Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Deprecations service] make correctiveActions.manualSteps required #100997

Merged
merged 13 commits into from
Jun 2, 2021

Conversation

Bamieh
Copy link
Member

@Bamieh Bamieh commented May 31, 2021

Summary

Not having any correctiveActions leads to a poor UX, as a user doesn't have context on how to resolve a deprecation. It also is an inconsistent experience as some config deprecations provide manual corrective steps, while others do not.

This PR enforces all deprecations to register manual corrective steps.

Changes

  1. Make correctiveActions.manualSteps required in for all deprecations.
  2. Update custom config deprecations to include manual steps.

Closes #96059

Note to reviewers

If your team is pinged it means I've added manual corrective steps for your custom config deprecations based on the deprecation details. Please filter the files by CODEOWNERS and make sure the manual steps make sense.

@Bamieh Bamieh added Team:Core Core services & architecture: plugins, logging, config, saved objects, http, ES client, i18n, etc v8.0.0 release_note:skip Skip the PR/issue when compiling release notes v7.14.0 auto-backport Deprecated: Automatically backport this PR after it's merged labels May 31, 2021
@Bamieh Bamieh marked this pull request as ready for review June 1, 2021 15:41
@Bamieh Bamieh requested review from a team as code owners June 1, 2021 15:41
@Bamieh Bamieh requested a review from a team June 1, 2021 15:41
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-core (Team:Core)

@mikecote mikecote added this to In Review in Kibana Alerting Jun 1, 2021
Copy link
Member

@legrego legrego left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just a few nits, thanks for taking care of this!

x-pack/plugins/security/server/config_deprecations.ts Outdated Show resolved Hide resolved
x-pack/plugins/security/server/config_deprecations.ts Outdated Show resolved Hide resolved
x-pack/plugins/security/server/config_deprecations.ts Outdated Show resolved Hide resolved
x-pack/plugins/security/server/config_deprecations.ts Outdated Show resolved Hide resolved
x-pack/plugins/spaces/server/config.ts Outdated Show resolved Hide resolved
Copy link
Contributor

@YulNaumenko YulNaumenko left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Alerting changes LGTM!

Copy link
Contributor

@alisonelizabeth alisonelizabeth left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for working on this! ES UI changes LGTM (updated test mock).

Side comment: We've started to do some user testing around Upgrade Assistant. One thing that's been made apparent is the importance of providing clear and concise instructions. I think it could be helpful to have someone from the docs team review the copy we're providing in the steps. Let me know what you think, and if I can help in any way.

Copy link
Contributor

@igoristic igoristic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Stack Monitoring looks good 👍

x-pack/plugins/reporting/server/config/index.ts Outdated Show resolved Hide resolved
Co-authored-by: igoristic <igor.zaytsev.dev@gmail.com>
Co-authored-by: Larry Gregory <lgregorydev@gmail.com>
@Bamieh
Copy link
Member Author

Bamieh commented Jun 2, 2021

I think it could be helpful to have someone from the docs team review the copy we're providing in the steps. Let me know what you think, and if I can help in any way.

@alisonelizabeth I believe that is a great idea and much needed since this text is directly communicated with users.

I'd like to have that follow up in a separate issue and PRs since this PR involves many teams and has both content and code changes.

Lets create a meta issue with all the config deprecations we have (not only the ones changed in this PR) and then asking the docs team to go over each deprecation and create separate PR changes for each team would be a lot smoother for everyone. It would also help me avoid merge conflicts, re-reviews, and being noisy.

@kibanamachine
Copy link
Contributor

💛 Build succeeded, but was flaky


Test Failures

Kibana Pipeline / general / task-queue-process-20 / X-Pack Endpoint Functional Tests.x-pack/test/security_solution_endpoint/apps/endpoint/policy_details·ts.endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has failed 8 times on tracked branches: https://github.com/elastic/kibana/issues/92567

[00:00:00]       │
[00:00:00]         └-: endpoint
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [.kibana_8.0.0_001/f3VY4065TMqhuks2iTLAFA] update_mapping [_doc]
[00:00:00]             │ proc [kibana]   log   [10:51:59.253] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:51:59.256] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:51:59.256] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:51:59.257] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42120, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42118, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42122, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42116, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ proc [kibana]   log   [10:51:59.290] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:51:59.292] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:51:59.293] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:51:59.294] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42130, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42136, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42142, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42140, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:00]             │ proc [kibana]   log   [10:51:59.296] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:51:59.299] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:51:59.300] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:51:59.301] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42146, url.original: /package/system/0.12.0
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42154, url.original: /package/endpoint/0.18.0
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42158, url.original: /package/fleet_server/0.2.1
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42156, url.original: /package/elastic_agent/0.0.6
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42174, url.original: /package/system/0.12.0/
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42170, url.original: /package/endpoint/0.18.0/
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42172, url.original: /package/elastic_agent/0.0.6/
[00:00:00]             │ proc [kibana]   log   [10:51:59.310] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42178, url.original: /epr/elastic_agent/elastic_agent-0.0.6.zip
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42166, url.original: /package/fleet_server/0.2.1/
[00:00:00]             │ proc [kibana]   log   [10:51:59.316] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42182, url.original: /epr/fleet_server/fleet_server-0.2.1.zip
[00:00:00]             │ proc [kibana]   log   [10:51:59.319] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42186, url.original: /epr/endpoint/endpoint-0.18.0.zip
[00:00:00]             │ proc [kibana]   log   [10:51:59.330] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/02 10:51:59 source.ip: 172.17.0.1:42190, url.original: /epr/system/system-0.12.0.zip
[00:00:02]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index lifecycle policy [.fleet-actions-results]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [.kibana_8.0.0_001/f3VY4065TMqhuks2iTLAFA] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [.kibana_8.0.0_001/f3VY4065TMqhuks2iTLAFA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [.kibana_8.0.0_001/f3VY4065TMqhuks2iTLAFA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [.fleet-actions-results] for index patterns [.fleet-actions-results]
[00:00:03]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index lifecycle policy [logs-endpoint.collection-diagnostic]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding component template [metrics-elastic_agent.elastic_agent-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-elastic_agent.elastic_agent] for index patterns [metrics-elastic_agent.elastic_agent-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [logs-system.application] for index patterns [logs-system.application-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [logs-system.security] for index patterns [logs-system.security-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [logs-system.system] for index patterns [logs-system.system-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding component template [logs-endpoint.events.file-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding component template [logs-endpoint.alerts-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding component template [.logs-endpoint.diagnostic.collection-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding component template [logs-endpoint.events.library-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding component template [metrics-endpoint.metrics-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding component template [metrics-endpoint.policy-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding component template [logs-endpoint.events.network-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding component template [metrics-endpoint.metadata-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding component template [logs-endpoint.events.process-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding component template [logs-endpoint.events.security-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding component template [logs-endpoint.events.registry-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [.logs-endpoint.diagnostic.collection] for index patterns [.logs-endpoint.diagnostic.collection-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:08]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [.transform-internal-007] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:08]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] updating number_of_replicas to [0] for indices [.transform-internal-007]
[00:00:08]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-internal-007][0]]])." previous.health="YELLOW" reason="shards started [[.transform-internal-007][0]]"
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[metrics-endpoint.metadata_current_default][0]]])." previous.health="YELLOW" reason="shards started [[metrics-endpoint.metadata_current_default][0]]"
[00:00:09]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [endpoint.metadata_current-default-0.18.0] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:09]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [endpoint.metadata_current-default-0.18.0] successfully completed and scheduled task in node operation
[00:00:11]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [.kibana_8.0.0_001/f3VY4065TMqhuks2iTLAFA] update_mapping [_doc]
[00:00:11]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [.kibana_8.0.0_001/f3VY4065TMqhuks2iTLAFA] update_mapping [_doc]
[00:00:12]             │ proc [kibana]   log   [10:52:11.482] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:12]             │ info [docker:registry] 2021/06/02 10:52:11 source.ip: 172.17.0.1:42246, url.original: /search?package=system&internal=true&experimental=true
[00:00:12]             │ proc [kibana]   log   [10:52:11.507] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:12]             │ info [docker:registry] 2021/06/02 10:52:11 source.ip: 172.17.0.1:42250, url.original: /search?package=system&internal=true&experimental=true
[00:00:12]             │ proc [kibana]   log   [10:52:11.516] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:12]             │ info [docker:registry] 2021/06/02 10:52:11 source.ip: 172.17.0.1:42254, url.original: /package/system/0.12.0
[00:00:12]             │ info [docker:registry] 2021/06/02 10:52:11 source.ip: 172.17.0.1:42258, url.original: /package/system/0.12.0/
[00:00:13]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [.kibana_8.0.0_001/f3VY4065TMqhuks2iTLAFA] update_mapping [_doc]
[00:00:14]             │ proc [kibana]   log   [10:52:13.514] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:14]             │ info [docker:registry] 2021/06/02 10:52:13 source.ip: 172.17.0.1:42266, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:14]             │ proc [kibana]   log   [10:52:13.528] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:14]             │ info [docker:registry] 2021/06/02 10:52:13 source.ip: 172.17.0.1:42270, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:14]             │ proc [kibana]   log   [10:52:13.534] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:14]             │ info [docker:registry] 2021/06/02 10:52:13 source.ip: 172.17.0.1:42274, url.original: /package/fleet_server/0.2.1
[00:00:14]             │ info [docker:registry] 2021/06/02 10:52:13 source.ip: 172.17.0.1:42278, url.original: /package/fleet_server/0.2.1/
[00:00:17]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [.fleet-enrollment-api-keys-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:17]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] updating number_of_replicas to [0] for indices [.fleet-enrollment-api-keys-7]
[00:00:17]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-enrollment-api-keys-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-enrollment-api-keys-7][0]]"
[00:00:18]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] [.fleet-policies-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] updating number_of_replicas to [0] for indices [.fleet-policies-7]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1622630723616466757] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-policies-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-policies-7][0]]"
[00:00:48]           └-: When on the Endpoint Policy Details Page
[00:00:48]             └-> "before all" hook in "When on the Endpoint Policy Details Page"
[00:01:55]             └-: and the save button is clicked
[00:01:55]               └-> "before all" hook for "should display success toast on successful save"
[00:01:55]               └-> should display success toast on successful save
[00:01:55]                 └-> "before each" hook: global before each for "should display success toast on successful save"
[00:01:55]                 └-> "before each" hook for "should display success toast on successful save"
[00:01:57]                   │ info Using cached retrieval of endpoint package
[00:01:57]                   │ proc [kibana]   log   [10:53:56.381] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:57]                   │ proc [kibana]   log   [10:53:56.381] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:57]                   │ info [docker:registry] 2021/06/02 10:53:56 source.ip: 172.17.0.1:43686, url.original: /search?package=endpoint&internal=true&experimental=true
[00:01:57]                   │ info [docker:registry] 2021/06/02 10:53:56 source.ip: 172.17.0.1:43684, url.original: /search?package=endpoint&internal=true&experimental=true
[00:01:57]                   │ proc [kibana]   log   [10:53:56.393] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:57]                   │ info [docker:registry] 2021/06/02 10:53:56 source.ip: 172.17.0.1:43690, url.original: /package/endpoint/0.18.0
[00:01:57]                   │ info [docker:registry] 2021/06/02 10:53:56 source.ip: 172.17.0.1:43694, url.original: /package/endpoint/0.18.0/
[00:02:00]                   │ debg navigateToActualUrl http://localhost:61201/app/security/administration/policy/52f18275-28f5-4828-8ebe-5d8a13f6092f
[00:02:00]                   │ debg browser[INFO] http://localhost:61201/app/security/administration/policy/52f18275-28f5-4828-8ebe-5d8a13f6092f?_t=1622631239082 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:00]                   │
[00:02:00]                   │ debg browser[INFO] http://localhost:61201/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:00]                   │ debg currentUrl = http://localhost:61201/app/security/administration/policy/52f18275-28f5-4828-8ebe-5d8a13f6092f
[00:02:00]                   │          appUrl = http://localhost:61201/app/security/administration/policy/52f18275-28f5-4828-8ebe-5d8a13f6092f
[00:02:00]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:00]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:01]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:01]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:01]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:01]                   │ proc [kibana]   log   [10:54:00.112] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:01]                   │ info [docker:registry] 2021/06/02 10:54:00 source.ip: 172.17.0.1:43706, url.original: /search?experimental=true
[00:02:02]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:02]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:02]                   │ proc [kibana]   log   [10:54:00.726] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:02]                   │ info [docker:registry] 2021/06/02 10:54:00 source.ip: 172.17.0.1:43714, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:02]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_dns']/../label') with timeout=10000
[00:02:02]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:02]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:02]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:02]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:02]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:02]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:02]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:02]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:02]                 │ debg Clicking modal confirm
[00:02:02]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:02]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:02]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:02]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:02]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:02]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:02]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:02]                 │ proc [kibana]   log   [10:54:01.466] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:02]                 │ info [docker:registry] 2021/06/02 10:54:01 source.ip: 172.17.0.1:43720, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:02]                 │ proc [kibana]   log   [10:54:01.470] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:02]                 │ info [docker:registry] 2021/06/02 10:54:01 source.ip: 172.17.0.1:43724, url.original: /package/endpoint/0.18.0
[00:02:02]                 │ info [docker:registry] 2021/06/02 10:54:01 source.ip: 172.17.0.1:43728, url.original: /package/endpoint/0.18.0/
[00:02:05]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:05]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:05]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:05]                 │ debg TestSubjects.getVisibleText(policyDetailsSuccessMessage)
[00:02:05]                 │ debg TestSubjects.find(policyDetailsSuccessMessage)
[00:02:05]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=10000
[00:02:05]                 └- ✓ pass  (3.3s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should display success toast on successful save"
[00:02:05]               └-> "after each" hook for "should display success toast on successful save"
[00:02:09]               └-> should persist update on the screen
[00:02:09]                 └-> "before each" hook: global before each for "should persist update on the screen"
[00:02:09]                 └-> "before each" hook for "should persist update on the screen"
[00:02:11]                   │ info Using cached retrieval of endpoint package
[00:02:11]                   │ proc [kibana]   log   [10:54:10.372] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:11]                   │ proc [kibana]   log   [10:54:10.373] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:11]                   │ info [docker:registry] 2021/06/02 10:54:10 source.ip: 172.17.0.1:43760, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:11]                   │ info [docker:registry] 2021/06/02 10:54:10 source.ip: 172.17.0.1:43758, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:11]                   │ proc [kibana]   log   [10:54:10.386] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:11]                   │ info [docker:registry] 2021/06/02 10:54:10 source.ip: 172.17.0.1:43766, url.original: /package/endpoint/0.18.0
[00:02:11]                   │ info [docker:registry] 2021/06/02 10:54:10 source.ip: 172.17.0.1:43770, url.original: /package/endpoint/0.18.0/
[00:02:14]                   │ debg navigateToActualUrl http://localhost:61201/app/security/administration/policy/a1424ff8-c3a4-49ff-a4cf-3de0df798f7b
[00:02:14]                   │ debg browser[INFO] http://localhost:61201/app/security/administration/policy/a1424ff8-c3a4-49ff-a4cf-3de0df798f7b?_t=1622631253106 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:14]                   │
[00:02:14]                   │ debg browser[INFO] http://localhost:61201/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:14]                   │ debg currentUrl = http://localhost:61201/app/security/administration/policy/a1424ff8-c3a4-49ff-a4cf-3de0df798f7b
[00:02:14]                   │          appUrl = http://localhost:61201/app/security/administration/policy/a1424ff8-c3a4-49ff-a4cf-3de0df798f7b
[00:02:14]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:14]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:15]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:15]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:15]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:15]                   │ proc [kibana]   log   [10:54:14.093] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:15]                   │ info [docker:registry] 2021/06/02 10:54:14 source.ip: 172.17.0.1:43782, url.original: /search?experimental=true
[00:02:15]                   │ proc [kibana]   log   [10:54:14.445] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:15]                   │ info [docker:registry] 2021/06/02 10:54:14 source.ip: 172.17.0.1:43786, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:17]                   │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:17]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:17]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:17]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_process']/../label') with timeout=10000
[00:02:17]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:17]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:17]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:17]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:17]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:17]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:17]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:17]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:17]                 │ debg Clicking modal confirm
[00:02:17]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:17]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:17]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:17]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:17]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:17]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:17]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:17]                 │ proc [kibana]   log   [10:54:16.442] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:17]                 │ info [docker:registry] 2021/06/02 10:54:16 source.ip: 172.17.0.1:43794, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:17]                 │ proc [kibana]   log   [10:54:16.447] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:17]                 │ info [docker:registry] 2021/06/02 10:54:16 source.ip: 172.17.0.1:43798, url.original: /package/endpoint/0.18.0
[00:02:17]                 │ info [docker:registry] 2021/06/02 10:54:16 source.ip: 172.17.0.1:43802, url.original: /package/endpoint/0.18.0/
[00:02:20]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:20]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:20]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:20]                 │ debg navigateToActualUrl http://localhost:61201/app/security/administration/endpoints
[00:02:21]                 │ debg browser[INFO] http://localhost:61201/app/security/administration/endpoints?_t=1622631259492 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:21]                 │
[00:02:21]                 │ debg browser[INFO] http://localhost:61201/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:21]                 │ debg currentUrl = http://localhost:61201/app/security/administration/endpoints
[00:02:21]                 │          appUrl = http://localhost:61201/app/security/administration/endpoints
[00:02:21]                 │ debg TestSubjects.find(kibanaChrome)
[00:02:21]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:21]                 │ debg isGlobalLoadingIndicatorVisible
[00:02:21]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:21]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:21]                 │ proc [kibana]   log   [10:54:20.436] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:21]                 │ info [docker:registry] 2021/06/02 10:54:20 source.ip: 172.17.0.1:43812, url.original: /search?experimental=true
[00:02:22]                 │ proc [kibana]   log   [10:54:20.817] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:22]                 │ info [docker:registry] 2021/06/02 10:54:20 source.ip: 172.17.0.1:43818, url.original: /search?category=security
[00:02:22]                 │ proc [kibana]   log   [10:54:20.897] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:22]                 │ proc [kibana]   log   [10:54:20.900] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:22]                 │ info [docker:registry] 2021/06/02 10:54:20 source.ip: 172.17.0.1:43824, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:22]                 │ info [docker:registry] 2021/06/02 10:54:20 source.ip: 172.17.0.1:43826, url.original: /search?category=security
[00:02:23]                 │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:23]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:23]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:23]                 │ debg navigateToActualUrl http://localhost:61201/app/security/administration/policy/a1424ff8-c3a4-49ff-a4cf-3de0df798f7b
[00:02:24]                 │ debg browser[INFO] http://localhost:61201/app/security/administration/policy/a1424ff8-c3a4-49ff-a4cf-3de0df798f7b?_t=1622631262436 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:24]                 │
[00:02:24]                 │ debg browser[INFO] http://localhost:61201/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:24]                 │ debg currentUrl = http://localhost:61201/app/security/administration/policy/a1424ff8-c3a4-49ff-a4cf-3de0df798f7b
[00:02:24]                 │          appUrl = http://localhost:61201/app/security/administration/policy/a1424ff8-c3a4-49ff-a4cf-3de0df798f7b
[00:02:24]                 │ debg TestSubjects.find(kibanaChrome)
[00:02:24]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:24]                 │ proc [kibana]   log   [10:54:23.080] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:24]                 │ info [docker:registry] 2021/06/02 10:54:23 source.ip: 172.17.0.1:43834, url.original: /search?experimental=true
[00:02:24]                 │ debg isGlobalLoadingIndicatorVisible
[00:02:24]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:24]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:24]                 │ proc [kibana]   log   [10:54:23.404] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:24]                 │ info [docker:registry] 2021/06/02 10:54:23 source.ip: 172.17.0.1:43842, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:26]                 │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:26]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:26]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:26]                 │ debg TestSubjects.find(policyWindowsEvent_process)
[00:02:26]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_process"]') with timeout=10000
[00:02:26]                 └- ✓ pass  (9.2s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should persist update on the screen"
[00:02:26]               └-> "after each" hook for "should persist update on the screen"
[00:02:30]               └-> should have updated policy data in overall Agent Policy
[00:02:30]                 └-> "before each" hook: global before each for "should have updated policy data in overall Agent Policy"
[00:02:30]                 └-> "before each" hook for "should have updated policy data in overall Agent Policy"
[00:02:33]                   │ info Using cached retrieval of endpoint package
[00:02:33]                   │ proc [kibana]   log   [10:54:32.446] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:33]                   │ proc [kibana]   log   [10:54:32.447] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:33]                   │ info [docker:registry] 2021/06/02 10:54:32 source.ip: 172.17.0.1:43874, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:33]                   │ info [docker:registry] 2021/06/02 10:54:32 source.ip: 172.17.0.1:43876, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:33]                   │ proc [kibana]   log   [10:54:32.459] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:33]                   │ info [docker:registry] 2021/06/02 10:54:32 source.ip: 172.17.0.1:43880, url.original: /package/endpoint/0.18.0
[00:02:33]                   │ info [docker:registry] 2021/06/02 10:54:32 source.ip: 172.17.0.1:43884, url.original: /package/endpoint/0.18.0/
[00:02:35]                   │ debg navigateToActualUrl http://localhost:61201/app/security/administration/policy/b6063918-a795-4930-9153-f88f6cb9c65a
[00:02:35]                   │ debg browser[INFO] http://localhost:61201/app/security/administration/policy/b6063918-a795-4930-9153-f88f6cb9c65a?_t=1622631274133 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:35]                   │
[00:02:35]                   │ debg browser[INFO] http://localhost:61201/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:35]                   │ debg currentUrl = http://localhost:61201/app/security/administration/policy/b6063918-a795-4930-9153-f88f6cb9c65a
[00:02:35]                   │          appUrl = http://localhost:61201/app/security/administration/policy/b6063918-a795-4930-9153-f88f6cb9c65a
[00:02:35]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:35]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:36]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:36]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:36]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:36]                   │ proc [kibana]   log   [10:54:35.176] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:36]                   │ info [docker:registry] 2021/06/02 10:54:35 source.ip: 172.17.0.1:43892, url.original: /search?experimental=true
[00:02:37]                   │ proc [kibana]   log   [10:54:35.802] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:37]                   │ info [docker:registry] 2021/06/02 10:54:35 source.ip: 172.17.0.1:43902, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:38]                   │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:38]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:38]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:38]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_file']/../label') with timeout=10000
[00:02:38]                 │ debg Find.byXPath('//input[@data-test-subj='policyLinuxEvent_file']/../label') with timeout=10000
[00:02:38]                 │ debg Find.byXPath('//input[@data-test-subj='policyMacEvent_file']/../label') with timeout=10000
[00:02:39]                 │ warn WebElementWrapper.click: element click intercepted: Element <label class="euiCheckbox__label" for="ieb8faa25-c390-11eb-8257-397f9b58f3b4">...</label> is not clickable at point (451, 87). Other element would receive the click: <div class="euiFlexGroup euiFlexGroup--alignItemsCenter euiFlexGroup--directionRow header__breadcrumbsWithExtensionContainer">...</div>
[00:02:39]                 │        (Session info: headless chrome=91.0.4472.77)
[00:02:39]                 │ debg finding element 'By(xpath, //input[@data-test-subj='policyWindowsEvent_file']/../label)' again, 2 attempts left
[00:02:40]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:40]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:40]                 │ debg TestSubjects.find(advancedPolicyButton)
[00:02:40]                 │ debg Find.findByCssSelector('[data-test-subj="advancedPolicyButton"]') with timeout=10000
[00:02:40]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:40]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:40]                 │ debg TestSubjects.find(linux.advanced.agent.connection_delay)
[00:02:40]                 │ debg Find.findByCssSelector('[data-test-subj="linux.advanced.agent.connection_delay"]') with timeout=10000
[00:02:40]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:40]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:40]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:40]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:40]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:40]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:40]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:40]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:40]                 │ debg Clicking modal confirm
[00:02:40]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:40]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:40]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:40]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:40]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:40]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:40]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:40]                 │ proc [kibana]   log   [10:54:39.168] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:40]                 │ info [docker:registry] 2021/06/02 10:54:39 source.ip: 172.17.0.1:43912, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:40]                 │ proc [kibana]   log   [10:54:39.173] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:40]                 │ info [docker:registry] 2021/06/02 10:54:39 source.ip: 172.17.0.1:43916, url.original: /package/endpoint/0.18.0
[00:02:40]                 │ info [docker:registry] 2021/06/02 10:54:39 source.ip: 172.17.0.1:43920, url.original: /package/endpoint/0.18.0/
[00:02:43]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:43]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:43]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:43]                 └- ✓ pass  (5.0s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy"
[00:02:43]               └-> "after each" hook for "should have updated policy data in overall Agent Policy"
[00:02:47]               └-> should have cleared the advanced section when the user deletes the value
[00:02:47]                 └-> "before each" hook: global before each for "should have cleared the advanced section when the user deletes the value"
[00:02:47]                 └-> "before each" hook for "should have cleared the advanced section when the user deletes the value"
[00:02:50]                   │ info Using cached retrieval of endpoint package
[00:02:50]                   │ proc [kibana]   log   [10:54:49.473] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:50]                   │ proc [kibana]   log   [10:54:49.474] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:50]                   │ info [docker:registry] 2021/06/02 10:54:49 source.ip: 172.17.0.1:43956, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:50]                   │ info [docker:registry] 2021/06/02 10:54:49 source.ip: 172.17.0.1:43954, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:50]                   │ proc [kibana]   log   [10:54:49.487] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:50]                   │ info [docker:registry] 2021/06/02 10:54:49 source.ip: 172.17.0.1:43962, url.original: /package/endpoint/0.18.0
[00:02:50]                   │ info [docker:registry] 2021/06/02 10:54:49 source.ip: 172.17.0.1:43966, url.original: /package/endpoint/0.18.0/
[00:02:52]                   │ proc [kibana]   log   [10:54:50.590] [info][plugins][securitySolution] Committed manifest 1.0.2
[00:02:52]                   │ proc [kibana]   log   [10:54:50.597] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:52]                   │ info [docker:registry] 2021/06/02 10:54:50 source.ip: 172.17.0.1:43972, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:52]                   │ proc [kibana]   log   [10:54:50.601] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:52]                   │ info [docker:registry] 2021/06/02 10:54:50 source.ip: 172.17.0.1:43976, url.original: /package/endpoint/0.18.0
[00:02:52]                   │ info [docker:registry] 2021/06/02 10:54:50 source.ip: 172.17.0.1:43980, url.original: /package/endpoint/0.18.0/
[00:02:52]                   │ debg navigateToActualUrl http://localhost:61201/app/security/administration/policy/0a35d5d6-1b9d-4b21-9a49-6958f1d0f24d
[00:02:52]                   │ debg browser[INFO] http://localhost:61201/app/security/administration/policy/0a35d5d6-1b9d-4b21-9a49-6958f1d0f24d?_t=1622631291157 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:52]                   │
[00:02:52]                   │ debg browser[INFO] http://localhost:61201/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:52]                   │ debg currentUrl = http://localhost:61201/app/security/administration/policy/0a35d5d6-1b9d-4b21-9a49-6958f1d0f24d
[00:02:52]                   │          appUrl = http://localhost:61201/app/security/administration/policy/0a35d5d6-1b9d-4b21-9a49-6958f1d0f24d
[00:02:52]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:52]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:53]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:53]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:53]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:53]                   │ proc [kibana]   log   [10:54:52.230] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:53]                   │ info [docker:registry] 2021/06/02 10:54:52 source.ip: 172.17.0.1:43988, url.original: /search?experimental=true
[00:02:54]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:54]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:54]                   │ proc [kibana]   log   [10:54:52.778] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:54]                   │ info [docker:registry] 2021/06/02 10:54:52 source.ip: 172.17.0.1:43992, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:54]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:54]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:54]                 │ debg TestSubjects.find(advancedPolicyButton)
[00:02:54]                 │ debg Find.findByCssSelector('[data-test-subj="advancedPolicyButton"]') with timeout=10000
[00:02:54]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:54]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:54]                 │ debg TestSubjects.find(linux.advanced.agent.connection_delay)
[00:02:54]                 │ debg Find.findByCssSelector('[data-test-subj="linux.advanced.agent.connection_delay"]') with timeout=10000
[00:02:55]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:55]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:55]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:55]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:55]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:55]                 │ debg Clicking modal confirm
[00:02:55]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:55]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:55]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:55]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:55]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:55]                 │ proc [kibana]   log   [10:54:53.841] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:55]                 │ info [docker:registry] 2021/06/02 10:54:53 source.ip: 172.17.0.1:43998, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:55]                 │ proc [kibana]   log   [10:54:53.846] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:55]                 │ info [docker:registry] 2021/06/02 10:54:53 source.ip: 172.17.0.1:44002, url.original: /package/endpoint/0.18.0
[00:02:55]                 │ info [docker:registry] 2021/06/02 10:54:53 source.ip: 172.17.0.1:44006, url.original: /package/endpoint/0.18.0/
[00:02:57]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:58]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:58]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:58]                 │ info Taking screenshot "/dev/shm/workspace/kibana/x-pack/test/functional/screenshots/failure/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value.png"
[00:02:58]                 │ info Current URL is: http://localhost:61201/app/security/administration/policy/0a35d5d6-1b9d-4b21-9a49-6958f1d0f24d
[00:02:58]                 │ info Saving page source to: /dev/shm/workspace/kibana/x-pack/test/functional/failure_debug/html/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value.html
[00:02:58]                 └- ✖ fail: endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value
[00:02:58]                 │       Error: expected [ { id: '0a35d5d6-1b9d-4b21-9a49-6958f1d0f24d',
[00:02:58]                 │     revision: 3,
[00:02:58]                 │     name: 'Protect East Coast',
[00:02:58]                 │     type: 'endpoint',
[00:02:58]                 │     data_stream: { namespace: 'default' },
[00:02:58]                 │     use_output: 'default',
[00:02:58]                 │     artifact_manifest: 
[00:02:58]                 │      { schema_version: 'v1',
[00:02:58]                 │        manifest_version: '1.0.2',
[00:02:58]                 │        artifacts: [Object] },
[00:02:58]                 │     policy: { linux: [Object], windows: [Object], mac: [Object] },
[00:02:58]                 │     meta: { package: [Object] } } ] to sort of equal [ { id: '0a35d5d6-1b9d-4b21-9a49-6958f1d0f24d',
[00:02:58]                 │     revision: 2,
[00:02:58]                 │     data_stream: { namespace: 'default' },
[00:02:58]                 │     name: 'Protect East Coast',
[00:02:58]                 │     meta: { package: [Object] },
[00:02:58]                 │     artifact_manifest: 
[00:02:58]                 │      { artifacts: [Object],
[00:02:58]                 │        manifest_version: '1.0.2',
[00:02:58]                 │        schema_version: 'v1' },
[00:02:58]                 │     policy: { linux: [Object], mac: [Object], windows: [Object] },
[00:02:58]                 │     type: 'endpoint',
[00:02:58]                 │     use_output: 'default' } ]
[00:02:58]                 │       + expected - actual
[00:02:58]                 │ 
[00:02:58]                 │                  "encoded_size": 22
[00:02:58]                 │                  "encryption_algorithm": "none"
[00:02:58]                 │                  "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │                }
[00:02:58]                 │       +        "endpoint-exceptionlist-linux-v1": {
[00:02:58]                 │       +          "compression_algorithm": "zlib"
[00:02:58]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +          "decoded_size": 14
[00:02:58]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:02:58]                 │       +          "encoded_size": 22
[00:02:58]                 │       +          "encryption_algorithm": "none"
[00:02:58]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +        }
[00:02:58]                 │       +        "endpoint-exceptionlist-macos-v1": {
[00:02:58]                 │       +          "compression_algorithm": "zlib"
[00:02:58]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +          "decoded_size": 14
[00:02:58]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:02:58]                 │       +          "encoded_size": 22
[00:02:58]                 │       +          "encryption_algorithm": "none"
[00:02:58]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +        }
[00:02:58]                 │       +        "endpoint-exceptionlist-windows-v1": {
[00:02:58]                 │       +          "compression_algorithm": "zlib"
[00:02:58]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +          "decoded_size": 14
[00:02:58]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:02:58]                 │       +          "encoded_size": 22
[00:02:58]                 │       +          "encryption_algorithm": "none"
[00:02:58]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +        }
[00:02:58]                 │       +        "endpoint-trustlist-linux-v1": {
[00:02:58]                 │       +          "compression_algorithm": "zlib"
[00:02:58]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +          "decoded_size": 14
[00:02:58]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:02:58]                 │       +          "encoded_size": 22
[00:02:58]                 │       +          "encryption_algorithm": "none"
[00:02:58]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +        }
[00:02:58]                 │       +        "endpoint-trustlist-macos-v1": {
[00:02:58]                 │       +          "compression_algorithm": "zlib"
[00:02:58]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +          "decoded_size": 14
[00:02:58]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:02:58]                 │       +          "encoded_size": 22
[00:02:58]                 │       +          "encryption_algorithm": "none"
[00:02:58]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +        }
[00:02:58]                 │       +        "endpoint-trustlist-windows-v1": {
[00:02:58]                 │       +          "compression_algorithm": "zlib"
[00:02:58]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +          "decoded_size": 14
[00:02:58]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:02:58]                 │       +          "encoded_size": 22
[00:02:58]                 │       +          "encryption_algorithm": "none"
[00:02:58]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +        }
[00:02:58]                 │              }
[00:02:58]                 │              "manifest_version": "1.0.2"
[00:02:58]                 │              "schema_version": "v1"
[00:02:58]                 │            }
[00:02:58]                 │ --
[00:02:58]                 │                  "supported": true
[00:02:58]                 │                }
[00:02:58]                 │              }
[00:02:58]                 │            }
[00:02:58]                 │       -    "revision": 3
[00:02:58]                 │       +    "revision": 2
[00:02:58]                 │            "type": "endpoint"
[00:02:58]                 │            "use_output": "default"
[00:02:58]                 │          }
[00:02:58]                 │        ]
[00:02:58]                 │       
[00:02:58]                 │       at Assertion.assert (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:100:11)
[00:02:58]                 │       at Assertion.eql (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:244:8)
[00:02:58]                 │       at Context.<anonymous> (test/security_solution_endpoint/apps/endpoint/policy_details.ts:369:43)
[00:02:58]                 │       at Object.apply (/dev/shm/workspace/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16)
[00:02:58]                 │ 
[00:02:58]                 │ 

Stack Trace

Error: expected [ { id: '0a35d5d6-1b9d-4b21-9a49-6958f1d0f24d',
    revision: 3,
    name: 'Protect East Coast',
    type: 'endpoint',
    data_stream: { namespace: 'default' },
    use_output: 'default',
    artifact_manifest: 
     { schema_version: 'v1',
       manifest_version: '1.0.2',
       artifacts: [Object] },
    policy: { linux: [Object], windows: [Object], mac: [Object] },
    meta: { package: [Object] } } ] to sort of equal [ { id: '0a35d5d6-1b9d-4b21-9a49-6958f1d0f24d',
    revision: 2,
    data_stream: { namespace: 'default' },
    name: 'Protect East Coast',
    meta: { package: [Object] },
    artifact_manifest: 
     { artifacts: [Object],
       manifest_version: '1.0.2',
       schema_version: 'v1' },
    policy: { linux: [Object], mac: [Object], windows: [Object] },
    type: 'endpoint',
    use_output: 'default' } ]
    at Assertion.assert (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:100:11)
    at Assertion.eql (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:244:8)
    at Context.<anonymous> (test/security_solution_endpoint/apps/endpoint/policy_details.ts:369:43)
    at Object.apply (/dev/shm/workspace/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16) {
  actual: '[\n' +
    '  {\n' +
    '    "artifact_manifest": {\n' +
    '      "artifacts": {\n' +
    '        "endpoint-eventfilterlist-linux-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-eventfilterlist-macos-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-eventfilterlist-windows-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '      }\n' +
    '      "manifest_version": "1.0.2"\n' +
    '      "schema_version": "v1"\n' +
    '    }\n' +
    '    "data_stream": {\n' +
    '      "namespace": "default"\n' +
    '    }\n' +
    '    "id": "0a35d5d6-1b9d-4b21-9a49-6958f1d0f24d"\n' +
    '    "meta": {\n' +
    '      "package": {\n' +
    '        "name": "endpoint"\n' +
    '        "version": "0.18.0"\n' +
    '      }\n' +
    '    }\n' +
    '    "name": "Protect East Coast"\n' +
    '    "policy": {\n' +
    '      "linux": {\n' +
    '        "advanced": {\n' +
    '          "agent": {\n' +
    '            "connection_delay": "true"\n' +
    '          }\n' +
    '        }\n' +
    '        "events": {\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '      }\n' +
    '      "mac": {\n' +
    '        "events": {\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '      }\n' +
    '      "windows": {\n' +
    '        "antivirus_registration": {\n' +
    '          "enabled": false\n' +
    '        }\n' +
    '        "events": {\n' +
    '          "dll_and_driver_load": true\n' +
    '          "dns": true\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '          "registry": true\n' +
    '          "security": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '          "ransomware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '        "ransomware": {\n' +
    '          "mode": "prevent"\n' +
    '          "supported": true\n' +
    '        }\n' +
    '      }\n' +
    '    }\n' +
    '    "revision": 3\n' +
    '    "type": "endpoint"\n' +
    '    "use_output": "default"\n' +
    '  }\n' +
    ']',
  expected: '[\n' +
    '  {\n' +
    '    "artifact_manifest": {\n' +
    '      "artifacts": {\n' +
    '        "endpoint-eventfilterlist-linux-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-eventfilterlist-macos-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-eventfilterlist-windows-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-exceptionlist-linux-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-exceptionlist-macos-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-exceptionlist-windows-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-trustlist-linux-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-trustlist-macos-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-trustlist-windows-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '      }\n' +
    '      "manifest_version": "1.0.2"\n' +
    '      "schema_version": "v1"\n' +
    '    }\n' +
    '    "data_stream": {\n' +
    '      "namespace": "default"\n' +
    '    }\n' +
    '    "id": "0a35d5d6-1b9d-4b21-9a49-6958f1d0f24d"\n' +
    '    "meta": {\n' +
    '      "package": {\n' +
    '        "name": "endpoint"\n' +
    '        "version": "0.18.0"\n' +
    '      }\n' +
    '    }\n' +
    '    "name": "Protect East Coast"\n' +
    '    "policy": {\n' +
    '      "linux": {\n' +
    '        "advanced": {\n' +
    '          "agent": {\n' +
    '            "connection_delay": "true"\n' +
    '          }\n' +
    '        }\n' +
    '        "events": {\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '      }\n' +
    '      "mac": {\n' +
    '        "events": {\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '      }\n' +
    '      "windows": {\n' +
    '        "antivirus_registration": {\n' +
    '          "enabled": false\n' +
    '        }\n' +
    '        "events": {\n' +
    '          "dll_and_driver_load": true\n' +
    '          "dns": true\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '          "registry": true\n' +
    '          "security": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '          "ransomware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '        "ransomware": {\n' +
    '          "mode": "prevent"\n' +
    '          "supported": true\n' +
    '        }\n' +
    '      }\n' +
    '    }\n' +
    '    "revision": 2\n' +
    '    "type": "endpoint"\n' +
    '    "use_output": "default"\n' +
    '  }\n' +
    ']',
  showDiff: true
}

Metrics [docs]

Unknown metric groups

References to deprecated APIs

id before after diff
canvas 29 25 -4
crossClusterReplication 8 6 -2
fleet 22 20 -2
globalSearch 4 2 -2
indexManagement 12 7 -5
infra 261 149 -112
lens 67 45 -22
licensing 18 15 -3
lists 239 236 -3
maps 286 208 -78
ml 121 115 -6
monitoring 109 56 -53
securitySolution 390 346 -44
stackAlerts 101 95 -6
total -342

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

@Bamieh Bamieh merged commit dfd6ec9 into elastic:master Jun 2, 2021
Kibana Alerting automation moved this from In Review to Done (Ordered by most recent) Jun 2, 2021
@Bamieh Bamieh deleted the deprecations/manual_step_required branch June 2, 2021 12:52
@kibanamachine
Copy link
Contributor

💔 Backport failed

Status Branch Result
7.x Commit could not be cherrypicked due to conflicts

To backport manually run:
node scripts/backport --pr 100997

Bamieh added a commit that referenced this pull request Jun 2, 2021
…uired (#100997) (#101156)

* merge conflicts

* update deprecation message
gmmorris added a commit to gmmorris/kibana that referenced this pull request Jun 2, 2021
* master: (68 commits)
  Unskip advanced settings a11y test (elastic#100558)
  [App Search] Crawler Landing Page (elastic#100822)
  [DOCS] Clarify when to use kbn clean (elastic#101155)
  change label behavior (elastic#100991)
  skip flaky suite (elastic#101126)
  Fix cases plugin ownership (elastic#101073)
  [Home] Adding file upload to add data page (elastic#100863)
  [ML] Functional tests - reenable categorization tests (elastic#101137)
  [DOCS] Adds server.uuid to settings docs (elastic#101121)
  Fix newsfeed unread notifications always on when reloading Kibana (elastic#100357)
  [Lens] Time shift metrics (elastic#98781)
  [Deprecations service] make `correctiveActions.manualSteps` required (elastic#100997)
  Add "Risk Matrix" section to the PR template (elastic#100649)
  [Maps] spatially filter by all geo fields (elastic#100735)
  [Security Solution] Add Ransomware canary advanced policy option (elastic#101068)
  [Exploratory view] Core web vitals (elastic#100320)
  [Security solution][Endpoint] Add unit tests for fleet event filters/trusted apps cards (elastic#101034)
  [Lens] Use a setter function for the dimension panel (elastic#101123)
  [Index Patterns] Fix return saved index pattern object (elastic#101051)
  [CI] For PRs, build TS refs before public api docs check (elastic#100791)
  ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
auto-backport Deprecated: Automatically backport this PR after it's merged release_note:skip Skip the PR/issue when compiling release notes Team:Core Core services & architecture: plugins, logging, config, saved objects, http, ES client, i18n, etc v7.14.0 v8.0.0
Projects
No open projects
Kibana Alerting
Done (Ordered by most recent)
Development

Successfully merging this pull request may close these issues.

[Core deprecations service] Require manual corrective steps for config deprecations
8 participants