mirror of
https://github.com/honeymoose/OpenSearch.git
synced 2025-03-09 14:34:43 +00:00
Use the same ES cluster as both an SP and an IDP and perform IDP initiated and SP initiated SSO. The REST client plays the role of both the Cloud UI and Kibana in these flows Backport of #54215 * fix compilation issues
49 lines
2.7 KiB
Groovy
49 lines
2.7 KiB
Groovy
apply plugin: 'elasticsearch.testclusters'
|
|
apply plugin: 'elasticsearch.standalone-rest-test'
|
|
apply plugin: 'elasticsearch.rest-test'
|
|
|
|
dependencies {
|
|
testCompile project(path: xpackModule('core'), configuration: 'default')
|
|
testCompile project(path: xpackModule('identity-provider'), configuration: 'default')
|
|
testCompile project(path: xpackModule('core'), configuration: 'testArtifacts')
|
|
}
|
|
|
|
testClusters.integTest {
|
|
testDistribution = 'DEFAULT'
|
|
|
|
setting 'xpack.license.self_generated.type', 'trial'
|
|
|
|
setting 'xpack.idp.enabled', 'true'
|
|
setting 'xpack.idp.entity_id', 'https://idp.test.es.elasticsearch.org/'
|
|
setting 'xpack.idp.sso_endpoint.redirect', 'http://idp.test.es.elasticsearch.org/test/saml/redirect'
|
|
setting 'xpack.idp.signing.certificate', 'idp-sign.crt'
|
|
setting 'xpack.idp.signing.key', 'idp-sign.key'
|
|
setting 'xpack.idp.privileges.application', 'elastic-cloud'
|
|
|
|
setting 'xpack.security.enabled', 'true'
|
|
setting 'xpack.security.authc.token.enabled', 'true'
|
|
setting 'xpack.security.authc.api_key.enabled', 'true'
|
|
setting 'xpack.security.authc.realms.file.file.order', '0'
|
|
setting 'xpack.security.authc.realms.native.native.order', '1'
|
|
setting 'xpack.security.authc.realms.saml.cloud-saml.order', '2'
|
|
setting 'xpack.security.authc.realms.saml.cloud-saml.idp.entity_id', 'https://idp.test.es.elasticsearch.org/'
|
|
setting 'xpack.security.authc.realms.saml.cloud-saml.idp.metadata.path', 'idp-metadata.xml'
|
|
setting 'xpack.security.authc.realms.saml.cloud-saml.sp.entity_id', 'ec:123456:abcdefg'
|
|
// This is a dummy one, we simulate the browser and a web app in our tests
|
|
setting 'xpack.security.authc.realms.saml.cloud-saml.sp.acs', 'https://sp1.test.es.elasticsearch.org/saml/acs'
|
|
setting 'xpack.security.authc.realms.saml.cloud-saml.attributes.principal', 'https://idp.test.es.elasticsearch.org/attribute/principal'
|
|
setting 'xpack.security.authc.realms.saml.cloud-saml.attributes.name', 'https://idp.test.es.elasticsearch.org/attribute/name'
|
|
setting 'logger.org.elasticsearch.xpack.security.authc.saml', 'TRACE'
|
|
setting 'logger.org.elasticsearch.xpack.idp', 'TRACE'
|
|
extraConfigFile 'roles.yml', file('src/test/resources/roles.yml')
|
|
extraConfigFile 'idp-sign.crt', file('src/test/resources/idp-sign.crt')
|
|
extraConfigFile 'idp-sign.key', file('src/test/resources/idp-sign.key')
|
|
extraConfigFile 'wildcard_services.json', file('src/test/resources/wildcard_services.json')
|
|
// The SAML SP is preconfigured with the metadata of the IDP
|
|
extraConfigFile 'idp-metadata.xml', file('src/test/resources/idp-metadata.xml')
|
|
|
|
user username: "admin_user", password: "admin-password"
|
|
user username: "idp_admin", password: "idp-password", role: "idp_admin"
|
|
user username: "idp_user", password: "idp-password", role: "idp_user"
|
|
}
|