diff --git a/.buildkite/pipelines/quality-gates/pipeline.kibana-tests.yaml b/.buildkite/pipelines/quality-gates/pipeline.kibana-tests.yaml new file mode 100644 index 0000000000000..27e55dfced9d7 --- /dev/null +++ b/.buildkite/pipelines/quality-gates/pipeline.kibana-tests.yaml @@ -0,0 +1,10 @@ +env: + ENVIRONMENT: ${ENVIRONMENT?} + +steps: + - label: ":pipeline::grey_question::seedling: Trigger Kibana Tests for ${ENVIRONMENT}" + env: + QG_PIPELINE_LOCATION: ".buildkite/pipelines/quality-gates" + command: "make -C /agent run-environment-tests" + agents: + image: "docker.elastic.co/ci-agent-images/quality-gate-seedling:0.0.2" diff --git a/.buildkite/pipelines/quality-gates/pipeline.tests-production.yaml b/.buildkite/pipelines/quality-gates/pipeline.tests-production.yaml new file mode 100644 index 0000000000000..483532b9c7435 --- /dev/null +++ b/.buildkite/pipelines/quality-gates/pipeline.tests-production.yaml @@ -0,0 +1,15 @@ +steps: + - label: ":pipeline::kibana::seedling: Trigger Kibana Tests for ${ENVIRONMENT}" + command: echo "replace me with Kibana specific tests" + agent: + image: "docker.elastic.co/ci-agent-images/basic-buildkite-agent:1688566364" + + - label: ":pipeline::fleet::seedling: Trigger Fleet Kibana Tests for ${ENVIRONMENT}" + command: echo "replace me with Fleet specific Kibana tests" + agent: + image: "docker.elastic.co/ci-agent-images/basic-buildkite-agent:1688566364" + + - label: ":pipeline::lock::seedling: Trigger Security Kibana Tests for ${ENVIRONMENT}" + command: echo "replace me with Security specific Kibana tests" + agent: + image: "docker.elastic.co/ci-agent-images/basic-buildkite-agent:1688566364" diff --git a/.buildkite/pipelines/quality-gates/pipeline.tests-qa.yaml b/.buildkite/pipelines/quality-gates/pipeline.tests-qa.yaml new file mode 100644 index 0000000000000..483532b9c7435 --- /dev/null +++ b/.buildkite/pipelines/quality-gates/pipeline.tests-qa.yaml @@ -0,0 +1,15 @@ +steps: + - label: ":pipeline::kibana::seedling: Trigger Kibana Tests for ${ENVIRONMENT}" + command: echo "replace me with Kibana specific tests" + agent: + image: "docker.elastic.co/ci-agent-images/basic-buildkite-agent:1688566364" + + - label: ":pipeline::fleet::seedling: Trigger Fleet Kibana Tests for ${ENVIRONMENT}" + command: echo "replace me with Fleet specific Kibana tests" + agent: + image: "docker.elastic.co/ci-agent-images/basic-buildkite-agent:1688566364" + + - label: ":pipeline::lock::seedling: Trigger Security Kibana Tests for ${ENVIRONMENT}" + command: echo "replace me with Security specific Kibana tests" + agent: + image: "docker.elastic.co/ci-agent-images/basic-buildkite-agent:1688566364" diff --git a/.buildkite/pipelines/quality-gates/pipeline.tests-staging.yaml b/.buildkite/pipelines/quality-gates/pipeline.tests-staging.yaml new file mode 100644 index 0000000000000..483532b9c7435 --- /dev/null +++ b/.buildkite/pipelines/quality-gates/pipeline.tests-staging.yaml @@ -0,0 +1,15 @@ +steps: + - label: ":pipeline::kibana::seedling: Trigger Kibana Tests for ${ENVIRONMENT}" + command: echo "replace me with Kibana specific tests" + agent: + image: "docker.elastic.co/ci-agent-images/basic-buildkite-agent:1688566364" + + - label: ":pipeline::fleet::seedling: Trigger Fleet Kibana Tests for ${ENVIRONMENT}" + command: echo "replace me with Fleet specific Kibana tests" + agent: + image: "docker.elastic.co/ci-agent-images/basic-buildkite-agent:1688566364" + + - label: ":pipeline::lock::seedling: Trigger Security Kibana Tests for ${ENVIRONMENT}" + command: echo "replace me with Security specific Kibana tests" + agent: + image: "docker.elastic.co/ci-agent-images/basic-buildkite-agent:1688566364" diff --git a/.github/CODEOWNERS b/.github/CODEOWNERS index 650c71e26c93b..eecffc061f483 100644 --- a/.github/CODEOWNERS +++ b/.github/CODEOWNERS @@ -988,6 +988,7 @@ x-pack/plugins/infra/server/lib/alerting @elastic/actionable-observability /.buildkite/ @elastic/kibana-operations /kbn_pm/ @elastic/kibana-operations /x-pack/dev-tools @elastic/kibana-operations +catalog-info.yaml @elastic/kibana-operations @elastic/kibana-tech-leads # Appex QA /src/dev/code_coverage @elastic/appex-qa diff --git a/catalog-info.yaml b/catalog-info.yaml new file mode 100644 index 0000000000000..534e34ba27008 --- /dev/null +++ b/catalog-info.yaml @@ -0,0 +1,70 @@ +--- +apiVersion: backstage.io/v1alpha1 +kind: Component +metadata: + name: kibana + description: Kibana is a user interface that lets you visualize your Elasticsearch data and navigate the Elastic Stack. + + annotations: + backstage.io/source-location: url:https://github.com/elastic/kibana/tree/main + github.com/project-slug: elastic/kibana + github.com/team-slug: elastic/kibana-tech-leads + buildkite.com/project-slug: elastic/kibana + + tags: + - typescript + - javascript + - dashboards + - metrics + - visualizations + - observability + + links: + - title: Documentation + url: https://www.elastic.co/guide/en/kibana/current/index.html + +spec: + type: monorepo + owner: group:kibana-tech-leads + lifecycle: production + +--- + +apiVersion: backstage.io/v1alpha1 +kind: Resource +metadata: + name: kibana-tests-pipeline + description: Definition of the kibana pipeline + links: + - title: Pipeline + url: https://buildkite.com/elastic/kibana-tests +spec: + type: buildkite-pipeline + owner: group:kibana-tech-leads + system: buildkite + implementation: + apiVersion: buildkite.elastic.dev/v1 + kind: Pipeline + metadata: + name: kibana-tests + description: Pipeline that tests the service integration in various environments + spec: + repository: elastic/kibana + pipeline_file: ./.buildkite/pipelines/pipeline.kibana-tests.yaml + provider_settings: + trigger_mode: none + teams: + kibana-operations: + access_level: MANAGE_BUILD_AND_READ + security-engineering-productivity: + access_level: BUILD_AND_READ + fleet: + access_level: BUILD_AND_READ + kibana-tech-leads: + access_level: BUILD_AND_READ + kibana-core: + access_level: BUILD_AND_READ + cloud-tooling: + access_level: BUILD_AND_READ + everyone: + access_level: READ_ONLY diff --git a/src/dev/precommit_hook/casing_check_config.js b/src/dev/precommit_hook/casing_check_config.js index c3b1a27491e67..93eba1bb171b2 100644 --- a/src/dev/precommit_hook/casing_check_config.js +++ b/src/dev/precommit_hook/casing_check_config.js @@ -50,6 +50,9 @@ export const IGNORE_FILE_GLOBS = [ // Required to match the name in the docs.elastic.dev repo. 'nav-kibana-dev.docnav.json', + // Match elastic wide naming convention for catalog-info.yaml + 'catalog-info.yaml', + // filename must match language code which requires capital letters '**/translations/*.json',