Skip to content

Commit 35bf534

Browse files
authored
Fix SecurityApiKey and ApplicationPrivilegesApi integration tests (#3881)
* Simplify SecurityApiKeyTests * Ensure unique username for ApplicationPrivileges integration test to avoid conflicts with users created in other tests.
1 parent 3094791 commit 35bf534

File tree

2 files changed

+10
-92
lines changed

2 files changed

+10
-92
lines changed

src/Tests/Tests/XPack/Security/ApiKey/SecurityApiKeyTests.cs

Lines changed: 4 additions & 86 deletions
Original file line numberDiff line numberDiff line change
@@ -13,116 +13,34 @@ namespace Tests.XPack.Security.ApiKey
1313
[SkipVersion("<6.7.0", "Security Api Keys are modelled against 6.7.0")]
1414
public class SecurityApiKeyTests : CoordinatedIntegrationTestBase<XPackCluster>
1515
{
16-
private const string PutRoleStep = nameof(PutRoleStep);
1716
private const string PutUserStep = nameof(PutUserStep);
18-
private const string PutPrivilegesStep = nameof(PutPrivilegesStep);
1917
private const string CreateApiKeyWithRolesStep = nameof(CreateApiKeyWithRolesStep);
2018
private const string CreateApiKeyWithNoRolesStep = nameof(CreateApiKeyWithNoRolesStep);
2119
private const string GetApiKeyStep = nameof(GetApiKeyStep);
2220
private const string InvalidateApiKeyStep = nameof(InvalidateApiKeyStep);
2321

2422
public SecurityApiKeyTests(XPackCluster cluster, EndpointUsage usage) : base(new CoordinatedUsage(cluster, usage)
2523
{
26-
{
27-
PutRoleStep, u =>
28-
u.Calls<PutRoleDescriptor, PutRoleRequest, IPutRoleRequest, PutRoleResponse>(
29-
v => new PutRoleRequest($"role-{v}")
30-
{
31-
Cluster = new[] { "all" },
32-
Indices = new IIndicesPrivileges[]
33-
{
34-
new IndicesPrivileges
35-
{
36-
Names = "*",
37-
Privileges = new [] { "all" }
38-
}
39-
},
40-
Applications = new IApplicationPrivileges[]
41-
{
42-
new ApplicationPrivileges
43-
{
44-
Application = $"app-{v}",
45-
Privileges = new [] { "*" },
46-
Resources = new [] { "*" }
47-
}
48-
}
49-
},
50-
(v, d) => d
51-
.Cluster("all")
52-
// ReSharper disable once PossiblyMistakenUseOfParamsMethod
53-
.Indices(i => i.Add<object>(p => p.Names("*").Privileges("all")))
54-
.Applications(i => i.Add(p => p.Application($"app-{v}").Privileges("*").Resources("*")))
55-
,
56-
(v, c, f) => c.Security.PutRole($"role-{v}", f),
57-
(v, c, f) => c.Security.PutRoleAsync($"role-{v}", f),
58-
(v, c, r) => c.Security.PutRole(r),
59-
(v, c, r) => c.Security.PutRoleAsync(r)
60-
)
61-
},
6224
{
6325
PutUserStep, u =>
6426
u.Calls<PutUserDescriptor, PutUserRequest, IPutUserRequest, PutUserResponse>(
6527
v => new PutUserRequest($"user-{v}")
6628
{
6729
Password = "password",
68-
Roles = new[] { $"role-{v}", "superuser" },
69-
FullName = "API key user"
30+
Roles = new[] { "superuser" },
31+
FullName = "API key superuser"
7032
},
7133
(v, d) => d
7234
.Password("password")
73-
.Roles($"role-{v}", "superuser")
74-
.FullName("API key user")
35+
.Roles("superuser")
36+
.FullName("API key superuser")
7537
,
7638
(v, c, f) => c.Security.PutUser($"user-{v}", f),
7739
(v, c, f) => c.Security.PutUserAsync($"user-{v}", f),
7840
(v, c, r) => c.Security.PutUser(r),
7941
(v, c, r) => c.Security.PutUserAsync(r)
8042
)
8143
},
82-
{
83-
PutPrivilegesStep, u =>
84-
u.Calls<PutPrivilegesDescriptor, PutPrivilegesRequest, IPutPrivilegesRequest, PutPrivilegesResponse>(
85-
v => new PutPrivilegesRequest
86-
{
87-
Applications = new AppPrivileges
88-
{
89-
{
90-
$"app-{v}", new Nest.Privileges
91-
{
92-
{
93-
$"read", new PrivilegesActions
94-
{
95-
Actions = new[] { "data:read/*" }
96-
}
97-
},
98-
{
99-
$"write", new PrivilegesActions
100-
{
101-
Actions = new[] { "data:write/*" }
102-
}
103-
}
104-
}
105-
}
106-
}
107-
},
108-
(v, d) => d
109-
.Applications(a => a
110-
.Application($"app-{v}", pr => pr
111-
.Privilege($"read", ac => ac
112-
.Actions("data:read/*")
113-
)
114-
.Privilege($"write", ac => ac
115-
.Actions("data:write/*")
116-
)
117-
)
118-
)
119-
,
120-
(v, c, f) => c.Security.PutPrivileges(f),
121-
(v, c, f) => c.Security.PutPrivilegesAsync(f),
122-
(v, c, r) => c.Security.PutPrivileges(r),
123-
(v, c, r) => c.Security.PutPrivilegesAsync(r)
124-
)
125-
},
12644
{
12745
CreateApiKeyWithRolesStep, u =>
12846
u.Calls<CreateApiKeyDescriptor, CreateApiKeyRequest, ICreateApiKeyRequest, CreateApiKeyResponse>(

src/Tests/Tests/XPack/Security/Privileges/ApplicationPrivilegesApiTests.cs

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ public ApplicationPrivilegesApiTests(XPackCluster cluster, EndpointUsage usage)
8484
))
8585
},
8686
{
87-
PutUserStep, u => u.Call((v, c) => c.Security.PutUserAsync($"user-{v}",
87+
PutUserStep, u => u.Call((v, c) => c.Security.PutUserAsync($"user-ap-{v}",
8888
r => r.Roles("admin", $"role-{v}").Password($"pass-{v}")))
8989
},
9090
{
@@ -93,7 +93,7 @@ public ApplicationPrivilegesApiTests(XPackCluster cluster, EndpointUsage usage)
9393
{
9494
RequestConfiguration = new RequestConfiguration
9595
{
96-
BasicAuthenticationCredentials = new BasicAuthenticationCredentials($"user-{v}", $"pass-{v}")
96+
BasicAuthenticationCredentials = new BasicAuthenticationCredentials($"user-ap-{v}", $"pass-{v}")
9797
},
9898
Application = new[]
9999
{
@@ -106,7 +106,7 @@ public ApplicationPrivilegesApiTests(XPackCluster cluster, EndpointUsage usage)
106106
}
107107
},
108108
(v, d) => d
109-
.RequestConfiguration(r=>r.BasicAuthentication($"user-{v}", $"pass-{v}"))
109+
.RequestConfiguration(r=>r.BasicAuthentication($"user-ap-{v}", $"pass-{v}"))
110110
.Applications(apps => apps
111111
.Application(a => a
112112
.Name($"app-{v}")
@@ -127,10 +127,10 @@ public ApplicationPrivilegesApiTests(XPackCluster cluster, EndpointUsage usage)
127127
{
128128
RequestConfiguration = new RequestConfiguration
129129
{
130-
BasicAuthenticationCredentials = new BasicAuthenticationCredentials($"user-{v}", $"pass-{v}")
130+
BasicAuthenticationCredentials = new BasicAuthenticationCredentials($"user-ap-{v}", $"pass-{v}")
131131
}
132132
},
133-
(v, d) => d.RequestConfiguration(r=>r.BasicAuthentication($"user-{v}", $"pass-{v}")),
133+
(v, d) => d.RequestConfiguration(r=>r.BasicAuthentication($"user-ap-{v}", $"pass-{v}")),
134134
(v, c, f) => c.Security.GetUserPrivileges(f),
135135
(v, c, f) => c.Security.GetUserPrivilegesAsync(f),
136136
(v, c, r) => c.Security.GetUserPrivileges(r),
@@ -201,7 +201,7 @@ [I] public async Task HasPrivilegesResponse() => await Assert<HasPrivilegesRespo
201201
{
202202
r.IsValid.Should().BeTrue();
203203
r.ApiCall.HttpStatusCode.Should().Be(200);
204-
r.Username.Should().Be($"user-{v}");
204+
r.Username.Should().Be($"user-ap-{v}");
205205
r.HasAllRequested.Should().Be(true);
206206
r.Applications.Should().NotBeEmpty();
207207
var app = $"app-{v}";

0 commit comments

Comments
 (0)