mirror of
https://github.com/elastic/kibana.git
synced 2025-06-27 18:51:07 -04:00
Fixes https://github.com/elastic/kibana/issues/149344 This PR migrates all plugins to packages automatically. It does this using `node scripts/lint_packages` to automatically migrate `kibana.json` files to `kibana.jsonc` files. By doing this automatically we can simplify many build and testing procedures to only support packages, and not both "packages" and "synthetic packages" (basically pointers to plugins). The majority of changes are in operations related code, so we'll be having operations review this before marking it ready for review. The vast majority of the code owners are simply pinged because we deleted all `kibana.json` files and replaced them with `kibana.jsonc` files, so we plan on leaving the PR ready-for-review for about 24 hours before merging (after feature freeze), assuming we don't have any blockers (especially from @elastic/kibana-core since there are a few core specific changes, though the majority were handled in #149370). --------- Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
66 lines
2.8 KiB
TypeScript
66 lines
2.8 KiB
TypeScript
/*
|
|
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
|
|
* or more contributor license agreements. Licensed under the Elastic License
|
|
* 2.0; you may not use this file except in compliance with the Elastic License
|
|
* 2.0.
|
|
*/
|
|
|
|
import { resolve } from 'path';
|
|
import { FtrConfigProviderContext } from '@kbn/test';
|
|
import { services } from './services';
|
|
|
|
export default async function ({ readConfigFile }: FtrConfigProviderContext) {
|
|
const xPackAPITestsConfig = await readConfigFile(require.resolve('../api_integration/config.ts'));
|
|
|
|
const kibanaPort = xPackAPITestsConfig.get('servers.kibana.port');
|
|
const idpPath = require.resolve('@kbn/security-api-integration-helpers/saml/idp_metadata.xml');
|
|
|
|
const testEndpointsPlugin = resolve(__dirname, '../security_functional/plugins/test_endpoints');
|
|
|
|
const auditLogPath = resolve(__dirname, './packages/helpers/audit/saml.log');
|
|
|
|
return {
|
|
testFiles: [require.resolve('./tests/saml')],
|
|
servers: xPackAPITestsConfig.get('servers'),
|
|
security: { disableTestUser: true },
|
|
services,
|
|
junit: {
|
|
reportName: 'X-Pack Security API Integration Tests (SAML)',
|
|
},
|
|
|
|
esTestCluster: {
|
|
...xPackAPITestsConfig.get('esTestCluster'),
|
|
serverArgs: [
|
|
...xPackAPITestsConfig.get('esTestCluster.serverArgs'),
|
|
'xpack.security.authc.token.enabled=true',
|
|
'xpack.security.authc.token.timeout=15s',
|
|
'xpack.security.authc.realms.saml.saml1.order=0',
|
|
`xpack.security.authc.realms.saml.saml1.idp.metadata.path=${idpPath}`,
|
|
'xpack.security.authc.realms.saml.saml1.idp.entity_id=http://www.elastic.co/saml1',
|
|
`xpack.security.authc.realms.saml.saml1.sp.entity_id=http://localhost:${kibanaPort}`,
|
|
`xpack.security.authc.realms.saml.saml1.sp.logout=http://localhost:${kibanaPort}/logout`,
|
|
`xpack.security.authc.realms.saml.saml1.sp.acs=http://localhost:${kibanaPort}/api/security/saml/callback`,
|
|
'xpack.security.authc.realms.saml.saml1.attributes.principal=urn:oid:0.0.7',
|
|
],
|
|
},
|
|
|
|
kbnTestServer: {
|
|
...xPackAPITestsConfig.get('kbnTestServer'),
|
|
serverArgs: [
|
|
...xPackAPITestsConfig.get('kbnTestServer.serverArgs'),
|
|
`--plugin-path=${testEndpointsPlugin}`,
|
|
`--xpack.security.authc.providers=${JSON.stringify(['saml', 'basic'])}`,
|
|
'--xpack.security.authc.saml.realm=saml1',
|
|
'--xpack.security.authc.saml.maxRedirectURLSize=100b',
|
|
'--xpack.security.audit.enabled=true',
|
|
'--xpack.security.audit.appender.type=file',
|
|
`--xpack.security.audit.appender.fileName=${auditLogPath}`,
|
|
'--xpack.security.audit.appender.layout.type=json',
|
|
`--xpack.security.audit.ignore_filters=${JSON.stringify([
|
|
{ actions: ['http_request'] },
|
|
{ categories: ['database'] },
|
|
])}`,
|
|
],
|
|
},
|
|
};
|
|
}
|