2023-06-07 15:28:42 +00:00
|
|
|
package integration
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
2023-06-21 14:06:18 +00:00
|
|
|
"testing"
|
2023-06-07 15:28:42 +00:00
|
|
|
"time"
|
|
|
|
|
2023-09-29 09:26:14 +00:00
|
|
|
crewjam_saml "github.com/crewjam/saml"
|
2023-06-21 14:06:18 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
2023-06-07 15:28:42 +00:00
|
|
|
"github.com/zitadel/logging"
|
2023-10-17 15:19:51 +00:00
|
|
|
"github.com/zitadel/oidc/v3/pkg/oidc"
|
2023-06-21 14:06:18 +00:00
|
|
|
"golang.org/x/oauth2"
|
2023-08-16 11:29:57 +00:00
|
|
|
"golang.org/x/text/language"
|
2023-06-07 15:28:42 +00:00
|
|
|
"google.golang.org/grpc"
|
2023-11-06 09:48:28 +00:00
|
|
|
"google.golang.org/protobuf/types/known/durationpb"
|
2023-06-07 15:28:42 +00:00
|
|
|
|
2023-06-21 14:06:18 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/api/authz"
|
|
|
|
"github.com/zitadel/zitadel/internal/command"
|
2023-08-16 11:29:57 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/idp/providers/ldap"
|
2023-06-21 14:06:18 +00:00
|
|
|
openid "github.com/zitadel/zitadel/internal/idp/providers/oidc"
|
2023-09-29 09:26:14 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/idp/providers/saml"
|
2023-06-21 14:06:18 +00:00
|
|
|
"github.com/zitadel/zitadel/internal/repository/idp"
|
2023-06-07 15:28:42 +00:00
|
|
|
"github.com/zitadel/zitadel/pkg/grpc/admin"
|
2023-07-14 11:16:16 +00:00
|
|
|
"github.com/zitadel/zitadel/pkg/grpc/auth"
|
2023-06-20 16:23:28 +00:00
|
|
|
mgmt "github.com/zitadel/zitadel/pkg/grpc/management"
|
2023-09-13 12:43:01 +00:00
|
|
|
object "github.com/zitadel/zitadel/pkg/grpc/object/v2beta"
|
|
|
|
oidc_pb "github.com/zitadel/zitadel/pkg/grpc/oidc/v2beta"
|
2023-08-11 14:19:14 +00:00
|
|
|
organisation "github.com/zitadel/zitadel/pkg/grpc/org/v2beta"
|
2023-09-13 12:43:01 +00:00
|
|
|
session "github.com/zitadel/zitadel/pkg/grpc/session/v2beta"
|
2023-07-06 06:38:13 +00:00
|
|
|
"github.com/zitadel/zitadel/pkg/grpc/system"
|
2023-09-13 12:43:01 +00:00
|
|
|
user "github.com/zitadel/zitadel/pkg/grpc/user/v2beta"
|
2023-06-07 15:28:42 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type Client struct {
|
|
|
|
CC *grpc.ClientConn
|
|
|
|
Admin admin.AdminServiceClient
|
2023-06-20 16:23:28 +00:00
|
|
|
Mgmt mgmt.ManagementServiceClient
|
2023-07-14 11:16:16 +00:00
|
|
|
Auth auth.AuthServiceClient
|
2023-06-07 15:28:42 +00:00
|
|
|
UserV2 user.UserServiceClient
|
|
|
|
SessionV2 session.SessionServiceClient
|
2023-07-10 13:27:00 +00:00
|
|
|
OIDCv2 oidc_pb.OIDCServiceClient
|
2023-08-11 14:19:14 +00:00
|
|
|
OrgV2 organisation.OrganizationServiceClient
|
2023-07-06 06:38:13 +00:00
|
|
|
System system.SystemServiceClient
|
2023-06-07 15:28:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func newClient(cc *grpc.ClientConn) Client {
|
|
|
|
return Client{
|
|
|
|
CC: cc,
|
|
|
|
Admin: admin.NewAdminServiceClient(cc),
|
2023-06-20 16:23:28 +00:00
|
|
|
Mgmt: mgmt.NewManagementServiceClient(cc),
|
2023-07-14 11:16:16 +00:00
|
|
|
Auth: auth.NewAuthServiceClient(cc),
|
2023-06-07 15:28:42 +00:00
|
|
|
UserV2: user.NewUserServiceClient(cc),
|
|
|
|
SessionV2: session.NewSessionServiceClient(cc),
|
2023-07-10 13:27:00 +00:00
|
|
|
OIDCv2: oidc_pb.NewOIDCServiceClient(cc),
|
2023-08-11 14:19:14 +00:00
|
|
|
OrgV2: organisation.NewOrganizationServiceClient(cc),
|
2023-07-06 06:38:13 +00:00
|
|
|
System: system.NewSystemServiceClient(cc),
|
2023-06-07 15:28:42 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-07-06 06:38:13 +00:00
|
|
|
func (t *Tester) UseIsolatedInstance(iamOwnerCtx, systemCtx context.Context) (primaryDomain, instanceId string, authenticatedIamOwnerCtx context.Context) {
|
|
|
|
primaryDomain = randString(5) + ".integration"
|
|
|
|
instance, err := t.Client.System.CreateInstance(systemCtx, &system.CreateInstanceRequest{
|
|
|
|
InstanceName: "testinstance",
|
|
|
|
CustomDomain: primaryDomain,
|
|
|
|
Owner: &system.CreateInstanceRequest_Machine_{
|
|
|
|
Machine: &system.CreateInstanceRequest_Machine{
|
|
|
|
UserName: "owner",
|
|
|
|
Name: "owner",
|
|
|
|
PersonalAccessToken: &system.CreateInstanceRequest_PersonalAccessToken{},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
t.createClientConn(iamOwnerCtx, grpc.WithAuthority(primaryDomain))
|
|
|
|
instanceId = instance.GetInstanceId()
|
2023-07-10 13:27:00 +00:00
|
|
|
t.Users.Set(instanceId, IAMOwner, &User{
|
|
|
|
Token: instance.GetPat(),
|
|
|
|
})
|
2023-07-06 06:38:13 +00:00
|
|
|
return primaryDomain, instanceId, t.WithInstanceAuthorization(iamOwnerCtx, IAMOwner, instanceId)
|
|
|
|
}
|
|
|
|
|
2023-06-07 15:28:42 +00:00
|
|
|
func (s *Tester) CreateHumanUser(ctx context.Context) *user.AddHumanUserResponse {
|
|
|
|
resp, err := s.Client.UserV2.AddHumanUser(ctx, &user.AddHumanUserRequest{
|
|
|
|
Organisation: &object.Organisation{
|
|
|
|
Org: &object.Organisation_OrgId{
|
|
|
|
OrgId: s.Organisation.ID,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Profile: &user.SetHumanProfile{
|
2023-08-22 10:05:45 +00:00
|
|
|
GivenName: "Mickey",
|
|
|
|
FamilyName: "Mouse",
|
2023-06-07 15:28:42 +00:00
|
|
|
},
|
|
|
|
Email: &user.SetHumanEmail{
|
|
|
|
Email: fmt.Sprintf("%d@mouse.com", time.Now().UnixNano()),
|
|
|
|
Verification: &user.SetHumanEmail_ReturnCode{
|
|
|
|
ReturnCode: &user.ReturnEmailVerificationCode{},
|
|
|
|
},
|
|
|
|
},
|
2023-08-03 04:42:59 +00:00
|
|
|
Phone: &user.SetHumanPhone{
|
|
|
|
Phone: "+41791234567",
|
|
|
|
Verification: &user.SetHumanPhone_ReturnCode{
|
|
|
|
ReturnCode: &user.ReturnPhoneVerificationCode{},
|
|
|
|
},
|
|
|
|
},
|
2023-06-07 15:28:42 +00:00
|
|
|
})
|
|
|
|
logging.OnError(err).Fatal("create human user")
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
2023-06-21 14:06:18 +00:00
|
|
|
func (s *Tester) CreateUserIDPlink(ctx context.Context, userID, externalID, idpID, username string) *user.AddIDPLinkResponse {
|
|
|
|
resp, err := s.Client.UserV2.AddIDPLink(
|
|
|
|
ctx,
|
|
|
|
&user.AddIDPLinkRequest{
|
|
|
|
UserId: userID,
|
|
|
|
IdpLink: &user.IDPLink{
|
|
|
|
IdpId: idpID,
|
|
|
|
UserId: externalID,
|
|
|
|
UserName: username,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
|
|
|
logging.OnError(err).Fatal("create human user link")
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
2023-06-07 15:28:42 +00:00
|
|
|
func (s *Tester) RegisterUserPasskey(ctx context.Context, userID string) {
|
|
|
|
reg, err := s.Client.UserV2.CreatePasskeyRegistrationLink(ctx, &user.CreatePasskeyRegistrationLinkRequest{
|
|
|
|
UserId: userID,
|
|
|
|
Medium: &user.CreatePasskeyRegistrationLinkRequest_ReturnCode{},
|
|
|
|
})
|
|
|
|
logging.OnError(err).Fatal("create user passkey")
|
|
|
|
|
|
|
|
pkr, err := s.Client.UserV2.RegisterPasskey(ctx, &user.RegisterPasskeyRequest{
|
|
|
|
UserId: userID,
|
|
|
|
Code: reg.GetCode(),
|
2023-06-27 12:36:07 +00:00
|
|
|
Domain: s.Config.ExternalDomain,
|
2023-06-07 15:28:42 +00:00
|
|
|
})
|
|
|
|
logging.OnError(err).Fatal("create user passkey")
|
|
|
|
attestationResponse, err := s.WebAuthN.CreateAttestationResponse(pkr.GetPublicKeyCredentialCreationOptions())
|
|
|
|
logging.OnError(err).Fatal("create user passkey")
|
|
|
|
|
|
|
|
_, err = s.Client.UserV2.VerifyPasskeyRegistration(ctx, &user.VerifyPasskeyRegistrationRequest{
|
|
|
|
UserId: userID,
|
|
|
|
PasskeyId: pkr.GetPasskeyId(),
|
|
|
|
PublicKeyCredential: attestationResponse,
|
|
|
|
PasskeyName: "nice name",
|
|
|
|
})
|
|
|
|
logging.OnError(err).Fatal("create user passkey")
|
|
|
|
}
|
2023-06-21 14:06:18 +00:00
|
|
|
|
2023-08-11 15:36:18 +00:00
|
|
|
func (s *Tester) RegisterUserU2F(ctx context.Context, userID string) {
|
|
|
|
pkr, err := s.Client.UserV2.RegisterU2F(ctx, &user.RegisterU2FRequest{
|
|
|
|
UserId: userID,
|
|
|
|
Domain: s.Config.ExternalDomain,
|
|
|
|
})
|
|
|
|
logging.OnError(err).Fatal("create user u2f")
|
|
|
|
attestationResponse, err := s.WebAuthN.CreateAttestationResponse(pkr.GetPublicKeyCredentialCreationOptions())
|
|
|
|
logging.OnError(err).Fatal("create user u2f")
|
|
|
|
|
|
|
|
_, err = s.Client.UserV2.VerifyU2FRegistration(ctx, &user.VerifyU2FRegistrationRequest{
|
|
|
|
UserId: userID,
|
|
|
|
U2FId: pkr.GetU2FId(),
|
|
|
|
PublicKeyCredential: attestationResponse,
|
|
|
|
TokenName: "nice name",
|
|
|
|
})
|
|
|
|
logging.OnError(err).Fatal("create user u2f")
|
|
|
|
}
|
|
|
|
|
2023-07-14 11:16:16 +00:00
|
|
|
func (s *Tester) SetUserPassword(ctx context.Context, userID, password string) {
|
|
|
|
_, err := s.Client.UserV2.SetPassword(ctx, &user.SetPasswordRequest{
|
|
|
|
UserId: userID,
|
|
|
|
NewPassword: &user.Password{Password: password},
|
|
|
|
})
|
|
|
|
logging.OnError(err).Fatal("set user password")
|
|
|
|
}
|
|
|
|
|
2023-06-21 14:06:18 +00:00
|
|
|
func (s *Tester) AddGenericOAuthProvider(t *testing.T) string {
|
|
|
|
ctx := authz.WithInstance(context.Background(), s.Instance)
|
2023-08-11 14:19:14 +00:00
|
|
|
id, _, err := s.Commands.AddInstanceGenericOAuthProvider(ctx, command.GenericOAuthProvider{
|
2023-06-21 14:06:18 +00:00
|
|
|
Name: "idp",
|
|
|
|
ClientID: "clientID",
|
|
|
|
ClientSecret: "clientSecret",
|
|
|
|
AuthorizationEndpoint: "https://example.com/oauth/v2/authorize",
|
|
|
|
TokenEndpoint: "https://example.com/oauth/v2/token",
|
|
|
|
UserEndpoint: "https://api.example.com/user",
|
|
|
|
Scopes: []string{"openid", "profile", "email"},
|
|
|
|
IDAttribute: "id",
|
|
|
|
IDPOptions: idp.Options{
|
|
|
|
IsLinkingAllowed: true,
|
|
|
|
IsCreationAllowed: true,
|
|
|
|
IsAutoCreation: true,
|
|
|
|
IsAutoUpdate: true,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
return id
|
|
|
|
}
|
|
|
|
|
2023-09-29 09:26:14 +00:00
|
|
|
func (s *Tester) AddSAMLProvider(t *testing.T) string {
|
|
|
|
ctx := authz.WithInstance(context.Background(), s.Instance)
|
|
|
|
id, _, err := s.Server.Commands.AddInstanceSAMLProvider(ctx, command.SAMLProvider{
|
|
|
|
Name: "saml-idp",
|
|
|
|
Metadata: []byte("<EntityDescriptor xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" validUntil=\"2023-09-16T09:00:32.986Z\" cacheDuration=\"PT48H\" entityID=\"http://localhost:8000/metadata\">\n <IDPSSODescriptor xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">\n <KeyDescriptor use=\"signing\">\n <KeyInfo xmlns=\"http://www.w3.org/2000/09/xmldsig#\">\n <X509Data xmlns=\"http://www.w3.org/2000/09/xmldsig#\">\n <X509Certificate xmlns=\"http://www.w3.org/2000/09/xmldsig#\">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</X509Certificate>\n </X509Data>\n </KeyInfo>\n </KeyDescriptor>\n <KeyDescriptor use=\"encryption\">\n <KeyInfo xmlns=\"http://www.w3.org/2000/09/xmldsig#\">\n <X509Data xmlns=\"http://www.w3.org/2000/09/xmldsig#\">\n <X509Certificate xmlns=\"http://www.w3.org/2000/09/xmldsig#\">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</X509Certificate>\n </X509Data>\n </KeyInfo>\n <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes128-cbc\"></EncryptionMethod>\n <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes192-cbc\"></EncryptionMethod>\n <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes256-cbc\"></EncryptionMethod>\n <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p\"></EncryptionMethod>\n </KeyDescriptor>\n <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>\n <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"http://localhost:8000/sso\"></SingleSignOnService>\n <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"http://localhost:8000/sso\"></SingleSignOnService>\n </IDPSSODescriptor>\n</EntityDescriptor>"),
|
|
|
|
IDPOptions: idp.Options{
|
|
|
|
IsLinkingAllowed: true,
|
|
|
|
IsCreationAllowed: true,
|
|
|
|
IsAutoCreation: true,
|
|
|
|
IsAutoUpdate: true,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
return id
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Tester) AddSAMLRedirectProvider(t *testing.T) string {
|
|
|
|
ctx := authz.WithInstance(context.Background(), s.Instance)
|
|
|
|
id, _, err := s.Server.Commands.AddInstanceSAMLProvider(ctx, command.SAMLProvider{
|
|
|
|
Name: "saml-idp-redirect",
|
|
|
|
Metadata: []byte("<EntityDescriptor xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" validUntil=\"2023-09-16T09:00:32.986Z\" cacheDuration=\"PT48H\" entityID=\"http://localhost:8000/metadata\">\n <IDPSSODescriptor xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">\n <KeyDescriptor use=\"signing\">\n <KeyInfo xmlns=\"http://www.w3.org/2000/09/xmldsig#\">\n <X509Data xmlns=\"http://www.w3.org/2000/09/xmldsig#\">\n <X509Certificate xmlns=\"http://www.w3.org/2000/09/xmldsig#\">MIIDBzCCAe+gAwIBAgIJAPr/Mrlc8EGhMA0GCSqGSIb3DQEBBQUAMBoxGDAWBgNVBAMMD3d3dy5leGFtcGxlLmNvbTAeFw0xNTEyMjgxOTE5NDVaFw0yNTEyMjUxOTE5NDVaMBoxGDAWBgNVBAMMD3d3dy5leGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANDoWzLos4LWxTn8Gyu2lEbl4WcelUbgLN5zYm4ron8Ahs+rvcsu2zkdD/s6jdGJI8WqJKhYK2u61ygnXgAZqC6ggtFPnBpizcDzjgND2g+aucSoUODHt67f0fQuAmupN/zp5MZysJ6IHLJnYLNpfJYk96lRz9ODnO1Mpqtr9PWxm+pz7nzq5F0vRepkgpcRxv6ufQBjlrFytccyEVdXrvFtkjXcnhVVNSR4kHuOOMS6D7pebSJ1mrCmshbD5SX1jXPBKFPAjozYX6PxqLxUx1Y4faFEf4MBBVcInyB4oURNB2s59hEEi2jq9izNE7EbEK6BY5sEhoCPl9m32zE6ljkCAwEAAaNQME4wHQYDVR0OBBYEFB9ZklC1Ork2zl56zg08ei7ss/+iMB8GA1UdIwQYMBaAFB9ZklC1Ork2zl56zg08ei7ss/+iMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBAAVoTSQ5pAirw8OR9FZ1bRSuTDhY9uxzl/OL7lUmsv2cMNeCB3BRZqm3mFt+cwN8GsH6f3uvNONIhgFpTGN5LEcXQz89zJEzB+qaHqmbFpHQl/sx2B8ezNgT/882H2IH00dXESEfy/+1gHg2pxjGnhRBN6el/gSaDiySIMKbilDrffuvxiCfbpPN0NRRiPJhd2ay9KuL/RxQRl1gl9cHaWiouWWba1bSBb2ZPhv2rPMUsFo98ntkGCObDX6Y1SpkqmoTbrsbGFsTG2DLxnvr4GdN1BSr0Uu/KV3adj47WkXVPeMYQti/bQmxQB8tRFhrw80qakTLUzreO96WzlBBMtY=</X509Certificate>\n </X509Data>\n </KeyInfo>\n </KeyDescriptor>\n <KeyDescriptor use=\"encryption\">\n <KeyInfo xmlns=\"http://www.w3.org/2000/09/xmldsig#\">\n <X509Data xmlns=\"http://www.w3.org/2000/09/xmldsig#\">\n <X509Certificate xmlns=\"http://www.w3.org/2000/09/xmldsig#\">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</X509Certificate>\n </X509Data>\n </KeyInfo>\n <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes128-cbc\"></EncryptionMethod>\n <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes192-cbc\"></EncryptionMethod>\n <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes256-cbc\"></EncryptionMethod>\n <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p\"></EncryptionMethod>\n </KeyDescriptor>\n <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>\n <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"http://localhost:8000/sso\"></SingleSignOnService>\n </IDPSSODescriptor>\n</EntityDescriptor>"),
|
|
|
|
IDPOptions: idp.Options{
|
|
|
|
IsLinkingAllowed: true,
|
|
|
|
IsCreationAllowed: true,
|
|
|
|
IsAutoCreation: true,
|
|
|
|
IsAutoUpdate: true,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
return id
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Tester) AddSAMLPostProvider(t *testing.T) string {
|
|
|
|
ctx := authz.WithInstance(context.Background(), s.Instance)
|
|
|
|
id, _, err := s.Server.Commands.AddInstanceSAMLProvider(ctx, command.SAMLProvider{
|
|
|
|
Name: "saml-idp-post",
|
|
|
|
Metadata: []byte("<EntityDescriptor xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" validUntil=\"2023-09-16T09:00:32.986Z\" cacheDuration=\"PT48H\" entityID=\"http://localhost:8000/metadata\">\n <IDPSSODescriptor xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">\n <KeyDescriptor use=\"signing\">\n <KeyInfo xmlns=\"http://www.w3.org/2000/09/xmldsig#\">\n <X509Data xmlns=\"http://www.w3.org/2000/09/xmldsig#\">\n <X509Certificate xmlns=\"http://www.w3.org/2000/09/xmldsig#\">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</X509Certificate>\n </X509Data>\n </KeyInfo>\n </KeyDescriptor>\n <KeyDescriptor use=\"encryption\">\n <KeyInfo xmlns=\"http://www.w3.org/2000/09/xmldsig#\">\n <X509Data xmlns=\"http://www.w3.org/2000/09/xmldsig#\">\n <X509Certificate xmlns=\"http://www.w3.org/2000/09/xmldsig#\">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</X509Certificate>\n </X509Data>\n </KeyInfo>\n <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes128-cbc\"></EncryptionMethod>\n <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes192-cbc\"></EncryptionMethod>\n <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes256-cbc\"></EncryptionMethod>\n <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p\"></EncryptionMethod>\n </KeyDescriptor>\n <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>\n <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"http://localhost:8000/sso\"></SingleSignOnService>\n </IDPSSODescriptor>\n</EntityDescriptor>"),
|
|
|
|
IDPOptions: idp.Options{
|
|
|
|
IsLinkingAllowed: true,
|
|
|
|
IsCreationAllowed: true,
|
|
|
|
IsAutoCreation: true,
|
|
|
|
IsAutoUpdate: true,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
return id
|
|
|
|
}
|
|
|
|
|
2023-06-21 14:06:18 +00:00
|
|
|
func (s *Tester) CreateIntent(t *testing.T, idpID string) string {
|
|
|
|
ctx := authz.WithInstance(context.Background(), s.Instance)
|
2023-08-16 11:29:57 +00:00
|
|
|
writeModel, _, err := s.Commands.CreateIntent(ctx, idpID, "https://example.com/success", "https://example.com/failure", s.Organisation.ID)
|
2023-06-21 14:06:18 +00:00
|
|
|
require.NoError(t, err)
|
2023-08-16 11:29:57 +00:00
|
|
|
return writeModel.AggregateID
|
2023-06-21 14:06:18 +00:00
|
|
|
}
|
|
|
|
|
2023-08-16 11:29:57 +00:00
|
|
|
func (s *Tester) CreateSuccessfulOAuthIntent(t *testing.T, idpID, userID, idpUserID string) (string, string, time.Time, uint64) {
|
2023-06-21 14:06:18 +00:00
|
|
|
ctx := authz.WithInstance(context.Background(), s.Instance)
|
|
|
|
intentID := s.CreateIntent(t, idpID)
|
|
|
|
writeModel, err := s.Commands.GetIntentWriteModel(ctx, intentID, s.Organisation.ID)
|
|
|
|
require.NoError(t, err)
|
|
|
|
idpUser := openid.NewUser(
|
|
|
|
&oidc.UserInfo{
|
|
|
|
Subject: idpUserID,
|
|
|
|
UserInfoProfile: oidc.UserInfoProfile{
|
|
|
|
PreferredUsername: "username",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)
|
|
|
|
idpSession := &openid.Session{
|
|
|
|
Tokens: &oidc.Tokens[*oidc.IDTokenClaims]{
|
|
|
|
Token: &oauth2.Token{
|
|
|
|
AccessToken: "accessToken",
|
|
|
|
},
|
|
|
|
IDToken: "idToken",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
token, err := s.Commands.SucceedIDPIntent(ctx, writeModel, idpUser, idpSession, userID)
|
|
|
|
require.NoError(t, err)
|
|
|
|
return intentID, token, writeModel.ChangeDate, writeModel.ProcessedSequence
|
|
|
|
}
|
2023-07-10 13:27:00 +00:00
|
|
|
|
2023-08-16 11:29:57 +00:00
|
|
|
func (s *Tester) CreateSuccessfulLDAPIntent(t *testing.T, idpID, userID, idpUserID string) (string, string, time.Time, uint64) {
|
|
|
|
ctx := authz.WithInstance(context.Background(), s.Instance)
|
|
|
|
intentID := s.CreateIntent(t, idpID)
|
|
|
|
writeModel, err := s.Commands.GetIntentWriteModel(ctx, intentID, s.Organisation.ID)
|
|
|
|
require.NoError(t, err)
|
|
|
|
username := "username"
|
|
|
|
lang := language.Make("en")
|
|
|
|
idpUser := ldap.NewUser(
|
|
|
|
idpUserID,
|
|
|
|
"",
|
|
|
|
"",
|
|
|
|
"",
|
|
|
|
"",
|
|
|
|
username,
|
|
|
|
"",
|
|
|
|
false,
|
|
|
|
"",
|
|
|
|
false,
|
|
|
|
lang,
|
|
|
|
"",
|
|
|
|
"",
|
|
|
|
)
|
|
|
|
attributes := map[string][]string{"id": {idpUserID}, "username": {username}, "language": {lang.String()}}
|
|
|
|
token, err := s.Commands.SucceedLDAPIDPIntent(ctx, writeModel, idpUser, userID, attributes)
|
|
|
|
require.NoError(t, err)
|
|
|
|
return intentID, token, writeModel.ChangeDate, writeModel.ProcessedSequence
|
|
|
|
}
|
|
|
|
|
2023-09-29 09:26:14 +00:00
|
|
|
func (s *Tester) CreateSuccessfulSAMLIntent(t *testing.T, idpID, userID, idpUserID string) (string, string, time.Time, uint64) {
|
|
|
|
ctx := authz.WithInstance(context.Background(), s.Instance)
|
|
|
|
intentID := s.CreateIntent(t, idpID)
|
|
|
|
writeModel, err := s.Server.Commands.GetIntentWriteModel(ctx, intentID, s.Organisation.ID)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
idpUser := &saml.UserMapper{
|
|
|
|
ID: idpUserID,
|
|
|
|
Attributes: map[string][]string{"attribute1": {"value1"}},
|
|
|
|
}
|
|
|
|
assertion := &crewjam_saml.Assertion{ID: "id"}
|
|
|
|
|
|
|
|
token, err := s.Server.Commands.SucceedSAMLIDPIntent(ctx, writeModel, idpUser, userID, assertion)
|
|
|
|
require.NoError(t, err)
|
|
|
|
return intentID, token, writeModel.ChangeDate, writeModel.ProcessedSequence
|
|
|
|
}
|
|
|
|
|
2023-11-06 09:48:28 +00:00
|
|
|
func (s *Tester) CreateVerifiedWebAuthNSession(t *testing.T, ctx context.Context, userID string) (id, token string, start, change time.Time) {
|
|
|
|
return s.CreateVerifiedWebAuthNSessionWithLifetime(t, ctx, userID, 0)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Tester) CreateVerifiedWebAuthNSessionWithLifetime(t *testing.T, ctx context.Context, userID string, lifetime time.Duration) (id, token string, start, change time.Time) {
|
|
|
|
var sessionLifetime *durationpb.Duration
|
|
|
|
if lifetime > 0 {
|
|
|
|
sessionLifetime = durationpb.New(lifetime)
|
|
|
|
}
|
2023-07-10 13:27:00 +00:00
|
|
|
createResp, err := s.Client.SessionV2.CreateSession(ctx, &session.CreateSessionRequest{
|
|
|
|
Checks: &session.Checks{
|
|
|
|
User: &session.CheckUser{
|
|
|
|
Search: &session.CheckUser_UserId{UserId: userID},
|
|
|
|
},
|
|
|
|
},
|
2023-08-11 15:36:18 +00:00
|
|
|
Challenges: &session.RequestChallenges{
|
|
|
|
WebAuthN: &session.RequestChallenges_WebAuthN{
|
|
|
|
Domain: s.Config.ExternalDomain,
|
|
|
|
UserVerificationRequirement: session.UserVerificationRequirement_USER_VERIFICATION_REQUIREMENT_REQUIRED,
|
|
|
|
},
|
2023-07-10 13:27:00 +00:00
|
|
|
},
|
2023-11-06 09:48:28 +00:00
|
|
|
Lifetime: sessionLifetime,
|
2023-07-10 13:27:00 +00:00
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2023-08-11 15:36:18 +00:00
|
|
|
assertion, err := s.WebAuthN.CreateAssertionResponse(createResp.GetChallenges().GetWebAuthN().GetPublicKeyCredentialRequestOptions(), true)
|
2023-07-10 13:27:00 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
updateResp, err := s.Client.SessionV2.SetSession(ctx, &session.SetSessionRequest{
|
|
|
|
SessionId: createResp.GetSessionId(),
|
|
|
|
SessionToken: createResp.GetSessionToken(),
|
|
|
|
Checks: &session.Checks{
|
2023-08-11 15:36:18 +00:00
|
|
|
WebAuthN: &session.CheckWebAuthN{
|
2023-07-10 13:27:00 +00:00
|
|
|
CredentialAssertionData: assertion,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
return createResp.GetSessionId(), updateResp.GetSessionToken(),
|
|
|
|
createResp.GetDetails().GetChangeDate().AsTime(), updateResp.GetDetails().GetChangeDate().AsTime()
|
|
|
|
}
|
2023-07-14 11:16:16 +00:00
|
|
|
|
|
|
|
func (s *Tester) CreatePasswordSession(t *testing.T, ctx context.Context, userID, password string) (id, token string, start, change time.Time) {
|
|
|
|
createResp, err := s.Client.SessionV2.CreateSession(ctx, &session.CreateSessionRequest{
|
|
|
|
Checks: &session.Checks{
|
|
|
|
User: &session.CheckUser{
|
|
|
|
Search: &session.CheckUser_UserId{UserId: userID},
|
|
|
|
},
|
|
|
|
Password: &session.CheckPassword{
|
|
|
|
Password: password,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
return createResp.GetSessionId(), createResp.GetSessionToken(),
|
|
|
|
createResp.GetDetails().GetChangeDate().AsTime(), createResp.GetDetails().GetChangeDate().AsTime()
|
|
|
|
}
|