41 lines
1.4 KiB
Groovy
41 lines
1.4 KiB
Groovy
apply plugin: 'elasticsearch.testclusters'
|
|
apply plugin: 'elasticsearch.esplugin'
|
|
|
|
esplugin {
|
|
name 'spi-extension'
|
|
description 'An example spi extension plugin for security'
|
|
classname 'org.elasticsearch.example.SpiExtensionPlugin'
|
|
extendedPlugins = ['x-pack-security']
|
|
}
|
|
|
|
dependencies {
|
|
compileOnly project(':x-pack:plugin:core')
|
|
testCompile project(path: xpackProject('transport-client').path, configuration: 'runtime')
|
|
}
|
|
|
|
|
|
integTest.runner {
|
|
dependsOn buildZip
|
|
systemProperty 'tests.security.manager', 'false'
|
|
}
|
|
|
|
testClusters.integTest {
|
|
// This is important, so that all the modules are available too.
|
|
// There are index templates that use token filters that are in analysis-module and
|
|
// processors are being used that are in ingest-common module.
|
|
testDistribution = 'DEFAULT'
|
|
|
|
setting 'xpack.security.authc.realms.custom.custom.order', '0'
|
|
setting 'xpack.security.authc.realms.custom.custom.filtered_setting', 'should be filtered'
|
|
setting 'xpack.security.authc.realms.file.esusers.order', '1'
|
|
setting 'xpack.security.authc.realms.native.native.order', '2'
|
|
setting 'xpack.security.authc.realms.custom_role_mapping.role_map.order', '3'
|
|
setting 'xpack.security.enabled', 'true'
|
|
setting 'xpack.ilm.enabled', 'false'
|
|
setting 'xpack.ml.enabled', 'false'
|
|
setting 'xpack.monitoring.enabled', 'false'
|
|
setting 'xpack.license.self_generated.type', 'trial'
|
|
|
|
user username: "test_user", password: "x-pack-test-password"
|
|
}
|