Skip to content

Commit e5604b8

Browse files
committed
updates for e2e
1 parent e31b3b7 commit e5604b8

File tree

2 files changed

+7
-6
lines changed

2 files changed

+7
-6
lines changed

tests/e2e/tests/web/critical-path/database/clone-databases.e2e.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ test
120120
await t
121121
.click(myRedisDatabasePage.AddRedisDatabase.cloneSentinelNavigation)
122122
.expect(myRedisDatabasePage.AddRedisDatabase.portInput.getAttribute('value')).eql(ossSentinelConfig.sentinelPort, 'Invalid sentinel port')
123-
.expect(myRedisDatabasePage.AddRedisDatabase.passwordInput.getAttribute('value')).eql(ossSentinelConfig.sentinelPassword, 'Invalid sentinel password');
123+
.expect(myRedisDatabasePage.AddRedisDatabase.passwordInput.getAttribute('value')).eql('************', 'Invalid sentinel password');
124124
// Clone Sentinel Primary Group
125125
await t.click(myRedisDatabasePage.AddRedisDatabase.addRedisDatabaseButton);
126126
await t.expect(myRedisDatabasePage.dbNameList.withExactText(ossSentinelConfig.masters[1].alias).count).gt(1, 'Primary Group was not cloned');

tests/e2e/tests/web/critical-path/database/import-databases.e2e.ts

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -152,8 +152,8 @@ test('Connection import from JSON', async t => {
152152
// Verify username imported
153153
await t.expect(myRedisDatabasePage.AddRedisDatabase.usernameInput.value).eql(rdmListOfDB[1].username, 'Username import incorrect');
154154
// Verify password imported
155-
await t.click(myRedisDatabasePage.AddRedisDatabase.showPasswordBtn);
156-
await t.expect(myRedisDatabasePage.AddRedisDatabase.passwordInput.value).eql(rdmListOfDB[1].auth, 'Password import incorrect');
155+
// Verify that user can see 12 hidden characters regardless of the actual database password when it is set
156+
await t.expect(myRedisDatabasePage.AddRedisDatabase.passwordInput.value).eql('************', 'Password import incorrect');
157157

158158
// Verify cluster connection type imported
159159
await databaseHelper.clickOnEditDatabaseByName(rdmData.dbImportedNames[2]);
@@ -256,11 +256,12 @@ test('Import SSH parameters', async t => {
256256
await t.expect(myRedisDatabasePage.AddRedisDatabase.sshHostInput.value).eql(racompListOfSSHDB[0].sshHost, 'SSH host import incorrect');
257257
await t.expect(myRedisDatabasePage.AddRedisDatabase.sshPortInput.value).eql((racompListOfSSHDB[0].sshPort).toString(), 'SSH port import incorrect');
258258
await t.expect(myRedisDatabasePage.AddRedisDatabase.sshUsernameInput.value).eql(racompListOfSSHDB[0].sshUser, 'SSH username import incorrect');
259-
await t.expect(myRedisDatabasePage.AddRedisDatabase.sshPasswordInput.value).eql(racompListOfSSHDB[0].sshPassword, 'SSH password import incorrect');
259+
// Verify that password, passphrase and private key are hidden for SSH option
260+
await t.expect(myRedisDatabasePage.AddRedisDatabase.sshPasswordInput.value).eql('************', 'SSH password import incorrect');
260261

261262
await databaseHelper.clickOnEditDatabaseByName(racompListOfSSHDB[1].name);
262263
// Verify that user can import the SSH Private Key both by its value specified in the file and by the file path
263-
await t.expect(myRedisDatabasePage.AddRedisDatabase.sshPrivateKeyInput.textContent).contains(sshPrivateKey, 'SSH Private key import incorrect');
264+
await t.expect(myRedisDatabasePage.AddRedisDatabase.sshPrivateKeyInput.textContent).contains('************', 'SSH Private key import incorrect');
264265
// Verify that user can import the SSH parameters with Passcode
265-
await t.expect(myRedisDatabasePage.AddRedisDatabase.sshPassphraseInput.value).eql(racompListOfSSHDB[1].sshKeyPassphrase, 'SSH Passphrase import incorrect');
266+
await t.expect(myRedisDatabasePage.AddRedisDatabase.sshPassphraseInput.value).eql('************', 'SSH Passphrase import incorrect');
266267
});

0 commit comments

Comments
 (0)