kibana/x-pack/test/security_solution_cypress
Devin W. Hurley 83e6c38159
[Security Solution] [Detections] Write failing status when executionStatus is in error (#79311)
* Write failing status when executionStatus is in error

* adds unit test for error handling if rule status service throws an error

* adds success test for when executionStatus is failed

* moves logic for writing executionStatus failure to rule status saved object inside find rules status route, updates find rules route to display error if executionStatus is in error, but not be in charge of writing the status. That job belongs to the find rules status route.

* test if we are writing an error status when calls are made to find_rules_status_route and adds a test for general error checking

* adds JSDocs description for rules status route, updates findRules filter to append rule ids to the end of query, removes object.keys()

* don't write an error to our rule status in the route, only read from the executionStatus property and merge that result with our stored failures

* fixes tests

* move mock rule status service out of __mocks__ folder and remove unnecessary references to mock in tests

* fix type error

* updates json.gzip for cypress

* PR feedback

* fix timing issue with integration tests

* removes unzipped data.json
2020-10-07 01:03:32 -04:00
..
es_archives [Security Solution] [Detections] Write failing status when executionStatus is in error (#79311) 2020-10-07 01:03:32 -04:00
cli_config.ts [SECURITY SOLUTION] Adds 'cypress:open-as-ci' command (#76125) 2020-09-07 13:26:41 +02:00
config.ts [SECURITY SOLUTION] Adds 'cypress:open-as-ci' command (#76125) 2020-09-07 13:26:41 +02:00
ftr_provider_context.d.ts
runner.ts [SECURITY SOLUTION] Adds 'cypress:open-as-ci' command (#76125) 2020-09-07 13:26:41 +02:00
services.ts
visual_config.ts [SECURITY SOLUTION] Adds 'cypress:open-as-ci' command (#76125) 2020-09-07 13:26:41 +02:00