Постоянный логин в автотестах? Решаем с Playwright и экономим время

Привет, тестировщики и кодеры! Представь: пишешь автотесты для UX, всё красиво, запускаешь — и каждый тест начинает с нуля: логин, пароль, кнопка. Как будто у тестов амнезия! Это бесит, тормозит и превращает код в копипасту. Давай разберёмся, как выкинуть повторный логин на свалку и ускорить всё с Playwright и Python. Читать

https://habr.com/ru/articles/918546/

#playwright_python #playwright #python #автотесты #conftest #фикстуры #fixtures #fixture #ux #autotest

Постоянный логин в автотестах? Решаем с Playwright и экономим время

Когда тесты — это не про тестирование, а про ожидание Привет, тестировщики и кодеры! Представь: пишешь автотесты для UX, всё красиво, запускаешь — и каждый тест начинает с нуля: логин, пароль, кнопка....

Хабр
at least I have some #conftest stuff working for kubernetes yamls, json manifests and the like and Ingy was so nice to put up a quick #yamlscript example up for tests so I wanted today fill in some API tests. I wish there would be something like pgtap (#postgres) for clickhouse.
alright after I already made the plunge to #rego to test my infra with #conftest I'll give #yamlscript (I still can't believe it.. 😂) a try because I have really a lot of #yaml (which I don't mind actually!) but throwing around some kubernetes cluster with yamlscript DOES sound tempting...
Anyone using #regula and their #rego policies with #conftest and custom policies for #terraform plans? Trying to extend the set of rules from regula with rego policies I write but for some reason I can’t get the expected test results. It’s like I’m not referencing the input document correctly and therefore it’s not finding any resources to run my policy checks against. It definitely doesn’t seem to work the way I’m used to with conftest and my own policies.
@mrueg just use #conftest as you would :) Or plain old #OPA. You can use my kube-review tool to create admission review objects from resource manifests https://github.com/anderseknert/kube-review
GitHub - anderseknert/kube-review: Create Kubernetes AdmissionReview requests from Kubernetes resource manifests

Create Kubernetes AdmissionReview requests from Kubernetes resource manifests - GitHub - anderseknert/kube-review: Create Kubernetes AdmissionReview requests from Kubernetes resource manifests

GitHub

Good introductory article on using #Conftest to enforce #PolicyAsCode decisions against Ansible Playbooks.

#OPA #OpenPolicyAgent #Rego

https://www.redhat.com/sysadmin/conftest-policy-as-code-ansible

Test Ansible using policy as code with Conftest

Conftest evaluates Open Policy Agent (OPA) policies against structured configuration files. Learn how to apply it to your Ansible Playbooks.

Enable Sysadmin

Today's lunch talk got to be "#OpenPolicyAgent Can Do THAT?! The Many Use Cases of OPA" by @jpreese of @yubico, from the #cloudnative @Rejekts conference.

This is an excellent intro to #OPA and #Conftest, really highlighting the versatility of the tools. If you have 22 minutes to spare, this is a great way to spend them!

https://www.youtube.com/watch?v=phvSK4pW1K8

Open Policy Agent Can Do THAT?! The Many Use Cases of OPA

YouTube

New #conftest release pushed yesterday, bumping OPA to v0.47.2, a new helper function for testing "combined" config files, and support for data-only bundles 🚀

https://github.com/open-policy-agent/conftest/releases/tag/v0.37.0

Release v0.37.0 · open-policy-agent/conftest

Changelog 03626f5 Added helper method to load combined config files for Rego unit tests (#762) 3d77256 Allow data-only bundles (#754) 70bee0f Bump OPA to 0.47.2 (#759) 6675693 build(deps): bump al...

GitHub