mirror of
https://github.com/zitadel/zitadel.git
synced 2025-12-12 00:52:48 +00:00
add more user test flows
This commit is contained in:
@@ -16,7 +16,7 @@ const test = base.extend<{ user: PasswordUserWithOTP }>({
|
|||||||
lastName: "last",
|
lastName: "last",
|
||||||
password: "Password1!",
|
password: "Password1!",
|
||||||
organization: "",
|
organization: "",
|
||||||
type: OtpType.sms,
|
type: OtpType.email,
|
||||||
});
|
});
|
||||||
|
|
||||||
await user.ensure(page);
|
await user.ensure(page);
|
||||||
@@ -61,7 +61,6 @@ test("username, password and email otp login, resend code", async ({user, page})
|
|||||||
// User is redirected to the app
|
// User is redirected to the app
|
||||||
});
|
});
|
||||||
|
|
||||||
|
|
||||||
test("username, password and email otp login, wrong code", async ({user, page}) => {
|
test("username, password and email otp login, wrong code", async ({user, page}) => {
|
||||||
// Given email otp is enabled on the organizaiton of the user
|
// Given email otp is enabled on the organizaiton of the user
|
||||||
// Given the user has only email otp configured as second factor
|
// Given the user has only email otp configured as second factor
|
||||||
|
|||||||
63
acceptance/tests/username-password-totp.spec.ts
Normal file
63
acceptance/tests/username-password-totp.spec.ts
Normal file
@@ -0,0 +1,63 @@
|
|||||||
|
import {test as base} from "@playwright/test";
|
||||||
|
import {OtpType, PasswordUserWithOTP} from './user';
|
||||||
|
import path from 'path';
|
||||||
|
import dotenv from 'dotenv';
|
||||||
|
import {loginScreenExpect, loginWithPassword} from "./login";
|
||||||
|
import {startSink} from "./otp";
|
||||||
|
|
||||||
|
// Read from ".env" file.
|
||||||
|
dotenv.config({path: path.resolve(__dirname, '.env.local')});
|
||||||
|
|
||||||
|
const test = base.extend<{ user: PasswordUserWithOTP }>({
|
||||||
|
user: async ({page}, use) => {
|
||||||
|
const user = new PasswordUserWithOTP({
|
||||||
|
email: "otp_sms@example.com",
|
||||||
|
firstName: "first",
|
||||||
|
lastName: "last",
|
||||||
|
password: "Password1!",
|
||||||
|
organization: "",
|
||||||
|
type: OtpType.sms,
|
||||||
|
});
|
||||||
|
|
||||||
|
await user.ensure(page);
|
||||||
|
await use(user);
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
test("username, password and totp login", async ({user, page}) => {
|
||||||
|
// Given totp is enabled on the organizaiton of the user
|
||||||
|
// Given the user has only totp configured as second factor
|
||||||
|
|
||||||
|
// User enters username
|
||||||
|
// User enters password
|
||||||
|
// Screen for entering the code is shown directly
|
||||||
|
// User enters the code into the ui
|
||||||
|
// User is redirected to the app
|
||||||
|
});
|
||||||
|
|
||||||
|
|
||||||
|
test("username, password and totp otp login, wrong code", async ({user, page}) => {
|
||||||
|
// Given totp is enabled on the organizaiton of the user
|
||||||
|
// Given the user has only totp configured as second factor
|
||||||
|
|
||||||
|
// User enters username
|
||||||
|
// User enters password
|
||||||
|
// Screen for entering the code is shown directly
|
||||||
|
// User enters a wrond code
|
||||||
|
// Error message - "Invalid code" is shown
|
||||||
|
});
|
||||||
|
|
||||||
|
|
||||||
|
test("username, password and totp login, multiple mfa options", async ({user, page}) => {
|
||||||
|
// Given totp and email otp is enabled on the organizaiton of the user
|
||||||
|
// Given the user has totp and email otp configured as second factor
|
||||||
|
|
||||||
|
// User enters username
|
||||||
|
// User enters password
|
||||||
|
// Screen for entering the code is shown directly
|
||||||
|
// Button to switch to email otp is shown
|
||||||
|
// User clicks button to use email otp instead
|
||||||
|
// User receives an email with a verification code
|
||||||
|
// User enters code in ui
|
||||||
|
// User is redirected to the app
|
||||||
|
});
|
||||||
52
acceptance/tests/username-password-u2f_email.spec.ts
Normal file
52
acceptance/tests/username-password-u2f_email.spec.ts
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
import {test as base} from "@playwright/test";
|
||||||
|
import {OtpType, PasswordUserWithOTP} from './user';
|
||||||
|
import path from 'path';
|
||||||
|
import dotenv from 'dotenv';
|
||||||
|
import {loginScreenExpect, loginWithPassword} from "./login";
|
||||||
|
import {startSink} from "./otp";
|
||||||
|
|
||||||
|
// Read from ".env" file.
|
||||||
|
dotenv.config({path: path.resolve(__dirname, '.env.local')});
|
||||||
|
|
||||||
|
const test = base.extend<{ user: PasswordUserWithOTP }>({
|
||||||
|
user: async ({page}, use) => {
|
||||||
|
const user = new PasswordUserWithOTP({
|
||||||
|
email: "otp_sms@example.com",
|
||||||
|
firstName: "first",
|
||||||
|
lastName: "last",
|
||||||
|
password: "Password1!",
|
||||||
|
organization: "",
|
||||||
|
type: OtpType.sms,
|
||||||
|
});
|
||||||
|
|
||||||
|
await user.ensure(page);
|
||||||
|
await use(user);
|
||||||
|
},
|
||||||
|
});
|
||||||
|
|
||||||
|
|
||||||
|
test("username, password and u2f login", async ({user, page}) => {
|
||||||
|
// Given u2f is enabled on the organizaiton of the user
|
||||||
|
// Given the user has only u2f configured as second factor
|
||||||
|
|
||||||
|
// User enters username
|
||||||
|
// User enters password
|
||||||
|
// Popup for u2f is directly opened
|
||||||
|
// User verifies u2f
|
||||||
|
// User is redirected to the app
|
||||||
|
});
|
||||||
|
|
||||||
|
|
||||||
|
test("username, password and u2f login, multiple mfa options", async ({user, page}) => {
|
||||||
|
// Given u2f and semailms otp is enabled on the organizaiton of the user
|
||||||
|
// Given the user has u2f and email otp configured as second factor
|
||||||
|
|
||||||
|
// User enters username
|
||||||
|
// User enters password
|
||||||
|
// Popup for u2f is directly opened
|
||||||
|
// User aborts u2f verification
|
||||||
|
// User clicks button to use email otp as second factor
|
||||||
|
// User receives an email with a verification code
|
||||||
|
// User enters code in ui
|
||||||
|
// User is redirected to the app
|
||||||
|
});
|
||||||
Reference in New Issue
Block a user