2021-12-06 10:50:29 +00:00
|
|
|
import LoginPage from "../support/pages/LoginPage";
|
2022-12-07 15:28:28 +00:00
|
|
|
import Masthead from "../support/pages/admin-ui/Masthead";
|
|
|
|
import ListingPage from "../support/pages/admin-ui/ListingPage";
|
|
|
|
import SidebarPage from "../support/pages/admin-ui/SidebarPage";
|
2021-12-06 10:50:29 +00:00
|
|
|
import ModalUtils from "../support/util/ModalUtils";
|
2022-02-24 10:31:46 +00:00
|
|
|
import adminClient from "../support/util/AdminClient";
|
2022-03-09 16:42:51 +00:00
|
|
|
import { keycloakBefore } from "../support/util/keycloak_hooks";
|
2022-12-07 15:28:28 +00:00
|
|
|
import SettingsTab from "../support/pages/admin-ui/manage/clients/client_details/tabs/SettingsTab";
|
2021-12-06 10:50:29 +00:00
|
|
|
|
|
|
|
const loginPage = new LoginPage();
|
|
|
|
const masthead = new Masthead();
|
|
|
|
const sidebarPage = new SidebarPage();
|
|
|
|
const listingPage = new ListingPage();
|
|
|
|
const modalUtils = new ModalUtils();
|
|
|
|
|
|
|
|
describe("Clients SAML tests", () => {
|
|
|
|
describe("SAML test", () => {
|
|
|
|
const samlClientName = "saml";
|
|
|
|
|
|
|
|
before(() => {
|
2022-02-24 10:31:46 +00:00
|
|
|
adminClient.createClient({
|
2021-12-06 10:50:29 +00:00
|
|
|
protocol: "saml",
|
|
|
|
clientId: samlClientName,
|
|
|
|
publicClient: false,
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
after(() => {
|
2022-02-24 10:31:46 +00:00
|
|
|
adminClient.deleteClient(samlClientName);
|
2021-12-06 10:50:29 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
beforeEach(() => {
|
2023-02-10 10:10:35 +00:00
|
|
|
loginPage.logIn();
|
|
|
|
keycloakBefore();
|
2021-12-06 10:50:29 +00:00
|
|
|
sidebarPage.goToClients();
|
|
|
|
listingPage.searchItem(samlClientName).goToItemDetails(samlClientName);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should display the saml sections on details screen", () => {
|
|
|
|
cy.get(".pf-c-jump-links__list").should(($ul) => {
|
|
|
|
expect($ul)
|
|
|
|
.to.contain("SAML capabilities")
|
|
|
|
.to.contain("Signature and Encryption");
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should save force name id format", () => {
|
|
|
|
cy.get(".pf-c-jump-links__list").contains("SAML capabilities").click();
|
|
|
|
|
|
|
|
cy.findByTestId("forceNameIdFormat").click({
|
|
|
|
force: true,
|
|
|
|
});
|
|
|
|
cy.findByTestId("settingsSave").click();
|
|
|
|
masthead.checkNotificationMessage("Client successfully updated");
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
describe("SAML keys tab", () => {
|
|
|
|
const clientId = "saml-keys";
|
|
|
|
|
|
|
|
before(() => {
|
2022-02-24 10:31:46 +00:00
|
|
|
adminClient.createClient({
|
2021-12-06 10:50:29 +00:00
|
|
|
clientId,
|
|
|
|
protocol: "saml",
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
after(() => {
|
2022-02-24 10:31:46 +00:00
|
|
|
adminClient.deleteClient(clientId);
|
2021-12-06 10:50:29 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
beforeEach(() => {
|
2023-02-10 10:10:35 +00:00
|
|
|
loginPage.logIn();
|
|
|
|
keycloakBefore();
|
2021-12-06 10:50:29 +00:00
|
|
|
sidebarPage.goToClients();
|
|
|
|
listingPage.searchItem(clientId).goToItemDetails(clientId);
|
2022-01-31 07:20:35 +00:00
|
|
|
cy.findByTestId("keysTab").click();
|
2021-12-06 10:50:29 +00:00
|
|
|
});
|
|
|
|
|
2022-08-12 10:52:41 +00:00
|
|
|
it("should doesn't disable signature when cancel", () => {
|
2021-12-06 10:50:29 +00:00
|
|
|
cy.findByTestId("clientSignature").click({ force: true });
|
|
|
|
|
|
|
|
modalUtils
|
|
|
|
.checkModalTitle('Disable "Client signature required"')
|
|
|
|
.cancelModal();
|
|
|
|
|
|
|
|
cy.findAllByTestId("certificate").should("have.length", 1);
|
|
|
|
});
|
|
|
|
|
2022-08-19 11:57:25 +00:00
|
|
|
it("should disable client signature", () => {
|
2022-02-02 11:44:52 +00:00
|
|
|
cy.intercept(
|
2022-03-06 15:25:37 +00:00
|
|
|
"admin/realms/master/clients/*/certificates/saml.signing"
|
2022-02-02 11:44:52 +00:00
|
|
|
).as("load");
|
2021-12-06 10:50:29 +00:00
|
|
|
cy.findByTestId("clientSignature").click({ force: true });
|
|
|
|
|
|
|
|
modalUtils
|
|
|
|
.checkModalTitle('Disable "Client signature required"')
|
|
|
|
.confirmModal();
|
|
|
|
|
|
|
|
masthead.checkNotificationMessage("Client successfully updated");
|
|
|
|
cy.findAllByTestId("certificate").should("have.length", 0);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should enable Encryption keys config", () => {
|
|
|
|
cy.findByTestId("encryptAssertions").click({ force: true });
|
|
|
|
|
|
|
|
cy.findByTestId("generate").click();
|
|
|
|
masthead.checkNotificationMessage(
|
|
|
|
"New key pair and certificate generated successfully"
|
|
|
|
);
|
|
|
|
|
|
|
|
modalUtils.confirmModal();
|
|
|
|
cy.findAllByTestId("certificate").should("have.length", 1);
|
|
|
|
});
|
|
|
|
});
|
2022-11-10 13:40:37 +00:00
|
|
|
|
|
|
|
describe("SAML settings tab", () => {
|
|
|
|
const clientId = "saml-settings";
|
|
|
|
const settingsTab = new SettingsTab();
|
|
|
|
|
|
|
|
before(() => {
|
|
|
|
adminClient.createClient({
|
|
|
|
clientId,
|
|
|
|
protocol: "saml",
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
after(() => {
|
|
|
|
adminClient.deleteClient(clientId);
|
|
|
|
});
|
|
|
|
|
|
|
|
beforeEach(() => {
|
2023-02-10 10:10:35 +00:00
|
|
|
loginPage.logIn();
|
|
|
|
keycloakBefore();
|
2022-11-10 13:40:37 +00:00
|
|
|
sidebarPage.goToClients();
|
|
|
|
listingPage.searchItem(clientId).goToItemDetails(clientId);
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should check SAML capabilities", () => {
|
|
|
|
cy.get(".pf-c-jump-links__list").contains("SAML capabilities").click();
|
|
|
|
|
|
|
|
settingsTab.assertNameIdFormatDropdown();
|
|
|
|
settingsTab.assertSAMLCapabilitiesSwitches();
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should check signature and encryption", () => {
|
|
|
|
cy.get(".pf-c-jump-links__list")
|
|
|
|
.contains("Signature and Encryption")
|
|
|
|
.click();
|
|
|
|
|
|
|
|
settingsTab.assertSignatureAlgorithmDropdown();
|
|
|
|
settingsTab.assertSignatureKeyNameDropdown();
|
|
|
|
settingsTab.assertCanonicalizationDropdown();
|
|
|
|
|
|
|
|
settingsTab.assertSignatureEncryptionSwitches();
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should check access settings", () => {
|
|
|
|
cy.get(".pf-c-jump-links__list").contains("Access settings").click();
|
|
|
|
|
|
|
|
const validUrl =
|
|
|
|
"http://localhost:8180/realms/master/protocol/" +
|
|
|
|
clientId +
|
|
|
|
"/clients/";
|
|
|
|
const rootUrlError =
|
|
|
|
"Client could not be updated: Root URL is not a valid URL";
|
|
|
|
const homeUrlError =
|
|
|
|
"Client could not be updated: Base URL is not a valid URL";
|
|
|
|
|
|
|
|
cy.get("#kc-root-url").type("Invalid URL");
|
|
|
|
settingsTab.clickSaveBtn();
|
|
|
|
masthead.checkNotificationMessage(rootUrlError);
|
|
|
|
cy.get("#kc-root-url").clear();
|
|
|
|
|
|
|
|
cy.get("#kc-home-url").type("Invalid URL");
|
|
|
|
settingsTab.clickSaveBtn();
|
|
|
|
masthead.checkNotificationMessage(homeUrlError);
|
|
|
|
cy.get("#kc-home-url").clear();
|
|
|
|
|
|
|
|
cy.get("#kc-root-url").type(validUrl);
|
|
|
|
cy.get("#kc-home-url").type(validUrl);
|
|
|
|
settingsTab.clickSaveBtn();
|
|
|
|
masthead.checkNotificationMessage("Client successfully updated");
|
|
|
|
|
|
|
|
settingsTab.assertAccessSettings();
|
|
|
|
});
|
|
|
|
|
|
|
|
it("should check login settings", () => {
|
|
|
|
cy.get(".pf-c-jump-links__list").contains("Login settings").click();
|
|
|
|
|
|
|
|
settingsTab.assertLoginThemeDropdown();
|
|
|
|
settingsTab.assertLoginSettings();
|
|
|
|
});
|
|
|
|
});
|
2023-03-22 16:14:53 +00:00
|
|
|
|
|
|
|
describe("Accessibility tests for clients saml", () => {
|
|
|
|
beforeEach(() => {
|
|
|
|
loginPage.logIn();
|
|
|
|
keycloakBefore();
|
|
|
|
sidebarPage.goToClients();
|
|
|
|
cy.injectAxe();
|
|
|
|
});
|
|
|
|
|
|
|
|
it("Check a11y violations on load/ clients saml", () => {
|
|
|
|
const samlClient = "saml";
|
|
|
|
adminClient.createClient({
|
|
|
|
clientId: "saml",
|
|
|
|
protocol: samlClient,
|
|
|
|
});
|
|
|
|
listingPage.searchItem(samlClient).goToItemDetails(samlClient);
|
|
|
|
cy.checkA11y();
|
|
|
|
|
|
|
|
adminClient.deleteClient(samlClient);
|
|
|
|
});
|
|
|
|
});
|
2021-12-06 10:50:29 +00:00
|
|
|
});
|