-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
0.4.4 test run #262
Comments
Test setup for running an oauth release candidate version together with openidconnect:
Issues with this setup: |
The login screen should offer kopano as an Alternative login, as e.g. seen on |
I guess this configuration should be done in config.php file in the line: https://github.com/owncloud/core/blob/master/config/config.sample.php#L247 |
Having a oC 10.4.1 server, trying to test oauth2 0.4.4 and openideconnect having both enable using https://owncloud.github.io/ocis/bridge/#how-to-do-it. When I run this step: https://owncloud.github.io/ocis/bridge/#check-it-is-up-and-running
the credentials i am trying are the ones from the oC user admin/admin glauth is configured to use owncloud as a backend. It was launched like this:
graphapi: 0.0.1 app is installed and enabled
|
@davitol this should solve your owncloud/oauth2#262 (comment)
This comment #262 (comment) was solved in owncloud/ocis#248 |
@davitol this should solve your owncloud/oauth2#262 (comment)
Test Run Document
References:
Versions used:
OAuth2 app Test Plan
This aims to be a client-agnostic testplan for the OAuth2 application, centered in the actions available in the webUI and/or
occ
commands and their impact on ownCloud's core behavior. To test the application from a client standpoint see:Testing functionality
occ app:enable oauth2
- Replies from the WebDAV endpoint includes a new
WWW-Authenticate: Bearer...
headerno applications authorized.
curl -I http://$SERER/remote.php/webdav | grep -i www-auth
www-authendicate: bearer
occ app:disable oauth2
- Previously mentioned header goes away in further requests
curl -I http://$SERER/remote.php/webdav | grep -i www-auth
www-authenticate: basic ...
client_id
andclient_secret
are generated together with a (required) Client Name and a (required) Redirection URL- All client sessions opened from those clients get removed
1. enter URL at desktop client, hit next.
2 client redirects to browser, change client_id in url to something different. Hit enter again.
user
parameter in: #67openidconnect app Test Plan
TODO
The text was updated successfully, but these errors were encountered: