mirror of
https://github.com/pgadmin-org/pgadmin4.git
synced 2025-02-25 18:55:31 -06:00
Added support for OAuth 2 authentication. Fixes #5940
Initial patch sent by: Florian Sabonchi
This commit is contained in:
committed by
Akshay Joshi
parent
fff4060b31
commit
48ca83f31d
147
web/pgadmin/browser/tests/test_oauth2_with_mocking.py
Normal file
147
web/pgadmin/browser/tests/test_oauth2_with_mocking.py
Normal file
@@ -0,0 +1,147 @@
|
||||
##########################################################################
|
||||
#
|
||||
# pgAdmin 4 - PostgreSQL Tools
|
||||
#
|
||||
# Copyright (C) 2013 - 2021, The pgAdmin Development Team
|
||||
# This software is released under the PostgreSQL Licence
|
||||
#
|
||||
##########################################################################
|
||||
|
||||
import config as app_config
|
||||
from pgadmin.utils.route import BaseTestGenerator
|
||||
from regression.python_test_utils import test_utils as utils
|
||||
from pgadmin.authenticate.registry import AuthSourceRegistry
|
||||
from unittest.mock import patch, MagicMock
|
||||
from pgadmin.authenticate import AuthSourceManager
|
||||
from pgadmin.utils.constants import OAUTH2, LDAP, INTERNAL
|
||||
|
||||
|
||||
class Oauth2LoginMockTestCase(BaseTestGenerator):
|
||||
"""
|
||||
This class checks oauth2 login functionality by mocking
|
||||
External Oauth2 Authentication.
|
||||
"""
|
||||
|
||||
scenarios = [
|
||||
('Oauth2 External Authentication', dict(
|
||||
auth_source=['oauth2'],
|
||||
oauth2_provider='github',
|
||||
flag=1
|
||||
)),
|
||||
('Oauth2 Authentication', dict(
|
||||
auth_source=['oauth2'],
|
||||
oauth2_provider='github',
|
||||
flag=2
|
||||
)),
|
||||
]
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
"""
|
||||
We need to logout the test client as we are testing
|
||||
spnego/kerberos login scenarios.
|
||||
"""
|
||||
cls.tester.logout()
|
||||
|
||||
def setUp(self):
|
||||
app_config.AUTHENTICATION_SOURCES = self.auth_source
|
||||
self.app.PGADMIN_EXTERNAL_AUTH_SOURCE = OAUTH2
|
||||
app_config.OAUTH2_CONFIG = [
|
||||
{
|
||||
'OAUTH2_NAME': 'github',
|
||||
'OAUTH2_DISPLAY_NAME': 'Github',
|
||||
'OAUTH2_CLIENT_ID': 'testclientid',
|
||||
'OAUTH2_CLIENT_SECRET': 'testclientsec',
|
||||
'OAUTH2_TOKEN_URL':
|
||||
'https://github.com/login/oauth/access_token',
|
||||
'OAUTH2_AUTHORIZATION_URL':
|
||||
'https://github.com/login/oauth/authorize',
|
||||
'OAUTH2_API_BASE_URL': 'https://api.github.com/',
|
||||
'OAUTH2_USERINFO_ENDPOINT': 'user',
|
||||
'OAUTH2_ICON': 'fa-github',
|
||||
'OAUTH2_BUTTON_COLOR': '#3253a8',
|
||||
}
|
||||
]
|
||||
|
||||
def runTest(self):
|
||||
"""This function checks oauth2 login functionality."""
|
||||
if app_config.SERVER_MODE is False:
|
||||
self.skipTest(
|
||||
"Can not run Oauth2 Authentication in the Desktop mode."
|
||||
)
|
||||
|
||||
if self.flag == 1:
|
||||
self.test_external_authentication()
|
||||
elif self.flag == 2:
|
||||
self.test_oauth2_authentication()
|
||||
|
||||
def test_external_authentication(self):
|
||||
"""
|
||||
Ensure that the user should be redirected
|
||||
to the external url for the authentication.
|
||||
"""
|
||||
|
||||
AuthSourceManager.update_auth_sources = MagicMock()
|
||||
|
||||
try:
|
||||
self.tester.login(
|
||||
email=None, password=None,
|
||||
_follow_redirects=True,
|
||||
headers=None,
|
||||
extra_form_data=dict(oauth2_button=self.oauth2_provider)
|
||||
)
|
||||
except Exception as e:
|
||||
self.assertEqual('Following external'
|
||||
' redirects is not supported.', str(e))
|
||||
|
||||
def test_oauth2_authentication(self):
|
||||
"""
|
||||
Ensure that when the client sends an correct authorization token,
|
||||
they receive a 200 OK response and the user principal is extracted and
|
||||
passed on to the routed method.
|
||||
"""
|
||||
|
||||
profile = self.mock_user_profile()
|
||||
|
||||
# Mock Oauth2 Authenticate
|
||||
AuthSourceRegistry._registry[OAUTH2].authenticate = MagicMock(
|
||||
return_value=[True, ''])
|
||||
|
||||
AuthSourceManager.update_auth_sources = MagicMock()
|
||||
|
||||
# Create AuthSourceManager object
|
||||
auth_obj = AuthSourceManager({}, [OAUTH2])
|
||||
auth_source = AuthSourceRegistry.get(OAUTH2)
|
||||
auth_obj.set_source(auth_source)
|
||||
auth_obj.set_current_source(auth_source.get_source_name())
|
||||
|
||||
# Check the login with Oauth2
|
||||
res = self.tester.login(email=None, password=None,
|
||||
_follow_redirects=True,
|
||||
headers=None,
|
||||
extra_form_data=dict(
|
||||
oauth2_button=self.oauth2_provider)
|
||||
)
|
||||
|
||||
respdata = 'Gravatar image for %s' % profile['email']
|
||||
self.assertTrue(respdata in res.data.decode('utf8'))
|
||||
|
||||
def mock_user_profile(self):
|
||||
profile = {'email': 'oauth2@gmail.com'}
|
||||
|
||||
AuthSourceRegistry._registry[OAUTH2].get_user_profile = MagicMock(
|
||||
return_value=profile)
|
||||
return profile
|
||||
|
||||
def tearDown(self):
|
||||
self.tester.logout()
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
"""
|
||||
We need to again login the test client as soon as test scenarios
|
||||
finishes.
|
||||
"""
|
||||
cls.tester.logout()
|
||||
app_config.AUTHENTICATION_SOURCES = [INTERNAL]
|
||||
utils.login_tester_account(cls.tester)
|
||||
Reference in New Issue
Block a user