Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Solution][Case] Fix alerts push #91638

Merged
merged 5 commits into from
Feb 24, 2021

Conversation

cnasikas
Copy link
Member

@cnasikas cnasikas commented Feb 17, 2021

Summary

This PR fixes some issues when pushing a case, with alerts attached, to an external service. Specifically:

  • Only comments of type user are being pushed.
  • A special comment is being added at the end with text: Elastic Security Alerts attached to the case: <count of alerts>.
  • Removes user and date information from the title.
  • Change SIR alerts label.

Checklist

Delete any items that are not applicable to this PR.

For maintainers

@cnasikas cnasikas marked this pull request as ready for review February 17, 2021 13:39
@cnasikas cnasikas requested review from a team as code owners February 17, 2021 13:39
@cnasikas cnasikas self-assigned this Feb 17, 2021
@cnasikas cnasikas added release_note:fix Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Threat Hunting Security Solution Threat Hunting Team v7.12.0 v8.0.0 labels Feb 17, 2021
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-threat-hunting (Team:Threat Hunting)

Copy link
Contributor

@jonathan-buttner jonathan-buttner left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, I agree with @michaelolo24 about making commentId optional if we can 👍

id: 'mock-comment-2',
alertId: ['alert-id-1', 'alert-id-2'],
index: 'alert-index-1',
type: CommentType.alert as const,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is cool, didn't realize this added more type safety. Just for my own edification, what does this enforce for type?

Copy link
Member Author

@cnasikas cnasikas Feb 24, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@jonathan-buttner This enforce the variable to be of type "alert" and not string. If you do const x = "test" the type of x is string. If you do const x = "test" as const the type of x is "test", a constant. When we do type: CommentType.alert TS will refer the type of type as string. This will lead to a TS error because the type should be "alert | user | generated_alert". as const resolve this error.

You can read more here: https://www.typescriptlang.org/docs/handbook/release-notes/typescript-3-4.html#const-assertions

x-pack/plugins/case/server/client/cases/utils.ts Outdated Show resolved Hide resolved
@cnasikas
Copy link
Member Author

@elasticmachine merge upstream

@kibanamachine
Copy link
Contributor

💛 Build succeeded, but was flaky


Test Failures

Kibana Pipeline / general / X-Pack Endpoint Functional Tests.x-pack/test/security_solution_endpoint/apps/endpoint/policy_details·ts.endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has failed 8 times on tracked branches: https://github.com/elastic/kibana/issues/92567

[00:00:00]       │
[00:00:00]         └-: endpoint
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]             │ proc [kibana]   log   [18:14:58.170] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:14:58.173] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:14:58.174] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33938, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33936, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33940, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ proc [kibana]   log   [18:14:58.224] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:14:58.225] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:14:58.234] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33958, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33960, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33956, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ proc [kibana]   log   [18:14:58.243] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:14:58.247] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:14:58.249] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33970, url.original: /package/endpoint/0.17.1
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33974, url.original: /package/elastic_agent/0.0.5
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33972, url.original: /package/system/0.10.9
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33984, url.original: /package/elastic_agent/0.0.5/
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33986, url.original: /package/system/0.10.9/
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33982, url.original: /package/endpoint/0.17.1/
[00:00:00]             │ proc [kibana]   log   [18:14:58.264] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33990, url.original: /epr/elastic_agent/elastic_agent-0.0.5.zip
[00:00:00]             │ proc [kibana]   log   [18:14:58.277] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:33996, url.original: /epr/endpoint/endpoint-0.17.1.zip
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [.kibana_8.0.0_001/JmmisJlaQv-va9tgo1CEmA] update_mapping [_doc]
[00:00:00]             │ proc [kibana]   log   [18:14:58.292] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/24 18:14:58 source.ip: 172.17.0.1:34000, url.original: /epr/system/system-0.10.9.zip
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [.kibana_8.0.0_001/JmmisJlaQv-va9tgo1CEmA] update_mapping [_doc]
[00:00:01]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [.kibana_8.0.0_001/JmmisJlaQv-va9tgo1CEmA] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [.kibana_8.0.0_001/JmmisJlaQv-va9tgo1CEmA] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [.kibana_8.0.0_001/JmmisJlaQv-va9tgo1CEmA] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [.kibana_8.0.0_001/JmmisJlaQv-va9tgo1CEmA] update_mapping [_doc]
[00:00:03]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index lifecycle policy [logs-endpoint.collection-diagnostic]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding component template [metrics-elastic_agent.elastic_agent-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-elastic_agent.elastic_agent] for index patterns [metrics-elastic_agent.elastic_agent-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [logs-system.application] for index patterns [logs-system.application-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [logs-system.system] for index patterns [logs-system.system-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [logs-system.security] for index patterns [logs-system.security-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding component template [logs-endpoint.events.network-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding component template [logs-endpoint.events.library-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding component template [logs-endpoint.events.file-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding component template [.logs-endpoint.diagnostic.collection-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding component template [logs-endpoint.alerts-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding component template [logs-endpoint.events.process-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding component template [metrics-endpoint.metrics-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding component template [logs-endpoint.events.security-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding component template [metrics-endpoint.metadata-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding component template [metrics-endpoint.policy-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding component template [logs-endpoint.events.registry-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [.logs-endpoint.diagnostic.collection] for index patterns [.logs-endpoint.diagnostic.collection-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:08]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [.transform-internal-006] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:08]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] updating number_of_replicas to [0] for indices [.transform-internal-006]
[00:00:08]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-internal-006][0]]])." previous.health="YELLOW" reason="shards started [[.transform-internal-006][0]]"
[00:00:08]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:08]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:08]             │ info [o.e.x.t.t.p.SchemaUtil] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] Failed to deduce mapping for [agent.id], fall back to keyword. Create the destination index with complete mappings first to avoid deducing the mappings
[00:00:08]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:08]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:08]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[metrics-endpoint.metadata_current_default][0]]])." previous.health="YELLOW" reason="shards started [[metrics-endpoint.metadata_current_default][0]]"
[00:00:08]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [endpoint.metadata_current-default-0.17.1] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:08]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [endpoint.metadata_current-default-0.17.1] successfully completed and scheduled task in node operation
[00:00:10]             │ proc [kibana]   log   [18:15:08.511] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:10]             │ info [docker:registry] 2021/02/24 18:15:08 source.ip: 172.17.0.1:34888, url.original: /search?package=system&internal=true&experimental=true
[00:00:10]             │ proc [kibana]   log   [18:15:08.541] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:10]             │ info [docker:registry] 2021/02/24 18:15:08 source.ip: 172.17.0.1:34892, url.original: /search?package=system&internal=true&experimental=true
[00:00:10]             │ proc [kibana]   log   [18:15:08.558] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:10]             │ info [docker:registry] 2021/02/24 18:15:08 source.ip: 172.17.0.1:34898, url.original: /package/system/0.10.9
[00:00:10]             │ info [docker:registry] 2021/02/24 18:15:08 source.ip: 172.17.0.1:34902, url.original: /package/system/0.10.9/
[00:00:10]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [.kibana_8.0.0_001/JmmisJlaQv-va9tgo1CEmA] update_mapping [_doc]
[00:00:12]             │ info [o.e.x.s.a.r.TransportPutRoleAction] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] added role [fleet_enroll]
[00:00:12]             │ info [o.e.x.s.a.u.TransportPutUserAction] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] added user [fleet_enroll]
[00:00:14]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [.kibana_8.0.0_001/JmmisJlaQv-va9tgo1CEmA] update_mapping [_doc]
[00:00:14]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-debian-tests-xxl-1614185557057728553] [.kibana_8.0.0_001/JmmisJlaQv-va9tgo1CEmA] update_mapping [_doc]
[00:00:47]           └-: When on the Endpoint Policy Details Page
[00:00:47]             └-> "before all" hook in "When on the Endpoint Policy Details Page"
[00:02:10]             └-: and the save button is clicked
[00:02:10]               └-> "before all" hook for "should display success toast on successful save"
[00:02:10]               └-> should display success toast on successful save
[00:02:10]                 └-> "before each" hook: global before each for "should display success toast on successful save"
[00:02:10]                 └-> "before each" hook for "should display success toast on successful save"
[00:02:14]                   │ info Using cached retrieval of endpoint package
[00:02:15]                   │ proc [kibana]   log   [18:17:13.419] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:15]                   │ info [docker:registry] 2021/02/24 18:17:13 source.ip: 172.17.0.1:45958, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:15]                   │ proc [kibana]   log   [18:17:13.443] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:15]                   │ info [docker:registry] 2021/02/24 18:17:13 source.ip: 172.17.0.1:45964, url.original: /package/endpoint/0.17.1
[00:02:15]                   │ info [docker:registry] 2021/02/24 18:17:13 source.ip: 172.17.0.1:45968, url.original: /package/endpoint/0.17.1/
[00:02:17]                   │ debg navigateToActualUrl http://localhost:61101/app/security/administration/policy/bf73c63b-30c8-4153-a383-f2d51a05862c
[00:02:17]                   │ debg browser[INFO] http://localhost:61101/app/security/administration/policy/bf73c63b-30c8-4153-a383-f2d51a05862c?_t=1614190635893 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:17]                   │
[00:02:17]                   │ debg browser[INFO] http://localhost:61101/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:17]                   │ debg currentUrl = http://localhost:61101/app/security/administration/policy/bf73c63b-30c8-4153-a383-f2d51a05862c
[00:02:17]                   │          appUrl = http://localhost:61101/app/security/administration/policy/bf73c63b-30c8-4153-a383-f2d51a05862c
[00:02:17]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:17]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:19]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:19]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:19]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:19]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:19]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:19]                   │ proc [kibana]   log   [18:17:18.063] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:19]                   │ info [docker:registry] 2021/02/24 18:17:18 source.ip: 172.17.0.1:46288, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:20]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_dns']/../label') with timeout=10000
[00:02:20]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:20]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:20]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:20]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:21]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:21]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:21]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:21]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:21]                 │ debg Clicking modal confirm
[00:02:21]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:21]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:21]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:21]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:21]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:21]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:21]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:21]                 │ proc [kibana]   log   [18:17:19.440] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:21]                 │ info [docker:registry] 2021/02/24 18:17:19 source.ip: 172.17.0.1:46378, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:21]                 │ proc [kibana]   log   [18:17:19.446] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:21]                 │ info [docker:registry] 2021/02/24 18:17:19 source.ip: 172.17.0.1:46382, url.original: /package/endpoint/0.17.1
[00:02:21]                 │ info [docker:registry] 2021/02/24 18:17:19 source.ip: 172.17.0.1:46386, url.original: /package/endpoint/0.17.1/
[00:02:23]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:24]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:24]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:24]                 │ debg TestSubjects.getVisibleText(policyDetailsSuccessMessage)
[00:02:24]                 │ debg TestSubjects.find(policyDetailsSuccessMessage)
[00:02:24]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=10000
[00:02:24]                 └- ✓ pass  (3.5s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should display success toast on successful save"
[00:02:24]               └-> "after each" hook for "should display success toast on successful save"
[00:02:28]               └-> should persist update on the screen
[00:02:28]                 └-> "before each" hook: global before each for "should persist update on the screen"
[00:02:28]                 └-> "before each" hook for "should persist update on the screen"
[00:02:32]                   │ info Using cached retrieval of endpoint package
[00:02:33]                   │ proc [kibana]   log   [18:17:31.597] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:33]                   │ info [docker:registry] 2021/02/24 18:17:31 source.ip: 172.17.0.1:47314, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:33]                   │ proc [kibana]   log   [18:17:31.620] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:33]                   │ info [docker:registry] 2021/02/24 18:17:31 source.ip: 172.17.0.1:47318, url.original: /package/endpoint/0.17.1
[00:02:33]                   │ info [docker:registry] 2021/02/24 18:17:31 source.ip: 172.17.0.1:47322, url.original: /package/endpoint/0.17.1/
[00:02:35]                   │ debg navigateToActualUrl http://localhost:61101/app/security/administration/policy/542d0dd1-cc1c-4415-a8ee-e7695acdbd03
[00:02:36]                   │ debg browser[INFO] http://localhost:61101/app/security/administration/policy/542d0dd1-cc1c-4415-a8ee-e7695acdbd03?_t=1614190654066 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:36]                   │
[00:02:36]                   │ debg browser[INFO] http://localhost:61101/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:36]                   │ debg currentUrl = http://localhost:61101/app/security/administration/policy/542d0dd1-cc1c-4415-a8ee-e7695acdbd03
[00:02:36]                   │          appUrl = http://localhost:61101/app/security/administration/policy/542d0dd1-cc1c-4415-a8ee-e7695acdbd03
[00:02:36]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:36]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:37]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:37]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:37]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:38]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:38]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:38]                   │ proc [kibana]   log   [18:17:36.307] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:38]                   │ info [docker:registry] 2021/02/24 18:17:36 source.ip: 172.17.0.1:47582, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:39]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_process']/../label') with timeout=10000
[00:02:39]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:39]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:39]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:39]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:39]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:39]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:39]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:39]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:39]                 │ debg Clicking modal confirm
[00:02:39]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:39]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:39]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:39]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:39]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:39]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:39]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:39]                 │ proc [kibana]   log   [18:17:37.683] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:39]                 │ info [docker:registry] 2021/02/24 18:17:37 source.ip: 172.17.0.1:47654, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:39]                 │ proc [kibana]   log   [18:17:37.693] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:39]                 │ info [docker:registry] 2021/02/24 18:17:37 source.ip: 172.17.0.1:47658, url.original: /package/endpoint/0.17.1
[00:02:39]                 │ info [docker:registry] 2021/02/24 18:17:37 source.ip: 172.17.0.1:47662, url.original: /package/endpoint/0.17.1/
[00:02:42]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:42]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:42]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:42]                 │ debg navigateToActualUrl http://localhost:61101/app/security/administration/endpoints
[00:02:42]                 │ debg browser[INFO] http://localhost:61101/app/security/administration/endpoints?_t=1614190660707 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:42]                 │
[00:02:42]                 │ debg browser[INFO] http://localhost:61101/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:42]                 │ debg currentUrl = http://localhost:61101/app/security/administration/endpoints
[00:02:42]                 │          appUrl = http://localhost:61101/app/security/administration/endpoints
[00:02:42]                 │ debg TestSubjects.find(kibanaChrome)
[00:02:42]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:43]                 │ debg isGlobalLoadingIndicatorVisible
[00:02:43]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:43]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:44]                 │ proc [kibana]   log   [18:17:42.536] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:44]                 │ info [docker:registry] 2021/02/24 18:17:42 source.ip: 172.17.0.1:48124, url.original: /search?category=security
[00:02:44]                 │ proc [kibana]   log   [18:17:42.595] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:44]                 │ info [docker:registry] 2021/02/24 18:17:42 source.ip: 172.17.0.1:48128, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:44]                 │ proc [kibana]   log   [18:17:42.620] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:44]                 │ info [docker:registry] 2021/02/24 18:17:42 source.ip: 172.17.0.1:48132, url.original: /search?category=security
[00:02:45]                 │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:46]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:46]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:46]                 │ debg navigateToActualUrl http://localhost:61101/app/security/administration/policy/542d0dd1-cc1c-4415-a8ee-e7695acdbd03
[00:02:46]                 │ debg browser[INFO] http://localhost:61101/app/security/administration/policy/542d0dd1-cc1c-4415-a8ee-e7695acdbd03?_t=1614190664165 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:46]                 │
[00:02:46]                 │ debg browser[INFO] http://localhost:61101/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:46]                 │ debg currentUrl = http://localhost:61101/app/security/administration/policy/542d0dd1-cc1c-4415-a8ee-e7695acdbd03
[00:02:46]                 │          appUrl = http://localhost:61101/app/security/administration/policy/542d0dd1-cc1c-4415-a8ee-e7695acdbd03
[00:02:46]                 │ debg TestSubjects.find(kibanaChrome)
[00:02:46]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:47]                 │ debg isGlobalLoadingIndicatorVisible
[00:02:47]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:47]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:47]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:47]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:47]                 │ proc [kibana]   log   [18:17:46.069] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:47]                 │ info [docker:registry] 2021/02/24 18:17:46 source.ip: 172.17.0.1:48408, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:48]                 │ debg TestSubjects.find(policyWindowsEvent_process)
[00:02:48]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_process"]') with timeout=10000
[00:02:48]                 └- ✓ pass  (9.9s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should persist update on the screen"
[00:02:48]               └-> "after each" hook for "should persist update on the screen"
[00:02:50]                 │ proc [kibana]   log   [18:17:48.157] [info][plugins][securitySolution] Committed manifest 1.0.2
[00:02:54]               └-> should have updated policy data in overall Agent Policy
[00:02:54]                 └-> "before each" hook: global before each for "should have updated policy data in overall Agent Policy"
[00:02:54]                 └-> "before each" hook for "should have updated policy data in overall Agent Policy"
[00:02:58]                   │ info Using cached retrieval of endpoint package
[00:02:58]                   │ proc [kibana]   log   [18:17:56.805] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:58]                   │ info [docker:registry] 2021/02/24 18:17:56 source.ip: 172.17.0.1:48920, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:58]                   │ proc [kibana]   log   [18:17:56.827] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:58]                   │ info [docker:registry] 2021/02/24 18:17:56 source.ip: 172.17.0.1:48924, url.original: /package/endpoint/0.17.1
[00:02:58]                   │ info [docker:registry] 2021/02/24 18:17:56 source.ip: 172.17.0.1:48928, url.original: /package/endpoint/0.17.1/
[00:03:01]                   │ debg navigateToActualUrl http://localhost:61101/app/security/administration/policy/2a09aa37-031b-4af8-b516-fcc42dba3352
[00:03:01]                   │ debg browser[INFO] http://localhost:61101/app/security/administration/policy/2a09aa37-031b-4af8-b516-fcc42dba3352?_t=1614190679310 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:01]                   │
[00:03:01]                   │ debg browser[INFO] http://localhost:61101/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:01]                   │ debg currentUrl = http://localhost:61101/app/security/administration/policy/2a09aa37-031b-4af8-b516-fcc42dba3352
[00:03:01]                   │          appUrl = http://localhost:61101/app/security/administration/policy/2a09aa37-031b-4af8-b516-fcc42dba3352
[00:03:01]                   │ debg TestSubjects.find(kibanaChrome)
[00:03:01]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:02]                   │ debg isGlobalLoadingIndicatorVisible
[00:03:02]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:03:02]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:03:03]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:03:03]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:03:03]                   │ proc [kibana]   log   [18:18:01.472] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:03]                   │ info [docker:registry] 2021/02/24 18:18:01 source.ip: 172.17.0.1:49318, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:04]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_file']/../label') with timeout=10000
[00:03:04]                 │ debg Find.byXPath('//input[@data-test-subj='policyLinuxEvent_file']/../label') with timeout=10000
[00:03:04]                 │ debg Find.byXPath('//input[@data-test-subj='policyMacEvent_file']/../label') with timeout=10000
[00:03:05]                 │ warn WebElementWrapper.click: element click intercepted: Element <label class="euiCheckbox__label" for="ia143c075-76cc-11eb-bb61-4bb8359cbb0c">...</label> is not clickable at point (447, 36). Other element would receive the click: <div class="euiHeader euiHeader--dark euiHeader--fixed header__firstBar">...</div>
[00:03:05]                 │        (Session info: headless chrome=88.0.4324.150)
[00:03:05]                 │ debg finding element 'By(xpath, //input[@data-test-subj='policyWindowsEvent_file']/../label)' again, 2 attempts left
[00:03:05]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:05]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:05]                 │ debg TestSubjects.find(advancedPolicyButton)
[00:03:05]                 │ debg Find.findByCssSelector('[data-test-subj="advancedPolicyButton"]') with timeout=10000
[00:03:05]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:05]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:05]                 │ debg TestSubjects.find(linux.advanced.agent.connection_delay)
[00:03:05]                 │ debg Find.findByCssSelector('[data-test-subj="linux.advanced.agent.connection_delay"]') with timeout=10000
[00:03:06]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:06]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:06]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:03:06]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:03:06]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:03:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:03:06]                 │ debg Clicking modal confirm
[00:03:06]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:03:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:03:06]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:03:06]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:03:06]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:03:06]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:03:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:03:06]                 │ proc [kibana]   log   [18:18:04.787] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:06]                 │ info [docker:registry] 2021/02/24 18:18:04 source.ip: 172.17.0.1:49474, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:06]                 │ proc [kibana]   log   [18:18:04.795] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:06]                 │ info [docker:registry] 2021/02/24 18:18:04 source.ip: 172.17.0.1:49478, url.original: /package/endpoint/0.17.1
[00:03:06]                 │ info [docker:registry] 2021/02/24 18:18:04 source.ip: 172.17.0.1:49482, url.original: /package/endpoint/0.17.1/
[00:03:09]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:03:09]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:03:09]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:03:09]                 └- ✓ pass  (5.4s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy"
[00:03:09]               └-> "after each" hook for "should have updated policy data in overall Agent Policy"
[00:03:14]               └-> should have cleared the advanced section when the user deletes the value
[00:03:14]                 └-> "before each" hook: global before each for "should have cleared the advanced section when the user deletes the value"
[00:03:14]                 └-> "before each" hook for "should have cleared the advanced section when the user deletes the value"
[00:03:18]                   │ info Using cached retrieval of endpoint package
[00:03:18]                   │ proc [kibana]   log   [18:18:16.939] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:18]                   │ info [docker:registry] 2021/02/24 18:18:16 source.ip: 172.17.0.1:50402, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:18]                   │ proc [kibana]   log   [18:18:16.960] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:18]                   │ info [docker:registry] 2021/02/24 18:18:16 source.ip: 172.17.0.1:50406, url.original: /package/endpoint/0.17.1
[00:03:18]                   │ info [docker:registry] 2021/02/24 18:18:16 source.ip: 172.17.0.1:50410, url.original: /package/endpoint/0.17.1/
[00:03:21]                   │ debg navigateToActualUrl http://localhost:61101/app/security/administration/policy/0f779ae3-83a8-4527-bc2b-50c116963862
[00:03:21]                   │ debg browser[INFO] http://localhost:61101/app/security/administration/policy/0f779ae3-83a8-4527-bc2b-50c116963862?_t=1614190699482 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:21]                   │
[00:03:21]                   │ debg browser[INFO] http://localhost:61101/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:21]                   │ debg currentUrl = http://localhost:61101/app/security/administration/policy/0f779ae3-83a8-4527-bc2b-50c116963862
[00:03:21]                   │          appUrl = http://localhost:61101/app/security/administration/policy/0f779ae3-83a8-4527-bc2b-50c116963862
[00:03:21]                   │ debg TestSubjects.find(kibanaChrome)
[00:03:21]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:22]                   │ debg isGlobalLoadingIndicatorVisible
[00:03:22]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:03:22]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:03:23]                   │ proc [kibana]   log   [18:18:21.603] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:23]                   │ info [docker:registry] 2021/02/24 18:18:21 source.ip: 172.17.0.1:50670, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:24]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:03:24]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:03:24]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:24]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:24]                 │ debg TestSubjects.find(advancedPolicyButton)
[00:03:24]                 │ debg Find.findByCssSelector('[data-test-subj="advancedPolicyButton"]') with timeout=10000
[00:03:24]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:24]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:24]                 │ debg TestSubjects.find(linux.advanced.agent.connection_delay)
[00:03:24]                 │ debg Find.findByCssSelector('[data-test-subj="linux.advanced.agent.connection_delay"]') with timeout=10000
[00:03:25]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:25]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:25]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:25]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:25]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:03:25]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:03:25]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:03:25]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:03:25]                 │ debg Clicking modal confirm
[00:03:25]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:03:25]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:03:25]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:03:25]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:03:25]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:03:25]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:03:25]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:03:25]                 │ proc [kibana]   log   [18:18:23.621] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:25]                 │ info [docker:registry] 2021/02/24 18:18:23 source.ip: 172.17.0.1:50792, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:25]                 │ proc [kibana]   log   [18:18:23.629] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:25]                 │ info [docker:registry] 2021/02/24 18:18:23 source.ip: 172.17.0.1:50798, url.original: /package/endpoint/0.17.1
[00:03:25]                 │ info [docker:registry] 2021/02/24 18:18:23 source.ip: 172.17.0.1:50802, url.original: /package/endpoint/0.17.1/
[00:03:27]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:03:28]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:03:28]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:03:28]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:28]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:28]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:28]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:28]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:03:28]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:03:29]                 │ warn WebElementWrapper.click: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItem" id="0">...</div>
[00:03:29]                 │        (Session info: headless chrome=88.0.4324.150)
[00:03:29]                 │ debg finding element 'By(css selector, [data-test-subj="policyDetailsSaveButton"])' again, 2 attempts left
[00:03:31]                 │ warn WebElementWrapper.click: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItem" id="0">...</div>
[00:03:31]                 │        (Session info: headless chrome=88.0.4324.150)
[00:03:31]                 │ debg finding element 'By(css selector, [data-test-subj="policyDetailsSaveButton"])' again, 1 attempts left
[00:03:32]                 │ warn WebElementWrapper.click: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItem" id="0">...</div>
[00:03:32]                 │        (Session info: headless chrome=88.0.4324.150)
[00:03:32]                 │ debg finding element 'By(css selector, [data-test-subj="policyDetailsSaveButton"])' again, 0 attempts left
[00:03:33]                 │ info Taking screenshot "/dev/shm/workspace/parallel/10/kibana/x-pack/test/functional/screenshots/failure/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value.png"
[00:03:33]                 │ info Current URL is: http://localhost:61101/app/security/administration/policy/0f779ae3-83a8-4527-bc2b-50c116963862
[00:03:33]                 │ info Saving page source to: /dev/shm/workspace/parallel/10/kibana/x-pack/test/functional/failure_debug/html/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value.html
[00:03:33]                 └- ✖ fail: endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value
[00:03:33]                 │       ElementClickInterceptedError: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItemeuiGlobalToastListItem-isDismissed" id="0">...</div>
[00:03:33]                 │   (Session info: headless chrome=88.0.4324.150)
[00:03:33]                 │       at Object.throwDecodedError (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/error.js:550:15)
[00:03:33]                 │       at parseHttpResponse (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/http.js:565:13)
[00:03:33]                 │       at Executor.execute (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/http.js:491:26)
[00:03:33]                 │       at runMicrotasks (<anonymous>)
[00:03:33]                 │       at processTicksAndRejections (internal/process/task_queues.js:93:5)
[00:03:33]                 │       at Task.exec (/dev/shm/workspace/parallel/10/kibana/test/functional/services/remote/prevent_parallel_calls.ts:29:22)
[00:03:33]                 │ 
[00:03:33]                 │ 

Stack Trace

ElementClickInterceptedError: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItem euiGlobalToastListItem-isDismissed" id="0">...</div>
  (Session info: headless chrome=88.0.4324.150)
    at Object.throwDecodedError (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/error.js:550:15)
    at parseHttpResponse (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/http.js:565:13)
    at Executor.execute (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/http.js:491:26)
    at runMicrotasks (<anonymous>)
    at processTicksAndRejections (internal/process/task_queues.js:93:5)
    at Task.exec (/dev/shm/workspace/parallel/10/kibana/test/functional/services/remote/prevent_parallel_calls.ts:29:22) {
  remoteStacktrace: '#0 0x55bbaab44199 <unknown>\n'
}

Metrics [docs]

Page load bundle

Size of the bundles that are downloaded on every page load. Target size is below 100kb

id before after diff
securitySolution 234.8KB 234.7KB -3.0B

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

cc @cnasikas

@cnasikas cnasikas merged commit 32ffc80 into elastic:master Feb 24, 2021
@cnasikas cnasikas deleted the fix_push_subcases branch February 24, 2021 19:48
cnasikas added a commit to cnasikas/kibana that referenced this pull request Feb 24, 2021
cnasikas added a commit that referenced this pull request Feb 24, 2021
Co-authored-by: Kibana Machine <[email protected]>

Co-authored-by: Kibana Machine <[email protected]>
gmmorris added a commit to gmmorris/kibana that referenced this pull request Feb 25, 2021
* master: (38 commits)
  Fixes Cypress flake by adding pipe, click, and should (elastic#92762)
  [Discover] Fix filtering selected sidebar fields (elastic#91828)
  [ML] Fixes positions of calendar arrow buttons in start datafeed modal (elastic#92625)
  [dev/build_ts_refs] check that commit in outDirs matches mergeBase (elastic#92513)
  add dep on `@kbn/config` so it is built first
  [Expressions] [Lens] Add id and copyMetaFrom arg to mapColumn fn + add configurable onError argument to math fn (elastic#90481)
  [Lens] Fix Workspace hidden when using Safari (elastic#92616)
  [Lens] Fixes vertical alignment validation messages (elastic#91878)
  forbid x-elastic-product-origin header in elasticsearch configuration (elastic#92359)
  [Security Solution][Detections] Set default indicator path to reduce friction with new filebeat modules (elastic#92081)
  [ILM][Accessibility] Added A11y test for ILM new policy form. (elastic#92570)
  [Security Solution][Exceptions] - Fixes exceptions builder UI where invalid values can cause overwrites of other values (elastic#90634)
  Automatically generated Api documentation (elastic#86232)
  Increase index pattern select limit to 1000 (elastic#92093)
  [core.logging] Add RewriteAppender for filtering LogMeta. (elastic#91492)
  [Security Solution][Detection Rules] Update prebuilt rule threats to match schema (elastic#92281)
  [Security Solutions][Detection Engine] Fixes bug with not being able to duplicate indicator matches (elastic#92565)
  [Dashboard] Export appropriate references from byValue panels (elastic#91567)
  [Upgrade Assistant] Align code between branches (elastic#91862)
  [Security Solution][Case] Fix alerts push (elastic#91638)
  ...
cnasikas added a commit that referenced this pull request Feb 26, 2021
Co-authored-by: Kibana Machine <[email protected]>

Co-authored-by: Kibana Machine <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
release_note:fix Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Threat Hunting Security Solution Threat Hunting Team v7.12.0 v7.13.0 v8.0.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants