Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Solution] Hide Rule Upgrade disabling behind Prebuilt Rule Customization FF #192919

Merged
merged 1 commit into from
Sep 13, 2024

Conversation

jpdjere
Copy link
Contributor

@jpdjere jpdjere commented Sep 13, 2024

Summary

With the merge of #191721, new logic was introduce to disable the Upgrade rule button in the Rule Upgrade table for rules which have conflicts in any of their fields.

This change should be hidden behind a FF. Otherwise the UI upgrade flow might break for any users who might have customized the rule via API and generated conflicts.

@jpdjere jpdjere added backport:skip This commit does not require backporting Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Detection Rule Management Security Detection Rule Management Team Feature:Prebuilt Detection Rules Security Solution Prebuilt Detection Rules labels Sep 13, 2024
@jpdjere jpdjere self-assigned this Sep 13, 2024
@jpdjere jpdjere marked this pull request as ready for review September 13, 2024 19:01
@jpdjere jpdjere requested a review from a team as a code owner September 13, 2024 19:01
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-detections-response (Team:Detections and Resp)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-detection-rule-management (Team:Detection Rule Management)

@jpdjere jpdjere added release_note:skip Skip the PR/issue when compiling release notes v8.16.0 labels Sep 13, 2024
Copy link
Contributor

@maximpn maximpn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@jpdjere jpdjere enabled auto-merge (squash) September 13, 2024 19:09
@banderror banderror added bug Fixes for quality problems that affect the customer experience impact:high Addressing this issue will have a high level of impact on the quality/strength of our product. labels Sep 13, 2024
@kibana-ci
Copy link
Collaborator

💛 Build succeeded, but was flaky

Failed CI Steps

Test Failures

  • [job] [logs] Jest Tests #12 / ConnectorSelector should set the selected connector to none if the connector is not available

Metrics [docs]

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
securitySolution 20.3MB 20.3MB +91.0B

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

cc @jpdjere

@jpdjere jpdjere merged commit a27a044 into elastic:main Sep 13, 2024
51 checks passed
markov00 pushed a commit to markov00/kibana that referenced this pull request Sep 18, 2024
…Customization FF (elastic#192919)

## Summary

With the merge of elastic#191721, new
logic was introduce to disable the Upgrade rule button in the Rule
Upgrade table for rules which have conflicts in any of their fields.

**This change should be hidden behind a FF.** Otherwise the UI upgrade
flow might break for any users who might have customized the rule via
API and generated conflicts.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport:skip This commit does not require backporting bug Fixes for quality problems that affect the customer experience Feature:Prebuilt Detection Rules Security Solution Prebuilt Detection Rules impact:high Addressing this issue will have a high level of impact on the quality/strength of our product. release_note:skip Skip the PR/issue when compiling release notes Team:Detection Rule Management Security Detection Rule Management Team Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. v8.16.0 v9.0.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants