mirror of
https://github.com/elastic/kibana.git
synced 2025-04-24 17:59:23 -04:00
* Use refresh token for any access token error with 401 status code and re-initiate SAML handshake for any refresh token error with 400 status code. * Switch from `expect.js` to `@kbn/expect`. * Review#1: repurpose redundant tests to test token failures with 500 code.
54 lines
2.3 KiB
JavaScript
54 lines
2.3 KiB
JavaScript
/*
|
|
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
|
|
* or more contributor license agreements. Licensed under the Elastic License;
|
|
* you may not use this file except in compliance with the Elastic License.
|
|
*/
|
|
|
|
import { resolve } from 'path';
|
|
|
|
export default async function ({ readConfigFile }) {
|
|
const kibanaAPITestsConfig = await readConfigFile(require.resolve('../../../test/api_integration/config.js'));
|
|
const xPackAPITestsConfig = await readConfigFile(require.resolve('../api_integration/config.js'));
|
|
|
|
const kibanaPort = xPackAPITestsConfig.get('servers.kibana.port');
|
|
const idpPath = resolve(__dirname, '../../test/saml_api_integration/fixtures/idp_metadata.xml');
|
|
|
|
return {
|
|
testFiles: [require.resolve('./apis')],
|
|
servers: xPackAPITestsConfig.get('servers'),
|
|
services: {
|
|
chance: kibanaAPITestsConfig.get('services.chance'),
|
|
es: kibanaAPITestsConfig.get('services.es'),
|
|
supertestWithoutAuth: xPackAPITestsConfig.get('services.supertestWithoutAuth'),
|
|
},
|
|
junit: {
|
|
reportName: 'X-Pack SAML API Integration Tests',
|
|
},
|
|
|
|
esTestCluster: {
|
|
...xPackAPITestsConfig.get('esTestCluster'),
|
|
serverArgs: [
|
|
...xPackAPITestsConfig.get('esTestCluster.serverArgs'),
|
|
'xpack.security.authc.token.enabled=true',
|
|
'xpack.security.authc.token.timeout=15s',
|
|
'xpack.security.authc.realms.saml.saml1.order=0',
|
|
`xpack.security.authc.realms.saml.saml1.idp.metadata.path=${idpPath}`,
|
|
'xpack.security.authc.realms.saml.saml1.idp.entity_id=http://www.elastic.co',
|
|
`xpack.security.authc.realms.saml.saml1.sp.entity_id=http://localhost:${kibanaPort}`,
|
|
`xpack.security.authc.realms.saml.saml1.sp.logout=http://localhost:${kibanaPort}/logout`,
|
|
`xpack.security.authc.realms.saml.saml1.sp.acs=http://localhost:${kibanaPort}/api/security/v1/saml`,
|
|
'xpack.security.authc.realms.saml.saml1.attributes.principal=urn:oid:0.0.7',
|
|
],
|
|
},
|
|
|
|
kbnTestServer: {
|
|
...xPackAPITestsConfig.get('kbnTestServer'),
|
|
serverArgs: [
|
|
...xPackAPITestsConfig.get('kbnTestServer.serverArgs'),
|
|
'--optimize.enabled=false',
|
|
'--server.xsrf.whitelist=[\"/api/security/v1/saml\"]',
|
|
'--xpack.security.authProviders=[\"saml\"]',
|
|
],
|
|
},
|
|
};
|
|
}
|