Skip to content

Commit

Permalink
refactor(ci): update fapi conformance runner and op
Browse files Browse the repository at this point in the history
  • Loading branch information
panva committed Jul 23, 2022
1 parent 013ad84 commit 0fcc112
Show file tree
Hide file tree
Showing 11 changed files with 197 additions and 397 deletions.
62 changes: 25 additions & 37 deletions .github/workflows/test.yml
Original file line number Diff line number Diff line change
Expand Up @@ -206,125 +206,125 @@ jobs:
client_auth_type: private_key_jwt
fapi_profile: plain_fapi
fapi_response_mode: plain_response
configuration: ./certification/fapi/pkjwt.json
configuration: ./certification/fapi/plan.json
- plan: fapi-rw-id2-test-plan
fapi_auth_request_method: pushed
client_auth_type: private_key_jwt
fapi_profile: plain_fapi
fapi_response_mode: plain_response
configuration: ./certification/fapi/pkjwt.json
configuration: ./certification/fapi/plan.json
- plan: fapi-rw-id2-test-plan
fapi_auth_request_method: by_value
client_auth_type: private_key_jwt
fapi_profile: plain_fapi
fapi_response_mode: jarm
configuration: ./certification/fapi/pkjwt.json
configuration: ./certification/fapi/plan.json
- plan: fapi-rw-id2-test-plan
fapi_auth_request_method: pushed
client_auth_type: private_key_jwt
fapi_profile: plain_fapi
fapi_response_mode: jarm
configuration: ./certification/fapi/pkjwt.json
configuration: ./certification/fapi/plan.json
- plan: fapi-rw-id2-test-plan
fapi_auth_request_method: by_value
client_auth_type: mtls
fapi_profile: plain_fapi
fapi_response_mode: plain_response
configuration: ./certification/fapi/mtls.json
configuration: ./certification/fapi/plan.json
- plan: fapi-rw-id2-test-plan
fapi_auth_request_method: pushed
client_auth_type: mtls
fapi_profile: plain_fapi
fapi_response_mode: plain_response
configuration: ./certification/fapi/mtls.json
configuration: ./certification/fapi/plan.json
- plan: fapi-rw-id2-test-plan
fapi_auth_request_method: by_value
client_auth_type: mtls
fapi_profile: plain_fapi
fapi_response_mode: jarm
configuration: ./certification/fapi/mtls.json
configuration: ./certification/fapi/plan.json
- plan: fapi-rw-id2-test-plan
fapi_auth_request_method: pushed
client_auth_type: mtls
fapi_profile: plain_fapi
fapi_response_mode: jarm
configuration: ./certification/fapi/mtls.json
configuration: ./certification/fapi/plan.json

# FAPI 1.0 Advanced (Final)
- plan: fapi1-advanced-final-test-plan
fapi_auth_request_method: by_value
client_auth_type: private_key_jwt
fapi_profile: plain_fapi
fapi_response_mode: plain_response
configuration: ./certification/fapi/pkjwt.json
configuration: ./certification/fapi/plan.json
- plan: fapi1-advanced-final-test-plan
fapi_auth_request_method: pushed
client_auth_type: private_key_jwt
fapi_profile: plain_fapi
fapi_response_mode: plain_response
configuration: ./certification/fapi/pkjwt.json
configuration: ./certification/fapi/plan.json
- plan: fapi1-advanced-final-test-plan
fapi_auth_request_method: by_value
client_auth_type: private_key_jwt
fapi_profile: plain_fapi
fapi_response_mode: jarm
configuration: ./certification/fapi/pkjwt.json
configuration: ./certification/fapi/plan.json
- plan: fapi1-advanced-final-test-plan
fapi_auth_request_method: pushed
client_auth_type: private_key_jwt
fapi_profile: plain_fapi
fapi_response_mode: jarm
configuration: ./certification/fapi/pkjwt.json
configuration: ./certification/fapi/plan.json
- plan: fapi1-advanced-final-test-plan
fapi_auth_request_method: by_value
client_auth_type: mtls
fapi_profile: plain_fapi
fapi_response_mode: plain_response
configuration: ./certification/fapi/mtls.json
configuration: ./certification/fapi/plan.json
- plan: fapi1-advanced-final-test-plan
fapi_auth_request_method: pushed
client_auth_type: mtls
fapi_profile: plain_fapi
fapi_response_mode: plain_response
configuration: ./certification/fapi/mtls.json
configuration: ./certification/fapi/plan.json
- plan: fapi1-advanced-final-test-plan
fapi_auth_request_method: by_value
client_auth_type: mtls
fapi_profile: plain_fapi
fapi_response_mode: jarm
configuration: ./certification/fapi/mtls.json
configuration: ./certification/fapi/plan.json
- plan: fapi1-advanced-final-test-plan
fapi_auth_request_method: pushed
client_auth_type: mtls
fapi_profile: plain_fapi
fapi_response_mode: jarm
configuration: ./certification/fapi/mtls.json
configuration: ./certification/fapi/plan.json

# FAPI RW-CIBA-ID1
- plan: fapi-ciba-id1-test-plan
client_auth_type: private_key_jwt
fapi_profile: plain_fapi
ciba_mode: poll
client_registration: dynamic_client
configuration: ./certification/fapi/pkjwt.json
configuration: ./certification/fapi/plan.json
- plan: fapi-ciba-id1-test-plan
client_auth_type: private_key_jwt
fapi_profile: plain_fapi
ciba_mode: ping
client_registration: dynamic_client
configuration: ./certification/fapi/pkjwt.json
configuration: ./certification/fapi/plan.json
- plan: fapi-ciba-id1-test-plan
client_auth_type: mtls
fapi_profile: plain_fapi
ciba_mode: poll
client_registration: dynamic_client
configuration: ./certification/fapi/mtls.json
configuration: ./certification/fapi/plan.json
- plan: fapi-ciba-id1-test-plan
client_auth_type: mtls
fapi_profile: plain_fapi
ciba_mode: ping
client_registration: dynamic_client
configuration: ./certification/fapi/mtls.json
configuration: ./certification/fapi/plan.json

# Extensive
- plan: oidcc-test-plan
Expand Down Expand Up @@ -466,27 +466,17 @@ jobs:
- run: npm clean-install
- name: Run oidc-provider (OIDC)
run: npx c8 node certification/oidc/docker &
if: ${{ startsWith(matrix.setup.plan, 'oidcc-') }}
if: ${{ startsWith(matrix.setup.plan, 'oidcc') }}
env:
PORT: 3000
ISSUER: https://172.17.0.1:3000
NODE_TLS_REJECT_UNAUTHORIZED: 0
- name: Run oidc-provider (FAPI 1.0 R/W - ID2)
- name: Run oidc-provider (FAPI)
run: npx c8 node certification/fapi &
if: ${{ startsWith(matrix.setup.plan, 'fapi-') }}
if: ${{ startsWith(matrix.setup.plan, 'fapi') }}
env:
ISSUER: https://172.17.0.1:3000
PORT: 3000
PROFILE: '1.0 ID2'
NODE_OPTIONS: --tls-cipher-list="ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384"
NODE_TLS_REJECT_UNAUTHORIZED: 0
- name: Run oidc-provider (FAPI 1.0 Advanced - Final)
run: npx c8 node certification/fapi &
if: ${{ startsWith(matrix.setup.plan, 'fapi1-') }}
env:
ISSUER: https://172.17.0.1:3000
PROFILE: '1.0 Final'
PORT: 3000
NODE_OPTIONS: --tls-cipher-list="ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384"
NODE_TLS_REJECT_UNAUTHORIZED: 0
- name: Set Conformance Suite Version
Expand All @@ -513,10 +503,8 @@ jobs:
- name: Adjust configuration files for CI
run: |
sed -i -e 's/op.panva.cz/172.17.0.1:3000/g' certification/oidc/plan.json
sed -i -e 's/mtls.fapi.panva.cz/172.17.0.1:3000/g' certification/fapi/mtls.json
sed -i -e 's/fapi.panva.cz/172.17.0.1:3000/g' certification/fapi/mtls.json
sed -i -e 's/mtls.fapi.panva.cz/172.17.0.1:3000/g' certification/fapi/pkjwt.json
sed -i -e 's/fapi.panva.cz/172.17.0.1:3000/g' certification/fapi/pkjwt.json
sed -i -e 's/mtls.fapi.panva.cz/172.17.0.1:3000/g' certification/fapi/plan.json
sed -i -e 's/fapi.panva.cz/172.17.0.1:3000/g' certification/fapi/plan.json
- name: Run the plan
run: npx mocha --delay --timeout 0 --retries 0 certification/runner
env:
Expand Down
Loading

0 comments on commit 0fcc112

Please sign in to comment.