Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

User cannot open Kibana in private browsing with cookies blocked #41444

Closed
bhavyarm opened this issue Jul 18, 2019 · 4 comments
Closed

User cannot open Kibana in private browsing with cookies blocked #41444

bhavyarm opened this issue Jul 18, 2019 · 4 comments
Labels
bug Fixes for quality problems that affect the customer experience Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!

Comments

@bhavyarm
Copy link
Contributor

Kibana version: 7.3.0 BC4

Elasticsearch version: 7.3.0 BC4

Browser version: Safari latest

Browser OS version: OS x

Original install method (e.g. download page, yum, from source, etc.): from staging

Describe the bug: If user disables cookies and website data on safari - Kibana doesn't work and displays:

Version: 7.3.0
Build: 25132
Error: The operation is insecure.
_callee$@http://localhost:5601/bundles/commons.bundle.js:3:1664751

Steps to reproduce:

  1. Open safari browser -> preferences -> check the option for always block cookies and website data
  2. Open kibana
  3. Kibana can't run and displays
Version: 7.3.0
Build: 25132
Error: The operation is insecure.
_callee$@http://localhost:5601/bundles/commons.bundle.js:3:1664751
tryCatch@http://localhost:5601/built_assets/dlls/vendors.bundle.dll.js:541:455188
invoke@http://localhost:5601/built_assets/dlls/vendors.bundle.dll.js:541:459027
asyncGeneratorStep@http://localhost:5601/bundles/commons.bundle.js:3:1661925
_next@http://localhost:5601/bundles/commons.bundle.js:3:1662253
http://localhost:5601/bundles/commons.bundle.js:3:1662390
initializePromise@[native code]
Promise@[native code]
http://localhost:5601/bundles/commons.bundle.js:3:1662159
tryCatch@http://localhost:5601/built_assets/dlls/vendors.bundle.dll.js:541:455188
invoke@http://localhost:5601/built_assets/dlls/vendors.bundle.dll.js:541:459027
asyncGeneratorStep@http://localhost:5601/bundles/commons.bundle.js:3:1824801
_next@http://localhost:5601/bundles/commons.bundle.js:3:1825129
promiseReactionJob@[native code]

Browser logs:

[Error] SecurityError: The operation is insecure.
_callee$ — commons.bundle.js:60171:89
tryCatch — vendors.bundle.dll.js:541:455189
invoke — vendors.bundle.dll.js:541:459028
asyncGeneratorStep — commons.bundle.js:60060
_next — commons.bundle.js:60079
(anonymous function) — commons.bundle.js:60084
initializePromise
Promise
(anonymous function) — commons.bundle.js:60076
tryCatch — vendors.bundle.dll.js:541:455189
invoke — vendors.bundle.dll.js:541:459028
asyncGeneratorStep — commons.bundle.js:66322
_next — commons.bundle.js:66341
promiseReactionJob

	add (commons.bundle.js:3:1734929)
	_callee2$ (commons.bundle.js:3:1832017)
	tryCatch (vendors.bundle.dll.js:541:455189)
	invoke (vendors.bundle.dll.js:541:459028)
	asyncGeneratorStep (commons.bundle.js:3:1824802)
	_throw (commons.bundle.js:3:1825216)
	promiseReactionJob
[Error] Unhandled Promise Rejection: SecurityError: The operation is insecure.

Screenshots (if relevant):
Screen Shot 2019-07-18 at 6 19 51 AM

@bhavyarm bhavyarm added bug Fixes for quality problems that affect the customer experience Team:Operations Team label for Operations Team labels Jul 18, 2019
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-operations

@jbudz
Copy link
Member

jbudz commented Aug 13, 2019

👍 we can probably do a check + message to make sure cookies are enabled

@tylersmalley tylersmalley added 1 and removed 1 labels Oct 11, 2021
@tylersmalley tylersmalley added Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! and removed Team:Operations Team label for Operations Team labels Nov 5, 2021
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security)

@legrego
Copy link
Member

legrego commented May 11, 2022

Closing in favor of #121189

@legrego legrego closed this as completed May 11, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Fixes for quality problems that affect the customer experience Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects
None yet
Development

No branches or pull requests

5 participants