--Task-- name: Validation_user_idm enabled: True class_name: CheckUserTask source_name: idm source_namespace: >default< target_name: idm target_namespace: >default< start: 0 stop: None timeout: not yet initialized for this Task as timeout was not explicitly defined, see updates bellow loop: False interval: None dependencies: [] wait_for: [] options: {} group_name: None Current dir: /mnt/disks/data/xslou/lodestar-fork/pyrock ________________________________________________________________________________ [13/Jun/2023 15:37:27] Validation_user_idm pre : N/A ________________________________________________________________________________ [13/Jun/2023 15:37:27] - INFO: Timeout for this Task has changed to 12h (43200 seconds) [13/Jun/2023 15:37:27] - INFO: timeout was set to Task default (2x global_duration or 300 seconds (whatever is higher)), because it was unset ________________________________________________________________________________ [13/Jun/2023 15:37:27] Validation_user_idm step1 : Make sure we can create a user ________________________________________________________________________________ [LoginSession] Get "access_token" token for user "amadmin" [LoginSession] Obtaining new "access_token" token from server because it was not obtained yet for the user [LoginSession] Get "token_id" token for user "amadmin" [LoginSession] re-using "token_id" token that remains valid for 23m 02s Obtain Oauth2 authz code via REST Oauth2 authorize for access token [http_cmd]: curl --header "Content-Type: application/x-www-form-urlencoded" --request POST --cookie "amlbcookie=01" --cookie "iPlanetDirectoryPro=W7Ypw4OCcedS6RvJaf8a2ZSUPUQ.*AAJTSQACMDIAAlNLABw3ZThYRENRWXp5UWpXQ05lcGQ5UVgrQ0tPWVE9AAR0eXBlAANDVFMAAlMxAAIwMQ..*" --cookie "route=1686670240.228.47502.973057|f60edb382037eb2df1e800d563ad78a7" --data '{"decision": "Allow", "csrf": "W7Ypw4OCcedS6RvJaf8a2ZSUPUQ.*AAJTSQACMDIAAlNLABw3ZThYRENRWXp5UWpXQ05lcGQ5UVgrQ0tPWVE9AAR0eXBlAANDVFMAAlMxAAIwMQ..*"}' "https://xlou.iam.xlou-cdm.engineeringpit.com/am/oauth2/authorize?client_id=smokeclient&scope=fr:idm:*&redirect_uri=https://fake.com&response_type=code&realm=/" [http_cmd]: http status code OK --- status code --- http status code is 302 (expected 302) --- http response --- {'Date': 'Tue, 13 Jun 2023 15:37:28 GMT', 'Content-Length': '0', 'Connection': 'keep-alive', 'X-Frame-Options': 'SAMEORIGIN', 'X-Content-Type-Options': 'nosniff', 'Cache-Control': 'no-store', 'Location': 'https://fake.com?code=UPbPVaM1NHc2MOvqlgH7PVyU_Os&iss=https%3A%2F%2Fxlou.iam.xlou-cdm.engineeringpit.com%2Fam%2Foauth2&client_id=smokeclient', 'Pragma': 'no-cache', 'Set-Cookie': 'OAUTH_REQUEST_ATTRIBUTES=DELETED; Expires=Thu, 01 Jan 1970 00:00:00 GMT; Path=/; Secure; HttpOnly; SameSite=none', 'Strict-Transport-Security': 'max-age=15724800; includeSubDomains', 'X-ForgeRock-TransactionId': 'cd390376764ed4b4f31e6e57ef4276dc'} Oauth2 exchange authorize code for access token [http_cmd]: curl --header "Content-Type: application/x-www-form-urlencoded" -L --request POST --data '{"grant_type": "authorization_code", "redirect_uri": "https://fake.com", "client_id": "smokeclient", "code": "UPbPVaM1NHc2MOvqlgH7PVyU_Os"}' "https://xlou.iam.xlou-cdm.engineeringpit.com/am/oauth2/access_token?realm=/" [http_cmd]: http status code OK --- status code --- http status code is 200 (expected 200) --- http response --- { "access_token": "NaKl3PZ-XUmA_HVKmcfLyZLnHtE", "scope": "fr:idm:*", "token_type": "Bearer", "expires_in": 3599 } [http_cmd]: curl --header "Authorization: Bearer NaKl3PZ-XUmA_HVKmcfLyZLnHtE" --header "Content-Type: application/json" --insecure -L --request POST --data '{"userName": "SpiderMan_on_idm_20230613142801", "givenName": "Peter", "sn": "Parker", "password": "T35tr0ck123", "telephoneNumber": "6669876987", "description": "IDM Test User", "roles": [], "mail": "SpiderMan_on_idm_20230613142801@forgerock.com"}' "https://xlou.iam.xlou-cdm.engineeringpit.com/openidm/managed/user?_action=create" [http_cmd]: http status code OK --- status code --- http status code is 201 (expected [200, 201]) --- http response --- [print_head_tail]: Print head (10 lines) and tail (10 lines) of input string (33 lines): ----- output ----- { "_id": "5135bf2f-b5a2-4b45-b0b6-b927917d3db8", "_rev": "1f86dabe-a0e3-441b-80ed-f3d70ba72d0d-243", "country": null, "telephoneNumber": "6669876987", "mail": "SpiderMan_on_idm_20230613142801@forgerock.com", "memberOfOrgIDs": [], "city": null, "displayName": null, "assignedDashboard": [], [...] "effectiveGroups": [], "preferences": null, "organizationName": null, "givenName": "Peter", "stateProvince": null, "userName": "SpiderMan_on_idm_20230613142801", "postalAddress": null, "effectiveRoles": [], "activateAccount": null } ________________________________________________________________________________ [13/Jun/2023 15:37:29] Validation_user_idm step2 : Make sure we can search the user both in IDM ________________________________________________________________________________ Create new LoginSession for user "SpiderMan_on_idm_20230613142801" [LoginSession] Get "access_token" token for user "SpiderMan_on_idm_20230613142801" [LoginSession] Obtaining new "access_token" token from server because it was not obtained yet for the user [LoginSession] Get "token_id" token for user "SpiderMan_on_idm_20230613142801" [LoginSession] Obtaining new "token_id" token from server because it was not obtained yet for the user Authenticate user SpiderMan_on_idm_20230613142801 via REST [http_cmd]: curl --header "X-OpenAM-Username: SpiderMan_on_idm_20230613142801" --header "X-OpenAM-Password: T35tr0ck123" --header "Content-Type: application/json" --header "Accept-API-Version: resource=2.0, protocol=1.0" -L --request POST "https://xlou.iam.xlou-cdm.engineeringpit.com/am/json/authenticate?realm=/" [http_cmd]: http status code OK --- status code --- http status code is 200 (expected 200) --- http response --- { "tokenId": "qbUXKeiNYs2_UAUctIBGpHjCM1w.*AAJTSQACMDIAAlNLABxjVFlyTFl0MHNQUWhXNGMzWnVRVVZma3lMWlU9AAR0eXBlAANDVFMAAlMxAAIwMQ..*", "successUrl": "/am/console", "realm": "/" } [LoginSession] Obtaining session info [http_cmd]: curl --header "iPlanetDirectoryPro: qbUXKeiNYs2_UAUctIBGpHjCM1w.*AAJTSQACMDIAAlNLABxjVFlyTFl0MHNQUWhXNGMzWnVRVVZma3lMWlU9AAR0eXBlAANDVFMAAlMxAAIwMQ..*" --header "Content-Type: application/json" --header "Accept-API-Version: resource=3.0, protocol=2.1" --header "filters_cookie: qbUXKeiNYs2_UAUctIBGpHjCM1w.*AAJTSQACMDIAAlNLABxjVFlyTFl0MHNQUWhXNGMzWnVRVVZma3lMWlU9AAR0eXBlAANDVFMAAlMxAAIwMQ..*" -L --request POST "https://xlou.iam.xlou-cdm.engineeringpit.com/am/json/realms/root/sessions?_action=getSessionInfo" [http_cmd]: http status code OK --- status code --- http status code is 200 (expected 200) --- http response --- { "username": "5135bf2f-b5a2-4b45-b0b6-b927917d3db8", "universalId": "id=5135bf2f-b5a2-4b45-b0b6-b927917d3db8,ou=user,ou=am-config", "realm": "/", "latestAccessTime": "2023-06-13T15:37:29Z", "maxIdleExpirationTime": "2023-06-13T16:07:29Z", "maxSessionExpirationTime": "2023-06-13T17:37:28Z", "properties": { "AMCtxId": "91cff51f-c3ee-4b43-ac83-f357da598a30-548" } } Obtain Oauth2 authz code via REST Oauth2 authorize for access token [http_cmd]: curl --header "Content-Type: application/x-www-form-urlencoded" --request POST --cookie "amlbcookie=01" --cookie "iPlanetDirectoryPro=qbUXKeiNYs2_UAUctIBGpHjCM1w.*AAJTSQACMDIAAlNLABxjVFlyTFl0MHNQUWhXNGMzWnVRVVZma3lMWlU9AAR0eXBlAANDVFMAAlMxAAIwMQ..*" --cookie "route=1686670650.428.47885.385391|f60edb382037eb2df1e800d563ad78a7" --data '{"decision": "Allow", "csrf": "qbUXKeiNYs2_UAUctIBGpHjCM1w.*AAJTSQACMDIAAlNLABxjVFlyTFl0MHNQUWhXNGMzWnVRVVZma3lMWlU9AAR0eXBlAANDVFMAAlMxAAIwMQ..*"}' "https://xlou.iam.xlou-cdm.engineeringpit.com/am/oauth2/authorize?client_id=smokeclient&scope=fr:idm:*&redirect_uri=https://fake.com&response_type=code&realm=/" [http_cmd]: http status code OK --- status code --- http status code is 302 (expected 302) --- http response --- {'Date': 'Tue, 13 Jun 2023 15:37:30 GMT', 'Content-Length': '0', 'Connection': 'keep-alive', 'X-Frame-Options': 'SAMEORIGIN', 'X-Content-Type-Options': 'nosniff', 'Cache-Control': 'no-store', 'Location': 'https://fake.com?code=vgRZcEPQGFlnkbNPecJHAsxpzUg&iss=https%3A%2F%2Fxlou.iam.xlou-cdm.engineeringpit.com%2Fam%2Foauth2&client_id=smokeclient', 'Pragma': 'no-cache', 'Set-Cookie': 'OAUTH_REQUEST_ATTRIBUTES=DELETED; Expires=Thu, 01 Jan 1970 00:00:00 GMT; Path=/; Secure; HttpOnly; SameSite=none', 'Strict-Transport-Security': 'max-age=15724800; includeSubDomains', 'X-ForgeRock-TransactionId': 'd76a27a02d75083763430727e4902dc9'} Oauth2 exchange authorize code for access token [http_cmd]: curl --header "Content-Type: application/x-www-form-urlencoded" -L --request POST --data '{"grant_type": "authorization_code", "redirect_uri": "https://fake.com", "client_id": "smokeclient", "code": "vgRZcEPQGFlnkbNPecJHAsxpzUg"}' "https://xlou.iam.xlou-cdm.engineeringpit.com/am/oauth2/access_token?realm=/" [http_cmd]: http status code OK --- status code --- http status code is 200 (expected 200) --- http response --- { "access_token": "04QBauGjaPgH2rFOE5uJ8xDoVoQ", "scope": "fr:idm:*", "token_type": "Bearer", "expires_in": 3599 } [http_cmd]: curl --header "Authorization: Bearer 04QBauGjaPgH2rFOE5uJ8xDoVoQ" --header "Content-Type: application/json" --insecure -L --request GET "https://xlou.iam.xlou-cdm.engineeringpit.com/openidm/managed/user/5135bf2f-b5a2-4b45-b0b6-b927917d3db8" [http_cmd]: http status code OK --- status code --- http status code is 200 (expected 200) --- http response --- [print_head_tail]: Print head (10 lines) and tail (10 lines) of input string (33 lines): ----- output ----- { "_id": "5135bf2f-b5a2-4b45-b0b6-b927917d3db8", "_rev": "1f86dabe-a0e3-441b-80ed-f3d70ba72d0d-243", "country": null, "telephoneNumber": "6669876987", "mail": "SpiderMan_on_idm_20230613142801@forgerock.com", "memberOfOrgIDs": [], "city": null, "displayName": null, "assignedDashboard": [], [...] "effectiveGroups": [], "preferences": null, "organizationName": null, "givenName": "Peter", "stateProvince": null, "userName": "SpiderMan_on_idm_20230613142801", "postalAddress": null, "effectiveRoles": [], "activateAccount": null } ________________________________________________________________________________ [13/Jun/2023 15:37:30] Validation_user_idm step3 : Make sure user can authenticate himself ________________________________________________________________________________ Anonymous POST to Login service endpoint to obtain appropriate callbacks Call to Login Tree [http_cmd]: curl --header "Content-Type: application/json" --header "Accept-API-Version: protocol=2.0,resource=1.0" -L --request POST "https://xlou.iam.xlou-cdm.engineeringpit.com/am/json/realms/root/authenticate?authIndexType=service&authIndexValue=Login" [http_cmd]: http status code OK --- status code --- http status code is 200 (expected 200) --- http response --- [print_head_tail]: Print head (10 lines) and tail (10 lines) of input string (39 lines): ----- output ----- { "authId": "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.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._kuChcss36L688KTBLc_8A3cTSb9VuAqRkG3G8eoX6g", "callbacks": [ { "type": "NameCallback", "output": [ { "name": "prompt", "value": "User Name" } [...] "name": "IDToken2", "value": "" } ], "_id": 1 } ], "header": "Sign In", "description": "New here? Create an account
Forgot username? Forgot password?" } Set value for first two callbacks for login Call to Login Tree with input values [http_cmd]: curl --header "Content-Type: application/json" --header "Accept-API-Version: protocol=2.0,resource=1.0" -L --request POST --data '{"authId": "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.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._kuChcss36L688KTBLc_8A3cTSb9VuAqRkG3G8eoX6g", "callbacks": [{"type": "NameCallback", "output": [{"name": "prompt", "value": "User Name"}], "input": [{"name": "IDToken1", "value": "SpiderMan_on_idm_20230613142801"}], "_id": 0}, {"type": "PasswordCallback", "output": [{"name": "prompt", "value": "Password"}], "input": [{"name": "IDToken2", "value": "T35tr0ck123"}], "_id": 1}], "header": "Sign In", "description": "New here? Create an account
Forgot username? Forgot password?"}' "https://xlou.iam.xlou-cdm.engineeringpit.com/am/json/realms/root/authenticate?authIndexType=service&authIndexValue=Login" [http_cmd]: http status code OK --- status code --- http status code is 200 (expected 200) --- http response --- { "tokenId": "tKpLaSGgstEQlenu9YzvevACSyg.*AAJTSQACMDIAAlNLABxpZmYxYjFlZmZmakFKb3RVYUl5eWtnaFczNTQ9AAR0eXBlAANDVFMAAlMxAAIwMQ..*", "successUrl": "/am/console", "realm": "/" } ________________________________________________________________________________ [13/Jun/2023 15:37:32] Validation_user_idm step4 : Make sure we can delete the user ________________________________________________________________________________ [LoginSession] Get "access_token" token for user "amadmin" [LoginSession] re-using "access_token" token that remains valid for 59m 45s [http_cmd]: curl --header "Authorization: Bearer NaKl3PZ-XUmA_HVKmcfLyZLnHtE" --header "Content-Type: application/json" --insecure -L --request DELETE "https://xlou.iam.xlou-cdm.engineeringpit.com/openidm/managed/user/5135bf2f-b5a2-4b45-b0b6-b927917d3db8" [http_cmd]: http status code OK --- status code --- http status code is 200 (expected 200) --- http response --- [print_head_tail]: Print head (10 lines) and tail (10 lines) of input string (33 lines): ----- output ----- { "_id": "5135bf2f-b5a2-4b45-b0b6-b927917d3db8", "_rev": "1f86dabe-a0e3-441b-80ed-f3d70ba72d0d-243", "country": null, "telephoneNumber": "6669876987", "mail": "SpiderMan_on_idm_20230613142801@forgerock.com", "memberOfOrgIDs": [], "city": null, "displayName": null, "assignedDashboard": [], [...] "effectiveGroups": [], "preferences": null, "organizationName": null, "givenName": "Peter", "stateProvince": null, "userName": "SpiderMan_on_idm_20230613142801", "postalAddress": null, "effectiveRoles": [], "activateAccount": null } ________________________________________________________________________________ [13/Jun/2023 15:37:33] Validation_user_idm post : Post method ________________________________________________________________________________ Setting result to PASS Task has been successfully stopped