prettier run

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
This commit is contained in:
Jens Langhammer 2023-09-28 23:45:57 +02:00
parent a340c086d0
commit f98c4f65db
No known key found for this signature in database
8 changed files with 24 additions and 27 deletions

View file

@ -1,16 +1,16 @@
version: 1
entries:
- attrs:
email: test-admin@goauthentik.io
is_active: true
name: authentik Default Admin
password: test-runner
path: users
type: internal
groups:
- !Find [authentik_core.group, [name, "authentik Admins"]]
conditions: []
identifiers:
username: akadmin
model: authentik_core.user
state: present
- attrs:
email: test-admin@goauthentik.io
is_active: true
name: authentik Default Admin
password: test-runner
path: users
type: internal
groups:
- !Find [authentik_core.group, [name, "authentik Admins"]]
conditions: []
identifiers:
username: akadmin
model: authentik_core.user
state: present

View file

@ -1,5 +1,5 @@
import { browser } from "@wdio/globals";
import Page from "../pageobjects/page.js";
import { browser } from "@wdio/globals";
const CLICK_TIME_DELAY = 250;

View file

@ -16,7 +16,6 @@ class ApplicationsListPage extends AdminPage {
async open() {
return await super.open("if/admin/#/core/applications");
}
}
export default new ApplicationsListPage();

View file

@ -1,15 +1,15 @@
import LoginPage from "../pageobjects/login.page.js";
import { BAD_PASSWORD, BAD_USERNAME, GOOD_USERNAME } from "../utils/constants.js";
import { expect } from "@wdio/globals";
describe("Log into Authentik", () => {
describe("Log into authentik", () => {
it("should fail on a bad username", async () => {
await LoginPage.open();
await LoginPage.username(BAD_USERNAME);
const failure = await LoginPage.authFailure;
expect(failure).toHaveText("Failed to authenticate.");
});
});
it("should fail on a bad password", async () => {
await LoginPage.open();
await LoginPage.username(GOOD_USERNAME);
@ -17,5 +17,5 @@ describe("Log into Authentik", () => {
await LoginPage.password(BAD_PASSWORD);
const failure = await LoginPage.authFailure;
expect(failure).toHaveText("Failed to authenticate.");
});
});
});

View file

@ -1,5 +1,5 @@
import { login } from "../utils/login.js";
describe("Log into Authentik", () => {
describe("Log into authentik", () => {
it("should login with valid credentials and reach the UserLibrary", login);
});

View file

@ -2,6 +2,4 @@ export const BAD_USERNAME = process.env.AK_BAD_USERNAME ?? "bad-username@bad-log
export const GOOD_USERNAME = process.env.AK_GOOD_USERNAME ?? "test-admin@goauthentik.io";
export const BAD_PASSWORD = process.env.AK_BAD_PASSWORD ?? "-this-is-a-bad-password-";
export const GOOD_PASSWORD = process.env.AK_GOOD_PASSWORD ?? "test-runner"
export const GOOD_PASSWORD = process.env.AK_GOOD_PASSWORD ?? "test-runner";

View file

@ -1,7 +1,7 @@
import LoginPage from "../pageobjects/login.page.js";
import UserLibraryPage from "../pageobjects/user-library.page.js";
import { expect } from "@wdio/globals";
import { GOOD_PASSWORD, GOOD_USERNAME } from "./constants.js";
import { expect } from "@wdio/globals";
export const login = async () => {
await LoginPage.open();

View file

@ -73,7 +73,7 @@ export const config: Options.Testrunner = {
"--disable-dev-shm-usage",
]
: [];
})()
})(),
),
},
},