Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[7.x] Migrate tutorial resources (#64298) #65099

Closed

Conversation

DianaDerevyankina
Copy link
Contributor

Backports the following commits to 7.x:

* Migrate tutorial resources

Closes elastic#55710

* Added type to context in apm plugin index

* Removed context parameter  from ApmPlugin

* Generated apm plugin by generate_plugin script

* Removed getGreeting declaration

* Remove unused assets and comment previewImagePaths

* Removed unnecessary types file

Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
@DianaDerevyankina
Copy link
Contributor Author

jenkins, test this

@kibanamachine
Copy link
Contributor

💔 Build Failed

Failed CI Steps


Test Failures

Kibana Pipeline / kibana-xpack-agent / X-Pack Kerberos API with Anonymous Access Integration Tests.x-pack/test/kerberos_api_integration/apis/security/kerberos_login·ts.apis Kerberos security Kerberos authentication finishing SPNEGO should properly set cookie and authenticate user

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has failed 1 times on tracked branches: https://dryrun

[00:00:00]       │
[00:00:00]         └-: apis Kerberos
[00:00:00]           └-> "before all" hook
[00:00:00]           └-: security
[00:00:00]             └-> "before all" hook
[00:00:00]             └-: Kerberos authentication
[00:00:00]               └-> "before all" hook
[00:00:00]               └-> "before all" hook
[00:00:00]               └-> should reject API requests if client is not authenticated
[00:00:00]                 └-> "before each" hook: global before each
[00:00:00]                 │ info [o.e.x.s.a.AuthenticationService] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] Authentication of [<Kerberos Token>] was terminated by realm [kerb1] - failed to authenticate user, gss context negotiation failure
[00:00:00]                 │ proc [kibana]   log   [21:50:25.246] [info][authentication][plugins][security] Authentication attempt failed: Unauthorized
[00:00:00]                 └- ✓ pass  (92ms) "apis Kerberos security Kerberos authentication should reject API requests if client is not authenticated"
[00:00:00]               └-> does not prevent basic login
[00:00:00]                 └-> "before each" hook: global before each
[00:00:00]                 └- ✓ pass  (105ms) "apis Kerberos security Kerberos authentication does not prevent basic login"
[00:00:00]               └-: initiating SPNEGO
[00:00:00]                 └-> "before all" hook
[00:00:00]               └-: finishing SPNEGO
[00:00:00]                 └-> "before all" hook
[00:00:00]                 └-> should properly set cookie and authenticate user
[00:00:00]                   └-> "before each" hook: global before each
[00:00:00]                   │ info [o.e.x.s.s.SecurityIndexManager] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] security index does not exist. Creating [.security-tokens-7] with alias [.security-tokens]
[00:00:00]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] applying create index request using v1 templates []
[00:00:00]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] [.security-tokens-7] creating index, cause [api], templates [], shards [1]/[0], mappings [_doc]
[00:00:01]                   └- ✖ fail: "apis Kerberos security Kerberos authentication finishing SPNEGO should properly set cookie and authenticate user"
[00:00:01]                   │

Stack Trace

{ Error: expected { username: 'tester@TEST.ELASTIC.CO',
  roles: [ 'kibana_admin' ],
  full_name: null,
  email: null,
  metadata:
   { kerberos_user_principal_name: 'tester@TEST.ELASTIC.CO',
     kerberos_realm: 'TEST.ELASTIC.CO' },
  enabled: true,
  authentication_realm: { name: 'kerb1', type: 'kerberos' },
  lookup_realm: { name: 'kerb1', type: 'kerberos' },
  authentication_provider: 'kerberos' } response body, got { username: 'tester@TEST.ELASTIC.CO',
  roles: [ 'kibana_admin', 'superuser' ],
  full_name: null,
  email: null,
  metadata:
   { kerberos_user_principal_name: 'tester@TEST.ELASTIC.CO',
     kerberos_realm: 'TEST.ELASTIC.CO' },
  enabled: true,
  authentication_realm: { name: 'kerb1', type: 'kerberos' },
  lookup_realm: { name: 'kerb1', type: 'kerberos' },
  authentication_provider: 'kerberos' }
    at error (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:301:13)
    at Test._assertBody (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:205:14)
    at Test._assertFunction (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:283:11)
    at Test.assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:173:18)
    at assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:131:12)
    at /dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:128:5
    at Test.Request.callback (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/index.js:706:12)
    at parser (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/index.js:906:18)
    at IncomingMessage.res.on (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/parsers/json.js:19:7)
    at endReadableNT (_stream_readable.js:1145:12)
    at process._tickCallback (internal/process/next_tick.js:63:19)
  expected:
   '{\n  "authentication_provider": "kerberos"\n  "authentication_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "email": [null]\n  "enabled": true\n  "full_name": [null]\n  "lookup_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "metadata": {\n    "kerberos_realm": "TEST.ELASTIC.CO"\n    "kerberos_user_principal_name": "tester@TEST.ELASTIC.CO"\n  }\n  "roles": [\n    "kibana_admin"\n  ]\n  "username": "tester@TEST.ELASTIC.CO"\n}',
  actual:
   '{\n  "authentication_provider": "kerberos"\n  "authentication_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "email": [null]\n  "enabled": true\n  "full_name": [null]\n  "lookup_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "metadata": {\n    "kerberos_realm": "TEST.ELASTIC.CO"\n    "kerberos_user_principal_name": "tester@TEST.ELASTIC.CO"\n  }\n  "roles": [\n    "kibana_admin"\n    "superuser"\n  ]\n  "username": "tester@TEST.ELASTIC.CO"\n}',
  showDiff: true }

Kibana Pipeline / kibana-xpack-agent / X-Pack Kerberos API with Anonymous Access Integration Tests.x-pack/test/kerberos_api_integration/apis/security/kerberos_login·ts.apis Kerberos security Kerberos authentication finishing SPNEGO should properly set cookie and authenticate user

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has not failed recently on tracked branches

[00:00:00]       │
[00:00:00]         └-: apis Kerberos
[00:00:00]           └-> "before all" hook
[00:00:00]           └-: security
[00:00:00]             └-> "before all" hook
[00:00:00]             └-: Kerberos authentication
[00:00:00]               └-> "before all" hook
[00:00:00]               └-> "before all" hook
[00:00:00]               └-> should reject API requests if client is not authenticated
[00:00:00]                 └-> "before each" hook: global before each
[00:00:00]                 │ info [o.e.x.s.a.AuthenticationService] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] Authentication of [<Kerberos Token>] was terminated by realm [kerb1] - failed to authenticate user, gss context negotiation failure
[00:00:00]                 │ proc [kibana]   log   [21:19:34.304] [info][authentication][plugins][security] Authentication attempt failed: Unauthorized
[00:00:00]                 └- ✓ pass  (115ms) "apis Kerberos security Kerberos authentication should reject API requests if client is not authenticated"
[00:00:00]               └-> does not prevent basic login
[00:00:00]                 └-> "before each" hook: global before each
[00:00:00]                 └- ✓ pass  (191ms) "apis Kerberos security Kerberos authentication does not prevent basic login"
[00:00:00]               └-: initiating SPNEGO
[00:00:00]                 └-> "before all" hook
[00:00:00]               └-: finishing SPNEGO
[00:00:00]                 └-> "before all" hook
[00:00:00]                 └-> should properly set cookie and authenticate user
[00:00:00]                   └-> "before each" hook: global before each
[00:00:00]                   │ info [o.e.x.s.s.SecurityIndexManager] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] security index does not exist. Creating [.security-tokens-7] with alias [.security-tokens]
[00:00:00]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] applying create index request using v1 templates []
[00:00:00]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-oraclelinux-tests-xl-1588622819328124276] [.security-tokens-7] creating index, cause [api], templates [], shards [1]/[0], mappings [_doc]
[00:00:02]                   └- ✖ fail: "apis Kerberos security Kerberos authentication finishing SPNEGO should properly set cookie and authenticate user"
[00:00:02]                   │

Stack Trace

{ Error: expected { username: 'tester@TEST.ELASTIC.CO',
  roles: [ 'kibana_admin' ],
  full_name: null,
  email: null,
  metadata:
   { kerberos_user_principal_name: 'tester@TEST.ELASTIC.CO',
     kerberos_realm: 'TEST.ELASTIC.CO' },
  enabled: true,
  authentication_realm: { name: 'kerb1', type: 'kerberos' },
  lookup_realm: { name: 'kerb1', type: 'kerberos' },
  authentication_provider: 'kerberos' } response body, got { username: 'tester@TEST.ELASTIC.CO',
  roles: [ 'kibana_admin', 'superuser' ],
  full_name: null,
  email: null,
  metadata:
   { kerberos_user_principal_name: 'tester@TEST.ELASTIC.CO',
     kerberos_realm: 'TEST.ELASTIC.CO' },
  enabled: true,
  authentication_realm: { name: 'kerb1', type: 'kerberos' },
  lookup_realm: { name: 'kerb1', type: 'kerberos' },
  authentication_provider: 'kerberos' }
    at error (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:301:13)
    at Test._assertBody (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:205:14)
    at Test._assertFunction (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:283:11)
    at Test.assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:173:18)
    at assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:131:12)
    at /dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:128:5
    at Test.Request.callback (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/index.js:706:12)
    at parser (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/index.js:906:18)
    at IncomingMessage.res.on (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/parsers/json.js:19:7)
    at endReadableNT (_stream_readable.js:1145:12)
    at process._tickCallback (internal/process/next_tick.js:63:19)
  expected:
   '{\n  "authentication_provider": "kerberos"\n  "authentication_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "email": [null]\n  "enabled": true\n  "full_name": [null]\n  "lookup_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "metadata": {\n    "kerberos_realm": "TEST.ELASTIC.CO"\n    "kerberos_user_principal_name": "tester@TEST.ELASTIC.CO"\n  }\n  "roles": [\n    "kibana_admin"\n  ]\n  "username": "tester@TEST.ELASTIC.CO"\n}',
  actual:
   '{\n  "authentication_provider": "kerberos"\n  "authentication_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "email": [null]\n  "enabled": true\n  "full_name": [null]\n  "lookup_realm": {\n    "name": "kerb1"\n    "type": "kerberos"\n  }\n  "metadata": {\n    "kerberos_realm": "TEST.ELASTIC.CO"\n    "kerberos_user_principal_name": "tester@TEST.ELASTIC.CO"\n  }\n  "roles": [\n    "kibana_admin"\n    "superuser"\n  ]\n  "username": "tester@TEST.ELASTIC.CO"\n}',
  showDiff: true }

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

@DianaDerevyankina DianaDerevyankina deleted the backport/7.x/pr-64298 branch May 5, 2020 08:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants