Skip to content

Commit 641ecdf

Browse files
committed
Add testfile feature for normal integration tests
1 parent 17eadd4 commit 641ecdf

File tree

1 file changed

+15
-16
lines changed

1 file changed

+15
-16
lines changed

crates/hdfs-native/tests/test_integration.rs

+15-16
Original file line numberDiff line numberDiff line change
@@ -16,14 +16,14 @@ mod test {
1616
#[tokio::test]
1717
#[serial]
1818
async fn test_basic() {
19-
test_with_features(&HashSet::new()).await.unwrap();
19+
test_with_features(HashSet::new()).await.unwrap();
2020
}
2121

2222
#[tokio::test]
2323
#[serial]
2424
#[cfg(feature = "kerberos")]
2525
async fn test_security_kerberos() {
26-
test_with_features(&HashSet::from([DfsFeatures::SECURITY]))
26+
test_with_features(HashSet::from([DfsFeatures::SECURITY]))
2727
.await
2828
.unwrap();
2929
}
@@ -32,7 +32,7 @@ mod test {
3232
#[serial]
3333
#[cfg(feature = "token")]
3434
async fn test_security_token() {
35-
test_with_features(&HashSet::from([DfsFeatures::SECURITY, DfsFeatures::TOKEN]))
35+
test_with_features(HashSet::from([DfsFeatures::SECURITY, DfsFeatures::TOKEN]))
3636
.await
3737
.unwrap();
3838
}
@@ -42,7 +42,7 @@ mod test {
4242
#[serial]
4343
#[cfg(feature = "token")]
4444
async fn test_privacy_token() {
45-
test_with_features(&HashSet::from([
45+
test_with_features(HashSet::from([
4646
DfsFeatures::SECURITY,
4747
DfsFeatures::TOKEN,
4848
DfsFeatures::PRIVACY,
@@ -55,18 +55,15 @@ mod test {
5555
#[serial]
5656
#[cfg(feature = "kerberos")]
5757
async fn test_privacy_kerberos() {
58-
test_with_features(&HashSet::from([
59-
DfsFeatures::SECURITY,
60-
DfsFeatures::PRIVACY,
61-
]))
62-
.await
63-
.unwrap();
58+
test_with_features(HashSet::from([DfsFeatures::SECURITY, DfsFeatures::PRIVACY]))
59+
.await
60+
.unwrap();
6461
}
6562

6663
#[tokio::test]
6764
#[serial]
6865
async fn test_basic_ha() {
69-
test_with_features(&HashSet::from([DfsFeatures::HA]))
66+
test_with_features(HashSet::from([DfsFeatures::HA]))
7067
.await
7168
.unwrap();
7269
}
@@ -75,7 +72,7 @@ mod test {
7572
#[serial]
7673
#[cfg(feature = "kerberos")]
7774
async fn test_security_privacy_ha() {
78-
test_with_features(&HashSet::from([
75+
test_with_features(HashSet::from([
7976
DfsFeatures::SECURITY,
8077
DfsFeatures::PRIVACY,
8178
DfsFeatures::HA,
@@ -88,7 +85,7 @@ mod test {
8885
#[serial]
8986
#[cfg(feature = "token")]
9087
async fn test_security_token_ha() {
91-
test_with_features(&HashSet::from([
88+
test_with_features(HashSet::from([
9289
DfsFeatures::SECURITY,
9390
DfsFeatures::TOKEN,
9491
DfsFeatures::HA,
@@ -100,15 +97,17 @@ mod test {
10097
#[tokio::test]
10198
#[serial]
10299
async fn test_rbf() {
103-
test_with_features(&HashSet::from([DfsFeatures::RBF]))
100+
test_with_features(HashSet::from([DfsFeatures::RBF]))
104101
.await
105102
.unwrap();
106103
}
107104

108-
pub async fn test_with_features(features: &HashSet<DfsFeatures>) -> Result<()> {
105+
pub async fn test_with_features(mut features: HashSet<DfsFeatures>) -> Result<()> {
109106
let _ = env_logger::builder().is_test(true).try_init();
110107

111-
let _dfs = MiniDfs::with_features(features);
108+
features.insert(DfsFeatures::TESTFILE);
109+
110+
let _dfs = MiniDfs::with_features(&features);
112111
let client = Client::default();
113112

114113
test_file_info(&client).await?;

0 commit comments

Comments
 (0)