Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add core-js production dependency #79395

Merged
merged 1 commit into from
Oct 5, 2020

Conversation

spalger
Copy link
Contributor

@spalger spalger commented Oct 4, 2020

#79176 removed the core-js production dependency which was a mistake

Fixes #79392

cc @liza-mae

@spalger spalger added Team:Operations Team label for Operations Team v8.0.0 release_note:skip Skip the PR/issue when compiling release notes v7.10.0 labels Oct 4, 2020
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-operations (Team:Operations)

@kibanamachine
Copy link
Contributor

💛 Build succeeded, but was flaky


Test Failures

X-Pack Alerting API Integration Tests.x-pack/test/alerting_api_integration/security_and_spaces/tests/alerting/update·ts.alerting api integration security and spaces enabled Alerts update superuser at space1 should still be able to update when AAD is broken

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has not failed recently on tracked branches

[00:00:00]       │
[00:00:00]         └-: alerting api integration security and spaces enabled
[00:00:00]           └-> "before all" hook
[00:00:00]           └-> "before all" hook
[00:00:00]             │ debg creating space
[00:00:00]             │ proc [kibana]   log   [08:46:32.362] [warning][plugins][reporting] Enabling the Chromium sandbox provides an additional layer of protection.
[00:00:00]             │ debg created space
[00:00:00]             │ debg creating space
[00:00:01]             │ debg created space
[00:00:01]             │ debg creating space
[00:00:02]             │ debg created space
[00:00:02]             │ debg creating user no_kibana_privileges
[00:00:02]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] [ilm-history-3-000001] creating index, cause [api], templates [ilm-history], shards [1]/[0]
[00:00:02]             │ info [o.e.x.i.IndexLifecycleTransition] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] moving index [ilm-history-3-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [ilm-history-ilm-policy]
[00:00:02]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[ilm-history-3-000001][0]]])." previous.health="YELLOW" reason="shards started [[ilm-history-3-000001][0]]"
[00:00:02]             │ info [o.e.x.i.IndexLifecycleTransition] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] moving index [ilm-history-3-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"wait-for-indexing-complete"}] in policy [ilm-history-ilm-policy]
[00:00:02]             │ info [o.e.x.i.IndexLifecycleTransition] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] moving index [ilm-history-3-000001] from [{"phase":"hot","action":"unfollow","name":"wait-for-indexing-complete"}] to [{"phase":"hot","action":"unfollow","name":"wait-for-follow-shard-tasks"}] in policy [ilm-history-ilm-policy]
[00:00:02]             │ info [o.e.x.s.a.u.TransportPutUserAction] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] added user [no_kibana_privileges]
[00:00:02]             │ debg created user no_kibana_privileges
[00:00:02]             │ debg creating role no_kibana_privileges
[00:00:02]             │ info [o.e.x.s.a.r.TransportPutRoleAction] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] added role [no_kibana_privileges]
[00:00:02]             │ debg creating user superuser
[00:00:02]             │ info [o.e.x.s.a.u.TransportPutUserAction] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] added user [superuser]
[00:00:02]             │ debg created user superuser
[00:00:02]             │ debg creating user global_read
[00:00:03]             │ info [o.e.x.s.a.u.TransportPutUserAction] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] added user [global_read]
[00:00:03]             │ debg created user global_read
[00:00:03]             │ debg creating role global_read_role
[00:00:03]             │ info [o.e.x.s.a.r.TransportPutRoleAction] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] added role [global_read_role]
[00:00:03]             │ debg creating user space_1_all
[00:00:03]             │ info [o.e.x.s.a.u.TransportPutUserAction] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] added user [space_1_all]
[00:00:03]             │ debg created user space_1_all
[00:00:03]             │ debg creating role space_1_all_role
[00:00:03]             │ info [o.e.x.s.a.r.TransportPutRoleAction] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] added role [space_1_all_role]
[00:00:03]             │ debg creating user space_1_all_with_restricted_fixture
[00:00:03]             │ info [o.e.x.s.a.u.TransportPutUserAction] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] added user [space_1_all_with_restricted_fixture]
[00:00:03]             │ debg created user space_1_all_with_restricted_fixture
[00:00:03]             │ debg creating role space_1_all_with_restricted_fixture_role
[00:00:03]             │ info [o.e.x.s.a.r.TransportPutRoleAction] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] added role [space_1_all_with_restricted_fixture_role]
[00:00:03]             │ debg creating user space_1_all_alerts_none_actions
[00:00:03]             │ info [o.e.x.s.a.u.TransportPutUserAction] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] added user [space_1_all_alerts_none_actions]
[00:00:03]             │ debg created user space_1_all_alerts_none_actions
[00:00:03]             │ debg creating role space_1_all_alerts_none_actions_role
[00:00:03]             │ info [o.e.x.s.a.r.TransportPutRoleAction] [kibana-ci-immutable-debian-tests-xxl-1601799422830646278] added role [space_1_all_alerts_none_actions_role]
[00:03:48]           └-: Alerts
[00:03:48]             └-> "before all" hook
[00:24:29]             └-: update
[00:24:29]               └-> "before all" hook
[00:25:01]               └-: superuser at space1
[00:25:01]                 └-> "before all" hook
[00:25:01]                 └-> should handle update alert request appropriately
[00:25:01]                   └-> "before each" hook: global before each
[00:25:02]                   │ proc [kibana]   log   [09:11:35.094] [info][eventLog][plugins] event logged: {"event":{"provider":"alerting","action":"execute","start":"2020-10-04T09:11:35.093Z","end":"2020-10-04T09:11:35.093Z","duration":0,"outcome":"success"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"847de62f-8d71-4666-b372-0a1858a8e449","namespace":"space2"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d"},"message":"alert executed: test.noop:847de62f-8d71-4666-b372-0a1858a8e449: 'abc'","@timestamp":"2020-10-04T09:11:35.093Z","ecs":{"version":"1.5.0"}}
[00:25:04]                   │ proc [kibana]   log   [09:11:37.076] [info][eventLog][plugins] event logged: {"event":{"provider":"alerting","action":"execute","start":"2020-10-04T09:11:37.075Z","end":"2020-10-04T09:11:37.075Z","duration":0,"outcome":"success"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"5e8968fe-f01d-4135-a0af-84271e2e8f03","namespace":"space1"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d"},"message":"alert executed: test.noop:5e8968fe-f01d-4135-a0af-84271e2e8f03: 'bcd'","@timestamp":"2020-10-04T09:11:37.075Z","ecs":{"version":"1.5.0"}}
[00:25:05]                   └- ✓ pass  (4.4s) "alerting api integration security and spaces enabled Alerts update superuser at space1 should handle update alert request appropriately"
[00:25:05]                 └-> should handle update alert request appropriately when consumer is the same as producer
[00:25:05]                   └-> "before each" hook: global before each
[00:25:08]                   │ proc [kibana]   log   [09:11:41.096] [info][eventLog][plugins] event logged: {"event":{"provider":"alerting","action":"execute","start":"2020-10-04T09:11:41.094Z","end":"2020-10-04T09:11:41.094Z","duration":0,"outcome":"success"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"b8535567-cd85-4fd4-9956-47ee197f9f84","namespace":"space1"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d"},"message":"alert executed: test.restricted-noop:b8535567-cd85-4fd4-9956-47ee197f9f84: 'bcd'","@timestamp":"2020-10-04T09:11:41.094Z","ecs":{"version":"1.5.0"}}
[00:25:09]                   └- ✓ pass  (4.0s) "alerting api integration security and spaces enabled Alerts update superuser at space1 should handle update alert request appropriately when consumer is the same as producer"
[00:25:09]                 └-> should handle update alert request appropriately when consumer is not the producer
[00:25:09]                   └-> "before each" hook: global before each
[00:25:11]                   │ proc [kibana]   log   [09:11:44.117] [info][eventLog][plugins] event logged: {"event":{"provider":"alerting","action":"execute","start":"2020-10-04T09:11:44.115Z","end":"2020-10-04T09:11:44.115Z","duration":0,"outcome":"success"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"4e20b82e-f223-47fe-b1e4-5c89d9401b92","namespace":"space1"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d"},"message":"alert executed: test.unrestricted-noop:4e20b82e-f223-47fe-b1e4-5c89d9401b92: 'abc'","@timestamp":"2020-10-04T09:11:44.115Z","ecs":{"version":"1.5.0"}}
[00:25:12]                   │ proc [kibana]   log   [09:11:44.934] [error][data][elasticsearch] [version_conflict_engine_exception]: [space1:alert:4e20b82e-f223-47fe-b1e4-5c89d9401b92]: version conflict, required seqNo [1945], primary term [1]. current document has seqNo [1946] and primary term [1]
[00:25:14]                   │ proc [kibana]   log   [09:11:46.152] [info][eventLog][plugins] event logged: {"event":{"provider":"alerting","action":"execute","start":"2020-10-04T09:11:46.150Z","end":"2020-10-04T09:11:46.150Z","duration":0,"outcome":"success"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"4e20b82e-f223-47fe-b1e4-5c89d9401b92","namespace":"space1"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d"},"message":"alert executed: test.unrestricted-noop:4e20b82e-f223-47fe-b1e4-5c89d9401b92: 'bcd'","@timestamp":"2020-10-04T09:11:46.150Z","ecs":{"version":"1.5.0"}}
[00:25:14]                   └- ✓ pass  (5.0s) "alerting api integration security and spaces enabled Alerts update superuser at space1 should handle update alert request appropriately when consumer is not the producer"
[00:25:14]                 └-> should handle update alert request appropriately when consumer is "alerts"
[00:25:14]                   └-> "before each" hook: global before each
[00:25:17]                   │ proc [kibana]   log   [09:11:50.109] [error][alerting][alerts][plugins][plugins] Alert update failed to run its underlying task. TaskManager runNow failed with Error: Failed to run task "a1a2caa0-0621-11eb-a028-d92c5299e3fd" as it is currently running
[00:25:17]                   │ proc [kibana]   log   [09:11:50.121] [info][eventLog][plugins] event logged: {"event":{"provider":"alerting","action":"execute","start":"2020-10-04T09:11:50.120Z","end":"2020-10-04T09:11:50.120Z","duration":0,"outcome":"success"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"5e8968fe-f01d-4135-a0af-84271e2e8f03","namespace":"space1"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d"},"message":"alert executed: test.noop:5e8968fe-f01d-4135-a0af-84271e2e8f03: 'bcd'","@timestamp":"2020-10-04T09:11:50.120Z","ecs":{"version":"1.5.0"}}
[00:25:18]                   │ proc [kibana]   log   [09:11:50.141] [info][eventLog][plugins] event logged: {"event":{"provider":"alerting","action":"execute","start":"2020-10-04T09:11:50.139Z","end":"2020-10-04T09:11:50.139Z","duration":0,"outcome":"success"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"d5264402-e45c-47f9-ae0c-6672f2bec5b5","namespace":"space1"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d"},"message":"alert executed: test.restricted-noop:d5264402-e45c-47f9-ae0c-6672f2bec5b5: 'bcd'","@timestamp":"2020-10-04T09:11:50.139Z","ecs":{"version":"1.5.0"}}
[00:25:18]                   └- ✓ pass  (4.0s) "alerting api integration security and spaces enabled Alerts update superuser at space1 should handle update alert request appropriately when consumer is "alerts""
[00:25:18]                 └-> should still be able to update when AAD is broken
[00:25:18]                   └-> "before each" hook: global before each
[00:25:20]                   │ proc [kibana]   log   [09:11:53.119] [info][eventLog][plugins] event logged: {"event":{"provider":"alerting","action":"execute","start":"2020-10-04T09:11:53.117Z","end":"2020-10-04T09:11:53.117Z","duration":0,"outcome":"success"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"7a19e88f-aaf7-48f1-9978-c6758301ea6e","namespace":"space1"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d"},"message":"alert executed: test.noop:7a19e88f-aaf7-48f1-9978-c6758301ea6e: 'abc'","@timestamp":"2020-10-04T09:11:53.117Z","ecs":{"version":"1.5.0"}}
[00:25:20]                   │ proc [kibana]   log   [09:11:53.122] [error][data][elasticsearch] [version_conflict_engine_exception]: [space1:alert:7a19e88f-aaf7-48f1-9978-c6758301ea6e]: version conflict, required seqNo [1955], primary term [1]. current document has seqNo [1956] and primary term [1]
[00:25:20]                   │ proc [kibana]   log   [09:11:53.123] [error][http] { ResponseError: [space1:alert:7a19e88f-aaf7-48f1-9978-c6758301ea6e]: version conflict, required seqNo [1955], primary term [1]. current document has seqNo [1956] and primary term [1]: version_conflict_engine_exception
[00:25:20]                   │ proc [kibana]     at IncomingMessage.response.on (/dev/shm/workspace/parallel/14/kibana/build/kibana-build-xpack/node_modules/@elastic/elasticsearch/lib/Transport.js:257:25)
[00:25:20]                   │ proc [kibana]     at IncomingMessage.emit (events.js:203:15)
[00:25:20]                   │ proc [kibana]     at endReadableNT (_stream_readable.js:1145:12)
[00:25:20]                   │ proc [kibana]     at process._tickCallback (internal/process/next_tick.js:63:19)
[00:25:20]                   │ proc [kibana]   name: 'ResponseError',
[00:25:20]                   │ proc [kibana]   meta:
[00:25:20]                   │ proc [kibana]    { body: { error: [Object], status: 409 },
[00:25:20]                   │ proc [kibana]      statusCode: 409,
[00:25:20]                   │ proc [kibana]      headers:
[00:25:20]                   │ proc [kibana]       { 'content-type': 'application/json; charset=UTF-8',
[00:25:20]                   │ proc [kibana]         'content-length': '623' },
[00:25:20]                   │ proc [kibana]      meta:
[00:25:21]                   │ proc [kibana]       { context: null,
[00:25:21]                   │ proc [kibana]         request: [Object],
[00:25:21]                   │ proc [kibana]         name: 'elasticsearch-js',
[00:25:21]                   │ proc [kibana]         connection: [Object],
[00:25:21]                   │ proc [kibana]         attempts: 0,
[00:25:21]                   │ proc [kibana]         aborted: false } },
[00:25:21]                   │ proc [kibana]   isBoom: true,
[00:25:21]                   │ proc [kibana]   isServer: false,
[00:25:21]                   │ proc [kibana]   data: null,
[00:25:21]                   │ proc [kibana]   output:
[00:25:21]                   │ proc [kibana]    { statusCode: 409,
[00:25:21]                   │ proc [kibana]      payload:
[00:25:21]                   │ proc [kibana]       { message:
[00:25:21]                   │ proc [kibana]          '[space1:alert:7a19e88f-aaf7-48f1-9978-c6758301ea6e]: version conflict, required seqNo [1955], primary term [1]. current document has seqNo [1956] and primary term [1]: version_conflict_engine_exception',
[00:25:21]                   │ proc [kibana]         statusCode: 409,
[00:25:21]                   │ proc [kibana]         error: 'Conflict' },
[00:25:21]                   │ proc [kibana]      headers: {} },
[00:25:21]                   │ proc [kibana]   reformat: [Function],
[00:25:21]                   │ proc [kibana]   [Symbol(SavedObjectsClientErrorCode)]: 'SavedObjectsClient/conflict' }
[00:25:21]                   └- ✖ fail: alerting api integration security and spaces enabled Alerts update superuser at space1 should still be able to update when AAD is broken
[00:25:21]                   │      Error: expected 200 "OK", got 500 "Internal Server Error"
[00:25:21]                   │       at Test._assertStatus (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:268:12)
[00:25:21]                   │       at Test._assertFunction (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:283:11)
[00:25:21]                   │       at Test.assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:173:18)
[00:25:21]                   │       at assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:131:12)
[00:25:21]                   │       at /dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:128:5
[00:25:21]                   │       at Test.Request.callback (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/index.js:718:3)
[00:25:21]                   │       at parser (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/index.js:906:18)
[00:25:21]                   │       at IncomingMessage.res.on (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/parsers/json.js:19:7)
[00:25:21]                   │       at endReadableNT (_stream_readable.js:1145:12)
[00:25:21]                   │       at process._tickCallback (internal/process/next_tick.js:63:19)
[00:25:21]                   │ 
[00:25:21]                   │ 

Stack Trace

Error: expected 200 "OK", got 500 "Internal Server Error"
    at Test._assertStatus (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:268:12)
    at Test._assertFunction (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:283:11)
    at Test.assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:173:18)
    at assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:131:12)
    at /dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:128:5
    at Test.Request.callback (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/index.js:718:3)
    at parser (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/index.js:906:18)
    at IncomingMessage.res.on (/dev/shm/workspace/kibana/node_modules/superagent/lib/node/parsers/json.js:19:7)
    at endReadableNT (_stream_readable.js:1145:12)
    at process._tickCallback (internal/process/next_tick.js:63:19)

Metrics [docs]

async chunks size

id before after diff
enterpriseSearch 428.6KB 428.6KB +19.0B

distributable file count

id before after diff
default 44116 47082 +2966

page load bundle size

id before after diff
upgradeAssistant 64.7KB 64.7KB +19.0B

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

@spalger spalger merged commit 9e1c44f into elastic:master Oct 5, 2020
@spalger spalger deleted the fix/core-js-production-dep branch October 5, 2020 04:33
spalger pushed a commit to spalger/kibana that referenced this pull request Oct 5, 2020
Co-authored-by: spalger <spalger@users.noreply.github.com>
(cherry picked from commit 9e1c44f)
spalger added a commit that referenced this pull request Oct 5, 2020
… node (#79052) (#79395) (#79408)

* [kbn/optimizer] implement more efficient auto transpilation for node (#79052)

Co-authored-by: spalger <spalger@users.noreply.github.com>
# Conflicts:
#	packages/kbn-optimizer/package.json
#	src/dev/build/tasks/create_empty_dirs_and_files_task.ts
#	src/setup_node_env/babel_register/register.js
#	yarn.lock

* fix eslint violation

* add core-js production dependency (#79395)

Co-authored-by: spalger <spalger@users.noreply.github.com>
(cherry picked from commit 9e1c44f)

Co-authored-by: spalger <spalger@users.noreply.github.com>
gmmorris added a commit to gmmorris/kibana that referenced this pull request Oct 5, 2020
* master: (128 commits)
  add core-js production dependency (elastic#79395)
  Add support for sharing saved objects to all spaces (elastic#76132)
  [Alerting UI] Display a banner to users when some alerts have failures, added alert statuses column and filters (elastic#79038)
  load js-yaml lazily (elastic#79092)
  skip flaky suite (elastic#77278)
  Fix agentPolicyUpdateEventHandler() to use app context soClient for creation of actions (elastic#79341)
  [Security Solution] Untitled Timeline created when first action is to add note (elastic#78988)
  [Security Solutions][Detection Engine] Updates the edit rules page to:wq! only have what is selected for editing (elastic#79233)
  Cleanup yarn.lock from duplicates (elastic#66617)
  [kbn/optimizer] implement more efficient auto transpilation for node (elastic#79052)
  [Ingest Manager] Rename Fleet setup and requirement, Fleet => Central… (elastic#79291)
  [core/server/plugins] don't run discovery in dev server parent process (take 2) (elastic#79358)
  [babel/register] remove from build (take 2) (elastic#79379)
  [Security Solution] Changes rules table tag display (elastic#77102)
  define integrationTestRoot in config file and use to define screensho… (elastic#79247)
  Revert "[babel/register] remove from build (elastic#79176)"
  skip flaky suite (elastic#75241)
  [Uptime] Synthetics UI (elastic#77960)
  [Security Solution] [Detections] Only display actions options if user has "read" privileges (elastic#78812)
  [babel/register] remove from build (elastic#79176)
  ...
gmmorris added a commit to gmmorris/kibana that referenced this pull request Oct 5, 2020
* master: (288 commits)
  add core-js production dependency (elastic#79395)
  Add support for sharing saved objects to all spaces (elastic#76132)
  [Alerting UI] Display a banner to users when some alerts have failures, added alert statuses column and filters (elastic#79038)
  load js-yaml lazily (elastic#79092)
  skip flaky suite (elastic#77278)
  Fix agentPolicyUpdateEventHandler() to use app context soClient for creation of actions (elastic#79341)
  [Security Solution] Untitled Timeline created when first action is to add note (elastic#78988)
  [Security Solutions][Detection Engine] Updates the edit rules page to only have what is selected for editing (elastic#79233)
  Cleanup yarn.lock from duplicates (elastic#66617)
  [kbn/optimizer] implement more efficient auto transpilation for node (elastic#79052)
  [Ingest Manager] Rename Fleet setup and requirement, Fleet => Central… (elastic#79291)
  [core/server/plugins] don't run discovery in dev server parent process (take 2) (elastic#79358)
  [babel/register] remove from build (take 2) (elastic#79379)
  [Security Solution] Changes rules table tag display (elastic#77102)
  define integrationTestRoot in config file and use to define screensho… (elastic#79247)
  Revert "[babel/register] remove from build (elastic#79176)"
  skip flaky suite (elastic#75241)
  [Uptime] Synthetics UI (elastic#77960)
  [Security Solution] [Detections] Only display actions options if user has "read" privileges (elastic#78812)
  [babel/register] remove from build (elastic#79176)
  ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
release_note:skip Skip the PR/issue when compiling release notes Team:Operations Team label for Operations Team v7.10.0 v8.0.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Kibana fails to start on latest master CJS loader error
4 participants