Skipping readonly/no access test for FIPS pipeline since the overrides cause it to fail (#202719)

## Summary

The FIPS pipeline runs all tests as a privileged superuser, some tests
that check privileges fail and should be skipped for this pipeline

The FIPS pipeline runs all test with a trial license, some tests that
verify premium functionality vs basic should be skipped for this
pipeline

## FIPS Pipeline run for this branch
https://buildkite.com/elastic/kibana-fips/builds/304
This commit is contained in:
Kurt 2024-12-10 12:32:11 -05:00 committed by GitHub
parent da93119780
commit 4d9a70f48e
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
3 changed files with 20 additions and 16 deletions

View file

@ -13,7 +13,7 @@ import moment from 'moment-timezone';
import { getNextRollingTime } from '@kbn/core-logging-server-internal';
import { createRoot as createkbnTestServerRoot } from '@kbn/core-test-helpers-kbn-server';
const flushDelay = 250;
const flushDelay = 2000;
const delay = (waitInMs: number) => new Promise((resolve) => setTimeout(resolve, waitInMs));
const flush = async () => delay(flushDelay);

View file

@ -13,7 +13,8 @@ import { User } from '../../../../common/lib/authentication/types';
export default ({ getService }: FtrProviderContext): void => {
const supertest = getService('supertest');
describe('Run ecs_mapping', () => {
describe('Run ecs_mapping', function () {
this.tags('skipFIPS');
it('should get 404 when trying to run ecs_mapping with basic license', async () => {
return await postEcsMapping({
supertest,

View file

@ -100,16 +100,6 @@ export default ({ getPageObjects, getService }: FtrProviderContext) => {
expect(await successToast.getVisibleText()).to.contain(`Executed ${ENRICH_POLICY_NAME}`);
});
it('read only access', async () => {
await security.testUser.setRoles(['index_management_monitor_enrich_only']);
await pageObjects.common.navigateToApp('indexManagement');
await pageObjects.indexManagement.changeTabs('enrich_policiesTab');
await pageObjects.header.waitUntilLoadingHasFinished();
await testSubjects.missingOrFail('createPolicyButton');
await testSubjects.missingOrFail('deletePolicyButton');
});
it('can delete a policy', async () => {
await security.testUser.setRoles(['index_management_user']);
await pageObjects.common.navigateToApp('indexManagement');
@ -129,10 +119,23 @@ export default ({ getPageObjects, getService }: FtrProviderContext) => {
expect(await successToast.getVisibleText()).to.contain(`Deleted ${ENRICH_POLICY_NAME}`);
});
it('no access', async () => {
await security.testUser.setRoles(['index_management_monitor_only']);
await pageObjects.common.navigateToApp('indexManagement');
await testSubjects.missingOrFail('enrich_policiesTab');
describe('access', function () {
this.tags('skipFIPS');
it('read only access', async () => {
await security.testUser.setRoles(['index_management_monitor_enrich_only']);
await pageObjects.common.navigateToApp('indexManagement');
await pageObjects.indexManagement.changeTabs('enrich_policiesTab');
await pageObjects.header.waitUntilLoadingHasFinished();
await testSubjects.missingOrFail('createPolicyButton');
await testSubjects.missingOrFail('deletePolicyButton');
});
it('no access', async () => {
await security.testUser.setRoles(['index_management_monitor_only']);
await pageObjects.common.navigateToApp('indexManagement');
await testSubjects.missingOrFail('enrich_policiesTab');
});
});
});
};