From ffa479dd82a4ed51b2067d4f6ddaaa650e9b572e Mon Sep 17 00:00:00 2001 From: Aleh Zasypkin Date: Wed, 10 Jun 2020 12:11:43 +0200 Subject: [PATCH] [7.8] Partial revert of "Sync Kerberos + Anonymous access tests with the latest `security/_authenticate` API (user roles now include roles of anonymous user)." (#68624) (#68742) --- .../apis/security/kerberos_login.ts | 12 ++---------- 1 file changed, 2 insertions(+), 10 deletions(-) diff --git a/x-pack/test/kerberos_api_integration/apis/security/kerberos_login.ts b/x-pack/test/kerberos_api_integration/apis/security/kerberos_login.ts index 6a93b94920d6d..8d2e575fad313 100644 --- a/x-pack/test/kerberos_api_integration/apis/security/kerberos_login.ts +++ b/x-pack/test/kerberos_api_integration/apis/security/kerberos_login.ts @@ -98,8 +98,7 @@ export default function ({ getService }: FtrProviderContext) { }); describe('finishing SPNEGO', () => { - // Skipped: https://github.com/elastic/kibana/issues/68720 - it.skip('should properly set cookie and authenticate user', async () => { + it('should properly set cookie and authenticate user', async () => { const response = await supertest .get('/internal/security/me') .set('Authorization', `Negotiate ${spnegoToken}`) @@ -116,14 +115,7 @@ export default function ({ getService }: FtrProviderContext) { const sessionCookie = request.cookie(cookies[0])!; checkCookieIsSet(sessionCookie); - const isAnonymousAccessEnabled = (config.get( - 'esTestCluster.serverArgs' - ) as string[]).some((setting) => setting.startsWith('xpack.security.authc.anonymous')); - - // `superuser_anonymous` role is derived from the enabled anonymous access. - const expectedUserRoles = isAnonymousAccessEnabled - ? ['kibana_admin', 'superuser_anonymous'] - : ['kibana_admin']; + const expectedUserRoles = ['kibana_admin']; await supertest .get('/internal/security/me')