mirror of
https://github.com/Alfresco/SearchServices.git
synced 2025-09-17 14:21:20 +00:00
ACS-2566 Make e2e tests work with Shared Secret Authentication
This commit is contained in:
@@ -10,9 +10,9 @@
|
||||
<name>Search Analytics E2E Tests</name>
|
||||
<description>Test Project to test Search Service and Analytics Features on a complete setup of Alfresco, Share</description>
|
||||
<properties>
|
||||
<tas.rest.api.version>1.70</tas.rest.api.version>
|
||||
<tas.rest.api.version>1.73</tas.rest.api.version>
|
||||
<tas.cmis.api.version>1.31</tas.cmis.api.version>
|
||||
<tas.utility.version>3.0.45</tas.utility.version>
|
||||
<tas.utility.version>3.0.48</tas.utility.version>
|
||||
<rm.version>3.3.1</rm.version>
|
||||
<suiteXmlFile>src/test/resources/SearchSuite.xml</suiteXmlFile>
|
||||
<test.exclude />
|
||||
|
@@ -129,7 +129,7 @@ def getSolrcoreReplacements(sharding, communication, fingerprint):
|
||||
solrcoreReplacements['alfresco.encryption.ssl.truststore.location=.*'] = 'alfresco.encryption.ssl.truststore.location=\\\\\\/opt\\\\\\/alfresco-search-services\\\\\\/keystore\\\\\\/ssl-repo-client.truststore'
|
||||
solrcoreReplacements['alfresco.encryption.ssl.truststore.type=.*'] = 'alfresco.encryption.ssl.truststore.type=JCEKS'
|
||||
elif communication == 'none':
|
||||
solrcoreReplacements['alfresco.secureComms=https'] = 'alfresco.secureComms=none'
|
||||
solrcoreReplacements['alfresco.secureComms=https'] = r'alfresco.secureComms=none\\\\\\\nalfresco.allowUnauthenticatedSolrEndpoint=true'
|
||||
else :
|
||||
solrcoreReplacements['alfresco.secureComms=https'] = 'alfresco.secureComms=secret'
|
||||
return solrcoreReplacements
|
||||
@@ -331,6 +331,8 @@ if __name__ == '__main__':
|
||||
if args.communication == 'mtls':
|
||||
addAlfrescoMtlsConfig(dcYaml['services']['alfresco']['build']['args'])
|
||||
addAlfrescoVolumes(dcYaml['services']['alfresco'])
|
||||
elif args.communication == 'none':
|
||||
dcYaml['services']['alfresco']['build']['args']['SOLR_COMMS'] = 'none'
|
||||
|
||||
if not args.share:
|
||||
deleteServices(dcYaml, 'share', 'alfresco-pdf-renderer', 'imagemagick')
|
||||
|
@@ -42,6 +42,12 @@ RUN if [ "$$SOLR_COMMS" == "https" ] ; then \
|
||||
truststoreFile=\"\/usr\/local\/tomcat\/alf_data\/keystore\/ssl.truststore\"\n\
|
||||
truststorePass=\"$${TRUSTSTORE_PASS}\" truststoreType=\"$${TRUSTSTORE_TYPE}\" clientAuth=\"want\" sslProtocol=\"TLS\">\n\
|
||||
<\/Connector>/g" $${TOMCAT_DIR}/conf/server.xml; \
|
||||
elif [ "$$SOLR_COMMS" == "none" ] ; then \
|
||||
sed -i "s/<filter-class>org.alfresco.web.app.servlet.AlfrescoX509ServletFilter<\/filter-class>/&\n\
|
||||
<init-param>\n\
|
||||
<param-name>allow-unauthenticated-solr-endpoint<\/param-name>\n\
|
||||
<param-value>true<\/param-value>\n\
|
||||
<\/init-param>/" $${TOMCAT_DIR}/webapps/alfresco/WEB-INF/web.xml; \
|
||||
fi
|
||||
|
||||
# Expose keystore folder
|
||||
|
@@ -19,6 +19,7 @@ rest.rmPath=alfresco/api/-default-/public/gs/versions/1
|
||||
solr.scheme=http
|
||||
solr.server=localhost
|
||||
solr.port=8083
|
||||
solr.secret=secret
|
||||
|
||||
#Solr Indexing Time
|
||||
# Use 1s and 60 attempts, see AbstractE2EFunctionalTest.SEARCH_MAX_ATTEMPTS
|
||||
|
@@ -73,7 +73,7 @@ public class SecretSharedPropertyCollector
|
||||
// Shared configuration (shared.properties file)
|
||||
PROPERTY_LOCATORS.add((name, defaultValue) -> toSet(AlfrescoSolrDataModel.getCommonConfig().getProperty(name)));
|
||||
// Configuration for each deployed SOLR Core
|
||||
PROPERTY_LOCATORS.add((name, defaultValue) -> SecretSharedPropertyHelper.getPropertyFromCores(name, defaultValue));
|
||||
PROPERTY_LOCATORS.add(SecretSharedPropertyHelper::getPropertyFromCores);
|
||||
}
|
||||
|
||||
/**
|
||||
|
Reference in New Issue
Block a user