mirror of
https://github.com/elastic/kibana.git
synced 2025-06-27 18:51:07 -04:00
134 lines
4.1 KiB
TypeScript
134 lines
4.1 KiB
TypeScript
/*
|
|
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
|
|
* or more contributor license agreements. Licensed under the Elastic License
|
|
* 2.0; you may not use this file except in compliance with the Elastic License
|
|
* 2.0.
|
|
*/
|
|
|
|
import expect from '@kbn/expect';
|
|
import { FtrProviderContext } from '../../api_integration/ftr_provider_context';
|
|
import { skipIfNoDockerRegistry } from '../helpers';
|
|
|
|
export default function (providerContext: FtrProviderContext) {
|
|
const { getService } = providerContext;
|
|
const supertest = getService('supertest');
|
|
const es = getService('es');
|
|
const esArchiver = getService('esArchiver');
|
|
|
|
describe('fleet_setup', () => {
|
|
skipIfNoDockerRegistry(providerContext);
|
|
before(async () => {
|
|
await esArchiver.load('empty_kibana');
|
|
await esArchiver.load('fleet/empty_fleet_server');
|
|
});
|
|
|
|
after(async () => {
|
|
await esArchiver.unload('empty_kibana');
|
|
await esArchiver.unload('fleet/empty_fleet_server');
|
|
});
|
|
beforeEach(async () => {
|
|
try {
|
|
await es.security.deleteUser({
|
|
username: 'fleet_enroll',
|
|
});
|
|
} catch (e) {
|
|
if (e.meta?.statusCode !== 404) {
|
|
throw e;
|
|
}
|
|
}
|
|
try {
|
|
await es.security.deleteRole({
|
|
name: 'fleet_enroll',
|
|
});
|
|
} catch (e) {
|
|
if (e.meta?.statusCode !== 404) {
|
|
throw e;
|
|
}
|
|
}
|
|
});
|
|
|
|
it('should not create a fleet_enroll role if one does not already exist', async () => {
|
|
const { body: apiResponse } = await supertest
|
|
.post(`/api/fleet/setup`)
|
|
.set('kbn-xsrf', 'xxxx')
|
|
.expect(200);
|
|
|
|
expect(apiResponse.isInitialized).to.be(true);
|
|
|
|
try {
|
|
await es.security.getUser({
|
|
username: 'fleet_enroll',
|
|
});
|
|
} catch (e) {
|
|
expect(e.meta?.statusCode).to.eql(404);
|
|
}
|
|
});
|
|
|
|
it('should update the fleet_enroll role with new index permissions if one does already exist', async () => {
|
|
try {
|
|
await es.security.putRole({
|
|
name: 'fleet_enroll',
|
|
body: {
|
|
cluster: ['monitor', 'manage_api_key'],
|
|
indices: [
|
|
{
|
|
names: ['logs-*', 'metrics-*', 'traces-*'],
|
|
privileges: ['create_doc', 'indices:admin/auto_create'],
|
|
allow_restricted_indices: false,
|
|
},
|
|
],
|
|
applications: [],
|
|
run_as: [],
|
|
metadata: {},
|
|
// @ts-expect-error @elastic/elasticsearch PutRoleRequest.body doesn't declare transient_metadata property
|
|
transient_metadata: { enabled: true },
|
|
},
|
|
});
|
|
} catch (e) {
|
|
if (e.meta?.statusCode !== 404) {
|
|
throw e;
|
|
}
|
|
}
|
|
|
|
const { body: apiResponse } = await supertest
|
|
.post(`/api/fleet/setup`)
|
|
.set('kbn-xsrf', 'xxxx')
|
|
.expect(200);
|
|
|
|
expect(apiResponse.isInitialized).to.be(true);
|
|
|
|
const { body: roleResponse } = await es.security.getRole({
|
|
name: 'fleet_enroll',
|
|
});
|
|
expect(roleResponse).to.have.key('fleet_enroll');
|
|
expect(roleResponse.fleet_enroll).to.eql({
|
|
cluster: ['monitor', 'manage_api_key'],
|
|
indices: [
|
|
{
|
|
names: ['logs-*', 'metrics-*', 'traces-*', '.logs-endpoint.diagnostic.collection-*'],
|
|
privileges: ['auto_configure', 'create_doc'],
|
|
allow_restricted_indices: false,
|
|
},
|
|
],
|
|
applications: [],
|
|
run_as: [],
|
|
metadata: {},
|
|
transient_metadata: { enabled: true },
|
|
});
|
|
});
|
|
|
|
it('should install default packages', async () => {
|
|
await supertest.post(`/api/fleet/setup`).set('kbn-xsrf', 'xxxx').expect(200);
|
|
|
|
const { body: apiResponse } = await supertest
|
|
.get(`/api/fleet/epm/packages?experimental=true`)
|
|
.expect(200);
|
|
const installedPackages = apiResponse.response
|
|
.filter((p: any) => p.status === 'installed')
|
|
.map((p: any) => p.name)
|
|
.sort();
|
|
|
|
expect(installedPackages).to.eql(['elastic_agent', 'endpoint', 'fleet_server', 'system']);
|
|
});
|
|
});
|
|
}
|