AAE-22865 - Fixing webdriver version used and installed (#9749)

* Fixing webdriver version used and installed

* Fixing webdriver selenium version

* Disabling Code flow for grant password auth

* Removing the install from the script as it's done in the postinstall now

* It's funny how this tests work

* Having codeflow disabled by default

* Checking if Core tests pass

* Refreshing as SSO button is broken after clicking apply
This commit is contained in:
Vito Albano
2024-05-30 16:36:48 +01:00
committed by GitHub
parent a1555074a7
commit 6bdfd83dac
10 changed files with 249 additions and 133 deletions

View File

@@ -81,6 +81,8 @@ describe('SSO in ADF using ACS and AIS, Download Directive, Viewer, DocumentList
browser.params.testConfig.appConfig.oauth2.clientId
);
await browser.refresh();
await loginSsoPage.loginSSOIdentityService(acsUser.username, acsUser.password);
await navigationBarPage.navigateToContentServices();

View File

@@ -21,7 +21,6 @@ import { NavigationBarPage } from '../../../core/pages/navigation-bar.page';
import { LoginShellPage } from '../../../core/pages/login-shell.page';
describe('Login component - SSO', () => {
const settingsPage = new SettingsPage();
const loginSSOPage = new LoginPage();
const loginPage = new LoginShellPage();
@@ -36,15 +35,22 @@ describe('Login component - SSO', () => {
});
it('[C261050] Should be possible login with SSO', async () => {
await settingsPage.setProviderEcmSso(browser.params.testConfig.appConfig.ecmHost,
await settingsPage.setProviderEcmSso(
browser.params.testConfig.appConfig.ecmHost,
browser.params.testConfig.appConfig.oauth2.host,
browser.params.testConfig.appConfig.identityHost,
false,
true,
browser.params.testConfig.appConfig.oauth2.clientId,
browser.params.testConfig.appConfig.oauth2.redirectUriLogout);
browser.params.testConfig.appConfig.oauth2.redirectUriLogout
);
await loginSSOPage.loginSSOIdentityService(browser.params.testConfig.users.admin.username, browser.params.testConfig.users.admin.password);
await browser.refresh();
await loginSSOPage.loginSSOIdentityService(
browser.params.testConfig.users.admin.username,
browser.params.testConfig.users.admin.password
);
});
it('[C280667] Should be redirect directly to keycloak without show the login page with silent login', async () => {
@@ -55,22 +61,31 @@ describe('Login component - SSO', () => {
true,
true,
browser.params.testConfig.appConfig.oauth2.clientId,
browser.params.testConfig.appConfig.oauth2.redirectUriLogout);
browser.params.testConfig.appConfig.oauth2.redirectUriLogout
);
await loginSSOPage.loginSSOIdentityService(browser.params.testConfig.users.admin.username, browser.params.testConfig.users.admin.password);
await browser.refresh();
await loginSSOPage.loginSSOIdentityService(
browser.params.testConfig.users.admin.username,
browser.params.testConfig.users.admin.password
);
});
});
describe('Login component - SSO Grant type password (implicit flow false)', () => {
it('[C299158] Should be possible to login with SSO, with grant type password (Implicit Flow false)', async () => {
await settingsPage.setProviderEcmSso(browser.params.testConfig.appConfig.ecmHost,
await settingsPage.setProviderEcmSsoWithoutCodeFlow(
browser.params.testConfig.appConfig.ecmHost,
browser.params.testConfig.appConfig.oauth2.host,
browser.params.testConfig.appConfig.identityHost,
false,
false,
browser.params.testConfig.appConfig.oauth2.clientId,
browser.params.testConfig.appConfig.oauth2.redirectUriLogout);
browser.params.testConfig.appConfig.oauth2.redirectUriLogout
);
await browser.refresh();
await loginPage.waitForElements();
await loginPage.enterUsername(browser.params.testConfig.users.admin.username);