|
||||||
"long": city.location.longitude,
|
|
||||||
"city": "",
|
|
||||||
}
|
|
||||||
if city.city.name:
|
|
||||||
city_dict["city"] = city.city.name
|
|
||||||
return city_dict
|
|
||||||
|
|
||||||
def city_dict(self, ip_address: str) -> Optional[GeoIPDict]:
|
|
||||||
"""Wrapper for self.city that returns a dict"""
|
|
||||||
city = self.city(ip_address)
|
|
||||||
if not city:
|
|
||||||
return None
|
|
||||||
return self.city_to_dict(city)
|
|
||||||
|
|
||||||
|
|
||||||
GEOIP_CONTEXT_PROCESSOR = GeoIPContextProcessor()
|
|
|
@ -1,53 +0,0 @@
|
||||||
"""Common logic for reading MMDB files"""
|
|
||||||
from pathlib import Path
|
|
||||||
from typing import Optional
|
|
||||||
|
|
||||||
from geoip2.database import Reader
|
|
||||||
from structlog.stdlib import get_logger
|
|
||||||
|
|
||||||
from authentik.events.context_processors.base import EventContextProcessor
|
|
||||||
|
|
||||||
|
|
||||||
class MMDBContextProcessor(EventContextProcessor):
|
|
||||||
"""Common logic for reading MaxMind DB files, including re-loading if the file has changed"""
|
|
||||||
|
|
||||||
def __init__(self):
|
|
||||||
self.reader: Optional[Reader] = None
|
|
||||||
self._last_mtime: float = 0.0
|
|
||||||
self.logger = get_logger()
|
|
||||||
self.open()
|
|
||||||
|
|
||||||
def path(self) -> str | None:
|
|
||||||
"""Get the path to the MMDB file to load"""
|
|
||||||
raise NotImplementedError
|
|
||||||
|
|
||||||
def open(self):
|
|
||||||
"""Get GeoIP Reader, if configured, otherwise none"""
|
|
||||||
path = self.path()
|
|
||||||
if path == "" or not path:
|
|
||||||
return
|
|
||||||
try:
|
|
||||||
self.reader = Reader(path)
|
|
||||||
self._last_mtime = Path(path).stat().st_mtime
|
|
||||||
self.logger.info("Loaded MMDB database", last_write=self._last_mtime, file=path)
|
|
||||||
except OSError as exc:
|
|
||||||
self.logger.warning("Failed to load MMDB database", path=path, exc=exc)
|
|
||||||
|
|
||||||
def check_expired(self):
|
|
||||||
"""Check if the modification date of the MMDB database has
|
|
||||||
changed, and reload it if so"""
|
|
||||||
path = self.path()
|
|
||||||
if path == "" or not path:
|
|
||||||
return
|
|
||||||
try:
|
|
||||||
mtime = Path(path).stat().st_mtime
|
|
||||||
diff = self._last_mtime < mtime
|
|
||||||
if diff > 0:
|
|
||||||
self.logger.info("Found new MMDB Database, reopening", diff=diff, path=path)
|
|
||||||
self.open()
|
|
||||||
except OSError as exc:
|
|
||||||
self.logger.warning("Failed to check MMDB age", exc=exc)
|
|
||||||
|
|
||||||
def configured(self) -> bool:
|
|
||||||
"""Return true if this context processor is configured"""
|
|
||||||
return bool(self.reader)
|
|
|
@ -0,0 +1,100 @@
|
||||||
|
"""events GeoIP Reader"""
|
||||||
|
from os import stat
|
||||||
|
from typing import Optional, TypedDict
|
||||||
|
|
||||||
|
from geoip2.database import Reader
|
||||||
|
from geoip2.errors import GeoIP2Error
|
||||||
|
from geoip2.models import City
|
||||||
|
from sentry_sdk.hub import Hub
|
||||||
|
from structlog.stdlib import get_logger
|
||||||
|
|
||||||
|
from authentik.lib.config import CONFIG
|
||||||
|
|
||||||
|
LOGGER = get_logger()
|
||||||
|
|
||||||
|
|
||||||
|
class GeoIPDict(TypedDict):
|
||||||
|
"""GeoIP Details"""
|
||||||
|
|
||||||
|
continent: str
|
||||||
|
country: str
|
||||||
|
lat: float
|
||||||
|
long: float
|
||||||
|
city: str
|
||||||
|
|
||||||
|
|
||||||
|
class GeoIPReader:
|
||||||
|
"""Slim wrapper around GeoIP API"""
|
||||||
|
|
||||||
|
def __init__(self):
|
||||||
|
self.__reader: Optional[Reader] = None
|
||||||
|
self.__last_mtime: float = 0.0
|
||||||
|
self.__open()
|
||||||
|
|
||||||
|
def __open(self):
|
||||||
|
"""Get GeoIP Reader, if configured, otherwise none"""
|
||||||
|
path = CONFIG.get("geoip")
|
||||||
|
if path == "" or not path:
|
||||||
|
return
|
||||||
|
try:
|
||||||
|
self.__reader = Reader(path)
|
||||||
|
self.__last_mtime = stat(path).st_mtime
|
||||||
|
LOGGER.info("Loaded GeoIP database", last_write=self.__last_mtime)
|
||||||
|
except OSError as exc:
|
||||||
|
LOGGER.warning("Failed to load GeoIP database", exc=exc)
|
||||||
|
|
||||||
|
def __check_expired(self):
|
||||||
|
"""Check if the modification date of the GeoIP database has
|
||||||
|
changed, and reload it if so"""
|
||||||
|
path = CONFIG.get("geoip")
|
||||||
|
try:
|
||||||
|
mtime = stat(path).st_mtime
|
||||||
|
diff = self.__last_mtime < mtime
|
||||||
|
if diff > 0:
|
||||||
|
LOGGER.info("Found new GeoIP Database, reopening", diff=diff)
|
||||||
|
self.__open()
|
||||||
|
except OSError as exc:
|
||||||
|
LOGGER.warning("Failed to check GeoIP age", exc=exc)
|
||||||
|
return
|
||||||
|
|
||||||
|
@property
|
||||||
|
def enabled(self) -> bool:
|
||||||
|
"""Check if GeoIP is enabled"""
|
||||||
|
return bool(self.__reader)
|
||||||
|
|
||||||
|
def city(self, ip_address: str) -> Optional[City]:
|
||||||
|
"""Wrapper for Reader.city"""
|
||||||
|
with Hub.current.start_span(
|
||||||
|
op="authentik.events.geo.city",
|
||||||
|
description=ip_address,
|
||||||
|
):
|
||||||
|
if not self.enabled:
|
||||||
|
return None
|
||||||
|
self.__check_expired()
|
||||||
|
try:
|
||||||
|
return self.__reader.city(ip_address)
|
||||||
|
except (GeoIP2Error, ValueError):
|
||||||
|
return None
|
||||||
|
|
||||||
|
def city_to_dict(self, city: City) -> GeoIPDict:
|
||||||
|
"""Convert City to dict"""
|
||||||
|
city_dict: GeoIPDict = {
|
||||||
|
"continent": city.continent.code,
|
||||||
|
"country": city.country.iso_code,
|
||||||
|
"lat": city.location.latitude,
|
||||||
|
"long": city.location.longitude,
|
||||||
|
"city": "",
|
||||||
|
}
|
||||||
|
if city.city.name:
|
||||||
|
city_dict["city"] = city.city.name
|
||||||
|
return city_dict
|
||||||
|
|
||||||
|
def city_dict(self, ip_address: str) -> Optional[GeoIPDict]:
|
||||||
|
"""Wrapper for self.city that returns a dict"""
|
||||||
|
city = self.city(ip_address)
|
||||||
|
if not city:
|
||||||
|
return None
|
||||||
|
return self.city_to_dict(city)
|
||||||
|
|
||||||
|
|
||||||
|
GEOIP_READER = GeoIPReader()
|
|
@ -20,8 +20,7 @@ from authentik.core.models import (
|
||||||
User,
|
User,
|
||||||
UserSourceConnection,
|
UserSourceConnection,
|
||||||
)
|
)
|
||||||
from authentik.enterprise.providers.rac.models import ConnectionToken
|
from authentik.events.models import Event, EventAction, Notification
|
||||||
from authentik.events.models import Event, EventAction, Notification, SystemTask
|
|
||||||
from authentik.events.utils import model_to_dict
|
from authentik.events.utils import model_to_dict
|
||||||
from authentik.flows.models import FlowToken, Stage
|
from authentik.flows.models import FlowToken, Stage
|
||||||
from authentik.lib.sentry import before_send
|
from authentik.lib.sentry import before_send
|
||||||
|
@ -55,13 +54,14 @@ IGNORED_MODELS = (
|
||||||
SCIMUser,
|
SCIMUser,
|
||||||
SCIMGroup,
|
SCIMGroup,
|
||||||
Reputation,
|
Reputation,
|
||||||
ConnectionToken,
|
|
||||||
SystemTask,
|
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
def should_log_model(model: Model) -> bool:
|
def should_log_model(model: Model) -> bool:
|
||||||
"""Return true if operation on `model` should be logged"""
|
"""Return true if operation on `model` should be logged"""
|
||||||
|
# Check for silk by string so this comparison doesn't fail when silk isn't installed
|
||||||
|
if model.__module__.startswith("silk"):
|
||||||
|
return False
|
||||||
return model.__class__ not in IGNORED_MODELS
|
return model.__class__ not in IGNORED_MODELS
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -1,60 +0,0 @@
|
||||||
# Generated by Django 5.0.1 on 2024-01-13 21:42
|
|
||||||
|
|
||||||
import uuid
|
|
||||||
|
|
||||||
from django.db import migrations, models
|
|
||||||
|
|
||||||
import authentik.core.models
|
|
||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
|
||||||
dependencies = [
|
|
||||||
("authentik_events", "0002_alter_notificationtransport_mode"),
|
|
||||||
]
|
|
||||||
|
|
||||||
operations = [
|
|
||||||
migrations.CreateModel(
|
|
||||||
name="SystemTask",
|
|
||||||
fields=[
|
|
||||||
(
|
|
||||||
"expires",
|
|
||||||
models.DateTimeField(default=authentik.core.models.default_token_duration),
|
|
||||||
),
|
|
||||||
("expiring", models.BooleanField(default=True)),
|
|
||||||
(
|
|
||||||
"uuid",
|
|
||||||
models.UUIDField(
|
|
||||||
default=uuid.uuid4, editable=False, primary_key=True, serialize=False
|
|
||||||
),
|
|
||||||
),
|
|
||||||
("name", models.TextField()),
|
|
||||||
("uid", models.TextField(null=True)),
|
|
||||||
("start_timestamp", models.FloatField()),
|
|
||||||
("finish_timestamp", models.FloatField()),
|
|
||||||
(
|
|
||||||
"status",
|
|
||||||
models.TextField(
|
|
||||||
choices=[
|
|
||||||
("unknown", "Unknown"),
|
|
||||||
("successful", "Successful"),
|
|
||||||
("warning", "Warning"),
|
|
||||||
("error", "Error"),
|
|
||||||
]
|
|
||||||
),
|
|
||||||
),
|
|
||||||
("description", models.TextField(null=True)),
|
|
||||||
("messages", models.JSONField()),
|
|
||||||
("task_call_module", models.TextField()),
|
|
||||||
("task_call_func", models.TextField()),
|
|
||||||
("task_call_args", models.JSONField(default=list)),
|
|
||||||
("task_call_kwargs", models.JSONField(default=dict)),
|
|
||||||
],
|
|
||||||
options={
|
|
||||||
"verbose_name": "System Task",
|
|
||||||
"verbose_name_plural": "System Tasks",
|
|
||||||
"permissions": [("run_task", "Run task")],
|
|
||||||
"default_permissions": ["view"],
|
|
||||||
"unique_together": {("name", "uid")},
|
|
||||||
},
|
|
||||||
),
|
|
||||||
]
|
|
|
@ -4,7 +4,7 @@ from collections import Counter
|
||||||
from datetime import timedelta
|
from datetime import timedelta
|
||||||
from inspect import currentframe
|
from inspect import currentframe
|
||||||
from smtplib import SMTPException
|
from smtplib import SMTPException
|
||||||
from typing import Optional
|
from typing import TYPE_CHECKING, Optional
|
||||||
from uuid import uuid4
|
from uuid import uuid4
|
||||||
|
|
||||||
from django.db import models
|
from django.db import models
|
||||||
|
@ -18,7 +18,6 @@ from django.http.request import QueryDict
|
||||||
from django.utils.timezone import now
|
from django.utils.timezone import now
|
||||||
from django.utils.translation import gettext as _
|
from django.utils.translation import gettext as _
|
||||||
from requests import RequestException
|
from requests import RequestException
|
||||||
from rest_framework.serializers import Serializer
|
|
||||||
from structlog.stdlib import get_logger
|
from structlog.stdlib import get_logger
|
||||||
|
|
||||||
from authentik import get_full_version
|
from authentik import get_full_version
|
||||||
|
@ -27,8 +26,7 @@ from authentik.core.middleware import (
|
||||||
SESSION_KEY_IMPERSONATE_USER,
|
SESSION_KEY_IMPERSONATE_USER,
|
||||||
)
|
)
|
||||||
from authentik.core.models import ExpiringModel, Group, PropertyMapping, User
|
from authentik.core.models import ExpiringModel, Group, PropertyMapping, User
|
||||||
from authentik.events.apps import GAUGE_TASKS, SYSTEM_TASK_STATUS, SYSTEM_TASK_TIME
|
from authentik.events.geo import GEOIP_READER
|
||||||
from authentik.events.context_processors.base import get_context_processors
|
|
||||||
from authentik.events.utils import (
|
from authentik.events.utils import (
|
||||||
cleanse_dict,
|
cleanse_dict,
|
||||||
get_user,
|
get_user,
|
||||||
|
@ -38,15 +36,16 @@ from authentik.events.utils import (
|
||||||
)
|
)
|
||||||
from authentik.lib.models import DomainlessURLValidator, SerializerModel
|
from authentik.lib.models import DomainlessURLValidator, SerializerModel
|
||||||
from authentik.lib.sentry import SentryIgnoredException
|
from authentik.lib.sentry import SentryIgnoredException
|
||||||
from authentik.lib.utils.http import get_http_session
|
from authentik.lib.utils.http import get_client_ip, get_http_session
|
||||||
from authentik.lib.utils.time import timedelta_from_string
|
from authentik.lib.utils.time import timedelta_from_string
|
||||||
from authentik.policies.models import PolicyBindingModel
|
from authentik.policies.models import PolicyBindingModel
|
||||||
from authentik.root.middleware import ClientIPMiddleware
|
|
||||||
from authentik.stages.email.utils import TemplateEmailMessage
|
from authentik.stages.email.utils import TemplateEmailMessage
|
||||||
from authentik.tenants.models import Tenant
|
from authentik.tenants.models import Tenant
|
||||||
from authentik.tenants.utils import DEFAULT_TENANT
|
from authentik.tenants.utils import DEFAULT_TENANT
|
||||||
|
|
||||||
LOGGER = get_logger()
|
LOGGER = get_logger()
|
||||||
|
if TYPE_CHECKING:
|
||||||
|
from rest_framework.serializers import Serializer
|
||||||
|
|
||||||
|
|
||||||
def default_event_duration():
|
def default_event_duration():
|
||||||
|
@ -245,16 +244,22 @@ class Event(SerializerModel, ExpiringModel):
|
||||||
self.user = get_user(request.session[SESSION_KEY_IMPERSONATE_ORIGINAL_USER])
|
self.user = get_user(request.session[SESSION_KEY_IMPERSONATE_ORIGINAL_USER])
|
||||||
self.user["on_behalf_of"] = get_user(request.session[SESSION_KEY_IMPERSONATE_USER])
|
self.user["on_behalf_of"] = get_user(request.session[SESSION_KEY_IMPERSONATE_USER])
|
||||||
# User 255.255.255.255 as fallback if IP cannot be determined
|
# User 255.255.255.255 as fallback if IP cannot be determined
|
||||||
self.client_ip = ClientIPMiddleware.get_client_ip(request)
|
self.client_ip = get_client_ip(request)
|
||||||
# Enrich event data
|
# Apply GeoIP Data, when enabled
|
||||||
for processor in get_context_processors():
|
self.with_geoip()
|
||||||
processor.enrich_event(self)
|
|
||||||
# If there's no app set, we get it from the requests too
|
# If there's no app set, we get it from the requests too
|
||||||
if not self.app:
|
if not self.app:
|
||||||
self.app = Event._get_app_from_request(request)
|
self.app = Event._get_app_from_request(request)
|
||||||
self.save()
|
self.save()
|
||||||
return self
|
return self
|
||||||
|
|
||||||
|
def with_geoip(self): # pragma: no cover
|
||||||
|
"""Apply GeoIP Data, when enabled"""
|
||||||
|
city = GEOIP_READER.city_dict(self.client_ip)
|
||||||
|
if not city:
|
||||||
|
return
|
||||||
|
self.context["geo"] = city
|
||||||
|
|
||||||
def save(self, *args, **kwargs):
|
def save(self, *args, **kwargs):
|
||||||
if self._state.adding:
|
if self._state.adding:
|
||||||
LOGGER.info(
|
LOGGER.info(
|
||||||
|
@ -267,7 +272,7 @@ class Event(SerializerModel, ExpiringModel):
|
||||||
super().save(*args, **kwargs)
|
super().save(*args, **kwargs)
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def serializer(self) -> type[Serializer]:
|
def serializer(self) -> "Serializer":
|
||||||
from authentik.events.api.events import EventSerializer
|
from authentik.events.api.events import EventSerializer
|
||||||
|
|
||||||
return EventSerializer
|
return EventSerializer
|
||||||
|
@ -461,7 +466,7 @@ class NotificationTransport(SerializerModel):
|
||||||
}
|
}
|
||||||
mail = TemplateEmailMessage(
|
mail = TemplateEmailMessage(
|
||||||
subject=subject_prefix + context["title"],
|
subject=subject_prefix + context["title"],
|
||||||
to=[f"{notification.user.name} <{notification.user.email}>"],
|
to=[notification.user.email],
|
||||||
language=notification.user.locale(),
|
language=notification.user.locale(),
|
||||||
template_name="email/event_notification.html",
|
template_name="email/event_notification.html",
|
||||||
template_context=context,
|
template_context=context,
|
||||||
|
@ -475,7 +480,7 @@ class NotificationTransport(SerializerModel):
|
||||||
raise NotificationTransportError(exc) from exc
|
raise NotificationTransportError(exc) from exc
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def serializer(self) -> type[Serializer]:
|
def serializer(self) -> "Serializer":
|
||||||
from authentik.events.api.notification_transports import NotificationTransportSerializer
|
from authentik.events.api.notification_transports import NotificationTransportSerializer
|
||||||
|
|
||||||
return NotificationTransportSerializer
|
return NotificationTransportSerializer
|
||||||
|
@ -508,7 +513,7 @@ class Notification(SerializerModel):
|
||||||
user = models.ForeignKey(User, on_delete=models.CASCADE)
|
user = models.ForeignKey(User, on_delete=models.CASCADE)
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def serializer(self) -> type[Serializer]:
|
def serializer(self) -> "Serializer":
|
||||||
from authentik.events.api.notifications import NotificationSerializer
|
from authentik.events.api.notifications import NotificationSerializer
|
||||||
|
|
||||||
return NotificationSerializer
|
return NotificationSerializer
|
||||||
|
@ -551,7 +556,7 @@ class NotificationRule(SerializerModel, PolicyBindingModel):
|
||||||
)
|
)
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def serializer(self) -> type[Serializer]:
|
def serializer(self) -> "Serializer":
|
||||||
from authentik.events.api.notification_rules import NotificationRuleSerializer
|
from authentik.events.api.notification_rules import NotificationRuleSerializer
|
||||||
|
|
||||||
return NotificationRuleSerializer
|
return NotificationRuleSerializer
|
||||||
|
@ -572,7 +577,7 @@ class NotificationWebhookMapping(PropertyMapping):
|
||||||
return "ak-property-mapping-notification-form"
|
return "ak-property-mapping-notification-form"
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def serializer(self) -> type[type[Serializer]]:
|
def serializer(self) -> type["Serializer"]:
|
||||||
from authentik.events.api.notification_mappings import NotificationWebhookMappingSerializer
|
from authentik.events.api.notification_mappings import NotificationWebhookMappingSerializer
|
||||||
|
|
||||||
return NotificationWebhookMappingSerializer
|
return NotificationWebhookMappingSerializer
|
||||||
|
@ -583,66 +588,3 @@ class NotificationWebhookMapping(PropertyMapping):
|
||||||
class Meta:
|
class Meta:
|
||||||
verbose_name = _("Webhook Mapping")
|
verbose_name = _("Webhook Mapping")
|
||||||
verbose_name_plural = _("Webhook Mappings")
|
verbose_name_plural = _("Webhook Mappings")
|
||||||
|
|
||||||
|
|
||||||
class TaskStatus(models.TextChoices):
|
|
||||||
"""Possible states of tasks"""
|
|
||||||
|
|
||||||
UNKNOWN = "unknown"
|
|
||||||
SUCCESSFUL = "successful"
|
|
||||||
WARNING = "warning"
|
|
||||||
ERROR = "error"
|
|
||||||
|
|
||||||
|
|
||||||
class SystemTask(SerializerModel, ExpiringModel):
|
|
||||||
"""Info about a system task running in the background along with details to restart the task"""
|
|
||||||
|
|
||||||
uuid = models.UUIDField(primary_key=True, editable=False, default=uuid4)
|
|
||||||
name = models.TextField()
|
|
||||||
uid = models.TextField(null=True)
|
|
||||||
|
|
||||||
start_timestamp = models.FloatField()
|
|
||||||
finish_timestamp = models.FloatField()
|
|
||||||
|
|
||||||
status = models.TextField(choices=TaskStatus.choices)
|
|
||||||
|
|
||||||
description = models.TextField(null=True)
|
|
||||||
messages = models.JSONField()
|
|
||||||
|
|
||||||
task_call_module = models.TextField()
|
|
||||||
task_call_func = models.TextField()
|
|
||||||
task_call_args = models.JSONField(default=list)
|
|
||||||
task_call_kwargs = models.JSONField(default=dict)
|
|
||||||
|
|
||||||
@property
|
|
||||||
def serializer(self) -> type[Serializer]:
|
|
||||||
from authentik.events.api.tasks import SystemTaskSerializer
|
|
||||||
|
|
||||||
return SystemTaskSerializer
|
|
||||||
|
|
||||||
def update_metrics(self):
|
|
||||||
"""Update prometheus metrics"""
|
|
||||||
duration = max(self.finish_timestamp - self.start_timestamp, 0)
|
|
||||||
# TODO: Deprecated metric - remove in 2024.2 or later
|
|
||||||
GAUGE_TASKS.labels(
|
|
||||||
task_name=self.name,
|
|
||||||
task_uid=self.uid or "",
|
|
||||||
status=self.status.lower(),
|
|
||||||
).set(duration)
|
|
||||||
SYSTEM_TASK_TIME.observe(duration)
|
|
||||||
SYSTEM_TASK_STATUS.labels(
|
|
||||||
task_name=self.name,
|
|
||||||
task_uid=self.uid or "",
|
|
||||||
status=self.status.lower(),
|
|
||||||
).inc()
|
|
||||||
|
|
||||||
def __str__(self) -> str:
|
|
||||||
return f"System Task {self.name}"
|
|
||||||
|
|
||||||
class Meta:
|
|
||||||
unique_together = (("name", "uid"),)
|
|
||||||
# Remove "add", "change" and "delete" permissions as those are not used
|
|
||||||
default_permissions = ["view"]
|
|
||||||
permissions = [("run_task", _("Run task"))]
|
|
||||||
verbose_name = _("System Task")
|
|
||||||
verbose_name_plural = _("System Tasks")
|
|
||||||
|
|
|
@ -0,0 +1,214 @@
|
||||||
|
"""Monitored tasks"""
|
||||||
|
from dataclasses import dataclass, field
|
||||||
|
from datetime import datetime
|
||||||
|
from enum import Enum
|
||||||
|
from timeit import default_timer
|
||||||
|
from typing import Any, Optional
|
||||||
|
|
||||||
|
from celery import Task
|
||||||
|
from django.core.cache import cache
|
||||||
|
from django.utils.translation import gettext_lazy as _
|
||||||
|
from structlog.stdlib import get_logger
|
||||||
|
|
||||||
|
from authentik.events.apps import GAUGE_TASKS
|
||||||
|
from authentik.events.models import Event, EventAction
|
||||||
|
from authentik.lib.utils.errors import exception_to_string
|
||||||
|
|
||||||
|
LOGGER = get_logger()
|
||||||
|
CACHE_KEY_PREFIX = "goauthentik.io/events/tasks/"
|
||||||
|
|
||||||
|
|
||||||
|
class TaskResultStatus(Enum):
|
||||||
|
"""Possible states of tasks"""
|
||||||
|
|
||||||
|
SUCCESSFUL = 1
|
||||||
|
WARNING = 2
|
||||||
|
ERROR = 4
|
||||||
|
UNKNOWN = 8
|
||||||
|
|
||||||
|
|
||||||
|
@dataclass
|
||||||
|
class TaskResult:
|
||||||
|
"""Result of a task run, this class is created by the task itself
|
||||||
|
and used by self.set_status"""
|
||||||
|
|
||||||
|
status: TaskResultStatus
|
||||||
|
|
||||||
|
messages: list[str] = field(default_factory=list)
|
||||||
|
|
||||||
|
# Optional UID used in cache for tasks that run in different instances
|
||||||
|
uid: Optional[str] = field(default=None)
|
||||||
|
|
||||||
|
def with_error(self, exc: Exception) -> "TaskResult":
|
||||||
|
"""Since errors might not always be pickle-able, set the traceback"""
|
||||||
|
# TODO: Mark exception somehow so that is rendered as <pre> in frontend
|
||||||
|
self.messages.append(exception_to_string(exc))
|
||||||
|
return self
|
||||||
|
|
||||||
|
|
||||||
|
@dataclass
|
||||||
|
class TaskInfo:
|
||||||
|
"""Info about a task run"""
|
||||||
|
|
||||||
|
task_name: str
|
||||||
|
start_timestamp: float
|
||||||
|
finish_timestamp: float
|
||||||
|
finish_time: datetime
|
||||||
|
|
||||||
|
result: TaskResult
|
||||||
|
|
||||||
|
task_call_module: str
|
||||||
|
task_call_func: str
|
||||||
|
task_call_args: list[Any] = field(default_factory=list)
|
||||||
|
task_call_kwargs: dict[str, Any] = field(default_factory=dict)
|
||||||
|
|
||||||
|
task_description: Optional[str] = field(default=None)
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def all() -> dict[str, "TaskInfo"]:
|
||||||
|
"""Get all TaskInfo objects"""
|
||||||
|
return cache.get_many(cache.keys(CACHE_KEY_PREFIX + "*"))
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def by_name(name: str) -> Optional["TaskInfo"] | Optional[list["TaskInfo"]]:
|
||||||
|
"""Get TaskInfo Object by name"""
|
||||||
|
if "*" in name:
|
||||||
|
return cache.get_many(cache.keys(CACHE_KEY_PREFIX + name)).values()
|
||||||
|
return cache.get(CACHE_KEY_PREFIX + name, None)
|
||||||
|
|
||||||
|
@property
|
||||||
|
def full_name(self) -> str:
|
||||||
|
"""Get the full cache key with task name and UID"""
|
||||||
|
key = CACHE_KEY_PREFIX + self.task_name
|
||||||
|
if self.result.uid:
|
||||||
|
uid_suffix = f":{self.result.uid}"
|
||||||
|
key += uid_suffix
|
||||||
|
if not self.task_name.endswith(uid_suffix):
|
||||||
|
self.task_name += uid_suffix
|
||||||
|
return key
|
||||||
|
|
||||||
|
def delete(self):
|
||||||
|
"""Delete task info from cache"""
|
||||||
|
return cache.delete(self.full_name)
|
||||||
|
|
||||||
|
def update_metrics(self):
|
||||||
|
"""Update prometheus metrics"""
|
||||||
|
start = default_timer()
|
||||||
|
if hasattr(self, "start_timestamp"):
|
||||||
|
start = self.start_timestamp
|
||||||
|
try:
|
||||||
|
duration = max(self.finish_timestamp - start, 0)
|
||||||
|
except TypeError:
|
||||||
|
duration = 0
|
||||||
|
GAUGE_TASKS.labels(
|
||||||
|
task_name=self.task_name.split(":")[0],
|
||||||
|
task_uid=self.result.uid or "",
|
||||||
|
status=self.result.status.name.lower(),
|
||||||
|
).set(duration)
|
||||||
|
|
||||||
|
def save(self, timeout_hours=6):
|
||||||
|
"""Save task into cache"""
|
||||||
|
self.update_metrics()
|
||||||
|
cache.set(self.full_name, self, timeout=timeout_hours * 60 * 60)
|
||||||
|
|
||||||
|
|
||||||
|
class MonitoredTask(Task):
|
||||||
|
"""Task which can save its state to the cache"""
|
||||||
|
|
||||||
|
# For tasks that should only be listed if they failed, set this to False
|
||||||
|
save_on_success: bool
|
||||||
|
|
||||||
|
_result: Optional[TaskResult]
|
||||||
|
|
||||||
|
_uid: Optional[str]
|
||||||
|
start: Optional[float] = None
|
||||||
|
|
||||||
|
def __init__(self, *args, **kwargs) -> None:
|
||||||
|
super().__init__(*args, **kwargs)
|
||||||
|
self.save_on_success = True
|
||||||
|
self._uid = None
|
||||||
|
self._result = None
|
||||||
|
self.result_timeout_hours = 6
|
||||||
|
|
||||||
|
def set_uid(self, uid: str):
|
||||||
|
"""Set UID, so in the case of an unexpected error its saved correctly"""
|
||||||
|
self._uid = uid
|
||||||
|
|
||||||
|
def set_status(self, result: TaskResult):
|
||||||
|
"""Set result for current run, will overwrite previous result."""
|
||||||
|
self._result = result
|
||||||
|
|
||||||
|
def before_start(self, task_id, args, kwargs):
|
||||||
|
self.start = default_timer()
|
||||||
|
return super().before_start(task_id, args, kwargs)
|
||||||
|
|
||||||
|
# pylint: disable=too-many-arguments
|
||||||
|
def after_return(self, status, retval, task_id, args: list[Any], kwargs: dict[str, Any], einfo):
|
||||||
|
super().after_return(status, retval, task_id, args, kwargs, einfo=einfo)
|
||||||
|
if not self._result:
|
||||||
|
return
|
||||||
|
if not self._result.uid:
|
||||||
|
self._result.uid = self._uid
|
||||||
|
info = TaskInfo(
|
||||||
|
task_name=self.__name__,
|
||||||
|
task_description=self.__doc__,
|
||||||
|
start_timestamp=self.start or default_timer(),
|
||||||
|
finish_timestamp=default_timer(),
|
||||||
|
finish_time=datetime.now(),
|
||||||
|
result=self._result,
|
||||||
|
task_call_module=self.__module__,
|
||||||
|
task_call_func=self.__name__,
|
||||||
|
task_call_args=args,
|
||||||
|
task_call_kwargs=kwargs,
|
||||||
|
)
|
||||||
|
if self._result.status == TaskResultStatus.SUCCESSFUL and not self.save_on_success:
|
||||||
|
info.delete()
|
||||||
|
return
|
||||||
|
info.save(self.result_timeout_hours)
|
||||||
|
|
||||||
|
# pylint: disable=too-many-arguments
|
||||||
|
def on_failure(self, exc, task_id, args, kwargs, einfo):
|
||||||
|
super().on_failure(exc, task_id, args, kwargs, einfo=einfo)
|
||||||
|
if not self._result:
|
||||||
|
self._result = TaskResult(status=TaskResultStatus.ERROR, messages=[str(exc)])
|
||||||
|
if not self._result.uid:
|
||||||
|
self._result.uid = self._uid
|
||||||
|
TaskInfo(
|
||||||
|
task_name=self.__name__,
|
||||||
|
task_description=self.__doc__,
|
||||||
|
start_timestamp=self.start or default_timer(),
|
||||||
|
finish_timestamp=default_timer(),
|
||||||
|
finish_time=datetime.now(),
|
||||||
|
result=self._result,
|
||||||
|
task_call_module=self.__module__,
|
||||||
|
task_call_func=self.__name__,
|
||||||
|
task_call_args=args,
|
||||||
|
task_call_kwargs=kwargs,
|
||||||
|
).save(self.result_timeout_hours)
|
||||||
|
Event.new(
|
||||||
|
EventAction.SYSTEM_TASK_EXCEPTION,
|
||||||
|
message=f"Task {self.__name__} encountered an error: {exception_to_string(exc)}",
|
||||||
|
).save()
|
||||||
|
|
||||||
|
def run(self, *args, **kwargs):
|
||||||
|
raise NotImplementedError
|
||||||
|
|
||||||
|
|
||||||
|
def prefill_task(func):
|
||||||
|
"""Ensure a task's details are always in cache, so it can always be triggered via API"""
|
||||||
|
status = TaskInfo.by_name(func.__name__)
|
||||||
|
if status:
|
||||||
|
return func
|
||||||
|
TaskInfo(
|
||||||
|
task_name=func.__name__,
|
||||||
|
task_description=func.__doc__,
|
||||||
|
result=TaskResult(TaskResultStatus.UNKNOWN, messages=[_("Task has not been run yet.")]),
|
||||||
|
task_call_module=func.__module__,
|
||||||
|
task_call_func=func.__name__,
|
||||||
|
# We don't have real values for these attributes but they cannot be null
|
||||||
|
start_timestamp=0,
|
||||||
|
finish_timestamp=0,
|
||||||
|
finish_time=datetime.now(),
|
||||||
|
).save(86400)
|
||||||
|
LOGGER.debug("prefilled task", task_name=func.__name__)
|
||||||
|
return func
|
|
@ -8,14 +8,12 @@ from django.http import HttpRequest
|
||||||
|
|
||||||
from authentik.core.models import User
|
from authentik.core.models import User
|
||||||
from authentik.core.signals import login_failed, password_changed
|
from authentik.core.signals import login_failed, password_changed
|
||||||
from authentik.events.apps import SYSTEM_TASK_STATUS
|
from authentik.events.models import Event, EventAction
|
||||||
from authentik.events.models import Event, EventAction, SystemTask
|
|
||||||
from authentik.events.tasks import event_notification_handler, gdpr_cleanup
|
from authentik.events.tasks import event_notification_handler, gdpr_cleanup
|
||||||
from authentik.flows.models import Stage
|
from authentik.flows.models import Stage
|
||||||
from authentik.flows.planner import PLAN_CONTEXT_SOURCE, FlowPlan
|
from authentik.flows.planner import PLAN_CONTEXT_SOURCE, FlowPlan
|
||||||
from authentik.flows.views.executor import SESSION_KEY_PLAN
|
from authentik.flows.views.executor import SESSION_KEY_PLAN
|
||||||
from authentik.lib.config import CONFIG
|
from authentik.lib.config import CONFIG
|
||||||
from authentik.root.monitoring import monitoring_set
|
|
||||||
from authentik.stages.invitation.models import Invitation
|
from authentik.stages.invitation.models import Invitation
|
||||||
from authentik.stages.invitation.signals import invitation_used
|
from authentik.stages.invitation.signals import invitation_used
|
||||||
from authentik.stages.password.stage import PLAN_CONTEXT_METHOD, PLAN_CONTEXT_METHOD_ARGS
|
from authentik.stages.password.stage import PLAN_CONTEXT_METHOD, PLAN_CONTEXT_METHOD_ARGS
|
||||||
|
@ -47,14 +45,9 @@ def get_login_event(request: HttpRequest) -> Optional[Event]:
|
||||||
|
|
||||||
|
|
||||||
@receiver(user_logged_out)
|
@receiver(user_logged_out)
|
||||||
def on_user_logged_out(sender, request: HttpRequest, user: User, **kwargs):
|
def on_user_logged_out(sender, request: HttpRequest, user: User, **_):
|
||||||
"""Log successfully logout"""
|
"""Log successfully logout"""
|
||||||
# Check if this even comes from the user_login stage's middleware, which will set an extra
|
Event.new(EventAction.LOGOUT).from_http(request, user=user)
|
||||||
# argument
|
|
||||||
event = Event.new(EventAction.LOGOUT)
|
|
||||||
if "event_extra" in kwargs:
|
|
||||||
event.context.update(kwargs["event_extra"])
|
|
||||||
event.from_http(request, user=user)
|
|
||||||
|
|
||||||
|
|
||||||
@receiver(user_write)
|
@receiver(user_write)
|
||||||
|
@ -102,11 +95,3 @@ def event_user_pre_delete_cleanup(sender, instance: User, **_):
|
||||||
"""If gdpr_compliance is enabled, remove all the user's events"""
|
"""If gdpr_compliance is enabled, remove all the user's events"""
|
||||||
if CONFIG.get_bool("gdpr_compliance", True):
|
if CONFIG.get_bool("gdpr_compliance", True):
|
||||||
gdpr_cleanup.delay(instance.pk)
|
gdpr_cleanup.delay(instance.pk)
|
||||||
|
|
||||||
|
|
||||||
@receiver(monitoring_set)
|
|
||||||
def monitoring_system_task(sender, **_):
|
|
||||||
"""Update metrics when task is saved"""
|
|
||||||
SYSTEM_TASK_STATUS.clear()
|
|
||||||
for task in SystemTask.objects.all():
|
|
||||||
task.update_metrics()
|
|
||||||
|
|
|
@ -1,135 +0,0 @@
|
||||||
"""Monitored tasks"""
|
|
||||||
from datetime import timedelta
|
|
||||||
from timeit import default_timer
|
|
||||||
from typing import Any, Optional
|
|
||||||
|
|
||||||
from celery import Task
|
|
||||||
from django.utils.timezone import now
|
|
||||||
from django.utils.translation import gettext_lazy as _
|
|
||||||
from structlog.stdlib import get_logger
|
|
||||||
|
|
||||||
from authentik.events.models import Event, EventAction
|
|
||||||
from authentik.events.models import SystemTask as DBSystemTask
|
|
||||||
from authentik.events.models import TaskStatus
|
|
||||||
from authentik.events.utils import sanitize_item
|
|
||||||
from authentik.lib.utils.errors import exception_to_string
|
|
||||||
|
|
||||||
LOGGER = get_logger()
|
|
||||||
|
|
||||||
|
|
||||||
class SystemTask(Task):
|
|
||||||
"""Task which can save its state to the cache"""
|
|
||||||
|
|
||||||
# For tasks that should only be listed if they failed, set this to False
|
|
||||||
save_on_success: bool
|
|
||||||
|
|
||||||
_status: Optional[TaskStatus]
|
|
||||||
_messages: list[str]
|
|
||||||
|
|
||||||
_uid: Optional[str]
|
|
||||||
_start: Optional[float] = None
|
|
||||||
|
|
||||||
def __init__(self, *args, **kwargs) -> None:
|
|
||||||
super().__init__(*args, **kwargs)
|
|
||||||
self.save_on_success = True
|
|
||||||
self._uid = None
|
|
||||||
self._status = None
|
|
||||||
self._messages = []
|
|
||||||
self.result_timeout_hours = 6
|
|
||||||
|
|
||||||
def set_uid(self, uid: str):
|
|
||||||
"""Set UID, so in the case of an unexpected error its saved correctly"""
|
|
||||||
self._uid = uid
|
|
||||||
|
|
||||||
def set_status(self, status: TaskStatus, *messages: str):
|
|
||||||
"""Set result for current run, will overwrite previous result."""
|
|
||||||
self._status = status
|
|
||||||
self._messages = messages
|
|
||||||
|
|
||||||
def set_error(self, exception: Exception):
|
|
||||||
"""Set result to error and save exception"""
|
|
||||||
self._status = TaskStatus.ERROR
|
|
||||||
self._messages = [exception_to_string(exception)]
|
|
||||||
|
|
||||||
def before_start(self, task_id, args, kwargs):
|
|
||||||
self._start = default_timer()
|
|
||||||
return super().before_start(task_id, args, kwargs)
|
|
||||||
|
|
||||||
# pylint: disable=too-many-arguments
|
|
||||||
def after_return(self, status, retval, task_id, args: list[Any], kwargs: dict[str, Any], einfo):
|
|
||||||
super().after_return(status, retval, task_id, args, kwargs, einfo=einfo)
|
|
||||||
if not self._status:
|
|
||||||
return
|
|
||||||
if self._status == TaskStatus.SUCCESSFUL and not self.save_on_success:
|
|
||||||
DBSystemTask.objects.filter(
|
|
||||||
name=self.__name__,
|
|
||||||
uid=self._uid,
|
|
||||||
).delete()
|
|
||||||
return
|
|
||||||
DBSystemTask.objects.update_or_create(
|
|
||||||
name=self.__name__,
|
|
||||||
uid=self._uid,
|
|
||||||
defaults={
|
|
||||||
"description": self.__doc__,
|
|
||||||
"start_timestamp": self._start or default_timer(),
|
|
||||||
"finish_timestamp": default_timer(),
|
|
||||||
"task_call_module": self.__module__,
|
|
||||||
"task_call_func": self.__name__,
|
|
||||||
"task_call_args": args,
|
|
||||||
"task_call_kwargs": kwargs,
|
|
||||||
"status": self._status,
|
|
||||||
"messages": sanitize_item(self._messages),
|
|
||||||
"expires": now() + timedelta(hours=self.result_timeout_hours),
|
|
||||||
"expiring": True,
|
|
||||||
},
|
|
||||||
)
|
|
||||||
|
|
||||||
# pylint: disable=too-many-arguments
|
|
||||||
def on_failure(self, exc, task_id, args, kwargs, einfo):
|
|
||||||
super().on_failure(exc, task_id, args, kwargs, einfo=einfo)
|
|
||||||
if not self._status:
|
|
||||||
self._status = TaskStatus.ERROR
|
|
||||||
self._messages = exception_to_string(exc)
|
|
||||||
DBSystemTask.objects.update_or_create(
|
|
||||||
name=self.__name__,
|
|
||||||
uid=self._uid,
|
|
||||||
defaults={
|
|
||||||
"description": self.__doc__,
|
|
||||||
"start_timestamp": self._start or default_timer(),
|
|
||||||
"finish_timestamp": default_timer(),
|
|
||||||
"task_call_module": self.__module__,
|
|
||||||
"task_call_func": self.__name__,
|
|
||||||
"task_call_args": args,
|
|
||||||
"task_call_kwargs": kwargs,
|
|
||||||
"status": self._status,
|
|
||||||
"messages": sanitize_item(self._messages),
|
|
||||||
"expires": now() + timedelta(hours=self.result_timeout_hours),
|
|
||||||
"expiring": True,
|
|
||||||
},
|
|
||||||
)
|
|
||||||
Event.new(
|
|
||||||
EventAction.SYSTEM_TASK_EXCEPTION,
|
|
||||||
message=f"Task {self.__name__} encountered an error: {exception_to_string(exc)}",
|
|
||||||
).save()
|
|
||||||
|
|
||||||
def run(self, *args, **kwargs):
|
|
||||||
raise NotImplementedError
|
|
||||||
|
|
||||||
|
|
||||||
def prefill_task(func):
|
|
||||||
"""Ensure a task's details are always in cache, so it can always be triggered via API"""
|
|
||||||
_prefill_tasks.append(
|
|
||||||
DBSystemTask(
|
|
||||||
name=func.__name__,
|
|
||||||
description=func.__doc__,
|
|
||||||
status=TaskStatus.UNKNOWN,
|
|
||||||
messages=sanitize_item([_("Task has not been run yet.")]),
|
|
||||||
task_call_module=func.__module__,
|
|
||||||
task_call_func=func.__name__,
|
|
||||||
expiring=False,
|
|
||||||
)
|
|
||||||
)
|
|
||||||
return func
|
|
||||||
|
|
||||||
|
|
||||||
_prefill_tasks = []
|
|
|
@ -13,9 +13,13 @@ from authentik.events.models import (
|
||||||
NotificationRule,
|
NotificationRule,
|
||||||
NotificationTransport,
|
NotificationTransport,
|
||||||
NotificationTransportError,
|
NotificationTransportError,
|
||||||
TaskStatus,
|
|
||||||
)
|
)
|
||||||
from authentik.events.system_tasks import SystemTask, prefill_task
|
from authentik.events.monitored_tasks import (
|
||||||
|
MonitoredTask,
|
||||||
|
TaskResult,
|
||||||
|
TaskResultStatus,
|
||||||
|
prefill_task,
|
||||||
|
)
|
||||||
from authentik.policies.engine import PolicyEngine
|
from authentik.policies.engine import PolicyEngine
|
||||||
from authentik.policies.models import PolicyBinding, PolicyEngineMode
|
from authentik.policies.models import PolicyBinding, PolicyEngineMode
|
||||||
from authentik.root.celery import CELERY_APP
|
from authentik.root.celery import CELERY_APP
|
||||||
|
@ -95,10 +99,10 @@ def event_trigger_handler(event_uuid: str, trigger_name: str):
|
||||||
bind=True,
|
bind=True,
|
||||||
autoretry_for=(NotificationTransportError,),
|
autoretry_for=(NotificationTransportError,),
|
||||||
retry_backoff=True,
|
retry_backoff=True,
|
||||||
base=SystemTask,
|
base=MonitoredTask,
|
||||||
)
|
)
|
||||||
def notification_transport(
|
def notification_transport(
|
||||||
self: SystemTask, transport_pk: int, event_pk: str, user_pk: int, trigger_pk: str
|
self: MonitoredTask, transport_pk: int, event_pk: str, user_pk: int, trigger_pk: str
|
||||||
):
|
):
|
||||||
"""Send notification over specified transport"""
|
"""Send notification over specified transport"""
|
||||||
self.save_on_success = False
|
self.save_on_success = False
|
||||||
|
@ -119,9 +123,9 @@ def notification_transport(
|
||||||
if not transport:
|
if not transport:
|
||||||
return
|
return
|
||||||
transport.send(notification)
|
transport.send(notification)
|
||||||
self.set_status(TaskStatus.SUCCESSFUL)
|
self.set_status(TaskResult(TaskResultStatus.SUCCESSFUL))
|
||||||
except (NotificationTransportError, PropertyMappingExpressionException) as exc:
|
except (NotificationTransportError, PropertyMappingExpressionException) as exc:
|
||||||
self.set_error(exc)
|
self.set_status(TaskResult(TaskResultStatus.ERROR).with_error(exc))
|
||||||
raise exc
|
raise exc
|
||||||
|
|
||||||
|
|
||||||
|
@ -133,13 +137,13 @@ def gdpr_cleanup(user_pk: int):
|
||||||
events.delete()
|
events.delete()
|
||||||
|
|
||||||
|
|
||||||
@CELERY_APP.task(bind=True, base=SystemTask)
|
@CELERY_APP.task(bind=True, base=MonitoredTask)
|
||||||
@prefill_task
|
@prefill_task
|
||||||
def notification_cleanup(self: SystemTask):
|
def notification_cleanup(self: MonitoredTask):
|
||||||
"""Cleanup seen notifications and notifications whose event expired."""
|
"""Cleanup seen notifications and notifications whose event expired."""
|
||||||
notifications = Notification.objects.filter(Q(event=None) | Q(seen=True))
|
notifications = Notification.objects.filter(Q(event=None) | Q(seen=True))
|
||||||
amount = notifications.count()
|
amount = notifications.count()
|
||||||
for notification in notifications:
|
for notification in notifications:
|
||||||
notification.delete()
|
notification.delete()
|
||||||
LOGGER.debug("Expired notifications", amount=amount)
|
LOGGER.debug("Expired notifications", amount=amount)
|
||||||
self.set_status(TaskStatus.SUCCESSFUL, f"Expired {amount} Notifications")
|
self.set_status(TaskResult(TaskResultStatus.SUCCESSFUL, [f"Expired {amount} Notifications"]))
|
||||||
|
|
|
@ -1,5 +1,4 @@
|
||||||
"""Event API tests"""
|
"""Event API tests"""
|
||||||
from json import loads
|
|
||||||
|
|
||||||
from django.urls import reverse
|
from django.urls import reverse
|
||||||
from rest_framework.test import APITestCase
|
from rest_framework.test import APITestCase
|
||||||
|
@ -12,9 +11,6 @@ from authentik.events.models import (
|
||||||
NotificationSeverity,
|
NotificationSeverity,
|
||||||
TransportMode,
|
TransportMode,
|
||||||
)
|
)
|
||||||
from authentik.events.utils import model_to_dict
|
|
||||||
from authentik.lib.generators import generate_id
|
|
||||||
from authentik.providers.oauth2.models import OAuth2Provider
|
|
||||||
|
|
||||||
|
|
||||||
class TestEventsAPI(APITestCase):
|
class TestEventsAPI(APITestCase):
|
||||||
|
@ -24,25 +20,6 @@ class TestEventsAPI(APITestCase):
|
||||||
self.user = create_test_admin_user()
|
self.user = create_test_admin_user()
|
||||||
self.client.force_login(self.user)
|
self.client.force_login(self.user)
|
||||||
|
|
||||||
def test_filter_model_pk_int(self):
|
|
||||||
"""Test event list with context_model_pk and integer PKs"""
|
|
||||||
provider = OAuth2Provider.objects.create(
|
|
||||||
name=generate_id(),
|
|
||||||
)
|
|
||||||
event = Event.new(EventAction.MODEL_CREATED, model=model_to_dict(provider))
|
|
||||||
event.save()
|
|
||||||
response = self.client.get(
|
|
||||||
reverse("authentik_api:event-list"),
|
|
||||||
data={
|
|
||||||
"context_model_pk": provider.pk,
|
|
||||||
"context_model_app": "authentik_providers_oauth2",
|
|
||||||
"context_model_name": "oauth2provider",
|
|
||||||
},
|
|
||||||
)
|
|
||||||
self.assertEqual(response.status_code, 200)
|
|
||||||
body = loads(response.content)
|
|
||||||
self.assertEqual(body["pagination"]["count"], 1)
|
|
||||||
|
|
||||||
def test_top_n(self):
|
def test_top_n(self):
|
||||||
"""Test top_per_user"""
|
"""Test top_per_user"""
|
||||||
event = Event.new(EventAction.AUTHORIZE_APPLICATION)
|
event = Event.new(EventAction.AUTHORIZE_APPLICATION)
|
||||||
|
|
|
@ -1,24 +0,0 @@
|
||||||
"""Test ASN Wrapper"""
|
|
||||||
from django.test import TestCase
|
|
||||||
|
|
||||||
from authentik.events.context_processors.asn import ASNContextProcessor
|
|
||||||
|
|
||||||
|
|
||||||
class TestASN(TestCase):
|
|
||||||
"""Test ASN Wrapper"""
|
|
||||||
|
|
||||||
def setUp(self) -> None:
|
|
||||||
self.reader = ASNContextProcessor()
|
|
||||||
|
|
||||||
def test_simple(self):
|
|
||||||
"""Test simple asn wrapper"""
|
|
||||||
# IPs from
|
|
||||||
# https://github.com/maxmind/MaxMind-DB/blob/main/source-data/GeoLite2-ASN-Test.json
|
|
||||||
self.assertEqual(
|
|
||||||
self.reader.asn_dict("1.0.0.1"),
|
|
||||||
{
|
|
||||||
"asn": 15169,
|
|
||||||
"as_org": "Google Inc.",
|
|
||||||
"network": "1.0.0.0/24",
|
|
||||||
},
|
|
||||||
)
|
|
|
@ -1,14 +1,14 @@
|
||||||
"""Test GeoIP Wrapper"""
|
"""Test GeoIP Wrapper"""
|
||||||
from django.test import TestCase
|
from django.test import TestCase
|
||||||
|
|
||||||
from authentik.events.context_processors.geoip import GeoIPContextProcessor
|
from authentik.events.geo import GeoIPReader
|
||||||
|
|
||||||
|
|
||||||
class TestGeoIP(TestCase):
|
class TestGeoIP(TestCase):
|
||||||
"""Test GeoIP Wrapper"""
|
"""Test GeoIP Wrapper"""
|
||||||
|
|
||||||
def setUp(self) -> None:
|
def setUp(self) -> None:
|
||||||
self.reader = GeoIPContextProcessor()
|
self.reader = GeoIPReader()
|
||||||
|
|
||||||
def test_simple(self):
|
def test_simple(self):
|
||||||
"""Test simple city wrapper"""
|
"""Test simple city wrapper"""
|
|
@ -1,26 +1,14 @@
|
||||||
"""Test Monitored tasks"""
|
"""Test Monitored tasks"""
|
||||||
from json import loads
|
from django.test import TestCase
|
||||||
|
|
||||||
from django.urls import reverse
|
from authentik.events.monitored_tasks import MonitoredTask, TaskInfo, TaskResult, TaskResultStatus
|
||||||
from rest_framework.test import APITestCase
|
|
||||||
|
|
||||||
from authentik.core.tasks import clean_expired_models
|
|
||||||
from authentik.core.tests.utils import create_test_admin_user
|
|
||||||
from authentik.events.models import SystemTask as DBSystemTask
|
|
||||||
from authentik.events.models import TaskStatus
|
|
||||||
from authentik.events.system_tasks import SystemTask
|
|
||||||
from authentik.lib.generators import generate_id
|
from authentik.lib.generators import generate_id
|
||||||
from authentik.root.celery import CELERY_APP
|
from authentik.root.celery import CELERY_APP
|
||||||
|
|
||||||
|
|
||||||
class TestSystemTasks(APITestCase):
|
class TestMonitoredTasks(TestCase):
|
||||||
"""Test Monitored tasks"""
|
"""Test Monitored tasks"""
|
||||||
|
|
||||||
def setUp(self):
|
|
||||||
super().setUp()
|
|
||||||
self.user = create_test_admin_user()
|
|
||||||
self.client.force_login(self.user)
|
|
||||||
|
|
||||||
def test_failed_successful_remove_state(self):
|
def test_failed_successful_remove_state(self):
|
||||||
"""Test that a task with `save_on_success` set to `False` that failed saves
|
"""Test that a task with `save_on_success` set to `False` that failed saves
|
||||||
a state, and upon successful completion will delete the state"""
|
a state, and upon successful completion will delete the state"""
|
||||||
|
@ -29,74 +17,27 @@ class TestSystemTasks(APITestCase):
|
||||||
|
|
||||||
@CELERY_APP.task(
|
@CELERY_APP.task(
|
||||||
bind=True,
|
bind=True,
|
||||||
base=SystemTask,
|
base=MonitoredTask,
|
||||||
)
|
)
|
||||||
def test_task(self: SystemTask):
|
def test_task(self: MonitoredTask):
|
||||||
self.save_on_success = False
|
self.save_on_success = False
|
||||||
self.set_uid(uid)
|
self.set_uid(uid)
|
||||||
self.set_status(TaskStatus.ERROR if should_fail else TaskStatus.SUCCESSFUL)
|
self.set_status(
|
||||||
|
TaskResult(TaskResultStatus.ERROR if should_fail else TaskResultStatus.SUCCESSFUL)
|
||||||
|
)
|
||||||
|
|
||||||
# First test successful run
|
# First test successful run
|
||||||
should_fail = False
|
should_fail = False
|
||||||
test_task.delay().get()
|
test_task.delay().get()
|
||||||
self.assertIsNone(DBSystemTask.objects.filter(name="test_task", uid=uid).first())
|
self.assertIsNone(TaskInfo.by_name(f"test_task:{uid}"))
|
||||||
|
|
||||||
# Then test failed
|
# Then test failed
|
||||||
should_fail = True
|
should_fail = True
|
||||||
test_task.delay().get()
|
test_task.delay().get()
|
||||||
task = DBSystemTask.objects.filter(name="test_task", uid=uid).first()
|
info = TaskInfo.by_name(f"test_task:{uid}")
|
||||||
self.assertEqual(task.status, TaskStatus.ERROR)
|
self.assertEqual(info.result.status, TaskResultStatus.ERROR)
|
||||||
|
|
||||||
# Then after that, the state should be removed
|
# Then after that, the state should be removed
|
||||||
should_fail = False
|
should_fail = False
|
||||||
test_task.delay().get()
|
test_task.delay().get()
|
||||||
self.assertIsNone(DBSystemTask.objects.filter(name="test_task", uid=uid).first())
|
self.assertIsNone(TaskInfo.by_name(f"test_task:{uid}"))
|
||||||
|
|
||||||
def test_tasks(self):
|
|
||||||
"""Test Task API"""
|
|
||||||
clean_expired_models.delay().get()
|
|
||||||
response = self.client.get(reverse("authentik_api:systemtask-list"))
|
|
||||||
self.assertEqual(response.status_code, 200)
|
|
||||||
body = loads(response.content)
|
|
||||||
self.assertTrue(any(task["name"] == "clean_expired_models" for task in body["results"]))
|
|
||||||
|
|
||||||
def test_tasks_single(self):
|
|
||||||
"""Test Task API (read single)"""
|
|
||||||
clean_expired_models.delay().get()
|
|
||||||
task = DBSystemTask.objects.filter(name="clean_expired_models").first()
|
|
||||||
response = self.client.get(
|
|
||||||
reverse(
|
|
||||||
"authentik_api:systemtask-detail",
|
|
||||||
kwargs={"pk": str(task.pk)},
|
|
||||||
)
|
|
||||||
)
|
|
||||||
self.assertEqual(response.status_code, 200)
|
|
||||||
body = loads(response.content)
|
|
||||||
self.assertEqual(body["status"], TaskStatus.SUCCESSFUL.value)
|
|
||||||
self.assertEqual(body["name"], "clean_expired_models")
|
|
||||||
response = self.client.get(
|
|
||||||
reverse("authentik_api:systemtask-detail", kwargs={"pk": "qwerqwer"})
|
|
||||||
)
|
|
||||||
self.assertEqual(response.status_code, 404)
|
|
||||||
|
|
||||||
def test_tasks_run(self):
|
|
||||||
"""Test Task API (run)"""
|
|
||||||
clean_expired_models.delay().get()
|
|
||||||
task = DBSystemTask.objects.filter(name="clean_expired_models").first()
|
|
||||||
response = self.client.post(
|
|
||||||
reverse(
|
|
||||||
"authentik_api:systemtask-run",
|
|
||||||
kwargs={"pk": str(task.pk)},
|
|
||||||
)
|
|
||||||
)
|
|
||||||
self.assertEqual(response.status_code, 204)
|
|
||||||
|
|
||||||
def test_tasks_run_404(self):
|
|
||||||
"""Test Task API (run, 404)"""
|
|
||||||
response = self.client.post(
|
|
||||||
reverse(
|
|
||||||
"authentik_api:systemtask-run",
|
|
||||||
kwargs={"pk": "qwerqewrqrqewrqewr"},
|
|
||||||
)
|
|
||||||
)
|
|
||||||
self.assertEqual(response.status_code, 404)
|
|
||||||
|
|
|
@ -4,13 +4,11 @@ from authentik.events.api.notification_mappings import NotificationWebhookMappin
|
||||||
from authentik.events.api.notification_rules import NotificationRuleViewSet
|
from authentik.events.api.notification_rules import NotificationRuleViewSet
|
||||||
from authentik.events.api.notification_transports import NotificationTransportViewSet
|
from authentik.events.api.notification_transports import NotificationTransportViewSet
|
||||||
from authentik.events.api.notifications import NotificationViewSet
|
from authentik.events.api.notifications import NotificationViewSet
|
||||||
from authentik.events.api.tasks import SystemTaskViewSet
|
|
||||||
|
|
||||||
api_urlpatterns = [
|
api_urlpatterns = [
|
||||||
("events/events", EventViewSet),
|
("events/events", EventViewSet),
|
||||||
("events/notifications", NotificationViewSet),
|
("events/notifications", NotificationViewSet),
|
||||||
("events/transports", NotificationTransportViewSet),
|
("events/transports", NotificationTransportViewSet),
|
||||||
("events/rules", NotificationRuleViewSet),
|
("events/rules", NotificationRuleViewSet),
|
||||||
("events/system_tasks", SystemTaskViewSet),
|
|
||||||
("propertymappings/notification", NotificationWebhookMappingViewSet),
|
("propertymappings/notification", NotificationWebhookMappingViewSet),
|
||||||
]
|
]
|
||||||
|
|
|
@ -17,13 +17,12 @@ from django.db.models.base import Model
|
||||||
from django.http.request import HttpRequest
|
from django.http.request import HttpRequest
|
||||||
from django.utils import timezone
|
from django.utils import timezone
|
||||||
from django.views.debug import SafeExceptionReporterFilter
|
from django.views.debug import SafeExceptionReporterFilter
|
||||||
from geoip2.models import ASN, City
|
from geoip2.models import City
|
||||||
from guardian.utils import get_anonymous_user
|
from guardian.utils import get_anonymous_user
|
||||||
|
|
||||||
from authentik.blueprints.v1.common import YAMLTag
|
from authentik.blueprints.v1.common import YAMLTag
|
||||||
from authentik.core.models import User
|
from authentik.core.models import User
|
||||||
from authentik.events.context_processors.asn import ASN_CONTEXT_PROCESSOR
|
from authentik.events.geo import GEOIP_READER
|
||||||
from authentik.events.context_processors.geoip import GEOIP_CONTEXT_PROCESSOR
|
|
||||||
from authentik.policies.types import PolicyRequest
|
from authentik.policies.types import PolicyRequest
|
||||||
|
|
||||||
# Special keys which are *not* cleaned, even when the default filter
|
# Special keys which are *not* cleaned, even when the default filter
|
||||||
|
@ -124,9 +123,7 @@ def sanitize_item(value: Any) -> Any:
|
||||||
if isinstance(value, (HttpRequest, WSGIRequest)):
|
if isinstance(value, (HttpRequest, WSGIRequest)):
|
||||||
return ...
|
return ...
|
||||||
if isinstance(value, City):
|
if isinstance(value, City):
|
||||||
return GEOIP_CONTEXT_PROCESSOR.city_to_dict(value)
|
return GEOIP_READER.city_to_dict(value)
|
||||||
if isinstance(value, ASN):
|
|
||||||
return ASN_CONTEXT_PROCESSOR.asn_to_dict(value)
|
|
||||||
if isinstance(value, Path):
|
if isinstance(value, Path):
|
||||||
return str(value)
|
return str(value)
|
||||||
if isinstance(value, Exception):
|
if isinstance(value, Exception):
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
# Generated by Django 4.2.6 on 2023-10-28 14:24
|
# Generated by Django 4.2.6 on 2023-10-28 14:24
|
||||||
|
|
||||||
from django.apps.registry import Apps
|
from django.apps.registry import Apps
|
||||||
from django.db import migrations, models
|
from django.db import migrations
|
||||||
from django.db.backends.base.schema import BaseDatabaseSchemaEditor
|
from django.db.backends.base.schema import BaseDatabaseSchemaEditor
|
||||||
|
|
||||||
|
|
||||||
|
@ -31,19 +31,4 @@ class Migration(migrations.Migration):
|
||||||
|
|
||||||
operations = [
|
operations = [
|
||||||
migrations.RunPython(set_oobe_flow_authentication),
|
migrations.RunPython(set_oobe_flow_authentication),
|
||||||
migrations.AlterField(
|
|
||||||
model_name="flow",
|
|
||||||
name="authentication",
|
|
||||||
field=models.TextField(
|
|
||||||
choices=[
|
|
||||||
("none", "None"),
|
|
||||||
("require_authenticated", "Require Authenticated"),
|
|
||||||
("require_unauthenticated", "Require Unauthenticated"),
|
|
||||||
("require_superuser", "Require Superuser"),
|
|
||||||
("require_outpost", "Require Outpost"),
|
|
||||||
],
|
|
||||||
default="none",
|
|
||||||
help_text="Required level of authentication and authorization to access a flow.",
|
|
||||||
),
|
|
||||||
),
|
|
||||||
]
|
]
|
||||||
|
|
|
@ -31,7 +31,6 @@ class FlowAuthenticationRequirement(models.TextChoices):
|
||||||
REQUIRE_AUTHENTICATED = "require_authenticated"
|
REQUIRE_AUTHENTICATED = "require_authenticated"
|
||||||
REQUIRE_UNAUTHENTICATED = "require_unauthenticated"
|
REQUIRE_UNAUTHENTICATED = "require_unauthenticated"
|
||||||
REQUIRE_SUPERUSER = "require_superuser"
|
REQUIRE_SUPERUSER = "require_superuser"
|
||||||
REQUIRE_OUTPOST = "require_outpost"
|
|
||||||
|
|
||||||
|
|
||||||
class NotConfiguredAction(models.TextChoices):
|
class NotConfiguredAction(models.TextChoices):
|
||||||
|
|
|
@ -23,7 +23,6 @@ from authentik.flows.models import (
|
||||||
)
|
)
|
||||||
from authentik.lib.config import CONFIG
|
from authentik.lib.config import CONFIG
|
||||||
from authentik.policies.engine import PolicyEngine
|
from authentik.policies.engine import PolicyEngine
|
||||||
from authentik.root.middleware import ClientIPMiddleware
|
|
||||||
|
|
||||||
LOGGER = get_logger()
|
LOGGER = get_logger()
|
||||||
PLAN_CONTEXT_PENDING_USER = "pending_user"
|
PLAN_CONTEXT_PENDING_USER = "pending_user"
|
||||||
|
@ -34,7 +33,7 @@ PLAN_CONTEXT_SOURCE = "source"
|
||||||
# Is set by the Flow Planner when a FlowToken was used, and the currently active flow plan
|
# Is set by the Flow Planner when a FlowToken was used, and the currently active flow plan
|
||||||
# was restored.
|
# was restored.
|
||||||
PLAN_CONTEXT_IS_RESTORED = "is_restored"
|
PLAN_CONTEXT_IS_RESTORED = "is_restored"
|
||||||
CACHE_TIMEOUT = CONFIG.get_int("cache.timeout_flows")
|
CACHE_TIMEOUT = CONFIG.get_int("redis.cache_timeout_flows")
|
||||||
CACHE_PREFIX = "goauthentik.io/flows/planner/"
|
CACHE_PREFIX = "goauthentik.io/flows/planner/"
|
||||||
|
|
||||||
|
|
||||||
|
@ -142,10 +141,6 @@ class FlowPlanner:
|
||||||
and not request.user.is_superuser
|
and not request.user.is_superuser
|
||||||
):
|
):
|
||||||
raise FlowNonApplicableException()
|
raise FlowNonApplicableException()
|
||||||
if self.flow.authentication == FlowAuthenticationRequirement.REQUIRE_OUTPOST:
|
|
||||||
outpost_user = ClientIPMiddleware.get_outpost_user(request)
|
|
||||||
if not outpost_user:
|
|
||||||
raise FlowNonApplicableException()
|
|
||||||
|
|
||||||
def plan(
|
def plan(
|
||||||
self, request: HttpRequest, default_context: Optional[dict[str, Any]] = None
|
self, request: HttpRequest, default_context: Optional[dict[str, Any]] = None
|
||||||
|
|
|
@ -472,7 +472,6 @@ class TestFlowExecutor(FlowTestCase):
|
||||||
ident_stage = IdentificationStage.objects.create(
|
ident_stage = IdentificationStage.objects.create(
|
||||||
name="ident",
|
name="ident",
|
||||||
user_fields=[UserFields.E_MAIL],
|
user_fields=[UserFields.E_MAIL],
|
||||||
pretend_user_exists=False,
|
|
||||||
)
|
)
|
||||||
FlowStageBinding.objects.create(
|
FlowStageBinding.objects.create(
|
||||||
target=flow,
|
target=flow,
|
||||||
|
|
|
@ -8,7 +8,6 @@ from django.test import RequestFactory, TestCase
|
||||||
from django.urls import reverse
|
from django.urls import reverse
|
||||||
from guardian.shortcuts import get_anonymous_user
|
from guardian.shortcuts import get_anonymous_user
|
||||||
|
|
||||||
from authentik.blueprints.tests import reconcile_app
|
|
||||||
from authentik.core.models import User
|
from authentik.core.models import User
|
||||||
from authentik.core.tests.utils import create_test_admin_user, create_test_flow
|
from authentik.core.tests.utils import create_test_admin_user, create_test_flow
|
||||||
from authentik.flows.exceptions import EmptyFlowException, FlowNonApplicableException
|
from authentik.flows.exceptions import EmptyFlowException, FlowNonApplicableException
|
||||||
|
@ -16,12 +15,9 @@ from authentik.flows.markers import ReevaluateMarker, StageMarker
|
||||||
from authentik.flows.models import FlowAuthenticationRequirement, FlowDesignation, FlowStageBinding
|
from authentik.flows.models import FlowAuthenticationRequirement, FlowDesignation, FlowStageBinding
|
||||||
from authentik.flows.planner import PLAN_CONTEXT_PENDING_USER, FlowPlanner, cache_key
|
from authentik.flows.planner import PLAN_CONTEXT_PENDING_USER, FlowPlanner, cache_key
|
||||||
from authentik.lib.tests.utils import dummy_get_response
|
from authentik.lib.tests.utils import dummy_get_response
|
||||||
from authentik.outposts.apps import MANAGED_OUTPOST
|
|
||||||
from authentik.outposts.models import Outpost
|
|
||||||
from authentik.policies.dummy.models import DummyPolicy
|
from authentik.policies.dummy.models import DummyPolicy
|
||||||
from authentik.policies.models import PolicyBinding
|
from authentik.policies.models import PolicyBinding
|
||||||
from authentik.policies.types import PolicyResult
|
from authentik.policies.types import PolicyResult
|
||||||
from authentik.root.middleware import ClientIPMiddleware
|
|
||||||
from authentik.stages.dummy.models import DummyStage
|
from authentik.stages.dummy.models import DummyStage
|
||||||
|
|
||||||
POLICY_RETURN_FALSE = PropertyMock(return_value=PolicyResult(False))
|
POLICY_RETURN_FALSE = PropertyMock(return_value=PolicyResult(False))
|
||||||
|
@ -72,34 +68,6 @@ class TestFlowPlanner(TestCase):
|
||||||
planner.allow_empty_flows = True
|
planner.allow_empty_flows = True
|
||||||
planner.plan(request)
|
planner.plan(request)
|
||||||
|
|
||||||
@reconcile_app("authentik_outposts")
|
|
||||||
def test_authentication_outpost(self):
|
|
||||||
"""Test flow authentication (outpost)"""
|
|
||||||
flow = create_test_flow()
|
|
||||||
flow.authentication = FlowAuthenticationRequirement.REQUIRE_OUTPOST
|
|
||||||
request = self.request_factory.get(
|
|
||||||
reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug}),
|
|
||||||
)
|
|
||||||
request.user = AnonymousUser()
|
|
||||||
with self.assertRaises(FlowNonApplicableException):
|
|
||||||
planner = FlowPlanner(flow)
|
|
||||||
planner.allow_empty_flows = True
|
|
||||||
planner.plan(request)
|
|
||||||
|
|
||||||
outpost = Outpost.objects.filter(managed=MANAGED_OUTPOST).first()
|
|
||||||
request = self.request_factory.get(
|
|
||||||
reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug}),
|
|
||||||
HTTP_X_AUTHENTIK_OUTPOST_TOKEN=outpost.token.key,
|
|
||||||
HTTP_X_AUTHENTIK_REMOTE_IP="1.2.3.4",
|
|
||||||
)
|
|
||||||
request.user = AnonymousUser()
|
|
||||||
middleware = ClientIPMiddleware(dummy_get_response)
|
|
||||||
middleware(request)
|
|
||||||
|
|
||||||
planner = FlowPlanner(flow)
|
|
||||||
planner.allow_empty_flows = True
|
|
||||||
planner.plan(request)
|
|
||||||
|
|
||||||
@patch(
|
@patch(
|
||||||
"authentik.policies.engine.PolicyEngine.result",
|
"authentik.policies.engine.PolicyEngine.result",
|
||||||
POLICY_RETURN_FALSE,
|
POLICY_RETURN_FALSE,
|
||||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue