mirror of
https://github.com/zitadel/zitadel.git
synced 2025-08-12 07:37:31 +00:00
test(e2e): test authorizations (#4342)
* add specs that cover the b2b demo * update cypress * test handling manager roles * use shared mocha contexts * use beforeEach instead of before * improve readability * improve application test * remove static waits * remove old awaitDesired * test owned project authorizations * simplify ensure.ts * test granted projects authz * disable prevSubject for shouldNotExist * await non-existence, then expect no error * update dependencies * fix tests from scratch * fix settings tests from scratch * Apply suggestions from code review Co-authored-by: Max Peintner <max@caos.ch> * Implement code review suggestions * use spread operator * settings properties must match * add check settings object * revert spread operator Co-authored-by: Max Peintner <max@caos.ch>
This commit is contained in:
@@ -1,32 +1,35 @@
|
||||
import { apiCallProperties } from './apiauth';
|
||||
import { ensureSomethingIsSet } from './ensure';
|
||||
import { ensureSetting } from './ensure';
|
||||
import { API } from './types';
|
||||
|
||||
export function ensureOIDCSettingsSet(
|
||||
api: apiCallProperties,
|
||||
accessTokenLifetime,
|
||||
idTokenLifetime,
|
||||
refreshTokenExpiration,
|
||||
api: API,
|
||||
accessTokenLifetime: number,
|
||||
idTokenLifetime: number,
|
||||
refreshTokenExpiration: number,
|
||||
refreshTokenIdleExpiration: number,
|
||||
): Cypress.Chainable<number> {
|
||||
return ensureSomethingIsSet(
|
||||
return ensureSetting(
|
||||
api,
|
||||
`${api.adminBaseURL}settings/oidc`,
|
||||
(settings: any) => {
|
||||
let entity = null;
|
||||
if (
|
||||
settings.settings?.accessTokenLifetime === hoursToDuration(accessTokenLifetime) &&
|
||||
settings.settings?.idTokenLifetime === hoursToDuration(idTokenLifetime) &&
|
||||
settings.settings?.refreshTokenExpiration === daysToDuration(refreshTokenExpiration) &&
|
||||
settings.settings?.refreshTokenIdleExpiration === daysToDuration(refreshTokenIdleExpiration)
|
||||
) {
|
||||
entity = settings.settings;
|
||||
}
|
||||
return {
|
||||
entity: entity,
|
||||
sequence: settings.settings?.details?.sequence,
|
||||
`${api.adminBaseURL}/settings/oidc`,
|
||||
(body: any) => {
|
||||
const result = {
|
||||
sequence: body.settings?.details?.sequence,
|
||||
id: body.settings.id,
|
||||
entity: null,
|
||||
};
|
||||
|
||||
if (
|
||||
body.settings &&
|
||||
body.settings.accessTokenLifetime === hoursToDuration(accessTokenLifetime) &&
|
||||
body.settings.idTokenLifetime === hoursToDuration(idTokenLifetime) &&
|
||||
body.settings.refreshTokenExpiration === daysToDuration(refreshTokenExpiration) &&
|
||||
body.settings.refreshTokenIdleExpiration === daysToDuration(refreshTokenIdleExpiration)
|
||||
) {
|
||||
return { ...result, entity: body.settings };
|
||||
}
|
||||
return result;
|
||||
},
|
||||
`${api.adminBaseURL}settings/oidc`,
|
||||
`${api.adminBaseURL}/settings/oidc`,
|
||||
{
|
||||
accessTokenLifetime: hoursToDuration(accessTokenLifetime),
|
||||
idTokenLifetime: hoursToDuration(idTokenLifetime),
|
||||
|
Reference in New Issue
Block a user