Skip to content
This repository has been archived by the owner on Sep 17, 2024. It is now read-only.

chore: refactor Fleet upgrade tests #671

Merged
merged 12 commits into from
Feb 4, 2021

Conversation

mdelapenya
Copy link
Contributor

@mdelapenya mdelapenya commented Jan 27, 2021

What does this PR do?

We are refactoring the installer process to support setting the version of the installer package, which will allow us to consume different artifacts at different places of the test suite (i.e. the upgrade test).

  • we are adding a few helper Make goals representing different use cases when running the tests:
    • Run the E2E tests for Fleet test suite
    • Run the E2E tests for Fleet test suite using CI snapshots
    • Run the E2E tests for Fleet test suite using CI snapshots for a pull request
    • Run the E2E tests for Fleet test suite in nightly, testing the stale version
    • Run the E2E tests for Fleet test suite in nightly, testing the stale version, using CI snapshots

We do not consider running the upgrade tests against a PR, that's why there is no use case for the nightly tests for PR and CI snapshots.

  • we are bumping the stale version from 7.10.1 to 7.10.2, because there is not CI snapshot for 7.10.1 under the GCP bucket.
  • we are refactoring the creation of the installer struct including version and stale state.
  • we detected that the SNAPSHOT suffix should be added in certain cases when using the CI snapshots.
  • we are making a stronger check when flattening the layout for the TAR installer, ensuring it's clean in the container: we remove the target dir.
  • updated the unit tests to generate the GCP paths in different use cases
  • we are adding the @nightly tag to the upgrade test, so that it's executed in the nightly execution. See feat: support executing nightly tests on CI #669

Why is it important?

In one sentence, the main goal is to cover all use cases.

The upgrade test created an installer in the stale state, but the current source code did not know about stale state and always used the agentVersion passed as env var, failing the test executions under the use cases described in this PR. Here we are honouring the version of the stale agent, keeping old behavior as it was.

Checklist

  • My code follows the style guidelines of this project
  • I have commented my code, particularly in hard-to-understand areas
  • I have made corresponding changes to the documentation
  • I have made corresponding change to the default configuration files
  • I have added tests that prove my fix is effective or that my feature works
  • I have run the Unit tests for the CLI, and they are passing locally
  • I have run the End-2-End tests for the suite I'm working on, and they are passing locally
  • I have noticed new Go dependencies (run make notice in the proper directory)

Author's Checklist

  • Verified multiple use cases, as described above.
  • Want to check that the developer experience is clear and concise.

How to test this PR locally

These are the tested use cases, as described above:

make -C e2e fleet-fleet
make -C e2e fleet-fleet-ci-snapshots
make -C e2e fleet-fleet-pr-ci-snapshots
make -C e2e fleet-nightly
make -C e2e fleet-nightly-ci-snapshots

Related issues

Follow-ups

I'd like to check with the Agent team about the consequences of running the upgrade tests on PRs

@mdelapenya mdelapenya self-assigned this Jan 27, 2021
@mdelapenya mdelapenya requested review from a team, michalpristas and EricDavisX January 27, 2021 19:06
@@ -45,7 +45,7 @@ var agentVersion = agentVersionBase

// agentStaleVersion is the version of the agent to use as a base during upgrade
// It can be overriden by ELASTIC_AGENT_STALE_VERSION env var. Using latest GA as a default.
var agentStaleVersion = "7.10.0"
var agentStaleVersion = "7.10.2"
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pairing version with Jenkinsfile


return err
cmds := [][]string{
[]string{"rm", "-fr", "/elastic-agent"},
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

When running all Fleet tests in my local machine, I saw multiple errors when moving the agent, because mv will refuse to rename a directory to another directory if the target directory contains files.

It does not happen on CI but in my local machine happens after multiple runs. I'm adding it defensively, as it's harmless.

@@ -163,7 +163,7 @@ func runElasticAgentCommand(profile string, image string, service string, proces
// be defined by that value
// Else, if the environment variable BEATS_USE_CI_SNAPSHOTS is set, then the artifact
// to be downloaded will be defined by the latest snapshot produced by the Beats CI.
func downloadAgentBinary(artifact string, version string, OS string, arch string, extension string) (string, string, error) {
func downloadAgentBinary(artifact string, version string, OS string, arch string, extension string, stale bool) (string, string, error) {
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As an improvement in a follow-up PR, I'm interested in creating a BinaryRequest struct to hold the references needed to download the binary, which would simplify the signature of the method.

@elasticmachine
Copy link
Contributor

elasticmachine commented Jan 27, 2021

💔 Tests Failed

the below badges are clickable and redirect to their specific view in the CI or DOCS
Pipeline View Test View Changes Artifacts preview

Expand to view the summary

Build stats

  • Build Cause: Pull request #671 updated

    • Start Time: 2021-02-02T10:48:17.512+0000
  • Duration: 32 min 13 sec

  • Commit: 81953d0

Test stats 🧪

Test Results
Failed 7
Passed 108
Skipped 19
Total 134

Test errors 7

Expand to view the tests failures

Initializing / End-To-End Tests / ubuntu-18.04_fleet_stand_alone_agent / Deploying a default stand-alone agent – Stand-alone Agent
    Expand to view the error details

     Step there is new data in the index from agent: Error getting response from Elasticsearch. Status: 404 Not Found, ResponseError: map[error:map[index:logs-elastic_agent-default index_uuid:_na_ reason:no such index [logs-elastic_agent-default] resource.id:logs-elastic_agent-default resource.type:index_or_alias root_cause:[map[index:logs-elastic_agent-default index_uuid:_na_ reason:no such index [logs-elastic_agent-default] resource.id:logs-elastic_agent-default resource.type:index_or_alias type:index_not_found_exception]] type:index_not_found_exception] status:404] 
    

  • no stacktrace
Initializing / End-To-End Tests / ubuntu-18.04_fleet_stand_alone_agent / Deploying a ubi8 stand-alone agent – Stand-alone Agent
    Expand to view the error details

     Step there is new data in the index from agent: Error getting response from Elasticsearch. Status: 404 Not Found, ResponseError: map[error:map[index:logs-elastic_agent-default index_uuid:_na_ reason:no such index [logs-elastic_agent-default] resource.id:logs-elastic_agent-default resource.type:index_or_alias root_cause:[map[index:logs-elastic_agent-default index_uuid:_na_ reason:no such index [logs-elastic_agent-default] resource.id:logs-elastic_agent-default resource.type:index_or_alias type:index_not_found_exception]] type:index_not_found_exception] status:404] 
    

  • no stacktrace
Initializing / End-To-End Tests / ubuntu-18.04_fleet_stand_alone_agent / Stopping the default agent container stops data going into ES – Stand-alone Agent
    Expand to view the error details

     Step there is no new data in the index after agent shuts down: Error getting response from Elasticsearch. Status: 404 Not Found, ResponseError: map[error:map[index:logs-elastic_agent-default index_uuid:_na_ reason:no such index [logs-elastic_agent-default] resource.id:logs-elastic_agent-default resource.type:index_or_alias root_cause:[map[index:logs-elastic_agent-default index_uuid:_na_ reason:no such index [logs-elastic_agent-default] resource.id:logs-elastic_agent-default resource.type:index_or_alias type:index_not_found_exception]] type:index_not_found_exception] status:404] 
    

  • no stacktrace
Initializing / End-To-End Tests / ubuntu-18.04_fleet_stand_alone_agent / Stopping the ubi8 agent container stops data going into ES – Stand-alone Agent
    Expand to view the error details

     Step there is no new data in the index after agent shuts down: Error getting response from Elasticsearch. Status: 404 Not Found, ResponseError: map[error:map[index:logs-elastic_agent-default index_uuid:_na_ reason:no such index [logs-elastic_agent-default] resource.id:logs-elastic_agent-default resource.type:index_or_alias root_cause:[map[index:logs-elastic_agent-default index_uuid:_na_ reason:no such index [logs-elastic_agent-default] resource.id:logs-elastic_agent-default resource.type:index_or_alias type:index_not_found_exception]] type:index_not_found_exception] status:404] 
    

  • no stacktrace
Initializing / End-To-End Tests / ubuntu-18.04_fleet_agent_endpoint_integration / Adding the Endpoint Integration to an Agent makes the host to show in Security App – Agent Endpoint Integration
    Expand to view the error details

     Step the host name is shown in the Administration view in the Security App as "online": The host 582c091be257 is not listed in the Administration view in the Security App 
    

  • no stacktrace
Initializing / End-To-End Tests / ubuntu-18.04_fleet_agent_endpoint_integration / Deploying an Endpoint makes policies to appear in the Security App – Agent Endpoint Integration
    Expand to view the error details

     Step the policy response will be shown in the Security App: The policy response is not listed as 'success' in the Administration view in the Security App yet 
    

  • no stacktrace
Initializing / End-To-End Tests / ubuntu-18.04_fleet_agent_endpoint_integration / Changing an Agent policy is reflected in the Security App – Agent Endpoint Integration
    Expand to view the error details

     Step the policy will reflect the change in the Security App: No endpoint-security events where found for the agent in the 30d3545b-e849-498d-81bb-9eafd7a19435 policy 
    

  • no stacktrace

Steps errors 7

Expand to view the steps failures

Run functional tests for fleet:agent_endpoint_integration && ~@nightly
  • Took 28 min 7 sec . View more details on here
  • Description: .ci/scripts/functional-test.sh "fleet" "agent_endpoint_integration && ~@nightly" "8.0.0-SNAPSHOT" "8.0.0-SNAPSHOT"
Archive the artifacts
  • Took 0 min 1 sec . View more details on here
  • Description: [2021-02-02T11:20:27.573Z] Archiving artifacts script returned exit code 2
Archive the artifacts
  • Took 0 min 0 sec . View more details on here
  • Description: [2021-02-02T11:20:28.499Z] Archiving artifacts hudson.AbortException: script returned exit code 2
Run functional tests for fleet:stand_alone_agent && ~@nightly
  • Took 25 min 8 sec . View more details on here
  • Description: .ci/scripts/functional-test.sh "fleet" "stand_alone_agent && ~@nightly" "8.0.0-SNAPSHOT" "8.0.0-SNAPSHOT"
Archive the artifacts
  • Took 0 min 1 sec . View more details on here
  • Description: [2021-02-02T11:17:26.785Z] Archiving artifacts script returned exit code 2
Archive the artifacts
  • Took 0 min 0 sec . View more details on here
  • Description: [2021-02-02T11:17:27.698Z] Archiving artifacts hudson.AbortException: script returned exit code 2
Error signal
  • Took 0 min 0 sec . View more details on here
  • Description: hudson.AbortException: script returned exit code 2

Log output

Expand to view the last 100 lines of log output

[2021-02-02T11:19:35.796Z] fleet_package-registry_1 is up-to-date
[2021-02-02T11:19:35.796Z] fleet_elasticsearch_1 is up-to-date
[2021-02-02T11:19:35.796Z] Creating fleet_centos-systemd_elastic-agent_1 ... 
[2021-02-02T11:19:35.796Z] fleet_kibana_1 is up-to-date
[2021-02-02T11:19:36.363Z] 
Creating fleet_centos-systemd_elastic-agent_1 ... done
time="2021-02-02T11:19:36Z" level=debug msg="Docker compose executed." cmd="[up -d]" composeFilePaths="[/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/profiles/fleet/docker-compose.yml /var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/services/centos-systemd/docker-compose.yml]" env="map[centos_systemdAgentBinarySrcPath:/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz375025722 centos_systemdAgentBinaryTargetPath:/elastic-agent-8.0.0-SNAPSHOT-x86_64.tar.gz centos_systemdContainerName:fleet_centos-systemd_elastic-agent_1 centos_systemdTag:latest kibanaConfigPath:/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/src/github.com/elastic/e2e-testing/e2e/_suites/fleet/configurations/kibana.config.yml stackVersion:8.0.0-SNAPSHOT]" profile=fleet
[2021-02-02T11:19:37.298Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/data/elastic-agent-b89e5d/downloads/endpoint-security-8.0.0-SNAPSHOT-linux-x86_64.tar.gz.asc
[2021-02-02T11:19:37.298Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/data/elastic-agent-b89e5d/elastic-agent
[2021-02-02T11:19:37.556Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/data/elastic-agent-b89e5d/downloads/apm-server-8.0.0-SNAPSHOT-linux-x86_64.tar.gz.asc
[2021-02-02T11:19:37.556Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/data/elastic-agent-b89e5d/downloads/metricbeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz.asc
[2021-02-02T11:19:37.556Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/data/elastic-agent-b89e5d/downloads/apm-server-8.0.0-SNAPSHOT-linux-x86_64.tar.gz
[2021-02-02T11:19:37.814Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/data/elastic-agent-b89e5d/downloads/metricbeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz.sha512
[2021-02-02T11:19:37.814Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/README.md
[2021-02-02T11:19:37.814Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/elastic-agent.yml
[2021-02-02T11:19:37.814Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/elastic-agent.reference.yml
[2021-02-02T11:19:37.814Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/data/elastic-agent-b89e5d/downloads/endpoint-security-8.0.0-SNAPSHOT-linux-x86_64.tar.gz.sha512
[2021-02-02T11:19:37.814Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/NOTICE.txt
[2021-02-02T11:19:37.814Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/.elastic-agent.active.commit
[2021-02-02T11:19:37.814Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/data/elastic-agent-b89e5d/downloads/endpoint-security-8.0.0-SNAPSHOT-linux-x86_64.tar.gz
[2021-02-02T11:19:38.073Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/data/elastic-agent-b89e5d/downloads/apm-server-8.0.0-SNAPSHOT-linux-x86_64.tar.gz.sha512
[2021-02-02T11:19:38.073Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/data/elastic-agent-b89e5d/downloads/metricbeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz
[2021-02-02T11:19:38.331Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/LICENSE.txt
[2021-02-02T11:19:38.331Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/data/elastic-agent-b89e5d/downloads/filebeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz.asc
[2021-02-02T11:19:38.331Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/data/elastic-agent-b89e5d/downloads/filebeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz
[2021-02-02T11:19:38.589Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/.build_hash.txt
[2021-02-02T11:19:38.589Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/data/elastic-agent-b89e5d/downloads/filebeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz.sha512
[2021-02-02T11:19:38.589Z] elastic-agent-8.0.0-SNAPSHOT-linux-x86_64/elastic-agent
[2021-02-02T11:19:38.589Z] time="2021-02-02T11:19:38Z" level=debug msg="Docker compose executed." cmd="[exec -T centos-systemd tar -xvf /elastic-agent-8.0.0-SNAPSHOT-x86_64.tar.gz]" composeFilePaths="[/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/profiles/fleet/docker-compose.yml /var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/services/centos-systemd/docker-compose.yml]" env="map[centos_systemdAgentBinarySrcPath:/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz375025722 centos_systemdAgentBinaryTargetPath:/elastic-agent-8.0.0-SNAPSHOT-x86_64.tar.gz centos_systemdContainerName:fleet_centos-systemd_elastic-agent_1 centos_systemdTag:latest kibanaConfigPath:/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/src/github.com/elastic/e2e-testing/e2e/_suites/fleet/configurations/kibana.config.yml stackVersion:8.0.0-SNAPSHOT]" profile=fleet
[2021-02-02T11:19:39.524Z] time="2021-02-02T11:19:39Z" level=debug msg="Docker compose executed." cmd="[exec -T centos-systemd rm -fr /elastic-agent]" composeFilePaths="[/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/profiles/fleet/docker-compose.yml /var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/services/centos-systemd/docker-compose.yml]" env="map[centos_systemdAgentBinarySrcPath:/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz375025722 centos_systemdAgentBinaryTargetPath:/elastic-agent-8.0.0-SNAPSHOT-x86_64.tar.gz centos_systemdContainerName:fleet_centos-systemd_elastic-agent_1 centos_systemdTag:latest kibanaConfigPath:/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/src/github.com/elastic/e2e-testing/e2e/_suites/fleet/configurations/kibana.config.yml stackVersion:8.0.0-SNAPSHOT]" profile=fleet
[2021-02-02T11:19:40.458Z] time="2021-02-02T11:19:40Z" level=debug msg="Docker compose executed." cmd="[exec -T centos-systemd mv /elastic-agent-8.0.0-SNAPSHOT-linux-x86_64 /elastic-agent]" composeFilePaths="[/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/profiles/fleet/docker-compose.yml /var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/services/centos-systemd/docker-compose.yml]" env="map[centos_systemdAgentBinarySrcPath:/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz375025722 centos_systemdAgentBinaryTargetPath:/elastic-agent-8.0.0-SNAPSHOT-x86_64.tar.gz centos_systemdContainerName:fleet_centos-systemd_elastic-agent_1 centos_systemdTag:latest kibanaConfigPath:/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/src/github.com/elastic/e2e-testing/e2e/_suites/fleet/configurations/kibana.config.yml stackVersion:8.0.0-SNAPSHOT]" profile=fleet
[2021-02-02T11:19:41.395Z] The Elastic Agent is currently in BETA and should not be used in production
[2021-02-02T11:19:41.395Z] 
[2021-02-02T11:19:43.925Z] Successfully enrolled the Elastic Agent.
[2021-02-02T11:19:43.925Z] Installation was successful and Elastic Agent is running.
[2021-02-02T11:19:43.925Z] time="2021-02-02T11:19:43Z" level=debug msg="Docker compose executed." cmd="[exec -T centos-systemd /elastic-agent/elastic-agent install --force --insecure --enrollment-token WE9sNFluY0JBWExYVlBqVUdGaXM6dmM3Rlc1bndUSUMyZERzeDc2QUtOZw== --kibana-url http://kibana:5601]" composeFilePaths="[/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/profiles/fleet/docker-compose.yml /var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/services/centos-systemd/docker-compose.yml]" env="map[centos_systemdAgentBinarySrcPath:/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz375025722 centos_systemdAgentBinaryTargetPath:/elastic-agent-8.0.0-SNAPSHOT-x86_64.tar.gz centos_systemdContainerName:fleet_centos-systemd_elastic-agent_1 centos_systemdTag:latest kibanaConfigPath:/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/src/github.com/elastic/e2e-testing/e2e/_suites/fleet/configurations/kibana.config.yml stackVersion:8.0.0-SNAPSHOT]" profile=fleet
[2021-02-02T11:19:44.184Z] time="2021-02-02T11:19:43Z" level=info msg="Hostname retrieved from the Docker client" containerName=fleet_centos-systemd_elastic-agent_1 hostname=a32427dc70aa
[2021-02-02T11:19:44.184Z] time="2021-02-02T11:19:44Z" level=debug msg="Agent listed in Fleet with online status" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 hostname=a32427dc70aa
[2021-02-02T11:19:44.184Z] time="2021-02-02T11:19:44Z" level=warning msg="The Agent is not in the online status yet" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 elapsedTime=36.307903ms hostname=a32427dc70aa isAgentInStatus=false retry=1 status=online
[2021-02-02T11:19:44.443Z] time="2021-02-02T11:19:44Z" level=debug msg="Agent listed in Fleet with online status" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 hostname=a32427dc70aa
[2021-02-02T11:19:44.443Z] time="2021-02-02T11:19:44Z" level=warning msg="The Agent is not in the online status yet" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 elapsedTime=427.459957ms hostname=a32427dc70aa isAgentInStatus=false retry=2 status=online
[2021-02-02T11:19:45.821Z] time="2021-02-02T11:19:45Z" level=debug msg="Agent listed in Fleet with online status" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 hostname=a32427dc70aa
[2021-02-02T11:19:45.821Z] time="2021-02-02T11:19:45Z" level=warning msg="The Agent is not in the online status yet" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 elapsedTime=1.803975817s hostname=a32427dc70aa isAgentInStatus=false retry=3 status=online
[2021-02-02T11:19:47.728Z] time="2021-02-02T11:19:47Z" level=debug msg="Agent listed in Fleet with online status" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 hostname=a32427dc70aa
[2021-02-02T11:19:47.728Z] time="2021-02-02T11:19:47Z" level=warning msg="The Agent is not in the online status yet" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 elapsedTime=3.540989661s hostname=a32427dc70aa isAgentInStatus=false retry=4 status=online
[2021-02-02T11:19:53.010Z] time="2021-02-02T11:19:51Z" level=debug msg="Agent listed in Fleet with online status" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 hostname=a32427dc70aa
[2021-02-02T11:19:53.010Z] time="2021-02-02T11:19:51Z" level=warning msg="The Agent is not in the online status yet" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 elapsedTime=7.973168948s hostname=a32427dc70aa isAgentInStatus=false retry=5 status=online
[2021-02-02T11:19:58.274Z] time="2021-02-02T11:19:57Z" level=debug msg="Agent listed in Fleet with online status" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 hostname=a32427dc70aa
[2021-02-02T11:19:58.274Z] time="2021-02-02T11:19:57Z" level=warning msg="The Agent is not in the online status yet" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 elapsedTime=13.453903778s hostname=a32427dc70aa isAgentInStatus=false retry=6 status=online
[2021-02-02T11:20:02.461Z] time="2021-02-02T11:20:02Z" level=debug msg="Agent listed in Fleet with online status" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 hostname=a32427dc70aa
[2021-02-02T11:20:02.461Z] time="2021-02-02T11:20:02Z" level=info msg="The Agent is in the desired status" elapsedTime=18.054035958s hostname=a32427dc70aa isAgentInStatus=true retries=7 status=online
[2021-02-02T11:20:02.461Z] time="2021-02-02T11:20:02Z" level=debug msg="Integration in latest version found" name=endpoint title="Endpoint Security" version=0.17.0
[2021-02-02T11:20:04.990Z] time="2021-02-02T11:20:04Z" level=info msg="Integration added to the configuration" integration=endpoint integrationConfigurationID=130759e1-9890-490d-b351-e792093f4754 policyID=09e39270-6545-11eb-9d7d-4d67627e0df1 version=0.17.0
[2021-02-02T11:20:04.990Z] time="2021-02-02T11:20:04Z" level=debug msg="Package policy found in the configuration" package="{130759e1-9890-490d-b351-e792093f4754 endpoint Endpoint Security 0.17.0 0xc000439070}" policyID=09e39270-6545-11eb-9d7d-4d67627e0df1
[2021-02-02T11:20:08.271Z] time="2021-02-02T11:20:07Z" level=info msg="Integration deleted from the configuration" integration=endpoint packageConfigId=130759e1-9890-490d-b351-e792093f4754 policyID=09e39270-6545-11eb-9d7d-4d67627e0df1 version=0.17.0
[2021-02-02T11:20:08.271Z] time="2021-02-02T11:20:07Z" level=debug msg="Agent listed in Fleet with online status" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 hostname=a32427dc70aa
[2021-02-02T11:20:08.271Z] time="2021-02-02T11:20:08Z" level=info msg="The Agent is in the desired status" elapsedTime=81.181234ms hostname=a32427dc70aa isAgentInStatus=true retries=1 status=online
[2021-02-02T11:20:08.271Z] time="2021-02-02T11:20:08Z" level=info msg="The Agent is not listed in the Administration view in the Security App" elapsedTime=93.499637ms hostname=a32427dc70aa retries=1
[2021-02-02T11:20:08.271Z] time="2021-02-02T11:20:08Z" level=info msg="Process desired state checked" container=fleet_centos-systemd_elastic-agent_1 desiredState=stopped mustBePresent=false process=elastic-endpoint
[2021-02-02T11:20:09.644Z] Elastic Agent has been uninstalled.
[2021-02-02T11:20:09.902Z] time="2021-02-02T11:20:09Z" level=debug msg="Docker compose executed." cmd="[exec -T centos-systemd elastic-agent uninstall -f]" composeFilePaths="[/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/profiles/fleet/docker-compose.yml /var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/services/centos-systemd/docker-compose.yml]" env="map[centos_systemdAgentBinarySrcPath:/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz375025722 centos_systemdAgentBinaryTargetPath:/elastic-agent-8.0.0-SNAPSHOT-x86_64.tar.gz centos_systemdContainerName:fleet_centos-systemd_elastic-agent_1 centos_systemdTag:latest kibanaConfigPath:/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/src/github.com/elastic/e2e-testing/e2e/_suites/fleet/configurations/kibana.config.yml stackVersion:8.0.0-SNAPSHOT]" profile=fleet
[2021-02-02T11:20:09.902Z] time="2021-02-02T11:20:09Z" level=debug msg="Un-enrolling agent in Fleet" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1 hostname=a32427dc70aa
[2021-02-02T11:20:11.275Z] time="2021-02-02T11:20:10Z" level=debug msg="Fleet agent was unenrolled" agentID=8c12b8e0-6548-11eb-9d7d-4d67627e0df1
[2021-02-02T11:20:11.842Z] Stopping fleet_centos-systemd_elastic-agent_1 ... 
[2021-02-02T11:20:24.034Z] 
Stopping fleet_centos-systemd_elastic-agent_1 ... done
Removing fleet_centos-systemd_elastic-agent_1 ... 
[2021-02-02T11:20:24.034Z] 
Removing fleet_centos-systemd_elastic-agent_1 ... done
Going to remove fleet_centos-systemd_elastic-agent_1
[2021-02-02T11:20:24.034Z] time="2021-02-02T11:20:22Z" level=debug msg="Docker compose executed." cmd="[rm -fvs centos-systemd]" composeFilePaths="[/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/profiles/fleet/docker-compose.yml /var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/services/centos-systemd/docker-compose.yml]" env="map[centos_systemdAgentBinarySrcPath:/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz375025722 centos_systemdAgentBinaryTargetPath:/elastic-agent-8.0.0-SNAPSHOT-x86_64.tar.gz centos_systemdContainerName:fleet_centos-systemd_elastic-agent_1 centos_systemdTag:latest kibanaConfigPath:/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/src/github.com/elastic/e2e-testing/e2e/_suites/fleet/configurations/kibana.config.yml stackVersion:8.0.0-SNAPSHOT]" profile=fleet
[2021-02-02T11:20:24.034Z] time="2021-02-02T11:20:22Z" level=debug msg="Service removed from compose" profile=fleet service=centos-systemd
[2021-02-02T11:20:24.034Z] time="2021-02-02T11:20:23Z" level=debug msg="The token was deleted" tokenID=8716c840-6548-11eb-9d7d-4d67627e0df1
[2021-02-02T11:20:24.034Z] time="2021-02-02T11:20:23Z" level=info msg="Integration deleted from the configuration" integration=endpoint packageConfigId=130759e1-9890-490d-b351-e792093f4754 policyID=09e39270-6545-11eb-9d7d-4d67627e0df1 version=0.17.0
[2021-02-02T11:20:24.034Z] time="2021-02-02T11:20:23Z" level=debug msg="Destroying Fleet runtime dependencies"
[2021-02-02T11:20:24.968Z] Stopping fleet_kibana_1           ... 
[2021-02-02T11:20:24.968Z] Stopping fleet_package-registry_1 ... 
[2021-02-02T11:20:24.968Z] Stopping fleet_elasticsearch_1    ... 
[2021-02-02T11:20:26.417Z] 
Stopping fleet_kibana_1           ... done

Stopping fleet_package-registry_1 ... done

Stopping fleet_elasticsearch_1    ... done
Removing fleet_kibana_1           ... 
[2021-02-02T11:20:26.418Z] Removing fleet_package-registry_1 ... 
[2021-02-02T11:20:26.418Z] Removing fleet_elasticsearch_1    ... 
[2021-02-02T11:20:26.418Z] 
Removing fleet_package-registry_1 ... done

Removing fleet_kibana_1           ... done

Removing fleet_elasticsearch_1    ... done
Removing network fleet_default
[2021-02-02T11:20:26.675Z] time="2021-02-02T11:20:26Z" level=debug msg="Docker compose executed." cmd="[down --remove-orphans]" composeFilePaths="[/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/.op/compose/profiles/fleet/docker-compose.yml]" env="map[centos_systemdAgentBinarySrcPath:/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz375025722 centos_systemdAgentBinaryTargetPath:/elastic-agent-8.0.0-SNAPSHOT-x86_64.tar.gz centos_systemdContainerName:fleet_centos-systemd_elastic-agent_1 centos_systemdTag:latest kibanaConfigPath:/var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671/src/github.com/elastic/e2e-testing/e2e/_suites/fleet/configurations/kibana.config.yml stackVersion:8.0.0-SNAPSHOT]" profile=fleet
[2021-02-02T11:20:26.675Z] time="2021-02-02T11:20:26Z" level=debug msg="Elastic Agent binary was removed." installer=centos-systemd-8.0.0-SNAPSHOT path=/tmp/elastic-agent-8.0.0-SNAPSHOT-x86_64.rpm588046983
[2021-02-02T11:20:26.675Z] time="2021-02-02T11:20:26Z" level=debug msg="Elastic Agent binary was removed." installer=centos-tar-8.0.0-SNAPSHOT path=/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz375025722
[2021-02-02T11:20:26.675Z] time="2021-02-02T11:20:26Z" level=debug msg="Elastic Agent binary was removed." installer=debian-systemd-8.0.0-SNAPSHOT path=/tmp/elastic-agent-8.0.0-SNAPSHOT-amd64.deb941114961
[2021-02-02T11:20:26.675Z] Makefile:61: recipe for target 'functional-test' failed
[2021-02-02T11:20:26.675Z] make: *** [functional-test] Error 1
[2021-02-02T11:20:26.720Z] [INFO] Stopping Filebeat Docker container
[2021-02-02T11:20:27.039Z] + docker exec -t ca2769191a14cf50991598d795459a235bdee897a372ae450052072b77f033e0 chmod -R ugo+rw /output
[2021-02-02T11:20:27.297Z] + docker stop --time 30 ca2769191a14cf50991598d795459a235bdee897a372ae450052072b77f033e0
[2021-02-02T11:20:27.555Z] ca2769191a14cf50991598d795459a235bdee897a372ae450052072b77f033e0
[2021-02-02T11:20:27.573Z] Archiving artifacts
[2021-02-02T11:20:28.195Z] Recording test results
[2021-02-02T11:20:28.483Z] [Checks API] No suitable checks publisher found.
[2021-02-02T11:20:28.499Z] Archiving artifacts
[2021-02-02T11:20:28.533Z] Failed in branch ubuntu-18.04_fleet_agent_endpoint_integration
[2021-02-02T11:20:29.542Z] Stage "Release" skipped due to earlier failure(s)
[2021-02-02T11:20:30.205Z] Running on worker-1244230 in /var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-671
[2021-02-02T11:20:30.253Z] [INFO] getVaultSecret: Getting secrets
[2021-02-02T11:20:30.340Z] Masking supported pattern matches of $VAULT_ADDR or $VAULT_ROLE_ID or $VAULT_SECRET_ID
[2021-02-02T11:20:32.335Z] + chmod 755 generate-build-data.sh
[2021-02-02T11:20:32.335Z] + ./generate-build-data.sh https://beats-ci.elastic.co/blue/rest/organizations/jenkins/pipelines/e2e-tests/e2e-testing-mbp/PR-671/ https://beats-ci.elastic.co/blue/rest/organizations/jenkins/pipelines/e2e-tests/e2e-testing-mbp/PR-671/runs/4 FAILURE 1933386
[2021-02-02T11:20:32.335Z] INFO: curl https://beats-ci.elastic.co/blue/rest/organizations/jenkins/pipelines/e2e-tests/e2e-testing-mbp/PR-671/runs/4/steps/?limit=10000 -o steps-info.json
[2021-02-02T11:20:40.054Z] INFO: curl https://beats-ci.elastic.co/blue/rest/organizations/jenkins/pipelines/e2e-tests/e2e-testing-mbp/PR-671/runs/4/tests/?status=FAILED -o tests-errors.json
[2021-02-02T11:20:40.054Z] INFO: curl https://beats-ci.elastic.co/blue/rest/organizations/jenkins/pipelines/e2e-tests/e2e-testing-mbp/PR-671/runs/4/log/ -o pipeline-log.txt

installerType = fmt.Sprintf("%s-%s", installerType, version)
fts.Installers[fmt.Sprintf("%s-%s", image, installerType)] = i
if fts.Version != agentVersionBackup {
i := GetElasticAgentInstaller(image, installerType, fts.Version, true)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i like that

Copy link
Contributor

@michalpristas michalpristas left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks ok i havent tested though. I like the change in installers keys and storing installer per version

@mdelapenya
Copy link
Contributor Author

The existing test errors are related to the Kibana not being able to start with Elasticsearch

@mdelapenya mdelapenya marked this pull request as ready for review January 29, 2021 08:47
@mdelapenya
Copy link
Contributor Author

Same errors as in master. @michalpristas do we merge?

@mdelapenya mdelapenya merged commit 91ac46c into elastic:master Feb 4, 2021
mdelapenya added a commit to mdelapenya/e2e-testing that referenced this pull request Feb 4, 2021
* chore: use nightly annotation for the Upgrade tests

* chore: add two make goals for the nightly use cases

- e2e-fleet-nightly: run the nightly tests not using CI snapshots.
It should download the binaries from the official artifactory.
- e2e-fleet-nightly-ci-snapshots: run the nightly tests using the CI
snapshots for a specific SHA commit from Beats, downloading them from
a GCP bucket

* chore: bump elastic-agent stale version

* chore: pass version and state state when creating an installer

This will allow selecting the proper binary, depending if we are using
a stale agent or a regular one.

* fix: append snapshot to the stale version when using CI snapshots

* fix: check for version aliases with non-stale versions

* chore: store current agent version in the test suite struct

* chore: make sure the layout is properly created for TAR installer

* chore: add make goals for testing fleet use cases

* chore: move Make goals to the e2e Makefile
# Conflicts:
#	.ci/Jenkinsfile
mdelapenya added a commit to mdelapenya/e2e-testing that referenced this pull request Feb 4, 2021
* chore: use nightly annotation for the Upgrade tests

* chore: add two make goals for the nightly use cases

- e2e-fleet-nightly: run the nightly tests not using CI snapshots.
It should download the binaries from the official artifactory.
- e2e-fleet-nightly-ci-snapshots: run the nightly tests using the CI
snapshots for a specific SHA commit from Beats, downloading them from
a GCP bucket

* chore: bump elastic-agent stale version

* chore: pass version and state state when creating an installer

This will allow selecting the proper binary, depending if we are using
a stale agent or a regular one.

* fix: append snapshot to the stale version when using CI snapshots

* fix: check for version aliases with non-stale versions

* chore: store current agent version in the test suite struct

* chore: make sure the layout is properly created for TAR installer

* chore: add make goals for testing fleet use cases

* chore: move Make goals to the e2e Makefile
# Conflicts:
#	.ci/Jenkinsfile
mdelapenya added a commit to mdelapenya/e2e-testing that referenced this pull request Feb 4, 2021
* chore: use nightly annotation for the Upgrade tests

* chore: add two make goals for the nightly use cases

- e2e-fleet-nightly: run the nightly tests not using CI snapshots.
It should download the binaries from the official artifactory.
- e2e-fleet-nightly-ci-snapshots: run the nightly tests using the CI
snapshots for a specific SHA commit from Beats, downloading them from
a GCP bucket

* chore: bump elastic-agent stale version

* chore: pass version and state state when creating an installer

This will allow selecting the proper binary, depending if we are using
a stale agent or a regular one.

* fix: append snapshot to the stale version when using CI snapshots

* fix: check for version aliases with non-stale versions

* chore: store current agent version in the test suite struct

* chore: make sure the layout is properly created for TAR installer

* chore: add make goals for testing fleet use cases

* chore: move Make goals to the e2e Makefile
# Conflicts:
#	.ci/Jenkinsfile
mdelapenya added a commit to mdelapenya/e2e-testing that referenced this pull request Feb 4, 2021
* chore: use nightly annotation for the Upgrade tests

* chore: add two make goals for the nightly use cases

- e2e-fleet-nightly: run the nightly tests not using CI snapshots.
It should download the binaries from the official artifactory.
- e2e-fleet-nightly-ci-snapshots: run the nightly tests using the CI
snapshots for a specific SHA commit from Beats, downloading them from
a GCP bucket

* chore: bump elastic-agent stale version

* chore: pass version and state state when creating an installer

This will allow selecting the proper binary, depending if we are using
a stale agent or a regular one.

* fix: append snapshot to the stale version when using CI snapshots

* fix: check for version aliases with non-stale versions

* chore: store current agent version in the test suite struct

* chore: make sure the layout is properly created for TAR installer

* chore: add make goals for testing fleet use cases

* chore: move Make goals to the e2e Makefile
mdelapenya added a commit that referenced this pull request Feb 4, 2021
* chore: refactor Fleet upgrade tests (#671)

* chore: use nightly annotation for the Upgrade tests

* chore: add two make goals for the nightly use cases

- e2e-fleet-nightly: run the nightly tests not using CI snapshots.
It should download the binaries from the official artifactory.
- e2e-fleet-nightly-ci-snapshots: run the nightly tests using the CI
snapshots for a specific SHA commit from Beats, downloading them from
a GCP bucket

* chore: bump elastic-agent stale version

* chore: pass version and state state when creating an installer

This will allow selecting the proper binary, depending if we are using
a stale agent or a regular one.

* fix: append snapshot to the stale version when using CI snapshots

* fix: check for version aliases with non-stale versions

* chore: store current agent version in the test suite struct

* chore: make sure the layout is properly created for TAR installer

* chore: add make goals for testing fleet use cases

* chore: move Make goals to the e2e Makefile
# Conflicts:
#	.ci/Jenkinsfile

* fix: update method args
mdelapenya added a commit that referenced this pull request Feb 4, 2021
* chore: refactor Fleet upgrade tests (#671)

* chore: use nightly annotation for the Upgrade tests

* chore: add two make goals for the nightly use cases

- e2e-fleet-nightly: run the nightly tests not using CI snapshots.
It should download the binaries from the official artifactory.
- e2e-fleet-nightly-ci-snapshots: run the nightly tests using the CI
snapshots for a specific SHA commit from Beats, downloading them from
a GCP bucket

* chore: bump elastic-agent stale version

* chore: pass version and state state when creating an installer

This will allow selecting the proper binary, depending if we are using
a stale agent or a regular one.

* fix: append snapshot to the stale version when using CI snapshots

* fix: check for version aliases with non-stale versions

* chore: store current agent version in the test suite struct

* chore: make sure the layout is properly created for TAR installer

* chore: add make goals for testing fleet use cases

* chore: move Make goals to the e2e Makefile
# Conflicts:
#	.ci/Jenkinsfile

* fix: update method params
mdelapenya added a commit that referenced this pull request Feb 4, 2021
* chore: refactor Fleet upgrade tests (#671)

* chore: use nightly annotation for the Upgrade tests

* chore: add two make goals for the nightly use cases

- e2e-fleet-nightly: run the nightly tests not using CI snapshots.
It should download the binaries from the official artifactory.
- e2e-fleet-nightly-ci-snapshots: run the nightly tests using the CI
snapshots for a specific SHA commit from Beats, downloading them from
a GCP bucket

* chore: bump elastic-agent stale version

* chore: pass version and state state when creating an installer

This will allow selecting the proper binary, depending if we are using
a stale agent or a regular one.

* fix: append snapshot to the stale version when using CI snapshots

* fix: check for version aliases with non-stale versions

* chore: store current agent version in the test suite struct

* chore: make sure the layout is properly created for TAR installer

* chore: add make goals for testing fleet use cases

* chore: move Make goals to the e2e Makefile
# Conflicts:
#	.ci/Jenkinsfile

* Update services_test.go
@mdelapenya mdelapenya deleted the 652-refactor-upgrade-tests branch February 5, 2021 11:10
mdelapenya added a commit to mdelapenya/e2e-testing that referenced this pull request Feb 8, 2021
* chore: use nightly annotation for the Upgrade tests

* chore: add two make goals for the nightly use cases

- e2e-fleet-nightly: run the nightly tests not using CI snapshots.
It should download the binaries from the official artifactory.
- e2e-fleet-nightly-ci-snapshots: run the nightly tests using the CI
snapshots for a specific SHA commit from Beats, downloading them from
a GCP bucket

* chore: bump elastic-agent stale version

* chore: pass version and state state when creating an installer

This will allow selecting the proper binary, depending if we are using
a stale agent or a regular one.

* fix: append snapshot to the stale version when using CI snapshots

* fix: check for version aliases with non-stale versions

* chore: store current agent version in the test suite struct

* chore: make sure the layout is properly created for TAR installer

* chore: add make goals for testing fleet use cases

* chore: move Make goals to the e2e Makefile
mdelapenya added a commit that referenced this pull request Feb 8, 2021
…tifacts methods (#689) backport for 6.8.x (#713)

* chore: refactor Fleet upgrade tests (#671)

* chore: use nightly annotation for the Upgrade tests

* chore: add two make goals for the nightly use cases

- e2e-fleet-nightly: run the nightly tests not using CI snapshots.
It should download the binaries from the official artifactory.
- e2e-fleet-nightly-ci-snapshots: run the nightly tests using the CI
snapshots for a specific SHA commit from Beats, downloading them from
a GCP bucket

* chore: bump elastic-agent stale version

* chore: pass version and state state when creating an installer

This will allow selecting the proper binary, depending if we are using
a stale agent or a regular one.

* fix: append snapshot to the stale version when using CI snapshots

* fix: check for version aliases with non-stale versions

* chore: store current agent version in the test suite struct

* chore: make sure the layout is properly created for TAR installer

* chore: add make goals for testing fleet use cases

* chore: move Make goals to the e2e Makefile

* chore: refactor build artifacts methods (#689)

* feat: use local beats directory for elastic-agent installers

* docs: document BEATS_LOCAL_PATH variable

* chore: check that the local file exists

* chore: add unit tests for the BEATS_LOCAL_PATH variable

* chore: simplify logic after test coverage

* chore: enrich test name

* chore: rename test

* chore: move default values to the end of the descriptions

* chore: add a helper method to build artifact names

* chore: build artifact name only once

* chore: pass the entire filename to calculate the GCP bucket coordinates

* chore: simplify method signature, as the file name is not changed within the method

* chore: use buildArtifactName method

* chore: pass filename to helper methods to avoid unnecessary calculations

* chore: rename variable for consistency

* chore: add license headers

* chore: use lowercase comparison for artifact name

* chore: build artifact changes from Beats CI to Elastic's artifactory

* fix: support building artifact names from local

Local builds uses the same as the CI

* WIP

* fix: rename docker-ubi8 installer key

* chore: pass a fallback version when building artifact name

In the case we are using a PR , where the version is "pr-12345", then we
need to use the base version of the product

* chore: remove log

* fix: do not override artifact name in Docker installer

* feat: support consuming the docker images from snapshots or local in standalone mode

* chore: add unit tests for fetching docker images from local Beats repo

* chore: apply version to Docker installer

* chore: support loading metricbeat image from local repository

* chore: exrtact loadImage method to docker helper

* feat: support consuming CI artifacts in metricbeat

* fix: remove non-existent field from logrus log

* chore: extract download logic to helper methods

We are discarding the stale parameter, because the stale version is set
when the installer is required, so we simply download what is requested

* chore: fix typo

* chore: check agent version before setting it

* chore: use the docker client to load the image instead of the docker binary

* chore: add unit tests for check method

* chore: pass fallback version to check method

* fix: properly calculate version for PRs

* chore: move PR check logic to a method

* chore: make test independent of maintenance branch
# Conflicts:
#	e2e/_suites/fleet/services_test.go
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants