mirror of
https://github.com/elastic/kibana.git
synced 2025-04-24 17:59:23 -04:00
skip failing test suite (#168340)
This commit is contained in:
parent
1c2679158c
commit
7ce669be32
1 changed files with 78 additions and 81 deletions
|
@ -20,95 +20,92 @@ import { createEndpointHost } from '../../tasks/create_endpoint_host';
|
|||
import { deleteAllLoadedEndpointData } from '../../tasks/delete_all_endpoint_data';
|
||||
import { enableAllPolicyProtections } from '../../tasks/endpoint_policy';
|
||||
|
||||
describe(
|
||||
'Automated Response Actions',
|
||||
{
|
||||
tags: ['@ess', '@serverless'],
|
||||
env: {
|
||||
ftrConfig: {
|
||||
kbnServerArgs: [
|
||||
`--xpack.securitySolution.enableExperimental=${JSON.stringify([
|
||||
'automatedProcessActionsEnabled',
|
||||
])}`,
|
||||
],
|
||||
},
|
||||
// Failing: See https://github.com/elastic/kibana/issues/168340
|
||||
describe.skip('Automated Response Actions', {
|
||||
tags: ['@ess', '@serverless'],
|
||||
env: {
|
||||
ftrConfig: {
|
||||
kbnServerArgs: [
|
||||
`--xpack.securitySolution.enableExperimental=${JSON.stringify([
|
||||
'automatedProcessActionsEnabled',
|
||||
])}`,
|
||||
],
|
||||
},
|
||||
},
|
||||
() => {
|
||||
let indexedPolicy: IndexedFleetEndpointPolicyResponse;
|
||||
let policy: PolicyData;
|
||||
let createdHost: CreateAndEnrollEndpointHostResponse;
|
||||
}, () => {
|
||||
let indexedPolicy: IndexedFleetEndpointPolicyResponse;
|
||||
let policy: PolicyData;
|
||||
let createdHost: CreateAndEnrollEndpointHostResponse;
|
||||
|
||||
before(() => {
|
||||
getEndpointIntegrationVersion().then((version) =>
|
||||
createAgentPolicyTask(version, 'automated_response_actions').then((data) => {
|
||||
indexedPolicy = data;
|
||||
policy = indexedPolicy.integrationPolicies[0];
|
||||
|
||||
return enableAllPolicyProtections(policy.id).then(() => {
|
||||
// Create and enroll a new Endpoint host
|
||||
return createEndpointHost(policy.policy_id).then((host) => {
|
||||
createdHost = host as CreateAndEnrollEndpointHostResponse;
|
||||
});
|
||||
});
|
||||
})
|
||||
);
|
||||
});
|
||||
|
||||
after(() => {
|
||||
if (createdHost) {
|
||||
cy.task('destroyEndpointHost', createdHost);
|
||||
}
|
||||
|
||||
if (indexedPolicy) {
|
||||
cy.task('deleteIndexedFleetEndpointPolicies', indexedPolicy);
|
||||
}
|
||||
|
||||
if (createdHost) {
|
||||
deleteAllLoadedEndpointData({ endpointAgentIds: [createdHost.agentId] });
|
||||
}
|
||||
});
|
||||
|
||||
beforeEach(() => {
|
||||
login();
|
||||
});
|
||||
|
||||
// FLAKY: https://github.com/elastic/kibana/issues/169828
|
||||
describe.skip('From alerts', () => {
|
||||
let ruleId: string;
|
||||
let ruleName: string;
|
||||
|
||||
before(() => {
|
||||
getEndpointIntegrationVersion().then((version) =>
|
||||
createAgentPolicyTask(version, 'automated_response_actions').then((data) => {
|
||||
indexedPolicy = data;
|
||||
policy = indexedPolicy.integrationPolicies[0];
|
||||
|
||||
return enableAllPolicyProtections(policy.id).then(() => {
|
||||
// Create and enroll a new Endpoint host
|
||||
return createEndpointHost(policy.policy_id).then((host) => {
|
||||
createdHost = host as CreateAndEnrollEndpointHostResponse;
|
||||
});
|
||||
});
|
||||
})
|
||||
);
|
||||
loadRule().then((data) => {
|
||||
ruleId = data.id;
|
||||
ruleName = data.name;
|
||||
});
|
||||
});
|
||||
|
||||
after(() => {
|
||||
if (createdHost) {
|
||||
cy.task('destroyEndpointHost', createdHost);
|
||||
}
|
||||
|
||||
if (indexedPolicy) {
|
||||
cy.task('deleteIndexedFleetEndpointPolicies', indexedPolicy);
|
||||
}
|
||||
|
||||
if (createdHost) {
|
||||
deleteAllLoadedEndpointData({ endpointAgentIds: [createdHost.agentId] });
|
||||
if (ruleId) {
|
||||
cleanupRule(ruleId);
|
||||
}
|
||||
});
|
||||
|
||||
beforeEach(() => {
|
||||
login();
|
||||
it('should have generated endpoint and rule', () => {
|
||||
loadPage(APP_ENDPOINTS_PATH);
|
||||
cy.contains(createdHost.hostname).should('exist');
|
||||
|
||||
toggleRuleOffAndOn(ruleName);
|
||||
|
||||
visitRuleAlerts(ruleName);
|
||||
closeAllToasts();
|
||||
|
||||
changeAlertsFilter('process.name: "sshd"');
|
||||
cy.getByTestSubj('expand-event').eq(0).click();
|
||||
cy.getByTestSubj('securitySolutionFlyoutNavigationExpandDetailButton').click();
|
||||
cy.getByTestSubj('securitySolutionFlyoutResponseTab').click();
|
||||
|
||||
cy.contains(/isolate is pending|isolate completed successfully/g);
|
||||
cy.contains(/kill-process is pending|kill-process completed successfully/g);
|
||||
cy.contains('The action was called with a non-existing event field name: entity_id');
|
||||
});
|
||||
|
||||
// FLAKY: https://github.com/elastic/kibana/issues/169828
|
||||
describe.skip('From alerts', () => {
|
||||
let ruleId: string;
|
||||
let ruleName: string;
|
||||
|
||||
before(() => {
|
||||
loadRule().then((data) => {
|
||||
ruleId = data.id;
|
||||
ruleName = data.name;
|
||||
});
|
||||
});
|
||||
|
||||
after(() => {
|
||||
if (ruleId) {
|
||||
cleanupRule(ruleId);
|
||||
}
|
||||
});
|
||||
|
||||
it('should have generated endpoint and rule', () => {
|
||||
loadPage(APP_ENDPOINTS_PATH);
|
||||
cy.contains(createdHost.hostname).should('exist');
|
||||
|
||||
toggleRuleOffAndOn(ruleName);
|
||||
|
||||
visitRuleAlerts(ruleName);
|
||||
closeAllToasts();
|
||||
|
||||
changeAlertsFilter('process.name: "sshd"');
|
||||
cy.getByTestSubj('expand-event').eq(0).click();
|
||||
cy.getByTestSubj('securitySolutionFlyoutNavigationExpandDetailButton').click();
|
||||
cy.getByTestSubj('securitySolutionFlyoutResponseTab').click();
|
||||
|
||||
cy.contains(/isolate is pending|isolate completed successfully/g);
|
||||
cy.contains(/kill-process is pending|kill-process completed successfully/g);
|
||||
cy.contains('The action was called with a non-existing event field name: entity_id');
|
||||
});
|
||||
});
|
||||
}
|
||||
);
|
||||
});
|
||||
});
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue