You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
346 lines
10 KiB
346 lines
10 KiB
"""Fixtures for tests."""
|
|
|
|
import os
|
|
import uuid
|
|
|
|
import pytest
|
|
|
|
from keycloak import KeycloakAdmin, KeycloakOpenID
|
|
|
|
|
|
class KeycloakTestEnv(object):
|
|
"""Wrapper for test Keycloak connection configuration.
|
|
|
|
:param host: Hostname
|
|
:type host: str
|
|
:param port: Port
|
|
:type port: str
|
|
:param username: Admin username
|
|
:type username: str
|
|
:param password: Admin password
|
|
:type password: str
|
|
"""
|
|
|
|
def __init__(
|
|
self,
|
|
host: str = os.environ["KEYCLOAK_HOST"],
|
|
port: str = os.environ["KEYCLOAK_PORT"],
|
|
username: str = os.environ["KEYCLOAK_ADMIN"],
|
|
password: str = os.environ["KEYCLOAK_ADMIN_PASSWORD"],
|
|
):
|
|
"""Init method."""
|
|
self.KEYCLOAK_HOST = host
|
|
self.KEYCLOAK_PORT = port
|
|
self.KEYCLOAK_ADMIN = username
|
|
self.KEYCLOAK_ADMIN_PASSWORD = password
|
|
|
|
@property
|
|
def KEYCLOAK_HOST(self):
|
|
"""Hostname getter."""
|
|
return self._KEYCLOAK_HOST
|
|
|
|
@KEYCLOAK_HOST.setter
|
|
def KEYCLOAK_HOST(self, value: str):
|
|
"""Hostname setter."""
|
|
self._KEYCLOAK_HOST = value
|
|
|
|
@property
|
|
def KEYCLOAK_PORT(self):
|
|
"""Port getter."""
|
|
return self._KEYCLOAK_PORT
|
|
|
|
@KEYCLOAK_PORT.setter
|
|
def KEYCLOAK_PORT(self, value: str):
|
|
"""Port setter."""
|
|
self._KEYCLOAK_PORT = value
|
|
|
|
@property
|
|
def KEYCLOAK_ADMIN(self):
|
|
"""Admin username getter."""
|
|
return self._KEYCLOAK_ADMIN
|
|
|
|
@KEYCLOAK_ADMIN.setter
|
|
def KEYCLOAK_ADMIN(self, value: str):
|
|
"""Admin username setter."""
|
|
self._KEYCLOAK_ADMIN = value
|
|
|
|
@property
|
|
def KEYCLOAK_ADMIN_PASSWORD(self):
|
|
"""Admin password getter."""
|
|
return self._KEYCLOAK_ADMIN_PASSWORD
|
|
|
|
@KEYCLOAK_ADMIN_PASSWORD.setter
|
|
def KEYCLOAK_ADMIN_PASSWORD(self, value: str):
|
|
"""Admin password setter."""
|
|
self._KEYCLOAK_ADMIN_PASSWORD = value
|
|
|
|
|
|
@pytest.fixture
|
|
def env():
|
|
"""Fixture for getting the test environment configuration object."""
|
|
return KeycloakTestEnv()
|
|
|
|
|
|
@pytest.fixture
|
|
def admin(env: KeycloakTestEnv):
|
|
"""Fixture for initialized KeycloakAdmin class."""
|
|
return KeycloakAdmin(
|
|
server_url=f"http://{env.KEYCLOAK_HOST}:{env.KEYCLOAK_PORT}",
|
|
username=env.KEYCLOAK_ADMIN,
|
|
password=env.KEYCLOAK_ADMIN_PASSWORD,
|
|
)
|
|
|
|
|
|
@pytest.fixture
|
|
def oid(env: KeycloakTestEnv, realm: str, admin: KeycloakAdmin):
|
|
"""Fixture for initialized KeycloakOpenID class."""
|
|
# Set the realm
|
|
admin.realm_name = realm
|
|
# Create client
|
|
client = str(uuid.uuid4())
|
|
client_id = admin.create_client(
|
|
payload={
|
|
"name": client,
|
|
"clientId": client,
|
|
"enabled": True,
|
|
"publicClient": True,
|
|
"protocol": "openid-connect",
|
|
}
|
|
)
|
|
# Return OID
|
|
yield KeycloakOpenID(
|
|
server_url=f"http://{env.KEYCLOAK_HOST}:{env.KEYCLOAK_PORT}",
|
|
realm_name=realm,
|
|
client_id=client,
|
|
)
|
|
# Cleanup
|
|
admin.delete_client(client_id=client_id)
|
|
|
|
|
|
@pytest.fixture
|
|
def oid_with_credentials(env: KeycloakTestEnv, realm: str, admin: KeycloakAdmin):
|
|
"""Fixture for an initialized KeycloakOpenID class and a random user credentials."""
|
|
# Set the realm
|
|
admin.realm_name = realm
|
|
# Create client
|
|
client = str(uuid.uuid4())
|
|
secret = str(uuid.uuid4())
|
|
client_id = admin.create_client(
|
|
payload={
|
|
"name": client,
|
|
"clientId": client,
|
|
"enabled": True,
|
|
"publicClient": False,
|
|
"protocol": "openid-connect",
|
|
"secret": secret,
|
|
"clientAuthenticatorType": "client-secret",
|
|
}
|
|
)
|
|
# Create user
|
|
username = str(uuid.uuid4())
|
|
password = str(uuid.uuid4())
|
|
user_id = admin.create_user(
|
|
payload={
|
|
"username": username,
|
|
"email": f"{username}@test.test",
|
|
"enabled": True,
|
|
"credentials": [{"type": "password", "value": password}],
|
|
}
|
|
)
|
|
|
|
yield (
|
|
KeycloakOpenID(
|
|
server_url=f"http://{env.KEYCLOAK_HOST}:{env.KEYCLOAK_PORT}",
|
|
realm_name=realm,
|
|
client_id=client,
|
|
client_secret_key=secret,
|
|
),
|
|
username,
|
|
password,
|
|
)
|
|
|
|
# Cleanup
|
|
admin.delete_client(client_id=client_id)
|
|
admin.delete_user(user_id=user_id)
|
|
|
|
|
|
@pytest.fixture
|
|
def oid_with_credentials_authz(env: KeycloakTestEnv, realm: str, admin: KeycloakAdmin):
|
|
"""Fixture for an initialized KeycloakOpenID class and a random user credentials."""
|
|
# Set the realm
|
|
admin.realm_name = realm
|
|
# Create client
|
|
client = str(uuid.uuid4())
|
|
secret = str(uuid.uuid4())
|
|
client_id = admin.create_client(
|
|
payload={
|
|
"name": client,
|
|
"clientId": client,
|
|
"enabled": True,
|
|
"publicClient": False,
|
|
"protocol": "openid-connect",
|
|
"secret": secret,
|
|
"clientAuthenticatorType": "client-secret",
|
|
"authorizationServicesEnabled": True,
|
|
"serviceAccountsEnabled": True,
|
|
}
|
|
)
|
|
admin.create_client_authz_role_based_policy(
|
|
client_id=client_id,
|
|
payload={
|
|
"name": "test-authz-rb-policy",
|
|
"roles": [{"id": admin.get_realm_role(role_name="offline_access")["id"]}],
|
|
},
|
|
)
|
|
# Create user
|
|
username = str(uuid.uuid4())
|
|
password = str(uuid.uuid4())
|
|
user_id = admin.create_user(
|
|
payload={
|
|
"username": username,
|
|
"email": f"{username}@test.test",
|
|
"enabled": True,
|
|
"credentials": [{"type": "password", "value": password}],
|
|
}
|
|
)
|
|
|
|
yield (
|
|
KeycloakOpenID(
|
|
server_url=f"http://{env.KEYCLOAK_HOST}:{env.KEYCLOAK_PORT}",
|
|
realm_name=realm,
|
|
client_id=client,
|
|
client_secret_key=secret,
|
|
),
|
|
username,
|
|
password,
|
|
)
|
|
|
|
# Cleanup
|
|
admin.delete_client(client_id=client_id)
|
|
admin.delete_user(user_id=user_id)
|
|
|
|
|
|
@pytest.fixture
|
|
def realm(admin: KeycloakAdmin) -> str:
|
|
"""Fixture for a new random realm."""
|
|
realm_name = str(uuid.uuid4())
|
|
admin.create_realm(payload={"realm": realm_name, "enabled": True})
|
|
yield realm_name
|
|
admin.delete_realm(realm_name=realm_name)
|
|
|
|
|
|
@pytest.fixture
|
|
def user(admin: KeycloakAdmin, realm: str) -> str:
|
|
"""Fixture for a new random user."""
|
|
admin.realm_name = realm
|
|
username = str(uuid.uuid4())
|
|
user_id = admin.create_user(payload={"username": username, "email": f"{username}@test.test"})
|
|
yield user_id
|
|
admin.delete_user(user_id=user_id)
|
|
|
|
|
|
@pytest.fixture
|
|
def group(admin: KeycloakAdmin, realm: str) -> str:
|
|
"""Fixture for a new random group."""
|
|
admin.realm_name = realm
|
|
group_name = str(uuid.uuid4())
|
|
group_id = admin.create_group(payload={"name": group_name})
|
|
yield group_id
|
|
admin.delete_group(group_id=group_id)
|
|
|
|
|
|
@pytest.fixture
|
|
def client(admin: KeycloakAdmin, realm: str) -> str:
|
|
"""Fixture for a new random client."""
|
|
admin.realm_name = realm
|
|
client = str(uuid.uuid4())
|
|
client_id = admin.create_client(payload={"name": client, "clientId": client})
|
|
yield client_id
|
|
admin.delete_client(client_id=client_id)
|
|
|
|
|
|
@pytest.fixture
|
|
def client_role(admin: KeycloakAdmin, realm: str, client: str) -> str:
|
|
"""Fixture for a new random client role."""
|
|
admin.realm_name = realm
|
|
role = str(uuid.uuid4())
|
|
admin.create_client_role(client, {"name": role, "composite": False})
|
|
yield role
|
|
admin.delete_client_role(client, role)
|
|
|
|
|
|
@pytest.fixture
|
|
def composite_client_role(admin: KeycloakAdmin, realm: str, client: str, client_role: str) -> str:
|
|
"""Fixture for a new random composite client role."""
|
|
admin.realm_name = realm
|
|
role = str(uuid.uuid4())
|
|
admin.create_client_role(client, {"name": role, "composite": True})
|
|
role_repr = admin.get_client_role(client, client_role)
|
|
admin.add_composite_client_roles_to_role(client, role, roles=[role_repr])
|
|
yield role
|
|
admin.delete_client_role(client, role)
|
|
|
|
|
|
@pytest.fixture
|
|
def selfsigned_cert():
|
|
"""Generates self signed certificate for a hostname, and optional IP addresses."""
|
|
from cryptography import x509
|
|
from cryptography.x509.oid import NameOID
|
|
from cryptography.hazmat.primitives import hashes
|
|
from cryptography.hazmat.backends import default_backend
|
|
from cryptography.hazmat.primitives import serialization
|
|
from cryptography.hazmat.primitives.asymmetric import rsa
|
|
from datetime import datetime, timedelta
|
|
import ipaddress
|
|
hostname = "testcert"
|
|
ip_addresses = None
|
|
key = None
|
|
# Generate our key
|
|
if key is None:
|
|
key = rsa.generate_private_key(
|
|
public_exponent=65537,
|
|
key_size=2048,
|
|
backend=default_backend(),
|
|
)
|
|
|
|
name = x509.Name([
|
|
x509.NameAttribute(NameOID.COMMON_NAME, hostname)
|
|
])
|
|
|
|
# best practice seem to be to include the hostname in the SAN, which *SHOULD* mean COMMON_NAME is ignored.
|
|
alt_names = [x509.DNSName(hostname)]
|
|
|
|
# allow addressing by IP, for when you don't have real DNS (common in most testing scenarios
|
|
if ip_addresses:
|
|
for addr in ip_addresses:
|
|
# openssl wants DNSnames for ips...
|
|
alt_names.append(x509.DNSName(addr))
|
|
# ... whereas golang's crypto/tls is stricter, and needs IPAddresses
|
|
# note: older versions of cryptography do not understand ip_address objects
|
|
alt_names.append(x509.IPAddress(ipaddress.ip_address(addr)))
|
|
|
|
san = x509.SubjectAlternativeName(alt_names)
|
|
|
|
# path_len=0 means this cert can only sign itself, not other certs.
|
|
basic_contraints = x509.BasicConstraints(ca=True, path_length=0)
|
|
now = datetime.utcnow()
|
|
cert = (
|
|
x509.CertificateBuilder()
|
|
.subject_name(name)
|
|
.issuer_name(name)
|
|
.public_key(key.public_key())
|
|
.serial_number(1000)
|
|
.not_valid_before(now)
|
|
.not_valid_after(now + timedelta(days=10*365))
|
|
.add_extension(basic_contraints, False)
|
|
.add_extension(san, False)
|
|
.sign(key, hashes.SHA256(), default_backend())
|
|
)
|
|
cert_pem = cert.public_bytes(encoding=serialization.Encoding.PEM)
|
|
key_pem = key.private_bytes(
|
|
encoding=serialization.Encoding.PEM,
|
|
format=serialization.PrivateFormat.TraditionalOpenSSL,
|
|
encryption_algorithm=serialization.NoEncryption(),
|
|
)
|
|
|
|
return cert_pem, key_pem
|