Browse Source
feat: Add PKCE support (RFC 7636) (#670)
feat: Add PKCE support (RFC 7636) (#670)
* feat: support PKCE in authorization flow (RFC 7636) * test: add tests for PKCE flow * docs: document PKCE usage in OpenID client * chore: address linting and formatting issues * test: full e2e pkce test * test: skip pkce for 22 and below --------- Co-authored-by: Richard Nemeth <ryshoooo@gmail.com>pull/650/merge v5.12.0
committed by
GitHub
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
4 changed files with 198 additions and 2 deletions
-
32docs/source/modules/openid_client.rst
-
36src/keycloak/keycloak_openid.py
-
55src/keycloak/pkce_utils.py
-
77tests/test_pkce_flow.py
@ -0,0 +1,55 @@ |
|||
# |
|||
# The MIT License (MIT) |
|||
# |
|||
# Copyright (C) 2017 Marcos Pereira <marcospereira.mpj@gmail.com> |
|||
# |
|||
# Permission is hereby granted, free of charge, to any person obtaining a copy of |
|||
# this software and associated documentation files (the "Software"), to deal in |
|||
# the Software without restriction, including without limitation the rights to |
|||
# use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of |
|||
# the Software, and to permit persons to whom the Software is furnished to do so, |
|||
# subject to the following conditions: |
|||
# |
|||
# The above copyright notice and this permission notice shall be included in all |
|||
# copies or substantial portions of the Software. |
|||
# |
|||
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
|||
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS |
|||
# FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR |
|||
# COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER |
|||
# IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN |
|||
# CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. |
|||
"""PKCE utility functions for code verifier and code challenge generation.""" |
|||
|
|||
import base64 |
|||
import hashlib |
|||
import os |
|||
|
|||
|
|||
def generate_code_verifier(length: int = 128) -> str: |
|||
""" |
|||
Generate a high-entropy cryptographic random string for PKCE code_verifier. |
|||
|
|||
RFC 7636 recommends a length between 43 and 128 characters. |
|||
""" |
|||
return base64.urlsafe_b64encode(os.urandom(length)).rstrip(b"=").decode("utf-8")[:length] |
|||
|
|||
|
|||
def generate_code_challenge(code_verifier: str, method: str = "S256") -> tuple[str, str]: |
|||
""" |
|||
Generate a code_challenge from the code_verifier using the specified method. |
|||
|
|||
Supported methods: "S256" (default), "plain". |
|||
Returns (code_challenge, code_challenge_method). |
|||
""" |
|||
if method == "S256": |
|||
code_challenge = ( |
|||
base64.urlsafe_b64encode(hashlib.sha256(code_verifier.encode("utf-8")).digest()) |
|||
.rstrip(b"=") |
|||
.decode("utf-8") |
|||
) |
|||
return code_challenge, "S256" |
|||
if method == "plain": |
|||
return code_verifier, "plain" |
|||
error_msg = f"Unsupported PKCE method: {method}" |
|||
raise ValueError(error_msg) |
|||
@ -0,0 +1,77 @@ |
|||
"""Tests for PKCE flow: code verifier and code challenge handling.""" |
|||
|
|||
import os |
|||
import re |
|||
import urllib.parse |
|||
|
|||
import requests |
|||
from packaging.version import Version |
|||
|
|||
from keycloak import KeycloakAdmin, KeycloakOpenID |
|||
from keycloak.pkce_utils import generate_code_challenge, generate_code_verifier |
|||
|
|||
|
|||
def test_pkce_auth_url_and_token(env: object, admin: KeycloakAdmin) -> None: |
|||
"""Test PKCE flow: auth_url includes code_challenge, token includes code_verifier.""" |
|||
if os.environ["KEYCLOAK_DOCKER_IMAGE_TAG"] != "latest" and Version( |
|||
os.environ["KEYCLOAK_DOCKER_IMAGE_TAG"], |
|||
) <= Version("22"): |
|||
return |
|||
|
|||
client_representation = { |
|||
"clientId": "pkce-test", |
|||
"enabled": True, |
|||
"publicClient": True, |
|||
"standardFlowEnabled": True, |
|||
"directAccessGrantsEnabled": False, |
|||
"serviceAccountsEnabled": False, |
|||
"implicitFlowEnabled": False, |
|||
"redirectUris": ["http://test.test/callback"], |
|||
"webOrigins": ["*"], |
|||
} |
|||
admin.create_client(client_representation) |
|||
|
|||
oid = KeycloakOpenID( |
|||
server_url=f"http://{env.keycloak_host}:{env.keycloak_port}", |
|||
realm_name="master", |
|||
client_id="pkce-test", |
|||
) |
|||
code_verifier = generate_code_verifier() |
|||
code_challenge, code_challenge_method = generate_code_challenge(code_verifier) |
|||
|
|||
# Build PKCE auth URL |
|||
url = oid.auth_url( |
|||
redirect_uri="http://test.test/callback", |
|||
code_challenge=code_challenge, |
|||
code_challenge_method=code_challenge_method, |
|||
scope="openid%20email", |
|||
) |
|||
assert f"code_challenge={code_challenge}" in url |
|||
assert f"code_challenge_method={code_challenge_method}" in url |
|||
|
|||
session = requests.Session() |
|||
resp = session.get(url, allow_redirects=False) |
|||
cookies = resp.cookies.get_dict() |
|||
assert resp.status_code == 200 |
|||
resp_url = re.findall(r"action=\"(.*)\" method", resp.text)[0] |
|||
resp = session.post( |
|||
resp_url, |
|||
data={"username": env.keycloak_admin, "password": env.keycloak_admin_password}, |
|||
allow_redirects=False, |
|||
cookies=cookies, |
|||
) |
|||
assert resp.status_code == 302, resp.text |
|||
resp_code = urllib.parse.parse_qs(resp.headers["Location"])["code"][0] |
|||
|
|||
access_token = oid.token( |
|||
grant_type="authorization_code", |
|||
code=resp_code, |
|||
redirect_uri="http://test.test/callback", |
|||
code_verifier=code_verifier, |
|||
) |
|||
info = oid.userinfo(access_token["access_token"]) |
|||
assert info["preferred_username"] == env.keycloak_admin |
|||
|
|||
# Cleanup |
|||
client_id = admin.get_client_id("pkce-test") |
|||
admin.delete_client(client_id) |
|||
Write
Preview
Loading…
Cancel
Save
Reference in new issue