@camunda/e2e-test-suite 0.0.234 → 0.0.236
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/pages/8.10/ClusterDetailsPage.js +2 -2
- package/dist/pages/8.10/ConnectorSettingsPage.js +3 -0
- package/dist/pages/8.10/IdpCreatePage.d.ts +1 -0
- package/dist/pages/8.10/IdpCreatePage.js +5 -3
- package/dist/pages/8.9/ClusterDetailsPage.d.ts +2 -0
- package/dist/pages/8.9/ClusterDetailsPage.js +6 -2
- package/dist/tests/8.10/rba-enabled-v2-user-flows.spec.js +6 -2
- package/dist/tests/8.9/operate-access-flow.spec.js +13 -8
- package/package.json +1 -1
|
@@ -343,8 +343,8 @@ class ClusterDetailsPage {
|
|
|
343
343
|
for (const component of components) {
|
|
344
344
|
await (0, expectLocatorWithRetry_1.expectLocatorWithRetry)(this.page, this.page.getByText(`${component}Healthy`, { exact: true }), {
|
|
345
345
|
visibilityTimeout: 60000,
|
|
346
|
-
totalTimeout:
|
|
347
|
-
maxRetries:
|
|
346
|
+
totalTimeout: 400000,
|
|
347
|
+
maxRetries: 7,
|
|
348
348
|
preAction: async () => {
|
|
349
349
|
await this.page.reload();
|
|
350
350
|
},
|
|
@@ -60,6 +60,7 @@ class ConnectorSettingsPage {
|
|
|
60
60
|
await (0, test_1.expect)(this.page.getByText('URL must not be empty.')).not.toBeVisible({
|
|
61
61
|
timeout: 30000,
|
|
62
62
|
});
|
|
63
|
+
await this.page.waitForTimeout(1000);
|
|
63
64
|
}
|
|
64
65
|
async clickResultExpressionInput() {
|
|
65
66
|
await this.resultExpressionInput.click({ timeout: 90000 });
|
|
@@ -86,6 +87,7 @@ class ConnectorSettingsPage {
|
|
|
86
87
|
await (0, test_1.expect)(this.page.getByText('Username must not be empty.')).not.toBeVisible({
|
|
87
88
|
timeout: 30000,
|
|
88
89
|
});
|
|
90
|
+
await this.page.waitForTimeout(1000);
|
|
89
91
|
}
|
|
90
92
|
async clickPasswordInput() {
|
|
91
93
|
await this.passwordInput.click({ timeout: 60000 });
|
|
@@ -96,6 +98,7 @@ class ConnectorSettingsPage {
|
|
|
96
98
|
await (0, test_1.expect)(this.page.getByText('Password must not be empty.')).not.toBeVisible({
|
|
97
99
|
timeout: 30000,
|
|
98
100
|
});
|
|
101
|
+
await this.page.waitForTimeout(1000);
|
|
99
102
|
}
|
|
100
103
|
async selectMethodType(method) {
|
|
101
104
|
await this.methodTypeDropdown.selectOption(method, { timeout: 60000 });
|
|
@@ -30,6 +30,7 @@ declare class IdpCreatePage {
|
|
|
30
30
|
readonly selectStructuredDataExtraction: Locator;
|
|
31
31
|
readonly selectStructuredDataExtractionLabel: Locator;
|
|
32
32
|
readonly extractionInProgressNotification: Locator;
|
|
33
|
+
readonly extractionInProgressNotificationForMultipleFiles: Locator;
|
|
33
34
|
readonly structured_FieldsTab: Locator;
|
|
34
35
|
readonly structured_TablesTab: Locator;
|
|
35
36
|
readonly structured_CheckboxSelectAllFields: Locator;
|
|
@@ -34,6 +34,7 @@ class IdpCreatePage {
|
|
|
34
34
|
selectStructuredDataExtraction;
|
|
35
35
|
selectStructuredDataExtractionLabel;
|
|
36
36
|
extractionInProgressNotification;
|
|
37
|
+
extractionInProgressNotificationForMultipleFiles;
|
|
37
38
|
structured_FieldsTab;
|
|
38
39
|
structured_TablesTab;
|
|
39
40
|
structured_CheckboxSelectAllFields;
|
|
@@ -104,6 +105,7 @@ class IdpCreatePage {
|
|
|
104
105
|
this.selectStructuredDataExtraction = page.locator('#idp-project-extraction-method-structured');
|
|
105
106
|
this.selectStructuredDataExtractionLabel = page.locator('label[for="idp-project-extraction-method-structured"]');
|
|
106
107
|
this.extractionInProgressNotification = page.getByText('Extracting document...');
|
|
108
|
+
this.extractionInProgressNotificationForMultipleFiles = page.getByText('Extracting documents...');
|
|
107
109
|
this.structured_uploadFilesButton = page
|
|
108
110
|
.getByRole('button', {
|
|
109
111
|
name: /Drag and drop.*PDF.*upload/i,
|
|
@@ -328,13 +330,13 @@ class IdpCreatePage {
|
|
|
328
330
|
timeout: 60000,
|
|
329
331
|
});
|
|
330
332
|
await this.structured_TestExtractionTemplateButton.click({ timeout: 60000 });
|
|
331
|
-
await (0, test_1.expect)(this.
|
|
332
|
-
timeout:
|
|
333
|
+
await (0, test_1.expect)(this.extractionInProgressNotificationForMultipleFiles).not.toBeVisible({
|
|
334
|
+
timeout: 150000,
|
|
333
335
|
});
|
|
334
336
|
}
|
|
335
337
|
async extractionResultsAreVisible() {
|
|
336
338
|
await (0, test_1.expect)(this.structured_TestSummaryResult).toBeVisible({
|
|
337
|
-
timeout:
|
|
339
|
+
timeout: 120000,
|
|
338
340
|
});
|
|
339
341
|
await (0, test_1.expect)(this.structured_DetailsResult).toBeVisible({
|
|
340
342
|
timeout: 60000,
|
|
@@ -38,6 +38,8 @@ declare class ClusterDetailsPage {
|
|
|
38
38
|
readonly authorizationsHeading: Locator;
|
|
39
39
|
readonly orchestrationClusterCheckbox: Locator;
|
|
40
40
|
readonly clientCredentialsLink: (clientCredentials: string) => Locator;
|
|
41
|
+
readonly clientRow: (name: string) => Locator;
|
|
42
|
+
readonly clientRowDeleteButton: (name: string) => Locator;
|
|
41
43
|
constructor(page: Page);
|
|
42
44
|
clickAPITab(): Promise<void>;
|
|
43
45
|
clickCreateClientButton(): Promise<void>;
|
|
@@ -44,6 +44,8 @@ class ClusterDetailsPage {
|
|
|
44
44
|
authorizationsHeading;
|
|
45
45
|
orchestrationClusterCheckbox;
|
|
46
46
|
clientCredentialsLink;
|
|
47
|
+
clientRow;
|
|
48
|
+
clientRowDeleteButton;
|
|
47
49
|
constructor(page) {
|
|
48
50
|
this.page = page;
|
|
49
51
|
this.apiTab = page.getByRole('tab', { name: 'API' });
|
|
@@ -124,6 +126,8 @@ class ClusterDetailsPage {
|
|
|
124
126
|
.locator('label')
|
|
125
127
|
.filter({ hasText: /^Orchestration Cluster API$/ });
|
|
126
128
|
this.clientCredentialsLink = (clientCredentials) => page.getByRole('cell', { name: clientCredentials });
|
|
129
|
+
this.clientRow = (name) => this.clientsList.filter({ hasText: name });
|
|
130
|
+
this.clientRowDeleteButton = (name) => this.clientRow(name).getByRole('button', { name: 'Delete' });
|
|
127
131
|
}
|
|
128
132
|
async clickAPITab() {
|
|
129
133
|
await (0, test_1.expect)(this.apiTab).toBeVisible({ timeout: 60000 });
|
|
@@ -239,8 +243,8 @@ class ClusterDetailsPage {
|
|
|
239
243
|
}
|
|
240
244
|
async deleteAPIClientsIfExist(name) {
|
|
241
245
|
if (name) {
|
|
242
|
-
const row = this.
|
|
243
|
-
const deleteButton =
|
|
246
|
+
const row = this.clientRow(name);
|
|
247
|
+
const deleteButton = this.clientRowDeleteButton(name);
|
|
244
248
|
try {
|
|
245
249
|
await (0, test_1.expect)(deleteButton).toBeVisible({ timeout: 10000 });
|
|
246
250
|
await deleteButton.click();
|
|
@@ -10,6 +10,7 @@ const roleAuthorizations_1 = require("../../utils/roleAuthorizations");
|
|
|
10
10
|
const expectTextWithRetry_1 = require("../../utils/assertionHelpers/expectTextWithRetry");
|
|
11
11
|
const expectTextWithPagination_1 = require("../../utils/assertionHelpers/expectTextWithPagination");
|
|
12
12
|
const users_1 = require("../../utils/users");
|
|
13
|
+
const expectLocatorWithRetry_1 = require("../../utils/assertionHelpers/expectLocatorWithRetry");
|
|
13
14
|
const mainUser = (0, users_1.getTestUser)('twentySixthUser');
|
|
14
15
|
_8_10_1.test.describe.parallel('RBA Enabled User Flows Test @tasklistV2', () => {
|
|
15
16
|
const clusterNames = {
|
|
@@ -108,8 +109,11 @@ _8_10_1.test.describe.parallel('RBA Enabled User Flows Test @tasklistV2', () =>
|
|
|
108
109
|
await _8_10_1.test.step('Navigate to Tasklist and Make Sure that the Two Deployed Processes Are Not Accessible', async () => {
|
|
109
110
|
await appsPage.clickCamundaApps();
|
|
110
111
|
await appsPage.clickTasklist(clusterName);
|
|
111
|
-
await (0,
|
|
112
|
-
|
|
112
|
+
await (0, expectLocatorWithRetry_1.expectLocatorWithRetry)(page, taskPanelPage.taskListPageBanner, {
|
|
113
|
+
visibilityTimeout: 20000,
|
|
114
|
+
postAction: async () => {
|
|
115
|
+
await page.reload();
|
|
116
|
+
},
|
|
113
117
|
});
|
|
114
118
|
await taskPanelPage.clickProcessesTab();
|
|
115
119
|
await taskProcessesPage.clickpopupContinueButton();
|
|
@@ -5,21 +5,26 @@ const _8_9_1 = require("../../fixtures/8.9");
|
|
|
5
5
|
const UtilitiesPage_1 = require("../../pages/8.9/UtilitiesPage");
|
|
6
6
|
const _setup_1 = require("../../test-setup.js");
|
|
7
7
|
const users_1 = require("../../utils/users");
|
|
8
|
+
const urlHelpers_1 = require("../../utils/urlHelpers");
|
|
8
9
|
const testUser = (0, users_1.getTestUser)('twentySecondUser');
|
|
9
10
|
// This test covers the manual scenario: create a new API client via UI, copy the Operate URL, and verify the Operate endpoint denies unauthenticated access.
|
|
10
11
|
_8_9_1.test.describe.configure({ mode: 'parallel' });
|
|
11
12
|
_8_9_1.test.describe('Operate access requires authentication @tasklistV2', () => {
|
|
12
13
|
let clientName;
|
|
13
14
|
const clusterName = 'Test Cluster';
|
|
14
|
-
_8_9_1.test.afterEach(async ({ page, clusterDetailsPage }, testInfo) => {
|
|
15
|
-
await (0, _setup_1.captureScreenshot)(page, testInfo);
|
|
16
|
-
await (0, _setup_1.captureFailureVideo)(page, testInfo);
|
|
17
|
-
await clusterDetailsPage.clickAPITab();
|
|
18
|
-
await clusterDetailsPage.deleteAPIClientsIfExist(clientName);
|
|
19
|
-
});
|
|
20
15
|
_8_9_1.test.beforeEach(async ({ page, loginPage }, testInfo) => {
|
|
21
16
|
await (0, UtilitiesPage_1.loginWithRetry)(page, loginPage, testUser, (testInfo.workerIndex + 1) * 1000);
|
|
22
17
|
});
|
|
18
|
+
_8_9_1.test.afterEach(async ({ page, homePage, clusterPage, clusterDetailsPage }, testInfo) => {
|
|
19
|
+
await (0, _setup_1.captureScreenshot)(page, testInfo);
|
|
20
|
+
await (0, _setup_1.captureFailureVideo)(page, testInfo);
|
|
21
|
+
if (clientName) {
|
|
22
|
+
await homePage.clickClusters();
|
|
23
|
+
await clusterPage.clickClusterLink(clusterName);
|
|
24
|
+
await clusterDetailsPage.clickAPITab();
|
|
25
|
+
await clusterDetailsPage.deleteAPIClientsIfExist(clientName);
|
|
26
|
+
}
|
|
27
|
+
});
|
|
23
28
|
(0, _8_9_1.test)('check that request POST /v2/process-definitions/search returns 401 without credentials', async ({ homePage, clusterPage, clusterDetailsPage, clientCredentialsDetailsPage, request, }) => {
|
|
24
29
|
clientName = `operate-deny-${await (0, _setup_1.generateRandomStringAsync)(5)}`;
|
|
25
30
|
await _8_9_1.test.step('Add API Client to Cluster', async () => {
|
|
@@ -39,13 +44,13 @@ _8_9_1.test.describe('Operate access requires authentication @tasklistV2', () =>
|
|
|
39
44
|
await clusterDetailsPage.clickAPITab();
|
|
40
45
|
});
|
|
41
46
|
await _8_9_1.test.step('POST search endpoint without auth should be rejected', async () => {
|
|
42
|
-
const sanitizedOperateUrl =
|
|
47
|
+
const sanitizedOperateUrl = (0, urlHelpers_1.sanitizeUrl)(operateUrl);
|
|
43
48
|
const response = await request.post(`${sanitizedOperateUrl}/v2/process-definitions/search`, {
|
|
44
49
|
data: { filter: {}, size: 10 },
|
|
45
50
|
});
|
|
46
51
|
(0, test_1.expect)(response.status()).toBe(401);
|
|
47
52
|
const body = await response.text();
|
|
48
|
-
(0, test_1.expect)(body
|
|
53
|
+
(0, test_1.expect)(body).toBe('');
|
|
49
54
|
});
|
|
50
55
|
});
|
|
51
56
|
});
|