-
Notifications
You must be signed in to change notification settings - Fork 18
Add support for running CI with security #263
Add support for running CI with security #263
Conversation
Looks like we are using And also, add 1 more case if possible: if with security, run test without auth, it should get expected error. |
So like I mentioned it will still work if security is disabled, basically just passes unnecessary auth in request, but doesn't cause any failures and the security disabled server will just ignore it. I was thinking of adding a flag to call either I could look into overriding the Adding a test case that tests for no-auth on a security enabled server would only be possible if we had a dynamically set env variable like you mention. I've tested this case locally, if I remember right it just times out. |
@yizheliu-amazon looks like passing in env variables and overriding |
I would prefer not overriding Meanwhile, we can have 2 yarn target, one is 'cy:run', the other is 'cy:run-with-security', and for that security target, we add We can let infra team use |
Please see last 2 commits, which mimics the exact behavior of I definitely agree about adding a yarn script, will add. |
It looks good to me. Thanks for the change. |
Issue #, if available:
Description of changes:
This PR adds a workflow job to run all integration tests with security enabled.
Specific changes:
visit()
commands to customvisitWithAuth()
commands to pass a username/password in request. This allows tests to run on a security-enabled domain, and will still work for non-security-enabled domains.Latest run: https://github.com/ohltyler/anomaly-detection-kibana-plugin/actions/runs/187512306
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.