[Security Solution] Actualize prebuilt rule customization test plan#222188
Conversation
|
Pinging @elastic/security-detections-response (Team:Detections and Resp) |
|
Pinging @elastic/security-solution (Team: SecuritySolution) |
|
Pinging @elastic/security-detection-rule-management (Team:Detection Rule Management) |
0b2b8a9 to
18dfdca
Compare
nikitaindik
left a comment
There was a problem hiding this comment.
Nice job refining it, @maximpn! I've taken a look and posted a few comments. Please check it out.
| And should bring the user to the prebuilt rule edit page when clicked on | ||
| ``` | ||
|
|
||
| #### **Scenario: User can bulk edit prebuilt rules from rules management page** |
There was a problem hiding this comment.
We have separate scenarios for editing a customized and non-cust. prebuilt rules:
- User can edit a customized prebuilt rule from the rule edit page
- User can edit a non-customized prebuilt rule from the rule edit page
Do we want to treat bulk actions the same way? Like:
- User can bulk edit prebuilt rules that weren't customized
- User can bulk edit prebuilt rules that were previosly customized
wdyt?
There was a problem hiding this comment.
Ideally, bulk editing would require 3 scenarios to test all the cases
- bulk edit non-customized prebuilt rules
- bulk edit customized prebuilt rules
- bulk edit a mix of customized and non-customized prebuilt rules
But it's sufficient to have only the last one to reduce maintainability costs. So I've updated the test scenario accordingly.
| @@ -246,20 +272,74 @@ Examples: | |||
| **Automation**: 1 integration test. | |||
There was a problem hiding this comment.
Should we test this with different endpoints: single update, single patch, bulk update?
| @@ -293,7 +373,7 @@ Then the Modified badge should NOT be present on the page | |||
| **Automation**: 1 cypress test. | |||
There was a problem hiding this comment.
We need to change the last "modified" to "customized" in scenario title for consistency with other scenarios.
"Modified badge should appear on the rule management table when prebuilt rule is modified customized"
| And the "Modified" badge should NOT be present in the table row | ||
| ``` | ||
|
|
||
| #### **Scenario: User should be able to see only customized rules in the rule updates table** |
There was a problem hiding this comment.
| #### **Scenario: User should be able to see only customized rules in the rule updates table** | |
| #### **Scenario: User should be able to filter by customized rules in the rule updates table** |
For consistency with scenario below
| And a button to proceed with applying the action only to custom rules should be displayed | ||
| ``` | ||
|
|
||
| #### **Scenario: User can't edit prebuilt rules via bulk edit API under an insufficient license** |
There was a problem hiding this comment.
Do we then also want an integration test for a single rule edit? Or do we consider it covered by a Cypress test?
836c452 to
182f335
Compare
182f335 to
1ebfca1
Compare
|
Hi @nikitaindik, I've addressed your comments. Could you have a look? |
nikitaindik
left a comment
There was a problem hiding this comment.
Thanks for addressing my feedback! LGTM now. 👍
|
Starting backport for target branches: 8.19 |
…lastic#222188) **Addresses:** elastic#202068 ## Summary This PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature. ## Details The changes include - Adding an extra test scenario for prebuilt rule customization via public API - Fixing a scenario under Licensing section - Fixing wording to make scenarios simpler (cherry picked from commit 98aaf50)
💚 All backports created successfully
Note: Successful backport PRs will be merged automatically after passing CI. Questions ?Please refer to the Backport tool documentation |
… plan (#222188) (#224727) # Backport This will backport the following commits from `main` to `8.19`: - [[Security Solution] Actualize prebuilt rule customization test plan (#222188)](#222188) <!--- Backport version: 9.6.6 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sorenlouv/backport) <!--BACKPORT [{"author":{"name":"Maxim Palenov","email":"maxim.palenov@elastic.co"},"sourceCommit":{"committedDate":"2025-06-20T15:16:59Z","message":"[Security Solution] Actualize prebuilt rule customization test plan (#222188)\n\n**Addresses:** https://github.com/elastic/kibana/issues/202068\n\n## Summary\n\nThis PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature.\n\n## Details\n\nThe changes include\n\n- Adding an extra test scenario for prebuilt rule customization via public API\n- Fixing a scenario under Licensing section\n- Fixing wording to make scenarios simpler","sha":"98aaf50be2e002e645ac1cd081bfaba2e04714a3","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","test-plan","Team:Detections and Resp","Team: SecuritySolution","Team:Detection Rule Management","Feature:Prebuilt Detection Rules","backport:version","v9.1.0","v8.19.0"],"title":"[Security Solution] Actualize prebuilt rule customization test plan","number":222188,"url":"https://github.com/elastic/kibana/pull/222188","mergeCommit":{"message":"[Security Solution] Actualize prebuilt rule customization test plan (#222188)\n\n**Addresses:** https://github.com/elastic/kibana/issues/202068\n\n## Summary\n\nThis PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature.\n\n## Details\n\nThe changes include\n\n- Adding an extra test scenario for prebuilt rule customization via public API\n- Fixing a scenario under Licensing section\n- Fixing wording to make scenarios simpler","sha":"98aaf50be2e002e645ac1cd081bfaba2e04714a3"}},"sourceBranch":"main","suggestedTargetBranches":["8.19"],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/222188","number":222188,"mergeCommit":{"message":"[Security Solution] Actualize prebuilt rule customization test plan (#222188)\n\n**Addresses:** https://github.com/elastic/kibana/issues/202068\n\n## Summary\n\nThis PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature.\n\n## Details\n\nThe changes include\n\n- Adding an extra test scenario for prebuilt rule customization via public API\n- Fixing a scenario under Licensing section\n- Fixing wording to make scenarios simpler","sha":"98aaf50be2e002e645ac1cd081bfaba2e04714a3"}},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}] BACKPORT--> Co-authored-by: Maxim Palenov <maxim.palenov@elastic.co>
…lastic#222188) **Addresses:** elastic#202068 ## Summary This PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature. ## Details The changes include - Adding an extra test scenario for prebuilt rule customization via public API - Fixing a scenario under Licensing section - Fixing wording to make scenarios simpler
…lastic#222188) **Addresses:** elastic#202068 ## Summary This PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature. ## Details The changes include - Adding an extra test scenario for prebuilt rule customization via public API - Fixing a scenario under Licensing section - Fixing wording to make scenarios simpler (cherry picked from commit 98aaf50)
…lastic#222188) **Addresses:** elastic#202068 ## Summary This PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature. ## Details The changes include - Adding an extra test scenario for prebuilt rule customization via public API - Fixing a scenario under Licensing section - Fixing wording to make scenarios simpler (cherry picked from commit 98aaf50)
💚 All backports created successfully
Note: Successful backport PRs will be merged automatically after passing CI. Questions ?Please refer to the Backport tool documentation |
… plan (#222188) (#226783) # Backport This will backport the following commits from `main` to `8.18`: - [[Security Solution] Actualize prebuilt rule customization test plan (#222188)](#222188) <!--- Backport version: 10.0.1 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sorenlouv/backport) <!--BACKPORT [{"author":{"name":"Maxim Palenov","email":"maxim.palenov@elastic.co"},"sourceCommit":{"committedDate":"2025-06-20T15:16:59Z","message":"[Security Solution] Actualize prebuilt rule customization test plan (#222188)\n\n**Addresses:** https://github.com/elastic/kibana/issues/202068\n\n## Summary\n\nThis PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature.\n\n## Details\n\nThe changes include\n\n- Adding an extra test scenario for prebuilt rule customization via public API\n- Fixing a scenario under Licensing section\n- Fixing wording to make scenarios simpler","sha":"98aaf50be2e002e645ac1cd081bfaba2e04714a3","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","test-plan","Team:Detections and Resp","Team: SecuritySolution","Team:Detection Rule Management","Feature:Prebuilt Detection Rules","backport:version","v9.1.0","v8.19.0"],"title":"[Security Solution] Actualize prebuilt rule customization test plan","number":222188,"url":"https://github.com/elastic/kibana/pull/222188","mergeCommit":{"message":"[Security Solution] Actualize prebuilt rule customization test plan (#222188)\n\n**Addresses:** https://github.com/elastic/kibana/issues/202068\n\n## Summary\n\nThis PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature.\n\n## Details\n\nThe changes include\n\n- Adding an extra test scenario for prebuilt rule customization via public API\n- Fixing a scenario under Licensing section\n- Fixing wording to make scenarios simpler","sha":"98aaf50be2e002e645ac1cd081bfaba2e04714a3"}},"sourceBranch":"main","suggestedTargetBranches":[],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/222188","number":222188,"mergeCommit":{"message":"[Security Solution] Actualize prebuilt rule customization test plan (#222188)\n\n**Addresses:** https://github.com/elastic/kibana/issues/202068\n\n## Summary\n\nThis PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature.\n\n## Details\n\nThe changes include\n\n- Adding an extra test scenario for prebuilt rule customization via public API\n- Fixing a scenario under Licensing section\n- Fixing wording to make scenarios simpler","sha":"98aaf50be2e002e645ac1cd081bfaba2e04714a3"}},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"url":"https://github.com/elastic/kibana/pull/224727","number":224727,"state":"MERGED","mergeCommit":{"sha":"296c3b0a4d5ed79611260674a917f08cb726fec3","message":"[8.19] [Security Solution] Actualize prebuilt rule customization test plan (#222188) (#224727)\n\n# Backport\n\nThis will backport the following commits from `main` to `8.19`:\n- [[Security Solution] Actualize prebuilt rule customization test plan\n(#222188)](https://github.com/elastic/kibana/pull/222188)\n\n\n\n### Questions ?\nPlease refer to the [Backport tool\ndocumentation](https://github.com/sorenlouv/backport)\n\n\n\nCo-authored-by: Maxim Palenov <maxim.palenov@elastic.co>"}}]}] BACKPORT-->
…plan (#222188) (#226781) # Backport This will backport the following commits from `main` to `9.0`: - [[Security Solution] Actualize prebuilt rule customization test plan (#222188)](#222188) <!--- Backport version: 10.0.1 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sorenlouv/backport) <!--BACKPORT [{"author":{"name":"Maxim Palenov","email":"maxim.palenov@elastic.co"},"sourceCommit":{"committedDate":"2025-06-20T15:16:59Z","message":"[Security Solution] Actualize prebuilt rule customization test plan (#222188)\n\n**Addresses:** https://github.com/elastic/kibana/issues/202068\n\n## Summary\n\nThis PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature.\n\n## Details\n\nThe changes include\n\n- Adding an extra test scenario for prebuilt rule customization via public API\n- Fixing a scenario under Licensing section\n- Fixing wording to make scenarios simpler","sha":"98aaf50be2e002e645ac1cd081bfaba2e04714a3","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","test-plan","Team:Detections and Resp","Team: SecuritySolution","Team:Detection Rule Management","Feature:Prebuilt Detection Rules","backport:version","v9.1.0","v8.19.0"],"title":"[Security Solution] Actualize prebuilt rule customization test plan","number":222188,"url":"https://github.com/elastic/kibana/pull/222188","mergeCommit":{"message":"[Security Solution] Actualize prebuilt rule customization test plan (#222188)\n\n**Addresses:** https://github.com/elastic/kibana/issues/202068\n\n## Summary\n\nThis PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature.\n\n## Details\n\nThe changes include\n\n- Adding an extra test scenario for prebuilt rule customization via public API\n- Fixing a scenario under Licensing section\n- Fixing wording to make scenarios simpler","sha":"98aaf50be2e002e645ac1cd081bfaba2e04714a3"}},"sourceBranch":"main","suggestedTargetBranches":[],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/222188","number":222188,"mergeCommit":{"message":"[Security Solution] Actualize prebuilt rule customization test plan (#222188)\n\n**Addresses:** https://github.com/elastic/kibana/issues/202068\n\n## Summary\n\nThis PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature.\n\n## Details\n\nThe changes include\n\n- Adding an extra test scenario for prebuilt rule customization via public API\n- Fixing a scenario under Licensing section\n- Fixing wording to make scenarios simpler","sha":"98aaf50be2e002e645ac1cd081bfaba2e04714a3"}},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"url":"https://github.com/elastic/kibana/pull/224727","number":224727,"state":"MERGED","mergeCommit":{"sha":"296c3b0a4d5ed79611260674a917f08cb726fec3","message":"[8.19] [Security Solution] Actualize prebuilt rule customization test plan (#222188) (#224727)\n\n# Backport\n\nThis will backport the following commits from `main` to `8.19`:\n- [[Security Solution] Actualize prebuilt rule customization test plan\n(#222188)](https://github.com/elastic/kibana/pull/222188)\n\n\n\n### Questions ?\nPlease refer to the [Backport tool\ndocumentation](https://github.com/sorenlouv/backport)\n\n\n\nCo-authored-by: Maxim Palenov <maxim.palenov@elastic.co>"}}]}] BACKPORT-->
|
Starting backport for target branches: 8.18, 8.19, 9.1 |
|
Starting backport for target branches: 8.18, 8.19, 9.0, 9.1 |
|
Starting backport for target branches: 8.18, 8.19, 9.0, 9.1 |
💔 All backports failed
Manual backportTo create the backport manually run: Questions ?Please refer to the Backport tool documentation |
💔 All backports failed
Manual backportTo create the backport manually run: Questions ?Please refer to the Backport tool documentation |
1 similar comment
💔 All backports failed
Manual backportTo create the backport manually run: Questions ?Please refer to the Backport tool documentation |
Addresses: #202068
Summary
This PR actualizes prebuilt rule customization test plan with the current feature state and desired test coverage we expect for prebuilt rule customization sub-feature.
Details
The changes include