7d1bbbfe19
This also moves them into the auth package.
127 lines
4.1 KiB
Python
127 lines
4.1 KiB
Python
import time
|
|
|
|
import jwt
|
|
import pytest
|
|
|
|
from app import app, instance_keys
|
|
from auth.registry_jwt_auth import identity_from_bearer_token, InvalidJWTException
|
|
from endpoints.v2.v2auth import TOKEN_VALIDITY_LIFETIME_S
|
|
from initdb import setup_database_for_testing, finished_database_for_testing
|
|
from util.morecollections import AttrDict
|
|
from util.security.registry_jwt import ANONYMOUS_SUB, build_context_and_subject
|
|
|
|
|
|
TEST_AUDIENCE = app.config['SERVER_HOSTNAME']
|
|
TEST_USER = AttrDict({'username': 'joeuser'})
|
|
MAX_SIGNED_S = 3660
|
|
|
|
|
|
def _access(typ='repository', name='somens/somerepo', actions=None):
|
|
actions = [] if actions is None else actions
|
|
return [{
|
|
'type': typ,
|
|
'name': name,
|
|
'actions': actions,
|
|
}]
|
|
|
|
|
|
def _delete_field(token_data, field_name):
|
|
token_data.pop(field_name)
|
|
return token_data
|
|
|
|
|
|
def _token_data(access=[], context=None, audience=TEST_AUDIENCE, user=TEST_USER, iat=None, exp=None,
|
|
nbf=None, iss=None, subject=None):
|
|
if subject is None:
|
|
_, subject = build_context_and_subject(user=user)
|
|
return {
|
|
'iss': iss or instance_keys.service_name,
|
|
'aud': audience,
|
|
'nbf': nbf if nbf is not None else int(time.time()),
|
|
'iat': iat if iat is not None else int(time.time()),
|
|
'exp': exp if exp is not None else int(time.time() + TOKEN_VALIDITY_LIFETIME_S),
|
|
'sub': subject,
|
|
'access': access,
|
|
'context': context,
|
|
}
|
|
|
|
|
|
def _token(token_data, key_id=None, private_key=None, skip_header=False, alg=None):
|
|
key_id = key_id or instance_keys.local_key_id
|
|
private_key = private_key or instance_keys.local_private_key
|
|
|
|
if alg == "none":
|
|
private_key = None
|
|
|
|
token_headers = {'kid': key_id}
|
|
|
|
if skip_header:
|
|
token_headers = {}
|
|
|
|
token_data = jwt.encode(token_data, private_key, alg or 'RS256', headers=token_headers)
|
|
return 'Bearer {0}'.format(token_data)
|
|
|
|
|
|
def _parse_token(token):
|
|
return identity_from_bearer_token(token)[0]
|
|
|
|
|
|
def test_accepted_token():
|
|
token = _token(_token_data())
|
|
identity = _parse_token(token)
|
|
assert identity.id == TEST_USER.username, 'should be %s, but was %s' % (TEST_USER.username, identity.id)
|
|
assert len(identity.provides) == 0
|
|
|
|
anon_token = _token(_token_data(user=None))
|
|
anon_identity = _parse_token(anon_token)
|
|
assert anon_identity.id == ANONYMOUS_SUB, 'should be %s, but was %s' % (ANONYMOUS_SUB, anon_identity.id)
|
|
assert len(identity.provides) == 0
|
|
|
|
|
|
@pytest.mark.parametrize('access', [
|
|
(_access(actions=['pull', 'push'])),
|
|
(_access(actions=['pull', '*'])),
|
|
(_access(actions=['*', 'push'])),
|
|
(_access(actions=['*'])),
|
|
(_access(actions=['pull', '*', 'push'])),
|
|
])
|
|
def test_token_with_access(access):
|
|
token = _token(_token_data(access=access))
|
|
identity = _parse_token(token)
|
|
assert identity.id == TEST_USER.username, 'should be %s, but was %s' % (TEST_USER.username, identity.id)
|
|
assert len(identity.provides) == 1
|
|
|
|
role = list(identity.provides)[0][3]
|
|
if "*" in access[0]['actions']:
|
|
assert role == 'admin'
|
|
elif "push" in access[0]['actions']:
|
|
assert role == 'write'
|
|
elif "pull" in access[0]['actions']:
|
|
assert role == 'read'
|
|
|
|
|
|
@pytest.mark.parametrize('token', [
|
|
(_token(_token_data(access=[{'toipe': 'repository', 'namesies': 'somens/somerepo', 'akshuns': ['pull', 'push', '*']}]))),
|
|
(_token(_token_data(audience='someotherapp'))),
|
|
(_token(_delete_field(_token_data(), 'aud'))),
|
|
(_token(_token_data(nbf=int(time.time()) + 60))),
|
|
(_token(_delete_field(_token_data(), 'nbf'))),
|
|
(_token(_token_data(iat=int(time.time()) + 60))),
|
|
(_token(_delete_field(_token_data(), 'iat'))),
|
|
(_token(_token_data(exp=int(time.time()) + MAX_SIGNED_S * 2))),
|
|
(_token(_token_data(exp=int(time.time()) - 60))),
|
|
(_token(_delete_field(_token_data(), 'exp'))),
|
|
(_token(_delete_field(_token_data(), 'sub'))),
|
|
(_token(_token_data(iss='badissuer'))),
|
|
(_token(_delete_field(_token_data(), 'iss'))),
|
|
(_token(_token_data(), skip_header=True)),
|
|
(_token(_token_data(), key_id='someunknownkey')),
|
|
(_token(_token_data(), key_id='kid7')),
|
|
(_token(_token_data(), alg='none', private_key=None)),
|
|
('some random token'),
|
|
('Bearer: sometokenhere'),
|
|
('\nBearer: dGVzdA'),
|
|
])
|
|
def test_invalid_jwt(token):
|
|
with pytest.raises(InvalidJWTException):
|
|
_parse_token(token)
|