diff --git a/.github/workflows/dev-environment.yml b/.github/workflows/dev-environment.yml index dd8c3f6548..89ab56d47b 100644 --- a/.github/workflows/dev-environment.yml +++ b/.github/workflows/dev-environment.yml @@ -49,11 +49,6 @@ jobs: matrix: plugins: [ - { - name: 'Main', - path: 'wazuh/plugins/main', - container_path: 'wazuh', - }, { name: 'Wazuh Check Updates', path: 'wazuh/plugins/wazuh-check-updates', @@ -64,16 +59,6 @@ jobs: path: 'wazuh/plugins/wazuh-core', container_path: 'wazuh-core', }, - { - name: 'Wazuh Engine', - path: 'wazuh/plugins/wazuh-engine', - container_path: 'wazuh-engine', - }, - { - name: 'Wazuh Fleet', - path: 'wazuh/plugins/wazuh-fleet', - container_path: 'wazuh-fleet', - }, ] steps: diff --git a/.github/workflows/eslint.yml b/.github/workflows/eslint.yml index c162ff14a7..4ea802f6db 100644 --- a/.github/workflows/eslint.yml +++ b/.github/workflows/eslint.yml @@ -43,7 +43,11 @@ jobs: echo "Listing branches" git branch -a echo "Getting diff files ignoring deleted and getting the changed or renamed files" - CHANGED_FILES=$(git diff --name-status --diff-filter d ${REMOTE_NAME}/${GITHUB_BASE_REF}..${REMOTE_NAME}/${GITHUB_HEAD_REF} | awk '{print $NF}' | grep -E '.*\.[jt]sx?$') + CHANGED_FILES=$(git diff --name-status --diff-filter d ${REMOTE_NAME}/${GITHUB_BASE_REF}..${REMOTE_NAME}/${GITHUB_HEAD_REF} | awk '{print $NF}' | grep -E '.*\.[jt]sx?$' || echo "false") + if [ $CHANGED_FILES = "false" ]; then + echo "No changed files found with the extension .js, .jsx, .ts or .tsx" + exit 0 + fi echo "Changed files:" echo "${CHANGED_FILES}" git checkout $GITHUB_HEAD_REF diff --git a/.github/workflows/manual-build.yml b/.github/workflows/manual-build.yml index e062d570fe..a82ae56a95 100644 --- a/.github/workflows/manual-build.yml +++ b/.github/workflows/manual-build.yml @@ -53,13 +53,6 @@ jobs: echo "revision=$(jq -r '.revision' $(pwd)/wazuh/plugins/main/package.json)" >> $GITHUB_ENV echo "versionPlatform=$(jq -r '.pluginPlatform.version' $(pwd)/wazuh/plugins/main/package.json)" >> $GITHUB_ENV - - name: Step 03 - Download the main plugin's artifact - uses: actions/download-artifact@v4 - with: - name: wazuh-dashboard-plugins_wazuh_${{ env.version }}-${{ env.revision }}_${{ env.githubReference }}.zip - path: ${{ env.currentDir }}/wazuh/scripts/test-packages/plugins/wazuh-dashboard-plugins_wazuh_${{ env.version }}-${{ env.revision }}_${{ env.githubReference }}.zip - overwrite: true - - name: Step 04 - Download the core plugin's artifact uses: actions/download-artifact@v4 with: @@ -74,20 +67,6 @@ jobs: path: ${{ env.currentDir }}/wazuh/scripts/test-packages/plugins/wazuh-dashboard-plugins_wazuh-check-updates_${{ env.version }}-${{ env.revision }}_${{ env.githubReference }}.zip overwrite: true - - name: Step 06 - Download the engine plugin's artifact - uses: actions/download-artifact@v4 - with: - name: wazuh-dashboard-plugins_wazuh-engine_${{ env.version }}-${{ env.revision }}_${{ env.githubReference }}.zip - path: ${{ env.currentDir }}/wazuh/scripts/test-packages/plugins/wazuh-dashboard-plugins_wazuh-engine_${{ env.version }}-${{ env.revision }}_${{ env.githubReference }}.zip - overwrite: true - - - name: Step 07 - Download the fleet plugin's artifact - uses: actions/download-artifact@v4 - with: - name: wazuh-dashboard-plugins_wazuh-fleet_${{ env.version }}-${{ env.revision }}_${{ env.githubReference }}.zip - path: ${{ env.currentDir }}/wazuh/scripts/test-packages/plugins/wazuh-dashboard-plugins_wazuh-fleet${{ env.version }}-${{ env.revision }}_${{ env.githubReference }}.zip - overwrite: true - - name: Step 06 - Build the Docker image run: | echo "current=${{ env.currentDir }}" diff --git a/docker/osd-dev/config/2.x/osd/opensearch_dashboards.yml b/docker/osd-dev/config/2.x/osd/opensearch_dashboards.yml index d73088264b..f5105d3865 100755 --- a/docker/osd-dev/config/2.x/osd/opensearch_dashboards.yml +++ b/docker/osd-dev/config/2.x/osd/opensearch_dashboards.yml @@ -6,17 +6,16 @@ opensearch.ssl.verificationMode: certificate # opensearch.requestHeadersWhitelist: ["securitytenant","Authorization"] # # osd 2.0 -opensearch.requestHeadersAllowlist: ["securitytenant", "Authorization"] +opensearch.requestHeadersAllowlist: ['securitytenant', 'Authorization'] # opensearch_security.multitenancy.enabled: false -opensearch_security.readonly_mode.roles: ["kibana_read_only"] +opensearch_security.readonly_mode.roles: ['kibana_read_only'] server.ssl.enabled: true -server.ssl.key: "/home/node/kbn/certs/osd.key" -server.ssl.certificate: "/home/node/kbn/certs/osd.pem" -opensearch.ssl.certificateAuthorities: ["/home/node/kbn/certs/ca.pem"] -uiSettings.overrides.defaultRoute: /app/wz-home -opensearch.username: "kibanaserver" -opensearch.password: "kibanaserver" +server.ssl.key: '/home/node/kbn/certs/osd.key' +server.ssl.certificate: '/home/node/kbn/certs/osd.pem' +opensearch.ssl.certificateAuthorities: ['/home/node/kbn/certs/ca.pem'] +uiSettings.overrides.defaultRoute: /app/home +opensearch.username: 'kibanaserver' +opensearch.password: 'kibanaserver' opensearchDashboards.branding: useExpandedHeader: false - diff --git a/docker/osd-dev/config/2.x/osd/opensearch_dashboards_saml.yml b/docker/osd-dev/config/2.x/osd/opensearch_dashboards_saml.yml index 4fb845adf8..b55b3705ae 100755 --- a/docker/osd-dev/config/2.x/osd/opensearch_dashboards_saml.yml +++ b/docker/osd-dev/config/2.x/osd/opensearch_dashboards_saml.yml @@ -6,19 +6,19 @@ opensearch.ssl.verificationMode: certificate # opensearch.requestHeadersWhitelist: ["securitytenant","Authorization"] # # osd 2.0 -opensearch.requestHeadersAllowlist: ["securitytenant", "Authorization"] +opensearch.requestHeadersAllowlist: ['securitytenant', 'Authorization'] # opensearch_security.multitenancy.enabled: false -opensearch_security.readonly_mode.roles: ["kibana_read_only"] +opensearch_security.readonly_mode.roles: ['kibana_read_only'] server.ssl.enabled: true -server.ssl.key: "/home/node/kbn/certs/osd.key" -server.ssl.certificate: "/home/node/kbn/certs/osd.pem" -opensearch.ssl.certificateAuthorities: ["/home/node/kbn/certs/ca.pem"] -uiSettings.overrides.defaultRoute: /app/wazuh -opensearch.username: "kibanaserver" -opensearch.password: "kibanaserver" +server.ssl.key: '/home/node/kbn/certs/osd.key' +server.ssl.certificate: '/home/node/kbn/certs/osd.pem' +opensearch.ssl.certificateAuthorities: ['/home/node/kbn/certs/ca.pem'] +uiSettings.overrides.defaultRoute: /app/home +opensearch.username: 'kibanaserver' +opensearch.password: 'kibanaserver' -opensearch_security.auth.type: "saml" +opensearch_security.auth.type: 'saml' server.xsrf.allowlist: [ /_plugins/_security/saml/acs, diff --git a/plugins/main/opensearch_dashboards.json b/plugins/main/opensearch_dashboard1.json similarity index 100% rename from plugins/main/opensearch_dashboards.json rename to plugins/main/opensearch_dashboard1.json