Skip to content

Conversation

@DianaDerevyankina
Copy link
Contributor

Backports the following commits to 7.x:

* Migrate tutorial resources

Closes elastic#55710

* Added type to context in apm plugin index

* Removed context parameter  from ApmPlugin

* Generated apm plugin by generate_plugin script

* Removed getGreeting declaration

* Remove unused assets and comment previewImagePaths

* Removed unnecessary types file

Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
@DianaDerevyankina DianaDerevyankina added the backport This PR is a backport of another PR label May 4, 2020
@DianaDerevyankina
Copy link
Contributor Author

jenkins, test this

@kibanamachine
Copy link
Contributor

💔 Build Failed

Failed CI Steps


Test Failures

Kibana Pipeline / kibana-xpack-agent / X-Pack Kerberos API with Anonymous Access Integration Tests.x-pack/test/kerberos_api_integration/apis/security/kerberos_login·ts.apis Kerberos security Kerberos authentication finishing SPNEGO should properly set cookie and authenticate user

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has failed 1 times on tracked branches: https://dryrun

[00:00:00]       │
[00:00:00]         └-: apis Kerberos
[00:00:00]           └-> "before all" hook
[00:00:00]           └-: security
[00:00:00]             └-> "before all" hook
[00:00:00]             └-: Kerberos authentication
[00:00:00]               └-> "before all" hook
[00:00:00]               └-> "before all" hook
[00:00:00]               └-> should reject API requests if client is not authenticated
[00:00:00]                 └-> "before each" hook: global before each
[00:00:00]                 │ info [o.e.x.s.a.AuthenticationService] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] Authentication of [<Kerberos Token>] was terminated by realm [kerb1] - failed to authenticate user, gss context negotiation failure
[00:00:00]                 │ proc [kibana]   log   [21:50:25.246] [info][authentication][plugins][security] Authentication attempt failed: Unauthorized
[00:00:00]                 └- ✓ pass  (92ms) "apis Kerberos security Kerberos authentication should reject API requests if client is not authenticated"
[00:00:00]               └-> does not prevent basic login
[00:00:00]                 └-> "before each" hook: global before each
[00:00:00]                 └- ✓ pass  (105ms) "apis Kerberos security Kerberos authentication does not prevent basic login"
[00:00:00]               └-: initiating SPNEGO
[00:00:00]                 └-> "before all" hook
[00:00:00]               └-: finishing SPNEGO
[00:00:00]                 └-> "before all" hook
[00:00:00]                 └-> should properly set cookie and authenticate user
[00:00:00]                   └-> "before each" hook: global before each
[00:00:00]                   │ info [o.e.x.s.s.SecurityIndexManager] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] security index does not exist. Creating [.security-tokens-7] with alias [.security-tokens]
[00:00:00]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] applying create index request using v1 templates []
[00:00:00]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] [.security-tokens-7] creating index, cause [api], templates [], shards [1]/[0], mappings [_doc]
[00:00:01]                   └- ✖ fail: "apis Kerberos security Kerberos authentication finishing SPNEGO should properly set cookie and authenticate user"
[00:00:01]                   │

Stack Trace

{ Error: expected { username: 'tester@TEST.ELASTIC.CO',
  roles: [ 'kibana_admin' ],
  full_name: null,
  email: null,
  metadata:
   { kerberos_user_principal_name: 'tester@TEST.ELASTIC.CO',
     kerberos_realm: 'TEST.ELASTIC.CO' },
  enabled: true,
  authentication_realm: { name: 'kerb1', type: 'kerberos' },
  lookup_realm: { name: 'kerb1', type: 'kerberos' },
  authentication_provider: 'kerberos' } response body, got { username: 'tester@TEST.ELASTIC.CO',
  roles: [ 'kibana_admin', 'superuser' ],
  full_name: null,
  email: null,
  metadata:
   { kerberos_user_principal_name: 'tester@TEST.ELASTIC.CO',
     kerberos_realm: 'TEST.ELASTIC.CO' },
  enabled: true,
  authentication_realm: { name: 'kerb1', type: 'kerberos' },
  lookup_realm: { name: 'kerb1', type: 'kerberos' },
  authentication_provider: 'kerberos' }
    at error (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:301:13)
    at Test._assertBody (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:205:14)
    at Test._assertFunction (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:283:11)
    at Test.assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:173:18)
    at assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:131:12)
    at /dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:128:5
    at Test.Request.callback (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/index.js:706:12)
    at parser (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/index.js:906:18)
    at IncomingMessage.res.on (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/parsers/json.js:19:7)
    at endReadableNT (_stream_readable.js:1145:12)
    at process._tickCallback (internal/process/next_tick.js:63:19)
  expected:
   '{\n  "authentication_provider": "kerberos"\n  "authentication_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "email": [null]\n  "enabled": true\n  "full_name": [null]\n  "lookup_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "metadata": {\n    "kerberos_realm": "TEST.ELASTIC.CO"\n    "kerberos_user_principal_name": "tester@TEST.ELASTIC.CO"\n  }\n  "roles": [\n    "kibana_admin"\n  ]\n  "username": "tester@TEST.ELASTIC.CO"\n}',
  actual:
   '{\n  "authentication_provider": "kerberos"\n  "authentication_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "email": [null]\n  "enabled": true\n  "full_name": [null]\n  "lookup_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "metadata": {\n    "kerberos_realm": "TEST.ELASTIC.CO"\n    "kerberos_user_principal_name": "tester@TEST.ELASTIC.CO"\n  }\n  "roles": [\n    "kibana_admin"\n    "superuser"\n  ]\n  "username": "tester@TEST.ELASTIC.CO"\n}',
  showDiff: true }

Kibana Pipeline / kibana-xpack-agent / X-Pack Kerberos API with Anonymous Access Integration Tests.x-pack/test/kerberos_api_integration/apis/security/kerberos_login·ts.apis Kerberos security Kerberos authentication finishing SPNEGO should properly set cookie and authenticate user

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has not failed recently on tracked branches

[00:00:00]       │
[00:00:00]         └-: apis Kerberos
[00:00:00]           └-> "before all" hook
[00:00:00]           └-: security
[00:00:00]             └-> "before all" hook
[00:00:00]             └-: Kerberos authentication
[00:00:00]               └-> "before all" hook
[00:00:00]               └-> "before all" hook
[00:00:00]               └-> should reject API requests if client is not authenticated
[00:00:00]                 └-> "before each" hook: global before each
[00:00:00]                 │ info [o.e.x.s.a.AuthenticationService] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] Authentication of [<Kerberos Token>] was terminated by realm [kerb1] - failed to authenticate user, gss context negotiation failure
[00:00:00]                 │ proc [kibana]   log   [21:19:34.304] [info][authentication][plugins][security] Authentication attempt failed: Unauthorized
[00:00:00]                 └- ✓ pass  (115ms) "apis Kerberos security Kerberos authentication should reject API requests if client is not authenticated"
[00:00:00]               └-> does not prevent basic login
[00:00:00]                 └-> "before each" hook: global before each
[00:00:00]                 └- ✓ pass  (191ms) "apis Kerberos security Kerberos authentication does not prevent basic login"
[00:00:00]               └-: initiating SPNEGO
[00:00:00]                 └-> "before all" hook
[00:00:00]               └-: finishing SPNEGO
[00:00:00]                 └-> "before all" hook
[00:00:00]                 └-> should properly set cookie and authenticate user
[00:00:00]                   └-> "before each" hook: global before each
[00:00:00]                   │ info [o.e.x.s.s.SecurityIndexManager] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] security index does not exist. Creating [.security-tokens-7] with alias [.security-tokens]
[00:00:00]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] applying create index request using v1 templates []
[00:00:00]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] [.security-tokens-7] creating index, cause [api], templates [], shards [1]/[0], mappings [_doc]
[00:00:02]                   └- ✖ fail: "apis Kerberos security Kerberos authentication finishing SPNEGO should properly set cookie and authenticate user"
[00:00:02]                   │

Stack Trace

{ Error: expected { username: 'tester@TEST.ELASTIC.CO',
  roles: [ 'kibana_admin' ],
  full_name: null,
  email: null,
  metadata:
   { kerberos_user_principal_name: 'tester@TEST.ELASTIC.CO',
     kerberos_realm: 'TEST.ELASTIC.CO' },
  enabled: true,
  authentication_realm: { name: 'kerb1', type: 'kerberos' },
  lookup_realm: { name: 'kerb1', type: 'kerberos' },
  authentication_provider: 'kerberos' } response body, got { username: 'tester@TEST.ELASTIC.CO',
  roles: [ 'kibana_admin', 'superuser' ],
  full_name: null,
  email: null,
  metadata:
   { kerberos_user_principal_name: 'tester@TEST.ELASTIC.CO',
     kerberos_realm: 'TEST.ELASTIC.CO' },
  enabled: true,
  authentication_realm: { name: 'kerb1', type: 'kerberos' },
  lookup_realm: { name: 'kerb1', type: 'kerberos' },
  authentication_provider: 'kerberos' }
    at error (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:301:13)
    at Test._assertBody (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:205:14)
    at Test._assertFunction (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:283:11)
    at Test.assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:173:18)
    at assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:131:12)
    at /dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:128:5
    at Test.Request.callback (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/index.js:706:12)
    at parser (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/index.js:906:18)
    at IncomingMessage.res.on (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/parsers/json.js:19:7)
    at endReadableNT (_stream_readable.js:1145:12)
    at process._tickCallback (internal/process/next_tick.js:63:19)
  expected:
   '{\n  "authentication_provider": "kerberos"\n  "authentication_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "email": [null]\n  "enabled": true\n  "full_name": [null]\n  "lookup_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "metadata": {\n    "kerberos_realm": "TEST.ELASTIC.CO"\n    "kerberos_user_principal_name": "tester@TEST.ELASTIC.CO"\n  }\n  "roles": [\n    "kibana_admin"\n  ]\n  "username": "tester@TEST.ELASTIC.CO"\n}',
  actual:
   '{\n  "authentication_provider": "kerberos"\n  "authentication_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "email": [null]\n  "enabled": true\n  "full_name": [null]\n  "lookup_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "metadata": {\n    "kerberos_realm": "TEST.ELASTIC.CO"\n    "kerberos_user_principal_name": "tester@TEST.ELASTIC.CO"\n  }\n  "roles": [\n    "kibana_admin"\n    "superuser"\n  ]\n  "username": "tester@TEST.ELASTIC.CO"\n}',
  showDiff: true }

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

@DianaDerevyankina DianaDerevyankina deleted the backport/7.x/pr-64298 branch May 5, 2020 08:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport This PR is a backport of another PR

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants