8.9 KiB
E2E Tests: AWS Provider Management
Suite ID: PROVIDER-E2E
Feature: AWS Provider Management - Add and configure AWS cloud providers with different authentication methods
Test Case: PROVIDER-E2E-001 - Add AWS Provider with Static Credentials
Priority: critical
Tags:
- type → @e2e, @serial
- feature → @providers
- provider → @aws
Description/Objective: Validates the complete flow of adding a new AWS provider using static access key credentials
Preconditions:
- Admin user authentication required (admin.auth.setup setup)
- Environment variables configured: E2E_AWS_PROVIDER_ACCOUNT_ID, E2E_AWS_PROVIDER_ACCESS_KEY and E2E_AWS_PROVIDER_SECRET_KEY
- Remove any existing provider with the same Account ID before starting the test
- This test must be run serially and never in parallel with other tests, as it requires the Account ID not to be already registered beforehand.
Flow Steps:
- Navigate to providers page
- Click "Add Provider" button
- Select AWS provider type
- Fill provider details (account ID and alias)
- Select "credentials" authentication type
- Fill static credentials (access key and secret key)
- Launch initial scan
- Verify redirect to provider management page
Expected Result:
- AWS provider successfully added with static credentials
- Initial scan launched successfully
- User redirected to provider details page
Key verification points:
- Provider page loads correctly
- Connect account page displays AWS option
- Credentials form accepts static credentials
- Launch scan page appears
- Successful redirect to provider page after scan launch
Notes:
- Test uses environment variables for AWS credentials
- Provider cleanup performed before each test to ensure clean state
- Requires valid AWS account with appropriate permissions
Test Case: PROVIDER-E2E-002 - Add AWS Provider with Assume Role Credentials Access Key and Secret Key
Priority: critical
Tags:
- type → @e2e, @serial
- feature → @providers
- provider → @aws
Description/Objective: Validates the complete flow of adding a new AWS provider using role-based authentication with Access Key and Secret Key
Preconditions:
- Admin user authentication required (admin.auth.setup setup)
- Environment variables configured: E2E_AWS_PROVIDER_ACCOUNT_ID, E2E_AWS_PROVIDER_ACCESS_KEY, E2E_AWS_PROVIDER_SECRET_KEY, E2E_AWS_PROVIDER_ROLE_ARN
- Remove any existing provider with the same Account ID before starting the test
- This test must be run serially and never in parallel with other tests, as it requires the Account ID not to be already registered beforehand.
Flow Steps:
- Navigate to providers page
- Click "Add Provider" button
- Select AWS provider type
- Fill provider details (account ID and alias)
- Select "role" authentication type
- Fill role credentials (access key, secret key, and role ARN)
- Launch initial scan
- Verify redirect to provider management page
Expected Result:
- AWS provider successfully added with role credentials
- Initial scan launched successfully
- User redirected to provider details page
Key verification points:
- Provider page loads correctly
- Connect account page displays AWS option
- Role credentials form accepts all required fields
- Launch scan page appears
- Successful redirect to provider page after scan launch
Notes:
- Test uses environment variables for AWS credentials and role ARN
- Provider cleanup performed before each test to ensure clean state
- Requires valid AWS account with role assumption permissions
- Role ARN must be properly configured
Test Case: PROVIDER-E2E-003 - Add Azure Provider with Static Credentials
Priority: critical
Tags:
- type → @e2e, @serial
- feature → @providers
- provider → @azure
Description/Objective: Validates the complete flow of adding a new Azure provider using static client credentials (Client ID, Client Secret, Tenant ID)
Preconditions:
- Admin user authentication required (admin.auth.setup setup)
- Environment variables configured: E2E_AZURE_SUBSCRIPTION_ID, E2E_AZURE_CLIENT_ID, E2E_AZURE_SECRET_ID, E2E_AZURE_TENANT_ID
- Remove any existing provider with the same Subscription ID before starting the test
- This test must be run serially and never in parallel with other tests, as it requires the Subscription ID not to be already registered beforehand.
Flow Steps:
- Navigate to providers page
- Click "Add Provider" button
- Select Azure provider type
- Fill provider details (subscription ID and alias)
- Fill Azure credentials (client ID, client secret, tenant ID)
- Launch initial scan
- Verify redirect to provider management page
Expected Result:
- Azure provider successfully added with static credentials
- Initial scan launched successfully
- User redirected to provider details page
Key verification points:
- Provider page loads correctly
- Connect account page displays Azure option
- Azure credentials form accepts all required fields
- Launch scan page appears
- Successful redirect to provider page after scan launch
Notes:
- Test uses environment variables for Azure credentials
- Provider cleanup performed before each test to ensure clean state
- Requires valid Azure subscription with appropriate permissions
- Client credentials must have sufficient permissions for security scanning
Test Case: PROVIDER-E2E-004 - Add M365 Provider with Static Credentials
Priority: critical
Tags:
- type → @e2e, @serial
- feature → @providers
- provider → @m365
Description/Objective: Validates the complete flow of adding a new Microsoft 365 provider using static client credentials (Client ID, Client Secret, Tenant ID) tied to a Domain ID.
Preconditions:
- Admin user authentication required (admin.auth.setup setup)
- Environment variables configured: E2E_M365_DOMAIN_ID, E2E_M365_CLIENT_ID, E2E_M365_SECRET_ID, E2E_M365_TENANT_ID
- Remove any existing provider with the same Domain ID before starting the test
- This test must be run serially and never in parallel with other tests, as it requires the Domain ID not to be already registered beforehand.
Flow Steps:
- Navigate to providers page
- Click "Add Provider" button
- Select M365 provider type
- Fill provider details (domain ID and alias)
- Select static credentials type
- Fill M365 credentials (client ID, client secret, tenant ID)
- Launch initial scan
- Verify redirect to provider management page
Expected Result:
- M365 provider successfully added with static credentials
- Initial scan launched successfully
- User redirected to provider details page
Key verification points:
- Provider page loads correctly
- Connect account page displays M365 option
- M365 credentials form accepts all required fields
- Launch scan page appears
- Successful redirect to provider page after scan launch
Notes:
- Test uses environment variables for M365 credentials
- Provider cleanup performed before each test to ensure clean state
- Requires valid Microsoft 365 tenant with appropriate permissions
- Client credentials must have sufficient permissions for security scanning
Test Case: PROVIDER-E2E-005 - Add M365 Provider with Certificate Credentials
Priority: critical
Tags:
- type → @e2e, @serial
- feature → @providers
- provider → @m365
Description/Objective: Validates the complete flow of adding a new Microsoft 365 provider using certificate-based authentication (Client ID, Tenant ID, Certificate Content) tied to a Domain ID.
Preconditions:
- Admin user authentication required (admin.auth.setup setup)
- Environment variables configured: E2E_M365_DOMAIN_ID, E2E_M365_CLIENT_ID, E2E_M365_TENANT_ID, E2E_M365_CERTIFICATE_CONTENT
- Remove any existing provider with the same Domain ID before starting the test
- This test must be run serially and never in parallel with other tests, as it requires the Domain ID not to be already registered beforehand.
Flow Steps:
- Navigate to providers page
- Click "Add Provider" button
- Select M365 provider type
- Fill provider details (domain ID and alias)
- Select certificate credentials type
- Fill M365 certificate credentials (client ID, tenant ID, certificate content)
- Launch initial scan
- Verify redirect to provider management page
Expected Result:
- M365 provider successfully added with certificate credentials
- Initial scan launched successfully
- User redirected to provider details page
Key verification points:
- Provider page loads correctly
- Connect account page displays M365 option
- Certificate credentials form accepts all required fields
- Launch scan page appears
- Successful redirect to provider page after scan launch
Notes:
- Test uses environment variables for M365 certificate credentials
- Provider cleanup performed before each test to ensure clean state
- Requires valid Microsoft 365 tenant with certificate-based authentication
- Certificate must be properly configured and have sufficient permissions for security scanning