Skip to content

Commit ec49422

Browse files
committed
[CI] Auto-commit changed files from 'node scripts/eslint_all_files --no-cache --fix'
1 parent 96ee56b commit ec49422

File tree

3 files changed

+13
-8
lines changed

3 files changed

+13
-8
lines changed

x-pack/solutions/security/test/cloud_security_posture_functional/agentless/create_agent.ts

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,10 @@ export default function ({ getPageObjects, getService }: FtrProviderContext) {
8484
await pageObjects.header.waitUntilLoadingHasFinished();
8585

8686
// With cloud connectors enabled, we need to fill in Role ARN and External ID instead of direct access keys
87-
await cisIntegration.fillInTextField('awsRoleArnInput', 'arn:aws:iam::123456789012:role/test-role');
87+
await cisIntegration.fillInTextField(
88+
'awsRoleArnInput',
89+
'arn:aws:iam::123456789012:role/test-role'
90+
);
8891
await cisIntegration.fillInTextField('awsCloudConnectorExternalId', 'test-external-id');
8992

9093
await cisIntegration.clickSaveButton();
@@ -125,7 +128,10 @@ export default function ({ getPageObjects, getService }: FtrProviderContext) {
125128
await pageObjects.header.waitUntilLoadingHasFinished();
126129

127130
// With cloud connectors enabled, we need to fill in Role ARN and External ID instead of direct access keys
128-
await cisIntegration.fillInTextField('awsRoleArnInput', 'arn:aws:iam::123456789012:role/test-role');
131+
await cisIntegration.fillInTextField(
132+
'awsRoleArnInput',
133+
'arn:aws:iam::123456789012:role/test-role'
134+
);
129135
await cisIntegration.fillInTextField('awsCloudConnectorExternalId', 'test-external-id');
130136

131137
await cisIntegration.clickSaveButton();

x-pack/solutions/security/test/serverless/functional/test_suites/ftr/cloud_security_posture/agentless/create_agent.ts

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,10 @@ export default function ({ getPageObjects, getService }: FtrProviderContext) {
4949
await cisIntegration.inputIntegrationName(integrationPolicyName);
5050

5151
// With cloud connectors enabled, we need to fill in Role ARN and External ID instead of direct access keys
52-
await cisIntegration.fillInTextField('awsRoleArnInput', 'arn:aws:iam::123456789012:role/test-role');
52+
await cisIntegration.fillInTextField(
53+
'awsRoleArnInput',
54+
'arn:aws:iam::123456789012:role/test-role'
55+
);
5356
await cisIntegration.fillInTextField('awsCloudConnectorExternalId', 'test-external-id');
5457

5558
await pageObjects.header.waitUntilLoadingHasFinished();

x-pack/solutions/security/test/serverless/functional/test_suites/ftr/cloud_security_posture/mki_only/agentless/mki_create_agent.ts

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ import expect from '@kbn/expect';
99
import {
1010
AWS_PROVIDER_TEST_SUBJ,
1111
AWS_SINGLE_ACCOUNT_TEST_SUBJ,
12-
AWS_INPUT_TEST_SUBJECTS,
1312
} from '@kbn/cloud-security-posture-common';
1413
import type { FtrProviderContext } from '../../../../../ftr_provider_context';
1514

@@ -48,10 +47,7 @@ export default function ({ getPageObjects, getService }: FtrProviderContext) {
4847

4948
// With cloud connectors enabled, we need to fill in Role ARN and External ID instead of direct access keys
5049
if (process.env.CSPM_AWS_ROLE_ARN && process.env.CSPM_AWS_EXTERNAL_ID) {
51-
await cisIntegration.fillInTextField(
52-
'awsRoleArnInput',
53-
process.env.CSPM_AWS_ROLE_ARN
54-
);
50+
await cisIntegration.fillInTextField('awsRoleArnInput', process.env.CSPM_AWS_ROLE_ARN);
5551

5652
await cisIntegration.fillInTextField(
5753
'awsCloudConnectorExternalId',

0 commit comments

Comments
 (0)