forked from elastic/kibana
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[Data Usage] add functional tests for privileges (elastic#199377)
## Summary functional tests for data usage plugin privileges and roles (cherry picked from commit 0ab841f)
- Loading branch information
Showing
4 changed files
with
124 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
105 changes: 105 additions & 0 deletions
105
x-pack/test_serverless/functional/test_suites/common/data_usage/privileges.ts
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,105 @@ | ||
/* | ||
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one | ||
* or more contributor license agreements. Licensed under the Elastic License | ||
* 2.0; you may not use this file except in compliance with the Elastic License | ||
* 2.0. | ||
*/ | ||
|
||
import { FtrProviderContext } from '../../../ftr_provider_context'; | ||
|
||
export default ({ getPageObjects, getService }: FtrProviderContext) => { | ||
const pageObjects = getPageObjects(['svlCommonPage', 'svlManagementPage', 'common']); | ||
const testSubjects = getService('testSubjects'); | ||
const samlAuth = getService('samlAuth'); | ||
const retry = getService('retry'); | ||
const dataUsageAppUrl = 'management/data/data_usage'; | ||
|
||
const navigateAndVerify = async (expectedVisible: boolean) => { | ||
await pageObjects.common.navigateToApp('management'); | ||
await retry.waitFor('page to be visible', async () => | ||
testSubjects.exists('cards-navigation-page') | ||
); | ||
|
||
if (expectedVisible) { | ||
await pageObjects.svlManagementPage.assertDataUsageManagementCardExists(); | ||
await pageObjects.common.navigateToApp(dataUsageAppUrl); | ||
await testSubjects.exists('DataUsagePage'); | ||
} else { | ||
await pageObjects.svlManagementPage.assertDataUsageManagementCardDoesNotExist(); | ||
await pageObjects.common.navigateToApp(dataUsageAppUrl); | ||
await testSubjects.missingOrFail('DataUsagePage'); | ||
} | ||
}; | ||
|
||
describe('privileges', function () { | ||
// plugin needs to be enabled in serverless | ||
this.tags(['skipMKI']); | ||
|
||
it('renders for the admin role', async () => { | ||
await pageObjects.svlCommonPage.loginAsAdmin(); | ||
await navigateAndVerify(true); | ||
}); | ||
|
||
it('does not render for viewer', async () => { | ||
await pageObjects.svlCommonPage.loginAsViewer(); | ||
await navigateAndVerify(false); | ||
}); | ||
describe('with editor role', function () { | ||
// editor role does not exist in search solution | ||
this.tags(['skipSvlSearch']); | ||
it('does not render for default (editor) role', async () => { | ||
await pageObjects.svlCommonPage.loginAsEditor(); | ||
await navigateAndVerify(false); | ||
}); | ||
}); | ||
describe('with developer role', function () { | ||
// developer role only exists in ecs solution | ||
this.tags(['skipSvlOblt', 'skipSvlSec']); | ||
it('renders for developer role', async () => { | ||
await pageObjects.svlCommonPage.loginAsDeveloper(); | ||
await navigateAndVerify(true); | ||
}); | ||
}); | ||
describe('with custom role', function () { | ||
// custom roles aren't available in observability yet | ||
this.tags(['skipSvlOblt']); | ||
afterEach(async () => { | ||
await samlAuth.deleteCustomRole(); | ||
}); | ||
it('renders with a custom role that has the monitor cluster privilege', async () => { | ||
await samlAuth.setCustomRole({ | ||
elasticsearch: { | ||
cluster: ['monitor'], | ||
indices: [{ names: ['*'], privileges: ['all'] }], | ||
}, | ||
kibana: [ | ||
{ | ||
base: ['all'], | ||
feature: {}, | ||
spaces: ['*'], | ||
}, | ||
], | ||
}); | ||
await pageObjects.svlCommonPage.loginWithCustomRole(); | ||
await navigateAndVerify(true); | ||
}); | ||
|
||
it('does not render with a custom role that does not have the monitor cluster privilege', async () => { | ||
await samlAuth.setCustomRole({ | ||
elasticsearch: { | ||
indices: [{ names: ['*'], privileges: ['all'] }], | ||
}, | ||
kibana: [ | ||
{ | ||
base: ['all'], | ||
feature: {}, | ||
spaces: ['*'], | ||
}, | ||
], | ||
}); | ||
await pageObjects.svlCommonPage.loginWithCustomRole(); | ||
await navigateAndVerify(false); | ||
}); | ||
}); | ||
}); | ||
}; |