From 9792e8b2b6baf44b0df186f2a4f54ad0c304bc51 Mon Sep 17 00:00:00 2001 From: Craig Rodrigues Date: Thu, 12 Oct 2023 11:18:29 -0700 Subject: [PATCH] Use non-deprecated Kibana SAML callback URL in smoke tests (#98883) /api/security/saml/callback is the correct URL, while /api/security/v1/saml is the deprecated URL. See also: elastic/kibana#81733 Fixes: #99986 --------- Co-authored-by: Craig Rodrigues Signed-off-by: Athena Brown --- docs/changelog/98883.yaml | 6 ++++++ .../plugin/security/qa/smoke-test-all-realms/build.gradle | 2 +- 2 files changed, 7 insertions(+), 1 deletion(-) create mode 100644 docs/changelog/98883.yaml diff --git a/docs/changelog/98883.yaml b/docs/changelog/98883.yaml new file mode 100644 index 0000000000000..a8525a432d142 --- /dev/null +++ b/docs/changelog/98883.yaml @@ -0,0 +1,6 @@ +pr: 99983 +summary: Use non-deprecated SAML callback URL in SAML smoketests +area: Authorization +type: enhancement +issues: + - 99986 diff --git a/x-pack/plugin/security/qa/smoke-test-all-realms/build.gradle b/x-pack/plugin/security/qa/smoke-test-all-realms/build.gradle index ca33b61de4ca5..d80dbe14e6ccb 100644 --- a/x-pack/plugin/security/qa/smoke-test-all-realms/build.gradle +++ b/x-pack/plugin/security/qa/smoke-test-all-realms/build.gradle @@ -62,7 +62,7 @@ testClusters.matching { it.name == 'javaRestTest' }.configureEach { setting 'xpack.security.authc.realms.saml.saml5.idp.metadata.path', 'saml-metadata.xml' setting 'xpack.security.authc.realms.saml.saml5.idp.entity_id', 'http://idp.example.com/' setting 'xpack.security.authc.realms.saml.saml5.sp.entity_id', 'http://kibana.example.net/' - setting 'xpack.security.authc.realms.saml.saml5.sp.acs', 'http://kibana.example.net/api/security/v1/saml' + setting 'xpack.security.authc.realms.saml.saml5.sp.acs', 'http://kibana.example.net/api/security/saml/callback' setting 'xpack.security.authc.realms.saml.saml5.attributes.principal', 'uid' // - Kerberos (configured but won't work because we don't want external fixtures in this test suite) setting 'xpack.security.authc.realms.kerberos.kerb6.order', '6'