@@ -9,6 +9,7 @@ import expect from '@kbn/expect';
9
9
import {
10
10
AWS_PROVIDER_TEST_SUBJ ,
11
11
AWS_SINGLE_ACCOUNT_TEST_SUBJ ,
12
+ AWS_INPUT_TEST_SUBJECTS ,
12
13
} from '@kbn/cloud-security-posture-common' ;
13
14
import type { FtrProviderContext } from '../../../../../ftr_provider_context' ;
14
15
@@ -32,7 +33,7 @@ export default function ({ getPageObjects, getService }: FtrProviderContext) {
32
33
cisIntegration = pageObjects . cisAddIntegration ;
33
34
} ) ;
34
35
35
- it ( `should create agentless-agent` , async ( ) => {
36
+ it . skip ( `should create agentless-agent` , async ( ) => {
36
37
const integrationPolicyName = `cloud_security_posture-${ new Date ( ) . toISOString ( ) } ` ;
37
38
await cisIntegration . navigateToAddIntegrationCspmPage ( ) ;
38
39
@@ -42,16 +43,19 @@ export default function ({ getPageObjects, getService }: FtrProviderContext) {
42
43
await cisIntegration . inputIntegrationName ( integrationPolicyName ) ;
43
44
44
45
await cisIntegration . selectSetupTechnology ( 'agentless' ) ;
46
+ await cisIntegration . selectAwsCredentials ( 'direct' ) ;
45
47
46
48
await pageObjects . header . waitUntilLoadingHasFinished ( ) ;
47
49
48
- // With cloud connectors enabled, we need to fill in Role ARN and External ID instead of direct access keys
49
- if ( process . env . CSPM_AWS_ROLE_ARN && process . env . CSPM_AWS_EXTERNAL_ID ) {
50
- await cisIntegration . fillInTextField ( 'awsRoleArnInput' , process . env . CSPM_AWS_ROLE_ARN ) ;
50
+ if ( process . env . CSPM_AWS_ACCOUNT_ID && process . env . CSPM_AWS_SECRET_KEY ) {
51
+ await cisIntegration . fillInTextField (
52
+ AWS_INPUT_TEST_SUBJECTS . DIRECT_ACCESS_KEY_ID ,
53
+ process . env . CSPM_AWS_ACCOUNT_ID
54
+ ) ;
51
55
52
56
await cisIntegration . fillInTextField (
53
- 'awsCloudConnectorExternalId' ,
54
- process . env . CSPM_AWS_EXTERNAL_ID
57
+ AWS_INPUT_TEST_SUBJECTS . DIRECT_ACCESS_SECRET_KEY ,
58
+ process . env . CSPM_AWS_SECRET_KEY
55
59
) ;
56
60
}
57
61
0 commit comments