Skip to content

Test And Quality Assurance For Janssen Project#

The Janssen Project is a large, complex project with tons of inter-dependency. If we aren't test-driven, anarchy will ensue.

Every line of code at Janssen Project goes through various tests at different stages of development. Most of these tests are automated and executed as part of our CI-CD pipeline, while others are executed manually.

Unit testing#

Do not submit any code without a corresponding unit test. Also, any bug fixes should increment unit test coverage. All unit tests are executed with any subsequent Jenkins build.

Component testing#

Component testing uses real world use cases to exercise a portion of the software, using typical data inputs. Developers should document component stories and submit them to the component test library for the respective repository. A tester should be able to run component tests manually. Component tests should run automatically with each Jenkins build.

The OpenID Foundation certification tests supplement the component testing library, and should be run for each major release of the software for which they are available.

Performance testing#

Performance tests are critical to optimization of the persistence and caching implementation. All major releases of the software should be tested for performance with all supported database and cache configurations using the Cloud Native distribution. The VM distribution will not be performance tested, as the main goal for this distribution is development and small deployments. The JMeter test tool should be used to generate the load. These tests are published so community members can run their own bench-marking analysis.

HA Tests#

HA tests should be run against the Cloud Native distribution, which by design is active-active with no single point of failure. The HA testing should simulate taking down various pieces of infrastructure, to see if authentications can still proceed. Also, what happens to transactions that were in progress during the crash?

Penetration tests#

Penetration testing is highly deployment specific. Depending on different implementations of the Janssen Project software, you may achieve different levels of risk mitigation. Thus it is important that organizations that operate their own IAM platform based on Janssen perform their own penetration testing.

Dependency Vulnerabilities#

Dependency vulnerabilities are monitored by Gihub. In addition we plan to use the Linux Foundation Community Bridge vulnerability detection platform.

Testing Documentation Changes Locally#

While contributing documentation to official Janssen Project documentation it is important to make sure that documents meet style guidelines and have been proofread to remove any typographical or grammatical errors. Janssen Project uses Material for MkDocs to create the documenation site. Before new content is pushed to the repository on GitHub, it should be tested locally by the author. Author can do this by deploying Material for MkDocs locally.

High-level steps involve:

  1. Install Material for MkDocs
  2. Install required plugins
  3. Preview as you write

Open Banking#

We are working on developing this content under issue 2548. If you’d like to contribute the content, get started with the Contribution Guide

How to test OpenBanking?#

This test uses a Gluu Testing Certificate.

device authentication#

After installation, we have to complete device authentication to use OpenBanking.

Testing using commnd line mode#

We can run the below command on the command line. For example:

/opt/jans/jans-cli/config-cli.py -CC /opt/jans/jans-setup/output/CA/client.crt -CK /opt/jans/jans-setup/output/CA/client.key –operation-id get-oauth-openid-clients

in the same way we can run other commands. Rest of the testing is same for jans and openbanking.

Release Quality Assurance#

Once all the code changes for a particular release have been committed, we perform a set of tests and go through a list of checkpoints to make sure release candidate (RC) build is healthy and functioning well.

Pre-release QA checklist#

As part of pre-release QA check, we run a set of manual sanity checks on test environments with various deployment configurations.

Test Environments#

# OS Platform Persistance Type Deployment Type (VM/CN) Test
1 SUSE 15 Opendj VM installation and sanity testing
2 SUSE 15 Mysql VM installation and sanity testing
3 SUSE 15 Pgsql VM installation and sanity testing
4 RHEL 8 Opendj VM installation and sanity testing
5 RHEL 8 Mysql VM installation and sanity testing
6 RHEL 8 Pgsql VM installation and sanity testing
7 Ubuntu20 Opendj VM installation and sanity testing
8 Ubuntu20 Mysql VM installation and sanity testing
9 Ubuntu20 Pgsql VM installation and sanity testing
10 Ubuntu22 Opendj VM installation and sanity testing
11 Ubuntu22 Mysql VM installation and sanity testing
12 Ubuntu22 Pgsql VM installation and sanity testing

Sanity checks#

  • Review functioning of .well-known endpoints for OpenId, Fido, UMA, SCIM modules
  • Test device authentication flow using TUI
  • Test password authentication flow using Janssen Server Tent
  • Test Agama project deployment and functioning

Post-release QA checklist#

# QA Checks
1 Package installation verification on all OS Platforms as in pre-release tests

Last update: 2023-05-23
Created: 2022-01-27