mirror of
https://github.com/zitadel/zitadel.git
synced 2025-08-14 00:07:41 +00:00
chore: zitadel version
This commit is contained in:
@@ -47,11 +47,8 @@ export ZITADEL_DEV_UID="$(id -u)"
|
|||||||
# Pull images
|
# Pull images
|
||||||
docker compose --file ./acceptance/docker-compose.yaml pull
|
docker compose --file ./acceptance/docker-compose.yaml pull
|
||||||
|
|
||||||
# Run ZITADEL and configure ./apps/login/.env.local
|
# Run ZITADEL with local notification sink and configure ./apps/login/.env.local
|
||||||
docker compose --file ./acceptance/docker-compose.yaml run setup
|
pnpm run-sink
|
||||||
|
|
||||||
# Configure your shell to use the environment variables written to ./apps/login/.env.acceptance
|
|
||||||
export $(cat ./apps/login/.env.acceptance | xargs)
|
|
||||||
```
|
```
|
||||||
|
|
||||||
### Developing Against Your ZITADEL Cloud Instance
|
### Developing Against Your ZITADEL Cloud Instance
|
||||||
@@ -79,6 +76,23 @@ pnpm dev
|
|||||||
|
|
||||||
The application is now available at `http://localhost:3000`
|
The application is now available at `http://localhost:3000`
|
||||||
|
|
||||||
|
### Adding applications and IDPs
|
||||||
|
|
||||||
|
```sh
|
||||||
|
# OPTIONAL Run SAML SP
|
||||||
|
pnpm run-samlsp
|
||||||
|
|
||||||
|
# OPTIONAL Run OIDC RP
|
||||||
|
pnpm run-oidcrp
|
||||||
|
|
||||||
|
# OPTIONAL Run SAML IDP
|
||||||
|
pnpm run-samlidp
|
||||||
|
|
||||||
|
# OPTIONAL Run OIDC OP
|
||||||
|
pnpm run-oidcop
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
### Testing
|
### Testing
|
||||||
|
|
||||||
You can execute the following commands `pnpm test` for a single test run or `pnpm test:watch` in the following directories:
|
You can execute the following commands `pnpm test` for a single test run or `pnpm test:watch` in the following directories:
|
||||||
|
@@ -1,37 +1,38 @@
|
|||||||
import { faker } from "@faker-js/faker";
|
import {faker} from "@faker-js/faker";
|
||||||
import { test as base, expect } from "@playwright/test";
|
import {test as base} from "@playwright/test";
|
||||||
import dotenv from "dotenv";
|
import dotenv from "dotenv";
|
||||||
import path from "path";
|
import path from "path";
|
||||||
import { loginname } from "./loginname";
|
import {PasswordUser} from "./user";
|
||||||
import { startOIDC } from "./oidc";
|
|
||||||
import { password } from "./password";
|
|
||||||
import { PasswordUser } from "./user";
|
|
||||||
|
|
||||||
// Read from ".env" file.
|
// Read from ".env" file.
|
||||||
dotenv.config({ path: path.resolve(__dirname, ".env.local") });
|
dotenv.config({path: path.resolve(__dirname, ".env.local")});
|
||||||
|
|
||||||
const test = base.extend<{ user: PasswordUser }>({
|
const test = base.extend<{ user: PasswordUser }>({
|
||||||
user: async ({ page }, use) => {
|
user: async ({page}, use) => {
|
||||||
const user = new PasswordUser({
|
const user = new PasswordUser({
|
||||||
email: faker.internet.email(),
|
email: faker.internet.email(),
|
||||||
isEmailVerified: true,
|
isEmailVerified: true,
|
||||||
firstName: faker.person.firstName(),
|
firstName: faker.person.firstName(),
|
||||||
lastName: faker.person.lastName(),
|
lastName: faker.person.lastName(),
|
||||||
organization: "",
|
organization: "",
|
||||||
phone: faker.phone.number(),
|
phone: faker.phone.number(),
|
||||||
isPhoneVerified: false,
|
isPhoneVerified: false,
|
||||||
password: "Password1!",
|
password: "Password1!",
|
||||||
passwordChangeRequired: false,
|
passwordChangeRequired: false,
|
||||||
});
|
});
|
||||||
await user.ensure(page);
|
await user.ensure(page);
|
||||||
await use(user);
|
await use(user);
|
||||||
await user.cleanup();
|
await user.cleanup();
|
||||||
},
|
},
|
||||||
});
|
});
|
||||||
|
|
||||||
test("oidc username and password login", async ({ user, page }) => {
|
test("oidc username and password login", async ({user, page}) => {
|
||||||
await startOIDC(page);
|
//TODO commented out because of relocating into E2E tests
|
||||||
await loginname(page, user.getUsername());
|
/*
|
||||||
await password(page, user.getPassword());
|
await startOIDC(page);
|
||||||
await expect(page.locator("pre")).toContainText(user.getUsername());
|
await loginname(page, user.getUsername());
|
||||||
|
await password(page, user.getPassword());
|
||||||
|
await expect(page.locator("pre")).toContainText(user.getUsername());
|
||||||
|
|
||||||
|
*/
|
||||||
});
|
});
|
||||||
|
@@ -14,7 +14,7 @@
|
|||||||
],
|
],
|
||||||
"sideEffects": false,
|
"sideEffects": false,
|
||||||
"scripts": {
|
"scripts": {
|
||||||
"generate": "buf generate https://github.com/zitadel/zitadel.git#tag=v2.71.6 --path ./proto/zitadel",
|
"generate": "buf generate https://github.com/zitadel/zitadel.git --path ./proto/zitadel",
|
||||||
"clean": "rm -rf zitadel .turbo node_modules google protoc-gen-openapiv2 validate"
|
"clean": "rm -rf zitadel .turbo node_modules google protoc-gen-openapiv2 validate"
|
||||||
},
|
},
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
|
Reference in New Issue
Block a user