Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

E2E Test: escaping secrets in policy #5320

Closed
ycombinator opened this issue Aug 20, 2024 · 2 comments · Fixed by #5987
Closed

E2E Test: escaping secrets in policy #5320

ycombinator opened this issue Aug 20, 2024 · 2 comments · Fixed by #5987
Assignees
Labels
Team:Elastic-Agent Label for the Agent team Testing

Comments

@ycombinator
Copy link
Contributor

Add an E2E test for elastic/kibana#188377, wherein the test should create a policy containing the custom logs integration with a custom configuration like so:

custom.key: $$$$

The test should enroll Agent in Fleet using the created policy and ensure that the configuration sent to the relevant Beat contains custom.key: $$$$ as well.

@ycombinator ycombinator added Team:Elastic-Agent Label for the Agent team Testing labels Aug 20, 2024
@elasticmachine
Copy link
Contributor

Pinging @elastic/elastic-agent (Team:Elastic-Agent)

@kaanyalti
Copy link
Contributor

kaanyalti commented Oct 28, 2024

Blocked due to ESS authentication error required to set up the testing framework

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Team:Elastic-Agent Label for the Agent team Testing
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants