-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE] Run same tests for security enabled or disabled cluster #478
Comments
I thought about this and i think it is alright to have different test for security enabled versus not security enabled. Depending on the test case and what we want to test. Security enabled test need to focus on the special setup brought up by the security such as roles/permission. With Security enabled, what are we uniquely testing if it is the same test that run without security enabled? Wouldnt we duplicate the work? |
I agree with your sentiment, but thinking about this again, overall I think having more tests is always good, especially as we add support for more plugins in the future. Running all of our integration tests with security enabled should at the very least help us catch issues early on that would otherwise only be caught during full distribution builds. |
+1 to @joshpalis and the main reason to open this issue in the first place was to find the failure early be it with security enabled/disabled cluster before the distribution build during the release. For the same reason, all the tests need to be run in both type of cluster. |
this is a nice to have and I dont think this is a blocker for 2.13. |
Is your feature request related to a problem?
Currently, we run different test suites for security enabled tests here, which is mostly checking for the roles and not actually testing the APIs with the response. Whereas our integ tests does that.
What solution would you like?
We should run the same integ tests suite for the plugin with security-enabled or disabled cluster with just changing the local cluster url to pick either
https
orhttp
protocol based on the flagsecurity-enabled=true
orsecurity-enabled=false
.What alternatives have you considered?
The current test suite which just checks for the role based access for security enabled cluster.
Do you have any additional context?
The text was updated successfully, but these errors were encountered: