mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
4016ff1bba
* Removal of the Redirect header sent by Authelia /api/verify endpoint. * Authelia does not consume Host header anymore but X-Forwarded-Proto and X-Forwarded-Host to compute the link sent in identity verification emails. * Authelia used Host header as the application name for U2F authentication but it's now using X-Forwarded-* headers.
21 lines
804 B
TypeScript
21 lines
804 B
TypeScript
import AutheliaSuite from "../../helpers/context/AutheliaSuite";
|
|
import { exec } from '../../helpers/utils/exec';
|
|
import BypassPolicy from "./scenarii/BypassPolicy";
|
|
import NoDefaultRedirectionUrl from "./scenarii/NoDefaultRedirectionUrl";
|
|
import CustomHeadersForwarded from "./scenarii/CustomHeadersForwarded";
|
|
|
|
process.env["NODE_TLS_REJECT_UNAUTHORIZED"] = 0 as any;
|
|
|
|
process.env["NODE_TLS_REJECT_UNAUTHORIZED"] = 0 as any;
|
|
|
|
AutheliaSuite(__dirname, function() {
|
|
this.timeout(10000);
|
|
|
|
beforeEach(async function() {
|
|
await exec(`cp ${__dirname}/users_database.yml ${__dirname}/users_database.test.yml`);
|
|
});
|
|
|
|
describe('Bypass policy', BypassPolicy);
|
|
describe("No default redirection", NoDefaultRedirectionUrl);
|
|
describe("Custom headers forwarded on bypass", CustomHeadersForwarded);
|
|
}); |