You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Format: {_Admin_ or _Storefront_}{Action Group Summary}ActionGroup.xml`, where Action Group Summary describes with a few words what we can expect from it.
109
+
Format: {_Admin_ or _Storefront_}{Action Group Summary}ActionGroup.xml`, where Action Group Summary is a short description of what the action group does.
This command cleans up the previously generated tests; generates and runs the `LoginAsAdminTest` and `LoginAsCustomerTest` tests.
65
+
This command cleans up the previously generated tests; generates and runs the `AdminLoginSuccessfulTest` and `StorefrontPersistedCustomerLoginTest` tests.
66
66
67
67
### Generate and run particular test in a specific suite's context
Depending on the environment you use, you may need to configure the MFTF more precisely by setting more configuration parameters then for basic configuration.
67
+
Depending on the environment you use, you may need to configure MFTF more precisely by setting additional configuration parameters.
68
68
This section describes available configuration parameters and their default values (where applicable).
Copy file name to clipboardExpand all lines: docs/credentials.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,20 +3,20 @@
3
3
When you test functionality that involves external services such as UPS, FedEx, PayPal, or SignifyD,
4
4
use the MFTF credentials feature to hide sensitive [data][] like integration tokens and API keys.
5
5
6
-
Currently the MFTF supports three types of credential storage:
6
+
Currently MFTF supports three types of credential storage:
7
7
8
8
-**.credentials file**
9
9
-**HashiCorp Vault**
10
10
-**AWS Secrets Manager**
11
11
12
12
## Configure File Storage
13
13
14
-
The MFTF creates a sample file for credentials during [initial setup][]: `magento2/dev/tests/acceptance/.credentials.example`.
14
+
MFTF creates a sample file for credentials during [initial setup][]: `magento2/dev/tests/acceptance/.credentials.example`.
15
15
The file contains an example list of keys for fields that can require credentials.
16
16
17
17
### Create `.credentials`
18
18
19
-
To make the MFTF process the file with credentials, in the command line, navigate to `magento2/dev/tests/acceptance/` and rename `.credentials.example` to `.credentials`.
19
+
To make MFTF process the file with credentials, in the command line, navigate to `magento2/dev/tests/acceptance/` and rename `.credentials.example` to `.credentials`.
Hashicorp vault secures, stores, and tightly controls access to data in modern computing.
79
79
It provides advanced data protection for your testing credentials.
80
80
81
-
The MFTF works with both `vault enterprise` and `vault open source` that use `KV Version 2` secret engine.
81
+
MFTF works with both `vault enterprise` and `vault open source` that use `KV Version 2` secret engine.
82
82
83
83
### Install vault CLI
84
84
@@ -92,11 +92,11 @@ Authenticate to vault server via the vault CLI tool: [Login Vault][Login Vault].
92
92
vault login -method -path
93
93
```
94
94
95
-
**Do not** use `-no-store` command option, as the MFTF will rely on the persisted token in the token helper (usually the local filesystem) for future API requests.
95
+
**Do not** use `-no-store` command option, as MFTF will rely on the persisted token in the token helper (usually the local filesystem) for future API requests.
96
96
97
97
### Store secrets in vault
98
98
99
-
The MFTF uses the `KV Version 2` secret engine for secret storage.
99
+
MFTF uses the `KV Version 2` secret engine for secret storage.
100
100
More information for working with `KV Version 2` can be found in [Vault KV2][Vault KV2].
0 commit comments