Improve assertion failure when error is not empty (#60572)
This commit changes TokenAuthIntegTests so all occurrences of assertThat(x.size(), equalTo(0)); become assertThat(x, empty()); This means that the assertion failure message will include the contents of the list (`x`) instead of just its size, which facilitates easier failure diagnosis. Relates: #56903 Backport of: #60496
This commit is contained in:
parent
667309e6a6
commit
c58e32bb27
|
@ -60,6 +60,7 @@ import java.util.concurrent.atomic.AtomicReference;
|
||||||
import static org.elasticsearch.index.mapper.MapperService.SINGLE_MAPPING_NAME;
|
import static org.elasticsearch.index.mapper.MapperService.SINGLE_MAPPING_NAME;
|
||||||
import static org.elasticsearch.test.SecuritySettingsSource.SECURITY_REQUEST_OPTIONS;
|
import static org.elasticsearch.test.SecuritySettingsSource.SECURITY_REQUEST_OPTIONS;
|
||||||
import static org.elasticsearch.test.hamcrest.ElasticsearchAssertions.assertNoTimeout;
|
import static org.elasticsearch.test.hamcrest.ElasticsearchAssertions.assertNoTimeout;
|
||||||
|
import static org.hamcrest.Matchers.empty;
|
||||||
import static org.hamcrest.Matchers.equalTo;
|
import static org.hamcrest.Matchers.equalTo;
|
||||||
import static org.hamcrest.Matchers.hasItem;
|
import static org.hamcrest.Matchers.hasItem;
|
||||||
|
|
||||||
|
@ -166,8 +167,8 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(1));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(1));
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
AtomicReference<String> docId = new AtomicReference<>();
|
AtomicReference<String> docId = new AtomicReference<>();
|
||||||
assertBusy(() -> {
|
assertBusy(() -> {
|
||||||
SearchResponse searchResponse = client.prepareSearch(RestrictedIndicesNames.SECURITY_TOKENS_ALIAS)
|
SearchResponse searchResponse = client.prepareSearch(RestrictedIndicesNames.SECURITY_TOKENS_ALIAS)
|
||||||
|
@ -198,7 +199,7 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.actionGet();
|
.actionGet();
|
||||||
assertThat(invalidateResponseTwo.getResult().getInvalidatedTokens(), equalTo(0));
|
assertThat(invalidateResponseTwo.getResult().getInvalidatedTokens(), equalTo(0));
|
||||||
assertThat(invalidateResponseTwo.getResult().getPreviouslyInvalidatedTokens(), equalTo(0));
|
assertThat(invalidateResponseTwo.getResult().getPreviouslyInvalidatedTokens(), equalTo(0));
|
||||||
assertThat(invalidateResponseTwo.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponseTwo.getResult().getErrors(), empty());
|
||||||
}
|
}
|
||||||
client.admin().indices().prepareRefresh(RestrictedIndicesNames.SECURITY_TOKENS_ALIAS).get();
|
client.admin().indices().prepareRefresh(RestrictedIndicesNames.SECURITY_TOKENS_ALIAS).get();
|
||||||
SearchResponse searchResponse = client.prepareSearch(RestrictedIndicesNames.SECURITY_TOKENS_ALIAS)
|
SearchResponse searchResponse = client.prepareSearch(RestrictedIndicesNames.SECURITY_TOKENS_ALIAS)
|
||||||
|
@ -214,16 +215,16 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.setType(randomFrom(InvalidateTokenRequest.Type.values()))
|
.setType(randomFrom(InvalidateTokenRequest.Type.values()))
|
||||||
.execute()
|
.execute()
|
||||||
.actionGet();
|
.actionGet();
|
||||||
assertThat(invalidateAccessTokenResponse.getResult().getInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateAccessTokenResponse.getResult().getInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateAccessTokenResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateAccessTokenResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateAccessTokenResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateAccessTokenResponse.getResult().getErrors(), empty());
|
||||||
InvalidateTokenResponse invalidateRefreshTokenResponse = securityClient.prepareInvalidateToken(refreshToken)
|
InvalidateTokenResponse invalidateRefreshTokenResponse = securityClient.prepareInvalidateToken(refreshToken)
|
||||||
.setType(InvalidateTokenRequest.Type.REFRESH_TOKEN)
|
.setType(InvalidateTokenRequest.Type.REFRESH_TOKEN)
|
||||||
.execute()
|
.execute()
|
||||||
.actionGet();
|
.actionGet();
|
||||||
assertThat(invalidateRefreshTokenResponse.getResult().getInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateRefreshTokenResponse.getResult().getInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateRefreshTokenResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateRefreshTokenResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateRefreshTokenResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateRefreshTokenResponse.getResult().getErrors(), empty());
|
||||||
}
|
}
|
||||||
|
|
||||||
public void testInvalidateAllTokensForUser() throws Exception{
|
public void testInvalidateAllTokensForUser() throws Exception{
|
||||||
|
@ -244,8 +245,8 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.setUserName(SecuritySettingsSource.TEST_USER_NAME)
|
.setUserName(SecuritySettingsSource.TEST_USER_NAME)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(2 * (numOfRequests)));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(2 * (numOfRequests)));
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
}
|
}
|
||||||
|
|
||||||
public void testInvalidateAllTokensForRealm() throws Exception{
|
public void testInvalidateAllTokensForRealm() throws Exception{
|
||||||
|
@ -266,8 +267,8 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.setRealmName("file")
|
.setRealmName("file")
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(2 * (numOfRequests)));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(2 * (numOfRequests)));
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
}
|
}
|
||||||
|
|
||||||
public void testInvalidateAllTokensForRealmThatHasNone() {
|
public void testInvalidateAllTokensForRealmThatHasNone() {
|
||||||
|
@ -287,9 +288,9 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.prepareInvalidateToken()
|
.prepareInvalidateToken()
|
||||||
.setRealmName("saml")
|
.setRealmName("saml")
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
}
|
}
|
||||||
|
|
||||||
public void testExpireMultipleTimes() {
|
public void testExpireMultipleTimes() {
|
||||||
|
@ -304,15 +305,15 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(1));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(1));
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
InvalidateTokenResponse invalidateAgainResponse = securityClient()
|
InvalidateTokenResponse invalidateAgainResponse = securityClient()
|
||||||
.prepareInvalidateToken(response.getTokenString())
|
.prepareInvalidateToken(response.getTokenString())
|
||||||
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateAgainResponse.getResult().getInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateAgainResponse.getResult().getInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateAgainResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(1));
|
assertThat(invalidateAgainResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(1));
|
||||||
assertThat(invalidateAgainResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateAgainResponse.getResult().getErrors(), empty());
|
||||||
}
|
}
|
||||||
|
|
||||||
public void testInvalidateMultipleTimes() {
|
public void testInvalidateMultipleTimes() {
|
||||||
|
@ -326,15 +327,15 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(1));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(1));
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
InvalidateTokenResponse invalidateAgainResponse = securityClient()
|
InvalidateTokenResponse invalidateAgainResponse = securityClient()
|
||||||
.prepareInvalidateToken(response.getTokenString())
|
.prepareInvalidateToken(response.getTokenString())
|
||||||
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateAgainResponse.getResult().getInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateAgainResponse.getResult().getInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateAgainResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(1));
|
assertThat(invalidateAgainResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(1));
|
||||||
assertThat(invalidateAgainResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateAgainResponse.getResult().getErrors(), empty());
|
||||||
}
|
}
|
||||||
|
|
||||||
public void testInvalidateNotValidAccessTokens() throws Exception {
|
public void testInvalidateNotValidAccessTokens() throws Exception {
|
||||||
|
@ -356,27 +357,27 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.prepareInvalidateToken("!this_is_not_a_base64_string_and_we_should_fail_decoding_it")
|
.prepareInvalidateToken("!this_is_not_a_base64_string_and_we_should_fail_decoding_it")
|
||||||
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
|
|
||||||
invalidateResponse =
|
invalidateResponse =
|
||||||
securityClient()
|
securityClient()
|
||||||
.prepareInvalidateToken("10we+might+assume+this+is+valid+old+token")
|
.prepareInvalidateToken("10we+might+assume+this+is+valid+old+token")
|
||||||
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
|
|
||||||
invalidateResponse =
|
invalidateResponse =
|
||||||
securityClient()
|
securityClient()
|
||||||
.prepareInvalidateToken(generateInvalidShortAccessToken(Version.CURRENT))
|
.prepareInvalidateToken(generateInvalidShortAccessToken(Version.CURRENT))
|
||||||
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
|
|
||||||
// Generate a token that could be a valid token string for the version we are on, and should decode fine, but is not found in our
|
// Generate a token that could be a valid token string for the version we are on, and should decode fine, but is not found in our
|
||||||
// tokens index
|
// tokens index
|
||||||
|
@ -385,9 +386,9 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.prepareInvalidateToken(generateAccessToken(Version.CURRENT))
|
.prepareInvalidateToken(generateAccessToken(Version.CURRENT))
|
||||||
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
.setType(InvalidateTokenRequest.Type.ACCESS_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
}
|
}
|
||||||
|
|
||||||
public void testInvalidateNotValidRefreshTokens() throws Exception {
|
public void testInvalidateNotValidRefreshTokens() throws Exception {
|
||||||
|
@ -398,7 +399,6 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.get());
|
.get());
|
||||||
assertThat(e.status(), equalTo(RestStatus.BAD_REQUEST));
|
assertThat(e.status(), equalTo(RestStatus.BAD_REQUEST));
|
||||||
// Create a token to trigger index creation
|
// Create a token to trigger index creation
|
||||||
// Create a token to trigger index creation
|
|
||||||
securityClient().prepareCreateToken()
|
securityClient().prepareCreateToken()
|
||||||
.setGrantType("password")
|
.setGrantType("password")
|
||||||
.setUsername(SecuritySettingsSource.TEST_USER_NAME)
|
.setUsername(SecuritySettingsSource.TEST_USER_NAME)
|
||||||
|
@ -410,27 +410,27 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.prepareInvalidateToken("!this_is_not_a_base64_string_and_we_should_fail_decoding_it")
|
.prepareInvalidateToken("!this_is_not_a_base64_string_and_we_should_fail_decoding_it")
|
||||||
.setType(InvalidateTokenRequest.Type.REFRESH_TOKEN)
|
.setType(InvalidateTokenRequest.Type.REFRESH_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
|
|
||||||
invalidateResponse =
|
invalidateResponse =
|
||||||
securityClient()
|
securityClient()
|
||||||
.prepareInvalidateToken(TokenService.prependVersionAndEncodeRefreshToken(Version.CURRENT, randomAlphaOfLength(32)))
|
.prepareInvalidateToken(TokenService.prependVersionAndEncodeRefreshToken(Version.CURRENT, randomAlphaOfLength(32)))
|
||||||
.setType(InvalidateTokenRequest.Type.REFRESH_TOKEN)
|
.setType(InvalidateTokenRequest.Type.REFRESH_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
|
|
||||||
invalidateResponse =
|
invalidateResponse =
|
||||||
securityClient()
|
securityClient()
|
||||||
.prepareInvalidateToken("10we+might+assume+this+is+valid+old+token")
|
.prepareInvalidateToken("10we+might+assume+this+is+valid+old+token")
|
||||||
.setType(InvalidateTokenRequest.Type.REFRESH_TOKEN)
|
.setType(InvalidateTokenRequest.Type.REFRESH_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
|
|
||||||
// Generate a token that could be a valid token string for the version we are on, and should decode fine, but is not found in our
|
// Generate a token that could be a valid token string for the version we are on, and should decode fine, but is not found in our
|
||||||
// tokens index
|
// tokens index
|
||||||
|
@ -439,9 +439,9 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.prepareInvalidateToken(TokenService.prependVersionAndEncodeRefreshToken(Version.CURRENT, UUIDs.randomBase64UUID()))
|
.prepareInvalidateToken(TokenService.prependVersionAndEncodeRefreshToken(Version.CURRENT, UUIDs.randomBase64UUID()))
|
||||||
.setType(InvalidateTokenRequest.Type.REFRESH_TOKEN)
|
.setType(InvalidateTokenRequest.Type.REFRESH_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -485,8 +485,8 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
.setType(InvalidateTokenRequest.Type.REFRESH_TOKEN)
|
.setType(InvalidateTokenRequest.Type.REFRESH_TOKEN)
|
||||||
.get();
|
.get();
|
||||||
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(1));
|
assertThat(invalidateResponse.getResult().getInvalidatedTokens().size(), equalTo(1));
|
||||||
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponse.getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponse.getResult().getErrors(), empty());
|
||||||
|
|
||||||
ElasticsearchSecurityException e = expectThrows(ElasticsearchSecurityException.class,
|
ElasticsearchSecurityException e = expectThrows(ElasticsearchSecurityException.class,
|
||||||
() -> securityClient.prepareRefreshToken(createTokenResponse.getRefreshToken()).get());
|
() -> securityClient.prepareRefreshToken(createTokenResponse.getRefreshToken()).get());
|
||||||
|
@ -708,8 +708,8 @@ public class TokenAuthIntegTests extends SecurityIntegTestCase {
|
||||||
new InvalidateTokenRequest(createTokenResponse.getTokenString(), InvalidateTokenRequest.Type.ACCESS_TOKEN.getValue());
|
new InvalidateTokenRequest(createTokenResponse.getTokenString(), InvalidateTokenRequest.Type.ACCESS_TOKEN.getValue());
|
||||||
securityClient.invalidateToken(invalidateTokenRequest, invalidateResponseFuture);
|
securityClient.invalidateToken(invalidateTokenRequest, invalidateResponseFuture);
|
||||||
assertThat(invalidateResponseFuture.get().getResult().getInvalidatedTokens().size(), equalTo(1));
|
assertThat(invalidateResponseFuture.get().getResult().getInvalidatedTokens().size(), equalTo(1));
|
||||||
assertThat(invalidateResponseFuture.get().getResult().getPreviouslyInvalidatedTokens().size(), equalTo(0));
|
assertThat(invalidateResponseFuture.get().getResult().getPreviouslyInvalidatedTokens(), empty());
|
||||||
assertThat(invalidateResponseFuture.get().getResult().getErrors().size(), equalTo(0));
|
assertThat(invalidateResponseFuture.get().getResult().getErrors(), empty());
|
||||||
|
|
||||||
ElasticsearchSecurityException e = expectThrows(ElasticsearchSecurityException.class, () -> {
|
ElasticsearchSecurityException e = expectThrows(ElasticsearchSecurityException.class, () -> {
|
||||||
PlainActionFuture<AuthenticateResponse> responseFuture = new PlainActionFuture<>();
|
PlainActionFuture<AuthenticateResponse> responseFuture = new PlainActionFuture<>();
|
||||||
|
|
Loading…
Reference in New Issue