-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[QA] 2.1.1 Testplan #210
Comments
Changelog Testing
|
From my side this is OK, basic authentication flows work fine in both Android and iOS. As reminder, there are two features that are not available (at least) in mobile clients: token renewal and logout. These are not regressions, it's todo. |
That completes the needed QA here. No blocker findings. Expect a release tomorrow. |
Release done. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Setup
Setup details (click to view)
Automated setup script: https://github.com/owncloud/QA/tools/hetzner-deploy/deploy_openidconnect_test.sh
Template: https://github.com/owncloud/QA/blob/master/Server/Test_Plan_openidconnect.md
References:
Testplan
occ app:enable openidconnect
occ upgrade
is needed. #1352. Enter correct credentials
2. In iDP, cancel login process
2. Logout in the idP
openid-configuration
requestregister
endpoint availableregister
endpoint is requestedlogon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizing/signin/v1/identifier
/signin/v1/consent
http://localhost:44155/
logon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizing using client id and secret id granted by register endpointtoken
endoint is requested with refresh token to get a new token. This must be transparent for the client01-22 09:21:03:624 [ info sync.credentials.http ]: Refreshing token
01-22 09:21:03:759 [ info sync.httplogger ]: ... Request: POST ... /konnect/v1/token -> owncloud/client#9490
2. Enable maintenance mode and upgrade to OIDC
3. add
'token_auth_enforced' => true
to config.php4. Disable maintenance mode
Server replied "599"
after 30 sec.; see also #1362. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
2. Enable maintenance mode and upgrade to OIDC, keeping Oauth2 enabled
3. Disable maintenance mode
Android
After releasing 2.16, authentication library will be replaced for a custom implementation. Tests here will be done with such implementation as well
Actually, Android does not support Dynamic Client Registration yet.
Openidconnect: 2.x.x
Device: Google Pixel 2
Android version: 11
New: 🚧
2. Enter correct credentials
New: 🚧
New: 🚧
2. In iDP, cancel login process
New: 🚧
2. Logout in the idP
openid-configuration
requestNew: 🚧
register
endpoint availableregister
endpoint is requestedlogon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizingNew: 🚧
logon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizing using client id and secret id granted by register endpointNew: 🚧
token
endoint is requested with refresh token to get a new token. This must be transparent for the clientNew: 🚧
2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
4. Force re-login
New: 🚧
2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
New 🚧
2. Enable maintenance mode and upgrade to OIDC, keeping Oauth2 enabled
3. Disable maintenance mode
New: 🚧
Smoke test: 2.16 🚧 New 🚧
iOS
Openidconnect: 2.x.x
Device: iPhoneXR
iOS version: 14.2
Tested with the current stable
11.4.5
and the new one 11.5, including Dynamic Client Registration11.5 🚧
2. Enter correct credentials
11.5 🚧
11.5 🚧
2. In iDP, cancel login process
11.5 🚧
2. Logout in the idP
openid-configuration
request11.5 🚧
register
endpoint availableregister
endpoint is requested11.5 🚧
logon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizing11.5 🚧
logon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizing using client id and secret id granted by register endpoint11.5 🚧
11.5 🚧
token
endpoint is requested with refresh token to get a new token. This must be transparent for the client11.5 🚧
11.5 🚧
2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
4. Force re-login
2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
11.5 🚧
2. Enable maintenance mode and upgrade to OIDC, keeping Oauth2 enabled
3. Disable maintenance mode
11.5 🚧
The text was updated successfully, but these errors were encountered: