Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FTR] Clean navigateToApp #100144

Merged
merged 2 commits into from
May 17, 2021
Merged

Conversation

dmlemeshko
Copy link
Member

@dmlemeshko dmlemeshko commented May 14, 2021

Summary

Removing navigation test code that it is not valid anymore: status_page has a /status route and there is no reason to handle it differently. Since it was changed & migrated to new platform there is no any web component with statusPageContainer test subject in the repo.

Not sure how, but ciGroups ran 1-2 min faster vs my other PR with no navigation changes.

@dmlemeshko dmlemeshko added test_ui_functional v7.13.1 v8.0.0 release_note:skip Skip the PR/issue when compiling release notes labels May 14, 2021
@dmlemeshko dmlemeshko marked this pull request as ready for review May 14, 2021 18:33
@dmlemeshko dmlemeshko requested a review from LeeDr May 14, 2021 18:33
@@ -257,7 +257,7 @@ export function CommonPageProvider({ getService, getPageObjects }: FtrProviderCo
return currentUrl;
});

await retry.try(async () => {
await retry.tryForTime(defaultFindTimeout, async () => {
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@LeeDr I think we should shorten timeout for url validation from 120 sec = try: Joi.number().default(120000) to 10 sec =find: Joi.number().default(10000): the logic here is that we wait for url to stop changing.
My guess is that it shouldn't take too long for re-direction/url change, and if it is happening we better fail fast.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not sure how, but ciGroups ran 1-2 min faster vs my other PR with no navigation changes.

guess it is related

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

When reducing any timeouts, we just have to be careful about running tests on Cloud. I think Kibana can appear to stall when an index snapshot is happening.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, this could be the case. Let's see how it goes, but the global navigation timeout remains the same.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I mean, I don't expect it to fail on cloud and if it will, then we should check performance of cloud instances.

@dmlemeshko
Copy link
Member Author

@elasticmachine merge upstream

@kibanamachine
Copy link
Contributor

💛 Build succeeded, but was flaky


Test Failures

Kibana Pipeline / general / task-queue-process-13 / X-Pack Endpoint Functional Tests.x-pack/test/security_solution_endpoint/apps/endpoint/policy_details·ts.endpoint When on the Endpoint Policy Details Page when on Ingest Policy Edit Package Policy page should preserve updates done from the Fleet form

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has not failed recently on tracked branches

[00:00:00]       │
[00:00:00]         └-: endpoint
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-10-1621238437837396142] [.kibana_8.0.0_001/wQiMabd7Q4ijJAVD1WvzMg] update_mapping [_doc]
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-10-1621238437837396142] [.kibana_8.0.0_001/wQiMabd7Q4ijJAVD1WvzMg] update_mapping [_doc]
[00:00:00]             │ proc [kibana]   log   [08:10:25.686] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [08:10:25.689] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [08:10:25.690] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [08:10:25.691] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39182, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39180, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39176, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39178, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ proc [kibana]   log   [08:10:25.735] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [08:10:25.741] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [08:10:25.742] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39194, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:00]             │ proc [kibana]   log   [08:10:25.744] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39192, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39198, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ proc [kibana]   log   [08:10:25.747] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [08:10:25.749] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [08:10:25.750] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39206, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39204, url.original: /package/fleet_server/0.2.1
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39212, url.original: /package/system/0.12.0
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39214, url.original: /package/elastic_agent/0.0.6
[00:00:00]             │ proc [kibana]   log   [08:10:25.753] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39228, url.original: /package/fleet_server/0.2.1/
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39218, url.original: /package/endpoint/0.18.0
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39230, url.original: /package/system/0.12.0/
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39226, url.original: /package/elastic_agent/0.0.6/
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39234, url.original: /package/endpoint/0.18.0/
[00:00:00]             │ proc [kibana]   log   [08:10:25.762] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [08:10:25.764] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39240, url.original: /epr/fleet_server/fleet_server-0.2.1.zip
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39242, url.original: /epr/elastic_agent/elastic_agent-0.0.6.zip
[00:00:00]             │ proc [kibana]   log   [08:10:25.776] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39246, url.original: /epr/endpoint/endpoint-0.18.0.zip
[00:00:00]             │ proc [kibana]   log   [08:10:25.791] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 08:10:25 source.ip: 172.17.0.1:39250, url.original: /epr/system/system-0.12.0.zip
[00:00:02]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-debian-10-1621238437837396142] adding index lifecycle policy [.fleet-actions-results]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-10-1621238437837396142] [.kibana_8.0.0_001/wQiMabd7Q4ijJAVD1WvzMg] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-10-1621238437837396142] [.kibana_8.0.0_001/wQiMabd7Q4ijJAVD1WvzMg] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-10-1621238437837396142] [.kibana_8.0.0_001/wQiMabd7Q4ijJAVD1WvzMg] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [.fleet-actions-results] for index patterns [.fleet-actions-results]
[00:00:03]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-debian-10-1621238437837396142] adding index lifecycle policy [logs-endpoint.collection-diagnostic]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding component template [metrics-elastic_agent.elastic_agent-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-elastic_agent.elastic_agent] for index patterns [metrics-elastic_agent.elastic_agent-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [logs-system.application] for index patterns [logs-system.application-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [logs-system.security] for index patterns [logs-system.security-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [logs-system.system] for index patterns [logs-system.system-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding component template [logs-endpoint.alerts-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding component template [logs-endpoint.events.library-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding component template [metrics-endpoint.metrics-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding component template [logs-endpoint.events.registry-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding component template [.logs-endpoint.diagnostic.collection-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding component template [logs-endpoint.events.file-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding component template [logs-endpoint.events.security-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding component template [logs-endpoint.events.network-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding component template [metrics-endpoint.metadata-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding component template [metrics-endpoint.policy-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding component template [logs-endpoint.events.process-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [.logs-endpoint.diagnostic.collection] for index patterns [.logs-endpoint.diagnostic.collection-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-10-1621238437837396142] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-debian-10-1621238437837396142] [.transform-internal-007] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-10-1621238437837396142] updating number_of_replicas to [0] for indices [.transform-internal-007]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-10-1621238437837396142] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-internal-007][0]]])." previous.health="YELLOW" reason="shards started [[.transform-internal-007][0]]"
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-debian-10-1621238437837396142] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-10-1621238437837396142] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-debian-10-1621238437837396142] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-10-1621238437837396142] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-10-1621238437837396142] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]])." previous.health="YELLOW" reason="shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]"
[00:00:10]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-debian-10-1621238437837396142] [endpoint.metadata_current-default-0.18.0] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:10]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-debian-10-1621238437837396142] [endpoint.metadata_current-default-0.18.0] successfully completed and scheduled task in node operation
[00:00:11]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-10-1621238437837396142] [.kibana_8.0.0_001/wQiMabd7Q4ijJAVD1WvzMg] update_mapping [_doc]
[00:00:12]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-10-1621238437837396142] [.kibana_8.0.0_001/wQiMabd7Q4ijJAVD1WvzMg] update_mapping [_doc]
[00:00:13]             │ proc [kibana]   log   [08:10:38.928] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/05/17 08:10:38 source.ip: 172.17.0.1:39310, url.original: /search?package=system&internal=true&experimental=true
[00:00:13]             │ proc [kibana]   log   [08:10:38.963] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/05/17 08:10:38 source.ip: 172.17.0.1:39314, url.original: /search?package=system&internal=true&experimental=true
[00:00:13]             │ proc [kibana]   log   [08:10:38.972] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/05/17 08:10:38 source.ip: 172.17.0.1:39318, url.original: /package/system/0.12.0
[00:00:13]             │ info [docker:registry] 2021/05/17 08:10:38 source.ip: 172.17.0.1:39322, url.original: /package/system/0.12.0/
[00:00:14]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-10-1621238437837396142] [.kibana_8.0.0_001/wQiMabd7Q4ijJAVD1WvzMg] update_mapping [_doc]
[00:00:15]             │ proc [kibana]   log   [08:10:40.963] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/05/17 08:10:40 source.ip: 172.17.0.1:39330, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:15]             │ proc [kibana]   log   [08:10:40.985] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/05/17 08:10:40 source.ip: 172.17.0.1:39334, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:15]             │ proc [kibana]   log   [08:10:40.994] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/05/17 08:10:40 source.ip: 172.17.0.1:39338, url.original: /package/fleet_server/0.2.1
[00:00:15]             │ info [docker:registry] 2021/05/17 08:10:40 source.ip: 172.17.0.1:39342, url.original: /package/fleet_server/0.2.1/
[00:00:18]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-debian-10-1621238437837396142] [.fleet-enrollment-api-keys-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-10-1621238437837396142] updating number_of_replicas to [0] for indices [.fleet-enrollment-api-keys-7]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-10-1621238437837396142] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-enrollment-api-keys-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-enrollment-api-keys-7][0]]"
[00:00:19]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-debian-10-1621238437837396142] [.fleet-policies-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:19]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-10-1621238437837396142] updating number_of_replicas to [0] for indices [.fleet-policies-7]
[00:00:19]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-10-1621238437837396142] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-policies-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-policies-7][0]]"
[00:00:51]           └-: When on the Endpoint Policy Details Page
[00:00:51]             └-> "before all" hook in "When on the Endpoint Policy Details Page"
[00:03:12]             └-: when on Ingest Policy Edit Package Policy page
[00:03:12]               └-> "before all" hook for "should show the endpoint policy form"
[00:03:12]               └-> should show the endpoint policy form
[00:03:12]                 └-> "before each" hook: global before each for "should show the endpoint policy form"
[00:03:12]                 └-> "before each" hook for "should show the endpoint policy form"
[00:03:15]                   │ info Using cached retrieval of endpoint package
[00:03:15]                   │ proc [kibana]   log   [08:13:40.893] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:15]                   │ proc [kibana]   log   [08:13:40.895] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:15]                   │ info [docker:registry] 2021/05/17 08:13:40 source.ip: 172.17.0.1:41118, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:15]                   │ info [docker:registry] 2021/05/17 08:13:40 source.ip: 172.17.0.1:41120, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:15]                   │ proc [kibana]   log   [08:13:40.915] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:15]                   │ info [docker:registry] 2021/05/17 08:13:40 source.ip: 172.17.0.1:41124, url.original: /package/endpoint/0.18.0
[00:03:15]                   │ info [docker:registry] 2021/05/17 08:13:40 source.ip: 172.17.0.1:41128, url.original: /package/endpoint/0.18.0/
[00:03:17]                   │ debg navigating to fleet url: http://localhost:61131/app/fleet#/policies/c7fb06f0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a68b3d82-0e21-4bf3-a969-691446b9660c
[00:03:17]                   │ debg navigate to: http://localhost:61131/app/fleet#/policies/c7fb06f0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a68b3d82-0e21-4bf3-a969-691446b9660c
[00:03:17]                   │ debg browser[INFO] http://localhost:61131/app/fleet?_t=1621239222470#/policies/c7fb06f0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a68b3d82-0e21-4bf3-a969-691446b9660c 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:17]                   │
[00:03:17]                   │ debg browser[INFO] http://localhost:61131/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:17]                   │ debg ... sleep(700) start
[00:03:18]                   │ debg ... sleep(700) end
[00:03:18]                   │ debg returned from get, calling refresh
[00:03:18]                   │ debg browser[INFO] http://localhost:61131/app/fleet?_t=1621239222470#/policies/c7fb06f0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a68b3d82-0e21-4bf3-a969-691446b9660c 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:18]                   │
[00:03:18]                   │ debg browser[INFO] http://localhost:61131/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:18]                   │ debg currentUrl = http://localhost:61131/app/fleet#/policies/c7fb06f0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a68b3d82-0e21-4bf3-a969-691446b9660c
[00:03:18]                   │          appUrl = http://localhost:61131/app/fleet#/policies/c7fb06f0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a68b3d82-0e21-4bf3-a969-691446b9660c
[00:03:18]                   │ debg TestSubjects.find(kibanaChrome)
[00:03:18]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:19]                   │ proc [kibana]   log   [08:13:44.494] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:19]                   │ info [docker:registry] 2021/05/17 08:13:44 source.ip: 172.17.0.1:41138, url.original: /search?experimental=true
[00:03:19]                   │ debg ... sleep(501) start
[00:03:19]                   │ proc [kibana]   log   [08:13:44.662] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:19]                   │ proc [kibana]   log   [08:13:44.663] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:19]                   │ proc [kibana]   log   [08:13:44.663] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:19]                   │ proc [kibana]   log   [08:13:44.664] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:19]                   │ info [docker:registry] 2021/05/17 08:13:44 source.ip: 172.17.0.1:41146, url.original: /search?package=system&internal=true&experimental=true
[00:03:19]                   │ info [docker:registry] 2021/05/17 08:13:44 source.ip: 172.17.0.1:41148, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:19]                   │ info [docker:registry] 2021/05/17 08:13:44 source.ip: 172.17.0.1:41154, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:03:19]                   │ info [docker:registry] 2021/05/17 08:13:44 source.ip: 172.17.0.1:41156, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:03:19]                   │ proc [kibana]   log   [08:13:44.908] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:19]                   │ info [docker:registry] 2021/05/17 08:13:44 source.ip: 172.17.0.1:41162, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:20]                   │ debg ... sleep(501) end
[00:03:20]                   │ debg in navigateTo url = http://localhost:61131/app/fleet#/policies/c7fb06f0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a68b3d82-0e21-4bf3-a969-691446b9660c
[00:03:20]                   │ debg TestSubjects.exists(editPackagePolicy_header)
[00:03:20]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="editPackagePolicy_header"]') with timeout=120000
[00:03:20]                   │ proc [kibana]   log   [08:13:45.115] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:20]                   │ info [docker:registry] 2021/05/17 08:13:45 source.ip: 172.17.0.1:41166, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:20]                 │ debg TestSubjects.exists(endpointIntegrationPolicyForm)
[00:03:20]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="endpointIntegrationPolicyForm"]') with timeout=120000
[00:03:20]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:20]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:20]                 └- ✓ pass  (62ms) "endpoint When on the Endpoint Policy Details Page when on Ingest Policy Edit Package Policy page should show the endpoint policy form"
[00:03:20]               └-> "after each" hook for "should show the endpoint policy form"
[00:03:24]               └-> should allow updates to policy items
[00:03:24]                 └-> "before each" hook: global before each for "should allow updates to policy items"
[00:03:24]                 └-> "before each" hook for "should allow updates to policy items"
[00:03:27]                   │ info Using cached retrieval of endpoint package
[00:03:27]                   │ proc [kibana]   log   [08:13:52.872] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:27]                   │ proc [kibana]   log   [08:13:52.873] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:27]                   │ info [docker:registry] 2021/05/17 08:13:52 source.ip: 172.17.0.1:41196, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:27]                   │ info [docker:registry] 2021/05/17 08:13:52 source.ip: 172.17.0.1:41194, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:27]                   │ proc [kibana]   log   [08:13:52.887] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:27]                   │ info [docker:registry] 2021/05/17 08:13:52 source.ip: 172.17.0.1:41200, url.original: /package/endpoint/0.18.0
[00:03:27]                   │ info [docker:registry] 2021/05/17 08:13:52 source.ip: 172.17.0.1:41204, url.original: /package/endpoint/0.18.0/
[00:03:29]                   │ debg navigating to fleet url: http://localhost:61131/app/fleet#/policies/cf12aba0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/4d53fd3d-6b32-47ac-891d-3145a9739f0f
[00:03:29]                   │ debg navigate to: http://localhost:61131/app/fleet#/policies/cf12aba0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/4d53fd3d-6b32-47ac-891d-3145a9739f0f
[00:03:29]                   │ debg browser[INFO] http://localhost:61131/app/fleet?_t=1621239234490#/policies/cf12aba0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/4d53fd3d-6b32-47ac-891d-3145a9739f0f 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:29]                   │
[00:03:29]                   │ debg browser[INFO] http://localhost:61131/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:29]                   │ debg ... sleep(700) start
[00:03:30]                   │ proc [kibana]   log   [08:13:55.312] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:30]                   │ info [docker:registry] 2021/05/17 08:13:55 source.ip: 172.17.0.1:41212, url.original: /search?experimental=true
[00:03:30]                   │ proc [kibana]   log   [08:13:55.465] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:30]                   │ proc [kibana]   log   [08:13:55.466] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:30]                   │ proc [kibana]   log   [08:13:55.467] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:30]                   │ proc [kibana]   log   [08:13:55.467] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:30]                   │ info [docker:registry] 2021/05/17 08:13:55 source.ip: 172.17.0.1:41230, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:03:30]                   │ info [docker:registry] 2021/05/17 08:13:55 source.ip: 172.17.0.1:41220, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:30]                   │ info [docker:registry] 2021/05/17 08:13:55 source.ip: 172.17.0.1:41228, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:03:30]                   │ info [docker:registry] 2021/05/17 08:13:55 source.ip: 172.17.0.1:41222, url.original: /search?package=system&internal=true&experimental=true
[00:03:30]                   │ debg ... sleep(700) end
[00:03:30]                   │ debg returned from get, calling refresh
[00:03:30]                   │ debg browser[INFO] http://localhost:61131/app/fleet?_t=1621239234490#/policies/cf12aba0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/4d53fd3d-6b32-47ac-891d-3145a9739f0f 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:30]                   │
[00:03:30]                   │ debg browser[INFO] http://localhost:61131/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:30]                   │ debg currentUrl = http://localhost:61131/app/fleet#/policies/cf12aba0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/4d53fd3d-6b32-47ac-891d-3145a9739f0f
[00:03:30]                   │          appUrl = http://localhost:61131/app/fleet#/policies/cf12aba0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/4d53fd3d-6b32-47ac-891d-3145a9739f0f
[00:03:30]                   │ debg TestSubjects.find(kibanaChrome)
[00:03:30]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:31]                   │ proc [kibana]   log   [08:13:56.630] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:31]                   │ debg ... sleep(501) start
[00:03:31]                   │ info [docker:registry] 2021/05/17 08:13:56 source.ip: 172.17.0.1:41240, url.original: /search?experimental=true
[00:03:31]                   │ proc [kibana]   log   [08:13:56.772] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:31]                   │ proc [kibana]   log   [08:13:56.772] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:31]                   │ proc [kibana]   log   [08:13:56.773] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:31]                   │ proc [kibana]   log   [08:13:56.774] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:31]                   │ info [docker:registry] 2021/05/17 08:13:56 source.ip: 172.17.0.1:41250, url.original: /search?package=system&internal=true&experimental=true
[00:03:31]                   │ info [docker:registry] 2021/05/17 08:13:56 source.ip: 172.17.0.1:41252, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:31]                   │ info [docker:registry] 2021/05/17 08:13:56 source.ip: 172.17.0.1:41254, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:03:31]                   │ info [docker:registry] 2021/05/17 08:13:56 source.ip: 172.17.0.1:41256, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:03:31]                   │ proc [kibana]   log   [08:13:57.026] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:31]                   │ info [docker:registry] 2021/05/17 08:13:57 source.ip: 172.17.0.1:41262, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:32]                   │ debg ... sleep(501) end
[00:03:32]                   │ debg in navigateTo url = http://localhost:61131/app/fleet#/policies/cf12aba0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/4d53fd3d-6b32-47ac-891d-3145a9739f0f
[00:03:32]                   │ debg TestSubjects.exists(editPackagePolicy_header)
[00:03:32]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="editPackagePolicy_header"]') with timeout=120000
[00:03:32]                 │ debg TestSubjects.find(policyWindowsEvent_dns)
[00:03:32]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_dns"]') with timeout=10000
[00:03:32]                 │ proc [kibana]   log   [08:13:57.207] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:32]                 │ info [docker:registry] 2021/05/17 08:13:57 source.ip: 172.17.0.1:41266, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:32]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_dns']/../label') with timeout=10000
[00:03:32]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:32]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:32]                 └- ✓ pass  (133ms) "endpoint When on the Endpoint Policy Details Page when on Ingest Policy Edit Package Policy page should allow updates to policy items"
[00:03:32]               └-> "after each" hook for "should allow updates to policy items"
[00:03:32]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:32]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:36]               └-> should preserve updates done from the Fleet form
[00:03:36]                 └-> "before each" hook: global before each for "should preserve updates done from the Fleet form"
[00:03:36]                 └-> "before each" hook for "should preserve updates done from the Fleet form"
[00:03:39]                   │ info Using cached retrieval of endpoint package
[00:03:39]                   │ proc [kibana]   log   [08:14:04.955] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:39]                   │ proc [kibana]   log   [08:14:04.956] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:39]                   │ info [docker:registry] 2021/05/17 08:14:04 source.ip: 172.17.0.1:41294, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:39]                   │ info [docker:registry] 2021/05/17 08:14:04 source.ip: 172.17.0.1:41296, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:39]                   │ proc [kibana]   log   [08:14:04.974] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:39]                   │ info [docker:registry] 2021/05/17 08:14:04 source.ip: 172.17.0.1:41300, url.original: /package/endpoint/0.18.0
[00:03:39]                   │ info [docker:registry] 2021/05/17 08:14:04 source.ip: 172.17.0.1:41304, url.original: /package/endpoint/0.18.0/
[00:03:41]                   │ debg navigating to fleet url: http://localhost:61131/app/fleet#/policies/d63cc6e0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a0db9fc5-240f-42fe-a4f2-e016be12386a
[00:03:41]                   │ debg navigate to: http://localhost:61131/app/fleet#/policies/d63cc6e0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a0db9fc5-240f-42fe-a4f2-e016be12386a
[00:03:41]                   │ debg browser[INFO] http://localhost:61131/app/fleet?_t=1621239246514#/policies/d63cc6e0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a0db9fc5-240f-42fe-a4f2-e016be12386a 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:41]                   │
[00:03:41]                   │ debg browser[INFO] http://localhost:61131/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:41]                   │ debg ... sleep(700) start
[00:03:42]                   │ debg ... sleep(700) end
[00:03:42]                   │ debg returned from get, calling refresh
[00:03:42]                   │ERROR browser[SEVERE] http://localhost:61131/42919/bundles/core/core.entry.js 12:150934 TypeError: Failed to fetch
[00:03:42]                   │          at fetch_Fetch.fetchResponse (http://localhost:61131/42919/bundles/core/core.entry.js:6:26193)
[00:03:42]                   │          at async http://localhost:61131/42919/bundles/core/core.entry.js:6:24090
[00:03:42]                   │          at async http://localhost:61131/42919/bundles/core/core.entry.js:6:23996
[00:03:42]                   │ debg browser[INFO] http://localhost:61131/app/fleet?_t=1621239246514#/policies/d63cc6e0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a0db9fc5-240f-42fe-a4f2-e016be12386a 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:42]                   │
[00:03:42]                   │ debg browser[INFO] http://localhost:61131/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:42]                   │ debg currentUrl = http://localhost:61131/app/fleet#/policies/d63cc6e0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a0db9fc5-240f-42fe-a4f2-e016be12386a
[00:03:42]                   │          appUrl = http://localhost:61131/app/fleet#/policies/d63cc6e0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a0db9fc5-240f-42fe-a4f2-e016be12386a
[00:03:42]                   │ debg TestSubjects.find(kibanaChrome)
[00:03:42]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:43]                   │ debg ... sleep(501) start
[00:03:43]                   │ proc [kibana]   log   [08:14:08.252] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:43]                   │ info [docker:registry] 2021/05/17 08:14:08 source.ip: 172.17.0.1:41320, url.original: /search?experimental=true
[00:03:43]                   │ proc [kibana]   log   [08:14:08.455] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:43]                   │ proc [kibana]   log   [08:14:08.456] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:43]                   │ proc [kibana]   log   [08:14:08.456] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:43]                   │ proc [kibana]   log   [08:14:08.457] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:43]                   │ info [docker:registry] 2021/05/17 08:14:08 source.ip: 172.17.0.1:41328, url.original: /search?package=system&internal=true&experimental=true
[00:03:43]                   │ info [docker:registry] 2021/05/17 08:14:08 source.ip: 172.17.0.1:41336, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:03:43]                   │ info [docker:registry] 2021/05/17 08:14:08 source.ip: 172.17.0.1:41332, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:03:43]                   │ info [docker:registry] 2021/05/17 08:14:08 source.ip: 172.17.0.1:41330, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:43]                   │ debg ... sleep(501) end
[00:03:43]                   │ debg in navigateTo url = http://localhost:61131/app/fleet#/policies/d63cc6e0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a0db9fc5-240f-42fe-a4f2-e016be12386a
[00:03:43]                   │ debg TestSubjects.exists(editPackagePolicy_header)
[00:03:43]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="editPackagePolicy_header"]') with timeout=120000
[00:03:43]                   │ proc [kibana]   log   [08:14:08.693] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:43]                   │ info [docker:registry] 2021/05/17 08:14:08 source.ip: 172.17.0.1:41340, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:43]                 │ debg TestSubjects.find(packagePolicyDescriptionInput)
[00:03:43]                 │ debg Find.findByCssSelector('[data-test-subj="packagePolicyDescriptionInput"]') with timeout=10000
[00:03:43]                 │ debg TestSubjects.setValue(packagePolicyDescriptionInput, protect everything)
[00:03:43]                 │ debg TestSubjects.click(packagePolicyDescriptionInput)
[00:03:43]                 │ debg Find.clickByCssSelector('[data-test-subj="packagePolicyDescriptionInput"]') with timeout=10000
[00:03:43]                 │ debg Find.findByCssSelector('[data-test-subj="packagePolicyDescriptionInput"]') with timeout=10000
[00:03:43]                 │ proc [kibana]   log   [08:14:08.928] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:43]                 │ info [docker:registry] 2021/05/17 08:14:08 source.ip: 172.17.0.1:41346, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:43]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:43]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg TestSubjects.find(policyWindowsEvent_dns)
[00:03:44]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_dns"]') with timeout=10000
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_dns']/../label') with timeout=10000
[00:03:44]                 │ debg TestSubjects.getAttribute(packagePolicyDescriptionInput, value, tryTimeout=120000, findTimeout=10000)
[00:03:44]                 │ debg TestSubjects.find(packagePolicyDescriptionInput)
[00:03:44]                 │ debg Find.findByCssSelector('[data-test-subj="packagePolicyDescriptionInput"]') with timeout=10000
[00:03:44]                 │ info Taking screenshot "/dev/shm/workspace/kibana/x-pack/test/functional/screenshots/failure/endpoint When on the Endpoint Policy Details Page when on Ingest Policy Edit Package Policy page should preserve updates done from the Fleet form.png"
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:44]                 │ debg browser[DEBUG] http://localhost:61131/42919/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:44]                 │ info Current URL is: http://localhost:61131/app/fleet#/policies/d63cc6e0-b6e7-11eb-b5ca-55a9550943b1/edit-integration/a0db9fc5-240f-42fe-a4f2-e016be12386a
[00:03:44]                 │ info Saving page source to: /dev/shm/workspace/kibana/x-pack/test/functional/failure_debug/html/endpoint When on the Endpoint Policy Details Page when on Ingest Policy Edit Package Policy page should preserve updates done from the Fleet form.html
[00:03:44]                 └- ✖ fail: endpoint When on the Endpoint Policy Details Page when on Ingest Policy Edit Package Policy page should preserve updates done from the Fleet form
[00:03:44]                 │      Error: expected 'Protect the worlds data - but in the East Coastprotect everything' to equal 'protect everything'
[00:03:44]                 │       at Assertion.assert (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:100:11)
[00:03:44]                 │       at Assertion.be.Assertion.equal (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:227:8)
[00:03:44]                 │       at Assertion.be (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:69:22)
[00:03:44]                 │       at Context.<anonymous> (test/security_solution_endpoint/apps/endpoint/policy_details.ts:673:14)
[00:03:44]                 │       at runMicrotasks (<anonymous>)
[00:03:44]                 │       at processTicksAndRejections (internal/process/task_queues.js:93:5)
[00:03:44]                 │       at Object.apply (/dev/shm/workspace/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16)
[00:03:44]                 │ 
[00:03:44]                 │ 

Stack Trace

Error: expected 'Protect the worlds data - but in the East Coastprotect everything' to equal 'protect everything'
    at Assertion.assert (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:100:11)
    at Assertion.be.Assertion.equal (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:227:8)
    at Assertion.be (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:69:22)
    at Context.<anonymous> (test/security_solution_endpoint/apps/endpoint/policy_details.ts:673:14)
    at runMicrotasks (<anonymous>)
    at processTicksAndRejections (internal/process/task_queues.js:93:5)
    at Object.apply (/dev/shm/workspace/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16)

Metrics [docs]

Unknown metric groups

References to deprecated APIs

id before after diff
canvas 29 25 -4
crossClusterReplication 8 6 -2
fleet 22 20 -2
globalSearch 4 2 -2
indexManagement 12 7 -5
infra 261 149 -112
lens 67 45 -22
licensing 18 15 -3
maps 286 208 -78
ml 121 115 -6
monitoring 109 56 -53
stackAlerts 101 95 -6
total -295

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

Copy link
Contributor

@LeeDr LeeDr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM - only code review

@dmlemeshko dmlemeshko merged commit e30c7a4 into elastic:master May 17, 2021
@dmlemeshko dmlemeshko added v7.14.0 auto-backport Deprecated - use backport:version if exact versions are needed labels May 17, 2021
kibanamachine added a commit to kibanamachine/kibana that referenced this pull request May 17, 2021
Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
kibanamachine added a commit to kibanamachine/kibana that referenced this pull request May 17, 2021
Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
@kibanamachine
Copy link
Contributor

💚 Backport successful

Status Branch Result
7.13
7.x

The backport PRs will be merged automatically after passing CI.

@kibanamachine kibanamachine added the backport missing Added to PRs automatically when the are determined to be missing a backport. label May 18, 2021
@kibanamachine
Copy link
Contributor

Looks like this PR has backport PRs but they still haven't been merged. Please merge them ASAP to keep the branches relatively in sync.

1 similar comment
@kibanamachine
Copy link
Contributor

Looks like this PR has backport PRs but they still haven't been merged. Please merge them ASAP to keep the branches relatively in sync.

@dmlemeshko dmlemeshko removed auto-backport Deprecated - use backport:version if exact versions are needed backport missing Added to PRs automatically when the are determined to be missing a backport. v7.13.1 v7.14.0 labels May 20, 2021
@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

@kibanamachine kibanamachine added the backport missing Added to PRs automatically when the are determined to be missing a backport. label May 20, 2021
@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

1 similar comment
@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

yctercero pushed a commit to yctercero/kibana that referenced this pull request May 25, 2021
Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

11 similar comments
@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100144 or prevent reminders by adding the backport:skip label.

dmlemeshko added a commit to dmlemeshko/kibana that referenced this pull request Jun 10, 2021
Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
# Conflicts:
#	test/functional/page_objects/common_page.ts
dmlemeshko added a commit that referenced this pull request Jun 10, 2021
Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
# Conflicts:
#	test/functional/page_objects/common_page.ts
@kibanamachine kibanamachine removed the backport missing Added to PRs automatically when the are determined to be missing a backport. label Jun 10, 2021
@dmlemeshko dmlemeshko deleted the ftr-navigation-cleanup branch January 31, 2022 12:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
release_note:skip Skip the PR/issue when compiling release notes test_ui_functional v7.14.0 v8.0.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants