[OID4VCI] align issuer metadata/encryption behavior and move encryption tests to base suite#48048
Conversation
94e6345 to
caf9f32
Compare
…o base suite closes keycloak#46274 Signed-off-by: forkimenjeckayang <[email protected]>
c30ba00 to
98c9194
Compare
|
Could you name the test module(s) that this fixes. Perhaps also worth mentioning the conformance suite git rev that you are using. |
This addresses We validated against conformance-suite Observed suite build during validation: |
…o base suite closes keycloak#46274 Signed-off-by: forkimenjeckayang <[email protected]>
98c9194 to
774e9ec
Compare
…d4vc into oid4vci-conformace-1
Perfect, please also notice it solves this issue raised #46274. |
mposolda
left a comment
There was a problem hiding this comment.
@forkimenjeckayang @tdiesler Thanks for the PR and review and additional comments.
Added few comments inline. Can you check them? Besides that, few other points:
-
The admin console UI is unsynced after those changes. There is single attribute in the UI
Require Encryption, which has tooltips mentioning request encryptions (which is not the case with your changes, as it is effectively changed to the "response encryption"). Is it possible to update UI to haveRequire Request EncryptionandRequire Response Encryptionand update the tooltips accordingly? Also I hope that additional attribute for the "Signature" will not be needed (otherwise will be good to re-add that to the UI as well, but hopefully not...) -
Nitpick: Is it possible to rename method
OID4VCIssuerWellKnownProvider.buildJwksmaybe to something likebuildJwksForEncryption? So it is a bit more clear that it is intended for encryption -
It seems that when
require request encryptionis configured to true, it is not enforced at the credential-request that credential request is really encrypted? Per my understanding, if encryption is required for the request, we should reject credential request to the credential-endpoint in case that it is not encrypted. Is it correct? Feel free to do this point as a follow-up if you prefer (as I guess it may need some additional tests etc)
Signed-off-by: forkimenjeckayang <[email protected]>
Unreported flaky test detectedIf the flaky tests below are affected by the changes, please review and update the changes accordingly. Otherwise, a maintainer should report the flaky tests prior to merging the PR. org.keycloak.testsuite.authz.PolicyEvaluationTest# |
Thank you for taking out time to review @mposolda |
mposolda
left a comment
There was a problem hiding this comment.
@forkimenjeckayang Thanks a lot for the updates!
I've added one small comment inline regarding attribute name.
Besides that: It can be good that there is built-in support for encrypted requests/responses in the OAuthClient/OID4VCClient framework, so that OID4VCIssuerEndpointEncryptionTest does not need to directly use Apache HTTP client. But that might be OK to do as a follow-up, so that this PR can be merged asap.
Signed-off-by: forkimenjeckayang <[email protected]>
Thank you @mposolda , I created a follow up PR #48462 from this branch. to address this. |
mposolda
left a comment
There was a problem hiding this comment.
@forkimenjeckayang Thanks!
…tests to base suite (keycloak#48048) closes keycloak#46274 Signed-off-by: forkimenjeckayang <[email protected]>
This is the very begining of sending small seperate PRs with fixes related to running OID4VCI Final conformance tests
OpenID for Verifiable Credential Issuance 1.0 Final: Test an issueragaist keycloak.Summary
OID4VCIssuerEndpointEncryptionTestfrom the legacy integration testsuite location totests/base.OID4VCJWTIssuerEndpointTest,OID4VCIssuerWellKnownProviderTest) and resolve merge conflicts.Related to : #46265
See: adorsys#245 (comment)
closes #46274