mirror of
https://github.com/elastic/kibana.git
synced 2025-04-24 09:48:58 -04:00
* Fixing mocha tests and broken password change status codes * Updating API integration test
This commit is contained in:
parent
f530fecdd8
commit
faaa0111ed
4 changed files with 12 additions and 16 deletions
|
@ -34,7 +34,7 @@ describe('Authentication routes', () => {
|
|||
|
||||
initAuthenticateApi({
|
||||
authc: { login: loginStub, logout: logoutStub },
|
||||
config: { authc: { providers: ['basic'] } },
|
||||
__legacyCompat: { config: { authc: { providers: ['basic'] } } },
|
||||
}, serverStub);
|
||||
});
|
||||
|
||||
|
|
|
@ -31,7 +31,7 @@ describe('User routes', () => {
|
|||
clusterStub = sinon.stub({ callWithRequest() {} });
|
||||
sandbox.stub(ClientShield, 'getClient').returns(clusterStub);
|
||||
|
||||
initUsersApi({ authc: { login: loginStub }, config: { authc: { providers: ['basic'] } } }, serverStub);
|
||||
initUsersApi({ authc: { login: loginStub }, __legacyCompat: { config: { authc: { providers: ['basic'] } } } }, serverStub);
|
||||
});
|
||||
|
||||
afterEach(() => sandbox.restore());
|
||||
|
@ -90,7 +90,7 @@ describe('User routes', () => {
|
|||
expect(response.isBoom).to.be(true);
|
||||
expect(response.output.payload).to.eql({
|
||||
statusCode: 403,
|
||||
error: 'Unauthorized',
|
||||
error: 'Forbidden',
|
||||
message: 'Something went wrong.'
|
||||
});
|
||||
});
|
||||
|
|
|
@ -96,19 +96,15 @@ export function initUsersApi({ authc: { login }, __legacyCompat: { config } }, s
|
|||
// If user tries to change own password, let's check if old password is valid first by trying
|
||||
// to login.
|
||||
if (isCurrentUser) {
|
||||
try {
|
||||
const authenticationResult = await login(KibanaRequest.from(request), {
|
||||
provider: providerToLoginWith,
|
||||
value: { username, password },
|
||||
// We shouldn't alter authentication state just yet.
|
||||
stateless: true,
|
||||
});
|
||||
const authenticationResult = await login(KibanaRequest.from(request), {
|
||||
provider: providerToLoginWith,
|
||||
value: { username, password },
|
||||
// We shouldn't alter authentication state just yet.
|
||||
stateless: true,
|
||||
});
|
||||
|
||||
if (!authenticationResult.succeeded()) {
|
||||
return Boom.unauthorized(authenticationResult.error);
|
||||
}
|
||||
} catch(err) {
|
||||
throw Boom.forbidden(err);
|
||||
if (!authenticationResult.succeeded()) {
|
||||
return Boom.forbidden(authenticationResult.error);
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -39,7 +39,7 @@ export default function({ getService }: FtrProviderContext) {
|
|||
.set('kbn-xsrf', 'xxx')
|
||||
.set('Cookie', sessionCookie.cookieString())
|
||||
.send({ password: wrongPassword, newPassword })
|
||||
.expect(401);
|
||||
.expect(403);
|
||||
|
||||
// Let's check that we can't login with wrong password, just in case.
|
||||
await supertest
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue