Pulse/tests/integration/evals/tasks/audit-reporting.md
2026-03-18 16:06:30 +00:00

1.5 KiB

Audit Log + Reporting Lifecycle

Objective

Validate audit logging and reporting enterprise features: audit event listing, export, summary, webhook configuration, notification webhooks, single/multi-resource report generation, and UI rendering.

Steps

Audit Logging

  1. Log in as admin.
  2. GET /api/audit?limit=10 — verify events list or 402 paywall.
  3. GET /api/audit/export?format=json — verify file download (or 501 for no logger).
  4. GET /api/audit/summary — verify summary statistics.
  5. GET/POST /api/admin/webhooks/audit — CRUD audit webhook URLs.
  6. Navigate to /settings/security-audit — verify audit log viewer renders.

Notification Webhooks (not license-gated)

  1. GET /api/notifications/webhooks — list webhooks.
  2. GET /api/notifications/webhook-templates — verify templates available.
  3. GET /api/notifications/webhook-history — verify history available.
  4. GET /api/notifications/health — verify notification system health.

Reporting

  1. GET /api/state — find a resource to report on.
  2. GET /api/admin/reports/generate?resourceType=node&resourceId=...&format=csv — generate report.
  3. POST /api/admin/reports/generate-multi — generate fleet report.
  4. Navigate to /operations/reporting — verify reporting page renders.

Expected Outcomes

  • Audit events and exports work when audit_logging is licensed.
  • Reports generate when advanced_reporting is licensed.
  • 402 paywall responses have correct format when not licensed.
  • UI pages render relevant content or upgrade messaging.