You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The goal of this working group is to rewrite Quarkus's test classloading, so that tests are run in the same classloader as the application under tests, and Quarkus extensions can do "Quarkus-y" manipulations of test classes.
7
+
readme: |
8
+
<p>At the moment, Quarkus tests are invoked using one classloader, and then executed in a different classloader. This mostly works well, but means some use cases don't work: extensions cannot manipulate test classes in the same way that they do normal application classes. For example, anything run via a JUnit @TestTemplate test case will see the un-transformed class.</p>
9
+
<p>It also means we have extra user-facing complexity, such as the QuarkusTest*Callbacks](https://quarkus.io/guides/getting-started-testing#enrichment-via-quarkustestcallback):</p>
10
+
<blockquote>
11
+
<p>While it is possible to use JUnit Jupiter callback interfaces like BeforeEachCallback, you might run into classloading issues because Quarkus has to run tests in a custom classloader which JUnit is not aware of.</p>
12
+
</blockquote>
13
+
<p>A final benefit is a reduction in the internal complexity of our code. Hopping between classloaders during test execution takes a lot of work, and adds a lot of code! It also is brittle in places. For example, because the hop between classloaders relies on serialization in some cases, it's becoming harder to do as the JVM tightens up security restrictions. We used to rely on xstream, but that stopped working in Java 17. In https://github.com/quarkusio/quarkus/pull/40601, @dmlloyd moved us to use the JBoss Serializer, which works better, but might still be affected by future restrictions on class access.</p>
14
+
<p>The goal of this working group is to allow test classes to fully participate in the 'quarkification' of classes. The mechanism for this is probably just to load the test classes with the classloader we intend to run them with, so that JUnit sees the 'correct' version of the class.</p>
15
+
<ul>
16
+
<li>Point of contact: @holly-cummins (@<strong>Holly Cummins</strong> on Zulip)</li>
In the last month, the WG - Test classloading achieved important milestones by successfully closing two issues related to test execution. They resolved problems with continuous testing failing in multi-module projects and addressed failures of QuarkusTests with nested classes in the IDEA IDE. However, a new issue was opened regarding the QuarkusTestProfileAwareClassOrderer, which no longer adheres to its expected contract, indicating ongoing challenges in refining the test classloading process.
27
+
28
+
(This status update was automatically generated using AI.)
29
+
point-of-contact: "@holly-cummins (@<strong>Holly Cummins</strong> on Zulip)"
The goal of this working group is to rewrite Quarkus's test classloading, so that tests are run in the same classloader as the application under tests, and Quarkus extensions can do "Quarkus-y" manipulations of test classes.
357
-
readme: |
358
-
<p>At the moment, Quarkus tests are invoked using one classloader, and then executed in a different classloader. This mostly works well, but means some use cases don't work: extensions cannot manipulate test classes in the same way that they do normal application classes. For example, anything run via a JUnit @TestTemplate test case will see the un-transformed class.</p>
359
-
<p>It also means we have extra user-facing complexity, such as the QuarkusTest*Callbacks](https://quarkus.io/guides/getting-started-testing#enrichment-via-quarkustestcallback):</p>
360
-
<blockquote>
361
-
<p>While it is possible to use JUnit Jupiter callback interfaces like BeforeEachCallback, you might run into classloading issues because Quarkus has to run tests in a custom classloader which JUnit is not aware of.</p>
362
-
</blockquote>
363
-
<p>A final benefit is a reduction in the internal complexity of our code. Hopping between classloaders during test execution takes a lot of work, and adds a lot of code! It also is brittle in places. For example, because the hop between classloaders relies on serialization in some cases, it's becoming harder to do as the JVM tightens up security restrictions. We used to rely on xstream, but that stopped working in Java 17. In https://github.com/quarkusio/quarkus/pull/40601, @dmlloyd moved us to use the JBoss Serializer, which works better, but might still be affected by future restrictions on class access.</p>
364
-
<p>The goal of this working group is to allow test classes to fully participate in the 'quarkification' of classes. The mechanism for this is probably just to load the test classes with the classloader we intend to run them with, so that JUnit sees the 'correct' version of the class.</p>
365
-
<ul>
366
-
<li>Point of contact: @holly-cummins (@<strong>Holly Cummins</strong> on Zulip)</li>
In the last month, the WG - Test classloading achieved important milestones by successfully closing two issues related to test execution. They resolved problems with continuous testing failing in multi-module projects and addressed failures of QuarkusTests with nested classes in the IDEA IDE. However, a new issue was opened regarding the QuarkusTestProfileAwareClassOrderer, which no longer adheres to its expected contract, indicating ongoing challenges in refining the test classloading process.
377
-
378
-
(This status update was automatically generated using AI.)
379
-
point-of-contact: "@holly-cummins (@<strong>Holly Cummins</strong> on Zulip)"
a|tooltip:query[Authorization response parameters are encoded in the query string added to the `redirect_uri`], tooltip:form-post[Authorization response parameters are encoded as HTML form values that are auto-submitted in the browser and transmitted by the HTTP POST method using the application/x-www-form-urlencoded content type]
71176
71218
|tooltip:query[Authorization response parameters are encoded in the query string added to the `redirect_uri`]
Set of cache-control directives that must be set when a new session cookie is created, either after a successful authorization code completion or token refresh.
71234
+
71235
+
Currently, only a `no-store` directive that prohibits caching the session cookie anywhere in the client request chain can be configured.
0 commit comments