mirror of
https://github.com/dani-garcia/vaultwarden.git
synced 2025-09-09 10:25:56 +03:00
* Add SSO functionality using OpenID Connect Co-authored-by: Pablo Ovelleiro Corral <mail@pablo.tools> Co-authored-by: Stuart Heap <sheap13@gmail.com> Co-authored-by: Alex Moore <skiepp@my-dockerfarm.cloud> Co-authored-by: Brian Munro <brian.alexander.munro@gmail.com> Co-authored-by: Jacques B. <timshel@github.com> * Improvements and error handling * Stop rolling device token * Add playwright tests * Activate PKCE by default * Ensure result order when searching for sso_user * add SSO_ALLOW_UNKNOWN_EMAIL_VERIFICATION * Toggle SSO button in scss * Base64 encode state before sending it to providers * Prevent disabled User from SSO login * Review fixes * Remove unused UserOrganization.invited_by_email * Split SsoUser::find_by_identifier_or_email * api::Accounts::verify_password add the policy even if it's ignored * Disable signups if SSO_ONLY is activated * Add verifiedDate to organizations::get_org_domain_sso_details * Review fixes * Remove OrganizationId guard from get_master_password_policy * Add wrapper type OIDCCode OIDCState OIDCIdentifier * Membership::confirm_user_invitations fix and tests * Allow set-password only if account is unitialized * Review fixes * Prevent accepting another user invitation * Log password change event on SSO account creation * Unify master password policy resolution * Upgrade openidconnect to 4.0.0 * Revert "Remove unused UserOrganization.invited_by_email" This reverts commit 548e19995e141314af98a10d170ea7371f02fab4. * Process org enrollment in accounts::post_set_password * Improve tests * Pass the claim invited_by_email in case it was not in db * Add Slack configuration hints * Fix playwright tests * Skip broken tests * Add sso identifier in admin user panel * Remove duplicate expiration check, add a log * Augment mobile refresh_token validity * Rauthy configuration hints * Fix playwright tests * Playwright upgrade and conf improvement * Playwright tests improvements * 2FA email and device creation change * Fix and improve Playwright tests * Minor improvements * Fix enforceOnLogin org policies * Run playwright sso tests against correct db * PKCE should now work with Zitadel * Playwright upgrade maildev to use MailBuffer.expect * Upgrades playwright tests deps * Check email_verified in id_token and user_info * Add sso verified endpoint for v2025.6.0 * Fix playwright tests * Create a separate sso_client * Upgrade openidconnect to 4.0.1 * Server settings for login fields toggle * Use only css for login fields * Fix playwright test * Review fix * More review fix * Perform same checks when setting kdf --------- Co-authored-by: Felix Eckhofer <felix@eckhofer.com> Co-authored-by: Pablo Ovelleiro Corral <mail@pablo.tools> Co-authored-by: Stuart Heap <sheap13@gmail.com> Co-authored-by: Alex Moore <skiepp@my-dockerfarm.cloud> Co-authored-by: Brian Munro <brian.alexander.munro@gmail.com> Co-authored-by: Jacques B. <timshel@github.com> Co-authored-by: Timshel <timshel@480s>
116 lines
4.4 KiB
TypeScript
116 lines
4.4 KiB
TypeScript
import { test, expect, type TestInfo } from '@playwright/test';
|
|
import { MailDev } from 'maildev';
|
|
|
|
import * as utils from '../global-utils';
|
|
import * as orgs from './setups/orgs';
|
|
import { createAccount, logUser } from './setups/user';
|
|
|
|
let users = utils.loadEnv();
|
|
|
|
let mailServer, mail1Buffer, mail2Buffer, mail3Buffer;
|
|
|
|
test.beforeAll('Setup', async ({ browser }, testInfo: TestInfo) => {
|
|
mailServer = new MailDev({
|
|
port: process.env.MAILDEV_SMTP_PORT,
|
|
web: { port: process.env.MAILDEV_HTTP_PORT },
|
|
})
|
|
|
|
await mailServer.listen();
|
|
|
|
await utils.startVault(browser, testInfo, {
|
|
SMTP_HOST: process.env.MAILDEV_HOST,
|
|
SMTP_FROM: process.env.PW_SMTP_FROM,
|
|
});
|
|
|
|
mail1Buffer = mailServer.buffer(users.user1.email);
|
|
mail2Buffer = mailServer.buffer(users.user2.email);
|
|
mail3Buffer = mailServer.buffer(users.user3.email);
|
|
});
|
|
|
|
test.afterAll('Teardown', async ({}, testInfo: TestInfo) => {
|
|
utils.stopVault(testInfo);
|
|
[mail1Buffer, mail2Buffer, mail3Buffer, mailServer].map((m) => m?.close());
|
|
});
|
|
|
|
test('Create user3', async ({ page }) => {
|
|
await createAccount(test, page, users.user3, mail3Buffer);
|
|
});
|
|
|
|
test('Invite users', async ({ page }) => {
|
|
await createAccount(test, page, users.user1, mail1Buffer);
|
|
|
|
await orgs.create(test, page, 'Test');
|
|
await orgs.members(test, page, 'Test');
|
|
await orgs.invite(test, page, 'Test', users.user2.email);
|
|
await orgs.invite(test, page, 'Test', users.user3.email, {
|
|
navigate: false,
|
|
});
|
|
});
|
|
|
|
test('invited with new account', async ({ page }) => {
|
|
const invited = await mail2Buffer.expect((mail) => mail.subject === 'Join Test');
|
|
|
|
await test.step('Create account', async () => {
|
|
await page.setContent(invited.html);
|
|
const link = await page.getByTestId('invite').getAttribute('href');
|
|
await page.goto(link);
|
|
await expect(page).toHaveTitle(/Create account | Vaultwarden Web/);
|
|
|
|
//await page.getByLabel('Name').fill(users.user2.name);
|
|
await page.getByLabel('New master password (required)', { exact: true }).fill(users.user2.password);
|
|
await page.getByLabel('Confirm new master password (').fill(users.user2.password);
|
|
await page.getByRole('button', { name: 'Create account' }).click();
|
|
await utils.checkNotification(page, 'Your new account has been created');
|
|
|
|
// Redirected to the vault
|
|
await expect(page).toHaveTitle('Vaults | Vaultwarden Web');
|
|
await utils.checkNotification(page, 'You have been logged in!');
|
|
await utils.checkNotification(page, 'Invitation accepted');
|
|
});
|
|
|
|
await test.step('Check mails', async () => {
|
|
await mail2Buffer.expect((m) => m.subject === 'Welcome');
|
|
await mail2Buffer.expect((m) => m.subject === 'New Device Logged In From Firefox');
|
|
await mail1Buffer.expect((m) => m.subject.includes('Invitation to Test accepted'));
|
|
});
|
|
});
|
|
|
|
test('invited with existing account', async ({ page }) => {
|
|
const invited = await mail3Buffer.expect((mail) => mail.subject === 'Join Test');
|
|
|
|
await page.setContent(invited.html);
|
|
const link = await page.getByTestId('invite').getAttribute('href');
|
|
|
|
await page.goto(link);
|
|
|
|
// We should be on login page with email prefilled
|
|
await expect(page).toHaveTitle(/Vaultwarden Web/);
|
|
await page.getByRole('button', { name: 'Continue' }).click();
|
|
|
|
// Unlock page
|
|
await page.getByLabel('Master password').fill(users.user3.password);
|
|
await page.getByRole('button', { name: 'Log in with master password' }).click();
|
|
|
|
// We are now in the default vault page
|
|
await expect(page).toHaveTitle(/Vaultwarden Web/);
|
|
await utils.checkNotification(page, 'Invitation accepted');
|
|
|
|
await mail3Buffer.expect((m) => m.subject === 'New Device Logged In From Firefox');
|
|
await mail1Buffer.expect((m) => m.subject.includes('Invitation to Test accepted'));
|
|
});
|
|
|
|
test('Confirm invited user', async ({ page }) => {
|
|
await logUser(test, page, users.user1, mail1Buffer);
|
|
|
|
await orgs.members(test, page, 'Test');
|
|
await orgs.confirm(test, page, 'Test', users.user2.email);
|
|
|
|
await mail2Buffer.expect((m) => m.subject.includes('Invitation to Test confirmed'));
|
|
});
|
|
|
|
test('Organization is visible', async ({ page }) => {
|
|
await logUser(test, page, users.user2, mail2Buffer);
|
|
await page.getByRole('button', { name: 'vault: Test', exact: true }).click();
|
|
await expect(page.getByLabel('Filter: Default collection')).toBeVisible();
|
|
});
|