@zohodesk/testinglibrary 2.9.1 → 2.9.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/.gitlab-ci.yml CHANGED
@@ -1,29 +1,35 @@
1
1
  image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
2
2
 
3
- #workflow:
4
- # rules:
5
- # - if: '$CI_PIPELINE_SOURCE == "merge_request_event"'
3
+ workflow:
4
+ rules:
5
+ - if: $CI_PIPELINE_SOURCE == "merge_request_event"
6
+ when: always
7
+ - if: $CI_PIPELINE_SOURCE == "web"
8
+ when: always
6
9
 
7
10
  stages:
8
11
  - build
9
12
  - unit
10
13
  - uat
11
14
 
15
+ default:
16
+ cache:
17
+ key: build-cache
18
+ paths:
19
+ - node_modules
20
+ - build
21
+
12
22
  # Install dependencies stage
13
23
  build:
14
24
  stage: build
15
- image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
16
25
  script:
26
+ - npm install --ignore-scripts
27
+ - npm run build
17
28
  - npm install
18
- artifacts:
19
- paths:
20
- - node_modules/
21
-
22
29
 
23
30
  # Unit tests stage
24
31
  unit:
25
32
  stage: unit
26
- image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
27
33
  script:
28
34
  - npm run test
29
35
  artifacts:
@@ -34,10 +40,7 @@ unit:
34
40
  # UAT tests stage
35
41
  uat-auth:
36
42
  stage: uat
37
- image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
38
43
  script:
39
- - npm install
40
- - npm run build
41
44
  - cd examples
42
45
  - npm install $(npm pack ../../testing-framework | tail -1)
43
46
  - output=$(npm run uatauth)
@@ -53,10 +56,7 @@ uat-auth:
53
56
 
54
57
  uat-noauth:
55
58
  stage: uat
56
- image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
57
59
  script:
58
- - npm install
59
- - npm run build
60
60
  - cd examples
61
61
  - npm install $(npm pack ../../testing-framework | tail -1)
62
62
  - output=$(npm run uatnoauth)
@@ -72,10 +72,7 @@ uat-noauth:
72
72
 
73
73
  uat-profile:
74
74
  stage: uat
75
- image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
76
75
  script:
77
- - npm install
78
- - npm run build
79
76
  - cd examples
80
77
  - npm install $(npm pack ../../testing-framework | tail -1)
81
78
  - output=$(npm run uatprofile)
@@ -91,10 +88,7 @@ uat-profile:
91
88
 
92
89
  uat-nobdd:
93
90
  stage: uat
94
- image: repository.desk.csez.zohocorpin.com/base-image/testing-framework-gitlab-runne-base:v2
95
91
  script:
96
- - npm install
97
- - npm run build
98
92
  - cd nobdd
99
93
  - npm install $(npm pack ../../testing-framework | tail -1)
100
94
  - output=$(npm run uatnobdd)
@@ -108,4 +102,3 @@ uat-nobdd:
108
102
  when: always
109
103
  paths:
110
104
  - nobdd/uat/playwright-report
111
-
package/README.md CHANGED
@@ -38,3 +38,8 @@
38
38
 
39
39
  #### Enhancement
40
40
  - Beta feature Actors and edition configurations are unified
41
+
42
+ ### v0.2.9.2 - 22-11-2024
43
+
44
+ #### BugFix
45
+ - Implemented synchronization for the login process. This fix will help avoid login session-related failures in UAT.
@@ -0,0 +1,11 @@
1
+ "use strict";
2
+
3
+ Object.defineProperty(exports, "__esModule", {
4
+ value: true
5
+ });
6
+ exports.LOGIN_MUTEX_TIMEOUT = void 0;
7
+ const LOGIN_MUTEX_TIMEOUT = exports.LOGIN_MUTEX_TIMEOUT = {
8
+ "wait": 5000,
9
+ "retries": 5,
10
+ "stale": 300000
11
+ };
@@ -10,6 +10,7 @@ exports.verifyIfCookieFileExists = verifyIfCookieFileExists;
10
10
  var _path = _interopRequireDefault(require("path"));
11
11
  var _fs = require("fs");
12
12
  var _readConfigFile = require("../../readConfigFile");
13
+ var _checkAuthDirectory = require("../checkAuthDirectory");
13
14
  var _logger = require("../../../../utils/logger");
14
15
  /* eslint-disable no-console */
15
16
 
@@ -23,13 +24,7 @@ function getAuthFileDirectory() {
23
24
  return _path.default.resolve(_path.default.join(uatDirectory, 'playwright', '.auth'));
24
25
  }
25
26
  function verifyIfCookieFileExists(authFile) {
26
- const authDirectory = getAuthFileDirectory();
27
- if (!(0, _fs.existsSync)(authDirectory)) {
28
- console.log('Creating auth directory for the first time setup...');
29
- (0, _fs.mkdirSync)(authDirectory, {
30
- recursive: true
31
- });
32
- }
27
+ (0, _checkAuthDirectory.createAuthDirectoryIfNotExist)();
33
28
  if (!(0, _fs.existsSync)(authFile)) {
34
29
  console.log('creating auth file..');
35
30
  (0, _fs.writeFileSync)(authFile, JSON.stringify(authContent, null, 2));
@@ -41,7 +36,6 @@ function convertCookiesToParse(cookies, authFilePath) {
41
36
  } catch (err) {
42
37
  _logger.Logger.error(err);
43
38
  throw new Error(` Error while parsing cookies ${err} \n${_path.default.resolve(process.cwd(), authFilePath)} File is Empty`);
44
- // process.exit()
45
39
  }
46
40
  }
47
41
  async function loadCookiesIfPresent(page, authFile) {
@@ -6,6 +6,8 @@ Object.defineProperty(exports, "__esModule", {
6
6
  });
7
7
  exports.default = void 0;
8
8
  var _path = _interopRequireDefault(require("path"));
9
+ var _fileMutex = _interopRequireDefault(require("../fileMutex"));
10
+ var _fileMutexConfig = require("../../constants/fileMutexConfig");
9
11
  var _accountLogin = _interopRequireDefault(require("./accountLogin"));
10
12
  var _checkAuthCookies = require("./checkAuthCookies");
11
13
  /* eslint-disable no-console */
@@ -17,25 +19,30 @@ async function performLoginSteps({
17
19
  password
18
20
  }, isLoggedIn) {
19
21
  const authFile = _path.default.resolve(_path.default.join((0, _checkAuthCookies.getAuthFileDirectory)(), `${authFilePrefix}-cookies.json`));
20
- await (0, _checkAuthCookies.loadCookiesIfPresent)(page, authFile);
21
- await page.goto(process.env.domain);
22
-
23
- // await page.waitForNavigation();
24
-
25
- // await page.waitForLoadState('networkidle')
26
-
27
- await Promise.race([page.waitForNavigation(), page.waitForLoadState('networkidle'), page.waitForTimeout(5000)]);
28
- const loginStatus = await isLoggedIn(page);
29
- if (!loginStatus) {
30
- await (0, _accountLogin.default)(page, useremail, password);
22
+ const lockFileName = useremail.replace(/[@.]/g, '_');
23
+ const fileMutex = new _fileMutex.default((0, _checkAuthCookies.getAuthFileDirectory)(), lockFileName, _fileMutexConfig.LOGIN_MUTEX_TIMEOUT);
24
+ try {
25
+ await fileMutex.acquire();
26
+ await (0, _checkAuthCookies.loadCookiesIfPresent)(page, authFile);
31
27
  await page.goto(process.env.domain);
32
-
33
- // await page.waitForLoadState();
34
-
35
- await isLoggedIn(page);
36
- await page.context().storageState({
37
- path: authFile
38
- });
28
+ await Promise.race([page.waitForNavigation(), page.waitForLoadState('networkidle'), page.waitForTimeout(5000)]);
29
+ const isAlreadyLoggedIn = await isLoggedIn(page);
30
+ if (!isAlreadyLoggedIn) {
31
+ await (0, _accountLogin.default)(page, useremail, password);
32
+ await page.goto(process.env.domain);
33
+ await isLoggedIn(page);
34
+ await page.context().storageState({
35
+ path: authFile
36
+ });
37
+ }
38
+ } catch (error) {
39
+ console.error(`Error during login for ${useremail}:`, error);
40
+ } finally {
41
+ try {
42
+ await fileMutex.release();
43
+ } catch (releaseError) {
44
+ console.error(`Error releasing lock for ${useremail}:`, releaseError);
45
+ }
39
46
  }
40
47
  }
41
48
  var _default = exports.default = performLoginSteps;
@@ -0,0 +1,17 @@
1
+ "use strict";
2
+
3
+ Object.defineProperty(exports, "__esModule", {
4
+ value: true
5
+ });
6
+ exports.createAuthDirectoryIfNotExist = createAuthDirectoryIfNotExist;
7
+ var _fs = require("fs");
8
+ var _checkAuthCookies = require("./auth/checkAuthCookies");
9
+ function createAuthDirectoryIfNotExist() {
10
+ const authDirectory = (0, _checkAuthCookies.getAuthFileDirectory)();
11
+ if (!(0, _fs.existsSync)(authDirectory)) {
12
+ console.log('Creating auth directory for the first time setup...');
13
+ (0, _fs.mkdirSync)(authDirectory, {
14
+ recursive: true
15
+ });
16
+ }
17
+ }
@@ -0,0 +1,58 @@
1
+ "use strict";
2
+
3
+ var _interopRequireDefault = require("@babel/runtime/helpers/interopRequireDefault");
4
+ Object.defineProperty(exports, "__esModule", {
5
+ value: true
6
+ });
7
+ exports.default = void 0;
8
+ var _path = _interopRequireDefault(require("path"));
9
+ var _lockfile = _interopRequireDefault(require("lockfile"));
10
+ var _fs = require("fs");
11
+ function _classPrivateMethodInitSpec(obj, privateSet) { _checkPrivateRedeclaration(obj, privateSet); privateSet.add(obj); }
12
+ function _checkPrivateRedeclaration(obj, privateCollection) { if (privateCollection.has(obj)) { throw new TypeError("Cannot initialize the same private elements twice on an object"); } }
13
+ function _classPrivateMethodGet(receiver, privateSet, fn) { if (!privateSet.has(receiver)) { throw new TypeError("attempted to get private field on non-instance"); } return fn; }
14
+ var _getLockFilePath = /*#__PURE__*/new WeakSet();
15
+ var _createDirectoryIfNotExist = /*#__PURE__*/new WeakSet();
16
+ class FileMutex {
17
+ constructor(directory, lockFileName, timeout) {
18
+ _classPrivateMethodInitSpec(this, _createDirectoryIfNotExist);
19
+ _classPrivateMethodInitSpec(this, _getLockFilePath);
20
+ this.directory = directory;
21
+ this.lockFileName = lockFileName;
22
+ this.timeout = timeout;
23
+ }
24
+ async acquire() {
25
+ _classPrivateMethodGet(this, _createDirectoryIfNotExist, _createDirectoryIfNotExist2).call(this);
26
+ return new Promise((resolve, reject) => {
27
+ _lockfile.default.lock(_classPrivateMethodGet(this, _getLockFilePath, _getLockFilePath2).call(this), this.timeout, err => {
28
+ if (err) {
29
+ reject(err);
30
+ } else {
31
+ resolve();
32
+ }
33
+ });
34
+ });
35
+ }
36
+ async release() {
37
+ return new Promise((resolve, reject) => {
38
+ _lockfile.default.unlock(_classPrivateMethodGet(this, _getLockFilePath, _getLockFilePath2).call(this), err => {
39
+ if (err) {
40
+ reject(err);
41
+ } else {
42
+ resolve();
43
+ }
44
+ });
45
+ });
46
+ }
47
+ }
48
+ function _getLockFilePath2() {
49
+ return _path.default.resolve(_path.default.join(this.directory, `/${this.lockFileName}.lock`));
50
+ }
51
+ function _createDirectoryIfNotExist2() {
52
+ if (!(0, _fs.existsSync)(this.directory)) {
53
+ (0, _fs.mkdirSync)(this.directory, {
54
+ recursive: true
55
+ });
56
+ }
57
+ }
58
+ var _default = exports.default = FileMutex;
@@ -0,0 +1,94 @@
1
+ "use strict";
2
+
3
+ var _interopRequireDefault = require("@babel/runtime/helpers/interopRequireDefault");
4
+ var _fileMutex = _interopRequireDefault(require("../../../../../core/playwright/helpers/fileMutex"));
5
+ var _lockfile = _interopRequireDefault(require("lockfile"));
6
+ var _path = _interopRequireDefault(require("path"));
7
+ var _fs = _interopRequireDefault(require("fs"));
8
+ jest.mock('lockfile');
9
+ jest.mock('fs');
10
+ describe('FileMutex', () => {
11
+ const mockDirectory = '/tmp';
12
+ const mockFileName = 'test_user';
13
+ const mockTimeout = {
14
+ wait: 5000,
15
+ retries: 5,
16
+ stale: 60000
17
+ };
18
+ let fileMutex;
19
+ beforeEach(() => {
20
+ fileMutex = new _fileMutex.default(mockDirectory, mockFileName, mockTimeout);
21
+ });
22
+ afterEach(() => {
23
+ jest.clearAllMocks();
24
+ });
25
+ describe('acquire', () => {
26
+ it('should resolve when lockfile.lock succeeds and call getLockFilePath correctly', async () => {
27
+ const expectedPath = _path.default.resolve(_path.default.join(mockDirectory, `./${mockFileName}.lock`));
28
+ _lockfile.default.lock.mockImplementation((lockPath, options, callback) => {
29
+ expect(lockPath).toBe(expectedPath);
30
+ expect(options).toEqual(mockTimeout);
31
+ callback(null);
32
+ });
33
+ await expect(fileMutex.acquire()).resolves.toBeUndefined();
34
+ expect(_lockfile.default.lock).toHaveBeenCalledWith(expectedPath, mockTimeout, expect.any(Function));
35
+ });
36
+ it('should reject when lockfile.lock fails', async () => {
37
+ const mockError = new Error('Lock failed');
38
+ _lockfile.default.lock.mockImplementation((lockPath, options, callback) => {
39
+ expect(lockPath).toBe(_path.default.resolve(_path.default.join(mockDirectory, `./${mockFileName}.lock`)));
40
+ expect(options).toEqual(mockTimeout);
41
+ callback(mockError);
42
+ });
43
+ await expect(fileMutex.acquire()).rejects.toThrow('Lock failed');
44
+ expect(_lockfile.default.lock).toHaveBeenCalled();
45
+ });
46
+ it('should create the directory if it does not exist and acquire the lock', async () => {
47
+ _fs.default.existsSync.mockReturnValue(false);
48
+ _fs.default.mkdirSync.mockImplementation((dir, options) => {
49
+ expect(dir).toBe(mockDirectory);
50
+ expect(options).toEqual({
51
+ recursive: true
52
+ });
53
+ });
54
+ _lockfile.default.lock.mockImplementation((lockPath, options, callback) => {
55
+ expect(lockPath).toBe(_path.default.resolve(_path.default.join(mockDirectory, `./${mockFileName}.lock`)));
56
+ expect(options).toEqual(mockTimeout);
57
+ callback(null);
58
+ });
59
+ await expect(fileMutex.acquire()).resolves.toBeUndefined();
60
+ expect(_fs.default.existsSync).toHaveBeenCalledWith(mockDirectory);
61
+ expect(_fs.default.mkdirSync).toHaveBeenCalledWith(mockDirectory, {
62
+ recursive: true
63
+ });
64
+ expect(_lockfile.default.lock).toHaveBeenCalled();
65
+ });
66
+ it('should not create the directory if it already exists', async () => {
67
+ _fs.default.existsSync.mockReturnValue(true);
68
+ _lockfile.default.lock.mockImplementation((lockPath, options, callback) => {
69
+ callback(null);
70
+ });
71
+ await expect(fileMutex.acquire()).resolves.toBeUndefined();
72
+ expect(_fs.default.mkdirSync).not.toHaveBeenCalled();
73
+ expect(_lockfile.default.lock).toHaveBeenCalled();
74
+ });
75
+ });
76
+ describe('release', () => {
77
+ it('should resolve when lockfile.unlock succeeds and call getLockFilePath correctly', async () => {
78
+ const expectedPath = _path.default.resolve(_path.default.join(mockDirectory, `./${mockFileName}.lock`));
79
+ _lockfile.default.unlock.mockImplementation((path, callback) => {
80
+ callback(null);
81
+ });
82
+ await expect(fileMutex.release()).resolves.toBeUndefined();
83
+ expect(_lockfile.default.unlock).toHaveBeenCalledWith(expectedPath, expect.any(Function));
84
+ });
85
+ it('should reject when lockfile.unlock fails', async () => {
86
+ const mockError = new Error('Unlock failed');
87
+ _lockfile.default.unlock.mockImplementation((path, callback) => {
88
+ callback(mockError);
89
+ });
90
+ await expect(fileMutex.release()).rejects.toThrow('Unlock failed');
91
+ expect(_lockfile.default.unlock).toHaveBeenCalled();
92
+ });
93
+ });
94
+ });
@@ -1,5 +1,2 @@
1
1
  const editions = require('./editions/index');
2
- const beta = require('./beta/index');
3
-
4
-
5
- module.exports = { editions, beta }
2
+ module.exports = { editions }
@@ -2,5 +2,5 @@
2
2
  "environment": "ci",
3
3
  "edition": "enterprise",
4
4
  "profile": "admin",
5
- "domain": "https://zdesk-devops08.csez.zohocorpin.com:31007/agent"
5
+ "domain": "https://zdesk-devops16.csez.zohocorpin.com:31025/agent"
6
6
  }
@@ -12,16 +12,24 @@ function getPrimaryCookiePath() {
12
12
  * @typedef {import('@zohodesk/testinglibrary').UserConfig} UserConfig
13
13
  */
14
14
  module.exports = {
15
- headless: true,
15
+ headless: false,
16
+ retries:1,
16
17
  openReportOn: 'never',
17
18
  browsers: ['Chrome'],
18
- isAuthMode: false,
19
+ isAuthMode: true,
19
20
  authFilePath: getPrimaryCookiePath(),
20
- trace: true,
21
- video: true,
21
+ trace: 'retain-on-failure',
22
+ video: 'retain-on-failure',
23
+ retries:1,
22
24
  bddMode: false,
25
+ expectTimeout: 10 * 1000,
26
+ testTimeout: 60 * 1000,
27
+ globalTimeout: 2 * 60 * 60 * 1000,
28
+ featureFilesFolder: 'feature-files',
29
+ stepDefinitionsFolder: 'steps',
23
30
  viewport: { width: 1280, height: 720 },
24
31
  testIdAttribute: 'data-id',
32
+ editionOrder: ['Free', 'Express', 'Standard', 'Professional', 'Enterprise'],
25
33
  additionalPages: {
26
34
  ...customFixtures
27
35
  }
@@ -1,18 +1,18 @@
1
1
  {
2
2
  "dev": {
3
- "domain": "https://desk.localzoho.com/agent",
3
+ "domain": "https://zdesk-devops16.csez.zohocorpin.com:31025/agent",
4
4
  "orgName": "org-name",
5
5
  "deptName": "dept-name",
6
6
  "moduleName": "module-name"
7
7
  },
8
8
  "prod": {
9
- "domain": "https://desk.localzoho.com/agent/",
9
+ "domain": "https://zdesk-devops16.csez.zohocorpin.com:31025/agent",
10
10
  "orgName": "sangeetha.t@zohocorp.com",
11
11
  "deptName": "sangeethat",
12
12
  "moduleName": "sangeethat"
13
13
  },
14
14
  "ci": {
15
- "domain": "https://zdesk-devops08.csez.zohocorpin.com:31007/agent/",
15
+ "domain": "https://zdesk-devops16.csez.zohocorpin.com:31025/agent",
16
16
  "orgName": "clientcicdk8",
17
17
  "deptName": "clientcicdk8",
18
18
  "moduleName": "tickets"
@@ -21,7 +21,8 @@ if (!isDevelopmentSetup()) {
21
21
  const authFilePath = path.join(authDirectory, file);
22
22
  await loadCookiesIfPresent(page, authFilePath);
23
23
  const domainOrigin = getUrlOrigin(process.env.domain);
24
- await page.goto(`${domainOrigin}/support/logout.sas `);
24
+ const logoutURL = `${domainOrigin}/support/logout.sas`;
25
+ await page.goto(logoutURL);
25
26
  await page.waitForNavigation();
26
27
  await expect(page.locator('[id="signin_flow"]')).toBeVisible();
27
28
  await fs.rmSync(authFilePath);
@@ -4,11 +4,11 @@ test.describe("Verify no authentication required @nobdd", () => {
4
4
 
5
5
  test("Verify the page is not logged in", async ({ page }) => {
6
6
 
7
- await page.goto('https://desk.localzoho.com/');
7
+ await page.goto(process.env.domain);
8
8
 
9
- await page.waitForSelector('.zgh-accounts');
9
+ await page.waitForSelector('#login');
10
10
 
11
- const isLoggedIn = await page.isVisible('.zgh-accounts');
11
+ const isLoggedIn = await page.isVisible('#login');
12
12
  expect(isLoggedIn).toBe(true);
13
13
 
14
14
  });
@@ -13,17 +13,23 @@ function getPrimaryCookiePath() {
13
13
  */
14
14
  module.exports = {
15
15
  headless: false,
16
+ retries:1,
16
17
  openReportOn: 'never',
17
18
  browsers: ['Chrome'],
18
19
  isAuthMode: true,
19
20
  authFilePath: getPrimaryCookiePath(),
20
- trace: true,
21
- video: true,
22
- bddMode: true,
21
+ trace: 'retain-on-failure',
22
+ video: 'retain-on-failure',
23
+ retries:1,
24
+ bddMode: false,
25
+ expectTimeout: 10 * 1000,
26
+ testTimeout: 60 * 1000,
27
+ globalTimeout: 2 * 60 * 60 * 1000,
23
28
  featureFilesFolder: 'feature-files',
24
29
  stepDefinitionsFolder: 'steps',
25
30
  viewport: { width: 1280, height: 720 },
26
31
  testIdAttribute: 'data-id',
32
+ editionOrder: ['Free', 'Express', 'Standard', 'Professional', 'Enterprise'],
27
33
  additionalPages: {
28
34
  ...customFixtures
29
35
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@zohodesk/testinglibrary",
3
- "version": "2.9.1",
3
+ "version": "2.9.2",
4
4
  "description": "",
5
5
  "main": "./build/index.js",
6
6
  "scripts": {
@@ -32,6 +32,7 @@
32
32
  "fast-glob": "3.3.1",
33
33
  "jest": "29.6.2",
34
34
  "jest-environment-jsdom": "29.6.2",
35
+ "lockfile": "^1.0.4",
35
36
  "msw": "1.2.3",
36
37
  "playwright": "1.42.1",
37
38
  "supports-color": "8.1.1"
@@ -1,24 +0,0 @@
1
- [
2
- {
3
- "id": "1",
4
- "edition": "enterprise",
5
- "orgName": "custommoduleportal",
6
- "profiles": [
7
- {
8
- "profile": "admin",
9
- "email": "indragith.m+agent@zohotest.com",
10
- "password": "Paara!2019"
11
- },
12
- {
13
- "profile": "agent",
14
- "email": "indragith.m+agent@zohotest.com",
15
- "password": "Paara!2019"
16
- },
17
- {
18
- "profile": "lightagent",
19
- "email": "indragith.m+abc1@zohotest.com",
20
- "password": "Paara!2019"
21
- }
22
- ]
23
- }
24
- ]
@@ -1,6 +0,0 @@
1
- const parentchild = require('./parent-child.json');
2
- const custommodule = require('./custom-module.json');
3
-
4
- const beta = { parentchild, custommodule };
5
-
6
- module.exports = beta;
@@ -1,24 +0,0 @@
1
- [
2
- {
3
- "id": "1",
4
- "edition": "enterprise",
5
- "orgName": "parentchildportal",
6
- "profiles": [
7
- {
8
- "profile": "admin",
9
- "email": "indragith.m@zohocorp.com",
10
- "password": "Paara!2019"
11
- },
12
- {
13
- "profile": "agent",
14
- "email": "indragith.m+agent@zohotest.com",
15
- "password": "Paara!2019"
16
- },
17
- {
18
- "profile": "lightagent",
19
- "email": "indragith.m+abc1@zohotest.com",
20
- "password": "Paara!2019"
21
- }
22
- ]
23
- }
24
- ]