Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[META] Testing scenarios for Elastic Agent E2E testing framework #2428

Closed
18 tasks done
jlind23 opened this issue Mar 31, 2023 · 4 comments
Closed
18 tasks done

[META] Testing scenarios for Elastic Agent E2E testing framework #2428

jlind23 opened this issue Mar 31, 2023 · 4 comments
Assignees
Labels
meta Team:Elastic-Agent Label for the Agent team

Comments

@jlind23
Copy link
Contributor

jlind23 commented Mar 31, 2023

This issue will act as a placeholder which contains a list of all the E2E testing scenarios that should be implemented as part of the Elastic Agent E2E testing framework.

Tasks

Preview Give feedback
  1. Team:Elastic-Agent Testing
    blakerouse
  2. Team:Elastic-Agent
    ycombinator
  3. Team:Elastic-Agent
    faec
  4. Team:Elastic-Agent
    faec
  5. Team:Elastic-Agent
  6. Team:Elastic-Agent
  7. Team:Elastic-Agent
    fearful-symmetry
  8. 8.6-candidate Team:Elastic-Agent-Control-Plane ci:end-to-end estimation:Week
  9. 8.6-candidate Team:Elastic-Agent-Control-Plane V2-Architecture
  10. 8.6-candidate Team:Elastic-Agent-Control-Plane ci:end-to-end
  11. Team:Fleet
    nchaulet
  12. Team:Elastic-Agent
    AndersonQ
  13. Team:Fleet
    michel-laterman
  14. Team:Elastic-Agent
  15. Team:Elastic-Agent
    cmacknz
  • Add an end to end test to ensure the agent can process actions, including signed actions. The simplest example is the settings action to change the log level. For the signed actions (as of March 7, 2023), the only actions that can be signed by kibana are the endpoint actions. The agent validates the signature for all INPUT_ACTION types of actions though, so potentially one could sign osquery actions outside of the kibana if they want.
    Also there are two things that are getting signed: 1) protection configuration of the policy 2) input actions. For comprehensive testing of all the error cases the tests would need to explore the cases where the signed policy configuration or the signed actions are being tempered with, such as: invalid signature validation key, corrupted signed data, policy id mismatch for the policy signed data, action id and the agent id mismatch for the action signed data. Basically tests different types of tampering use cases.
@jlind23
Copy link
Contributor Author

jlind23 commented May 11, 2023

@pierrehilbert can you make sure this list is complete and that all test cases are planned for one of the upcoming sprint?

@cmacknz
Copy link
Member

cmacknz commented May 17, 2023

Added #2705

@cmacknz
Copy link
Member

cmacknz commented Jun 27, 2023

Added #2948

@ycombinator
Copy link
Contributor

Closing in favor of individual issues for pending tests:

Add an end to end test to ensure the agent can process actions, including signed actions. The simplest example is the settings action to change the log level. For the signed actions (as of March 7, 2023), the only actions that can be signed by kibana are the endpoint actions. The agent validates the signature for all INPUT_ACTION types of actions though, so potentially one could sign osquery actions outside of the kibana if they want.
Also there are two things that are getting signed: 1) protection configuration of the policy 2) input actions. For comprehensive testing of all the error cases the tests would need to explore the cases where the signed policy configuration or the signed actions are being tempered with, such as: invalid signature validation key, corrupted signed data, policy id mismatch for the policy signed data, action id and the agent id mismatch for the action signed data. Basically tests different types of tampering use cases.

#5216

Create tests to ensure that Elastic Agent's upgrade are working as expected

#5217
#5219
#5218

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
meta Team:Elastic-Agent Label for the Agent team
Projects
None yet
Development

No branches or pull requests

4 participants