mirror of
https://github.com/dani-garcia/vaultwarden.git
synced 2025-09-09 10:25:56 +03:00
* Add SSO functionality using OpenID Connect Co-authored-by: Pablo Ovelleiro Corral <mail@pablo.tools> Co-authored-by: Stuart Heap <sheap13@gmail.com> Co-authored-by: Alex Moore <skiepp@my-dockerfarm.cloud> Co-authored-by: Brian Munro <brian.alexander.munro@gmail.com> Co-authored-by: Jacques B. <timshel@github.com> * Improvements and error handling * Stop rolling device token * Add playwright tests * Activate PKCE by default * Ensure result order when searching for sso_user * add SSO_ALLOW_UNKNOWN_EMAIL_VERIFICATION * Toggle SSO button in scss * Base64 encode state before sending it to providers * Prevent disabled User from SSO login * Review fixes * Remove unused UserOrganization.invited_by_email * Split SsoUser::find_by_identifier_or_email * api::Accounts::verify_password add the policy even if it's ignored * Disable signups if SSO_ONLY is activated * Add verifiedDate to organizations::get_org_domain_sso_details * Review fixes * Remove OrganizationId guard from get_master_password_policy * Add wrapper type OIDCCode OIDCState OIDCIdentifier * Membership::confirm_user_invitations fix and tests * Allow set-password only if account is unitialized * Review fixes * Prevent accepting another user invitation * Log password change event on SSO account creation * Unify master password policy resolution * Upgrade openidconnect to 4.0.0 * Revert "Remove unused UserOrganization.invited_by_email" This reverts commit 548e19995e141314af98a10d170ea7371f02fab4. * Process org enrollment in accounts::post_set_password * Improve tests * Pass the claim invited_by_email in case it was not in db * Add Slack configuration hints * Fix playwright tests * Skip broken tests * Add sso identifier in admin user panel * Remove duplicate expiration check, add a log * Augment mobile refresh_token validity * Rauthy configuration hints * Fix playwright tests * Playwright upgrade and conf improvement * Playwright tests improvements * 2FA email and device creation change * Fix and improve Playwright tests * Minor improvements * Fix enforceOnLogin org policies * Run playwright sso tests against correct db * PKCE should now work with Zitadel * Playwright upgrade maildev to use MailBuffer.expect * Upgrades playwright tests deps * Check email_verified in id_token and user_info * Add sso verified endpoint for v2025.6.0 * Fix playwright tests * Create a separate sso_client * Upgrade openidconnect to 4.0.1 * Server settings for login fields toggle * Use only css for login fields * Fix playwright test * Review fix * More review fix * Perform same checks when setting kdf --------- Co-authored-by: Felix Eckhofer <felix@eckhofer.com> Co-authored-by: Pablo Ovelleiro Corral <mail@pablo.tools> Co-authored-by: Stuart Heap <sheap13@gmail.com> Co-authored-by: Alex Moore <skiepp@my-dockerfarm.cloud> Co-authored-by: Brian Munro <brian.alexander.munro@gmail.com> Co-authored-by: Jacques B. <timshel@github.com> Co-authored-by: Timshel <timshel@480s>
78 lines
4.3 KiB
TypeScript
78 lines
4.3 KiB
TypeScript
import { expect, type Browser,Page } from '@playwright/test';
|
|
|
|
import * as utils from '../../global-utils';
|
|
|
|
export async function create(test, page: Page, name: string) {
|
|
await test.step('Create Org', async () => {
|
|
await page.locator('a').filter({ hasText: 'Password Manager' }).first().click();
|
|
await expect(page.getByTitle('All vaults', { exact: true })).toBeVisible();
|
|
await page.getByRole('link', { name: 'New organisation' }).click();
|
|
await page.getByLabel('Organisation name (required)').fill(name);
|
|
await page.getByRole('button', { name: 'Submit' }).click();
|
|
|
|
await utils.checkNotification(page, 'Organisation created');
|
|
});
|
|
}
|
|
|
|
export async function policies(test, page: Page, name: string) {
|
|
await test.step(`Navigate to ${name} policies`, async () => {
|
|
await page.locator('a').filter({ hasText: 'Admin Console' }).first().click();
|
|
await page.locator('org-switcher').getByLabel(/Toggle collapse/).click();
|
|
await page.locator('org-switcher').getByRole('link', { name: `${name}` }).first().click();
|
|
await expect(page.getByRole('heading', { name: `${name} collections` })).toBeVisible();
|
|
await page.getByRole('button', { name: 'Toggle collapse Settings' }).click();
|
|
await page.getByRole('link', { name: 'Policies' }).click();
|
|
await expect(page.getByRole('heading', { name: 'Policies' })).toBeVisible();
|
|
});
|
|
}
|
|
|
|
export async function members(test, page: Page, name: string) {
|
|
await test.step(`Navigate to ${name} members`, async () => {
|
|
await page.locator('a').filter({ hasText: 'Admin Console' }).first().click();
|
|
await page.locator('org-switcher').getByLabel(/Toggle collapse/).click();
|
|
await page.locator('org-switcher').getByRole('link', { name: `${name}` }).first().click();
|
|
await expect(page.getByRole('heading', { name: `${name} collections` })).toBeVisible();
|
|
await page.locator('div').filter({ hasText: 'Members' }).nth(2).click();
|
|
await expect(page.getByRole('heading', { name: 'Members' })).toBeVisible();
|
|
await expect(page.getByRole('cell', { name: 'All' })).toBeVisible();
|
|
});
|
|
}
|
|
|
|
export async function invite(test, page: Page, name: string, email: string) {
|
|
await test.step(`Invite ${email}`, async () => {
|
|
await expect(page.getByRole('heading', { name: 'Members' })).toBeVisible();
|
|
await page.getByRole('button', { name: 'Invite member' }).click();
|
|
await page.getByLabel('Email (required)').fill(email);
|
|
await page.getByRole('tab', { name: 'Collections' }).click();
|
|
await page.getByRole('combobox', { name: 'Permission' }).click();
|
|
await page.getByText('Edit items', { exact: true }).click();
|
|
await page.getByLabel('Select collections').click();
|
|
await page.getByText('Default collection').click();
|
|
await page.getByRole('cell', { name: 'Collection', exact: true }).click();
|
|
await page.getByRole('button', { name: 'Save' }).click();
|
|
await utils.checkNotification(page, 'User(s) invited');
|
|
});
|
|
}
|
|
|
|
export async function confirm(test, page: Page, name: string, user_email: string) {
|
|
await test.step(`Confirm ${user_email}`, async () => {
|
|
await expect(page.getByRole('heading', { name: 'Members' })).toBeVisible();
|
|
await page.getByRole('row').filter({hasText: user_email}).getByLabel('Options').click();
|
|
await page.getByRole('menuitem', { name: 'Confirm' }).click();
|
|
await expect(page.getByRole('heading', { name: 'Confirm user' })).toBeVisible();
|
|
await page.getByRole('button', { name: 'Confirm' }).click();
|
|
await utils.checkNotification(page, 'confirmed');
|
|
});
|
|
}
|
|
|
|
export async function revoke(test, page: Page, name: string, user_email: string) {
|
|
await test.step(`Revoke ${user_email}`, async () => {
|
|
await expect(page.getByRole('heading', { name: 'Members' })).toBeVisible();
|
|
await page.getByRole('row').filter({hasText: user_email}).getByLabel('Options').click();
|
|
await page.getByRole('menuitem', { name: 'Revoke access' }).click();
|
|
await expect(page.getByRole('heading', { name: 'Revoke access' })).toBeVisible();
|
|
await page.getByRole('button', { name: 'Revoke access' }).click();
|
|
await utils.checkNotification(page, 'Revoked organisation access');
|
|
});
|
|
}
|