-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[#469] fix encryption ITs for changed MDA model #476
Conversation
Part of the encryption IT scenarios were checking that the right number of fields were retrieved by the `get_field_list` method. I'm not sure that this makes sense as an encryption test. Either the encryption method (which uses `get_field_list`) encrypts fields correctly, or it doesn't. I don't see a ton of value in testing that method specifically over the actual encryption tests which indirectly test `get_field_list`. This changeset also splits off the vault scenarios into a separate feature, as those are the only real "IT" scenarios. We can't just tag the scenarios directly because the feature-level tag is used to determine whether we should stand up the Vault image, and we can't base this logic at the scenario level because that would tear down and deploy Vault between each scenario, which is wasteful since we aren't changing the state of Vault between scenarios.
Feature: Data encryption | ||
# Generated sample BDD specification/feature file - PLEASE ***DO*** MODIFY. | ||
# Originally generated from templates/behave.feature.vm. | ||
|
||
Scenario: Get fields from native inbound collection with inbound record type (set([CustomData])) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I: Removed scenarios that I felt were redundant and overly fine-grained/brittle. If there is a strong feeling that these are useful we can discuss keeping them and just fixing the assertion to account for the model changes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code changes look good but I cant comment on if the tests are redundant or not. Your reasoning is sound.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it makes sense to pull the get fields test out of encryption 👍
Part of the encryption IT scenarios were checking that the right number of fields were retrieved by the
get_field_list
method. I'm not sure that this makes sense as an encryption test. Either the encryption method (which usesget_field_list
) encrypts fields correctly, or it doesn't. I don't see a ton of value in testing that method specifically over the actual encryption tests which indirectly testget_field_list
.This changeset also splits off the vault scenarios into a separate feature, as those are the only real "IT" scenarios. We can't just tag the scenarios directly because the feature-level tag is used to determine whether we should stand up the Vault image, and we can't base this logic at the scenario level because that would tear down and deploy Vault between each scenario, which is wasteful since we aren't changing the state of Vault between scenarios.