@@ -12,7 +12,6 @@ import (
1212
1313 "github.com/stretchr/testify/require"
1414
15- "github.com/elastic/elastic-agent/internal/pkg/agent/application/upgrade"
1615 atesting "github.com/elastic/elastic-agent/pkg/testing"
1716 "github.com/elastic/elastic-agent/pkg/testing/define"
1817 "github.com/elastic/elastic-agent/pkg/version"
@@ -93,55 +92,6 @@ func TestStandaloneUpgradeFIPStoFIPS(t *testing.T) {
9392 }
9493}
9594
96- // TestStandaloneUpgradeFIPStoNonFIPS ensures that a FIPS-capable Agent
97- // cannot be upgraded to a non-FIPS-capable Agent.
98- func TestStandaloneUpgradeFIPStoNonFIPS (t * testing.T ) {
99- define .Require (t , define.Requirements {
100- Group : StandaloneUpgrade ,
101- Local : false , // requires Agent installation
102- Sudo : true , // requires Agent installation
103- OS : []define.OS {
104- {Type : define .Linux },
105- },
106- })
107-
108- // Start with a FIPS-capable Agent artifact
109- fipsArtifactFetcher := atesting .ArtifactFetcher (atesting .WithArtifactFIPSOnly ())
110-
111- versionList , err := upgradetest .GetUpgradableVersions ()
112- require .NoError (t , err )
113- endVersion , err := version .ParseVersion (define .Version ())
114- require .NoError (t , err )
115-
116- for _ , startVersion := range versionList {
117- // We need to start the upgrade from a FIPS-capable version
118- if ! isFIPSCapableVersion (startVersion ) {
119- t .Logf (
120- "Minimum start version of FIPS-capable Agent for running this test is either %q or %q, current start version: %q" ,
121- * upgradetest .Version_8_19_0_SNAPSHOT ,
122- * upgradetest .Version_9_1_0_SNAPSHOT ,
123- startVersion ,
124- )
125- continue
126- }
127-
128- unprivilegedAvailable := false
129- if upgradetest .SupportsUnprivileged (startVersion , endVersion ) {
130- unprivilegedAvailable = true
131- }
132- t .Run (fmt .Sprintf ("Upgrade %s to %s (privileged)" , startVersion , define .Version ()), func (t * testing.T ) {
133- upgradeOpts := []upgradetest.UpgradeOpt {upgradetest .WithUnprivileged (false )}
134- testStandaloneUpgradeFailed (t , startVersion , define .Version (), fipsArtifactFetcher , upgrade .ErrFipsToNonFips , upgradeOpts ... )
135- })
136- if unprivilegedAvailable {
137- upgradeOpts := []upgradetest.UpgradeOpt {upgradetest .WithUnprivileged (true )}
138- t .Run (fmt .Sprintf ("Upgrade %s to %s (unprivileged)" , startVersion , define .Version ()), func (t * testing.T ) {
139- testStandaloneUpgradeFailed (t , startVersion , define .Version (), fipsArtifactFetcher , upgrade .ErrFipsToNonFips , upgradeOpts ... )
140- })
141- }
142- }
143- }
144-
14595func isFIPSCapableVersion (ver * version.ParsedSemVer ) bool {
14696 // Versions prior to 8.19.0-SNAPSHOT are not FIPS-capable
14797 if ver .Less (* upgradetest .Version_8_19_0_SNAPSHOT ) {
0 commit comments