kibana/x-pack/test/security_api_integration/audit.config.ts
Aleh Zasypkin a2d6e102d3
chore(security, eslint): apply platform security-specific rules to all exclusively owned paths. (#195711)
## Summary

Apply platform security-specific rules to all exclusively owned paths.
2024-10-11 09:49:12 +02:00

39 lines
1.4 KiB
TypeScript

/*
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
* or more contributor license agreements. Licensed under the Elastic License
* 2.0; you may not use this file except in compliance with the Elastic License
* 2.0.
*/
import { resolve } from 'path';
import type { FtrConfigProviderContext } from '@kbn/test';
export default async function ({ readConfigFile }: FtrConfigProviderContext) {
const xPackAPITestsConfig = await readConfigFile(require.resolve('../api_integration/config.ts'));
const auditLogPlugin = resolve(__dirname, './plugins/audit_log');
const auditLogPath = resolve(__dirname, './plugins/audit_log/audit.log');
return {
testFiles: [require.resolve('./tests/audit')],
servers: xPackAPITestsConfig.get('servers'),
security: { disableTestUser: true },
services: xPackAPITestsConfig.get('services'),
junit: {
reportName: 'X-Pack Security API Integration Tests (Audit Log)',
},
esTestCluster: xPackAPITestsConfig.get('esTestCluster'),
kbnTestServer: {
...xPackAPITestsConfig.get('kbnTestServer'),
serverArgs: [
...xPackAPITestsConfig.get('kbnTestServer.serverArgs'),
`--plugin-path=${auditLogPlugin}`,
'--xpack.security.audit.enabled=true',
'--xpack.security.audit.appender.type=file',
`--xpack.security.audit.appender.fileName=${auditLogPath}`,
'--xpack.security.audit.appender.layout.type=json',
],
},
};
}