-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make tlsAuth
configureable during runtime
#2186
Comments
tlsAuth
configureable during runtime
Thanks for opening this issue, it's a very valid use case that we unfortunately don't currently support... 😞 As you've found out, the script |
It's really important to us. This function is similar to "JMeter Keystore Configuration". =) |
This is also a key feature for us. The API we are testing uses client certs auth, and having each VU represent a unique client identity is critical to simulating meaningful load. |
We won't be changing this in the current HTTP API, but this will be possible in the new API (initial design document). We're still ironing out the design and syntax, so you can follow the issue and document for details. I'll close this issue in the meantime, as we want to keep a clean roadmap. |
Feature Description
We are trying to test a user registration flow protected with client certificates. The process from a high level is:
Because of this we need to update the global options, containing the
tlsAuth
, to use the personalized client certificate and the matching key. Updating the options during the runtime however doesn't change the behaviour of further requests, due to still using the default, shared certificate. Is there any way to force the VU to reinitiate the http client used to perform the connections and thus to use the latest options/certificates?This seems to generally be the case for all/multiple fields in the options, since e.g. changing the log behaviour via the
httpDebug
field doesn't apply either:In #1045 (comment) one of the suggested solutions is to make the used client configurable via js, this would also solve the issue of using multiple client certificates.
The text was updated successfully, but these errors were encountered: