Files
zitadel/acceptance/tests/username-password-otp_sms.spec.ts

69 lines
2.6 KiB
TypeScript
Raw Normal View History

2024-11-20 14:22:22 +01:00
import { faker } from "@faker-js/faker";
import { test as base } from "@playwright/test";
import dotenv from "dotenv";
import path from "path";
import { code } from "./code";
import { codeScreenExpect } from "./code-screen";
import { loginScreenExpect, loginWithPassword, loginWithPasswordAndPhoneOTP } from "./login";
2024-11-20 14:22:22 +01:00
import { OtpType, PasswordUserWithOTP } from "./user";
2024-11-15 09:29:48 +01:00
2024-11-20 14:22:22 +01:00
// Read from ".env" file.
dotenv.config({ path: path.resolve(__dirname, ".env.local") });
const test = base.extend<{ user: PasswordUserWithOTP; sink: any }>({
user: async ({ page }, use) => {
const user = new PasswordUserWithOTP({
email: faker.internet.email(),
firstName: faker.person.firstName(),
lastName: faker.person.lastName(),
organization: "",
phone: faker.phone.number({ style: "international" }),
2024-11-20 14:22:22 +01:00
password: "Password1!",
type: OtpType.sms,
});
await user.ensure(page);
await use(user);
2024-11-28 14:38:13 +01:00
await user.cleanup();
2024-11-20 14:22:22 +01:00
},
});
test("username, password and sms otp login, enter code manually", async ({ user, page }) => {
2024-11-19 16:19:45 +01:00
// Given sms otp is enabled on the organization of the user
2024-11-19 11:33:42 +01:00
// Given the user has only sms otp configured as second factor
// User enters username
// User enters password
2024-11-19 16:19:45 +01:00
// User receives a sms with a verification code
2024-11-19 11:33:42 +01:00
// User enters the code into the ui
// User is redirected to the app (default redirect url)
2024-11-20 14:22:22 +01:00
await loginWithPasswordAndPhoneOTP(page, user.getUsername(), user.getPassword(), user.getPhone());
await loginScreenExpect(page, user.getFullName());
2024-11-15 09:29:48 +01:00
});
2024-11-20 14:22:22 +01:00
test("username, password and sms otp login, resend code", async ({ user, page }) => {
2024-11-19 16:19:45 +01:00
// Given sms otp is enabled on the organization of the user
2024-11-19 11:33:42 +01:00
// Given the user has only sms otp configured as second factor
// User enters username
// User enters password
2024-11-19 16:19:45 +01:00
// User receives a sms with a verification code
2024-11-19 11:33:42 +01:00
// User clicks resend code
// User receives a new sms with a verification code
// User is redirected to the app (default redirect url)
await loginWithPasswordAndPhoneOTP(page, user.getUsername(), user.getPassword(), user.getPhone());
await loginScreenExpect(page, user.getFullName());
2024-11-18 09:30:23 +01:00
});
2024-11-20 14:22:22 +01:00
test("username, password and sms otp login, wrong code", async ({ user, page }) => {
2024-11-19 16:19:45 +01:00
// Given sms otp is enabled on the organization of the user
2024-11-19 11:33:42 +01:00
// Given the user has only sms otp configured as second factor
// User enters username
// User enters password
2024-11-19 16:19:45 +01:00
// User receives a sms with a verification code
// User enters a wrong code
2024-11-19 11:33:42 +01:00
// Error message - "Invalid code" is shown
const c = "wrongcode";
await loginWithPassword(page, user.getUsername(), user.getPassword());
await code(page, c);
await codeScreenExpect(page, c);
2024-11-18 09:30:23 +01:00
});