mirror of
https://github.com/Alfresco/alfresco-ng2-components.git
synced 2025-07-24 17:32:15 +00:00
* fix core viewer * increase rendition retry * sso refresh before test * general fix test * try use last proxy * avoid use proxy * remove proxy * fix setting tests * fix share and sso test * fix lint exclude * fix sso * fix some process services cloud e2e * fix sso download * exclude sso test * fix cloud * add logout content service test * add logout core * add logout search * redefine global before all * separate protracotr method * try * try multiple attempt before all * add prefix group and users * add prefix group and users * add prefix group and users * rexecute sso test * fix process service visibility e2e * split SSO login test * fix SSO download * fix SSO download * fix some cloud issues * fix some cloud issues * fix some cloud issues * share file fix cs * fix cloud test
108 lines
4.7 KiB
TypeScript
108 lines
4.7 KiB
TypeScript
/*!
|
|
* @license
|
|
* Copyright 2019 Alfresco Software, Ltd.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
import { LoginSSOPage, SettingsPage, LoginPage } from '@alfresco/adf-testing';
|
|
import { browser } from 'protractor';
|
|
import { NavigationBarPage } from '../../../pages/adf/navigationBarPage';
|
|
|
|
describe('Login component - SSO', () => {
|
|
|
|
const settingsPage = new SettingsPage();
|
|
const loginSSOPage = new LoginSSOPage();
|
|
const loginPage = new LoginPage();
|
|
const navigationBarPage = new NavigationBarPage();
|
|
|
|
const silentLogin = false;
|
|
let implicitFlow;
|
|
|
|
it('[C280665] Should be possible change the logout redirect URL', async () => {
|
|
await settingsPage.setProviderEcmSso(browser.params.testConfig.adf.url,
|
|
browser.params.testConfig.adf.hostSso,
|
|
browser.params.testConfig.adf.hostIdentity, false, true, browser.params.config.oauth2.clientId, '/login');
|
|
await loginSSOPage.clickOnSSOButton();
|
|
await loginSSOPage.loginSSOIdentityService(browser.params.testConfig.adf.adminEmail, browser.params.testConfig.adf.adminPassword);
|
|
await navigationBarPage.clickLogoutButton();
|
|
|
|
browser.sleep(2000);
|
|
|
|
browser.getCurrentUrl().then((actualUrl) => {
|
|
expect(actualUrl).toEqual(browser.params.testConfig.adf.url + '/login');
|
|
});
|
|
});
|
|
|
|
describe('Login component - SSO Grant type password (implicit flow false)', () => {
|
|
|
|
it('[C299158] Should be possible to login with SSO, with grant type password (Implicit Flow false)', async () => {
|
|
implicitFlow = false;
|
|
await settingsPage.setProviderEcmSso(browser.params.testConfig.adf_acs.host,
|
|
browser.params.testConfig.adf.hostSso,
|
|
browser.params.testConfig.adf.hostIdentity, silentLogin, implicitFlow, browser.params.config.oauth2.clientId);
|
|
|
|
await loginPage.waitForElements();
|
|
|
|
await settingsPage.setProviderEcmSso(browser.params.testConfig.adf_acs.host,
|
|
browser.params.testConfig.adf.hostSso,
|
|
browser.params.testConfig.adf.hostIdentity, silentLogin, implicitFlow, browser.params.config.oauth2.clientId);
|
|
browser.ignoreSynchronization = true;
|
|
|
|
await loginPage.enterUsername(browser.params.testConfig.adf.adminEmail);
|
|
await loginPage.enterPassword(browser.params.testConfig.adf.adminPassword);
|
|
await loginPage.clickSignInButton();
|
|
|
|
let isDisplayed = false;
|
|
|
|
browser.wait(() => {
|
|
loginPage.header.isDisplayed().then(
|
|
() => {
|
|
isDisplayed = true;
|
|
},
|
|
() => {
|
|
isDisplayed = false;
|
|
}
|
|
);
|
|
return isDisplayed;
|
|
}, browser.params.testConfig.main.timeout, 'Element is not visible ' + loginPage.header.locator());
|
|
});
|
|
});
|
|
|
|
describe('Login component - SSO implicit Flow', () => {
|
|
|
|
afterEach(() => {
|
|
navigationBarPage.clickLogoutButton();
|
|
browser.executeScript('window.sessionStorage.clear();');
|
|
browser.executeScript('window.localStorage.clear();');
|
|
});
|
|
|
|
it('[C261050] Should be possible login with SSO', async () => {
|
|
await settingsPage.setProviderEcmSso(browser.params.testConfig.adf_acs.host,
|
|
browser.params.testConfig.adf.hostSso,
|
|
browser.params.testConfig.adf.hostIdentity, false, true, browser.params.config.oauth2.clientId);
|
|
await loginSSOPage.clickOnSSOButton();
|
|
await loginSSOPage.loginSSOIdentityService(browser.params.testConfig.adf.adminEmail, browser.params.testConfig.adf.adminPassword);
|
|
});
|
|
|
|
it('[C280667] Should be redirect directly to keycloak without show the login page with silent login', async () => {
|
|
await settingsPage.setProviderEcmSso(browser.params.testConfig.adf_acs.host,
|
|
browser.params.testConfig.adf.hostSso,
|
|
browser.params.testConfig.adf.hostIdentity, true, true, browser.params.config.oauth2.clientId);
|
|
await loginSSOPage.loginSSOIdentityService(browser.params.testConfig.adf.adminEmail, browser.params.testConfig.adf.adminPassword);
|
|
});
|
|
|
|
});
|
|
|
|
});
|