Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[7.10] adjust policy test to drop test for server addresses (#82120) #82177

Merged
merged 3 commits into from
Oct 30, 2020

Conversation

kevinlog
Copy link
Contributor

Backports the following commits to 7.10:

@kevinlog kevinlog merged commit f2cf1dd into elastic:7.10 Oct 30, 2020
@kevinlog kevinlog deleted the backport/7.10/pr-82120 branch October 30, 2020 20:31
@kibanamachine
Copy link
Contributor

💔 Build Failed

Failed CI Steps


Test Failures

X-Pack Endpoint Functional Tests.x-pack/test/security_solution_endpoint/apps/endpoint/policy_details·ts.endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has failed 1 times on tracked branches: https://dryrun

[00:00:00]       │
[00:00:00]         └-: endpoint
[00:00:00]           └-> "before all" hook
[00:00:00]           └-> "before all" hook
[00:00:00]             │ proc [kibana]   log   [20:33:36.362] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [20:33:36.366] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43372, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.10.0
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43364, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:00:00]             │ proc [kibana]   log   [20:33:36.387] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [metrics-index_pattern_placeholder] creating index, cause [api], templates [], shards [1]/[1]
[00:00:00]             │ proc [kibana]   log   [20:33:36.388] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43384, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.10.0
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43382, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:00:00]             │ proc [kibana]   log   [20:33:36.403] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [20:33:36.404] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43390, url.original: /package/endpoint/0.16.0-dev.4
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43392, url.original: /package/system/0.7.0
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43398, url.original: /package/system/0.7.0/
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43400, url.original: /package/endpoint/0.16.0-dev.4/
[00:00:00]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [logs-index_pattern_placeholder] creating index, cause [api], templates [], shards [1]/[1]
[00:00:00]             │ proc [kibana]   log   [20:33:36.487] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43404, url.original: /epr/system/system-0.7.0.zip
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/3YBXGqblRJmPecKJ0ImPHQ] update_mapping [_doc]
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/3YBXGqblRJmPecKJ0ImPHQ] update_mapping [_doc]
[00:00:00]             │ proc [kibana]   log   [20:33:36.540] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43408, url.original: /epr/endpoint/endpoint-0.16.0-dev.4.zip
[00:00:00]             │ proc [kibana]   log   [20:33:36.594] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43412, url.original: /package/endpoint/0.16.0-dev.4
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43416, url.original: /package/endpoint/0.16.0-dev.4/
[00:00:00]             │ proc [kibana]   log   [20:33:36.704] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43420, url.original: /package/system/0.7.0
[00:00:00]             │ info [docker:registry] 2020/10/30 20:33:36 source.ip: 172.17.0.1:43424, url.original: /package/system/0.7.0/
[00:00:01]             │ proc [kibana]   log   [20:33:37.369] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [20:33:37.371] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2020/10/30 20:33:37 source.ip: 172.17.0.1:43434, url.original: /search?kibana.version=7.10.0
[00:00:01]             │ info [docker:registry] 2020/10/30 20:33:37 source.ip: 172.17.0.1:43432, url.original: /search?kibana.version=7.10.0
[00:00:01]             │ proc [kibana]   log   [20:33:37.387] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [20:33:37.388] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2020/10/30 20:33:37 source.ip: 172.17.0.1:43442, url.original: /package/system/0.7.0
[00:00:01]             │ info [docker:registry] 2020/10/30 20:33:37 source.ip: 172.17.0.1:43440, url.original: /package/endpoint/0.16.0-dev.4
[00:00:01]             │ proc [kibana]   log   [20:33:37.395] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [20:33:37.396] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2020/10/30 20:33:37 source.ip: 172.17.0.1:43452, url.original: /package/endpoint/0.16.0-dev.4/
[00:00:01]             │ info [docker:registry] 2020/10/30 20:33:37 source.ip: 172.17.0.1:43458, url.original: /package/endpoint/0.16.0-dev.4
[00:00:01]             │ info [docker:registry] 2020/10/30 20:33:37 source.ip: 172.17.0.1:43456, url.original: /package/system/0.7.0
[00:00:01]             │ info [docker:registry] 2020/10/30 20:33:37 source.ip: 172.17.0.1:43450, url.original: /package/system/0.7.0/
[00:00:01]             │ info [docker:registry] 2020/10/30 20:33:37 source.ip: 172.17.0.1:43464, url.original: /package/endpoint/0.16.0-dev.4/
[00:00:01]             │ info [docker:registry] 2020/10/30 20:33:37 source.ip: 172.17.0.1:43466, url.original: /package/system/0.7.0/
[00:00:01]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/3YBXGqblRJmPecKJ0ImPHQ] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/3YBXGqblRJmPecKJ0ImPHQ] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/3YBXGqblRJmPecKJ0ImPHQ] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/3YBXGqblRJmPecKJ0ImPHQ] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.events.file-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [metrics-endpoint.metadata-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [metrics-endpoint.metrics-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.alerts-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [metrics-endpoint.policy-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.events.process-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.events.library-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.events.registry-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.events.security-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.events.network-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:07]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.transform-internal-005] creating index, cause [auto(bulk api)], templates [.transform-internal-005], shards [1]/[1]
[00:00:07]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] updating number_of_replicas to [0] for indices [.transform-internal-005]
[00:00:07]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:07]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:07]             │ info [o.e.x.t.t.p.SchemaUtil] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] Failed to deduce mapping for [agent.id], fall back to keyword. Create the destination index with complete mappings first to avoid deducing the mappings
[00:00:07]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:07]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:07]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [endpoint.metadata_current-default-0.16.0-dev.4] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:07]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [endpoint.metadata_current-default-0.16.0-dev.4] successfully completed and scheduled task in node operation
[00:00:08]             │ proc [kibana]   log   [20:33:44.529] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:08]             │ proc [kibana]   log   [20:33:44.530] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:08]             │ info [docker:registry] 2020/10/30 20:33:44 source.ip: 172.17.0.1:43540, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.10.0
[00:00:08]             │ info [docker:registry] 2020/10/30 20:33:44 source.ip: 172.17.0.1:43538, url.original: /package/system/0.7.0
[00:00:08]             │ info [docker:registry] 2020/10/30 20:33:44 source.ip: 172.17.0.1:43544, url.original: /package/system/0.7.0/
[00:00:08]             │ proc [kibana]   log   [20:33:44.624] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:08]             │ proc [kibana]   log   [20:33:44.626] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:08]             │ info [docker:registry] 2020/10/30 20:33:44 source.ip: 172.17.0.1:43552, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.10.0
[00:00:08]             │ info [docker:registry] 2020/10/30 20:33:44 source.ip: 172.17.0.1:43550, url.original: /package/system/0.7.0
[00:00:08]             │ info [docker:registry] 2020/10/30 20:33:44 source.ip: 172.17.0.1:43556, url.original: /package/system/0.7.0/
[00:00:08]             │ proc [kibana]   log   [20:33:44.703] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:08]             │ info [docker:registry] 2020/10/30 20:33:44 source.ip: 172.17.0.1:43560, url.original: /package/system/0.7.0
[00:00:08]             │ info [docker:registry] 2020/10/30 20:33:44 source.ip: 172.17.0.1:43564, url.original: /package/system/0.7.0/
[00:00:08]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/3YBXGqblRJmPecKJ0ImPHQ] update_mapping [_doc]
[00:00:10]             │ info [o.e.x.s.a.r.TransportPutRoleAction] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] added role [fleet_enroll]
[00:00:10]             │ info [o.e.x.s.a.u.TransportPutUserAction] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] added user [fleet_enroll]
[00:00:12]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/3YBXGqblRJmPecKJ0ImPHQ] update_mapping [_doc]
[00:00:12]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/3YBXGqblRJmPecKJ0ImPHQ] update_mapping [_doc]
[00:00:41]           └-: When on the Endpoint Policy Details Page
[00:00:41]             └-> "before all" hook
[00:01:03]             └-: and the save button is clicked
[00:01:03]               └-> "before all" hook
[00:01:03]               └-> should display success toast on successful save
[00:01:03]                 └-> "before each" hook: global before each
[00:01:03]                 └-> "before each" hook
[00:01:07]                   │ info Using cached retrieval of endpoint package
[00:01:07]                   │ proc [kibana]   log   [20:34:43.831] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:07]                   │ proc [kibana]   log   [20:34:43.832] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:07]                   │ info [docker:registry] 2020/10/30 20:34:43 source.ip: 172.17.0.1:43880, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:07]                   │ info [docker:registry] 2020/10/30 20:34:43 source.ip: 172.17.0.1:43878, url.original: /package/endpoint/0.16.0-dev.4
[00:01:07]                   │ info [docker:registry] 2020/10/30 20:34:43 source.ip: 172.17.0.1:43884, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:07]                   │ proc [kibana]   log   [20:34:43.966] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:07]                   │ info [docker:registry] 2020/10/30 20:34:43 source.ip: 172.17.0.1:43890, url.original: /package/endpoint/0.16.0-dev.4
[00:01:07]                   │ info [docker:registry] 2020/10/30 20:34:43 source.ip: 172.17.0.1:43894, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:10]                   │ debg navigateToActualUrl http://localhost:6191/app/security/administration/policy/58012cb0-1aef-11eb-af06-0ddc588b8082
[00:01:10]                   │ debg browser[INFO] http://localhost:6191/app/security/administration/policy/58012cb0-1aef-11eb-af06-0ddc588b8082?_t=1604090086842 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:01:10]                   │
[00:01:10]                   │ debg browser[INFO] http://localhost:6191/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:01:10]                   │ debg currentUrl = http://localhost:6191/app/security/administration/policy/58012cb0-1aef-11eb-af06-0ddc588b8082
[00:01:10]                   │          appUrl = http://localhost:6191/app/security/administration/policy/58012cb0-1aef-11eb-af06-0ddc588b8082
[00:01:10]                   │ debg TestSubjects.find(kibanaChrome)
[00:01:10]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:01:11]                   │ debg isGlobalLoadingIndicatorVisible
[00:01:11]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:01:11]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:01:12]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:01:12]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:01:12]                   │ proc [kibana]   log   [20:34:48.789] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:12]                   │ info [docker:registry] 2020/10/30 20:34:48 source.ip: 172.17.0.1:43912, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:13]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_dns']/../label') with timeout=10000
[00:01:13]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:01:13]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:01:13]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:01:13]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:01:13]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:01:13]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:01:13]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:01:13]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:01:13]                 │ debg Clicking modal confirm
[00:01:13]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:01:13]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:01:13]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:01:13]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:01:13]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:01:13]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:01:13]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:01:13]                 │ proc [kibana]   log   [20:34:50.078] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:13]                 │ proc [kibana]   log   [20:34:50.079] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:13]                 │ info [docker:registry] 2020/10/30 20:34:50 source.ip: 172.17.0.1:43922, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:13]                 │ info [docker:registry] 2020/10/30 20:34:50 source.ip: 172.17.0.1:43920, url.original: /package/endpoint/0.16.0-dev.4
[00:01:13]                 │ info [docker:registry] 2020/10/30 20:34:50 source.ip: 172.17.0.1:43926, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:13]                 │ proc [kibana]   log   [20:34:50.208] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:13]                 │ info [docker:registry] 2020/10/30 20:34:50 source.ip: 172.17.0.1:43930, url.original: /package/endpoint/0.16.0-dev.4
[00:01:13]                 │ info [docker:registry] 2020/10/30 20:34:50 source.ip: 172.17.0.1:43934, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:16]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:01:16]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:01:16]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:01:16]                 │ debg TestSubjects.getVisibleText(policyDetailsSuccessMessage)
[00:01:16]                 │ debg TestSubjects.find(policyDetailsSuccessMessage)
[00:01:16]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=10000
[00:01:16]                 └- ✓ pass  (3.4s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should display success toast on successful save"
[00:01:16]               └-> "after each" hook
[00:01:21]               └-> should persist update on the screen
[00:01:21]                 └-> "before each" hook: global before each
[00:01:21]                 └-> "before each" hook
[00:01:25]                   │ info Using cached retrieval of endpoint package
[00:01:25]                   │ proc [kibana]   log   [20:35:01.992] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:25]                   │ proc [kibana]   log   [20:35:01.993] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:25]                   │ info [docker:registry] 2020/10/30 20:35:01 source.ip: 172.17.0.1:43980, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:25]                   │ info [docker:registry] 2020/10/30 20:35:01 source.ip: 172.17.0.1:43978, url.original: /package/endpoint/0.16.0-dev.4
[00:01:25]                   │ info [docker:registry] 2020/10/30 20:35:01 source.ip: 172.17.0.1:43984, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:25]                   │ proc [kibana]   log   [20:35:02.125] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:25]                   │ info [docker:registry] 2020/10/30 20:35:02 source.ip: 172.17.0.1:43988, url.original: /package/endpoint/0.16.0-dev.4
[00:01:25]                   │ info [docker:registry] 2020/10/30 20:35:02 source.ip: 172.17.0.1:43992, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:28]                   │ debg navigateToActualUrl http://localhost:6191/app/security/administration/policy/62d4c7f0-1aef-11eb-af06-0ddc588b8082
[00:01:28]                   │ debg browser[INFO] http://localhost:6191/app/security/administration/policy/62d4c7f0-1aef-11eb-af06-0ddc588b8082?_t=1604090105001 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:01:28]                   │
[00:01:28]                   │ debg browser[INFO] http://localhost:6191/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:01:28]                   │ debg currentUrl = http://localhost:6191/app/security/administration/policy/62d4c7f0-1aef-11eb-af06-0ddc588b8082
[00:01:28]                   │          appUrl = http://localhost:6191/app/security/administration/policy/62d4c7f0-1aef-11eb-af06-0ddc588b8082
[00:01:28]                   │ debg TestSubjects.find(kibanaChrome)
[00:01:28]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:01:29]                   │ debg isGlobalLoadingIndicatorVisible
[00:01:29]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:01:29]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:01:30]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:01:30]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:01:30]                   │ proc [kibana]   log   [20:35:06.770] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:30]                   │ info [docker:registry] 2020/10/30 20:35:06 source.ip: 172.17.0.1:44010, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:31]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_process']/../label') with timeout=10000
[00:01:31]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:01:31]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:01:31]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:01:31]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:01:31]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:01:31]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:01:31]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:01:31]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:01:31]                 │ debg Clicking modal confirm
[00:01:31]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:01:31]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:01:31]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:01:31]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:01:31]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:01:31]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:01:31]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:01:31]                 │ proc [kibana]   log   [20:35:08.079] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:31]                 │ proc [kibana]   log   [20:35:08.080] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:31]                 │ info [docker:registry] 2020/10/30 20:35:08 source.ip: 172.17.0.1:44020, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:31]                 │ info [docker:registry] 2020/10/30 20:35:08 source.ip: 172.17.0.1:44018, url.original: /package/endpoint/0.16.0-dev.4
[00:01:31]                 │ info [docker:registry] 2020/10/30 20:35:08 source.ip: 172.17.0.1:44024, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:31]                 │ proc [kibana]   log   [20:35:08.206] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:31]                 │ info [docker:registry] 2020/10/30 20:35:08 source.ip: 172.17.0.1:44028, url.original: /package/endpoint/0.16.0-dev.4
[00:01:31]                 │ info [docker:registry] 2020/10/30 20:35:08 source.ip: 172.17.0.1:44032, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:34]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:01:34]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:01:34]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:01:34]                 │ debg navigateToActualUrl http://localhost:6191/app/security/administration/endpoints
[00:01:34]                 │ debg browser[INFO] http://localhost:6191/app/security/administration/endpoints?_t=1604090111110 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:01:34]                 │
[00:01:34]                 │ debg browser[INFO] http://localhost:6191/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:01:34]                 │ debg currentUrl = http://localhost:6191/app/security/administration/endpoints
[00:01:34]                 │          appUrl = http://localhost:6191/app/security/administration/endpoints
[00:01:34]                 │ debg TestSubjects.find(kibanaChrome)
[00:01:34]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:01:35]                 │ debg isGlobalLoadingIndicatorVisible
[00:01:35]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:01:35]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:01:36]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:01:36]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:01:36]                 │ proc [kibana]   log   [20:35:12.862] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:36]                 │ info [docker:registry] 2020/10/30 20:35:12 source.ip: 172.17.0.1:44050, url.original: /search?category=security&kibana.version=7.10.0
[00:01:36]                 │ proc [kibana]   log   [20:35:12.917] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:36]                 │ info [docker:registry] 2020/10/30 20:35:12 source.ip: 172.17.0.1:44054, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:36]                 │ proc [kibana]   log   [20:35:12.984] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:36]                 │ info [docker:registry] 2020/10/30 20:35:13 source.ip: 172.17.0.1:44058, url.original: /search?category=security&kibana.version=7.10.0
[00:01:37]                 │ debg navigateToActualUrl http://localhost:6191/app/security/administration/policy/62d4c7f0-1aef-11eb-af06-0ddc588b8082
[00:01:37]                 │ debg browser[INFO] http://localhost:6191/app/security/administration/policy/62d4c7f0-1aef-11eb-af06-0ddc588b8082?_t=1604090113581 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:01:37]                 │
[00:01:37]                 │ debg browser[INFO] http://localhost:6191/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:01:37]                 │ debg currentUrl = http://localhost:6191/app/security/administration/policy/62d4c7f0-1aef-11eb-af06-0ddc588b8082
[00:01:37]                 │          appUrl = http://localhost:6191/app/security/administration/policy/62d4c7f0-1aef-11eb-af06-0ddc588b8082
[00:01:37]                 │ debg TestSubjects.find(kibanaChrome)
[00:01:37]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:01:38]                 │ debg isGlobalLoadingIndicatorVisible
[00:01:38]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:01:38]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:01:38]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:01:38]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:01:38]                 │ proc [kibana]   log   [20:35:15.004] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:38]                 │ info [docker:registry] 2020/10/30 20:35:15 source.ip: 172.17.0.1:44072, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:39]                 │ debg TestSubjects.find(policyWindowsEvent_process)
[00:01:39]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_process"]') with timeout=10000
[00:01:39]                 └- ✓ pass  (8.3s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should persist update on the screen"
[00:01:39]               └-> "after each" hook
[00:01:43]               └-> should have updated policy data in overall Agent Policy
[00:01:43]                 └-> "before each" hook: global before each
[00:01:43]                 └-> "before each" hook
[00:01:47]                   │ info Using cached retrieval of endpoint package
[00:01:47]                   │ proc [kibana]   log   [20:35:24.155] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:47]                   │ proc [kibana]   log   [20:35:24.156] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:47]                   │ info [docker:registry] 2020/10/30 20:35:24 source.ip: 172.17.0.1:44108, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:47]                   │ info [docker:registry] 2020/10/30 20:35:24 source.ip: 172.17.0.1:44110, url.original: /package/endpoint/0.16.0-dev.4
[00:01:47]                   │ info [docker:registry] 2020/10/30 20:35:24 source.ip: 172.17.0.1:44114, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:47]                   │ proc [kibana]   log   [20:35:24.307] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:47]                   │ info [docker:registry] 2020/10/30 20:35:24 source.ip: 172.17.0.1:44118, url.original: /package/endpoint/0.16.0-dev.4
[00:01:47]                   │ info [docker:registry] 2020/10/30 20:35:24 source.ip: 172.17.0.1:44122, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:50]                   │ debg navigateToActualUrl http://localhost:6191/app/security/administration/policy/700e3fa0-1aef-11eb-af06-0ddc588b8082
[00:01:50]                   │ debg browser[INFO] http://localhost:6191/app/security/administration/policy/700e3fa0-1aef-11eb-af06-0ddc588b8082?_t=1604090127172 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:01:50]                   │
[00:01:50]                   │ debg browser[INFO] http://localhost:6191/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:01:51]                   │ debg currentUrl = http://localhost:6191/app/security/administration/policy/700e3fa0-1aef-11eb-af06-0ddc588b8082
[00:01:51]                   │          appUrl = http://localhost:6191/app/security/administration/policy/700e3fa0-1aef-11eb-af06-0ddc588b8082
[00:01:51]                   │ debg TestSubjects.find(kibanaChrome)
[00:01:51]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:01:52]                   │ debg isGlobalLoadingIndicatorVisible
[00:01:52]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:01:52]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:01:52]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:01:52]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:01:52]                   │ proc [kibana]   log   [20:35:28.937] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:52]                   │ info [docker:registry] 2020/10/30 20:35:28 source.ip: 172.17.0.1:44140, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:53]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_file']/../label') with timeout=10000
[00:01:53]                 │ debg Find.byXPath('//input[@data-test-subj='policyLinuxEvent_file']/../label') with timeout=10000
[00:01:53]                 │ debg Find.byXPath('//input[@data-test-subj='policyMacEvent_file']/../label') with timeout=10000
[00:01:53]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:01:53]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:01:53]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:01:53]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:01:53]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:01:53]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:01:53]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:01:53]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:01:53]                 │ debg Clicking modal confirm
[00:01:53]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:01:53]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:01:54]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:01:54]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:01:54]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:01:54]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:01:54]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:01:54]                 │ proc [kibana]   log   [20:35:30.448] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:54]                 │ proc [kibana]   log   [20:35:30.450] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:54]                 │ info [docker:registry] 2020/10/30 20:35:30 source.ip: 172.17.0.1:44152, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:54]                 │ info [docker:registry] 2020/10/30 20:35:30 source.ip: 172.17.0.1:44150, url.original: /package/endpoint/0.16.0-dev.4
[00:01:54]                 │ info [docker:registry] 2020/10/30 20:35:30 source.ip: 172.17.0.1:44156, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:54]                 │ proc [kibana]   log   [20:35:30.583] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:54]                 │ info [docker:registry] 2020/10/30 20:35:30 source.ip: 172.17.0.1:44160, url.original: /package/endpoint/0.16.0-dev.4
[00:01:54]                 │ info [docker:registry] 2020/10/30 20:35:30 source.ip: 172.17.0.1:44164, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:56]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:01:57]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:01:57]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:01:57]                 │ info Taking screenshot "/dev/shm/workspace/parallel/9/kibana/x-pack/test/functional/screenshots/failure/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy.png"
[00:01:57]                 │ info Current URL is: http://localhost:6191/app/security/administration/policy/700e3fa0-1aef-11eb-af06-0ddc588b8082
[00:01:57]                 │ info Saving page source to: /dev/shm/workspace/parallel/9/kibana/x-pack/test/functional/failure_debug/html/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy.html
[00:01:57]                 └- ✖ fail: endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy
[00:01:57]                 │       Error: expected [ { id: '700e3fa0-1aef-11eb-af06-0ddc588b8082',
[00:01:57]                 │     revision: 2,
[00:01:57]                 │     name: 'Protect East Coast',
[00:01:57]                 │     type: 'endpoint',
[00:01:57]                 │     data_stream: { namespace: 'default' },
[00:01:57]                 │     use_output: 'default',
[00:01:57]                 │     artifact_manifest: 
[00:01:57]                 │      { schema_version: 'v1',
[00:01:57]                 │        manifest_version: '1.0.0',
[00:01:57]                 │        artifacts: [Object] },
[00:01:57]                 │     policy: { linux: [Object], windows: [Object], mac: [Object] },
[00:01:57]                 │     streams: [],
[00:01:57]                 │     meta: { package: [Object] } } ] to sort of equal [ { id: '700e3fa0-1aef-11eb-af06-0ddc588b8082',
[00:01:57]                 │     revision: 2,
[00:01:57]                 │     data_stream: { namespace: 'default' },
[00:01:57]                 │     name: 'Protect East Coast',
[00:01:57]                 │     meta: { package: [Object] },
[00:01:57]                 │     artifact_manifest: 
[00:01:57]                 │      { artifacts: [Object],
[00:01:57]                 │        manifest_version: '1.0.0',
[00:01:57]                 │        schema_version: 'v1' },
[00:01:57]                 │     policy: { linux: [Object], mac: [Object], windows: [Object] },
[00:01:57]                 │     streams: [],
[00:01:57]                 │     type: 'endpoint',
[00:01:57]                 │     use_output: 'default' } ]
[00:01:57]                 │       + expected - actual
[00:01:57]                 │ 
[00:01:57]                 │                }
[00:01:57]                 │                "malware": {
[00:01:57]                 │                  "mode": "prevent"
[00:01:57]                 │                }
[00:01:57]                 │       +        "popup": {
[00:01:57]                 │       +          "malware": {
[00:01:57]                 │       +            "enabled": true
[00:01:57]                 │       +            "message": ""
[00:01:57]                 │       +          }
[00:01:57]                 │       +        }
[00:01:57]                 │              }
[00:01:57]                 │              "windows": {
[00:01:57]                 │                "events": {
[00:01:57]                 │                  "dll_and_driver_load": true
[00:01:57]                 │ --
[00:01:57]                 │                }
[00:01:57]                 │                "malware": {
[00:01:57]                 │                  "mode": "prevent"
[00:01:57]                 │                }
[00:01:57]                 │       +        "popup": {
[00:01:57]                 │       +          "malware": {
[00:01:57]                 │       +            "enabled": true
[00:01:57]                 │       +            "message": ""
[00:01:57]                 │       +          }
[00:01:57]                 │       +        }
[00:01:57]                 │              }
[00:01:57]                 │            }
[00:01:57]                 │            "revision": 2
[00:01:57]                 │            "streams": []
[00:01:57]                 │       
[00:01:57]                 │       at Assertion.assert (/dev/shm/workspace/parallel/9/kibana/packages/kbn-expect/expect.js:100:11)
[00:01:57]                 │       at Assertion.eql (/dev/shm/workspace/parallel/9/kibana/packages/kbn-expect/expect.js:244:8)
[00:01:57]                 │       at Context.it (test/security_solution_endpoint/apps/endpoint/policy_details.ts:108:43)
[00:01:57]                 │ 
[00:01:57]                 │ 

Stack Trace

{ Error: expected [ { id: '700e3fa0-1aef-11eb-af06-0ddc588b8082',
    revision: 2,
    name: 'Protect East Coast',
    type: 'endpoint',
    data_stream: { namespace: 'default' },
    use_output: 'default',
    artifact_manifest: 
     { schema_version: 'v1',
       manifest_version: '1.0.0',
       artifacts: [Object] },
    policy: { linux: [Object], windows: [Object], mac: [Object] },
    streams: [],
    meta: { package: [Object] } } ] to sort of equal [ { id: '700e3fa0-1aef-11eb-af06-0ddc588b8082',
    revision: 2,
    data_stream: { namespace: 'default' },
    name: 'Protect East Coast',
    meta: { package: [Object] },
    artifact_manifest: 
     { artifacts: [Object],
       manifest_version: '1.0.0',
       schema_version: 'v1' },
    policy: { linux: [Object], mac: [Object], windows: [Object] },
    streams: [],
    type: 'endpoint',
    use_output: 'default' } ]
    at Assertion.assert (/dev/shm/workspace/parallel/9/kibana/packages/kbn-expect/expect.js:100:11)
    at Assertion.eql (/dev/shm/workspace/parallel/9/kibana/packages/kbn-expect/expect.js:244:8)
    at Context.it (test/security_solution_endpoint/apps/endpoint/policy_details.ts:108:43)
  actual:
   '[\n  {\n    "artifact_manifest": {\n      "artifacts": {\n        "endpoint-exceptionlist-macos-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-exceptionlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-exceptionlist-windows-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-exceptionlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-trustlist-linux-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-trustlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-trustlist-macos-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-trustlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-trustlist-windows-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-trustlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n      }\n      "manifest_version": "1.0.0"\n      "schema_version": "v1"\n    }\n    "data_stream": {\n      "namespace": "default"\n    }\n    "id": "700e3fa0-1aef-11eb-af06-0ddc588b8082"\n    "meta": {\n      "package": {\n        "name": "endpoint"\n        "version": "0.16.0-dev.4"\n      }\n    }\n    "name": "Protect East Coast"\n    "policy": {\n      "linux": {\n        "events": {\n          "file": false\n          "network": true\n          "process": true\n        }\n        "logging": {\n          "file": "info"\n        }\n      }\n      "mac": {\n        "events": {\n          "file": false\n          "network": true\n          "process": true\n        }\n        "logging": {\n          "file": "info"\n        }\n        "malware": {\n          "mode": "prevent"\n        }\n      }\n      "windows": {\n        "events": {\n          "dll_and_driver_load": true\n          "dns": true\n          "file": false\n          "network": true\n          "process": true\n          "registry": true\n          "security": true\n        }\n        "logging": {\n          "file": "info"\n        }\n        "malware": {\n          "mode": "prevent"\n        }\n      }\n    }\n    "revision": 2\n    "streams": []\n    "type": "endpoint"\n    "use_output": "default"\n  }\n]',
  expected:
   '[\n  {\n    "artifact_manifest": {\n      "artifacts": {\n        "endpoint-exceptionlist-macos-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-exceptionlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-exceptionlist-windows-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-exceptionlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-trustlist-linux-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-trustlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-trustlist-macos-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-trustlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-trustlist-windows-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-trustlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n      }\n      "manifest_version": "1.0.0"\n      "schema_version": "v1"\n    }\n    "data_stream": {\n      "namespace": "default"\n    }\n    "id": "700e3fa0-1aef-11eb-af06-0ddc588b8082"\n    "meta": {\n      "package": {\n        "name": "endpoint"\n        "version": "0.16.0-dev.4"\n      }\n    }\n    "name": "Protect East Coast"\n    "policy": {\n      "linux": {\n        "events": {\n          "file": false\n          "network": true\n          "process": true\n        }\n        "logging": {\n          "file": "info"\n        }\n      }\n      "mac": {\n        "events": {\n          "file": false\n          "network": true\n          "process": true\n        }\n        "logging": {\n          "file": "info"\n        }\n        "malware": {\n          "mode": "prevent"\n        }\n        "popup": {\n          "malware": {\n            "enabled": true\n            "message": ""\n          }\n        }\n      }\n      "windows": {\n        "events": {\n          "dll_and_driver_load": true\n          "dns": true\n          "file": false\n          "network": true\n          "process": true\n          "registry": true\n          "security": true\n        }\n        "logging": {\n          "file": "info"\n        }\n        "malware": {\n          "mode": "prevent"\n        }\n        "popup": {\n          "malware": {\n            "enabled": true\n            "message": ""\n          }\n        }\n      }\n    }\n    "revision": 2\n    "streams": []\n    "type": "endpoint"\n    "use_output": "default"\n  }\n]',
  showDiff: true }

X-Pack Endpoint Functional Tests.x-pack/test/security_solution_endpoint/apps/endpoint/policy_details·ts.endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has not failed recently on tracked branches

[00:00:00]       │
[00:00:00]         └-: endpoint
[00:00:00]           └-> "before all" hook
[00:00:00]           └-> "before all" hook
[00:00:00]             │ proc [kibana]   log   [19:59:02.805] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [19:59:02.811] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:02 source.ip: 172.17.0.1:49024, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.10.0
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:02 source.ip: 172.17.0.1:49020, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:00:00]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [logs-index_pattern_placeholder] creating index, cause [api], templates [], shards [1]/[1]
[00:00:00]             │ proc [kibana]   log   [19:59:02.849] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [19:59:02.851] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:02 source.ip: 172.17.0.1:49040, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.10.0
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:02 source.ip: 172.17.0.1:49038, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:00:00]             │ proc [kibana]   log   [19:59:02.882] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [metrics-index_pattern_placeholder] creating index, cause [api], templates [], shards [1]/[1]
[00:00:00]             │ proc [kibana]   log   [19:59:02.884] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:02 source.ip: 172.17.0.1:49048, url.original: /package/system/0.7.0
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:02 source.ip: 172.17.0.1:49046, url.original: /package/endpoint/0.16.0-dev.4
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:02 source.ip: 172.17.0.1:49054, url.original: /package/endpoint/0.16.0-dev.4/
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:02 source.ip: 172.17.0.1:49056, url.original: /package/system/0.7.0/
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/aSHY_J0BRMSAQ9XU1PpdAw] update_mapping [_doc]
[00:00:00]             │ proc [kibana]   log   [19:59:02.995] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:02 source.ip: 172.17.0.1:49062, url.original: /epr/system/system-0.7.0.zip
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/aSHY_J0BRMSAQ9XU1PpdAw] update_mapping [_doc]
[00:00:00]             │ proc [kibana]   log   [19:59:03.045] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:03 source.ip: 172.17.0.1:49066, url.original: /epr/endpoint/endpoint-0.16.0-dev.4.zip
[00:00:00]             │ proc [kibana]   log   [19:59:03.129] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:03 source.ip: 172.17.0.1:49072, url.original: /package/endpoint/0.16.0-dev.4
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:03 source.ip: 172.17.0.1:49076, url.original: /package/endpoint/0.16.0-dev.4/
[00:00:00]             │ proc [kibana]   log   [19:59:03.232] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:03 source.ip: 172.17.0.1:49080, url.original: /package/system/0.7.0
[00:00:00]             │ info [docker:registry] 2020/10/30 19:59:03 source.ip: 172.17.0.1:49084, url.original: /package/system/0.7.0/
[00:00:01]             │ proc [kibana]   log   [19:59:03.982] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [19:59:03.985] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2020/10/30 19:59:03 source.ip: 172.17.0.1:49104, url.original: /search?kibana.version=7.10.0
[00:00:01]             │ info [docker:registry] 2020/10/30 19:59:03 source.ip: 172.17.0.1:49102, url.original: /search?kibana.version=7.10.0
[00:00:01]             │ proc [kibana]   log   [19:59:04.010] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [19:59:04.011] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [19:59:04.013] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [19:59:04.014] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2020/10/30 19:59:04 source.ip: 172.17.0.1:49112, url.original: /package/endpoint/0.16.0-dev.4
[00:00:01]             │ info [docker:registry] 2020/10/30 19:59:04 source.ip: 172.17.0.1:49116, url.original: /package/system/0.7.0
[00:00:01]             │ info [docker:registry] 2020/10/30 19:59:04 source.ip: 172.17.0.1:49114, url.original: /package/endpoint/0.16.0-dev.4
[00:00:01]             │ info [docker:registry] 2020/10/30 19:59:04 source.ip: 172.17.0.1:49120, url.original: /package/system/0.7.0
[00:00:01]             │ info [docker:registry] 2020/10/30 19:59:04 source.ip: 172.17.0.1:49136, url.original: /package/endpoint/0.16.0-dev.4/
[00:00:01]             │ info [docker:registry] 2020/10/30 19:59:04 source.ip: 172.17.0.1:49132, url.original: /package/system/0.7.0/
[00:00:01]             │ info [docker:registry] 2020/10/30 19:59:04 source.ip: 172.17.0.1:49130, url.original: /package/endpoint/0.16.0-dev.4/
[00:00:01]             │ info [docker:registry] 2020/10/30 19:59:04 source.ip: 172.17.0.1:49134, url.original: /package/system/0.7.0/
[00:00:01]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/aSHY_J0BRMSAQ9XU1PpdAw] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/aSHY_J0BRMSAQ9XU1PpdAw] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/aSHY_J0BRMSAQ9XU1PpdAw] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/aSHY_J0BRMSAQ9XU1PpdAw] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [metrics-endpoint.policy-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.events.process-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [metrics-endpoint.metadata-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [metrics-endpoint.metrics-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.events.security-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.alerts-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.events.library-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.events.registry-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.events.network-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding component template [logs-endpoint.events.file-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:07]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.transform-internal-005] creating index, cause [auto(bulk api)], templates [.transform-internal-005], shards [1]/[1]
[00:00:07]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] updating number_of_replicas to [0] for indices [.transform-internal-005]
[00:00:07]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:07]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:07]             │ info [o.e.x.t.t.p.SchemaUtil] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] Failed to deduce mapping for [agent.id], fall back to keyword. Create the destination index with complete mappings first to avoid deducing the mappings
[00:00:07]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:07]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:07]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [endpoint.metadata_current-default-0.16.0-dev.4] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:07]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [endpoint.metadata_current-default-0.16.0-dev.4] successfully completed and scheduled task in node operation
[00:00:08]             │ proc [kibana]   log   [19:59:11.144] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:08]             │ proc [kibana]   log   [19:59:11.145] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:08]             │ info [docker:registry] 2020/10/30 19:59:11 source.ip: 172.17.0.1:49398, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.10.0
[00:00:08]             │ info [docker:registry] 2020/10/30 19:59:11 source.ip: 172.17.0.1:49396, url.original: /package/system/0.7.0
[00:00:08]             │ info [docker:registry] 2020/10/30 19:59:11 source.ip: 172.17.0.1:49402, url.original: /package/system/0.7.0/
[00:00:08]             │ proc [kibana]   log   [19:59:11.250] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:08]             │ proc [kibana]   log   [19:59:11.251] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:08]             │ info [docker:registry] 2020/10/30 19:59:11 source.ip: 172.17.0.1:49414, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.10.0
[00:00:08]             │ info [docker:registry] 2020/10/30 19:59:11 source.ip: 172.17.0.1:49412, url.original: /package/system/0.7.0
[00:00:08]             │ info [docker:registry] 2020/10/30 19:59:11 source.ip: 172.17.0.1:49418, url.original: /package/system/0.7.0/
[00:00:08]             │ proc [kibana]   log   [19:59:11.341] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:08]             │ info [docker:registry] 2020/10/30 19:59:11 source.ip: 172.17.0.1:49422, url.original: /package/system/0.7.0
[00:00:08]             │ info [docker:registry] 2020/10/30 19:59:11 source.ip: 172.17.0.1:49426, url.original: /package/system/0.7.0/
[00:00:08]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/aSHY_J0BRMSAQ9XU1PpdAw] update_mapping [_doc]
[00:00:10]             │ info [o.e.x.s.a.r.TransportPutRoleAction] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] added role [fleet_enroll]
[00:00:10]             │ info [o.e.x.s.a.u.TransportPutUserAction] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] added user [fleet_enroll]
[00:00:11]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/aSHY_J0BRMSAQ9XU1PpdAw] update_mapping [_doc]
[00:00:12]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1604084137136921856] [.kibana_1/aSHY_J0BRMSAQ9XU1PpdAw] update_mapping [_doc]
[00:00:43]           └-: When on the Endpoint Policy Details Page
[00:00:43]             └-> "before all" hook
[00:01:04]             └-: and the save button is clicked
[00:01:04]               └-> "before all" hook
[00:01:04]               └-> should display success toast on successful save
[00:01:04]                 └-> "before each" hook: global before each
[00:01:04]                 └-> "before each" hook
[00:01:08]                   │ info Using cached retrieval of endpoint package
[00:01:08]                   │ proc [kibana]   log   [20:00:11.460] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:08]                   │ proc [kibana]   log   [20:00:11.461] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:08]                   │ info [docker:registry] 2020/10/30 20:00:11 source.ip: 172.17.0.1:52300, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:08]                   │ info [docker:registry] 2020/10/30 20:00:11 source.ip: 172.17.0.1:52298, url.original: /package/endpoint/0.16.0-dev.4
[00:01:08]                   │ info [docker:registry] 2020/10/30 20:00:11 source.ip: 172.17.0.1:52304, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:08]                   │ proc [kibana]   log   [20:00:11.610] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:08]                   │ info [docker:registry] 2020/10/30 20:00:11 source.ip: 172.17.0.1:52308, url.original: /package/endpoint/0.16.0-dev.4
[00:01:08]                   │ info [docker:registry] 2020/10/30 20:00:11 source.ip: 172.17.0.1:52312, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:11]                   │ debg navigateToActualUrl http://localhost:6191/app/security/administration/policy/84ca1e00-1aea-11eb-86dc-af578e67839f
[00:01:11]                   │ debg browser[INFO] http://localhost:6191/app/security/administration/policy/84ca1e00-1aea-11eb-86dc-af578e67839f?_t=1604088014478 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:01:11]                   │
[00:01:11]                   │ debg browser[INFO] http://localhost:6191/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:01:11]                   │ debg currentUrl = http://localhost:6191/app/security/administration/policy/84ca1e00-1aea-11eb-86dc-af578e67839f
[00:01:11]                   │          appUrl = http://localhost:6191/app/security/administration/policy/84ca1e00-1aea-11eb-86dc-af578e67839f
[00:01:11]                   │ debg TestSubjects.find(kibanaChrome)
[00:01:11]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:01:13]                   │ debg isGlobalLoadingIndicatorVisible
[00:01:13]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:01:13]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:01:13]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:01:13]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:01:13]                   │ proc [kibana]   log   [20:00:16.474] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:13]                   │ info [docker:registry] 2020/10/30 20:00:16 source.ip: 172.17.0.1:52614, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:14]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_dns']/../label') with timeout=10000
[00:01:14]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:01:14]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:01:14]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:01:14]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:01:14]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:01:14]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:01:14]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:01:14]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:01:14]                 │ debg Clicking modal confirm
[00:01:14]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:01:14]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:01:15]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:01:15]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:01:15]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:01:15]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:01:15]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:01:15]                 │ proc [kibana]   log   [20:00:17.905] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:15]                 │ proc [kibana]   log   [20:00:17.907] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:15]                 │ info [docker:registry] 2020/10/30 20:00:17 source.ip: 172.17.0.1:52694, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:15]                 │ info [docker:registry] 2020/10/30 20:00:17 source.ip: 172.17.0.1:52692, url.original: /package/endpoint/0.16.0-dev.4
[00:01:15]                 │ info [docker:registry] 2020/10/30 20:00:17 source.ip: 172.17.0.1:52698, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:15]                 │ proc [kibana]   log   [20:00:18.054] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:15]                 │ info [docker:registry] 2020/10/30 20:00:18 source.ip: 172.17.0.1:52708, url.original: /package/endpoint/0.16.0-dev.4
[00:01:15]                 │ info [docker:registry] 2020/10/30 20:00:18 source.ip: 172.17.0.1:52712, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:17]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:01:18]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:01:18]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:01:18]                 │ debg TestSubjects.getVisibleText(policyDetailsSuccessMessage)
[00:01:18]                 │ debg TestSubjects.find(policyDetailsSuccessMessage)
[00:01:18]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=10000
[00:01:18]                 └- ✓ pass  (3.5s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should display success toast on successful save"
[00:01:18]               └-> "after each" hook
[00:01:22]               └-> should persist update on the screen
[00:01:22]                 └-> "before each" hook: global before each
[00:01:22]                 └-> "before each" hook
[00:01:26]                   │ info Using cached retrieval of endpoint package
[00:01:26]                   │ proc [kibana]   log   [20:00:29.635] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:26]                   │ proc [kibana]   log   [20:00:29.637] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:26]                   │ info [docker:registry] 2020/10/30 20:00:29 source.ip: 172.17.0.1:53236, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:26]                   │ info [docker:registry] 2020/10/30 20:00:29 source.ip: 172.17.0.1:53234, url.original: /package/endpoint/0.16.0-dev.4
[00:01:26]                   │ info [docker:registry] 2020/10/30 20:00:29 source.ip: 172.17.0.1:53240, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:27]                   │ proc [kibana]   log   [20:00:29.785] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:27]                   │ info [docker:registry] 2020/10/30 20:00:29 source.ip: 172.17.0.1:53256, url.original: /package/endpoint/0.16.0-dev.4
[00:01:27]                   │ info [docker:registry] 2020/10/30 20:00:29 source.ip: 172.17.0.1:53260, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:29]                   │ debg navigateToActualUrl http://localhost:6191/app/security/administration/policy/8f9ea3a0-1aea-11eb-86dc-af578e67839f
[00:01:30]                   │ debg browser[INFO] http://localhost:6191/app/security/administration/policy/8f9ea3a0-1aea-11eb-86dc-af578e67839f?_t=1604088032666 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:01:30]                   │
[00:01:30]                   │ debg browser[INFO] http://localhost:6191/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:01:30]                   │ debg currentUrl = http://localhost:6191/app/security/administration/policy/8f9ea3a0-1aea-11eb-86dc-af578e67839f
[00:01:30]                   │          appUrl = http://localhost:6191/app/security/administration/policy/8f9ea3a0-1aea-11eb-86dc-af578e67839f
[00:01:30]                   │ debg TestSubjects.find(kibanaChrome)
[00:01:30]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:01:31]                   │ debg isGlobalLoadingIndicatorVisible
[00:01:31]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:01:31]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:01:31]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:01:31]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:01:31]                   │ proc [kibana]   log   [20:00:34.757] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:31]                   │ info [docker:registry] 2020/10/30 20:00:34 source.ip: 172.17.0.1:53480, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:32]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_process']/../label') with timeout=10000
[00:01:32]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:01:32]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:01:32]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:01:32]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:01:32]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:01:32]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:01:33]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:01:33]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:01:33]                 │ debg Clicking modal confirm
[00:01:33]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:01:33]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:01:33]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:01:33]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:01:33]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:01:33]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:01:33]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:01:33]                 │ proc [kibana]   log   [20:00:36.066] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:33]                 │ proc [kibana]   log   [20:00:36.067] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:33]                 │ info [docker:registry] 2020/10/30 20:00:36 source.ip: 172.17.0.1:53540, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:33]                 │ info [docker:registry] 2020/10/30 20:00:36 source.ip: 172.17.0.1:53538, url.original: /package/endpoint/0.16.0-dev.4
[00:01:33]                 │ info [docker:registry] 2020/10/30 20:00:36 source.ip: 172.17.0.1:53544, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:33]                 │ proc [kibana]   log   [20:00:36.204] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:33]                 │ info [docker:registry] 2020/10/30 20:00:36 source.ip: 172.17.0.1:53556, url.original: /package/endpoint/0.16.0-dev.4
[00:01:33]                 │ info [docker:registry] 2020/10/30 20:00:36 source.ip: 172.17.0.1:53562, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:35]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:01:36]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:01:36]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:01:36]                 │ debg navigateToActualUrl http://localhost:6191/app/security/administration/endpoints
[00:01:36]                 │ debg browser[INFO] http://localhost:6191/app/security/administration/endpoints?_t=1604088039088 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:01:36]                 │
[00:01:36]                 │ debg browser[INFO] http://localhost:6191/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:01:36]                 │ debg currentUrl = http://localhost:6191/app/security/administration/endpoints
[00:01:36]                 │          appUrl = http://localhost:6191/app/security/administration/endpoints
[00:01:36]                 │ debg TestSubjects.find(kibanaChrome)
[00:01:36]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:01:37]                 │ debg isGlobalLoadingIndicatorVisible
[00:01:37]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:01:37]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:01:38]                 │ proc [kibana]   log   [20:00:40.798] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:38]                 │ info [docker:registry] 2020/10/30 20:00:40 source.ip: 172.17.0.1:53724, url.original: /search?category=security&kibana.version=7.10.0
[00:01:38]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:01:38]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:01:38]                 │ proc [kibana]   log   [20:00:40.837] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:38]                 │ info [docker:registry] 2020/10/30 20:00:40 source.ip: 172.17.0.1:53732, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:38]                 │ proc [kibana]   log   [20:00:40.850] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:38]                 │ info [docker:registry] 2020/10/30 20:00:40 source.ip: 172.17.0.1:53738, url.original: /search?category=security&kibana.version=7.10.0
[00:01:38]                 │ debg navigateToActualUrl http://localhost:6191/app/security/administration/policy/8f9ea3a0-1aea-11eb-86dc-af578e67839f
[00:01:38]                 │ debg browser[INFO] http://localhost:6191/app/security/administration/policy/8f9ea3a0-1aea-11eb-86dc-af578e67839f?_t=1604088041394 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:01:38]                 │
[00:01:38]                 │ debg browser[INFO] http://localhost:6191/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:01:39]                 │ debg currentUrl = http://localhost:6191/app/security/administration/policy/8f9ea3a0-1aea-11eb-86dc-af578e67839f
[00:01:39]                 │          appUrl = http://localhost:6191/app/security/administration/policy/8f9ea3a0-1aea-11eb-86dc-af578e67839f
[00:01:39]                 │ debg TestSubjects.find(kibanaChrome)
[00:01:39]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:01:39]                 │ debg isGlobalLoadingIndicatorVisible
[00:01:39]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:01:39]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:01:40]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:01:40]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:01:40]                 │ proc [kibana]   log   [20:00:42.852] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:40]                 │ info [docker:registry] 2020/10/30 20:00:42 source.ip: 172.17.0.1:53794, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:40]                 │ debg TestSubjects.find(policyWindowsEvent_process)
[00:01:40]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_process"]') with timeout=10000
[00:01:40]                 └- ✓ pass  (8.1s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should persist update on the screen"
[00:01:40]               └-> "after each" hook
[00:01:45]               └-> should have updated policy data in overall Agent Policy
[00:01:45]                 └-> "before each" hook: global before each
[00:01:45]                 └-> "before each" hook
[00:01:50]                   │ info Using cached retrieval of endpoint package
[00:01:50]                   │ proc [kibana]   log   [20:00:52.804] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:50]                   │ proc [kibana]   log   [20:00:52.805] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:50]                   │ info [docker:registry] 2020/10/30 20:00:52 source.ip: 172.17.0.1:54062, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:50]                   │ info [docker:registry] 2020/10/30 20:00:52 source.ip: 172.17.0.1:54060, url.original: /package/endpoint/0.16.0-dev.4
[00:01:50]                   │ info [docker:registry] 2020/10/30 20:00:52 source.ip: 172.17.0.1:54066, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:50]                   │ proc [kibana]   log   [20:00:52.947] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:50]                   │ info [docker:registry] 2020/10/30 20:00:52 source.ip: 172.17.0.1:54074, url.original: /package/endpoint/0.16.0-dev.4
[00:01:50]                   │ info [docker:registry] 2020/10/30 20:00:52 source.ip: 172.17.0.1:54078, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:53]                   │ debg navigateToActualUrl http://localhost:6191/app/security/administration/policy/9d6d2f60-1aea-11eb-86dc-af578e67839f
[00:01:53]                   │ debg browser[INFO] http://localhost:6191/app/security/administration/policy/9d6d2f60-1aea-11eb-86dc-af578e67839f?_t=1604088055820 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:01:53]                   │
[00:01:53]                   │ debg browser[INFO] http://localhost:6191/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:01:53]                   │ debg currentUrl = http://localhost:6191/app/security/administration/policy/9d6d2f60-1aea-11eb-86dc-af578e67839f
[00:01:53]                   │          appUrl = http://localhost:6191/app/security/administration/policy/9d6d2f60-1aea-11eb-86dc-af578e67839f
[00:01:53]                   │ debg TestSubjects.find(kibanaChrome)
[00:01:53]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:01:54]                   │ debg isGlobalLoadingIndicatorVisible
[00:01:54]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:01:54]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:01:54]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:01:54]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:01:55]                   │ proc [kibana]   log   [20:00:57.778] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:55]                   │ info [docker:registry] 2020/10/30 20:00:57 source.ip: 172.17.0.1:54294, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:55]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_file']/../label') with timeout=10000
[00:01:55]                 │ debg Find.byXPath('//input[@data-test-subj='policyLinuxEvent_file']/../label') with timeout=10000
[00:01:55]                 │ debg Find.byXPath('//input[@data-test-subj='policyMacEvent_file']/../label') with timeout=10000
[00:01:56]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:01:56]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:01:56]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:01:56]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:01:56]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:01:56]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:01:56]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:01:56]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:01:56]                 │ debg Clicking modal confirm
[00:01:56]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:01:56]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:01:56]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:01:56]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:01:56]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:01:56]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:01:56]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:01:56]                 │ proc [kibana]   log   [20:00:59.307] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:56]                 │ proc [kibana]   log   [20:00:59.308] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:56]                 │ info [docker:registry] 2020/10/30 20:00:59 source.ip: 172.17.0.1:54374, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.10.0
[00:01:56]                 │ info [docker:registry] 2020/10/30 20:00:59 source.ip: 172.17.0.1:54372, url.original: /package/endpoint/0.16.0-dev.4
[00:01:56]                 │ info [docker:registry] 2020/10/30 20:00:59 source.ip: 172.17.0.1:54378, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:56]                 │ proc [kibana]   log   [20:00:59.445] [info][ingestManager][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:56]                 │ info [docker:registry] 2020/10/30 20:00:59 source.ip: 172.17.0.1:54384, url.original: /package/endpoint/0.16.0-dev.4
[00:01:56]                 │ info [docker:registry] 2020/10/30 20:00:59 source.ip: 172.17.0.1:54388, url.original: /package/endpoint/0.16.0-dev.4/
[00:01:59]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:01:59]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:01:59]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:01:59]                 │ info Taking screenshot "/dev/shm/workspace/parallel/9/kibana/x-pack/test/functional/screenshots/failure/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy.png"
[00:01:59]                 │ info Current URL is: http://localhost:6191/app/security/administration/policy/9d6d2f60-1aea-11eb-86dc-af578e67839f
[00:01:59]                 │ info Saving page source to: /dev/shm/workspace/parallel/9/kibana/x-pack/test/functional/failure_debug/html/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy.html
[00:01:59]                 └- ✖ fail: endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy
[00:01:59]                 │       Error: expected [ { id: '9d6d2f60-1aea-11eb-86dc-af578e67839f',
[00:01:59]                 │     revision: 2,
[00:01:59]                 │     name: 'Protect East Coast',
[00:01:59]                 │     type: 'endpoint',
[00:01:59]                 │     data_stream: { namespace: 'default' },
[00:01:59]                 │     use_output: 'default',
[00:01:59]                 │     artifact_manifest: 
[00:01:59]                 │      { schema_version: 'v1',
[00:01:59]                 │        manifest_version: '1.0.0',
[00:01:59]                 │        artifacts: [Object] },
[00:01:59]                 │     policy: { linux: [Object], windows: [Object], mac: [Object] },
[00:01:59]                 │     streams: [],
[00:01:59]                 │     meta: { package: [Object] } } ] to sort of equal [ { id: '9d6d2f60-1aea-11eb-86dc-af578e67839f',
[00:01:59]                 │     revision: 2,
[00:01:59]                 │     data_stream: { namespace: 'default' },
[00:01:59]                 │     name: 'Protect East Coast',
[00:01:59]                 │     meta: { package: [Object] },
[00:01:59]                 │     artifact_manifest: 
[00:01:59]                 │      { artifacts: [Object],
[00:01:59]                 │        manifest_version: '1.0.0',
[00:01:59]                 │        schema_version: 'v1' },
[00:01:59]                 │     policy: { linux: [Object], mac: [Object], windows: [Object] },
[00:01:59]                 │     streams: [],
[00:01:59]                 │     type: 'endpoint',
[00:01:59]                 │     use_output: 'default' } ]
[00:01:59]                 │       + expected - actual
[00:01:59]                 │ 
[00:01:59]                 │                }
[00:01:59]                 │                "malware": {
[00:01:59]                 │                  "mode": "prevent"
[00:01:59]                 │                }
[00:01:59]                 │       +        "popup": {
[00:01:59]                 │       +          "malware": {
[00:01:59]                 │       +            "enabled": true
[00:01:59]                 │       +            "message": ""
[00:01:59]                 │       +          }
[00:01:59]                 │       +        }
[00:01:59]                 │              }
[00:01:59]                 │              "windows": {
[00:01:59]                 │                "events": {
[00:01:59]                 │                  "dll_and_driver_load": true
[00:01:59]                 │ --
[00:01:59]                 │                }
[00:01:59]                 │                "malware": {
[00:01:59]                 │                  "mode": "prevent"
[00:01:59]                 │                }
[00:01:59]                 │       +        "popup": {
[00:01:59]                 │       +          "malware": {
[00:01:59]                 │       +            "enabled": true
[00:01:59]                 │       +            "message": ""
[00:01:59]                 │       +          }
[00:01:59]                 │       +        }
[00:01:59]                 │              }
[00:01:59]                 │            }
[00:01:59]                 │            "revision": 2
[00:01:59]                 │            "streams": []
[00:01:59]                 │       
[00:01:59]                 │       at Assertion.assert (/dev/shm/workspace/parallel/9/kibana/packages/kbn-expect/expect.js:100:11)
[00:01:59]                 │       at Assertion.eql (/dev/shm/workspace/parallel/9/kibana/packages/kbn-expect/expect.js:244:8)
[00:01:59]                 │       at Context.it (test/security_solution_endpoint/apps/endpoint/policy_details.ts:108:43)
[00:01:59]                 │ 
[00:01:59]                 │ 

Stack Trace

{ Error: expected [ { id: '9d6d2f60-1aea-11eb-86dc-af578e67839f',
    revision: 2,
    name: 'Protect East Coast',
    type: 'endpoint',
    data_stream: { namespace: 'default' },
    use_output: 'default',
    artifact_manifest: 
     { schema_version: 'v1',
       manifest_version: '1.0.0',
       artifacts: [Object] },
    policy: { linux: [Object], windows: [Object], mac: [Object] },
    streams: [],
    meta: { package: [Object] } } ] to sort of equal [ { id: '9d6d2f60-1aea-11eb-86dc-af578e67839f',
    revision: 2,
    data_stream: { namespace: 'default' },
    name: 'Protect East Coast',
    meta: { package: [Object] },
    artifact_manifest: 
     { artifacts: [Object],
       manifest_version: '1.0.0',
       schema_version: 'v1' },
    policy: { linux: [Object], mac: [Object], windows: [Object] },
    streams: [],
    type: 'endpoint',
    use_output: 'default' } ]
    at Assertion.assert (/dev/shm/workspace/parallel/9/kibana/packages/kbn-expect/expect.js:100:11)
    at Assertion.eql (/dev/shm/workspace/parallel/9/kibana/packages/kbn-expect/expect.js:244:8)
    at Context.it (test/security_solution_endpoint/apps/endpoint/policy_details.ts:108:43)
  actual:
   '[\n  {\n    "artifact_manifest": {\n      "artifacts": {\n        "endpoint-exceptionlist-macos-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-exceptionlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-exceptionlist-windows-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-exceptionlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-trustlist-linux-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-trustlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-trustlist-macos-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-trustlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-trustlist-windows-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-trustlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n      }\n      "manifest_version": "1.0.0"\n      "schema_version": "v1"\n    }\n    "data_stream": {\n      "namespace": "default"\n    }\n    "id": "9d6d2f60-1aea-11eb-86dc-af578e67839f"\n    "meta": {\n      "package": {\n        "name": "endpoint"\n        "version": "0.16.0-dev.4"\n      }\n    }\n    "name": "Protect East Coast"\n    "policy": {\n      "linux": {\n        "events": {\n          "file": false\n          "network": true\n          "process": true\n        }\n        "logging": {\n          "file": "info"\n        }\n      }\n      "mac": {\n        "events": {\n          "file": false\n          "network": true\n          "process": true\n        }\n        "logging": {\n          "file": "info"\n        }\n        "malware": {\n          "mode": "prevent"\n        }\n      }\n      "windows": {\n        "events": {\n          "dll_and_driver_load": true\n          "dns": true\n          "file": false\n          "network": true\n          "process": true\n          "registry": true\n          "security": true\n        }\n        "logging": {\n          "file": "info"\n        }\n        "malware": {\n          "mode": "prevent"\n        }\n      }\n    }\n    "revision": 2\n    "streams": []\n    "type": "endpoint"\n    "use_output": "default"\n  }\n]',
  expected:
   '[\n  {\n    "artifact_manifest": {\n      "artifacts": {\n        "endpoint-exceptionlist-macos-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-exceptionlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-exceptionlist-windows-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-exceptionlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-trustlist-linux-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-trustlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-trustlist-macos-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-trustlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n        "endpoint-trustlist-windows-v1": {\n          "compression_algorithm": "zlib"\n          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n          "decoded_size": 14\n          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n          "encoded_size": 22\n          "encryption_algorithm": "none"\n          "relative_url": "/api/endpoint/artifacts/download/endpoint-trustlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n        }\n      }\n      "manifest_version": "1.0.0"\n      "schema_version": "v1"\n    }\n    "data_stream": {\n      "namespace": "default"\n    }\n    "id": "9d6d2f60-1aea-11eb-86dc-af578e67839f"\n    "meta": {\n      "package": {\n        "name": "endpoint"\n        "version": "0.16.0-dev.4"\n      }\n    }\n    "name": "Protect East Coast"\n    "policy": {\n      "linux": {\n        "events": {\n          "file": false\n          "network": true\n          "process": true\n        }\n        "logging": {\n          "file": "info"\n        }\n      }\n      "mac": {\n        "events": {\n          "file": false\n          "network": true\n          "process": true\n        }\n        "logging": {\n          "file": "info"\n        }\n        "malware": {\n          "mode": "prevent"\n        }\n        "popup": {\n          "malware": {\n            "enabled": true\n            "message": ""\n          }\n        }\n      }\n      "windows": {\n        "events": {\n          "dll_and_driver_load": true\n          "dns": true\n          "file": false\n          "network": true\n          "process": true\n          "registry": true\n          "security": true\n        }\n        "logging": {\n          "file": "info"\n        }\n        "malware": {\n          "mode": "prevent"\n        }\n        "popup": {\n          "malware": {\n            "enabled": true\n            "message": ""\n          }\n        }\n      }\n    }\n    "revision": 2\n    "streams": []\n    "type": "endpoint"\n    "use_output": "default"\n  }\n]',
  showDiff: true }

Metrics [docs]

✅ unchanged

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
release_note:skip Skip the PR/issue when compiling release notes v7.10.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants