Skip to content

Commit

Permalink
[FTR] Skip failing serverless tests for MKI runs (#168810)
Browse files Browse the repository at this point in the history
## Summary

This PR adds another round of `failsOnMKI` tags to serverless test
suites together with comments about the failure.
  • Loading branch information
pheyos authored Oct 13, 2023
1 parent 2ffb2ca commit eee0d4d
Show file tree
Hide file tree
Showing 8 changed files with 31 additions and 6 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,9 @@ export default ({ getService }: FtrProviderContext) => {
const supertest = getService('supertestWithoutAuth');

describe('Reporting Management', function () {
// security_exception: action [indices:admin/create] is unauthorized for user [elastic] with effective roles [superuser] on restricted indices [.reporting-2020.04.19], this action is granted by the index privileges [create_index,manage,all]
this.tags(['failsOnMKI']);

const dataArchive = 'x-pack/test/functional/es_archives/reporting/archived_reports';

beforeEach(async () => {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,10 @@ import { FtrProviderContext } from '../../../ftr_provider_context';

export default function ({ loadTestFile }: FtrProviderContext) {
describe('Infra UI', function () {
// all these tests are failing on MKI:
// Error: expected 200 "OK", got 404 "Not Found"
this.tags(['failsOnMKI']);

loadTestFile(require.resolve('./metadata'));
loadTestFile(require.resolve('./snapshot'));
loadTestFile(require.resolve('./processes'));
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,10 @@ export default function ({ getService }: FtrProviderContext) {
const esArchiver = getService('esArchiver');
const kibanaServer = getService('kibanaServer');

describe('GET /internal/cloud_security_posture/benchmark', () => {
describe('GET /internal/cloud_security_posture/benchmark', function () {
// security_exception: action [indices:admin/create] is unauthorized for user [elastic] with effective roles [superuser] on restricted indices [.fleet-actions-7], this action is granted by the index privileges [create_index,manage,all]
this.tags(['failsOnMKI']);

let agentPolicyId: string;
let agentPolicyId2: string;
let agentPolicyId3: string;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,10 @@ export default function ({ getService }: FtrProviderContext) {
const esArchiver = getService('esArchiver');
const kibanaServer = getService('kibanaServer');

describe('GET internal/cloud_security_posture/rules/_find', () => {
describe('GET internal/cloud_security_posture/rules/_find', function () {
// security_exception: action [indices:admin/create] is unauthorized for user [elastic] with effective roles [superuser] on restricted indices [.fleet-actions-7], this action is granted by the index privileges [create_index,manage,all]
this.tags(['failsOnMKI']);

let agentPolicyId: string;

beforeEach(async () => {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,10 @@ export default function (providerContext: FtrProviderContext) {
const esArchiver = getService('esArchiver');
const kibanaServer = getService('kibanaServer');

describe('GET /internal/cloud_security_posture/status', () => {
describe('GET /internal/cloud_security_posture/status', function () {
// security_exception: action [indices:admin/create] is unauthorized for user [elastic] with effective roles [superuser] on restricted indices [.fleet-actions-7], this action is granted by the index privileges [create_index,manage,all]
this.tags(['failsOnMKI']);

let agentPolicyId: string;

describe('STATUS = INDEXED TEST', () => {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,10 @@ export default function (providerContext: FtrProviderContext) {
const esArchiver = getService('esArchiver');
const kibanaServer = getService('kibanaServer');

describe('GET /internal/cloud_security_posture/status', () => {
describe('GET /internal/cloud_security_posture/status', function () {
// security_exception: action [indices:admin/create] is unauthorized for user [elastic] with effective roles [superuser] on restricted indices [.fleet-actions-7], this action is granted by the index privileges [create_index,manage,all]
this.tags(['failsOnMKI']);

let agentPolicyId: string;

describe('STATUS = INDEXING TEST', () => {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,10 @@ export default function (providerContext: FtrProviderContext) {
const esArchiver = getService('esArchiver');
const kibanaServer = getService('kibanaServer');

describe('GET /internal/cloud_security_posture/status', () => {
describe('GET /internal/cloud_security_posture/status', function () {
// security_exception: action [indices:admin/create] is unauthorized for user [elastic] with effective roles [superuser] on restricted indices [.fleet-actions-7], this action is granted by the index privileges [create_index,manage,all]
this.tags(['failsOnMKI']);

let agentPolicyId: string;

describe('STATUS = NOT-DEPLOYED and STATUS = NOT-INSTALLED TEST', () => {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,10 @@ export default function ({ getService }: FtrProviderContext) {
},
};

describe('Verify cloud_security_posture telemetry payloads', async () => {
describe('Verify cloud_security_posture telemetry payloads', function () {
// security_exception: action [indices:admin/create] is unauthorized for user [elastic] with effective roles [superuser] on restricted indices [.fleet-actions-7], this action is granted by the index privileges [create_index,manage,all]
this.tags(['failsOnMKI']);

let agentPolicyId: string;

before(async () => {
Expand Down

0 comments on commit eee0d4d

Please sign in to comment.