graphdb-workbench-tests 3.1.0-WBM-8 → 3.1.0-plugins1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.nycrc +10 -0
- package/cypress-legacy.config.js +9 -1
- package/cypress-security.config.js +40 -0
- package/cypress.config.js +3 -1
- package/e2e-flaky/import/import-user-data-url.spec.js +63 -0
- package/e2e-legacy/cluster/edit-cluster-nodes-modal.spec.js +44 -0
- package/e2e-legacy/explore/class-hierarchy/class.hierarchy.spec.js +1 -2
- package/e2e-legacy/explore/graphs-overview/graphs.overview.spec.js +2 -3
- package/e2e-legacy/explore/visual-graph/graphs-config.spec.js +5 -18
- package/e2e-legacy/explore/visual-graph/visual.graph.spec.js +1 -2
- package/e2e-legacy/graphql/activate-deactivate-graphql-endpoint.spec.js +1 -1
- package/e2e-legacy/graphql/create-graphql-endpoint.spec.js +1 -3
- package/e2e-legacy/graphql/delete-graphql-endpoint.spec.js +1 -1
- package/e2e-legacy/graphql/edit-graphql-enpoint.spec.js +1 -1
- package/e2e-legacy/graphql/export-graphql-endpoint-definition.spec.js +1 -1
- package/e2e-legacy/graphql/filter-graphql-endpoints-on-management-view.spec.js +2 -2
- package/e2e-legacy/graphql/graphql-endpoint-management-view.spec.js +5 -5
- package/e2e-legacy/graphql/graphql-playground.spec.js +1 -1
- package/e2e-legacy/graphql/import-graphql-endpoint-definitions.spec.js +1 -7
- package/e2e-legacy/graphql/set-default-graphql-endpoint.spec.js +1 -1
- package/e2e-legacy/help/guides/guides-with-repository.spec.js +32 -0
- package/e2e-legacy/help/guides/guides-without-repository.spec.js +20 -0
- package/e2e-legacy/{guides → help/guides}/movies-interactive-guide.spec.js +2 -2
- package/e2e-legacy/{guides → help/guides}/star-wars-interactive-guide.js +2 -2
- package/e2e-legacy/help/rest-api-documentatio/rest-api-documentation-with-repository.spec.js +32 -0
- package/e2e-legacy/help/rest-api-documentatio/rest-api-documentation-without-repository.spec.js +20 -0
- package/e2e-legacy/help/system-information/system-information-with-repository.spec.js +32 -0
- package/e2e-legacy/help/system-information/system-information-without-repository.spec.js +20 -0
- package/e2e-legacy/home/cookie-policy.spec.js +78 -59
- package/e2e-legacy/home/create-repository.spec.js +2 -6
- package/e2e-legacy/home/documentation-link.spec.js +31 -33
- package/e2e-legacy/home/google-analytics.spec.js +4 -6
- package/e2e-legacy/home/rdf-resource-search.spec.js +106 -138
- package/e2e-legacy/home/view-resource-autocomplete.spec.js +30 -21
- package/e2e-legacy/import/import-server-files-batch-operations.spec.js +1 -2
- package/e2e-legacy/import/import-server-files.spec.js +1 -2
- package/e2e-legacy/import/import-user-data-url.spec.js +1 -25
- package/e2e-legacy/import/import-user-data.spec.js +4 -2
- package/e2e-legacy/import/import-view.spec.js +1 -2
- package/e2e-legacy/monitor/global-operation-statuses-component.spec.js +13 -9
- package/e2e-legacy/repository/attach-remote-location.spec.js +2 -5
- package/e2e-legacy/repository/ontop-repository.spec.js +3 -12
- package/e2e-legacy/repository/repositories.spec.js +35 -46
- package/e2e-legacy/setup/aclmanagement/create-rule.spec.js +1 -2
- package/e2e-legacy/setup/aclmanagement/edit-rule.spec.js +1 -2
- package/e2e-legacy/setup/aclmanagement/reorder-rules.spec.js +1 -2
- package/e2e-legacy/setup/aclmanagement/scopes.spec.js +1 -2
- package/e2e-legacy/setup/autocomplete/autocomplete-with-repository.spec.js +40 -0
- package/e2e-legacy/setup/autocomplete/autocomplete-without-repository.spec.js +27 -0
- package/e2e-legacy/setup/{autocomplete.spec.js → autocomplete/autocomplete.spec.js} +5 -6
- package/e2e-legacy/setup/cluster/cluster-initial-state-with-cluster.spec.js +34 -0
- package/e2e-legacy/setup/cluster/cluster-initial-state-without-cluster.spec.js +25 -0
- package/e2e-legacy/setup/connectors-lucene.spec.js +1 -2
- package/e2e-legacy/setup/jdbc/jdbc-create.spec.js +2 -2
- package/e2e-legacy/setup/namespaces/namespaces-with-repository.spec.js +44 -0
- package/e2e-legacy/setup/namespaces/namespaces-without-repository.spec.js +27 -0
- package/e2e-legacy/setup/{namespaces.spec.js → namespaces/namespaces.spec.js} +4 -4
- package/e2e-legacy/setup/plugins/plugins-with-repository.spec.js +38 -0
- package/e2e-legacy/setup/plugins/plugins-without-repository.spec.js +28 -0
- package/e2e-legacy/setup/{plugins.spec.js → plugins/plugins.spec.js} +3 -3
- package/e2e-legacy/setup/sparql-template/sparql-template-create.js +10 -3
- package/e2e-legacy/setup/users-and-access/user-and-access.spec.js +38 -9
- package/e2e-legacy/sparql-editor/saved-query/edit-query.spec.js +3 -6
- package/e2e-legacy/sparql-editor/saved-query/readonly-query.spec.js +7 -13
- package/e2e-legacy/sparql-editor/saved-query/share-query.spec.js +2 -4
- package/e2e-legacy/sparql-editor/sparql-editor.spec.js +1 -4
- package/e2e-legacy/ttyg/agent-list.spec.js +38 -6
- package/e2e-legacy/ttyg/chat-list.spec.js +1 -2
- package/e2e-legacy/ttyg/clone-agent.spec.js +1 -0
- package/e2e-legacy/ttyg/create-agent.spec.js +10 -16
- package/e2e-legacy/ttyg/edit-agent.spec.js +69 -9
- package/e2e-legacy/ttyg/ttyg-initial-state-with-configured-api-key.spec.js +46 -0
- package/e2e-legacy/ttyg/ttyg-initial-state-with-selected-repository.spec.js +45 -0
- package/e2e-legacy/ttyg/ttyg-initial-state-without-repositories.spec.js +21 -0
- package/e2e-legacy/ttyg/ttyg-permission.spec.js +28 -20
- package/e2e-legacy/ttyg/ttyg-view.spec.js +1 -1
- package/e2e-security/setup/home/cookie-policy.spec.js +64 -0
- package/e2e-security/setup/users-and-access/create-user-permissions.spec.js +184 -0
- package/e2e-security/setup/users-and-access/graphql-user.spec.js +123 -0
- package/e2e-security/setup/users-and-access/repo-admin-role.spec.js +69 -0
- package/e2e-security/setup/users-and-access/turn-on-security-and-password-change.spec.js +87 -0
- package/e2e-security/setup/users-and-access/user-and-access.spec.js +87 -0
- package/e2e-security/setup/users-and-access/users-and-access-initial-state.spec.js +38 -0
- package/fixtures/repositories/free-access.json +13 -0
- package/fixtures/repositories/get-remote-and-local-repositories.json +34 -0
- package/fixtures/ttyg/agent/get-agent-defaults-assistant-api.json +44 -0
- package/fixtures/ttyg/agent/get-agent-defaults.json +2 -0
- package/npm-shrinkwrap.json +7633 -1817
- package/package.json +13 -7
- package/plugins/index.js +3 -2
- package/steps/base-steps.js +4 -0
- package/steps/cluster/cluster-page-steps.js +12 -2
- package/steps/error-steps.js +4 -7
- package/steps/graphql/graphql-endpoint-management-steps.js +2 -2
- package/steps/guides/guide-steps.js +20 -1
- package/steps/home-steps.js +59 -37
- package/steps/import/import-steps.js +8 -3
- package/steps/login-steps.js +14 -3
- package/steps/main-menu-steps.js +76 -6
- package/steps/operations-statuses-component-steps.js +5 -10
- package/steps/rdf-resource-search-steps.js +55 -0
- package/steps/repository-steps.js +17 -17
- package/steps/rest-api-documentation-steps.js +15 -0
- package/steps/setup/autocomplete-steps.js +17 -3
- package/steps/setup/namespace-steps.js +8 -2
- package/steps/setup/plugins-steps.js +11 -1
- package/steps/setup/settings-steps.js +18 -0
- package/steps/setup/user-and-access-steps.js +28 -2
- package/steps/system-information-steps.js +70 -0
- package/steps/ttyg/ttyg-agent-settings-modal.steps.js +74 -11
- package/steps/ttyg/ttyg-view-steps.js +39 -6
- package/steps/widgets/active-repository-widget-steps.js +4 -0
- package/steps/yasgui/yasr-steps.js +4 -0
- package/stubs/browser-stubs.js +21 -0
- package/stubs/environment-stubs.js +9 -1
- package/stubs/repositories/repositories-stubs.js +4 -0
- package/stubs/security-stubs.js +4 -0
- package/stubs/ttyg/ttyg-stubs.js +18 -2
- package/support/e2e.js +2 -1
- package/support/repository-commands.js +14 -1
- package/e2e-flaky/setup/users-and-access/security-and-free-access.spec.js +0 -57
- package/e2e-flaky/ttyg/ttyg-permission.spec.js +0 -67
- package/fixtures/locale-en.json +0 -3361
- /package/e2e-legacy/help/{system-information.spec.js → system-information/system-information.spec.js} +0 -0
|
@@ -1,9 +1,12 @@
|
|
|
1
1
|
import {RepositoriesStubs} from "../../stubs/repositories/repositories-stubs";
|
|
2
2
|
import {RepositoriesStub} from "../../stubs/repositories-stub";
|
|
3
|
-
import {UserAndAccessSteps} from "../../steps/setup/user-and-access-steps";
|
|
4
3
|
import {TTYGStubs} from "../../stubs/ttyg/ttyg-stubs";
|
|
5
4
|
import {TTYGViewSteps} from "../../steps/ttyg/ttyg-view-steps";
|
|
5
|
+
import {LoginSteps} from "../../steps/login-steps";
|
|
6
|
+
import {SecurityStubs} from "../../stubs/security-stubs";
|
|
7
|
+
import {RepositorySelectorSteps} from "../../steps/repository-selector-steps";
|
|
6
8
|
|
|
9
|
+
const REPOSITORY_ID = 'starwars';
|
|
7
10
|
const USER_WITH_ROLE_USER = 'ttyg_user';
|
|
8
11
|
const USER_WITH_ROLE_REPO_MANAGER = 'ttyg_repo_manager';
|
|
9
12
|
const USER_ADMINISTRATOR = 'admin';
|
|
@@ -11,42 +14,43 @@ const PASSWORD = 'root';
|
|
|
11
14
|
const ENABLED = true;
|
|
12
15
|
const DISABLED = false;
|
|
13
16
|
|
|
14
|
-
|
|
15
|
-
* TODO: Fix me. Broken due to migration (The issue GDB-11317 not implemented)
|
|
16
|
-
*/
|
|
17
|
-
describe.skip('TTYG permissions', () => {
|
|
18
|
-
|
|
17
|
+
describe('TTYG permissions', () => {
|
|
19
18
|
|
|
20
19
|
before(() => {
|
|
21
|
-
|
|
22
|
-
RepositoriesStub.stubBaseEndpoints('starwars');
|
|
23
|
-
cy.presetRepository('starwars');
|
|
20
|
+
cy.loginAsAdmin();
|
|
24
21
|
cy.createUser({username: USER_WITH_ROLE_USER, password: PASSWORD});
|
|
25
22
|
cy.createUser({
|
|
26
23
|
username: USER_WITH_ROLE_REPO_MANAGER,
|
|
27
24
|
password: PASSWORD,
|
|
28
25
|
grantedAuthorities: ["ROLE_REPO_MANAGER", "WRITE_REPO_*", "READ_REPO_*"]
|
|
29
26
|
});
|
|
30
|
-
|
|
31
|
-
UserAndAccessSteps.toggleSecurity();
|
|
27
|
+
cy.switchOnSecurity();
|
|
32
28
|
});
|
|
33
29
|
|
|
30
|
+
beforeEach(() => {
|
|
31
|
+
SecurityStubs.spyOnAuthenticatedUser();
|
|
32
|
+
RepositoriesStubs.stubRepositories(0, '/repositories/get-ttyg-repositories.json');
|
|
33
|
+
RepositoriesStub.stubBaseEndpoints(REPOSITORY_ID);
|
|
34
|
+
})
|
|
35
|
+
|
|
34
36
|
after(() => {
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
cy.
|
|
39
|
-
cy.deleteUser(USER_WITH_ROLE_REPO_MANAGER);
|
|
37
|
+
cy.loginAsAdmin();
|
|
38
|
+
cy.deleteUser(USER_WITH_ROLE_USER, true);
|
|
39
|
+
cy.deleteUser(USER_WITH_ROLE_REPO_MANAGER, true);
|
|
40
|
+
cy.switchOffSecurity(true);
|
|
40
41
|
});
|
|
41
42
|
|
|
42
|
-
it('should disable all buttons that can modify the agent', () => {
|
|
43
|
-
|
|
43
|
+
it('should disable all buttons that can modify the agent when user is with ROLE_USER', () => {
|
|
44
44
|
// When I log in with a user who has the ROLE_USER role, I expect all buttons modifying the agent to be disabled.
|
|
45
45
|
verifyCanCreateAgentForFirstTime(USER_WITH_ROLE_USER, PASSWORD, DISABLED);
|
|
46
|
+
});
|
|
46
47
|
|
|
48
|
+
it('should enable all buttons that can modify the agent when user is with role ROLE_REPO_MANAGER', () => {
|
|
47
49
|
// When I log in with a user who has the ROLE_REPO_MANAGER role, I expect all buttons modifying the agent to be enabled.
|
|
48
50
|
verifyCanCreateAgentForFirstTime(USER_WITH_ROLE_REPO_MANAGER, PASSWORD, ENABLED);
|
|
51
|
+
});
|
|
49
52
|
|
|
53
|
+
it('should enable all buttons that can modify the agent when user is admin', () => {
|
|
50
54
|
// When I log in with a user who is administrator, I expect all buttons modifying the agent to be enabled.
|
|
51
55
|
verifyCanCreateAgentForFirstTime(USER_ADMINISTRATOR, PASSWORD, ENABLED);
|
|
52
56
|
});
|
|
@@ -55,7 +59,12 @@ describe.skip('TTYG permissions', () => {
|
|
|
55
59
|
const shouldBe = enable ? 'be.enabled' : 'be.disabled';
|
|
56
60
|
TTYGStubs.stubAgentListGet('/ttyg/agent/get-agent-list-0.json');
|
|
57
61
|
TTYGViewSteps.visit();
|
|
58
|
-
|
|
62
|
+
cy.url().should('include', '/login');
|
|
63
|
+
cy.wait('@get-authenticated-user');
|
|
64
|
+
cy.wait('@get-authenticated-user');
|
|
65
|
+
cy.wait('@get-authenticated-user');
|
|
66
|
+
LoginSteps.loginWithUser(user, password);
|
|
67
|
+
RepositorySelectorSteps.selectRepository(REPOSITORY_ID);
|
|
59
68
|
TTYGViewSteps.getCreateFirstAgentButton().should(shouldBe);
|
|
60
69
|
TTYGStubs.stubChatsListGet();
|
|
61
70
|
TTYGStubs.stubAgentListGet();
|
|
@@ -64,6 +73,5 @@ describe.skip('TTYG permissions', () => {
|
|
|
64
73
|
TTYGViewSteps.getCreateAgentButton().should(shouldBe);
|
|
65
74
|
TTYGViewSteps.getEditCurrentAgentButton().should(shouldBe);
|
|
66
75
|
TTYGViewSteps.getToggleAgentsSidebarButton().should(shouldBe);
|
|
67
|
-
UserAndAccessSteps.logout();
|
|
68
76
|
}
|
|
69
77
|
});
|
|
@@ -5,7 +5,7 @@ import {ApplicationSteps} from "../../steps/application-steps";
|
|
|
5
5
|
import {RepositoriesStub} from "../../stubs/repositories-stub";
|
|
6
6
|
|
|
7
7
|
// TODO: Fix me. Broken due to migration (Error: unknown)
|
|
8
|
-
describe
|
|
8
|
+
describe('TTYG view', () => {
|
|
9
9
|
|
|
10
10
|
const repositoryId = 'starwars';
|
|
11
11
|
|
|
@@ -0,0 +1,64 @@
|
|
|
1
|
+
import {UserAndAccessSteps} from "../../../steps/setup/user-and-access-steps";
|
|
2
|
+
import {LicenseStubs} from "../../../stubs/license-stubs";
|
|
3
|
+
import {LoginSteps} from "../../../steps/login-steps";
|
|
4
|
+
import {ModalDialogSteps} from "../../../steps/modal-dialog-steps";
|
|
5
|
+
import HomeSteps from "../../../steps/home-steps";
|
|
6
|
+
|
|
7
|
+
Cypress.env('set_default_user_data', false);
|
|
8
|
+
|
|
9
|
+
describe('Cookie policy', () => {
|
|
10
|
+
|
|
11
|
+
let repository;
|
|
12
|
+
|
|
13
|
+
beforeEach(() => {
|
|
14
|
+
cy.loginAsAdmin().then(() => {
|
|
15
|
+
cy.switchOffFreeAccess(true);
|
|
16
|
+
cy.switchOffSecurity(true);
|
|
17
|
+
});
|
|
18
|
+
cy.setDefaultUserData(false);
|
|
19
|
+
LicenseStubs.stubFreeLicense();
|
|
20
|
+
repository = 'cypress-test-cookie-policy-security-' + Date.now();
|
|
21
|
+
cy.createRepository({id: repository});
|
|
22
|
+
});
|
|
23
|
+
|
|
24
|
+
afterEach(() => {
|
|
25
|
+
cy.deleteRepository(repository, true);
|
|
26
|
+
cy.loginAsAdmin().then(() => {
|
|
27
|
+
cy.switchOffFreeAccess(true);
|
|
28
|
+
cy.switchOffSecurity(true);
|
|
29
|
+
cy.setDefaultUserData();
|
|
30
|
+
});
|
|
31
|
+
});
|
|
32
|
+
|
|
33
|
+
it('should show the consent popup if free access is on and the user is on the login page', () => {
|
|
34
|
+
// Given: Security is enabled and free access is on
|
|
35
|
+
UserAndAccessSteps.visitInProdMode();
|
|
36
|
+
UserAndAccessSteps.toggleSecurity();
|
|
37
|
+
LoginSteps.loginWithUser('admin', 'root');
|
|
38
|
+
// And: Free access is enabled
|
|
39
|
+
UserAndAccessSteps.getFreeAccessSwitchInput().should('not.be.checked');
|
|
40
|
+
UserAndAccessSteps.toggleFreeAccess();
|
|
41
|
+
UserAndAccessSteps.clickFreeWriteAccessRepo(repository);
|
|
42
|
+
ModalDialogSteps.clickOKButton();
|
|
43
|
+
|
|
44
|
+
// When: The user visits the login page
|
|
45
|
+
LoginSteps.visitInProdMode();
|
|
46
|
+
// Then: The cookie policy popup should be shown
|
|
47
|
+
HomeSteps.getCookieConsentPopup().should('exist').and('be.visible');
|
|
48
|
+
});
|
|
49
|
+
|
|
50
|
+
it('should not show the consent popup if free access is off and the user is on the login page', () => {
|
|
51
|
+
// Given: Security is enabled and free access is off
|
|
52
|
+
UserAndAccessSteps.visitInProdMode();
|
|
53
|
+
UserAndAccessSteps.toggleSecurity();
|
|
54
|
+
LoginSteps.loginWithUser('admin', 'root');
|
|
55
|
+
UserAndAccessSteps.getFreeAccessSwitchInput().should('not.be.checked');
|
|
56
|
+
|
|
57
|
+
// When: The user logs out and visits the login page
|
|
58
|
+
LoginSteps.logout();
|
|
59
|
+
// Then: The cookie policy popup should not be shown
|
|
60
|
+
HomeSteps.getCookieConsentPopup().should('not.exist');
|
|
61
|
+
LoginSteps.visitInProdMode();
|
|
62
|
+
HomeSteps.getCookieConsentPopup().should('not.exist');
|
|
63
|
+
});
|
|
64
|
+
});
|
|
@@ -0,0 +1,184 @@
|
|
|
1
|
+
import { MainMenuSteps } from "../../../steps/main-menu-steps";
|
|
2
|
+
import {UserAndAccessSteps} from "../../../steps/setup/user-and-access-steps";
|
|
3
|
+
import { LoginSteps } from "../../../steps/login-steps";
|
|
4
|
+
import {ToasterSteps} from "../../../steps/toaster-steps";
|
|
5
|
+
import {YasqeSteps} from "../../../steps/yasgui/yasqe-steps";
|
|
6
|
+
import {YasrSteps} from "../../../steps/yasgui/yasr-steps";
|
|
7
|
+
|
|
8
|
+
describe('User Management – Creation, Validation, Permissions & Deletion', () => {
|
|
9
|
+
let repositoryId;
|
|
10
|
+
const testPassword = 'P@ssw0rd123!';
|
|
11
|
+
const testUsername = `testuser-${Date.now()}`;
|
|
12
|
+
|
|
13
|
+
beforeEach(() => {
|
|
14
|
+
// Create and initialize a fresh repository for isolation
|
|
15
|
+
repositoryId = `repo-${Date.now()}`;
|
|
16
|
+
cy.createRepository({ id: repositoryId });
|
|
17
|
+
cy.presetRepository(repositoryId);
|
|
18
|
+
cy.initializeRepository(repositoryId);
|
|
19
|
+
|
|
20
|
+
// Navigate to Users & Access
|
|
21
|
+
UserAndAccessSteps.visit();
|
|
22
|
+
});
|
|
23
|
+
|
|
24
|
+
afterEach(() => {
|
|
25
|
+
// Clean up repository
|
|
26
|
+
cy.deleteRepository(repositoryId);
|
|
27
|
+
});
|
|
28
|
+
|
|
29
|
+
describe('Create a new user – validation', () => {
|
|
30
|
+
beforeEach(() => {
|
|
31
|
+
UserAndAccessSteps.clickCreateNewUserButton();
|
|
32
|
+
});
|
|
33
|
+
|
|
34
|
+
it('should show error when username is empty', () => {
|
|
35
|
+
UserAndAccessSteps.typePassword(testPassword);
|
|
36
|
+
UserAndAccessSteps.typeConfirmPasswordField(testPassword);
|
|
37
|
+
UserAndAccessSteps.clickReadAccessRepo(repositoryId);
|
|
38
|
+
UserAndAccessSteps.clickWriteAccessRepo(repositoryId);
|
|
39
|
+
UserAndAccessSteps.confirmUserCreate();
|
|
40
|
+
UserAndAccessSteps.getUserFieldError('username').should('be.visible').and('contain.text', 'Enter username!');
|
|
41
|
+
});
|
|
42
|
+
|
|
43
|
+
it('should show error when passwords are empty', () => {
|
|
44
|
+
UserAndAccessSteps.typeUsername(testUsername);
|
|
45
|
+
UserAndAccessSteps.confirmUserCreate();
|
|
46
|
+
UserAndAccessSteps.getUserFieldError('password').should('be.visible').and('contain.text', 'Enter password!');
|
|
47
|
+
UserAndAccessSteps.getUserFieldError('confirmPassword').should('be.visible').and('contain.text', 'Confirm password!');
|
|
48
|
+
});
|
|
49
|
+
|
|
50
|
+
it('should show error when passwords do not match', () => {
|
|
51
|
+
UserAndAccessSteps.typeUsername(testUsername);
|
|
52
|
+
UserAndAccessSteps.typePassword(testPassword);
|
|
53
|
+
UserAndAccessSteps.typeConfirmPasswordField('Different123!');
|
|
54
|
+
UserAndAccessSteps.clickReadAccessRepo(repositoryId);
|
|
55
|
+
UserAndAccessSteps.clickWriteAccessRepo(repositoryId);
|
|
56
|
+
UserAndAccessSteps.confirmUserCreate();
|
|
57
|
+
UserAndAccessSteps.getUserFieldError('confirmPassword').should('be.visible').and('contain.text', 'Confirm password!');
|
|
58
|
+
});
|
|
59
|
+
|
|
60
|
+
it('should show error when username duplicates existing one', () => {
|
|
61
|
+
UserAndAccessSteps.typeUsername('user');
|
|
62
|
+
UserAndAccessSteps.typePassword(testPassword);
|
|
63
|
+
UserAndAccessSteps.typeConfirmPasswordField(testPassword);
|
|
64
|
+
UserAndAccessSteps.clickReadAccessRepo(repositoryId);
|
|
65
|
+
UserAndAccessSteps.clickWriteAccessRepo(repositoryId);
|
|
66
|
+
UserAndAccessSteps.confirmUserCreate();
|
|
67
|
+
|
|
68
|
+
cy.url().should('include', '/users');
|
|
69
|
+
UserAndAccessSteps.clickCreateNewUserButton();
|
|
70
|
+
UserAndAccessSteps.typeUsername('user');
|
|
71
|
+
UserAndAccessSteps.typePassword(testPassword);
|
|
72
|
+
UserAndAccessSteps.typeConfirmPasswordField(testPassword);
|
|
73
|
+
UserAndAccessSteps.clickWriteAccessRepo(repositoryId);
|
|
74
|
+
UserAndAccessSteps.confirmUserCreate();
|
|
75
|
+
|
|
76
|
+
ToasterSteps.verifyError('An account with the given username already exists.');
|
|
77
|
+
cy.deleteUser('user');
|
|
78
|
+
});
|
|
79
|
+
|
|
80
|
+
it('should show error when no repository read access is given', () => {
|
|
81
|
+
UserAndAccessSteps.typeUsername(testUsername);
|
|
82
|
+
UserAndAccessSteps.typePassword(testPassword);
|
|
83
|
+
UserAndAccessSteps.typeConfirmPasswordField(testPassword);
|
|
84
|
+
UserAndAccessSteps.confirmUserCreate();
|
|
85
|
+
UserAndAccessSteps.getRepositoryRightsError().should('be.visible').and('contain.text', 'Users should have rights to at least one repository!');
|
|
86
|
+
});
|
|
87
|
+
|
|
88
|
+
it('should show error when custom role is too short', () => {
|
|
89
|
+
UserAndAccessSteps.typeUsername(testUsername);
|
|
90
|
+
UserAndAccessSteps.typePassword(testPassword);
|
|
91
|
+
UserAndAccessSteps.typeConfirmPasswordField(testPassword);
|
|
92
|
+
UserAndAccessSteps.addTextToCustomRoleField('a');
|
|
93
|
+
UserAndAccessSteps.clickReadAccessRepo(repositoryId);
|
|
94
|
+
UserAndAccessSteps.clickWriteAccessRepo(repositoryId);
|
|
95
|
+
UserAndAccessSteps.getCustomRoleFieldError().should('be.visible').and('contain.text', 'Must be at least 2 symbols long');
|
|
96
|
+
});
|
|
97
|
+
});
|
|
98
|
+
|
|
99
|
+
describe('Create a new user – read/write access', () => {
|
|
100
|
+
const rwUsername = `rwuser-${Date.now()}`;
|
|
101
|
+
|
|
102
|
+
afterEach(() =>{
|
|
103
|
+
cy.loginAsAdmin();
|
|
104
|
+
cy.switchOffSecurity(true);
|
|
105
|
+
cy.deleteUser(rwUsername);
|
|
106
|
+
})
|
|
107
|
+
|
|
108
|
+
it('should create, login, and verify permissions', () => {
|
|
109
|
+
UserAndAccessSteps.clickCreateNewUserButton();
|
|
110
|
+
UserAndAccessSteps.typeUsername(rwUsername);
|
|
111
|
+
UserAndAccessSteps.typePassword(testPassword);
|
|
112
|
+
UserAndAccessSteps.typeConfirmPasswordField(testPassword);
|
|
113
|
+
UserAndAccessSteps.clickReadAccessRepo(repositoryId);
|
|
114
|
+
UserAndAccessSteps.clickWriteAccessRepo(repositoryId);
|
|
115
|
+
UserAndAccessSteps.getWriteAccessForRepo(repositoryId).should('be.checked');
|
|
116
|
+
UserAndAccessSteps.confirmUserCreate();
|
|
117
|
+
UserAndAccessSteps.toggleSecurity();
|
|
118
|
+
|
|
119
|
+
LoginSteps.loginWithUser(rwUsername, testPassword);
|
|
120
|
+
// RepositorySteps.selectRepoFromDropdown(repositoryId);
|
|
121
|
+
MainMenuSteps.clickOnSparqlMenu();
|
|
122
|
+
|
|
123
|
+
YasqeSteps.clearEditor();
|
|
124
|
+
const prefix = 'PREFIX ex: <http://example.org/>\n';
|
|
125
|
+
const query = 'INSERT DATA {\n' +
|
|
126
|
+
'ex:greeting ex:text "Hello, world!" .\n' +
|
|
127
|
+
'}';
|
|
128
|
+
cy.pasteIntoCodeMirror('.CodeMirror', prefix + query);
|
|
129
|
+
YasqeSteps.executeQueryWithoutWaiteResult();
|
|
130
|
+
// Verify read access
|
|
131
|
+
YasrSteps.getResponseInfo()
|
|
132
|
+
.should('not.have.class', 'hidden')
|
|
133
|
+
.should('not.have.class', 'empty')
|
|
134
|
+
.should('be.visible')
|
|
135
|
+
.should('contain.text', 'Added 1 statements.');
|
|
136
|
+
|
|
137
|
+
LoginSteps.logout();
|
|
138
|
+
});
|
|
139
|
+
});
|
|
140
|
+
|
|
141
|
+
describe('Create a new user – read only access', () => {
|
|
142
|
+
const roUsername = `rouser-${Date.now()}`;
|
|
143
|
+
|
|
144
|
+
afterEach(() =>{
|
|
145
|
+
cy.loginAsAdmin();
|
|
146
|
+
cy.switchOffSecurity(true);
|
|
147
|
+
cy.deleteUser(roUsername);
|
|
148
|
+
})
|
|
149
|
+
|
|
150
|
+
it('should create, login, and verify read-only', () => {
|
|
151
|
+
UserAndAccessSteps.clickCreateNewUserButton();
|
|
152
|
+
UserAndAccessSteps.typeUsername(roUsername);
|
|
153
|
+
UserAndAccessSteps.typePassword(testPassword);
|
|
154
|
+
UserAndAccessSteps.typeConfirmPasswordField(testPassword);
|
|
155
|
+
UserAndAccessSteps.clickReadAccessRepo(repositoryId);
|
|
156
|
+
UserAndAccessSteps.getReadAccessForRepo(repositoryId).should('be.checked');
|
|
157
|
+
UserAndAccessSteps.getWriteAccessForRepo(repositoryId).should('not.be.checked');
|
|
158
|
+
UserAndAccessSteps.confirmUserCreate();
|
|
159
|
+
UserAndAccessSteps.toggleSecurity();
|
|
160
|
+
|
|
161
|
+
LoginSteps.loginWithUser(roUsername, testPassword);
|
|
162
|
+
MainMenuSteps.clickOnSparqlMenu();
|
|
163
|
+
|
|
164
|
+
YasqeSteps.clearEditor();
|
|
165
|
+
const prefix = 'PREFIX ex: <http://example.org/>\n';
|
|
166
|
+
const query = 'INSERT DATA {\n' +
|
|
167
|
+
'ex:greeting ex:text "Hello, world!" .\n' +
|
|
168
|
+
'}';
|
|
169
|
+
cy.pasteIntoCodeMirror('.CodeMirror', prefix + query);
|
|
170
|
+
// Verify no write access
|
|
171
|
+
YasqeSteps.executeErrorQuery();
|
|
172
|
+
|
|
173
|
+
YasqeSteps.clearEditor();
|
|
174
|
+
const readQuery = 'select * where {\n' +
|
|
175
|
+
'?s ?p ?o .\n' +
|
|
176
|
+
'} limit 100';
|
|
177
|
+
cy.pasteIntoCodeMirror('.CodeMirror', readQuery);
|
|
178
|
+
// Verify read accessorQuery();
|
|
179
|
+
YasqeSteps.executeQuery();
|
|
180
|
+
|
|
181
|
+
LoginSteps.logout();
|
|
182
|
+
});
|
|
183
|
+
});
|
|
184
|
+
});
|
|
@@ -0,0 +1,123 @@
|
|
|
1
|
+
import {UserAndAccessSteps} from "../../../steps/setup/user-and-access-steps";
|
|
2
|
+
import {LoginSteps} from "../../../steps/login-steps";
|
|
3
|
+
import {GraphqlPlaygroundSteps} from "../../../steps/graphql/graphql-playground-steps";
|
|
4
|
+
import {RepositorySteps} from "../../../steps/repository-steps";
|
|
5
|
+
|
|
6
|
+
describe('GraphQL-only User – Playground Access & Mutation Restriction', () => {
|
|
7
|
+
let repositoryId;
|
|
8
|
+
const gqlUsername = `gqluser-${Date.now()}`;
|
|
9
|
+
const testPassword = 'P@ssw0rd123!';
|
|
10
|
+
const readQuery = `
|
|
11
|
+
query StarshipById {
|
|
12
|
+
starship(ID: "https://swapi.co/resource/starship/9") {
|
|
13
|
+
name
|
|
14
|
+
}
|
|
15
|
+
}
|
|
16
|
+
`;
|
|
17
|
+
const mutation = `
|
|
18
|
+
mutation CreateHuman {
|
|
19
|
+
create_Human(
|
|
20
|
+
objects: [
|
|
21
|
+
{
|
|
22
|
+
id: "file:/test/onto/vocabulary/Human1",
|
|
23
|
+
rdfs_label: "New human with specific iri id"
|
|
24
|
+
}
|
|
25
|
+
]
|
|
26
|
+
) {
|
|
27
|
+
human { id }
|
|
28
|
+
affected_objects { ids }
|
|
29
|
+
}
|
|
30
|
+
}
|
|
31
|
+
`;
|
|
32
|
+
|
|
33
|
+
beforeEach(() => {
|
|
34
|
+
repositoryId = `repo-${Date.now()}`;
|
|
35
|
+
cy.createRepository({ id: repositoryId });
|
|
36
|
+
cy.presetRepository(repositoryId);
|
|
37
|
+
cy.importServerFile(repositoryId, 'swapi-dataset.ttl');
|
|
38
|
+
cy.uploadGraphqlSchema(repositoryId, 'graphql/soml/swapi-schema.yaml', 'swapi');
|
|
39
|
+
});
|
|
40
|
+
|
|
41
|
+
afterEach(() => {
|
|
42
|
+
cy.loginAsAdmin();
|
|
43
|
+
cy.switchOffSecurity(true);
|
|
44
|
+
cy.deleteUser(gqlUsername);
|
|
45
|
+
cy.deleteRepository(repositoryId);
|
|
46
|
+
});
|
|
47
|
+
|
|
48
|
+
it('should see only the assigned repo, block SPARQL, allow GraphQL read and forbid writes, and hide create-repo everywhere', () => {
|
|
49
|
+
UserAndAccessSteps.visit();
|
|
50
|
+
UserAndAccessSteps.clickCreateNewUserButton();
|
|
51
|
+
UserAndAccessSteps.typeUsername(gqlUsername);
|
|
52
|
+
UserAndAccessSteps.typePassword(testPassword);
|
|
53
|
+
UserAndAccessSteps.typeConfirmPasswordField(testPassword);
|
|
54
|
+
UserAndAccessSteps.clickReadAccessRepo(repositoryId);
|
|
55
|
+
UserAndAccessSteps.clickGraphqlAccessRepo(repositoryId);
|
|
56
|
+
UserAndAccessSteps.confirmUserCreate();
|
|
57
|
+
|
|
58
|
+
UserAndAccessSteps.toggleSecurity();
|
|
59
|
+
|
|
60
|
+
// Log in as GraphQL-only user
|
|
61
|
+
LoginSteps.loginWithUser(gqlUsername, testPassword);
|
|
62
|
+
RepositorySteps.selectRepoFromDropdown(repositoryId);
|
|
63
|
+
// Verify only the assigned repository appears in endpoints
|
|
64
|
+
GraphqlPlaygroundSteps.visit();
|
|
65
|
+
GraphqlPlaygroundSteps.getView().should('be.visible');
|
|
66
|
+
GraphqlPlaygroundSteps.getQueryEditor().should('be.visible');
|
|
67
|
+
GraphqlPlaygroundSteps.getSelectedEndpoint().should('have.text', 'swapi');
|
|
68
|
+
// And I can execute a query on the countries endpoint
|
|
69
|
+
GraphqlPlaygroundSteps.setInEditor(readQuery);
|
|
70
|
+
// And I execute the query
|
|
71
|
+
GraphqlPlaygroundSteps.executeQuery();
|
|
72
|
+
// Then I get expected result
|
|
73
|
+
GraphqlPlaygroundSteps.getResponse().should('contain', '"name": "Death Star"');
|
|
74
|
+
|
|
75
|
+
// Execute the create_Human mutation → expect errors
|
|
76
|
+
GraphqlPlaygroundSteps.setInEditor(mutation);
|
|
77
|
+
GraphqlPlaygroundSteps.executeQuery();
|
|
78
|
+
GraphqlPlaygroundSteps.getResponse().should('contain.text', 'errors');
|
|
79
|
+
LoginSteps.logout();
|
|
80
|
+
});
|
|
81
|
+
|
|
82
|
+
it('should allow GraphQL mutation and hide SPARQL/Import/Create-repo menus', () => {
|
|
83
|
+
UserAndAccessSteps.visit();
|
|
84
|
+
UserAndAccessSteps.clickCreateNewUserButton();
|
|
85
|
+
UserAndAccessSteps.typeUsername(gqlUsername);
|
|
86
|
+
UserAndAccessSteps.typePassword(testPassword);
|
|
87
|
+
UserAndAccessSteps.typeConfirmPasswordField(testPassword);
|
|
88
|
+
UserAndAccessSteps.clickReadAccessRepo(repositoryId);
|
|
89
|
+
UserAndAccessSteps.clickWriteAccessRepo(repositoryId);
|
|
90
|
+
UserAndAccessSteps.clickGraphqlAccessRepo(repositoryId);
|
|
91
|
+
UserAndAccessSteps.confirmUserCreate();
|
|
92
|
+
|
|
93
|
+
UserAndAccessSteps.toggleSecurity();
|
|
94
|
+
|
|
95
|
+
// Log in as the new user
|
|
96
|
+
LoginSteps.loginWithUser(gqlUsername, testPassword);
|
|
97
|
+
|
|
98
|
+
// Select the repo in the navbar
|
|
99
|
+
RepositorySteps.selectRepoFromDropdown(repositoryId);
|
|
100
|
+
|
|
101
|
+
// Visit GraphQL Playground
|
|
102
|
+
GraphqlPlaygroundSteps.visit();
|
|
103
|
+
GraphqlPlaygroundSteps.getView().should('be.visible');
|
|
104
|
+
GraphqlPlaygroundSteps.getQueryEditor().should('be.visible');
|
|
105
|
+
GraphqlPlaygroundSteps.getSelectedEndpoint().should('have.text', 'swapi');
|
|
106
|
+
|
|
107
|
+
// Execute a read query to verify read access
|
|
108
|
+
GraphqlPlaygroundSteps.setInEditor(readQuery);
|
|
109
|
+
GraphqlPlaygroundSteps.executeQuery();
|
|
110
|
+
GraphqlPlaygroundSteps.getResponse()
|
|
111
|
+
.should('contain.text', '"name": "Death Star"');
|
|
112
|
+
|
|
113
|
+
// Execute the mutation and expect success
|
|
114
|
+
GraphqlPlaygroundSteps.setInEditor(mutation);
|
|
115
|
+
GraphqlPlaygroundSteps.executeQuery();
|
|
116
|
+
GraphqlPlaygroundSteps.getResponse()
|
|
117
|
+
.should('contain.text', 'data')
|
|
118
|
+
.and('contain.text', 'create_Human')
|
|
119
|
+
.and('contain.text', 'affected_objects');
|
|
120
|
+
|
|
121
|
+
LoginSteps.logout();
|
|
122
|
+
});
|
|
123
|
+
});
|
|
@@ -0,0 +1,69 @@
|
|
|
1
|
+
import {UserAndAccessSteps} from "../../../steps/setup/user-and-access-steps";
|
|
2
|
+
import {LoginSteps} from "../../../steps/login-steps";
|
|
3
|
+
import {YasqeSteps} from "../../../steps/yasgui/yasqe-steps";
|
|
4
|
+
import {YasrSteps} from "../../../steps/yasgui/yasr-steps";
|
|
5
|
+
import {MainMenuSteps} from "../../../steps/main-menu-steps";
|
|
6
|
+
import HomeSteps from "../../../steps/home-steps";
|
|
7
|
+
import {ActiveRepositoryWidgetSteps} from "../../../steps/widgets/active-repository-widget-steps";
|
|
8
|
+
|
|
9
|
+
describe('Repository Admin – Permissions and Access Control', () => {
|
|
10
|
+
const repoAdminUsername = `repoadmin-${Date.now()}`;
|
|
11
|
+
const password = 'Admin123!';
|
|
12
|
+
let repositoryId;
|
|
13
|
+
|
|
14
|
+
beforeEach(() => {
|
|
15
|
+
repositoryId = `repo-${Date.now()}`;
|
|
16
|
+
cy.createRepository({ id: repositoryId });
|
|
17
|
+
cy.presetRepository(repositoryId);
|
|
18
|
+
cy.initializeRepository(repositoryId);
|
|
19
|
+
|
|
20
|
+
UserAndAccessSteps.visit();
|
|
21
|
+
UserAndAccessSteps.clickCreateNewUserButton();
|
|
22
|
+
UserAndAccessSteps.typeUsername(repoAdminUsername);
|
|
23
|
+
UserAndAccessSteps.typePassword(password);
|
|
24
|
+
UserAndAccessSteps.typeConfirmPasswordField(password);
|
|
25
|
+
UserAndAccessSteps.selectRoleRadioButton('#roleRepoAdmin');
|
|
26
|
+
|
|
27
|
+
UserAndAccessSteps.getReadAccessForRepo('*').should('be.checked').and('be.disabled');
|
|
28
|
+
UserAndAccessSteps.getWriteAccessForRepo('*').should('be.checked').and('be.disabled');
|
|
29
|
+
|
|
30
|
+
UserAndAccessSteps.confirmUserCreate();
|
|
31
|
+
UserAndAccessSteps.toggleSecurity();
|
|
32
|
+
});
|
|
33
|
+
|
|
34
|
+
afterEach(() => {
|
|
35
|
+
cy.loginAsAdmin();
|
|
36
|
+
cy.switchOffSecurity(true);
|
|
37
|
+
cy.deleteUser(repoAdminUsername);
|
|
38
|
+
cy.deleteRepository(repositoryId);
|
|
39
|
+
});
|
|
40
|
+
|
|
41
|
+
it('Repository admin has correct access and restrictions', () => {
|
|
42
|
+
LoginSteps.loginWithUser(repoAdminUsername, password);
|
|
43
|
+
|
|
44
|
+
// SPARQL – read access
|
|
45
|
+
MainMenuSteps.clickOnSparqlMenu();
|
|
46
|
+
|
|
47
|
+
YasqeSteps.getEditor().should('be.visible');
|
|
48
|
+
YasqeSteps.executeQuery();
|
|
49
|
+
|
|
50
|
+
// SPARQL – write access
|
|
51
|
+
YasqeSteps.clearEditor();
|
|
52
|
+
const prefix = 'PREFIX ex: <http://example.org/>\n';
|
|
53
|
+
const query = 'INSERT DATA {\n' +
|
|
54
|
+
'ex:greeting ex:text "Hello, world!" .\n' +
|
|
55
|
+
'}';
|
|
56
|
+
cy.pasteIntoCodeMirror('.CodeMirror', prefix + query);
|
|
57
|
+
YasqeSteps.executeQueryWithoutWaiteResult();
|
|
58
|
+
// Verify read access
|
|
59
|
+
YasrSteps.getResponseInfo()
|
|
60
|
+
.should('not.have.class', 'hidden')
|
|
61
|
+
.should('not.have.class', 'empty')
|
|
62
|
+
.should('be.visible')
|
|
63
|
+
.should('contain.text', 'Added 1 statements.');
|
|
64
|
+
|
|
65
|
+
// Create repo button on homepage should be visible
|
|
66
|
+
HomeSteps.visit();
|
|
67
|
+
ActiveRepositoryWidgetSteps.getImportLink().scrollIntoView().should('be.visible').and('not.be.disabled');
|
|
68
|
+
});
|
|
69
|
+
});
|
|
@@ -0,0 +1,87 @@
|
|
|
1
|
+
import {MainMenuSteps} from "../../../steps/main-menu-steps";
|
|
2
|
+
import {UserAndAccessSteps} from "../../../steps/setup/user-and-access-steps";
|
|
3
|
+
import {LoginSteps} from "../../../steps/login-steps";
|
|
4
|
+
import {ToasterSteps} from "../../../steps/toaster-steps";
|
|
5
|
+
|
|
6
|
+
describe('Turn on Security', () => {
|
|
7
|
+
|
|
8
|
+
beforeEach(() => {
|
|
9
|
+
cy.loginAsAdmin();
|
|
10
|
+
cy.switchOnSecurity();
|
|
11
|
+
});
|
|
12
|
+
|
|
13
|
+
afterEach(() =>{
|
|
14
|
+
cy.loginAsAdmin();
|
|
15
|
+
cy.switchOffSecurity(true);
|
|
16
|
+
})
|
|
17
|
+
|
|
18
|
+
it('should enable security and show login screen with only Help accessible', () => {
|
|
19
|
+
// Navigate to Users & Access
|
|
20
|
+
UserAndAccessSteps.visit();
|
|
21
|
+
// Verify we are redirected to login page
|
|
22
|
+
cy.url().should('include', '/login');
|
|
23
|
+
MainMenuSteps.getMenuHelp().should('not.exist');
|
|
24
|
+
MainMenuSteps.getMenuExplore().should('not.exist');
|
|
25
|
+
MainMenuSteps.getMenuMonitoring().should('not.exist');
|
|
26
|
+
MainMenuSteps.getMenuSetup().should('not.exist');
|
|
27
|
+
});
|
|
28
|
+
|
|
29
|
+
it('should reject wrong credentials and accept admin/root', () => {
|
|
30
|
+
// Attempt login with invalid credentials
|
|
31
|
+
LoginSteps.visitLoginPage();
|
|
32
|
+
LoginSteps.loginWithUser('wrongUser', 'wrongPass');
|
|
33
|
+
// Expect error message
|
|
34
|
+
ToasterSteps.verifyError('Wrong credentials');
|
|
35
|
+
|
|
36
|
+
// Login with correct admin credentials
|
|
37
|
+
LoginSteps.visitLoginPage();
|
|
38
|
+
LoginSteps.loginWithUser('admin', 'root');
|
|
39
|
+
cy.url().should('include', '/');
|
|
40
|
+
});
|
|
41
|
+
|
|
42
|
+
it('should change admin password and enforce new credentials', () => {
|
|
43
|
+
// Navigate to Users & Access after login
|
|
44
|
+
UserAndAccessSteps.visit();
|
|
45
|
+
// Verify we are redirected to login page
|
|
46
|
+
cy.url().should('include', '/login');
|
|
47
|
+
LoginSteps.loginWithUser('admin', 'root');
|
|
48
|
+
|
|
49
|
+
// Open edit page for admin user
|
|
50
|
+
UserAndAccessSteps.openEditUserPage('admin');
|
|
51
|
+
|
|
52
|
+
// Change password to a new value
|
|
53
|
+
let newPassword = 'MyNewP@ssw0rd!';
|
|
54
|
+
UserAndAccessSteps.typePassword(newPassword);
|
|
55
|
+
UserAndAccessSteps.typeConfirmPasswordField(newPassword);
|
|
56
|
+
UserAndAccessSteps.confirmUserEdit();
|
|
57
|
+
|
|
58
|
+
// Log out
|
|
59
|
+
LoginSteps.logout();
|
|
60
|
+
cy.url().should('include', '/login');
|
|
61
|
+
|
|
62
|
+
// Attempt login with old password
|
|
63
|
+
LoginSteps.loginWithUser('admin', 'root');
|
|
64
|
+
ToasterSteps.verifyError('Wrong credentials');
|
|
65
|
+
|
|
66
|
+
// Attempt login with new password
|
|
67
|
+
LoginSteps.visitLoginPage();
|
|
68
|
+
LoginSteps.loginWithUser('admin', newPassword);
|
|
69
|
+
UserAndAccessSteps.visit();
|
|
70
|
+
// Open edit page for admin user
|
|
71
|
+
UserAndAccessSteps.openEditUserPage('admin');
|
|
72
|
+
newPassword = 'root';
|
|
73
|
+
UserAndAccessSteps.typePassword(newPassword);
|
|
74
|
+
UserAndAccessSteps.typeConfirmPasswordField(newPassword);
|
|
75
|
+
UserAndAccessSteps.confirmUserEdit();
|
|
76
|
+
});
|
|
77
|
+
|
|
78
|
+
it('should show toaster when after logging out', () => {
|
|
79
|
+
UserAndAccessSteps.visit();
|
|
80
|
+
LoginSteps.loginWithUser('admin', 'root');
|
|
81
|
+
// Log out
|
|
82
|
+
LoginSteps.logout();
|
|
83
|
+
cy.url().should('include', '/login');
|
|
84
|
+
// Verify toaster message
|
|
85
|
+
ToasterSteps.verifySuccess('Signed out');
|
|
86
|
+
})
|
|
87
|
+
});
|