1
0
mirror of https://github.com/bitwarden/server.git synced 2024-12-28 17:57:37 +01:00
bitwarden-server/perf/load/helpers/auth.js
2023-05-19 16:46:17 -04:00

74 lines
1.8 KiB
JavaScript

import http from "k6/http";
import { check, fail } from "k6";
import encoding from "k6/encoding";
/**
* Authenticate using OAuth against Bitwarden
* @function
* @param {string} identityUrl - Identity Server URL
* @param {string} clientHeader - X-ClientId header value
* @param {string} username - User email (password grant)
* @param {string} password - User password (password grant)
* @param {string} clientId - Client ID (client credentials grant)
* @param {string} clientSecret - Client secret (client credentials grant)
*/
export function authenticate(
identityUrl,
clientHeader,
username,
password,
clientId,
clientSecret
) {
const url = `${identityUrl}/connect/token`;
const params = {
headers: {
Accept: "application/json",
"X-ClientId": clientHeader,
},
tags: { name: "Login" },
};
const payload = {
deviceIdentifier: "a455f262-3d24-4bcd-b178-39dcd67d5c3f",
};
if (username !== null) {
payload["scope"] = "api offline_access";
payload["grant_type"] = "password";
payload["client_id"] = "web";
payload["deviceType"] = "9";
payload["deviceName"] = "chrome";
payload["username"] = username;
payload["password"] = password;
params.headers["Auth-Email"] = encoding.b64encode(username);
} else {
payload["scope"] = "api.organization";
payload["grant_type"] = "client_credentials";
payload["client_id"] = clientId;
payload["client_secret"] = clientSecret;
}
const res = http.post(url, payload, params);
if (
!check(res, {
"login status is 200": (r) => r.status === 200,
})
) {
fail("login status code was *not* 200");
}
const json = res.json();
if (
!check(json, {
"login access token is available": (j) => j.access_token !== "",
})
) {
fail("login access token was *not* available");
}
return json;
}