-
Notifications
You must be signed in to change notification settings - Fork 180
Refactor FederatedCredentials e2e test to use stable repository with config-based disabling #2104
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
8dfba0e
5d230ac
0cccc74
817d4a8
3caaa49
2309402
5664fcb
094ce51
1a02db0
626a791
6b92fde
ab19c26
44d1b6c
e1e4509
755542e
abe45b6
0c3ffe4
b82ea64
3dc0c90
1694b3a
28516a8
348e87f
204f17b
b8d28e8
c1c8df4
bf74eae
aecb2c2
054ed9f
51f0c57
0aeecb3
fc1714d
b8a2625
13bcc5e
4c8d486
9c9aa2a
ffa19c2
b50cb74
e8e5178
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,6 @@ | ||
| [ | ||
| { | ||
| "scenario": "FederatedCredentials", | ||
|
Collaborator
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I'm not sure I understand. You're disabling the scenario and also editing it? 🤔
Collaborator
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Yes. The initial approach was to alter the scenario to use a concrete repository (due to the FIC changes), but that is only half of the solution. |
||
| "reason": "Azure resource migration work in progress" | ||
| } | ||
| ] | ||
Uh oh!
There was an error while loading. Please reload this page.