KEYCLOAK-4569 SSSDTest rewrited to be usable in different enviroments

This commit is contained in:
Pavel Drozd 2017-03-01 11:22:12 +01:00
parent 063f5303dd
commit f32fc99e80
2 changed files with 108 additions and 64 deletions

View file

@ -0,0 +1,13 @@
usernames=emily
user.emily.password=emily123
user.emily.firstname=Emily
user.emily.lastname=Jones
user.emily.mail=emily@jones.com
user.emily.groups=ipausers,testgroup
user.disabled=david
user.david.password=david123
user.noemail=bart
user.bart.password=bart123
user.admin=admin
user.admin.password=password

View file

@ -1,9 +1,22 @@
package org.keycloak.testsuite.sssd; package org.keycloak.testsuite.sssd;
import java.io.IOException;
import java.io.InputStream;
import java.util.Arrays;
import java.util.List;
import javax.ws.rs.core.Response;
import org.apache.commons.configuration.ConfigurationException;
import org.apache.commons.configuration.PropertiesConfiguration;
import org.jboss.arquillian.graphene.page.Page; import org.jboss.arquillian.graphene.page.Page;
import org.jboss.logging.Logger;
import org.junit.Assume;
import org.junit.Before; import org.junit.Before;
import org.junit.BeforeClass;
import org.junit.Rule; import org.junit.Rule;
import org.junit.Test; import org.junit.Test;
import org.keycloak.common.constants.GenericConstants;
import org.keycloak.common.util.MultivaluedHashMap; import org.keycloak.common.util.MultivaluedHashMap;
import org.keycloak.representations.idm.ComponentRepresentation; import org.keycloak.representations.idm.ComponentRepresentation;
import org.keycloak.representations.idm.GroupRepresentation; import org.keycloak.representations.idm.GroupRepresentation;
@ -17,27 +30,24 @@ import org.keycloak.testsuite.admin.ApiUtil;
import org.keycloak.testsuite.pages.AccountPasswordPage; import org.keycloak.testsuite.pages.AccountPasswordPage;
import org.keycloak.testsuite.pages.AccountUpdateProfilePage; import org.keycloak.testsuite.pages.AccountUpdateProfilePage;
import org.keycloak.testsuite.pages.LoginPage; import org.keycloak.testsuite.pages.LoginPage;
import org.keycloak.testsuite.util.LDAPTestConfiguration;
import javax.ws.rs.core.Response; import com.beust.jcommander.internal.Lists;
import java.util.List;
public class SSSDTest extends AbstractKeycloakTest { public class SSSDTest extends AbstractKeycloakTest {
private static final Logger log = Logger.getLogger(SSSDTest.class);
private static final String DISPLAY_NAME = "Test user federation"; private static final String DISPLAY_NAME = "Test user federation";
private static final String PROVIDER_NAME = "sssd"; private static final String PROVIDER_NAME = "sssd";
private static final String REALM_NAME = "test"; private static final String REALM_NAME = "test";
private static final String USERNAME = "emily"; private static final String sssdConfigPath = "sssd/sssd.properties";
private static final String PASSWORD = "emily123";
private static final String DISABLED_USER = "david";
private static final String DISABLED_USER_PASSWORD = "david123";
private static final String NO_EMAIL_USER = "bart";
private static final String NO_EMAIL_USER_PASSWORD = "bart123";
private static final String DEFINITELY_NOT_PASSWORD = "not" + PASSWORD; private static final String DISABLED_USER = "disabled";
private static final String NO_EMAIL_USER = "noemail";
private static final String ADMIN_USERNAME = "admin"; private static final String ADMIN_USER = "admin";
private static final String ADMIN_PASSWORD = "password"; private static PropertiesConfiguration sssdConfig;
@Page @Page
protected LoginPage accountLoginPage; protected LoginPage accountLoginPage;
@ -63,6 +73,15 @@ public class SSSDTest extends AbstractKeycloakTest {
testRealms.add(realm); testRealms.add(realm);
} }
@BeforeClass
public static void loadSSSDConfiguration() throws ConfigurationException {
log.info("Reading SSSD configuration from classpath from: " + sssdConfigPath);
InputStream is = SSSDTest.class.getClassLoader().getResourceAsStream(sssdConfigPath);
sssdConfig = new PropertiesConfiguration();
sssdConfig.load(is);
sssdConfig.setListDelimiter(',');
}
@Before @Before
public void createUserFederation() { public void createUserFederation() {
ComponentRepresentation userFederation = new ComponentRepresentation(); ComponentRepresentation userFederation = new ComponentRepresentation();
@ -81,34 +100,38 @@ public class SSSDTest extends AbstractKeycloakTest {
} }
@Test @Test
public void testWrongUser() { public void testInvalidPassword() {
log.debug("Testing wrong password for user " + USERNAME); String username = getUsername();
log.debug("Testing invalid password for user " + username);
driver.navigate().to(getAccountUrl()); profilePage.open();
Assert.assertEquals("Browser should be on login page now", "Log in to " + REALM_NAME, driver.getTitle()); Assert.assertEquals("Browser should be on login page now", "Log in to " + REALM_NAME, driver.getTitle());
accountLoginPage.login(USERNAME, DEFINITELY_NOT_PASSWORD); accountLoginPage.login(username, "invalid-password");
Assert.assertEquals("Invalid username or password.", accountLoginPage.getError()); Assert.assertEquals("Invalid username or password.", accountLoginPage.getError());
} }
@Test @Test
public void testDisabledUser() { public void testDisabledUser() {
log.debug("Testing disabled user " + USERNAME); String username = getUser(DISABLED_USER);
Assume.assumeTrue("Ignoring test no disabled user configured", username != null);
log.debug("Testing disabled user " + username);
driver.navigate().to(getAccountUrl()); profilePage.open();
Assert.assertEquals("Browser should be on login page now", "Log in to " + REALM_NAME, driver.getTitle()); Assert.assertEquals("Browser should be on login page now", "Log in to " + REALM_NAME, driver.getTitle());
accountLoginPage.login(DISABLED_USER, DISABLED_USER_PASSWORD); accountLoginPage.login(username, getPassword(username));
Assert.assertEquals("Invalid username or password.", accountLoginPage.getError()); Assert.assertEquals("Invalid username or password.", accountLoginPage.getError());
} }
@Test @Test
public void testAdmin() { public void testAdmin() {
log.debug("Testing password for user " + ADMIN_USERNAME); String username = getUser(ADMIN_USER);
Assume.assumeTrue("Ignoring test no admin user configured", username != null);
log.debug("Testing password for user " + username);
driver.navigate().to(getAccountUrl()); profilePage.open();
Assert.assertEquals("Browser should be on login page now", "Log in to " + REALM_NAME, driver.getTitle()); Assert.assertEquals("Browser should be on login page now", "Log in to " + REALM_NAME, driver.getTitle());
accountLoginPage.login(ADMIN_USERNAME, ADMIN_PASSWORD); accountLoginPage.login(username, getPassword(username));
Assert.assertTrue(profilePage.isCurrent()); Assert.assertTrue(profilePage.isCurrent());
} }
@ -116,20 +139,23 @@ public class SSSDTest extends AbstractKeycloakTest {
public void testExistingUserLogIn() { public void testExistingUserLogIn() {
log.debug("Testing correct password"); log.debug("Testing correct password");
driver.navigate().to(getAccountUrl()); for (String username : getUsernames()) {
profilePage.open();
Assert.assertEquals("Browser should be on login page now", "Log in to " + REALM_NAME, driver.getTitle()); Assert.assertEquals("Browser should be on login page now", "Log in to " + REALM_NAME, driver.getTitle());
accountLoginPage.login(USERNAME, PASSWORD); accountLoginPage.login(username, getPassword(username));
Assert.assertTrue(profilePage.isCurrent()); Assert.assertTrue(profilePage.isCurrent());
testUserGroups(); verifyUserGroups(username, getGroups(username));
profilePage.logout();
}
} }
@Test @Test
public void testExistingUserWithNoEmailLogIn() { public void testExistingUserWithNoEmailLogIn() {
log.debug("Testing correct password, but no e-mail provided"); log.debug("Testing correct password, but no e-mail provided");
String username = getUser(NO_EMAIL_USER);
driver.navigate().to(getAccountUrl()); profilePage.open();
Assert.assertEquals("Browser should be on login page now", "Log in to " + REALM_NAME, driver.getTitle()); Assert.assertEquals("Browser should be on login page now", "Log in to " + REALM_NAME, driver.getTitle());
accountLoginPage.login(NO_EMAIL_USER, NO_EMAIL_USER_PASSWORD); accountLoginPage.login(username, getPassword(username));
Assert.assertTrue(profilePage.isCurrent()); Assert.assertTrue(profilePage.isCurrent());
} }
@ -137,11 +163,13 @@ public class SSSDTest extends AbstractKeycloakTest {
public void testDeleteSSSDFederationProvider() { public void testDeleteSSSDFederationProvider() {
log.debug("Testing correct password"); log.debug("Testing correct password");
driver.navigate().to(getAccountUrl()); profilePage.open();
String username = getUsername();
Assert.assertEquals("Browser should be on login page now", "Log in to " + REALM_NAME, driver.getTitle()); Assert.assertEquals("Browser should be on login page now", "Log in to " + REALM_NAME, driver.getTitle());
accountLoginPage.login(USERNAME, PASSWORD); accountLoginPage.login(username, getPassword(username));
Assert.assertTrue(profilePage.isCurrent()); Assert.assertTrue(profilePage.isCurrent());
testUserGroups(); verifyUserGroups(username, getGroups(username));
int componentsListSize = adminClient.realm(REALM_NAME).components().query().size(); int componentsListSize = adminClient.realm(REALM_NAME).components().query().size();
adminClient.realm(REALM_NAME).components().component(SSSDFederationID).remove(); adminClient.realm(REALM_NAME).components().component(SSSDFederationID).remove();
Assert.assertEquals(componentsListSize - 1, adminClient.realm(REALM_NAME).components().query().size()); Assert.assertEquals(componentsListSize - 1, adminClient.realm(REALM_NAME).components().query().size());
@ -151,13 +179,14 @@ public class SSSDTest extends AbstractKeycloakTest {
@Test @Test
public void changeReadOnlyProfile() throws Exception { public void changeReadOnlyProfile() throws Exception {
String username = getUsername();
profilePage.open(); profilePage.open();
accountLoginPage.login(USERNAME, PASSWORD); accountLoginPage.login(username, getPassword(username));
Assert.assertEquals("emily", profilePage.getUsername()); Assert.assertEquals(username, profilePage.getUsername());
Assert.assertEquals("Emily", profilePage.getFirstName()); Assert.assertEquals(sssdConfig.getProperty("user." + username + ".firstname"), profilePage.getFirstName());
Assert.assertEquals("Jones", profilePage.getLastName()); Assert.assertEquals(sssdConfig.getProperty("user." + username + ".lastname"), profilePage.getLastName());
Assert.assertEquals("emily@jones.com", profilePage.getEmail()); Assert.assertEquals(sssdConfig.getProperty("user." + username + ".mail"), profilePage.getEmail());
profilePage.updateProfile("New first", "New last", "new@email.com"); profilePage.updateProfile("New first", "New last", "new@email.com");
@ -166,41 +195,43 @@ public class SSSDTest extends AbstractKeycloakTest {
@Test @Test
public void changeReadOnlyPassword() { public void changeReadOnlyPassword() {
String username = getUsername();
changePasswordPage.open(); changePasswordPage.open();
accountLoginPage.login(USERNAME, PASSWORD); accountLoginPage.login(username, getPassword(username));
changePasswordPage.changePassword(PASSWORD, "new-password", "new-password"); changePasswordPage.changePassword(getPassword(username), "new-password", "new-password");
Assert.assertEquals("You can't update your password as your account is read only.", profilePage.getError()); Assert.assertEquals("You can't update your password as your account is read only.", profilePage.getError());
} }
private void verifyUserGroups(String username, List<String> groups) {
private void testUserGroups() { List<UserRepresentation> users = adminClient.realm(REALM_NAME).users().search(username, 0, 1);
log.debug("Testing user groups");
List<UserRepresentation> users = adminClient.realm(REALM_NAME).users().search(USERNAME, 0, 1);
Assert.assertTrue("There must be at least one user", users.size() > 0); Assert.assertTrue("There must be at least one user", users.size() > 0);
Assert.assertEquals("Exactly our test user", USERNAME, users.get(0).getUsername()); Assert.assertEquals("Exactly our test user", username, users.get(0).getUsername());
List<GroupRepresentation> assignedGroups = adminClient.realm(REALM_NAME).users().get(users.get(0).getId()).groups();
Assert.assertEquals("User must have exactly " + groups.size() + " groups", groups.size(), assignedGroups.size());
List<GroupRepresentation> groups = adminClient.realm(REALM_NAME).users().get(users.get(0).getId()).groups(); for (GroupRepresentation group : assignedGroups) {
Assert.assertTrue(groups.contains(group.getName()));
Assert.assertEquals("User must have exactly two groups", 2, groups.size());
boolean wrongGroup = false;
for (GroupRepresentation group : groups) {
if (!group.getName().equalsIgnoreCase("ipausers") && !group.getName().equalsIgnoreCase("testgroup")) {
wrongGroup = true;
break;
} }
} }
Assert.assertFalse("There exists some wrong group", wrongGroup); private String getUsername() {
return sssdConfig.getStringArray("usernames")[0];
} }
private String getAccountUrl() { private String getUser(String type) {
return getAuthRoot() + "/auth/realms/" + REALM_NAME + "/account"; return sssdConfig.getString("user." + type);
} }
private String getAuthRoot() { private List<String> getUsernames() {
return suiteContext.getAuthServerInfo().getContextRoot().toString(); return Lists.newArrayList(sssdConfig.getStringArray("usernames"));
}
private String getPassword(String username) {
return sssdConfig.getString("user." + username + ".password");
}
private List<String> getGroups(String username) {
return Lists.newArrayList(sssdConfig.getStringArray("user." + username + ".groups"));
} }
} }