mirror of
https://github.com/zitadel/zitadel.git
synced 2025-12-11 18:02:22 +00:00
chore: fixes to tests
This commit is contained in:
@@ -1,7 +1,7 @@
|
||||
import { test } from "@playwright/test";
|
||||
|
||||
test("username, password and email otp login, enter code manually", async ({ page }) => {
|
||||
// Given email otp is enabled on the organizaiton of the user
|
||||
// Given email otp is enabled on the organization of the user
|
||||
// Given the user has only email otp configured as second factor
|
||||
// User enters username
|
||||
// User enters password
|
||||
@@ -11,7 +11,7 @@ test("username, password and email otp login, enter code manually", async ({ pag
|
||||
});
|
||||
|
||||
test("username, password and email otp login, click link in email", async ({ page }) => {
|
||||
// Given email otp is enabled on the organizaiton of the user
|
||||
// Given email otp is enabled on the organization of the user
|
||||
// Given the user has only email otp configured as second factor
|
||||
// User enters username
|
||||
// User enters password
|
||||
@@ -21,7 +21,7 @@ test("username, password and email otp login, click link in email", async ({ pag
|
||||
});
|
||||
|
||||
test("username, password and email otp login, resend code", async ({ page }) => {
|
||||
// Given email otp is enabled on the organizaiton of the user
|
||||
// Given email otp is enabled on the organization of the user
|
||||
// Given the user has only email otp configured as second factor
|
||||
// User enters username
|
||||
// User enters password
|
||||
@@ -33,7 +33,7 @@ test("username, password and email otp login, resend code", async ({ page }) =>
|
||||
});
|
||||
|
||||
test("username, password and email otp login, wrong code", async ({ page }) => {
|
||||
// Given email otp is enabled on the organizaiton of the user
|
||||
// Given email otp is enabled on the organization of the user
|
||||
// Given the user has only email otp configured as second factor
|
||||
// User enters username
|
||||
// User enters password
|
||||
@@ -43,7 +43,7 @@ test("username, password and email otp login, wrong code", async ({ page }) => {
|
||||
});
|
||||
|
||||
test("username, password and email otp login, multiple mfa options", async ({ page }) => {
|
||||
// Given email otp and sms otp is enabled on the organizaiton of the user
|
||||
// Given email otp and sms otp is enabled on the organization of the user
|
||||
// Given the user has email and sms otp configured as second factor
|
||||
// User enters username
|
||||
// User enters password
|
||||
|
||||
@@ -1,32 +1,32 @@
|
||||
import { test } from "@playwright/test";
|
||||
|
||||
test("username, password and sms otp login", async ({ page }) => {
|
||||
// Given sms otp is enabled on the organizaiton of the user
|
||||
// Given sms otp is enabled on the organization of the user
|
||||
// Given the user has only sms otp configured as second factor
|
||||
// User enters username
|
||||
// User enters password
|
||||
// User receives an sms with a verification code
|
||||
// User receives a sms with a verification code
|
||||
// User enters the code into the ui
|
||||
// User is redirected to the app (default redirect url)
|
||||
});
|
||||
|
||||
test("username, password and sms otp login, resend code", async ({ page }) => {
|
||||
// Given sms otp is enabled on the organizaiton of the user
|
||||
// Given sms otp is enabled on the organization of the user
|
||||
// Given the user has only sms otp configured as second factor
|
||||
// User enters username
|
||||
// User enters password
|
||||
// User receives an sms with a verification code
|
||||
// User receives a sms with a verification code
|
||||
// User clicks resend code
|
||||
// User receives a new sms with a verification code
|
||||
// User is redirected to the app (default redirect url)
|
||||
});
|
||||
|
||||
test("username, password and sms otp login, wrong code", async ({ page }) => {
|
||||
// Given sms otp is enabled on the organizaiton of the user
|
||||
// Given sms otp is enabled on the organization of the user
|
||||
// Given the user has only sms otp configured as second factor
|
||||
// User enters username
|
||||
// User enters password
|
||||
// User receives an sms with a verification code
|
||||
// User enters a wrond code
|
||||
// User receives a sms with a verification code
|
||||
// User enters a wrong code
|
||||
// Error message - "Invalid code" is shown
|
||||
});
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
import { test } from "@playwright/test";
|
||||
|
||||
test("username, password and totp login", async ({ page }) => {
|
||||
// Given totp is enabled on the organizaiton of the user
|
||||
// Given totp is enabled on the organization of the user
|
||||
// Given the user has only totp configured as second factor
|
||||
// User enters username
|
||||
// User enters password
|
||||
@@ -11,7 +11,7 @@ test("username, password and totp login", async ({ page }) => {
|
||||
});
|
||||
|
||||
test("username, password and totp otp login, wrong code", async ({ page }) => {
|
||||
// Given totp is enabled on the organizaiton of the user
|
||||
// Given totp is enabled on the organization of the user
|
||||
// Given the user has only totp configured as second factor
|
||||
// User enters username
|
||||
// User enters password
|
||||
@@ -21,7 +21,7 @@ test("username, password and totp otp login, wrong code", async ({ page }) => {
|
||||
});
|
||||
|
||||
test("username, password and totp login, multiple mfa options", async ({ page }) => {
|
||||
// Given totp and email otp is enabled on the organizaiton of the user
|
||||
// Given totp and email otp is enabled on the organization of the user
|
||||
// Given the user has totp and email otp configured as second factor
|
||||
// User enters username
|
||||
// User enters password
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
import { test } from "@playwright/test";
|
||||
|
||||
test("username, password and u2f login", async ({ page }) => {
|
||||
// Given u2f is enabled on the organizaiton of the user
|
||||
// Given u2f is enabled on the organization of the user
|
||||
// Given the user has only u2f configured as second factor
|
||||
// User enters username
|
||||
// User enters password
|
||||
@@ -11,7 +11,7 @@ test("username, password and u2f login", async ({ page }) => {
|
||||
});
|
||||
|
||||
test("username, password and u2f login, multiple mfa options", async ({ page }) => {
|
||||
// Given u2f and semailms otp is enabled on the organizaiton of the user
|
||||
// Given u2f and semailms otp is enabled on the organization of the user
|
||||
// Given the user has u2f and email otp configured as second factor
|
||||
// User enters username
|
||||
// User enters password
|
||||
|
||||
@@ -1,11 +1,5 @@
|
||||
FirstInstance:
|
||||
PatPath: /pat/zitadel-admin-sa.pat
|
||||
PrivacyPolicy:
|
||||
TOSLink: "https://zitadel.com/docs/legal/terms-of-service"
|
||||
PrivacyLink: "https://zitadel.com/docs/legal/policies/privacy-policy"
|
||||
HelpLink: "https://zitadel.com/docs"
|
||||
SupportEmail: "support@zitadel.com"
|
||||
DocsLink: "https://zitadel.com/docs"
|
||||
Org:
|
||||
Human:
|
||||
UserName: zitadel-admin
|
||||
@@ -21,6 +15,14 @@ FirstInstance:
|
||||
Pat:
|
||||
ExpirationDate: 2099-01-01T00:00:00Z
|
||||
|
||||
DefaultInstance:
|
||||
PrivacyPolicy:
|
||||
TOSLink: "https://zitadel.com/docs/legal/terms-of-service"
|
||||
PrivacyLink: "https://zitadel.com/docs/legal/policies/privacy-policy"
|
||||
HelpLink: "https://zitadel.com/docs"
|
||||
SupportEmail: "support@zitadel.com"
|
||||
DocsLink: "https://zitadel.com/docs"
|
||||
|
||||
Database:
|
||||
EventPushConnRatio: 0.2 # 4
|
||||
ProjectionSpoolerConnRatio: 0.3 # 6
|
||||
|
||||
Reference in New Issue
Block a user