Skip to content

Commit 26121b1

Browse files
committed
Fix for CLOUD-3771, Disable elytron security that core-tools layer brings to default config
1 parent b0fc7d6 commit 26121b1

File tree

2 files changed

+15
-1
lines changed
  • jboss/container/eap/galleon/config/ee/artifacts/opt/jboss/container/eap/galleon/eap-s2i-galleon-pack/src/main/resources/configs/standalone/standalone.xml
  • tests/features

2 files changed

+15
-1
lines changed

jboss/container/eap/galleon/config/ee/artifacts/opt/jboss/container/eap/galleon/eap-s2i-galleon-pack/src/main/resources/configs/standalone/standalone.xml/config.xml

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,17 @@
1313
<feature-group name="sso"/>
1414

1515
<!-- management -->
16+
<!-- remove elytron security that core-tools bring, we should be able to exclude management but we can't due to GAL-308 -->
17+
<!-- START workaround GAL-308 -->
18+
<exclude spec="core-service.management.access.identity"/>
19+
<feature spec="core-service.management.management-interface.http-interface">
20+
<param name="socket-binding" value="management-http"/>
21+
<unset param="http-authentication-factory"/>
22+
<feature spec="core-service.management.management-interface.http-interface.http-upgrade">
23+
<unset param="sasl-authentication-factory"/>
24+
</feature>
25+
</feature>
26+
<!-- END workaround GAL-308 -->
1627
<exclude spec="subsystem.core-management"/>
1728
<exclude feature-id="core-service.management.security-realm.server-identity.ssl:security-realm=ApplicationRealm"/>
1829
<feature-group name="os-management"/>

tests/features/sso.feature

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
12
@jboss-eap-7 @jboss-eap-7-tech-preview
23
Feature: OpenShift EAP SSO tests
34

@@ -207,7 +208,9 @@ Feature: OpenShift EAP SSO tests
207208
And XML file /opt/eap/standalone/configuration/standalone-openshift.xml should contain value /tombrady on XPath //*[local-name()='secure-deployment'][@name="app-profile-saml.war"]/*[local-name()='SP']/@logoutPage
208209
And XML file /opt/eap/standalone/configuration/standalone-openshift.xml should contain value true on XPath //*[local-name()='secure-deployment'][@name="app-profile-saml.war"]/*[local-name()='SP']/*[local-name()='Keys']/*[local-name()='Key']/@signing
209210
And XML file /opt/eap/standalone/configuration/standalone-openshift.xml should contain value idp on XPath //*[local-name()='secure-deployment'][@name="app-profile-saml.war"]/*[local-name()='SP']/*[local-name()='IDP']/@entityID
210-
211+
212+
@ignore
213+
# we can't provision an unsecure configuration.
211214
Scenario: SSO, no elytron should give error
212215
Given s2i build https://github.com/redhat-developer/redhat-sso-quickstarts from . with env and true using 7.0.x-ose
213216
| variable | value |

0 commit comments

Comments
 (0)