mirror of
https://github.com/hasura/graphql-engine.git
synced 2024-12-21 14:31:55 +03:00
c2cb07f7e8
We use a helper service to start a webhook-based authentication service for some tests. This moves the initialization of the service out of _test-server.sh_ and into the Python test harness, as a fixture. In order to do this, I had to make a few changes. The main deviation is that we no longer run _all_ tests against an HGE with this authentication service, just a few (those in _test_webhook.py_). Because this reduced coverage, I have added some more tests there, which actually cover some areas not exacerbated elsewhere (mainly trying to use webhook credentials to talk to an admin-only endpoint). The webhook service can run both with and without TLS, and decide whether it's necessary to skip one of these based on the arguments passed and how HGE is started, according to the following logic: * If a TLS CA certificate is passed in, it will run with TLS, otherwise it will skip it. * If HGE was started externally and a TLS certificate is provided, it will skip running without TLS, as it will assume that HGE was configured to talk to a webhook over HTTPS. * Some tests should only be run with TLS; this is marked with a `tls_webhook_server` marker. * Some tests should only be run _without_ TLS; this is marked with a `no_tls_webhook_server` marker. The actual parameterization of the webhook service configuration is done through test subclasses, because normal pytest parameterization doesn't work with the `hge_fixture_env` hack that we use. Because `hge_fixture_env` is not a sanctioned way of conveying data between fixtures (and, unfortunately, there isn't a sanctioned way of doing this when the fixtures in question may not know about each other directly), parameterizing the `webhook_server` fixture doesn't actually parameterize `hge_server` properly. Subclassing forces this to work correctly. The certificate generation is moved to a Python fixture, so that we don't have to revoke the CA certificate for _test_webhook_insecure.py_; we can just generate a bogus certificate instead. The CA certificate is still generated in the _test-server.sh_ script, as it needs to be installed into the OS certificate store. Interestingly, the CA certificate installation wasn't actually working, because the certificates were written to the wrong location. This didn't cause any failures, as we weren't actually testing this behavior. This is now fixed with the other changes. PR-URL: https://github.com/hasura/graphql-engine-mono/pull/6363 GitOrigin-RevId: 0f277d374daa64f657257ed2a4c2057c74b911db
56 lines
1.9 KiB
Python
56 lines
1.9 KiB
Python
#!/usr/bin/env python
|
|
"""
|
|
Webhook for GraphQL engine
|
|
For successful authentication
|
|
1) Add header X-Hasura-Auth-From: webhook to the list of headers
|
|
2) Base64 encode the required headers (including X-Hasura-Auth-From)
|
|
3) Pass it as the bearer token with the Authorization header
|
|
"""
|
|
import base64
|
|
import json
|
|
import ssl
|
|
import http.server
|
|
import traceback
|
|
import sys
|
|
|
|
class Handler(http.server.BaseHTTPRequestHandler):
|
|
|
|
|
|
def handle_headers(self, headers):
|
|
if 'Authorization' in headers:
|
|
auth = headers['Authorization']
|
|
h = dict()
|
|
if auth.startswith("Bearer "):
|
|
try:
|
|
h = json.loads(base64.b64decode(auth[7:]).decode("utf-8"))
|
|
if h.get('X-Hasura-Auth-Mode') == 'webhook':
|
|
print (h)
|
|
self.send_response(200)
|
|
self.send_header('Content-Type', 'application/json')
|
|
self.end_headers()
|
|
self.wfile.write(json.dumps(h).encode('utf-8'))
|
|
else:
|
|
print ('forbidden')
|
|
self.send_response(401)
|
|
self.end_headers()
|
|
self.wfile.write(b'{}')
|
|
except Exception as e:
|
|
print ('forbidden')
|
|
self.send_response(401)
|
|
self.end_headers()
|
|
print("type error: " + str(e))
|
|
print(traceback.format_exc())
|
|
else:
|
|
self.send_response(401)
|
|
self.end_headers()
|
|
print ('forbidden')
|
|
|
|
def do_GET(self):
|
|
self.handle_headers(self.headers)
|
|
|
|
def do_POST(self):
|
|
content_len = self.headers.get('Content-Length')
|
|
req_body = self.rfile.read(int(content_len)).decode("utf-8")
|
|
req_json = json.loads(req_body)
|
|
self.handle_headers(req_json.get('headers', {}))
|