mirror of
https://github.com/warp-tech/warpgate.git
synced 2024-11-10 09:12:56 +08:00
173 lines
5.3 KiB
Python
173 lines
5.3 KiB
Python
import requests
|
|
import pyotp
|
|
from base64 import b64decode
|
|
from uuid import uuid4
|
|
|
|
from .api_client import (
|
|
api_admin_session,
|
|
api_create_target,
|
|
api_create_user,
|
|
api_create_role,
|
|
api_add_role_to_user,
|
|
api_add_role_to_target,
|
|
)
|
|
from .conftest import WarpgateProcess
|
|
from .test_http_common import * # noqa
|
|
|
|
|
|
class TestHTTPUserAuthOTP:
|
|
def test_auth_otp_success(
|
|
self,
|
|
otp_key_base32,
|
|
otp_key_base64,
|
|
echo_server_port,
|
|
shared_wg: WarpgateProcess,
|
|
):
|
|
url = f"https://localhost:{shared_wg.http_port}"
|
|
with api_admin_session(url) as session:
|
|
role = api_create_role(url, session, {"name": f"role-{uuid4()}"})
|
|
user = api_create_user(
|
|
url,
|
|
session,
|
|
{
|
|
"username": f"user-{uuid4()}",
|
|
"credentials": [
|
|
{
|
|
"kind": "Password",
|
|
"hash": "123",
|
|
},
|
|
{
|
|
"kind": "Totp",
|
|
"key": list(b64decode(otp_key_base64)),
|
|
},
|
|
],
|
|
"credential_policy": {
|
|
"http": ["Password", "Totp"],
|
|
},
|
|
},
|
|
)
|
|
api_add_role_to_user(url, session, user["id"], role["id"])
|
|
echo_target = api_create_target(
|
|
url,
|
|
session,
|
|
{
|
|
"name": f"echo-{uuid4()}",
|
|
"options": {
|
|
"kind": "Http",
|
|
"url": f"http://localhost:{echo_server_port}",
|
|
"tls": {
|
|
"mode": "Disabled",
|
|
"verify": False,
|
|
},
|
|
},
|
|
},
|
|
)
|
|
api_add_role_to_target(url, session, echo_target["id"], role["id"])
|
|
|
|
session = requests.Session()
|
|
session.verify = False
|
|
|
|
totp = pyotp.TOTP(otp_key_base32)
|
|
|
|
response = session.post(
|
|
f"{url}/@warpgate/api/auth/login",
|
|
json={
|
|
"username": user["username"],
|
|
"password": "123",
|
|
},
|
|
)
|
|
assert response.status_code // 100 != 2
|
|
|
|
response = session.get(
|
|
f"{url}/some/path?a=b&warpgate-target={echo_target['name']}&c=d",
|
|
allow_redirects=False,
|
|
)
|
|
assert response.status_code // 100 != 2
|
|
|
|
response = session.post(
|
|
f"{url}/@warpgate/api/auth/otp",
|
|
json={
|
|
"otp": totp.now(),
|
|
},
|
|
)
|
|
assert response.status_code // 100 == 2
|
|
|
|
response = session.get(
|
|
f"{url}/some/path?a=b&warpgate-target={echo_target['name']}&c=d",
|
|
allow_redirects=False,
|
|
)
|
|
assert response.status_code // 100 == 2
|
|
assert response.json()["path"] == "/some/path"
|
|
|
|
def test_auth_otp_fail(
|
|
self,
|
|
otp_key_base64,
|
|
echo_server_port,
|
|
shared_wg: WarpgateProcess,
|
|
):
|
|
url = f"https://localhost:{shared_wg.http_port}"
|
|
with api_admin_session(url) as session:
|
|
role = api_create_role(url, session, {"name": f"role-{uuid4()}"})
|
|
user = api_create_user(
|
|
url,
|
|
session,
|
|
{
|
|
"username": f"user-{uuid4()}",
|
|
"credentials": [
|
|
{
|
|
"kind": "Password",
|
|
"hash": "123",
|
|
},
|
|
{
|
|
"kind": "Totp",
|
|
"key": list(b64decode(otp_key_base64)),
|
|
},
|
|
],
|
|
"credential_policy": {
|
|
"http": ["PublicKey", "Totp"],
|
|
},
|
|
},
|
|
)
|
|
api_add_role_to_user(url, session, user["id"], role["id"])
|
|
echo_target = api_create_target(
|
|
url,
|
|
session,
|
|
{
|
|
"name": f"echo-{uuid4()}",
|
|
"options": {
|
|
"kind": "Http",
|
|
"url": f"http://localhost:{echo_server_port}",
|
|
"tls": {
|
|
"mode": "Disabled",
|
|
"verify": False,
|
|
},
|
|
},
|
|
},
|
|
)
|
|
api_add_role_to_target(url, session, echo_target["id"], role["id"])
|
|
|
|
session = requests.Session()
|
|
session.verify = False
|
|
|
|
response = session.post(
|
|
f"{url}/@warpgate/api/auth/login",
|
|
json={
|
|
"username": user["username"],
|
|
"password": "123",
|
|
},
|
|
)
|
|
assert response.status_code // 100 != 2
|
|
|
|
response = session.post(
|
|
f"{url}/@warpgate/api/auth/otp",
|
|
json={
|
|
"otp": "00000000",
|
|
},
|
|
)
|
|
assert response.status_code // 100 != 2
|
|
|
|
response = session.get(
|
|
f"{url}/some/path?a=b&warpgate-target={echo_target['name']}&c=d",
|
|
allow_redirects=False,
|
|
)
|
|
assert response.status_code // 100 != 2
|