Browse Source
feat: Add PKCE support (RFC 7636) (#670)
feat: Add PKCE support (RFC 7636) (#670)
* feat: support PKCE in authorization flow (RFC 7636) * test: add tests for PKCE flow * docs: document PKCE usage in OpenID client * chore: address linting and formatting issues * test: full e2e pkce test * test: skip pkce for 22 and below --------- Co-authored-by: Richard Nemeth <ryshoooo@gmail.com>pull/650/merge v5.12.0
committed by
GitHub
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
4 changed files with 198 additions and 2 deletions
-
32docs/source/modules/openid_client.rst
-
36src/keycloak/keycloak_openid.py
-
55src/keycloak/pkce_utils.py
-
77tests/test_pkce_flow.py
@ -0,0 +1,55 @@ |
|||||
|
# |
||||
|
# The MIT License (MIT) |
||||
|
# |
||||
|
# Copyright (C) 2017 Marcos Pereira <marcospereira.mpj@gmail.com> |
||||
|
# |
||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy of |
||||
|
# this software and associated documentation files (the "Software"), to deal in |
||||
|
# the Software without restriction, including without limitation the rights to |
||||
|
# use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of |
||||
|
# the Software, and to permit persons to whom the Software is furnished to do so, |
||||
|
# subject to the following conditions: |
||||
|
# |
||||
|
# The above copyright notice and this permission notice shall be included in all |
||||
|
# copies or substantial portions of the Software. |
||||
|
# |
||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS |
||||
|
# FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR |
||||
|
# COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER |
||||
|
# IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN |
||||
|
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. |
||||
|
"""PKCE utility functions for code verifier and code challenge generation.""" |
||||
|
|
||||
|
import base64 |
||||
|
import hashlib |
||||
|
import os |
||||
|
|
||||
|
|
||||
|
def generate_code_verifier(length: int = 128) -> str: |
||||
|
""" |
||||
|
Generate a high-entropy cryptographic random string for PKCE code_verifier. |
||||
|
|
||||
|
RFC 7636 recommends a length between 43 and 128 characters. |
||||
|
""" |
||||
|
return base64.urlsafe_b64encode(os.urandom(length)).rstrip(b"=").decode("utf-8")[:length] |
||||
|
|
||||
|
|
||||
|
def generate_code_challenge(code_verifier: str, method: str = "S256") -> tuple[str, str]: |
||||
|
""" |
||||
|
Generate a code_challenge from the code_verifier using the specified method. |
||||
|
|
||||
|
Supported methods: "S256" (default), "plain". |
||||
|
Returns (code_challenge, code_challenge_method). |
||||
|
""" |
||||
|
if method == "S256": |
||||
|
code_challenge = ( |
||||
|
base64.urlsafe_b64encode(hashlib.sha256(code_verifier.encode("utf-8")).digest()) |
||||
|
.rstrip(b"=") |
||||
|
.decode("utf-8") |
||||
|
) |
||||
|
return code_challenge, "S256" |
||||
|
if method == "plain": |
||||
|
return code_verifier, "plain" |
||||
|
error_msg = f"Unsupported PKCE method: {method}" |
||||
|
raise ValueError(error_msg) |
||||
@ -0,0 +1,77 @@ |
|||||
|
"""Tests for PKCE flow: code verifier and code challenge handling.""" |
||||
|
|
||||
|
import os |
||||
|
import re |
||||
|
import urllib.parse |
||||
|
|
||||
|
import requests |
||||
|
from packaging.version import Version |
||||
|
|
||||
|
from keycloak import KeycloakAdmin, KeycloakOpenID |
||||
|
from keycloak.pkce_utils import generate_code_challenge, generate_code_verifier |
||||
|
|
||||
|
|
||||
|
def test_pkce_auth_url_and_token(env: object, admin: KeycloakAdmin) -> None: |
||||
|
"""Test PKCE flow: auth_url includes code_challenge, token includes code_verifier.""" |
||||
|
if os.environ["KEYCLOAK_DOCKER_IMAGE_TAG"] != "latest" and Version( |
||||
|
os.environ["KEYCLOAK_DOCKER_IMAGE_TAG"], |
||||
|
) <= Version("22"): |
||||
|
return |
||||
|
|
||||
|
client_representation = { |
||||
|
"clientId": "pkce-test", |
||||
|
"enabled": True, |
||||
|
"publicClient": True, |
||||
|
"standardFlowEnabled": True, |
||||
|
"directAccessGrantsEnabled": False, |
||||
|
"serviceAccountsEnabled": False, |
||||
|
"implicitFlowEnabled": False, |
||||
|
"redirectUris": ["http://test.test/callback"], |
||||
|
"webOrigins": ["*"], |
||||
|
} |
||||
|
admin.create_client(client_representation) |
||||
|
|
||||
|
oid = KeycloakOpenID( |
||||
|
server_url=f"http://{env.keycloak_host}:{env.keycloak_port}", |
||||
|
realm_name="master", |
||||
|
client_id="pkce-test", |
||||
|
) |
||||
|
code_verifier = generate_code_verifier() |
||||
|
code_challenge, code_challenge_method = generate_code_challenge(code_verifier) |
||||
|
|
||||
|
# Build PKCE auth URL |
||||
|
url = oid.auth_url( |
||||
|
redirect_uri="http://test.test/callback", |
||||
|
code_challenge=code_challenge, |
||||
|
code_challenge_method=code_challenge_method, |
||||
|
scope="openid%20email", |
||||
|
) |
||||
|
assert f"code_challenge={code_challenge}" in url |
||||
|
assert f"code_challenge_method={code_challenge_method}" in url |
||||
|
|
||||
|
session = requests.Session() |
||||
|
resp = session.get(url, allow_redirects=False) |
||||
|
cookies = resp.cookies.get_dict() |
||||
|
assert resp.status_code == 200 |
||||
|
resp_url = re.findall(r"action=\"(.*)\" method", resp.text)[0] |
||||
|
resp = session.post( |
||||
|
resp_url, |
||||
|
data={"username": env.keycloak_admin, "password": env.keycloak_admin_password}, |
||||
|
allow_redirects=False, |
||||
|
cookies=cookies, |
||||
|
) |
||||
|
assert resp.status_code == 302, resp.text |
||||
|
resp_code = urllib.parse.parse_qs(resp.headers["Location"])["code"][0] |
||||
|
|
||||
|
access_token = oid.token( |
||||
|
grant_type="authorization_code", |
||||
|
code=resp_code, |
||||
|
redirect_uri="http://test.test/callback", |
||||
|
code_verifier=code_verifier, |
||||
|
) |
||||
|
info = oid.userinfo(access_token["access_token"]) |
||||
|
assert info["preferred_username"] == env.keycloak_admin |
||||
|
|
||||
|
# Cleanup |
||||
|
client_id = admin.get_client_id("pkce-test") |
||||
|
admin.delete_client(client_id) |
||||
Write
Preview
Loading…
Cancel
Save
Reference in new issue