mirror of
				https://github.com/dani-garcia/vaultwarden.git
				synced 2025-10-27 00:10:02 +02:00 
			
		
		
		
	* Add SSO functionality using OpenID Connect Co-authored-by: Pablo Ovelleiro Corral <mail@pablo.tools> Co-authored-by: Stuart Heap <sheap13@gmail.com> Co-authored-by: Alex Moore <skiepp@my-dockerfarm.cloud> Co-authored-by: Brian Munro <brian.alexander.munro@gmail.com> Co-authored-by: Jacques B. <timshel@github.com> * Improvements and error handling * Stop rolling device token * Add playwright tests * Activate PKCE by default * Ensure result order when searching for sso_user * add SSO_ALLOW_UNKNOWN_EMAIL_VERIFICATION * Toggle SSO button in scss * Base64 encode state before sending it to providers * Prevent disabled User from SSO login * Review fixes * Remove unused UserOrganization.invited_by_email * Split SsoUser::find_by_identifier_or_email * api::Accounts::verify_password add the policy even if it's ignored * Disable signups if SSO_ONLY is activated * Add verifiedDate to organizations::get_org_domain_sso_details * Review fixes * Remove OrganizationId guard from get_master_password_policy * Add wrapper type OIDCCode OIDCState OIDCIdentifier * Membership::confirm_user_invitations fix and tests * Allow set-password only if account is unitialized * Review fixes * Prevent accepting another user invitation * Log password change event on SSO account creation * Unify master password policy resolution * Upgrade openidconnect to 4.0.0 * Revert "Remove unused UserOrganization.invited_by_email" This reverts commit 548e19995e141314af98a10d170ea7371f02fab4. * Process org enrollment in accounts::post_set_password * Improve tests * Pass the claim invited_by_email in case it was not in db * Add Slack configuration hints * Fix playwright tests * Skip broken tests * Add sso identifier in admin user panel * Remove duplicate expiration check, add a log * Augment mobile refresh_token validity * Rauthy configuration hints * Fix playwright tests * Playwright upgrade and conf improvement * Playwright tests improvements * 2FA email and device creation change * Fix and improve Playwright tests * Minor improvements * Fix enforceOnLogin org policies * Run playwright sso tests against correct db * PKCE should now work with Zitadel * Playwright upgrade maildev to use MailBuffer.expect * Upgrades playwright tests deps * Check email_verified in id_token and user_info * Add sso verified endpoint for v2025.6.0 * Fix playwright tests * Create a separate sso_client * Upgrade openidconnect to 4.0.1 * Server settings for login fields toggle * Use only css for login fields * Fix playwright test * Review fix * More review fix * Perform same checks when setting kdf --------- Co-authored-by: Felix Eckhofer <felix@eckhofer.com> Co-authored-by: Pablo Ovelleiro Corral <mail@pablo.tools> Co-authored-by: Stuart Heap <sheap13@gmail.com> Co-authored-by: Alex Moore <skiepp@my-dockerfarm.cloud> Co-authored-by: Brian Munro <brian.alexander.munro@gmail.com> Co-authored-by: Jacques B. <timshel@github.com> Co-authored-by: Timshel <timshel@480s>
		
			
				
	
	
		
			139 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			TypeScript
		
	
	
	
	
	
			
		
		
	
	
			139 lines
		
	
	
		
			5.5 KiB
		
	
	
	
		
			TypeScript
		
	
	
	
	
	
| import { expect, type Page, Test } from '@playwright/test';
 | |
| import { type MailBuffer, MailServer } from 'maildev';
 | |
| import * as OTPAuth from "otpauth";
 | |
| 
 | |
| import * as utils from '../../global-utils';
 | |
| import { retrieveEmailCode } from './2fa';
 | |
| 
 | |
| /**
 | |
|  * If a MailBuffer is passed it will be used and consume the expected emails
 | |
|  */
 | |
| export async function logNewUser(
 | |
|     test: Test,
 | |
|     page: Page,
 | |
|     user: { email: string, name: string, password: string },
 | |
|     options: { mailBuffer?: MailBuffer, override?: boolean } = {}
 | |
| ) {
 | |
|     await test.step(`Create user ${user.name}`, async () => {
 | |
|         await page.context().clearCookies();
 | |
| 
 | |
|         await test.step('Landing page', async () => {
 | |
|             await utils.cleanLanding(page);
 | |
| 
 | |
|             if( options.override ) {
 | |
|                 await page.getByRole('button', { name: 'Continue' }).click();
 | |
|             } else {
 | |
|                 await page.getByLabel(/Email address/).fill(user.email);
 | |
|                 await page.getByRole('button', { name: /Use single sign-on/ }).click();
 | |
|             }
 | |
|         });
 | |
| 
 | |
|         await test.step('Keycloak login', async () => {
 | |
|             await expect(page.getByRole('heading', { name: 'Sign in to your account' })).toBeVisible();
 | |
|             await page.getByLabel(/Username/).fill(user.name);
 | |
|             await page.getByLabel('Password', { exact: true }).fill(user.password);
 | |
|             await page.getByRole('button', { name: 'Sign In' }).click();
 | |
|         });
 | |
| 
 | |
|         await test.step('Create Vault account', async () => {
 | |
|             await expect(page.getByRole('heading', { name: 'Join organisation' })).toBeVisible();
 | |
|             await page.getByLabel('New master password (required)', { exact: true }).fill(user.password);
 | |
|             await page.getByLabel('Confirm new master password (').fill(user.password);
 | |
|             await page.getByRole('button', { name: 'Create account' }).click();
 | |
|         });
 | |
| 
 | |
|         await test.step('Default vault page', async () => {
 | |
|             await expect(page).toHaveTitle(/Vaultwarden Web/);
 | |
|             await expect(page.getByTitle('All vaults', { exact: true })).toBeVisible();
 | |
|         });
 | |
| 
 | |
|         await utils.checkNotification(page, 'Account successfully created!');
 | |
|         await utils.checkNotification(page, 'Invitation accepted');
 | |
| 
 | |
|         if( options.mailBuffer ){
 | |
|             let mailBuffer = options.mailBuffer;
 | |
|             await test.step('Check emails', async () => {
 | |
|                 await mailBuffer.expect((m) => m.subject === "Welcome");
 | |
|                 await mailBuffer.expect((m) => m.subject.includes("New Device Logged"));
 | |
|             });
 | |
|         }
 | |
|     });
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * If a MailBuffer is passed it will be used and consume the expected emails
 | |
|  */
 | |
| export async function logUser(
 | |
|     test: Test,
 | |
|     page: Page,
 | |
|     user: { email: string, password: string },
 | |
|     options: {
 | |
|         mailBuffer ?: MailBuffer,
 | |
|         override?: boolean,
 | |
|         totp?: OTPAuth.TOTP,
 | |
|         mail2fa?: boolean,
 | |
|     } = {}
 | |
| ) {
 | |
|     let mailBuffer = options.mailBuffer;
 | |
| 
 | |
|     await test.step(`Log user ${user.email}`, async () => {
 | |
|         await page.context().clearCookies();
 | |
| 
 | |
|         await test.step('Landing page', async () => {
 | |
|             await utils.cleanLanding(page);
 | |
| 
 | |
|             if( options.override ) {
 | |
|                 await page.getByRole('button', { name: 'Continue' }).click();
 | |
|             } else {
 | |
|                 await page.getByLabel(/Email address/).fill(user.email);
 | |
|                 await page.getByRole('button', { name: /Use single sign-on/ }).click();
 | |
|             }
 | |
|         });
 | |
| 
 | |
|         await test.step('Keycloak login', async () => {
 | |
|             await expect(page.getByRole('heading', { name: 'Sign in to your account' })).toBeVisible();
 | |
|             await page.getByLabel(/Username/).fill(user.name);
 | |
|             await page.getByLabel('Password', { exact: true }).fill(user.password);
 | |
|             await page.getByRole('button', { name: 'Sign In' }).click();
 | |
|         });
 | |
| 
 | |
|         if( options.totp || options.mail2fa ){
 | |
|             let code;
 | |
| 
 | |
|             await test.step('2FA check', async () => {
 | |
|                 await expect(page.getByRole('heading', { name: 'Verify your Identity' })).toBeVisible();
 | |
| 
 | |
|                 if( options.totp ) {
 | |
|                     const totp = options.totp;
 | |
|                     let timestamp = Date.now(); // Needed to use the next token
 | |
|                     timestamp = timestamp + (totp.period - (Math.floor(timestamp / 1000) % totp.period) + 1) * 1000;
 | |
|                     code = totp.generate({timestamp});
 | |
|                 } else if( options.mail2fa ){
 | |
|                     code = await retrieveEmailCode(test, page, mailBuffer);
 | |
|                 }
 | |
| 
 | |
|                 await page.getByLabel(/Verification code/).fill(code);
 | |
|                 await page.getByRole('button', { name: 'Continue' }).click();
 | |
|             });
 | |
|         }
 | |
| 
 | |
|         await test.step('Unlock vault', async () => {
 | |
|             await expect(page).toHaveTitle('Vaultwarden Web');
 | |
|             await expect(page.getByRole('heading', { name: 'Your vault is locked' })).toBeVisible();
 | |
|             await page.getByLabel('Master password').fill(user.password);
 | |
|             await page.getByRole('button', { name: 'Unlock' }).click();
 | |
|         });
 | |
| 
 | |
|         await test.step('Default vault page', async () => {
 | |
|             await expect(page).toHaveTitle(/Vaultwarden Web/);
 | |
|             await expect(page.getByTitle('All vaults', { exact: true })).toBeVisible();
 | |
|         });
 | |
| 
 | |
|         if( mailBuffer ){
 | |
|             await test.step('Check email', async () => {
 | |
|                 await mailBuffer.expect((m) => m.subject.includes("New Device Logged"));
 | |
|             });
 | |
|         }
 | |
|     });
 | |
| }
 |