Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[master] [Reporting] Switch Mac Chromium to the internally-hosted custom build (#100165) #100232

Merged
merged 1 commit into from
May 18, 2021

Conversation

tsullivan
Copy link
Member

Backports the following commits to master:

…elastic#100165)

* switch mac chromium download location to kibana team gcs

* oops, fix the path to the binary

Co-authored-by: Kibana Machine <[email protected]>
@tsullivan tsullivan enabled auto-merge (squash) May 17, 2021 17:29
@kibanamachine
Copy link
Contributor

💛 Build succeeded, but was flaky


Test Failures

Kibana Pipeline / general / task-queue-process-12 / X-Pack Endpoint Functional Tests.x-pack/test/security_solution_endpoint/apps/endpoint/policy_details·ts.endpoint When on the Endpoint Policy Details Page when on Ingest Policy Edit Package Policy page should include updated endpoint data when saved

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has not failed recently on tracked branches

[00:00:00]       │
[00:00:00]         └-: endpoint
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [.kibana_8.0.0_001/dbynHENHSmSXpyrVr6s75Q] update_mapping [_doc]
[00:00:00]             │ proc [kibana]   log   [18:03:35.355] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:03:35.358] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:03:35.359] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:03:35.359] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53368, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53370, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53366, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53372, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:00]             │ proc [kibana]   log   [18:03:35.412] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:03:35.413] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:03:35.415] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:03:35.416] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53382, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53390, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53392, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53384, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ proc [kibana]   log   [18:03:35.420] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:03:35.421] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:03:35.422] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:03:35.423] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53402, url.original: /package/endpoint/0.18.0
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53406, url.original: /package/system/0.12.0
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53404, url.original: /package/elastic_agent/0.0.6
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53408, url.original: /package/fleet_server/0.2.1
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53416, url.original: /package/system/0.12.0/
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53418, url.original: /package/endpoint/0.18.0/
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53422, url.original: /package/elastic_agent/0.0.6/
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53424, url.original: /package/fleet_server/0.2.1/
[00:00:00]             │ proc [kibana]   log   [18:03:35.441] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:03:35.445] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53428, url.original: /epr/elastic_agent/elastic_agent-0.0.6.zip
[00:00:00]             │ proc [kibana]   log   [18:03:35.448] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53432, url.original: /epr/fleet_server/fleet_server-0.2.1.zip
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53436, url.original: /epr/endpoint/endpoint-0.18.0.zip
[00:00:00]             │ proc [kibana]   log   [18:03:35.467] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/05/17 18:03:35 source.ip: 172.17.0.1:53440, url.original: /epr/system/system-0.12.0.zip
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [.kibana_8.0.0_001/dbynHENHSmSXpyrVr6s75Q] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [.kibana_8.0.0_001/dbynHENHSmSXpyrVr6s75Q] update_mapping [_doc]
[00:00:02]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index lifecycle policy [.fleet-actions-results]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [.kibana_8.0.0_001/dbynHENHSmSXpyrVr6s75Q] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [.fleet-actions-results] for index patterns [.fleet-actions-results]
[00:00:03]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index lifecycle policy [logs-endpoint.collection-diagnostic]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding component template [metrics-elastic_agent.elastic_agent-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-elastic_agent.elastic_agent] for index patterns [metrics-elastic_agent.elastic_agent-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [logs-system.security] for index patterns [logs-system.security-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [logs-system.application] for index patterns [logs-system.application-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [logs-system.system] for index patterns [logs-system.system-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding component template [.logs-endpoint.diagnostic.collection-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding component template [logs-endpoint.events.library-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding component template [logs-endpoint.alerts-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding component template [logs-endpoint.events.network-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding component template [logs-endpoint.events.security-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding component template [metrics-endpoint.policy-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding component template [logs-endpoint.events.registry-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding component template [logs-endpoint.events.process-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding component template [metrics-endpoint.metrics-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding component template [logs-endpoint.events.file-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding component template [metrics-endpoint.metadata-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [.logs-endpoint.diagnostic.collection] for index patterns [.logs-endpoint.diagnostic.collection-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [.transform-internal-007] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] updating number_of_replicas to [0] for indices [.transform-internal-007]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-internal-007][0]]])." previous.health="YELLOW" reason="shards started [[.transform-internal-007][0]]"
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]])." previous.health="YELLOW" reason="shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]"
[00:00:09]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [endpoint.metadata_current-default-0.18.0] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:09]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [endpoint.metadata_current-default-0.18.0] successfully completed and scheduled task in node operation
[00:00:11]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [.kibana_8.0.0_001/dbynHENHSmSXpyrVr6s75Q] update_mapping [_doc]
[00:00:12]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [.kibana_8.0.0_001/dbynHENHSmSXpyrVr6s75Q] update_mapping [_doc]
[00:00:13]             │ proc [kibana]   log   [18:03:48.581] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/05/17 18:03:48 source.ip: 172.17.0.1:53500, url.original: /search?package=system&internal=true&experimental=true
[00:00:13]             │ proc [kibana]   log   [18:03:48.615] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/05/17 18:03:48 source.ip: 172.17.0.1:53504, url.original: /search?package=system&internal=true&experimental=true
[00:00:13]             │ proc [kibana]   log   [18:03:48.628] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/05/17 18:03:48 source.ip: 172.17.0.1:53508, url.original: /package/system/0.12.0
[00:00:13]             │ info [docker:registry] 2021/05/17 18:03:48 source.ip: 172.17.0.1:53512, url.original: /package/system/0.12.0/
[00:00:13]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [.kibana_8.0.0_001/dbynHENHSmSXpyrVr6s75Q] update_mapping [_doc]
[00:00:15]             │ proc [kibana]   log   [18:03:50.637] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/05/17 18:03:50 source.ip: 172.17.0.1:53520, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:15]             │ proc [kibana]   log   [18:03:50.658] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/05/17 18:03:50 source.ip: 172.17.0.1:53524, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:15]             │ proc [kibana]   log   [18:03:50.666] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/05/17 18:03:50 source.ip: 172.17.0.1:53528, url.original: /package/fleet_server/0.2.1
[00:00:15]             │ info [docker:registry] 2021/05/17 18:03:50 source.ip: 172.17.0.1:53532, url.original: /package/fleet_server/0.2.1/
[00:00:18]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [.fleet-enrollment-api-keys-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] updating number_of_replicas to [0] for indices [.fleet-enrollment-api-keys-7]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-enrollment-api-keys-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-enrollment-api-keys-7][0]]"
[00:00:19]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] [.fleet-policies-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:19]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] updating number_of_replicas to [0] for indices [.fleet-policies-7]
[00:00:19]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-1621274180506059851] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-policies-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-policies-7][0]]"
[00:00:51]           └-: When on the Endpoint Policy Details Page
[00:00:51]             └-> "before all" hook in "When on the Endpoint Policy Details Page"
[00:03:04]             └-: when on Ingest Policy Edit Package Policy page
[00:03:04]               └-> "before all" hook for "should show the endpoint policy form"
[00:03:04]               └-> should show the endpoint policy form
[00:03:04]                 └-> "before each" hook: global before each for "should show the endpoint policy form"
[00:03:04]                 └-> "before each" hook for "should show the endpoint policy form"
[00:03:09]                   │ info Using cached retrieval of endpoint package
[00:03:09]                   │ proc [kibana]   log   [18:06:44.361] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:09]                   │ proc [kibana]   log   [18:06:44.362] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:09]                   │ info [docker:registry] 2021/05/17 18:06:44 source.ip: 172.17.0.1:55298, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:09]                   │ info [docker:registry] 2021/05/17 18:06:44 source.ip: 172.17.0.1:55300, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:09]                   │ proc [kibana]   log   [18:06:44.378] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:09]                   │ info [docker:registry] 2021/05/17 18:06:44 source.ip: 172.17.0.1:55304, url.original: /package/endpoint/0.18.0
[00:03:09]                   │ info [docker:registry] 2021/05/17 18:06:44 source.ip: 172.17.0.1:55308, url.original: /package/endpoint/0.18.0/
[00:03:11]                   │ debg navigating to fleet url: http://localhost:61121/app/fleet#/policies/a0cfc810-b73a-11eb-a538-19563ba56a9c/edit-integration/2d0e483b-7ef1-408f-8fe7-ab2bf0959112
[00:03:11]                   │ debg navigate to: http://localhost:61121/app/fleet#/policies/a0cfc810-b73a-11eb-a538-19563ba56a9c/edit-integration/2d0e483b-7ef1-408f-8fe7-ab2bf0959112
[00:03:11]                   │ debg browser[INFO] http://localhost:61121/app/fleet?_t=1621274805998#/policies/a0cfc810-b73a-11eb-a538-19563ba56a9c/edit-integration/2d0e483b-7ef1-408f-8fe7-ab2bf0959112 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:11]                   │
[00:03:11]                   │ debg browser[INFO] http://localhost:61121/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:11]                   │ debg ... sleep(700) start
[00:03:11]                   │ debg ... sleep(700) end
[00:03:11]                   │ debg returned from get, calling refresh
[00:03:12]                   │ERROR browser[SEVERE] http://localhost:61121/42933/bundles/core/core.entry.js 12:150934 TypeError: Failed to fetch
[00:03:12]                   │          at fetch_Fetch.fetchResponse (http://localhost:61121/42933/bundles/core/core.entry.js:6:26193)
[00:03:12]                   │          at async http://localhost:61121/42933/bundles/core/core.entry.js:6:24090
[00:03:12]                   │          at async http://localhost:61121/42933/bundles/core/core.entry.js:6:23996
[00:03:12]                   │ debg browser[INFO] http://localhost:61121/app/fleet?_t=1621274805998#/policies/a0cfc810-b73a-11eb-a538-19563ba56a9c/edit-integration/2d0e483b-7ef1-408f-8fe7-ab2bf0959112 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:12]                   │
[00:03:12]                   │ debg browser[INFO] http://localhost:61121/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:12]                   │ debg currentUrl = http://localhost:61121/app/fleet#/policies/a0cfc810-b73a-11eb-a538-19563ba56a9c/edit-integration/2d0e483b-7ef1-408f-8fe7-ab2bf0959112
[00:03:12]                   │          appUrl = http://localhost:61121/app/fleet#/policies/a0cfc810-b73a-11eb-a538-19563ba56a9c/edit-integration/2d0e483b-7ef1-408f-8fe7-ab2bf0959112
[00:03:12]                   │ debg TestSubjects.find(kibanaChrome)
[00:03:12]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:12]                   │ proc [kibana]   log   [18:06:47.765] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:12]                   │ info [docker:registry] 2021/05/17 18:06:47 source.ip: 172.17.0.1:55322, url.original: /search?experimental=true
[00:03:12]                   │ debg ... sleep(501) start
[00:03:13]                   │ proc [kibana]   log   [18:06:47.946] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:13]                   │ proc [kibana]   log   [18:06:47.947] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:13]                   │ proc [kibana]   log   [18:06:47.947] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:13]                   │ proc [kibana]   log   [18:06:47.948] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:13]                   │ info [docker:registry] 2021/05/17 18:06:47 source.ip: 172.17.0.1:55332, url.original: /search?package=system&internal=true&experimental=true
[00:03:13]                   │ info [docker:registry] 2021/05/17 18:06:47 source.ip: 172.17.0.1:55340, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:03:13]                   │ info [docker:registry] 2021/05/17 18:06:47 source.ip: 172.17.0.1:55338, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:03:13]                   │ info [docker:registry] 2021/05/17 18:06:47 source.ip: 172.17.0.1:55330, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:13]                   │ proc [kibana]   log   [18:06:48.204] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:13]                   │ info [docker:registry] 2021/05/17 18:06:48 source.ip: 172.17.0.1:55346, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:13]                   │ debg ... sleep(501) end
[00:03:13]                   │ proc [kibana]   log   [18:06:48.376] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:13]                   │ info [docker:registry] 2021/05/17 18:06:48 source.ip: 172.17.0.1:55350, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:13]                   │ debg in navigateTo url = http://localhost:61121/app/fleet#/policies/a0cfc810-b73a-11eb-a538-19563ba56a9c/edit-integration/2d0e483b-7ef1-408f-8fe7-ab2bf0959112
[00:03:13]                   │ debg TestSubjects.exists(editPackagePolicy_header)
[00:03:13]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="editPackagePolicy_header"]') with timeout=120000
[00:03:13]                 │ debg TestSubjects.exists(endpointIntegrationPolicyForm)
[00:03:13]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="endpointIntegrationPolicyForm"]') with timeout=120000
[00:03:13]                 └- ✓ pass  (59ms) "endpoint When on the Endpoint Policy Details Page when on Ingest Policy Edit Package Policy page should show the endpoint policy form"
[00:03:13]               └-> "after each" hook for "should show the endpoint policy form"
[00:03:13]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:13]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:17]               └-> should allow updates to policy items
[00:03:17]                 └-> "before each" hook: global before each for "should allow updates to policy items"
[00:03:17]                 └-> "before each" hook for "should allow updates to policy items"
[00:03:22]                   │ info Using cached retrieval of endpoint package
[00:03:22]                   │ proc [kibana]   log   [18:06:57.411] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:22]                   │ proc [kibana]   log   [18:06:57.412] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:22]                   │ info [docker:registry] 2021/05/17 18:06:57 source.ip: 172.17.0.1:55382, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:22]                   │ info [docker:registry] 2021/05/17 18:06:57 source.ip: 172.17.0.1:55380, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:22]                   │ proc [kibana]   log   [18:06:57.429] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:22]                   │ info [docker:registry] 2021/05/17 18:06:57 source.ip: 172.17.0.1:55386, url.original: /package/endpoint/0.18.0
[00:03:22]                   │ info [docker:registry] 2021/05/17 18:06:57 source.ip: 172.17.0.1:55390, url.original: /package/endpoint/0.18.0/
[00:03:24]                   │ debg navigating to fleet url: http://localhost:61121/app/fleet#/policies/a8807870-b73a-11eb-a538-19563ba56a9c/edit-integration/8c75336a-50fd-43c3-8c02-2cde72342e01
[00:03:24]                   │ debg navigate to: http://localhost:61121/app/fleet#/policies/a8807870-b73a-11eb-a538-19563ba56a9c/edit-integration/8c75336a-50fd-43c3-8c02-2cde72342e01
[00:03:24]                   │ debg browser[INFO] http://localhost:61121/app/fleet?_t=1621274819018#/policies/a8807870-b73a-11eb-a538-19563ba56a9c/edit-integration/8c75336a-50fd-43c3-8c02-2cde72342e01 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:24]                   │
[00:03:24]                   │ debg browser[INFO] http://localhost:61121/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:24]                   │ debg ... sleep(700) start
[00:03:24]                   │ debg ... sleep(700) end
[00:03:24]                   │ debg returned from get, calling refresh
[00:03:25]                   │ debg browser[INFO] http://localhost:61121/app/fleet?_t=1621274819018#/policies/a8807870-b73a-11eb-a538-19563ba56a9c/edit-integration/8c75336a-50fd-43c3-8c02-2cde72342e01 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:25]                   │
[00:03:25]                   │ debg browser[INFO] http://localhost:61121/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:25]                   │ debg currentUrl = http://localhost:61121/app/fleet#/policies/a8807870-b73a-11eb-a538-19563ba56a9c/edit-integration/8c75336a-50fd-43c3-8c02-2cde72342e01
[00:03:25]                   │          appUrl = http://localhost:61121/app/fleet#/policies/a8807870-b73a-11eb-a538-19563ba56a9c/edit-integration/8c75336a-50fd-43c3-8c02-2cde72342e01
[00:03:25]                   │ debg TestSubjects.find(kibanaChrome)
[00:03:25]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:26]                   │ proc [kibana]   log   [18:07:01.162] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:26]                   │ info [docker:registry] 2021/05/17 18:07:01 source.ip: 172.17.0.1:55426, url.original: /search?experimental=true
[00:03:26]                   │ debg ... sleep(501) start
[00:03:26]                   │ proc [kibana]   log   [18:07:01.299] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:26]                   │ proc [kibana]   log   [18:07:01.300] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:26]                   │ proc [kibana]   log   [18:07:01.301] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:26]                   │ proc [kibana]   log   [18:07:01.301] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:26]                   │ info [docker:registry] 2021/05/17 18:07:01 source.ip: 172.17.0.1:55434, url.original: /search?package=system&internal=true&experimental=true
[00:03:26]                   │ info [docker:registry] 2021/05/17 18:07:01 source.ip: 172.17.0.1:55444, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:03:26]                   │ info [docker:registry] 2021/05/17 18:07:01 source.ip: 172.17.0.1:55442, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:03:26]                   │ info [docker:registry] 2021/05/17 18:07:01 source.ip: 172.17.0.1:55436, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:26]                   │ proc [kibana]   log   [18:07:01.521] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:26]                   │ info [docker:registry] 2021/05/17 18:07:01 source.ip: 172.17.0.1:55448, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:26]                   │ debg ... sleep(501) end
[00:03:26]                   │ debg in navigateTo url = http://localhost:61121/app/fleet#/policies/a8807870-b73a-11eb-a538-19563ba56a9c/edit-integration/8c75336a-50fd-43c3-8c02-2cde72342e01
[00:03:26]                   │ debg TestSubjects.exists(editPackagePolicy_header)
[00:03:26]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="editPackagePolicy_header"]') with timeout=120000
[00:03:26]                 │ debg TestSubjects.find(policyWindowsEvent_dns)
[00:03:26]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_dns"]') with timeout=10000
[00:03:26]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:26]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:26]                 │ proc [kibana]   log   [18:07:01.792] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:26]                 │ info [docker:registry] 2021/05/17 18:07:01 source.ip: 172.17.0.1:55452, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:26]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_dns']/../label') with timeout=10000
[00:03:26]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:26]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:26]                 └- ✓ pass  (137ms) "endpoint When on the Endpoint Policy Details Page when on Ingest Policy Edit Package Policy page should allow updates to policy items"
[00:03:26]               └-> "after each" hook for "should allow updates to policy items"
[00:03:31]               └-> should preserve updates done from the Fleet form
[00:03:31]                 └-> "before each" hook: global before each for "should preserve updates done from the Fleet form"
[00:03:31]                 └-> "before each" hook for "should preserve updates done from the Fleet form"
[00:03:35]                   │ info Using cached retrieval of endpoint package
[00:03:35]                   │ proc [kibana]   log   [18:07:10.431] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:35]                   │ proc [kibana]   log   [18:07:10.431] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:35]                   │ info [docker:registry] 2021/05/17 18:07:10 source.ip: 172.17.0.1:55484, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:35]                   │ info [docker:registry] 2021/05/17 18:07:10 source.ip: 172.17.0.1:55482, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:35]                   │ proc [kibana]   log   [18:07:10.449] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:35]                   │ info [docker:registry] 2021/05/17 18:07:10 source.ip: 172.17.0.1:55488, url.original: /package/endpoint/0.18.0
[00:03:35]                   │ info [docker:registry] 2021/05/17 18:07:10 source.ip: 172.17.0.1:55492, url.original: /package/endpoint/0.18.0/
[00:03:37]                   │ debg navigating to fleet url: http://localhost:61121/app/fleet#/policies/b0dad650-b73a-11eb-a538-19563ba56a9c/edit-integration/7f2aa0eb-0ce2-4e26-a214-e0d2e0274b4e
[00:03:37]                   │ debg navigate to: http://localhost:61121/app/fleet#/policies/b0dad650-b73a-11eb-a538-19563ba56a9c/edit-integration/7f2aa0eb-0ce2-4e26-a214-e0d2e0274b4e
[00:03:37]                   │ debg browser[INFO] http://localhost:61121/app/fleet?_t=1621274832041#/policies/b0dad650-b73a-11eb-a538-19563ba56a9c/edit-integration/7f2aa0eb-0ce2-4e26-a214-e0d2e0274b4e 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:37]                   │
[00:03:37]                   │ debg browser[INFO] http://localhost:61121/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:37]                   │ debg ... sleep(700) start
[00:03:37]                   │ debg ... sleep(700) end
[00:03:37]                   │ debg returned from get, calling refresh
[00:03:38]                   │ERROR browser[SEVERE] http://localhost:61121/42933/bundles/core/core.entry.js 12:150934 TypeError: Failed to fetch
[00:03:38]                   │          at fetch_Fetch.fetchResponse (http://localhost:61121/42933/bundles/core/core.entry.js:6:26193)
[00:03:38]                   │          at async http://localhost:61121/42933/bundles/core/core.entry.js:6:24090
[00:03:38]                   │          at async http://localhost:61121/42933/bundles/core/core.entry.js:6:23996
[00:03:38]                   │ debg browser[INFO] http://localhost:61121/app/fleet?_t=1621274832041#/policies/b0dad650-b73a-11eb-a538-19563ba56a9c/edit-integration/7f2aa0eb-0ce2-4e26-a214-e0d2e0274b4e 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:38]                   │
[00:03:38]                   │ debg browser[INFO] http://localhost:61121/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:38]                   │ debg currentUrl = http://localhost:61121/app/fleet#/policies/b0dad650-b73a-11eb-a538-19563ba56a9c/edit-integration/7f2aa0eb-0ce2-4e26-a214-e0d2e0274b4e
[00:03:38]                   │          appUrl = http://localhost:61121/app/fleet#/policies/b0dad650-b73a-11eb-a538-19563ba56a9c/edit-integration/7f2aa0eb-0ce2-4e26-a214-e0d2e0274b4e
[00:03:38]                   │ debg TestSubjects.find(kibanaChrome)
[00:03:38]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:38]                   │ debg ... sleep(501) start
[00:03:38]                   │ proc [kibana]   log   [18:07:13.666] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:38]                   │ info [docker:registry] 2021/05/17 18:07:13 source.ip: 172.17.0.1:55506, url.original: /search?experimental=true
[00:03:38]                   │ proc [kibana]   log   [18:07:13.796] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:38]                   │ proc [kibana]   log   [18:07:13.797] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:38]                   │ proc [kibana]   log   [18:07:13.797] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:38]                   │ proc [kibana]   log   [18:07:13.798] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:38]                   │ info [docker:registry] 2021/05/17 18:07:13 source.ip: 172.17.0.1:55520, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:03:38]                   │ info [docker:registry] 2021/05/17 18:07:13 source.ip: 172.17.0.1:55518, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:38]                   │ info [docker:registry] 2021/05/17 18:07:13 source.ip: 172.17.0.1:55522, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:03:38]                   │ info [docker:registry] 2021/05/17 18:07:13 source.ip: 172.17.0.1:55516, url.original: /search?package=system&internal=true&experimental=true
[00:03:39]                   │ proc [kibana]   log   [18:07:14.033] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:39]                   │ info [docker:registry] 2021/05/17 18:07:14 source.ip: 172.17.0.1:55526, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:39]                   │ debg ... sleep(501) end
[00:03:39]                   │ debg in navigateTo url = http://localhost:61121/app/fleet#/policies/b0dad650-b73a-11eb-a538-19563ba56a9c/edit-integration/7f2aa0eb-0ce2-4e26-a214-e0d2e0274b4e
[00:03:39]                   │ debg TestSubjects.exists(editPackagePolicy_header)
[00:03:39]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="editPackagePolicy_header"]') with timeout=120000
[00:03:39]                   │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                   │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg TestSubjects.find(packagePolicyDescriptionInput)
[00:03:39]                 │ debg Find.findByCssSelector('[data-test-subj="packagePolicyDescriptionInput"]') with timeout=10000
[00:03:39]                 │ debg TestSubjects.setValue(packagePolicyDescriptionInput, protect everything)
[00:03:39]                 │ debg TestSubjects.click(packagePolicyDescriptionInput)
[00:03:39]                 │ debg Find.clickByCssSelector('[data-test-subj="packagePolicyDescriptionInput"]') with timeout=10000
[00:03:39]                 │ debg Find.findByCssSelector('[data-test-subj="packagePolicyDescriptionInput"]') with timeout=10000
[00:03:39]                 │ proc [kibana]   log   [18:07:14.261] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:39]                 │ info [docker:registry] 2021/05/17 18:07:14 source.ip: 172.17.0.1:55532, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:39]                 │ debg TestSubjects.find(policyWindowsEvent_dns)
[00:03:39]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_dns"]') with timeout=10000
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_dns']/../label') with timeout=10000
[00:03:39]                 │ debg TestSubjects.getAttribute(packagePolicyDescriptionInput, value, tryTimeout=120000, findTimeout=10000)
[00:03:39]                 │ debg TestSubjects.find(packagePolicyDescriptionInput)
[00:03:39]                 │ debg Find.findByCssSelector('[data-test-subj="packagePolicyDescriptionInput"]') with timeout=10000
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:39]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:39]                 └- ✓ pass  (392ms) "endpoint When on the Endpoint Policy Details Page when on Ingest Policy Edit Package Policy page should preserve updates done from the Fleet form"
[00:03:39]               └-> "after each" hook for "should preserve updates done from the Fleet form"
[00:03:43]               └-> should include updated endpoint data when saved
[00:03:43]                 └-> "before each" hook: global before each for "should include updated endpoint data when saved"
[00:03:43]                 └-> "before each" hook for "should include updated endpoint data when saved"
[00:03:47]                   │ info Using cached retrieval of endpoint package
[00:03:47]                   │ proc [kibana]   log   [18:07:22.402] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:47]                   │ proc [kibana]   log   [18:07:22.403] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:47]                   │ info [docker:registry] 2021/05/17 18:07:22 source.ip: 172.17.0.1:55562, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:47]                   │ info [docker:registry] 2021/05/17 18:07:22 source.ip: 172.17.0.1:55560, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:47]                   │ proc [kibana]   log   [18:07:22.421] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:47]                   │ info [docker:registry] 2021/05/17 18:07:22 source.ip: 172.17.0.1:55568, url.original: /package/endpoint/0.18.0
[00:03:47]                   │ info [docker:registry] 2021/05/17 18:07:22 source.ip: 172.17.0.1:55572, url.original: /package/endpoint/0.18.0/
[00:03:49]                   │ debg navigating to fleet url: http://localhost:61121/app/fleet#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b
[00:03:49]                   │ debg navigate to: http://localhost:61121/app/fleet#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b
[00:03:49]                   │ debg browser[INFO] http://localhost:61121/app/fleet?_t=1621274844060#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:49]                   │
[00:03:49]                   │ debg browser[INFO] http://localhost:61121/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:49]                   │ debg ... sleep(700) start
[00:03:49]                   │ debg ... sleep(700) end
[00:03:49]                   │ debg returned from get, calling refresh
[00:03:50]                   │ debg browser[INFO] http://localhost:61121/app/fleet?_t=1621274844060#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:50]                   │
[00:03:50]                   │ debg browser[INFO] http://localhost:61121/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:50]                   │ debg currentUrl = http://localhost:61121/app/fleet#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b
[00:03:50]                   │          appUrl = http://localhost:61121/app/fleet#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b
[00:03:50]                   │ debg TestSubjects.find(kibanaChrome)
[00:03:50]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:50]                   │ proc [kibana]   log   [18:07:25.700] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:50]                   │ debg ... sleep(501) start
[00:03:50]                   │ info [docker:registry] 2021/05/17 18:07:25 source.ip: 172.17.0.1:55582, url.original: /search?experimental=true
[00:03:50]                   │ proc [kibana]   log   [18:07:25.836] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:50]                   │ proc [kibana]   log   [18:07:25.837] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:50]                   │ proc [kibana]   log   [18:07:25.838] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:50]                   │ proc [kibana]   log   [18:07:25.838] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:50]                   │ info [docker:registry] 2021/05/17 18:07:25 source.ip: 172.17.0.1:55592, url.original: /search?package=system&internal=true&experimental=true
[00:03:50]                   │ info [docker:registry] 2021/05/17 18:07:25 source.ip: 172.17.0.1:55594, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:03:50]                   │ info [docker:registry] 2021/05/17 18:07:25 source.ip: 172.17.0.1:55596, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:50]                   │ info [docker:registry] 2021/05/17 18:07:25 source.ip: 172.17.0.1:55598, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:03:51]                   │ proc [kibana]   log   [18:07:26.058] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:51]                   │ info [docker:registry] 2021/05/17 18:07:26 source.ip: 172.17.0.1:55602, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:51]                   │ debg ... sleep(501) end
[00:03:51]                   │ debg in navigateTo url = http://localhost:61121/app/fleet#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b
[00:03:51]                   │ debg TestSubjects.exists(editPackagePolicy_header)
[00:03:51]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="editPackagePolicy_header"]') with timeout=120000
[00:03:51]                   │ proc [kibana]   log   [18:07:26.231] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:51]                   │ info [docker:registry] 2021/05/17 18:07:26 source.ip: 172.17.0.1:55608, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:51]                 │ debg TestSubjects.find(policyWindowsEvent_dns)
[00:03:51]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_dns"]') with timeout=10000
[00:03:51]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:51]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:51]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_dns']/../label') with timeout=10000
[00:03:51]                 │ debg TestSubjects.find(saveIntegration)
[00:03:51]                 │ debg Find.findByCssSelector('[data-test-subj="saveIntegration"]') with timeout=10000
[00:03:51]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:51]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:51]                 │ debg TestSubjects.exists(policyUpdateSuccessToast)
[00:03:51]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyUpdateSuccessToast"]') with timeout=120000
[00:03:51]                 │ proc [kibana]   log   [18:07:26.503] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:51]                 │ info [docker:registry] 2021/05/17 18:07:26 source.ip: 172.17.0.1:55612, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:51]                 │ proc [kibana]   log   [18:07:26.508] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:51]                 │ info [docker:registry] 2021/05/17 18:07:26 source.ip: 172.17.0.1:55616, url.original: /package/endpoint/0.18.0
[00:03:51]                 │ info [docker:registry] 2021/05/17 18:07:26 source.ip: 172.17.0.1:55620, url.original: /package/endpoint/0.18.0/
[00:03:53]                 │ proc [kibana]   log   [18:07:27.960] [info][plugins][securitySolution] Committed manifest 1.0.3
[00:03:53]                 │ debg navigating to fleet url: http://localhost:61121/app/fleet#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b
[00:03:53]                 │ debg navigate to: http://localhost:61121/app/fleet#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b
[00:03:53]                 │ debg browser[INFO] http://localhost:61121/app/fleet?_t=1621274848138#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:53]                 │
[00:03:53]                 │ debg browser[INFO] http://localhost:61121/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:53]                 │ debg ... sleep(700) start
[00:03:54]                 │ debg ... sleep(700) end
[00:03:54]                 │ debg returned from get, calling refresh
[00:03:54]                 │ERROR browser[SEVERE] http://localhost:61121/42933/bundles/core/core.entry.js 12:150934 TypeError: Failed to fetch
[00:03:54]                 │          at fetch_Fetch.fetchResponse (http://localhost:61121/42933/bundles/core/core.entry.js:6:26193)
[00:03:54]                 │          at async http://localhost:61121/42933/bundles/core/core.entry.js:6:24090
[00:03:54]                 │          at async http://localhost:61121/42933/bundles/core/core.entry.js:6:23996
[00:03:54]                 │ debg browser[INFO] http://localhost:61121/app/fleet?_t=1621274848138#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:54]                 │
[00:03:54]                 │ debg browser[INFO] http://localhost:61121/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:54]                 │ debg currentUrl = http://localhost:61121/app/fleet#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b
[00:03:54]                 │          appUrl = http://localhost:61121/app/fleet#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b
[00:03:54]                 │ debg TestSubjects.find(kibanaChrome)
[00:03:54]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:54]                 │ proc [kibana]   log   [18:07:29.812] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:54]                 │ debg ... sleep(501) start
[00:03:54]                 │ info [docker:registry] 2021/05/17 18:07:29 source.ip: 172.17.0.1:55634, url.original: /search?experimental=true
[00:03:55]                 │ proc [kibana]   log   [18:07:29.946] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:55]                 │ proc [kibana]   log   [18:07:29.947] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:55]                 │ proc [kibana]   log   [18:07:29.947] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:55]                 │ proc [kibana]   log   [18:07:29.948] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:55]                 │ info [docker:registry] 2021/05/17 18:07:29 source.ip: 172.17.0.1:55652, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:03:55]                 │ info [docker:registry] 2021/05/17 18:07:29 source.ip: 172.17.0.1:55642, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:55]                 │ info [docker:registry] 2021/05/17 18:07:29 source.ip: 172.17.0.1:55650, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:03:55]                 │ info [docker:registry] 2021/05/17 18:07:29 source.ip: 172.17.0.1:55644, url.original: /search?package=system&internal=true&experimental=true
[00:03:55]                 │ proc [kibana]   log   [18:07:30.170] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:55]                 │ info [docker:registry] 2021/05/17 18:07:30 source.ip: 172.17.0.1:55656, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:55]                 │ debg ... sleep(501) end
[00:03:55]                 │ debg in navigateTo url = http://localhost:61121/app/fleet#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b
[00:03:55]                 │ debg TestSubjects.exists(editPackagePolicy_header)
[00:03:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="editPackagePolicy_header"]') with timeout=120000
[00:03:55]                 │ debg TestSubjects.isSelected(policyWindowsEvent_dns)
[00:03:55]                 │ debg TestSubjects.find(policyWindowsEvent_dns)
[00:03:55]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_dns"]') with timeout=10000
[00:03:55]                 │ info Taking screenshot "/dev/shm/workspace/kibana/x-pack/test/functional/screenshots/failure/endpoint When on the Endpoint Policy Details Page when on Ingest Policy Edit Package Policy page should include updated endpoint data when saved.png"
[00:03:55]                 │ proc [kibana]   log   [18:07:30.428] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:55]                 │ info [docker:registry] 2021/05/17 18:07:30 source.ip: 172.17.0.1:55660, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:55]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342605 "Package policy updated" Object
[00:03:55]                 │ debg browser[DEBUG] http://localhost:61121/42933/bundles/plugin/fleet/kibana/fleet.chunk.2.js 38:342303 "Package policy validation results" Object
[00:03:55]                 │ info Current URL is: http://localhost:61121/app/fleet#/policies/b8040730-b73a-11eb-a538-19563ba56a9c/edit-integration/9f7ddc3a-11cc-42d1-aaa3-8ceb3f93d58b
[00:03:55]                 │ info Saving page source to: /dev/shm/workspace/kibana/x-pack/test/functional/failure_debug/html/endpoint When on the Endpoint Policy Details Page when on Ingest Policy Edit Package Policy page should include updated endpoint data when saved.html
[00:03:55]                 └- ✖ fail: endpoint When on the Endpoint Policy Details Page when on Ingest Policy Edit Package Policy page should include updated endpoint data when saved
[00:03:55]                 │      Error: expected true to equal false
[00:03:55]                 │       at Assertion.assert (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:100:11)
[00:03:55]                 │       at Assertion.be.Assertion.equal (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:227:8)
[00:03:55]                 │       at Assertion.be (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:69:22)
[00:03:55]                 │       at Context.<anonymous> (test/security_solution_endpoint/apps/endpoint/policy_details.ts:690:76)
[00:03:55]                 │       at runMicrotasks (<anonymous>)
[00:03:55]                 │       at processTicksAndRejections (internal/process/task_queues.js:93:5)
[00:03:55]                 │       at Object.apply (/dev/shm/workspace/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16)
[00:03:55]                 │ 
[00:03:55]                 │ 

Stack Trace

Error: expected true to equal false
    at Assertion.assert (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:100:11)
    at Assertion.be.Assertion.equal (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:227:8)
    at Assertion.be (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:69:22)
    at Context.<anonymous> (test/security_solution_endpoint/apps/endpoint/policy_details.ts:690:76)
    at runMicrotasks (<anonymous>)
    at processTicksAndRejections (internal/process/task_queues.js:93:5)
    at Object.apply (/dev/shm/workspace/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16)

Metrics [docs]

✅ unchanged

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

@tsullivan
Copy link
Member Author

This is a forward-port from the 7.13 branch

@tsullivan tsullivan merged commit 7369a48 into elastic:master May 18, 2021
@jloleysens
Copy link
Contributor

Did not test locally!

@tsullivan tsullivan deleted the backport/master/pr-100165 branch May 19, 2021 18:58
@kibanamachine kibanamachine added the backport missing Added to PRs automatically when the are determined to be missing a backport. label May 20, 2021
@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100232 or prevent reminders by adding the backport:skip label.

2 similar comments
@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100232 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100232 or prevent reminders by adding the backport:skip label.

yctercero pushed a commit to yctercero/kibana that referenced this pull request May 25, 2021
…elastic#100165) (elastic#100232)

* switch mac chromium download location to kibana team gcs

* oops, fix the path to the binary

Co-authored-by: Kibana Machine <[email protected]>

Co-authored-by: Kibana Machine <[email protected]>
@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 100232 or prevent reminders by adding the backport:skip label.

@tsullivan tsullivan added the backport:skip This commit does not require backporting label May 25, 2021
@kibanamachine kibanamachine removed the backport missing Added to PRs automatically when the are determined to be missing a backport. label May 25, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport:skip This commit does not require backporting backport
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants