@zohodesk/testinglibrary 2.9.1 → 2.9.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.gitlab-ci.yml +15 -22
- package/README.md +5 -0
- package/build/core/playwright/constants/fileMutexConfig.js +11 -0
- package/build/core/playwright/helpers/auth/checkAuthCookies.js +2 -8
- package/build/core/playwright/helpers/auth/loginSteps.js +25 -18
- package/build/core/playwright/helpers/checkAuthDirectory.js +17 -0
- package/build/core/playwright/helpers/fileMutex.js +58 -0
- package/build/test/core/playwright/helpers/__tests__/fileMutex.test.js +94 -0
- package/nobdd/uat/conf/default/actors/index.js +1 -4
- package/nobdd/uat/conf/default/settings.json +1 -1
- package/nobdd/uat/conf/nobdd/uat.config.js +12 -4
- package/nobdd/uat/env-config.json +3 -3
- package/nobdd/uat/fixtures/setup.teardown.js +2 -1
- package/nobdd/uat/modules/nobdd/steps/VerifyNoBDD.feature.spec.js +3 -3
- package/nobdd/uat.config.js +9 -3
- package/package.json +2 -1
- package/nobdd/uat/conf/default/actors/beta/custom-module.json +0 -24
- package/nobdd/uat/conf/default/actors/beta/index.js +0 -6
- package/nobdd/uat/conf/default/actors/beta/parent-child.json +0 -24
package/.gitlab-ci.yml
CHANGED
|
@@ -1,29 +1,35 @@
|
|
|
1
1
|
image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
|
|
2
2
|
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
3
|
+
workflow:
|
|
4
|
+
rules:
|
|
5
|
+
- if: $CI_PIPELINE_SOURCE == "merge_request_event"
|
|
6
|
+
when: always
|
|
7
|
+
- if: $CI_PIPELINE_SOURCE == "web"
|
|
8
|
+
when: always
|
|
6
9
|
|
|
7
10
|
stages:
|
|
8
11
|
- build
|
|
9
12
|
- unit
|
|
10
13
|
- uat
|
|
11
14
|
|
|
15
|
+
default:
|
|
16
|
+
cache:
|
|
17
|
+
key: build-cache
|
|
18
|
+
paths:
|
|
19
|
+
- node_modules
|
|
20
|
+
- build
|
|
21
|
+
|
|
12
22
|
# Install dependencies stage
|
|
13
23
|
build:
|
|
14
24
|
stage: build
|
|
15
|
-
image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
|
|
16
25
|
script:
|
|
26
|
+
- npm install --ignore-scripts
|
|
27
|
+
- npm run build
|
|
17
28
|
- npm install
|
|
18
|
-
artifacts:
|
|
19
|
-
paths:
|
|
20
|
-
- node_modules/
|
|
21
|
-
|
|
22
29
|
|
|
23
30
|
# Unit tests stage
|
|
24
31
|
unit:
|
|
25
32
|
stage: unit
|
|
26
|
-
image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
|
|
27
33
|
script:
|
|
28
34
|
- npm run test
|
|
29
35
|
artifacts:
|
|
@@ -34,10 +40,7 @@ unit:
|
|
|
34
40
|
# UAT tests stage
|
|
35
41
|
uat-auth:
|
|
36
42
|
stage: uat
|
|
37
|
-
image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
|
|
38
43
|
script:
|
|
39
|
-
- npm install
|
|
40
|
-
- npm run build
|
|
41
44
|
- cd examples
|
|
42
45
|
- npm install $(npm pack ../../testing-framework | tail -1)
|
|
43
46
|
- output=$(npm run uatauth)
|
|
@@ -53,10 +56,7 @@ uat-auth:
|
|
|
53
56
|
|
|
54
57
|
uat-noauth:
|
|
55
58
|
stage: uat
|
|
56
|
-
image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
|
|
57
59
|
script:
|
|
58
|
-
- npm install
|
|
59
|
-
- npm run build
|
|
60
60
|
- cd examples
|
|
61
61
|
- npm install $(npm pack ../../testing-framework | tail -1)
|
|
62
62
|
- output=$(npm run uatnoauth)
|
|
@@ -72,10 +72,7 @@ uat-noauth:
|
|
|
72
72
|
|
|
73
73
|
uat-profile:
|
|
74
74
|
stage: uat
|
|
75
|
-
image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
|
|
76
75
|
script:
|
|
77
|
-
- npm install
|
|
78
|
-
- npm run build
|
|
79
76
|
- cd examples
|
|
80
77
|
- npm install $(npm pack ../../testing-framework | tail -1)
|
|
81
78
|
- output=$(npm run uatprofile)
|
|
@@ -91,10 +88,7 @@ uat-profile:
|
|
|
91
88
|
|
|
92
89
|
uat-nobdd:
|
|
93
90
|
stage: uat
|
|
94
|
-
image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
|
|
95
91
|
script:
|
|
96
|
-
- npm install
|
|
97
|
-
- npm run build
|
|
98
92
|
- cd nobdd
|
|
99
93
|
- npm install $(npm pack ../../testing-framework | tail -1)
|
|
100
94
|
- output=$(npm run uatnobdd)
|
|
@@ -108,4 +102,3 @@ uat-nobdd:
|
|
|
108
102
|
when: always
|
|
109
103
|
paths:
|
|
110
104
|
- nobdd/uat/playwright-report
|
|
111
|
-
|
package/README.md
CHANGED
|
@@ -10,6 +10,7 @@ exports.verifyIfCookieFileExists = verifyIfCookieFileExists;
|
|
|
10
10
|
var _path = _interopRequireDefault(require("path"));
|
|
11
11
|
var _fs = require("fs");
|
|
12
12
|
var _readConfigFile = require("../../readConfigFile");
|
|
13
|
+
var _checkAuthDirectory = require("../checkAuthDirectory");
|
|
13
14
|
var _logger = require("../../../../utils/logger");
|
|
14
15
|
/* eslint-disable no-console */
|
|
15
16
|
|
|
@@ -23,13 +24,7 @@ function getAuthFileDirectory() {
|
|
|
23
24
|
return _path.default.resolve(_path.default.join(uatDirectory, 'playwright', '.auth'));
|
|
24
25
|
}
|
|
25
26
|
function verifyIfCookieFileExists(authFile) {
|
|
26
|
-
|
|
27
|
-
if (!(0, _fs.existsSync)(authDirectory)) {
|
|
28
|
-
console.log('Creating auth directory for the first time setup...');
|
|
29
|
-
(0, _fs.mkdirSync)(authDirectory, {
|
|
30
|
-
recursive: true
|
|
31
|
-
});
|
|
32
|
-
}
|
|
27
|
+
(0, _checkAuthDirectory.createAuthDirectoryIfNotExist)();
|
|
33
28
|
if (!(0, _fs.existsSync)(authFile)) {
|
|
34
29
|
console.log('creating auth file..');
|
|
35
30
|
(0, _fs.writeFileSync)(authFile, JSON.stringify(authContent, null, 2));
|
|
@@ -41,7 +36,6 @@ function convertCookiesToParse(cookies, authFilePath) {
|
|
|
41
36
|
} catch (err) {
|
|
42
37
|
_logger.Logger.error(err);
|
|
43
38
|
throw new Error(` Error while parsing cookies ${err} \n${_path.default.resolve(process.cwd(), authFilePath)} File is Empty`);
|
|
44
|
-
// process.exit()
|
|
45
39
|
}
|
|
46
40
|
}
|
|
47
41
|
async function loadCookiesIfPresent(page, authFile) {
|
|
@@ -6,6 +6,8 @@ Object.defineProperty(exports, "__esModule", {
|
|
|
6
6
|
});
|
|
7
7
|
exports.default = void 0;
|
|
8
8
|
var _path = _interopRequireDefault(require("path"));
|
|
9
|
+
var _fileMutex = _interopRequireDefault(require("../fileMutex"));
|
|
10
|
+
var _fileMutexConfig = require("../../constants/fileMutexConfig");
|
|
9
11
|
var _accountLogin = _interopRequireDefault(require("./accountLogin"));
|
|
10
12
|
var _checkAuthCookies = require("./checkAuthCookies");
|
|
11
13
|
/* eslint-disable no-console */
|
|
@@ -17,25 +19,30 @@ async function performLoginSteps({
|
|
|
17
19
|
password
|
|
18
20
|
}, isLoggedIn) {
|
|
19
21
|
const authFile = _path.default.resolve(_path.default.join((0, _checkAuthCookies.getAuthFileDirectory)(), `${authFilePrefix}-cookies.json`));
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
// await page.waitForLoadState('networkidle')
|
|
26
|
-
|
|
27
|
-
await Promise.race([page.waitForNavigation(), page.waitForLoadState('networkidle'), page.waitForTimeout(5000)]);
|
|
28
|
-
const loginStatus = await isLoggedIn(page);
|
|
29
|
-
if (!loginStatus) {
|
|
30
|
-
await (0, _accountLogin.default)(page, useremail, password);
|
|
22
|
+
const lockFileName = useremail.replace(/[@.]/g, '_');
|
|
23
|
+
const fileMutex = new _fileMutex.default((0, _checkAuthCookies.getAuthFileDirectory)(), lockFileName, _fileMutexConfig.LOGIN_MUTEX_TIMEOUT);
|
|
24
|
+
try {
|
|
25
|
+
await fileMutex.acquire();
|
|
26
|
+
await (0, _checkAuthCookies.loadCookiesIfPresent)(page, authFile);
|
|
31
27
|
await page.goto(process.env.domain);
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
28
|
+
await Promise.race([page.waitForNavigation(), page.waitForLoadState('networkidle'), page.waitForTimeout(5000)]);
|
|
29
|
+
const isAlreadyLoggedIn = await isLoggedIn(page);
|
|
30
|
+
if (!isAlreadyLoggedIn) {
|
|
31
|
+
await (0, _accountLogin.default)(page, useremail, password);
|
|
32
|
+
await page.goto(process.env.domain);
|
|
33
|
+
await isLoggedIn(page);
|
|
34
|
+
await page.context().storageState({
|
|
35
|
+
path: authFile
|
|
36
|
+
});
|
|
37
|
+
}
|
|
38
|
+
} catch (error) {
|
|
39
|
+
console.error(`Error during login for ${useremail}:`, error);
|
|
40
|
+
} finally {
|
|
41
|
+
try {
|
|
42
|
+
await fileMutex.release();
|
|
43
|
+
} catch (releaseError) {
|
|
44
|
+
console.error(`Error releasing lock for ${useremail}:`, releaseError);
|
|
45
|
+
}
|
|
39
46
|
}
|
|
40
47
|
}
|
|
41
48
|
var _default = exports.default = performLoginSteps;
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", {
|
|
4
|
+
value: true
|
|
5
|
+
});
|
|
6
|
+
exports.createAuthDirectoryIfNotExist = createAuthDirectoryIfNotExist;
|
|
7
|
+
var _fs = require("fs");
|
|
8
|
+
var _checkAuthCookies = require("./auth/checkAuthCookies");
|
|
9
|
+
function createAuthDirectoryIfNotExist() {
|
|
10
|
+
const authDirectory = (0, _checkAuthCookies.getAuthFileDirectory)();
|
|
11
|
+
if (!(0, _fs.existsSync)(authDirectory)) {
|
|
12
|
+
console.log('Creating auth directory for the first time setup...');
|
|
13
|
+
(0, _fs.mkdirSync)(authDirectory, {
|
|
14
|
+
recursive: true
|
|
15
|
+
});
|
|
16
|
+
}
|
|
17
|
+
}
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
var _interopRequireDefault = require("@babel/runtime/helpers/interopRequireDefault");
|
|
4
|
+
Object.defineProperty(exports, "__esModule", {
|
|
5
|
+
value: true
|
|
6
|
+
});
|
|
7
|
+
exports.default = void 0;
|
|
8
|
+
var _path = _interopRequireDefault(require("path"));
|
|
9
|
+
var _lockfile = _interopRequireDefault(require("lockfile"));
|
|
10
|
+
var _fs = require("fs");
|
|
11
|
+
function _classPrivateMethodInitSpec(obj, privateSet) { _checkPrivateRedeclaration(obj, privateSet); privateSet.add(obj); }
|
|
12
|
+
function _checkPrivateRedeclaration(obj, privateCollection) { if (privateCollection.has(obj)) { throw new TypeError("Cannot initialize the same private elements twice on an object"); } }
|
|
13
|
+
function _classPrivateMethodGet(receiver, privateSet, fn) { if (!privateSet.has(receiver)) { throw new TypeError("attempted to get private field on non-instance"); } return fn; }
|
|
14
|
+
var _getLockFilePath = /*#__PURE__*/new WeakSet();
|
|
15
|
+
var _createDirectoryIfNotExist = /*#__PURE__*/new WeakSet();
|
|
16
|
+
class FileMutex {
|
|
17
|
+
constructor(directory, lockFileName, timeout) {
|
|
18
|
+
_classPrivateMethodInitSpec(this, _createDirectoryIfNotExist);
|
|
19
|
+
_classPrivateMethodInitSpec(this, _getLockFilePath);
|
|
20
|
+
this.directory = directory;
|
|
21
|
+
this.lockFileName = lockFileName;
|
|
22
|
+
this.timeout = timeout;
|
|
23
|
+
}
|
|
24
|
+
async acquire() {
|
|
25
|
+
_classPrivateMethodGet(this, _createDirectoryIfNotExist, _createDirectoryIfNotExist2).call(this);
|
|
26
|
+
return new Promise((resolve, reject) => {
|
|
27
|
+
_lockfile.default.lock(_classPrivateMethodGet(this, _getLockFilePath, _getLockFilePath2).call(this), this.timeout, err => {
|
|
28
|
+
if (err) {
|
|
29
|
+
reject(err);
|
|
30
|
+
} else {
|
|
31
|
+
resolve();
|
|
32
|
+
}
|
|
33
|
+
});
|
|
34
|
+
});
|
|
35
|
+
}
|
|
36
|
+
async release() {
|
|
37
|
+
return new Promise((resolve, reject) => {
|
|
38
|
+
_lockfile.default.unlock(_classPrivateMethodGet(this, _getLockFilePath, _getLockFilePath2).call(this), err => {
|
|
39
|
+
if (err) {
|
|
40
|
+
reject(err);
|
|
41
|
+
} else {
|
|
42
|
+
resolve();
|
|
43
|
+
}
|
|
44
|
+
});
|
|
45
|
+
});
|
|
46
|
+
}
|
|
47
|
+
}
|
|
48
|
+
function _getLockFilePath2() {
|
|
49
|
+
return _path.default.resolve(_path.default.join(this.directory, `/${this.lockFileName}.lock`));
|
|
50
|
+
}
|
|
51
|
+
function _createDirectoryIfNotExist2() {
|
|
52
|
+
if (!(0, _fs.existsSync)(this.directory)) {
|
|
53
|
+
(0, _fs.mkdirSync)(this.directory, {
|
|
54
|
+
recursive: true
|
|
55
|
+
});
|
|
56
|
+
}
|
|
57
|
+
}
|
|
58
|
+
var _default = exports.default = FileMutex;
|
|
@@ -0,0 +1,94 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
var _interopRequireDefault = require("@babel/runtime/helpers/interopRequireDefault");
|
|
4
|
+
var _fileMutex = _interopRequireDefault(require("../../../../../core/playwright/helpers/fileMutex"));
|
|
5
|
+
var _lockfile = _interopRequireDefault(require("lockfile"));
|
|
6
|
+
var _path = _interopRequireDefault(require("path"));
|
|
7
|
+
var _fs = _interopRequireDefault(require("fs"));
|
|
8
|
+
jest.mock('lockfile');
|
|
9
|
+
jest.mock('fs');
|
|
10
|
+
describe('FileMutex', () => {
|
|
11
|
+
const mockDirectory = '/tmp';
|
|
12
|
+
const mockFileName = 'test_user';
|
|
13
|
+
const mockTimeout = {
|
|
14
|
+
wait: 5000,
|
|
15
|
+
retries: 5,
|
|
16
|
+
stale: 60000
|
|
17
|
+
};
|
|
18
|
+
let fileMutex;
|
|
19
|
+
beforeEach(() => {
|
|
20
|
+
fileMutex = new _fileMutex.default(mockDirectory, mockFileName, mockTimeout);
|
|
21
|
+
});
|
|
22
|
+
afterEach(() => {
|
|
23
|
+
jest.clearAllMocks();
|
|
24
|
+
});
|
|
25
|
+
describe('acquire', () => {
|
|
26
|
+
it('should resolve when lockfile.lock succeeds and call getLockFilePath correctly', async () => {
|
|
27
|
+
const expectedPath = _path.default.resolve(_path.default.join(mockDirectory, `./${mockFileName}.lock`));
|
|
28
|
+
_lockfile.default.lock.mockImplementation((lockPath, options, callback) => {
|
|
29
|
+
expect(lockPath).toBe(expectedPath);
|
|
30
|
+
expect(options).toEqual(mockTimeout);
|
|
31
|
+
callback(null);
|
|
32
|
+
});
|
|
33
|
+
await expect(fileMutex.acquire()).resolves.toBeUndefined();
|
|
34
|
+
expect(_lockfile.default.lock).toHaveBeenCalledWith(expectedPath, mockTimeout, expect.any(Function));
|
|
35
|
+
});
|
|
36
|
+
it('should reject when lockfile.lock fails', async () => {
|
|
37
|
+
const mockError = new Error('Lock failed');
|
|
38
|
+
_lockfile.default.lock.mockImplementation((lockPath, options, callback) => {
|
|
39
|
+
expect(lockPath).toBe(_path.default.resolve(_path.default.join(mockDirectory, `./${mockFileName}.lock`)));
|
|
40
|
+
expect(options).toEqual(mockTimeout);
|
|
41
|
+
callback(mockError);
|
|
42
|
+
});
|
|
43
|
+
await expect(fileMutex.acquire()).rejects.toThrow('Lock failed');
|
|
44
|
+
expect(_lockfile.default.lock).toHaveBeenCalled();
|
|
45
|
+
});
|
|
46
|
+
it('should create the directory if it does not exist and acquire the lock', async () => {
|
|
47
|
+
_fs.default.existsSync.mockReturnValue(false);
|
|
48
|
+
_fs.default.mkdirSync.mockImplementation((dir, options) => {
|
|
49
|
+
expect(dir).toBe(mockDirectory);
|
|
50
|
+
expect(options).toEqual({
|
|
51
|
+
recursive: true
|
|
52
|
+
});
|
|
53
|
+
});
|
|
54
|
+
_lockfile.default.lock.mockImplementation((lockPath, options, callback) => {
|
|
55
|
+
expect(lockPath).toBe(_path.default.resolve(_path.default.join(mockDirectory, `./${mockFileName}.lock`)));
|
|
56
|
+
expect(options).toEqual(mockTimeout);
|
|
57
|
+
callback(null);
|
|
58
|
+
});
|
|
59
|
+
await expect(fileMutex.acquire()).resolves.toBeUndefined();
|
|
60
|
+
expect(_fs.default.existsSync).toHaveBeenCalledWith(mockDirectory);
|
|
61
|
+
expect(_fs.default.mkdirSync).toHaveBeenCalledWith(mockDirectory, {
|
|
62
|
+
recursive: true
|
|
63
|
+
});
|
|
64
|
+
expect(_lockfile.default.lock).toHaveBeenCalled();
|
|
65
|
+
});
|
|
66
|
+
it('should not create the directory if it already exists', async () => {
|
|
67
|
+
_fs.default.existsSync.mockReturnValue(true);
|
|
68
|
+
_lockfile.default.lock.mockImplementation((lockPath, options, callback) => {
|
|
69
|
+
callback(null);
|
|
70
|
+
});
|
|
71
|
+
await expect(fileMutex.acquire()).resolves.toBeUndefined();
|
|
72
|
+
expect(_fs.default.mkdirSync).not.toHaveBeenCalled();
|
|
73
|
+
expect(_lockfile.default.lock).toHaveBeenCalled();
|
|
74
|
+
});
|
|
75
|
+
});
|
|
76
|
+
describe('release', () => {
|
|
77
|
+
it('should resolve when lockfile.unlock succeeds and call getLockFilePath correctly', async () => {
|
|
78
|
+
const expectedPath = _path.default.resolve(_path.default.join(mockDirectory, `./${mockFileName}.lock`));
|
|
79
|
+
_lockfile.default.unlock.mockImplementation((path, callback) => {
|
|
80
|
+
callback(null);
|
|
81
|
+
});
|
|
82
|
+
await expect(fileMutex.release()).resolves.toBeUndefined();
|
|
83
|
+
expect(_lockfile.default.unlock).toHaveBeenCalledWith(expectedPath, expect.any(Function));
|
|
84
|
+
});
|
|
85
|
+
it('should reject when lockfile.unlock fails', async () => {
|
|
86
|
+
const mockError = new Error('Unlock failed');
|
|
87
|
+
_lockfile.default.unlock.mockImplementation((path, callback) => {
|
|
88
|
+
callback(mockError);
|
|
89
|
+
});
|
|
90
|
+
await expect(fileMutex.release()).rejects.toThrow('Unlock failed');
|
|
91
|
+
expect(_lockfile.default.unlock).toHaveBeenCalled();
|
|
92
|
+
});
|
|
93
|
+
});
|
|
94
|
+
});
|
|
@@ -12,16 +12,24 @@ function getPrimaryCookiePath() {
|
|
|
12
12
|
* @typedef {import('@zohodesk/testinglibrary').UserConfig} UserConfig
|
|
13
13
|
*/
|
|
14
14
|
module.exports = {
|
|
15
|
-
headless:
|
|
15
|
+
headless: false,
|
|
16
|
+
retries:1,
|
|
16
17
|
openReportOn: 'never',
|
|
17
18
|
browsers: ['Chrome'],
|
|
18
|
-
isAuthMode:
|
|
19
|
+
isAuthMode: true,
|
|
19
20
|
authFilePath: getPrimaryCookiePath(),
|
|
20
|
-
trace:
|
|
21
|
-
video:
|
|
21
|
+
trace: 'retain-on-failure',
|
|
22
|
+
video: 'retain-on-failure',
|
|
23
|
+
retries:1,
|
|
22
24
|
bddMode: false,
|
|
25
|
+
expectTimeout: 10 * 1000,
|
|
26
|
+
testTimeout: 60 * 1000,
|
|
27
|
+
globalTimeout: 2 * 60 * 60 * 1000,
|
|
28
|
+
featureFilesFolder: 'feature-files',
|
|
29
|
+
stepDefinitionsFolder: 'steps',
|
|
23
30
|
viewport: { width: 1280, height: 720 },
|
|
24
31
|
testIdAttribute: 'data-id',
|
|
32
|
+
editionOrder: ['Free', 'Express', 'Standard', 'Professional', 'Enterprise'],
|
|
25
33
|
additionalPages: {
|
|
26
34
|
...customFixtures
|
|
27
35
|
}
|
|
@@ -1,18 +1,18 @@
|
|
|
1
1
|
{
|
|
2
2
|
"dev": {
|
|
3
|
-
"domain": "https://
|
|
3
|
+
"domain": "https://zdesk-devops16.csez.zohocorpin.com:31025/agent",
|
|
4
4
|
"orgName": "org-name",
|
|
5
5
|
"deptName": "dept-name",
|
|
6
6
|
"moduleName": "module-name"
|
|
7
7
|
},
|
|
8
8
|
"prod": {
|
|
9
|
-
"domain": "https://
|
|
9
|
+
"domain": "https://zdesk-devops16.csez.zohocorpin.com:31025/agent",
|
|
10
10
|
"orgName": "sangeetha.t@zohocorp.com",
|
|
11
11
|
"deptName": "sangeethat",
|
|
12
12
|
"moduleName": "sangeethat"
|
|
13
13
|
},
|
|
14
14
|
"ci": {
|
|
15
|
-
"domain": "https://zdesk-
|
|
15
|
+
"domain": "https://zdesk-devops16.csez.zohocorpin.com:31025/agent",
|
|
16
16
|
"orgName": "clientcicdk8",
|
|
17
17
|
"deptName": "clientcicdk8",
|
|
18
18
|
"moduleName": "tickets"
|
|
@@ -21,7 +21,8 @@ if (!isDevelopmentSetup()) {
|
|
|
21
21
|
const authFilePath = path.join(authDirectory, file);
|
|
22
22
|
await loadCookiesIfPresent(page, authFilePath);
|
|
23
23
|
const domainOrigin = getUrlOrigin(process.env.domain);
|
|
24
|
-
|
|
24
|
+
const logoutURL = `${domainOrigin}/support/logout.sas`;
|
|
25
|
+
await page.goto(logoutURL);
|
|
25
26
|
await page.waitForNavigation();
|
|
26
27
|
await expect(page.locator('[id="signin_flow"]')).toBeVisible();
|
|
27
28
|
await fs.rmSync(authFilePath);
|
|
@@ -4,11 +4,11 @@ test.describe("Verify no authentication required @nobdd", () => {
|
|
|
4
4
|
|
|
5
5
|
test("Verify the page is not logged in", async ({ page }) => {
|
|
6
6
|
|
|
7
|
-
await page.goto(
|
|
7
|
+
await page.goto(process.env.domain);
|
|
8
8
|
|
|
9
|
-
await page.waitForSelector('
|
|
9
|
+
await page.waitForSelector('#login');
|
|
10
10
|
|
|
11
|
-
const isLoggedIn = await page.isVisible('
|
|
11
|
+
const isLoggedIn = await page.isVisible('#login');
|
|
12
12
|
expect(isLoggedIn).toBe(true);
|
|
13
13
|
|
|
14
14
|
});
|
package/nobdd/uat.config.js
CHANGED
|
@@ -13,17 +13,23 @@ function getPrimaryCookiePath() {
|
|
|
13
13
|
*/
|
|
14
14
|
module.exports = {
|
|
15
15
|
headless: false,
|
|
16
|
+
retries:1,
|
|
16
17
|
openReportOn: 'never',
|
|
17
18
|
browsers: ['Chrome'],
|
|
18
19
|
isAuthMode: true,
|
|
19
20
|
authFilePath: getPrimaryCookiePath(),
|
|
20
|
-
trace:
|
|
21
|
-
video:
|
|
22
|
-
|
|
21
|
+
trace: 'retain-on-failure',
|
|
22
|
+
video: 'retain-on-failure',
|
|
23
|
+
retries:1,
|
|
24
|
+
bddMode: false,
|
|
25
|
+
expectTimeout: 10 * 1000,
|
|
26
|
+
testTimeout: 60 * 1000,
|
|
27
|
+
globalTimeout: 2 * 60 * 60 * 1000,
|
|
23
28
|
featureFilesFolder: 'feature-files',
|
|
24
29
|
stepDefinitionsFolder: 'steps',
|
|
25
30
|
viewport: { width: 1280, height: 720 },
|
|
26
31
|
testIdAttribute: 'data-id',
|
|
32
|
+
editionOrder: ['Free', 'Express', 'Standard', 'Professional', 'Enterprise'],
|
|
27
33
|
additionalPages: {
|
|
28
34
|
...customFixtures
|
|
29
35
|
}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@zohodesk/testinglibrary",
|
|
3
|
-
"version": "2.9.
|
|
3
|
+
"version": "2.9.2",
|
|
4
4
|
"description": "",
|
|
5
5
|
"main": "./build/index.js",
|
|
6
6
|
"scripts": {
|
|
@@ -32,6 +32,7 @@
|
|
|
32
32
|
"fast-glob": "3.3.1",
|
|
33
33
|
"jest": "29.6.2",
|
|
34
34
|
"jest-environment-jsdom": "29.6.2",
|
|
35
|
+
"lockfile": "^1.0.4",
|
|
35
36
|
"msw": "1.2.3",
|
|
36
37
|
"playwright": "1.42.1",
|
|
37
38
|
"supports-color": "8.1.1"
|
|
@@ -1,24 +0,0 @@
|
|
|
1
|
-
[
|
|
2
|
-
{
|
|
3
|
-
"id": "1",
|
|
4
|
-
"edition": "enterprise",
|
|
5
|
-
"orgName": "custommoduleportal",
|
|
6
|
-
"profiles": [
|
|
7
|
-
{
|
|
8
|
-
"profile": "admin",
|
|
9
|
-
"email": "indragith.m+agent@zohotest.com",
|
|
10
|
-
"password": "Paara!2019"
|
|
11
|
-
},
|
|
12
|
-
{
|
|
13
|
-
"profile": "agent",
|
|
14
|
-
"email": "indragith.m+agent@zohotest.com",
|
|
15
|
-
"password": "Paara!2019"
|
|
16
|
-
},
|
|
17
|
-
{
|
|
18
|
-
"profile": "lightagent",
|
|
19
|
-
"email": "indragith.m+abc1@zohotest.com",
|
|
20
|
-
"password": "Paara!2019"
|
|
21
|
-
}
|
|
22
|
-
]
|
|
23
|
-
}
|
|
24
|
-
]
|
|
@@ -1,24 +0,0 @@
|
|
|
1
|
-
[
|
|
2
|
-
{
|
|
3
|
-
"id": "1",
|
|
4
|
-
"edition": "enterprise",
|
|
5
|
-
"orgName": "parentchildportal",
|
|
6
|
-
"profiles": [
|
|
7
|
-
{
|
|
8
|
-
"profile": "admin",
|
|
9
|
-
"email": "indragith.m@zohocorp.com",
|
|
10
|
-
"password": "Paara!2019"
|
|
11
|
-
},
|
|
12
|
-
{
|
|
13
|
-
"profile": "agent",
|
|
14
|
-
"email": "indragith.m+agent@zohotest.com",
|
|
15
|
-
"password": "Paara!2019"
|
|
16
|
-
},
|
|
17
|
-
{
|
|
18
|
-
"profile": "lightagent",
|
|
19
|
-
"email": "indragith.m+abc1@zohotest.com",
|
|
20
|
-
"password": "Paara!2019"
|
|
21
|
-
}
|
|
22
|
-
]
|
|
23
|
-
}
|
|
24
|
-
]
|