diff --git a/jboss-kie-wildfly-common/added/launch/jboss-kie-wildfly-security.sh b/jboss-kie-wildfly-common/added/launch/jboss-kie-wildfly-security.sh index bf433643..036f0d8e 100755 --- a/jboss-kie-wildfly-common/added/launch/jboss-kie-wildfly-security.sh +++ b/jboss-kie-wildfly-common/added/launch/jboss-kie-wildfly-security.sh @@ -117,7 +117,7 @@ function get_kie_server_token() { } function get_kie_server_roles() { - local default_kie_roles="kie-server,rest-all,guest" + local default_kie_roles="kie-server,rest-all,user" echo $(find_env "KIE_SERVER_ROLES" "${default_kie_roles}") } @@ -161,7 +161,7 @@ function get_kie_server_controller_token() { } function get_kie_server_controller_roles() { - local default_kie_roles="kie-server,rest-all,guest" + local default_kie_roles="kie-server,rest-all,user" echo $(find_env "KIE_SERVER_CONTROLLER_ROLES" "${default_kie_roles}") } @@ -234,4 +234,4 @@ function add_eap_user() { exit fi fi -} \ No newline at end of file +} diff --git a/jboss-kie-wildfly-common/module.yaml b/jboss-kie-wildfly-common/module.yaml index 1ac981ad..8e83b75a 100644 --- a/jboss-kie-wildfly-common/module.yaml +++ b/jboss-kie-wildfly-common/module.yaml @@ -19,7 +19,7 @@ envs: example: "uid=admin,ou=users,ou=exmample,ou=com" - name: "AUTH_LDAP_DEFAULT_ROLE" description: "A role included for all authenticated users" - example: "guest" + example: "user" - name: "AUTH_LDAP_DISTINGUISHED_NAME_ATTRIBUTE" description: "The name of the attribute in the user entry that contains the DN of the user. This may be necessary if the DN of the user itself contains special characters, backslash for example, that prevent correct user mapping. If the attribute does not exist, the entry’s DN is used." example: "distinguishedName" diff --git a/jboss-kie-workbench/added/launch/jboss-kie-workbench.sh b/jboss-kie-workbench/added/launch/jboss-kie-workbench.sh index cf0e7a94..e8777411 100755 --- a/jboss-kie-workbench/added/launch/jboss-kie-workbench.sh +++ b/jboss-kie-workbench/added/launch/jboss-kie-workbench.sh @@ -52,6 +52,21 @@ function configure() { configure_guvnor_settings configure_metaspace configure_ha + # TODO: remove after https://issues.jboss.org/browse/AF-1821 + temporary_AF-1821 +} + +# TODO: remove after https://issues.jboss.org/browse/AF-1821 +function temporary_AF-1821() { + local web_xml="${JBOSS_HOME}/standalone/deployments/ROOT.war/WEB-INF/web.xml" + local number=1 + # only clear the 'number' of lines following 'BASIC auth resources', otherwise we clear other matches of 'url-pattern' unintentionally + for UP in websocket rest maven2 ws ; do + sed -i "/^\s*BASIC auth resources<\/web-resource-name>\s*$/,+${number}s/^\s*\/${UP}\/\*<\/url-pattern>\s*$//" "${web_xml}" + ((number++)) + done + # put maven2 back + sed -i "/^\s*BASIC auth resources<\/web-resource-name>\s*$/,+1s/^$/ \/maven2\/\*<\/url-pattern>/" "${web_xml}" } function configure_admin_security() { diff --git a/tests/features/common/kie-controller-common.feature b/tests/features/common/kie-controller-common.feature index a0048f47..040ebf74 100644 --- a/tests/features/common/kie-controller-common.feature +++ b/tests/features/common/kie-controller-common.feature @@ -9,7 +9,7 @@ Feature: KIE Controller configuration common tests And file /opt/eap/standalone/configuration/application-users.properties should not contain mavenUser And file /opt/eap/standalone/configuration/application-roles.properties should not contain mavenUser And file /opt/eap/standalone/configuration/application-users.properties should contain controllerUser=b39c9321953da48d982c018bb131c4b0 - And file /opt/eap/standalone/configuration/application-roles.properties should contain controllerUser=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should contain controllerUser=kie-server,rest-all,user And file /opt/eap/standalone/configuration/application-users.properties should not contain executionUser And file /opt/eap/standalone/configuration/application-roles.properties should not contain executionUser @@ -32,7 +32,7 @@ Feature: KIE Controller configuration common tests And file /opt/eap/standalone/configuration/application-users.properties should not contain customMvn And file /opt/eap/standalone/configuration/application-roles.properties should not contain customMvn And file /opt/eap/standalone/configuration/application-users.properties should contain customCtl=cc9f10a8ed20f1409b2282f4d5ca4d43 - And file /opt/eap/standalone/configuration/application-roles.properties should contain customCtl=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should contain customCtl=kie-server,rest-all,user And file /opt/eap/standalone/configuration/application-users.properties should not contain customExe And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe And container log should contain -Dorg.kie.server.token=token @@ -48,10 +48,10 @@ Feature: KIE Controller configuration common tests Then file /opt/eap/standalone/configuration/application-users.properties should not contain customCtl And file /opt/eap/standalone/configuration/application-roles.properties should not contain customCtl And file /opt/eap/standalone/configuration/application-users.properties should not contain customExe=d2d5d854411231a97fdbf7fe6f91a786 - And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,user And container log should contain External authentication/authorization enabled, skipping the embedded users creation. - And container log should contain KIE_SERVER_USER is set to customExe, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,guest - And container log should contain KIE_SERVER_CONTROLLER_USER is set to customCtl, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,guest + And container log should contain KIE_SERVER_USER is set to customExe, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,user + And container log should contain KIE_SERVER_CONTROLLER_USER is set to customCtl, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,user Scenario: Check if eap users are not being created if LDAP is configured When container is started with env @@ -64,23 +64,23 @@ Feature: KIE Controller configuration common tests Then file /opt/eap/standalone/configuration/application-users.properties should not contain customCtl And file /opt/eap/standalone/configuration/application-roles.properties should not contain customCtl And file /opt/eap/standalone/configuration/application-users.properties should not contain customExe=d2d5d854411231a97fdbf7fe6f91a786 - And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,user And container log should contain External authentication/authorization enabled, skipping the embedded users creation. - And container log should contain KIE_SERVER_USER is set to customExe, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,guest - And container log should contain KIE_SERVER_CONTROLLER_USER is set to customCtl, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,guest + And container log should contain KIE_SERVER_USER is set to customExe, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,user + And container log should contain KIE_SERVER_CONTROLLER_USER is set to customCtl, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,user Scenario: Check if eap users are not being created if SSO is configured with no users env When container is started with env | variable | value | | SSO_URL | http://url | Then container log should contain External authentication/authorization enabled, skipping the embedded users creation. - And container log should contain Make sure to configure the KIE_SERVER_CONTROLLER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,guest - And container log should contain Make sure to configure the KIE_SERVER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,guest + And container log should contain Make sure to configure the KIE_SERVER_CONTROLLER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,user + And container log should contain Make sure to configure the KIE_SERVER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,user Scenario: Check if eap users are not being created if LDAP is configured with no users env When container is started with env | variable | value | | AUTH_LDAP_URL | ldap://url:389| Then container log should contain External authentication/authorization enabled, skipping the embedded users creation. - And container log should contain Make sure to configure the KIE_SERVER_CONTROLLER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,guest - And container log should contain Make sure to configure the KIE_SERVER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,guest + And container log should contain Make sure to configure the KIE_SERVER_CONTROLLER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,user + And container log should contain Make sure to configure the KIE_SERVER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,user diff --git a/tests/features/common/kie-kieserver-common.feature b/tests/features/common/kie-kieserver-common.feature index 323b185b..cc5e943e 100644 --- a/tests/features/common/kie-kieserver-common.feature +++ b/tests/features/common/kie-kieserver-common.feature @@ -110,7 +110,7 @@ Feature: Kie Server common features And file /opt/eap/standalone/configuration/application-users.properties should not contain customCtl And file /opt/eap/standalone/configuration/application-roles.properties should not contain customCtl And file /opt/eap/standalone/configuration/application-users.properties should contain customExe=d2d5d854411231a97fdbf7fe6f91a786 - And file /opt/eap/standalone/configuration/application-roles.properties should contain customExe=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should contain customExe=kie-server,rest-all,user Scenario: Check if eap users are not being created if SSO is configured When container is started with env @@ -125,10 +125,10 @@ Feature: Kie Server common features Then file /opt/eap/standalone/configuration/application-users.properties should not contain customCtl And file /opt/eap/standalone/configuration/application-roles.properties should not contain customCtl And file /opt/eap/standalone/configuration/application-users.properties should not contain customExe=d2d5d854411231a97fdbf7fe6f91a786 - And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,user And container log should contain External authentication/authorization enabled, skipping the embedded users creation. - And container log should contain KIE_SERVER_USER is set to customExe, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,guest - And container log should contain KIE_SERVER_CONTROLLER_USER is set to customCtl, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,guest + And container log should contain KIE_SERVER_USER is set to customExe, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,user + And container log should contain KIE_SERVER_CONTROLLER_USER is set to customCtl, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,user And container log should contain KIE_ADMIN_USER is set to customExe, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,admin,kiemgmt,Administrators Scenario: Check if eap users are not being created if LDAP is configured @@ -144,10 +144,10 @@ Feature: Kie Server common features Then file /opt/eap/standalone/configuration/application-users.properties should not contain customCtl And file /opt/eap/standalone/configuration/application-roles.properties should not contain customCtl And file /opt/eap/standalone/configuration/application-users.properties should not contain customExe=d2d5d854411231a97fdbf7fe6f91a786 - And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,user And container log should contain External authentication/authorization enabled, skipping the embedded users creation. - And container log should contain KIE_SERVER_USER is set to customExe, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,guest - And container log should contain KIE_SERVER_CONTROLLER_USER is set to customCtl, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,guest + And container log should contain KIE_SERVER_USER is set to customExe, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,user + And container log should contain KIE_SERVER_CONTROLLER_USER is set to customCtl, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,user And container log should contain KIE_ADMIN_USER is set to customExe, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,admin,kiemgmt,Administrators Scenario: Check if eap users are not being created if SSO is configured with no users env @@ -156,8 +156,8 @@ Feature: Kie Server common features | SSO_URL | http://url | Then container log should contain External authentication/authorization enabled, skipping the embedded users creation. And container log should contain Make sure to configure the KIE_MAVEN_USER user to interact with Business Central embedded maven server - And container log should contain Make sure to configure the KIE_SERVER_CONTROLLER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,guest - And container log should contain Make sure to configure the KIE_SERVER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,guest + And container log should contain Make sure to configure the KIE_SERVER_CONTROLLER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,user + And container log should contain Make sure to configure the KIE_SERVER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,user And container log should contain Make sure to configure a ADMIN user to access the Business Central with the roles kie-server,rest-all,admin,kiemgmt,Administrators Scenario: Check if eap users are not being created if LDAP is configured with no users env @@ -166,8 +166,8 @@ Feature: Kie Server common features | AUTH_LDAP_URL | ldap://url:389| Then container log should contain External authentication/authorization enabled, skipping the embedded users creation. And container log should contain Make sure to configure the KIE_MAVEN_USER user to interact with Business Central embedded maven server - And container log should contain Make sure to configure the KIE_SERVER_CONTROLLER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,guest - And container log should contain Make sure to configure the KIE_SERVER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,guest + And container log should contain Make sure to configure the KIE_SERVER_CONTROLLER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,user + And container log should contain Make sure to configure the KIE_SERVER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,user And container log should contain Make sure to configure a ADMIN user to access the Business Central with the roles kie-server,rest-all,admin,kiemgmt,Administrators Scenario: Check custom users are properly configured @@ -194,7 +194,7 @@ Feature: Kie Server common features And file /opt/eap/standalone/configuration/application-users.properties should not contain controllerUser And file /opt/eap/standalone/configuration/application-roles.properties should not contain controllerUser And file /opt/eap/standalone/configuration/application-users.properties should contain executionUser=69ea96114cd41afa6a9d5be2e1e0531e - And file /opt/eap/standalone/configuration/application-roles.properties should contain executionUser=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should contain executionUser=kie-server,rest-all,user Scenario: Configure kie server to use LDAP authentication When container is started with env diff --git a/tests/features/common/kie-workbench-common.feature b/tests/features/common/kie-workbench-common.feature index 7988c270..10db0700 100644 --- a/tests/features/common/kie-workbench-common.feature +++ b/tests/features/common/kie-workbench-common.feature @@ -22,7 +22,7 @@ Feature: Decision/Business Central common features And file /opt/eap/standalone/configuration/application-users.properties should contain customCtl And file /opt/eap/standalone/configuration/application-roles.properties should contain customCtl=role2 And file /opt/eap/standalone/configuration/application-users.properties should not contain customExe=d2d5d854411231a97fdbf7fe6f91a786 - And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,user Scenario: Check if eap users are not being created if SSO is configured When container is started with env @@ -43,7 +43,7 @@ Feature: Decision/Business Central common features And file /opt/eap/standalone/configuration/application-users.properties should not contain customCtl And file /opt/eap/standalone/configuration/application-roles.properties should not contain customCtl=role2 And file /opt/eap/standalone/configuration/application-users.properties should not contain customExe=d2d5d854411231a97fdbf7fe6f91a786 - And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,user And container log should contain External authentication/authorization enabled, skipping the embedded users creation. And container log should contain KIE_ADMIN_USER is set to customAdm, make sure to configure this user with the provided password on the external auth provider with the roles role1,admin2 And container log should contain KIE_MAVEN_USER is set to customMvn, make sure to configure this user with the provided password on the external auth provider. @@ -66,11 +66,11 @@ Feature: Decision/Business Central common features And file /opt/eap/standalone/configuration/application-users.properties should not contain customCtl And file /opt/eap/standalone/configuration/application-roles.properties should not contain customCtl=role2 And file /opt/eap/standalone/configuration/application-users.properties should not contain customExe=d2d5d854411231a97fdbf7fe6f91a786 - And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,user And container log should contain External authentication/authorization enabled, skipping the embedded users creation. And container log should contain KIE_ADMIN_USER is set to customAdm, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,admin,kiemgmt,Administrators And container log should contain KIE_MAVEN_USER is set to customMvn, make sure to configure this user with the provided password on the external auth provider - And container log should contain KIE_SERVER_CONTROLLER_USER is set to customCtl, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,guest + And container log should contain KIE_SERVER_CONTROLLER_USER is set to customCtl, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,user Scenario: Check if eap users are not being created if SSO is configured with no users env When container is started with env @@ -79,7 +79,7 @@ Feature: Decision/Business Central common features Then container log should contain External authentication/authorization enabled, skipping the embedded users creation. And container log should contain Make sure to configure a ADMIN user to access the Business Central with the roles kie-server,rest-all,admin,kiemgmt,Administrators And container log should contain Make sure to configure the KIE_MAVEN_USER user to interact with Business Central embedded maven server - And container log should contain Make sure to configure the KIE_SERVER_CONTROLLER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,guest + And container log should contain Make sure to configure the KIE_SERVER_CONTROLLER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,user Scenario: Check if eap users are not being created if LDAP is configured with no users env When container is started with env @@ -88,4 +88,4 @@ Feature: Decision/Business Central common features Then container log should contain External authentication/authorization enabled, skipping the embedded users creation. And container log should contain Make sure to configure a ADMIN user to access the Business Central with the roles kie-server,rest-all,admin,kiemgmt,Administrators And container log should contain Make sure to configure the KIE_MAVEN_USER user to interact with Business Central embedded maven server - And container log should contain Make sure to configure the KIE_SERVER_CONTROLLER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,guest + And container log should contain Make sure to configure the KIE_SERVER_CONTROLLER_USER user to interact with KIE Server rest api with the roles kie-server,rest-all,user diff --git a/tests/features/rhdm/decisioncentral/rhdm-decisioncentral.feature b/tests/features/rhdm/decisioncentral/rhdm-decisioncentral.feature index 75e8555a..4153651c 100644 --- a/tests/features/rhdm/decisioncentral/rhdm-decisioncentral.feature +++ b/tests/features/rhdm/decisioncentral/rhdm-decisioncentral.feature @@ -19,7 +19,7 @@ Feature: RHDM Decision Central configuration tests And file /opt/eap/standalone/configuration/application-users.properties should contain mavenUser=99889a669f3bd83f6cde702673a029f7 And file /opt/eap/standalone/configuration/application-roles.properties should not contain mavenUser And file /opt/eap/standalone/configuration/application-users.properties should contain controllerUser=b39c9321953da48d982c018bb131c4b0 - And file /opt/eap/standalone/configuration/application-roles.properties should contain controllerUser=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should contain controllerUser=kie-server,rest-all,user And file /opt/eap/standalone/configuration/application-users.properties should not contain executionUser And file /opt/eap/standalone/configuration/application-roles.properties should not contain executionUser @@ -41,7 +41,7 @@ Feature: RHDM Decision Central configuration tests And file /opt/eap/standalone/configuration/application-users.properties should contain customMvn=1977e1d207067592d9ec888cf860bae3 And file /opt/eap/standalone/configuration/application-roles.properties should not contain customMvn And file /opt/eap/standalone/configuration/application-users.properties should contain customCtl=cc9f10a8ed20f1409b2282f4d5ca4d43 - And file /opt/eap/standalone/configuration/application-roles.properties should contain customCtl=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should contain customCtl=kie-server,rest-all,user And file /opt/eap/standalone/configuration/application-users.properties should not contain customExe And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe diff --git a/tests/features/rhdm/optaweb/optaweb.feature b/tests/features/rhdm/optaweb/optaweb.feature index 4d9e3b21..85f4387c 100644 --- a/tests/features/rhdm/optaweb/optaweb.feature +++ b/tests/features/rhdm/optaweb/optaweb.feature @@ -21,7 +21,7 @@ Feature: RHDM OptaWeb configuration tests | KIE_ADMIN_USER | customExe | | KIE_ADMIN_PWD | custom" Exe!0 | Then file /opt/eap/standalone/configuration/application-users.properties should not contain customExe=d2d5d854411231a97fdbf7fe6f91a786 - And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,user And container log should contain External authentication/authorization enabled, skipping the embedded users creation. And container log should contain KIE_ADMIN_USER is set to customExe, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,admin,kiemgmt,Administrators @@ -32,7 +32,7 @@ Feature: RHDM OptaWeb configuration tests | KIE_ADMIN_USER | customExe | | KIE_ADMIN_PWD | custom" Exe!0 | Then file /opt/eap/standalone/configuration/application-users.properties should not contain customExe=d2d5d854411231a97fdbf7fe6f91a786 - And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe=kie-server,rest-all,user And container log should contain External authentication/authorization enabled, skipping the embedded users creation. And container log should contain KIE_ADMIN_USER is set to customExe, make sure to configure this user with the provided password on the external auth provider with the roles kie-server,rest-all,admin,kiemgmt,Administrators diff --git a/tests/features/rhpam/businesscentral-monitoring/rhpam-businesscentral-monitoring.feature b/tests/features/rhpam/businesscentral-monitoring/rhpam-businesscentral-monitoring.feature index 5e32133f..24beee2a 100644 --- a/tests/features/rhpam/businesscentral-monitoring/rhpam-businesscentral-monitoring.feature +++ b/tests/features/rhpam/businesscentral-monitoring/rhpam-businesscentral-monitoring.feature @@ -19,7 +19,7 @@ Feature: RHPAM Business Central Monitoring configuration tests And file /opt/eap/standalone/configuration/application-users.properties should not contain mavenUser And file /opt/eap/standalone/configuration/application-roles.properties should not contain mavenUser And file /opt/eap/standalone/configuration/application-users.properties should contain controllerUser=b39c9321953da48d982c018bb131c4b0 - And file /opt/eap/standalone/configuration/application-roles.properties should contain controllerUser=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should contain controllerUser=kie-server,rest-all,user And file /opt/eap/standalone/configuration/application-users.properties should not contain executionUser And file /opt/eap/standalone/configuration/application-roles.properties should not contain executionUser @@ -41,7 +41,7 @@ Feature: RHPAM Business Central Monitoring configuration tests And file /opt/eap/standalone/configuration/application-users.properties should not contain customMvn And file /opt/eap/standalone/configuration/application-roles.properties should not contain customMvn And file /opt/eap/standalone/configuration/application-users.properties should contain customCtl=cc9f10a8ed20f1409b2282f4d5ca4d43 - And file /opt/eap/standalone/configuration/application-roles.properties should contain customCtl=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should contain customCtl=kie-server,rest-all,user And file /opt/eap/standalone/configuration/application-users.properties should not contain customExe And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe diff --git a/tests/features/rhpam/businesscentral/rhpam-businesscentral.feature b/tests/features/rhpam/businesscentral/rhpam-businesscentral.feature index 990356cb..97b33cdf 100644 --- a/tests/features/rhpam/businesscentral/rhpam-businesscentral.feature +++ b/tests/features/rhpam/businesscentral/rhpam-businesscentral.feature @@ -19,7 +19,7 @@ Feature: RHPAM Business Central configuration tests And file /opt/eap/standalone/configuration/application-users.properties should contain mavenUser=99889a669f3bd83f6cde702673a029f7 And file /opt/eap/standalone/configuration/application-roles.properties should not contain mavenUser And file /opt/eap/standalone/configuration/application-users.properties should contain controllerUser=b39c9321953da48d982c018bb131c4b0 - And file /opt/eap/standalone/configuration/application-roles.properties should contain controllerUser=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should contain controllerUser=kie-server,rest-all,user And file /opt/eap/standalone/configuration/application-users.properties should not contain executionUser And file /opt/eap/standalone/configuration/application-roles.properties should not contain executionUser @@ -41,7 +41,7 @@ Feature: RHPAM Business Central configuration tests And file /opt/eap/standalone/configuration/application-users.properties should contain customMvn=1977e1d207067592d9ec888cf860bae3 And file /opt/eap/standalone/configuration/application-roles.properties should not contain customMvn And file /opt/eap/standalone/configuration/application-users.properties should contain customCtl=cc9f10a8ed20f1409b2282f4d5ca4d43 - And file /opt/eap/standalone/configuration/application-roles.properties should contain customCtl=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should contain customCtl=kie-server,rest-all,user And file /opt/eap/standalone/configuration/application-users.properties should not contain customExe And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe diff --git a/tests/features/rhpam/controller/rhpam-controller.feature b/tests/features/rhpam/controller/rhpam-controller.feature index 22711d21..0e538b49 100644 --- a/tests/features/rhpam/controller/rhpam-controller.feature +++ b/tests/features/rhpam/controller/rhpam-controller.feature @@ -19,7 +19,7 @@ Feature: RHPAM Controller configuration tests And file /opt/eap/standalone/configuration/application-users.properties should not contain mavenUser And file /opt/eap/standalone/configuration/application-roles.properties should not contain mavenUser And file /opt/eap/standalone/configuration/application-users.properties should contain controllerUser=b39c9321953da48d982c018bb131c4b0 - And file /opt/eap/standalone/configuration/application-roles.properties should contain controllerUser=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should contain controllerUser=kie-server,rest-all,user And file /opt/eap/standalone/configuration/application-users.properties should not contain executionUser And file /opt/eap/standalone/configuration/application-roles.properties should not contain executionUser @@ -41,6 +41,6 @@ Feature: RHPAM Controller configuration tests And file /opt/eap/standalone/configuration/application-users.properties should not contain customMvn And file /opt/eap/standalone/configuration/application-roles.properties should not contain customMvn And file /opt/eap/standalone/configuration/application-users.properties should contain customCtl=cc9f10a8ed20f1409b2282f4d5ca4d43 - And file /opt/eap/standalone/configuration/application-roles.properties should contain customCtl=kie-server,rest-all,guest + And file /opt/eap/standalone/configuration/application-roles.properties should contain customCtl=kie-server,rest-all,user And file /opt/eap/standalone/configuration/application-users.properties should not contain customExe And file /opt/eap/standalone/configuration/application-roles.properties should not contain customExe