-
-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
wdi5 authentication different behavior between localhost and real domain #589
Comments
In addition: I tested the "custom" provider in my configuration as well as BTP. The custom provider doesn't accept a "idpDomain" parameter, so I removed it. The result was the same: With localhost, my custom IdP get's accessed and wdi5 authenticates itself before accessing the app. When changing the base-url to a deployed version, wdi5 instead accesses the domain of the app configured in the base-url and tries to authenticate there, which fails. |
what happens when you call up the deployed app by hand, in a browser? Does the authentication then work as expected? |
Yes, the authentication works when accessing the deployed app manually. |
when accessing the app manually, is the redirect |
Because we have two IdPs in use, the redirect doesn't happen automatically. That's why I sepcified the "idpDomain" in the wdio conf. |
then this is the root cause of it all ™: |
Thanks for the reply @vobu! This helps me for the most part and I may have a more detailed look into the code after my holidays. One question remaining: One of the two IdPs is a IAS-scenario where I intend to use the BTP authenticator. Shouldn't that work even if the app doesn't redirect to the IdP by default as long as I specify the "idpDomain"? |
unfortunately not - in the IAS case, no automatic redirect is triggered via the |
hey 👋 - silence for 30 days 🤐 ... anybody? 😀 |
Hi, quick update from my side: I solved the problem by configuring a manual authentication in the before hook of the actual test run. Thanks for the input here! Maybe this brings up an idea on how to handle uaa services with multiple IdPs, but regarding my case, the problem is solved. |
hey 👋 - silence for 30 days 🤐 ... anybody? 😀 |
Describe the bug
When configuring authentication against a custom IdP and a base url against a locally running ui5 app that requires a valid session, wdi5 access the custom IdP, checks for the specified fields, authenticates with the configured credentials, sets a session cookie and accesses the local app.
Result: wdi5 can access the local app and the tests run.
When configuring authentication against a custom IdP and a base url against a ui5 app that is deployed in a Cloud Foundry space, wdi5 doesn't access the custom IdP, goes to the deployed app with an unauthorized session and fails.
To Reproduce
wdi5_username
andwdi5_password
with valid credentials.debug
.Expected behavior
wdi5 can access the deployed app and the tests run.
Actual behavior
wdi5 doesn't access the IdP and therefore is unable to access the deployed app.
Logs/Console Output
Placeholders:
Screenshots
Runtime Env (please complete the following information):
wdi5/wdio-ui5-service
-version: 2.0.2UI5
version: 1.108.22wdio
-version: 8.19.0node
-version: 18.17.1Additional context
Add any other context about the problem here,
e.g. any options the target browser is started with like
--headless
orif the tests run in a CI environment
The text was updated successfully, but these errors were encountered: