--Task--
name: Validation_user_idm
enabled: True
class_name: CheckUserTask
source_name: idm
source_namespace: >default<
target_name: idm
target_namespace: >default<
start: 0
stop: None
timeout: not yet initialized for this Task as timeout was not explicitly defined, see updates bellow
loop: False
interval: None
dependencies: []
wait_for: []
options: {}
group_name: None
Current dir: /mnt/disks/data/xslou/lodestar-fork/pyrock
________________________________________________________________________________
[13/Jun/2023 15:37:27] Validation_user_idm pre : N/A
________________________________________________________________________________
[13/Jun/2023 15:37:27] - INFO: Timeout for this Task has changed to 12h (43200 seconds)
[13/Jun/2023 15:37:27] - INFO: timeout was set to Task default (2x global_duration or 300 seconds (whatever is higher)), because it was unset
________________________________________________________________________________
[13/Jun/2023 15:37:27] Validation_user_idm step1 : Make sure we can create a user
________________________________________________________________________________
[LoginSession] Get "access_token" token for user "amadmin"
[LoginSession] Obtaining new "access_token" token from server because it was not obtained yet for the user
[LoginSession] Get "token_id" token for user "amadmin"
[LoginSession] re-using "token_id" token that remains valid for 23m 02s
Obtain Oauth2 authz code via REST
Oauth2 authorize for access token
[http_cmd]: curl --header "Content-Type: application/x-www-form-urlencoded" --request POST --cookie "amlbcookie=01" --cookie "iPlanetDirectoryPro=W7Ypw4OCcedS6RvJaf8a2ZSUPUQ.*AAJTSQACMDIAAlNLABw3ZThYRENRWXp5UWpXQ05lcGQ5UVgrQ0tPWVE9AAR0eXBlAANDVFMAAlMxAAIwMQ..*" --cookie "route=1686670240.228.47502.973057|f60edb382037eb2df1e800d563ad78a7" --data '{"decision": "Allow", "csrf": "W7Ypw4OCcedS6RvJaf8a2ZSUPUQ.*AAJTSQACMDIAAlNLABw3ZThYRENRWXp5UWpXQ05lcGQ5UVgrQ0tPWVE9AAR0eXBlAANDVFMAAlMxAAIwMQ..*"}' "https://xlou.iam.xlou-cdm.engineeringpit.com/am/oauth2/authorize?client_id=smokeclient&scope=fr:idm:*&redirect_uri=https://fake.com&response_type=code&realm=/"
[http_cmd]: http status code OK
--- status code ---
http status code is 302 (expected 302)
--- http response ---
{'Date': 'Tue, 13 Jun 2023 15:37:28 GMT', 'Content-Length': '0', 'Connection': 'keep-alive', 'X-Frame-Options': 'SAMEORIGIN', 'X-Content-Type-Options': 'nosniff', 'Cache-Control': 'no-store', 'Location': 'https://fake.com?code=UPbPVaM1NHc2MOvqlgH7PVyU_Os&iss=https%3A%2F%2Fxlou.iam.xlou-cdm.engineeringpit.com%2Fam%2Foauth2&client_id=smokeclient', 'Pragma': 'no-cache', 'Set-Cookie': 'OAUTH_REQUEST_ATTRIBUTES=DELETED; Expires=Thu, 01 Jan 1970 00:00:00 GMT; Path=/; Secure; HttpOnly; SameSite=none', 'Strict-Transport-Security': 'max-age=15724800; includeSubDomains', 'X-ForgeRock-TransactionId': 'cd390376764ed4b4f31e6e57ef4276dc'}
Oauth2 exchange authorize code for access token
[http_cmd]: curl --header "Content-Type: application/x-www-form-urlencoded" -L --request POST --data '{"grant_type": "authorization_code", "redirect_uri": "https://fake.com", "client_id": "smokeclient", "code": "UPbPVaM1NHc2MOvqlgH7PVyU_Os"}' "https://xlou.iam.xlou-cdm.engineeringpit.com/am/oauth2/access_token?realm=/"
[http_cmd]: http status code OK
--- status code ---
http status code is 200 (expected 200)
--- http response ---
{
"access_token": "NaKl3PZ-XUmA_HVKmcfLyZLnHtE",
"scope": "fr:idm:*",
"token_type": "Bearer",
"expires_in": 3599
}
[http_cmd]: curl --header "Authorization: Bearer NaKl3PZ-XUmA_HVKmcfLyZLnHtE" --header "Content-Type: application/json" --insecure -L --request POST --data '{"userName": "SpiderMan_on_idm_20230613142801", "givenName": "Peter", "sn": "Parker", "password": "T35tr0ck123", "telephoneNumber": "6669876987", "description": "IDM Test User", "roles": [], "mail": "SpiderMan_on_idm_20230613142801@forgerock.com"}' "https://xlou.iam.xlou-cdm.engineeringpit.com/openidm/managed/user?_action=create"
[http_cmd]: http status code OK
--- status code ---
http status code is 201 (expected [200, 201])
--- http response ---
[print_head_tail]: Print head (10 lines) and tail (10 lines) of input string (33 lines):
----- output -----
{
"_id": "5135bf2f-b5a2-4b45-b0b6-b927917d3db8",
"_rev": "1f86dabe-a0e3-441b-80ed-f3d70ba72d0d-243",
"country": null,
"telephoneNumber": "6669876987",
"mail": "SpiderMan_on_idm_20230613142801@forgerock.com",
"memberOfOrgIDs": [],
"city": null,
"displayName": null,
"assignedDashboard": [],
[...]
"effectiveGroups": [],
"preferences": null,
"organizationName": null,
"givenName": "Peter",
"stateProvince": null,
"userName": "SpiderMan_on_idm_20230613142801",
"postalAddress": null,
"effectiveRoles": [],
"activateAccount": null
}
________________________________________________________________________________
[13/Jun/2023 15:37:29] Validation_user_idm step2 : Make sure we can search the user both in IDM
________________________________________________________________________________
Create new LoginSession for user "SpiderMan_on_idm_20230613142801"
[LoginSession] Get "access_token" token for user "SpiderMan_on_idm_20230613142801"
[LoginSession] Obtaining new "access_token" token from server because it was not obtained yet for the user
[LoginSession] Get "token_id" token for user "SpiderMan_on_idm_20230613142801"
[LoginSession] Obtaining new "token_id" token from server because it was not obtained yet for the user
Authenticate user SpiderMan_on_idm_20230613142801 via REST
[http_cmd]: curl --header "X-OpenAM-Username: SpiderMan_on_idm_20230613142801" --header "X-OpenAM-Password: T35tr0ck123" --header "Content-Type: application/json" --header "Accept-API-Version: resource=2.0, protocol=1.0" -L --request POST "https://xlou.iam.xlou-cdm.engineeringpit.com/am/json/authenticate?realm=/"
[http_cmd]: http status code OK
--- status code ---
http status code is 200 (expected 200)
--- http response ---
{
"tokenId": "qbUXKeiNYs2_UAUctIBGpHjCM1w.*AAJTSQACMDIAAlNLABxjVFlyTFl0MHNQUWhXNGMzWnVRVVZma3lMWlU9AAR0eXBlAANDVFMAAlMxAAIwMQ..*",
"successUrl": "/am/console",
"realm": "/"
}
[LoginSession] Obtaining session info
[http_cmd]: curl --header "iPlanetDirectoryPro: qbUXKeiNYs2_UAUctIBGpHjCM1w.*AAJTSQACMDIAAlNLABxjVFlyTFl0MHNQUWhXNGMzWnVRVVZma3lMWlU9AAR0eXBlAANDVFMAAlMxAAIwMQ..*" --header "Content-Type: application/json" --header "Accept-API-Version: resource=3.0, protocol=2.1" --header "filters_cookie: qbUXKeiNYs2_UAUctIBGpHjCM1w.*AAJTSQACMDIAAlNLABxjVFlyTFl0MHNQUWhXNGMzWnVRVVZma3lMWlU9AAR0eXBlAANDVFMAAlMxAAIwMQ..*" -L --request POST "https://xlou.iam.xlou-cdm.engineeringpit.com/am/json/realms/root/sessions?_action=getSessionInfo"
[http_cmd]: http status code OK
--- status code ---
http status code is 200 (expected 200)
--- http response ---
{
"username": "5135bf2f-b5a2-4b45-b0b6-b927917d3db8",
"universalId": "id=5135bf2f-b5a2-4b45-b0b6-b927917d3db8,ou=user,ou=am-config",
"realm": "/",
"latestAccessTime": "2023-06-13T15:37:29Z",
"maxIdleExpirationTime": "2023-06-13T16:07:29Z",
"maxSessionExpirationTime": "2023-06-13T17:37:28Z",
"properties": {
"AMCtxId": "91cff51f-c3ee-4b43-ac83-f357da598a30-548"
}
}
Obtain Oauth2 authz code via REST
Oauth2 authorize for access token
[http_cmd]: curl --header "Content-Type: application/x-www-form-urlencoded" --request POST --cookie "amlbcookie=01" --cookie "iPlanetDirectoryPro=qbUXKeiNYs2_UAUctIBGpHjCM1w.*AAJTSQACMDIAAlNLABxjVFlyTFl0MHNQUWhXNGMzWnVRVVZma3lMWlU9AAR0eXBlAANDVFMAAlMxAAIwMQ..*" --cookie "route=1686670650.428.47885.385391|f60edb382037eb2df1e800d563ad78a7" --data '{"decision": "Allow", "csrf": "qbUXKeiNYs2_UAUctIBGpHjCM1w.*AAJTSQACMDIAAlNLABxjVFlyTFl0MHNQUWhXNGMzWnVRVVZma3lMWlU9AAR0eXBlAANDVFMAAlMxAAIwMQ..*"}' "https://xlou.iam.xlou-cdm.engineeringpit.com/am/oauth2/authorize?client_id=smokeclient&scope=fr:idm:*&redirect_uri=https://fake.com&response_type=code&realm=/"
[http_cmd]: http status code OK
--- status code ---
http status code is 302 (expected 302)
--- http response ---
{'Date': 'Tue, 13 Jun 2023 15:37:30 GMT', 'Content-Length': '0', 'Connection': 'keep-alive', 'X-Frame-Options': 'SAMEORIGIN', 'X-Content-Type-Options': 'nosniff', 'Cache-Control': 'no-store', 'Location': 'https://fake.com?code=vgRZcEPQGFlnkbNPecJHAsxpzUg&iss=https%3A%2F%2Fxlou.iam.xlou-cdm.engineeringpit.com%2Fam%2Foauth2&client_id=smokeclient', 'Pragma': 'no-cache', 'Set-Cookie': 'OAUTH_REQUEST_ATTRIBUTES=DELETED; Expires=Thu, 01 Jan 1970 00:00:00 GMT; Path=/; Secure; HttpOnly; SameSite=none', 'Strict-Transport-Security': 'max-age=15724800; includeSubDomains', 'X-ForgeRock-TransactionId': 'd76a27a02d75083763430727e4902dc9'}
Oauth2 exchange authorize code for access token
[http_cmd]: curl --header "Content-Type: application/x-www-form-urlencoded" -L --request POST --data '{"grant_type": "authorization_code", "redirect_uri": "https://fake.com", "client_id": "smokeclient", "code": "vgRZcEPQGFlnkbNPecJHAsxpzUg"}' "https://xlou.iam.xlou-cdm.engineeringpit.com/am/oauth2/access_token?realm=/"
[http_cmd]: http status code OK
--- status code ---
http status code is 200 (expected 200)
--- http response ---
{
"access_token": "04QBauGjaPgH2rFOE5uJ8xDoVoQ",
"scope": "fr:idm:*",
"token_type": "Bearer",
"expires_in": 3599
}
[http_cmd]: curl --header "Authorization: Bearer 04QBauGjaPgH2rFOE5uJ8xDoVoQ" --header "Content-Type: application/json" --insecure -L --request GET "https://xlou.iam.xlou-cdm.engineeringpit.com/openidm/managed/user/5135bf2f-b5a2-4b45-b0b6-b927917d3db8"
[http_cmd]: http status code OK
--- status code ---
http status code is 200 (expected 200)
--- http response ---
[print_head_tail]: Print head (10 lines) and tail (10 lines) of input string (33 lines):
----- output -----
{
"_id": "5135bf2f-b5a2-4b45-b0b6-b927917d3db8",
"_rev": "1f86dabe-a0e3-441b-80ed-f3d70ba72d0d-243",
"country": null,
"telephoneNumber": "6669876987",
"mail": "SpiderMan_on_idm_20230613142801@forgerock.com",
"memberOfOrgIDs": [],
"city": null,
"displayName": null,
"assignedDashboard": [],
[...]
"effectiveGroups": [],
"preferences": null,
"organizationName": null,
"givenName": "Peter",
"stateProvince": null,
"userName": "SpiderMan_on_idm_20230613142801",
"postalAddress": null,
"effectiveRoles": [],
"activateAccount": null
}
________________________________________________________________________________
[13/Jun/2023 15:37:30] Validation_user_idm step3 : Make sure user can authenticate himself
________________________________________________________________________________
Anonymous POST to Login service endpoint to obtain appropriate callbacks
Call to Login Tree
[http_cmd]: curl --header "Content-Type: application/json" --header "Accept-API-Version: protocol=2.0,resource=1.0" -L --request POST "https://xlou.iam.xlou-cdm.engineeringpit.com/am/json/realms/root/authenticate?authIndexType=service&authIndexValue=Login"
[http_cmd]: http status code OK
--- status code ---
http status code is 200 (expected 200)
--- http response ---
[print_head_tail]: Print head (10 lines) and tail (10 lines) of input string (39 lines):
----- output -----
{
"authId": "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.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._kuChcss36L688KTBLc_8A3cTSb9VuAqRkG3G8eoX6g",
"callbacks": [
{
"type": "NameCallback",
"output": [
{
"name": "prompt",
"value": "User Name"
}
[...]
"name": "IDToken2",
"value": ""
}
],
"_id": 1
}
],
"header": "Sign In",
"description": "New here? Create an account
Forgot username? Forgot password?"
}
Set value for first two callbacks for login
Call to Login Tree with input values
[http_cmd]: curl --header "Content-Type: application/json" --header "Accept-API-Version: protocol=2.0,resource=1.0" -L --request POST --data '{"authId": "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.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._kuChcss36L688KTBLc_8A3cTSb9VuAqRkG3G8eoX6g", "callbacks": [{"type": "NameCallback", "output": [{"name": "prompt", "value": "User Name"}], "input": [{"name": "IDToken1", "value": "SpiderMan_on_idm_20230613142801"}], "_id": 0}, {"type": "PasswordCallback", "output": [{"name": "prompt", "value": "Password"}], "input": [{"name": "IDToken2", "value": "T35tr0ck123"}], "_id": 1}], "header": "Sign In", "description": "New here? Create an account
Forgot username? Forgot password?"}' "https://xlou.iam.xlou-cdm.engineeringpit.com/am/json/realms/root/authenticate?authIndexType=service&authIndexValue=Login"
[http_cmd]: http status code OK
--- status code ---
http status code is 200 (expected 200)
--- http response ---
{
"tokenId": "tKpLaSGgstEQlenu9YzvevACSyg.*AAJTSQACMDIAAlNLABxpZmYxYjFlZmZmakFKb3RVYUl5eWtnaFczNTQ9AAR0eXBlAANDVFMAAlMxAAIwMQ..*",
"successUrl": "/am/console",
"realm": "/"
}
________________________________________________________________________________
[13/Jun/2023 15:37:32] Validation_user_idm step4 : Make sure we can delete the user
________________________________________________________________________________
[LoginSession] Get "access_token" token for user "amadmin"
[LoginSession] re-using "access_token" token that remains valid for 59m 45s
[http_cmd]: curl --header "Authorization: Bearer NaKl3PZ-XUmA_HVKmcfLyZLnHtE" --header "Content-Type: application/json" --insecure -L --request DELETE "https://xlou.iam.xlou-cdm.engineeringpit.com/openidm/managed/user/5135bf2f-b5a2-4b45-b0b6-b927917d3db8"
[http_cmd]: http status code OK
--- status code ---
http status code is 200 (expected 200)
--- http response ---
[print_head_tail]: Print head (10 lines) and tail (10 lines) of input string (33 lines):
----- output -----
{
"_id": "5135bf2f-b5a2-4b45-b0b6-b927917d3db8",
"_rev": "1f86dabe-a0e3-441b-80ed-f3d70ba72d0d-243",
"country": null,
"telephoneNumber": "6669876987",
"mail": "SpiderMan_on_idm_20230613142801@forgerock.com",
"memberOfOrgIDs": [],
"city": null,
"displayName": null,
"assignedDashboard": [],
[...]
"effectiveGroups": [],
"preferences": null,
"organizationName": null,
"givenName": "Peter",
"stateProvince": null,
"userName": "SpiderMan_on_idm_20230613142801",
"postalAddress": null,
"effectiveRoles": [],
"activateAccount": null
}
________________________________________________________________________________
[13/Jun/2023 15:37:33] Validation_user_idm post : Post method
________________________________________________________________________________
Setting result to PASS
Task has been successfully stopped