Skip to content
Snippets Groups Projects
Commit a40d886d authored by Jenkins for Software Heritage's avatar Jenkins for Software Heritage
Browse files

Update upstream source from tag 'debian/upstream/0.2.0'

Update to upstream version '0.2.0'
with Debian dir f40d03f6488801d3ed5b091ce82679b973dcba79
parents 6e654f77 c062e69e
No related branches found
No related tags found
No related merge requests found
Metadata-Version: 2.1
Name: swh.auth
Version: 0.1.0
Summary: Software Heritage Authentication
Version: 0.2.0
Summary: Software Heritage Authentication Utilities
Home-page: https://forge.softwareheritage.org/source/swh-auth/
Author: Software Heritage developers
Author-email: swh-devel@inria.fr
......
#!/usr/bin/env python3
# Copyright (C) 2019-2020 The Software Heritage developers
# Copyright (C) 2019-2021 The Software Heritage developers
# See the AUTHORS file at the top-level directory of this distribution
# License: GNU General Public License version 3, or any later version
# See top-level LICENSE file for more information
......@@ -16,31 +16,29 @@ with open(path.join(here, "README.md"), encoding="utf-8") as f:
long_description = f.read()
def parse_requirements(name=None):
if name:
reqf = "requirements-%s.txt" % name
else:
reqf = "requirements.txt"
def parse_requirements(*names):
requirements = []
if not path.exists(reqf):
return requirements
for name in names:
if name:
reqf = "requirements-%s.txt" % name
else:
reqf = "requirements.txt"
if not path.exists(reqf):
return requirements
with open(reqf) as f:
for line in f.readlines():
line = line.strip()
if not line or line.startswith("#"):
continue
requirements.append(line)
with open(reqf) as f:
for line in f.readlines():
line = line.strip()
if not line or line.startswith("#"):
continue
requirements.append(line)
return requirements
# Edit this part to match your module.
# Full sample:
# https://forge.softwareheritage.org/diffusion/DCORE/browse/master/setup.py
setup(
name="swh.auth",
description="Software Heritage Authentication",
description="Software Heritage Authentication Utilities",
long_description=long_description,
long_description_content_type="text/markdown",
python_requires=">=3.7",
......@@ -48,7 +46,7 @@ setup(
author_email="swh-devel@inria.fr",
url="https://forge.softwareheritage.org/source/swh-auth/",
packages=find_packages(), # packages's modules
install_requires=parse_requirements() + parse_requirements("swh"),
install_requires=parse_requirements(None, "swh"),
tests_require=parse_requirements("test"),
setup_requires=["setuptools-scm"],
use_scm_version=True,
......
Metadata-Version: 2.1
Name: swh.auth
Version: 0.1.0
Summary: Software Heritage Authentication
Version: 0.2.0
Summary: Software Heritage Authentication Utilities
Home-page: https://forge.softwareheritage.org/source/swh-auth/
Author: Software Heritage developers
Author-email: swh-devel@inria.fr
......
......@@ -8,6 +8,8 @@ from urllib.parse import urlencode
from keycloak import KeycloakOpenID
from swh.core.config import load_from_envvar
class KeycloakOpenIDConnect:
"""
......@@ -158,3 +160,43 @@ class KeycloakOpenIDConnect:
A dictionary fillled with user information
"""
return self._keycloak.userinfo(access_token)
@classmethod
def from_config(cls, **kwargs: Any) -> "KeycloakOpenIDConnect":
"""Instantiate a KeycloakOpenIDConnect class from a configuration dict.
Args:
kwargs: configuration dict for the instance, with one keycloak key, whose
value is a Dict with the following keys:
- server_url: URL of the Keycloak server
- realm_name: The realm name
- client_id: The OpenID Connect client identifier
Returns:
the KeycloakOpenIDConnect instance
"""
cfg = kwargs["keycloak"]
return cls(
server_url=cfg["server_url"],
realm_name=cfg["realm_name"],
client_id=cfg["client_id"],
)
@classmethod
def from_configfile(cls, **kwargs: Any) -> "KeycloakOpenIDConnect":
"""Instantiate a KeycloakOpenIDConnect class from the configuration loaded from the
SWH_CONFIG_FILENAME envvar, with potential extra keyword arguments if their
value is not None.
Args:
kwargs: kwargs passed to instantiation call
Returns:
the KeycloakOpenIDConnect instance
"""
config = dict(load_from_envvar()).get("keycloak", {})
config.update({k: v for k, v in kwargs.items() if v is not None})
return cls.from_config(keycloak=config)
......@@ -4,11 +4,14 @@
# See top-level LICENSE file for more information
from copy import copy
import os
from urllib.parse import parse_qs, urlparse
from keycloak.exceptions import KeycloakError
import pytest
import yaml
from swh.auth.keycloak import KeycloakOpenIDConnect
from swh.auth.pytest_plugin import keycloak_mock_factory
from swh.auth.tests.sample_data import (
CLIENT_ID,
......@@ -18,6 +21,7 @@ from swh.auth.tests.sample_data import (
SERVER_URL,
USER_INFO,
)
from swh.core.config import read
# Make keycloak fixture to use for tests below.
keycloak_mock = keycloak_mock_factory(
......@@ -98,3 +102,63 @@ def test_keycloak_decode_token(keycloak_mock):
def test_keycloak_login(keycloak_mock):
actual_response = keycloak_mock.login("username", "password")
assert actual_response == OIDC_PROFILE
@pytest.fixture
def auth_config():
return {
"keycloak": {
"server_url": "https://auth.swh.org/SWHTest",
"realm_name": "SWHTest",
"client_id": "client_id",
}
}
@pytest.fixture
def auth_config_path(tmp_path, monkeypatch, auth_config):
conf_path = os.path.join(tmp_path, "auth.yml")
with open(conf_path, "w") as f:
f.write(yaml.dump(auth_config))
monkeypatch.setenv("SWH_CONFIG_FILENAME", conf_path)
return conf_path
def test_auth_KeycloakOpenIDConnect_from_config(auth_config):
"""Instantiating keycloak client out of configuration dict is possible
"""
client = KeycloakOpenIDConnect.from_config(**auth_config)
assert client.server_url == auth_config["keycloak"]["server_url"]
assert client.realm_name == auth_config["keycloak"]["realm_name"]
assert client.client_id == auth_config["keycloak"]["client_id"]
def test_auth_KeycloakOpenIDConnect_from_configfile(auth_config_path, monkeypatch):
"""Instantiating keycloak client out of environment variable is possible
"""
client = KeycloakOpenIDConnect.from_configfile()
auth_config = read(auth_config_path)
assert client.server_url == auth_config["keycloak"]["server_url"]
assert client.realm_name == auth_config["keycloak"]["realm_name"]
assert client.client_id == auth_config["keycloak"]["client_id"]
def test_auth_KeycloakOpenIDConnect_from_configfile_override(
auth_config_path, monkeypatch
):
"""Instantiating keycloak client out of environment variable is possible
And caller can override the configuration at calling
"""
client = KeycloakOpenIDConnect.from_configfile(client_id="foobar")
auth_config = read(auth_config_path)
assert client.server_url == auth_config["keycloak"]["server_url"]
assert client.realm_name == auth_config["keycloak"]["realm_name"]
assert client.client_id == "foobar"
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment