* [meta] refactor kitchen tests This commit update kitchen tests to match important feature to test: - default: test a deployment with all default values - license: test a deployment with a license and default values - trial: test a deployment with security enabled and trial license - oss: test a deployment with oss version and default values (6.x only) - upgrade: test an upgrade from a previous version - oss-upgrade: test an upgrade with oss version (6.x only) - oss-to-default-upgrade: test an upgrade from previous oss to latest default version - custom_config: test a deployment with custom config files - security: test a deployment with security enabled * [meta] fix license test
88 lines
3.3 KiB
Ruby
88 lines
3.3 KiB
Ruby
require 'spec_helper'
|
|
require 'json'
|
|
require 'pathname'
|
|
vars = JSON.parse(File.read('/tmp/vars.json'))
|
|
|
|
es_api_url = "#{vars['es_api_scheme']}://localhost:#{vars['es_api_port']}"
|
|
username = vars['es_api_basic_auth_username']
|
|
password = vars['es_api_basic_auth_password']
|
|
es_keystore = Pathname.new(vars['es_ssl_keystore']).basename.to_s
|
|
es_truststore = Pathname.new(vars['es_ssl_truststore']).basename.to_s
|
|
|
|
if vars['es_major_version'] == '7.x'
|
|
es_security_api = "_security"
|
|
else
|
|
es_security_api = "_xpack/security"
|
|
end
|
|
|
|
shared_examples 'security::init' do |vars|
|
|
#Test users file, users_roles and roles.yml
|
|
describe file("/etc/elasticsearch/users_roles") do
|
|
it { should be_owned_by 'root' }
|
|
it { should contain 'admin:es_admin' }
|
|
it { should contain 'power_user:testUser' }
|
|
end
|
|
|
|
describe file("/etc/elasticsearch/users") do
|
|
it { should be_owned_by 'root' }
|
|
it { should contain 'testUser:' }
|
|
it { should contain 'es_admin:' }
|
|
end
|
|
|
|
describe 'security roles' do
|
|
it 'should list the security roles' do
|
|
roles = curl_json("#{es_api_url}/#{es_security_api}/role", username='es_admin', password='changeMeAgain')
|
|
expect(roles.key?('superuser'))
|
|
end
|
|
end
|
|
|
|
describe file("/etc/elasticsearch/elasticsearch.yml") do
|
|
if vars['es_major_version'] == '7.x'
|
|
it { should contain 'security.authc.realms.file.file1.order: 0' }
|
|
else
|
|
it { should contain 'security.authc.realms.file1.order: 0' }
|
|
it { should contain 'security.authc.realms.file1.type: file' }
|
|
end
|
|
it { should contain 'xpack.security.transport.ssl.enabled: true' }
|
|
it { should contain 'xpack.security.http.ssl.enabled: true' }
|
|
it { should contain es_keystore }
|
|
it { should contain es_truststore }
|
|
end
|
|
|
|
#Test contents of role_mapping.yml
|
|
describe file("/etc/elasticsearch/role_mapping.yml") do
|
|
it { should be_owned_by 'root' }
|
|
it { should contain 'power_user:' }
|
|
it { should contain 'user:' }
|
|
end
|
|
|
|
#check accounts are correct i.e. we can auth and they have the correct roles
|
|
describe 'security users' do
|
|
result = curl_json("#{es_api_url}/#{es_security_api}/user", username=username, password=password)
|
|
it 'should have the elastic user' do
|
|
expect(result['elastic']['username']).to eq('elastic')
|
|
expect(result['elastic']['roles']).to eq(['superuser'])
|
|
expect(result['elastic']['enabled']).to eq(true)
|
|
end
|
|
it 'should have the kibana user' do
|
|
expect(result['kibana']['username']).to eq('kibana')
|
|
expect(result['kibana']['roles']).to eq(['kibana_system'])
|
|
expect(result['kibana']['enabled']).to eq(true)
|
|
end
|
|
it 'should have the logstash user' do
|
|
expect(result['logstash_system']['username']).to eq('logstash_system')
|
|
expect(result['logstash_system']['roles']).to eq(['logstash_system'])
|
|
expect(result['logstash_system']['enabled']).to eq(true)
|
|
end
|
|
end
|
|
|
|
describe 'SSL certificate check' do
|
|
certificates = curl_json("#{es_api_url}/_ssl/certificates", username=username, password=password)
|
|
it 'should list the keystore file' do
|
|
expect(certificates.any? { |cert| cert['path'].include? es_keystore }).to be true
|
|
end
|
|
it 'should list the truststore file' do
|
|
expect(certificates.any? { |cert| cert['path'].include? es_truststore }).to be true
|
|
end
|
|
end
|
|
end
|