Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Lens] Fix bug in Safari and Firefox form rendering #92542

Merged
merged 2 commits into from
Feb 24, 2021

Conversation

wylieconlon
Copy link
Contributor

Fixes #92182

Checklist

Not sure how to test this except manually

@wylieconlon wylieconlon requested a review from a team February 23, 2021 23:49
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-app (Team:KibanaApp)

</EuiPanel>
</section>

<DimensionContainer
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For reviewers: the basic change is to extract this DimensionContainer component out of its previous location inside the section that we track by reference. I made this change by inspecting the EUI focus/blur events and noticing that they had a lot of shared parents, and that this was not needed in my local test case with EUI forms.

@flash1293
Copy link
Contributor

@elasticmachine merge upstream

Copy link
Contributor

@flash1293 flash1293 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tested in Chrome, Safari and Firefox and popovers close fine now, LGTM

@kibanamachine
Copy link
Contributor

💛 Build succeeded, but was flaky


Test Failures

Kibana Pipeline / general / X-Pack Endpoint Functional Tests.x-pack/test/security_solution_endpoint/apps/endpoint/policy_details·ts.endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has failed 4 times on tracked branches: https://github.com/elastic/kibana/issues/92567

[00:00:00]       │
[00:00:00]         └-: endpoint
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]             │ proc [kibana]   log   [10:33:42.158] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:33:42.161] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:33:42.163] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45590, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45592, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45588, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ proc [kibana]   log   [10:33:42.234] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:33:42.236] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:33:42.238] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45610, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45620, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45618, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ proc [kibana]   log   [10:33:42.244] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:33:42.246] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [10:33:42.247] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45632, url.original: /package/system/0.10.9
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45628, url.original: /package/endpoint/0.17.1
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45630, url.original: /package/elastic_agent/0.0.5
[00:00:00]             │ proc [kibana]   log   [10:33:42.267] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45645, url.original: /package/endpoint/0.17.1/
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45644, url.original: /package/elastic_agent/0.0.5/
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45642, url.original: /package/system/0.10.9/
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45650, url.original: /epr/elastic_agent/elastic_agent-0.0.5.zip
[00:00:00]             │ proc [kibana]   log   [10:33:42.280] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45656, url.original: /epr/endpoint/endpoint-0.17.1.zip
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [.kibana_8.0.0_001/hV6ZS6K1Q0-QNNAKK4Glng] update_mapping [_doc]
[00:00:00]             │ proc [kibana]   log   [10:33:42.297] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/24 10:33:42 source.ip: 172.17.0.1:45660, url.original: /epr/system/system-0.10.9.zip
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [.kibana_8.0.0_001/hV6ZS6K1Q0-QNNAKK4Glng] update_mapping [_doc]
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [.kibana_8.0.0_001/hV6ZS6K1Q0-QNNAKK4Glng] update_mapping [_doc]
[00:00:01]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [.kibana_8.0.0_001/hV6ZS6K1Q0-QNNAKK4Glng] update_mapping [_doc]
[00:00:01]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [.kibana_8.0.0_001/hV6ZS6K1Q0-QNNAKK4Glng] update_mapping [_doc]
[00:00:02]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index lifecycle policy [logs-endpoint.collection-diagnostic]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [.kibana_8.0.0_001/hV6ZS6K1Q0-QNNAKK4Glng] update_mapping [_doc]
[00:00:04]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding component template [metrics-elastic_agent.elastic_agent-mappings]
[00:00:04]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-elastic_agent.elastic_agent] for index patterns [metrics-elastic_agent.elastic_agent-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding component template [logs-endpoint.alerts-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding component template [.logs-endpoint.diagnostic.collection-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding component template [metrics-endpoint.metadata-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding component template [logs-endpoint.events.library-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding component template [logs-endpoint.events.network-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding component template [logs-endpoint.events.process-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding component template [logs-endpoint.events.file-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding component template [metrics-endpoint.metrics-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding component template [metrics-endpoint.policy-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding component template [logs-endpoint.events.security-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding component template [logs-endpoint.events.registry-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [logs-system.application] for index patterns [logs-system.application-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [logs-system.security] for index patterns [logs-system.security-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [logs-system.system] for index patterns [logs-system.system-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [.logs-endpoint.diagnostic.collection] for index patterns [.logs-endpoint.diagnostic.collection-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:08]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [.transform-internal-006] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:08]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] updating number_of_replicas to [0] for indices [.transform-internal-006]
[00:00:08]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-internal-006][0]]])." previous.health="YELLOW" reason="shards started [[.transform-internal-006][0]]"
[00:00:08]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:08]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:08]             │ info [o.e.x.t.t.p.SchemaUtil] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] Failed to deduce mapping for [agent.id], fall back to keyword. Create the destination index with complete mappings first to avoid deducing the mappings
[00:00:08]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:08]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:08]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[metrics-endpoint.metadata_current_default][0]]])." previous.health="YELLOW" reason="shards started [[metrics-endpoint.metadata_current_default][0]]"
[00:00:08]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [endpoint.metadata_current-default-0.17.1] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:08]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [endpoint.metadata_current-default-0.17.1] successfully completed and scheduled task in node operation
[00:00:10]             │ proc [kibana]   log   [10:33:52.819] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:10]             │ info [docker:registry] 2021/02/24 10:33:52 source.ip: 172.17.0.1:46420, url.original: /search?package=system&internal=true&experimental=true
[00:00:10]             │ proc [kibana]   log   [10:33:52.844] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:10]             │ info [docker:registry] 2021/02/24 10:33:52 source.ip: 172.17.0.1:46426, url.original: /search?package=system&internal=true&experimental=true
[00:00:10]             │ proc [kibana]   log   [10:33:52.856] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:10]             │ info [docker:registry] 2021/02/24 10:33:52 source.ip: 172.17.0.1:46430, url.original: /package/system/0.10.9
[00:00:10]             │ info [docker:registry] 2021/02/24 10:33:52 source.ip: 172.17.0.1:46434, url.original: /package/system/0.10.9/
[00:00:10]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [.kibana_8.0.0_001/hV6ZS6K1Q0-QNNAKK4Glng] update_mapping [_doc]
[00:00:12]             │ info [o.e.x.s.a.r.TransportPutRoleAction] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] added role [fleet_enroll]
[00:00:12]             │ info [o.e.x.s.a.u.TransportPutUserAction] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] added user [fleet_enroll]
[00:00:14]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [.kibana_8.0.0_001/hV6ZS6K1Q0-QNNAKK4Glng] update_mapping [_doc]
[00:00:14]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-centos-tests-xxl-1614157766773481717] [.kibana_8.0.0_001/hV6ZS6K1Q0-QNNAKK4Glng] update_mapping [_doc]
[00:00:47]           └-: When on the Endpoint Policy Details Page
[00:00:47]             └-> "before all" hook in "When on the Endpoint Policy Details Page"
[00:02:11]             └-: and the save button is clicked
[00:02:11]               └-> "before all" hook for "should display success toast on successful save"
[00:02:11]               └-> should display success toast on successful save
[00:02:11]                 └-> "before each" hook: global before each for "should display success toast on successful save"
[00:02:11]                 └-> "before each" hook for "should display success toast on successful save"
[00:02:14]                   │ info Using cached retrieval of endpoint package
[00:02:15]                   │ proc [kibana]   log   [10:35:57.684] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:15]                   │ info [docker:registry] 2021/02/24 10:35:57 source.ip: 172.17.0.1:55884, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:15]                   │ proc [kibana]   log   [10:35:57.709] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:15]                   │ info [docker:registry] 2021/02/24 10:35:57 source.ip: 172.17.0.1:55890, url.original: /package/endpoint/0.17.1
[00:02:15]                   │ info [docker:registry] 2021/02/24 10:35:57 source.ip: 172.17.0.1:55894, url.original: /package/endpoint/0.17.1/
[00:02:18]                   │ debg navigateToActualUrl http://localhost:61131/app/security/administration/policy/1276f86f-92cf-4740-9f30-4b3c74d189be
[00:02:18]                   │ debg browser[INFO] http://localhost:61131/app/security/administration/policy/1276f86f-92cf-4740-9f30-4b3c74d189be?_t=1614162960132 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:18]                   │
[00:02:18]                   │ debg browser[INFO] http://localhost:61131/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:18]                   │ debg currentUrl = http://localhost:61131/app/security/administration/policy/1276f86f-92cf-4740-9f30-4b3c74d189be
[00:02:18]                   │          appUrl = http://localhost:61131/app/security/administration/policy/1276f86f-92cf-4740-9f30-4b3c74d189be
[00:02:18]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:18]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:19]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:19]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:19]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:20]                   │ proc [kibana]   log   [10:36:02.150] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:20]                   │ info [docker:registry] 2021/02/24 10:36:02 source.ip: 172.17.0.1:56242, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:20]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:20]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:20]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_dns']/../label') with timeout=10000
[00:02:21]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:21]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:21]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:21]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:21]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:21]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:21]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:21]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:21]                 │ debg Clicking modal confirm
[00:02:21]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:21]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:21]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:21]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:21]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:21]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:21]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:21]                 │ proc [kibana]   log   [10:36:03.603] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:21]                 │ info [docker:registry] 2021/02/24 10:36:03 source.ip: 172.17.0.1:56334, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:21]                 │ proc [kibana]   log   [10:36:03.612] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:21]                 │ info [docker:registry] 2021/02/24 10:36:03 source.ip: 172.17.0.1:56338, url.original: /package/endpoint/0.17.1
[00:02:21]                 │ info [docker:registry] 2021/02/24 10:36:03 source.ip: 172.17.0.1:56342, url.original: /package/endpoint/0.17.1/
[00:02:23]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:24]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:24]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:24]                 │ debg TestSubjects.getVisibleText(policyDetailsSuccessMessage)
[00:02:24]                 │ debg TestSubjects.find(policyDetailsSuccessMessage)
[00:02:24]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=10000
[00:02:24]                 └- ✓ pass  (3.6s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should display success toast on successful save"
[00:02:24]               └-> "after each" hook for "should display success toast on successful save"
[00:02:29]               └-> should persist update on the screen
[00:02:29]                 └-> "before each" hook: global before each for "should persist update on the screen"
[00:02:29]                 └-> "before each" hook for "should persist update on the screen"
[00:02:33]                   │ info Using cached retrieval of endpoint package
[00:02:33]                   │ proc [kibana]   log   [10:36:16.001] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:33]                   │ info [docker:registry] 2021/02/24 10:36:16 source.ip: 172.17.0.1:56690, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:33]                   │ proc [kibana]   log   [10:36:16.031] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:33]                   │ info [docker:registry] 2021/02/24 10:36:16 source.ip: 172.17.0.1:56694, url.original: /package/endpoint/0.17.1
[00:02:33]                   │ info [docker:registry] 2021/02/24 10:36:16 source.ip: 172.17.0.1:56698, url.original: /package/endpoint/0.17.1/
[00:02:36]                   │ debg navigateToActualUrl http://localhost:61131/app/security/administration/policy/048f6fb3-b589-4f8a-8bf6-a3b03a8f6911
[00:02:36]                   │ debg browser[INFO] http://localhost:61131/app/security/administration/policy/048f6fb3-b589-4f8a-8bf6-a3b03a8f6911?_t=1614162978321 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:36]                   │
[00:02:36]                   │ debg browser[INFO] http://localhost:61131/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:36]                   │ debg currentUrl = http://localhost:61131/app/security/administration/policy/048f6fb3-b589-4f8a-8bf6-a3b03a8f6911
[00:02:36]                   │          appUrl = http://localhost:61131/app/security/administration/policy/048f6fb3-b589-4f8a-8bf6-a3b03a8f6911
[00:02:36]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:36]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:37]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:37]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:37]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:38]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:38]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:38]                   │ proc [kibana]   log   [10:36:20.826] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:38]                   │ info [docker:registry] 2021/02/24 10:36:20 source.ip: 172.17.0.1:56890, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:39]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_process']/../label') with timeout=10000
[00:02:39]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:39]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:39]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:39]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:39]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:39]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:39]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:39]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:39]                 │ debg Clicking modal confirm
[00:02:39]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:39]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:40]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:40]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:40]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:40]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:40]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:40]                 │ proc [kibana]   log   [10:36:22.291] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:40]                 │ info [docker:registry] 2021/02/24 10:36:22 source.ip: 172.17.0.1:56968, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:40]                 │ proc [kibana]   log   [10:36:22.300] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:40]                 │ info [docker:registry] 2021/02/24 10:36:22 source.ip: 172.17.0.1:56972, url.original: /package/endpoint/0.17.1
[00:02:40]                 │ info [docker:registry] 2021/02/24 10:36:22 source.ip: 172.17.0.1:56976, url.original: /package/endpoint/0.17.1/
[00:02:42]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:43]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:43]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:43]                 │ debg navigateToActualUrl http://localhost:61131/app/security/administration/endpoints
[00:02:43]                 │ debg browser[INFO] http://localhost:61131/app/security/administration/endpoints?_t=1614162985514 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:43]                 │
[00:02:43]                 │ debg browser[INFO] http://localhost:61131/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:43]                 │ debg currentUrl = http://localhost:61131/app/security/administration/endpoints
[00:02:43]                 │          appUrl = http://localhost:61131/app/security/administration/endpoints
[00:02:43]                 │ debg TestSubjects.find(kibanaChrome)
[00:02:43]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:44]                 │ debg isGlobalLoadingIndicatorVisible
[00:02:44]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:44]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:45]                 │ proc [kibana]   log   [10:36:27.378] [info][plugins][securitySolution] Committed manifest 1.0.1
[00:02:45]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:45]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:45]                 │ proc [kibana]   log   [10:36:27.751] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:45]                 │ info [docker:registry] 2021/02/24 10:36:27 source.ip: 172.17.0.1:57146, url.original: /search?category=security
[00:02:45]                 │ proc [kibana]   log   [10:36:27.805] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:45]                 │ info [docker:registry] 2021/02/24 10:36:27 source.ip: 172.17.0.1:57152, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:45]                 │ proc [kibana]   log   [10:36:27.861] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:45]                 │ info [docker:registry] 2021/02/24 10:36:27 source.ip: 172.17.0.1:57156, url.original: /search?category=security
[00:02:46]                 │ debg navigateToActualUrl http://localhost:61131/app/security/administration/policy/048f6fb3-b589-4f8a-8bf6-a3b03a8f6911
[00:02:46]                 │ debg browser[INFO] http://localhost:61131/app/security/administration/policy/048f6fb3-b589-4f8a-8bf6-a3b03a8f6911?_t=1614162988596 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:46]                 │
[00:02:46]                 │ debg browser[INFO] http://localhost:61131/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:47]                 │ debg currentUrl = http://localhost:61131/app/security/administration/policy/048f6fb3-b589-4f8a-8bf6-a3b03a8f6911
[00:02:47]                 │          appUrl = http://localhost:61131/app/security/administration/policy/048f6fb3-b589-4f8a-8bf6-a3b03a8f6911
[00:02:47]                 │ debg TestSubjects.find(kibanaChrome)
[00:02:47]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:47]                 │ debg isGlobalLoadingIndicatorVisible
[00:02:47]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:47]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:48]                 │ proc [kibana]   log   [10:36:30.179] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:48]                 │ info [docker:registry] 2021/02/24 10:36:30 source.ip: 172.17.0.1:57206, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:48]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:48]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:48]                 │ debg TestSubjects.find(policyWindowsEvent_process)
[00:02:48]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_process"]') with timeout=10000
[00:02:48]                 └- ✓ pass  (9.4s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should persist update on the screen"
[00:02:48]               └-> "after each" hook for "should persist update on the screen"
[00:02:53]               └-> should have updated policy data in overall Agent Policy
[00:02:53]                 └-> "before each" hook: global before each for "should have updated policy data in overall Agent Policy"
[00:02:53]                 └-> "before each" hook for "should have updated policy data in overall Agent Policy"
[00:02:57]                   │ info Using cached retrieval of endpoint package
[00:02:58]                   │ proc [kibana]   log   [10:36:40.258] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:58]                   │ info [docker:registry] 2021/02/24 10:36:40 source.ip: 172.17.0.1:58144, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:58]                   │ proc [kibana]   log   [10:36:40.324] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:58]                   │ info [docker:registry] 2021/02/24 10:36:40 source.ip: 172.17.0.1:58148, url.original: /package/endpoint/0.17.1
[00:02:58]                   │ info [docker:registry] 2021/02/24 10:36:40 source.ip: 172.17.0.1:58152, url.original: /package/endpoint/0.17.1/
[00:03:00]                   │ debg navigateToActualUrl http://localhost:61131/app/security/administration/policy/f78fa686-8a00-48d3-be86-1ba124672fff
[00:03:00]                   │ debg browser[INFO] http://localhost:61131/app/security/administration/policy/f78fa686-8a00-48d3-be86-1ba124672fff?_t=1614163002561 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:00]                   │
[00:03:00]                   │ debg browser[INFO] http://localhost:61131/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:00]                   │ debg currentUrl = http://localhost:61131/app/security/administration/policy/f78fa686-8a00-48d3-be86-1ba124672fff
[00:03:00]                   │          appUrl = http://localhost:61131/app/security/administration/policy/f78fa686-8a00-48d3-be86-1ba124672fff
[00:03:00]                   │ debg TestSubjects.find(kibanaChrome)
[00:03:00]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:02]                   │ debg isGlobalLoadingIndicatorVisible
[00:03:02]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:03:02]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:03:03]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:03:03]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:03:03]                   │ proc [kibana]   log   [10:36:45.382] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:03]                   │ info [docker:registry] 2021/02/24 10:36:45 source.ip: 172.17.0.1:58482, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:04]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_file']/../label') with timeout=10000
[00:03:04]                 │ debg Find.byXPath('//input[@data-test-subj='policyLinuxEvent_file']/../label') with timeout=10000
[00:03:04]                 │ debg Find.byXPath('//input[@data-test-subj='policyMacEvent_file']/../label') with timeout=10000
[00:03:05]                 │ warn WebElementWrapper.click: element click intercepted: Element <label class="euiCheckbox__label" for="i31123d35-768c-11eb-8895-f157d7943d9d">...</label> is not clickable at point (447, 36). Other element would receive the click: <div class="euiHeader euiHeader--dark euiHeader--fixed header__firstBar">...</div>
[00:03:05]                 │        (Session info: headless chrome=88.0.4324.182)
[00:03:05]                 │ debg finding element 'By(xpath, //input[@data-test-subj='policyWindowsEvent_file']/../label)' again, 2 attempts left
[00:03:05]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:05]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:05]                 │ debg TestSubjects.find(advancedPolicyButton)
[00:03:05]                 │ debg Find.findByCssSelector('[data-test-subj="advancedPolicyButton"]') with timeout=10000
[00:03:05]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:05]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:06]                 │ debg TestSubjects.find(linux.advanced.agent.connection_delay)
[00:03:06]                 │ debg Find.findByCssSelector('[data-test-subj="linux.advanced.agent.connection_delay"]') with timeout=10000
[00:03:06]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:06]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:06]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:03:06]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:03:06]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:03:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:03:06]                 │ debg Clicking modal confirm
[00:03:06]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:03:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:03:06]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:03:06]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:03:06]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:03:06]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:03:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:03:06]                 │ proc [kibana]   log   [10:36:48.915] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:06]                 │ info [docker:registry] 2021/02/24 10:36:48 source.ip: 172.17.0.1:58748, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:06]                 │ proc [kibana]   log   [10:36:48.923] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:06]                 │ info [docker:registry] 2021/02/24 10:36:48 source.ip: 172.17.0.1:58752, url.original: /package/endpoint/0.17.1
[00:03:06]                 │ info [docker:registry] 2021/02/24 10:36:48 source.ip: 172.17.0.1:58756, url.original: /package/endpoint/0.17.1/
[00:03:09]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:03:09]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:03:09]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:03:09]                 └- ✓ pass  (5.5s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy"
[00:03:09]               └-> "after each" hook for "should have updated policy data in overall Agent Policy"
[00:03:14]               └-> should have cleared the advanced section when the user deletes the value
[00:03:14]                 └-> "before each" hook: global before each for "should have cleared the advanced section when the user deletes the value"
[00:03:14]                 └-> "before each" hook for "should have cleared the advanced section when the user deletes the value"
[00:03:18]                   │ info Using cached retrieval of endpoint package
[00:03:19]                   │ proc [kibana]   log   [10:37:01.246] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:19]                   │ info [docker:registry] 2021/02/24 10:37:01 source.ip: 172.17.0.1:59436, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:19]                   │ proc [kibana]   log   [10:37:01.264] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:19]                   │ info [docker:registry] 2021/02/24 10:37:01 source.ip: 172.17.0.1:59440, url.original: /package/endpoint/0.17.1
[00:03:19]                   │ info [docker:registry] 2021/02/24 10:37:01 source.ip: 172.17.0.1:59444, url.original: /package/endpoint/0.17.1/
[00:03:21]                   │ debg navigateToActualUrl http://localhost:61131/app/security/administration/policy/91681479-3c96-48cc-844a-6c85694df3ee
[00:03:21]                   │ debg browser[INFO] http://localhost:61131/app/security/administration/policy/91681479-3c96-48cc-844a-6c85694df3ee?_t=1614163023731 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:21]                   │
[00:03:21]                   │ debg browser[INFO] http://localhost:61131/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:21]                   │ debg currentUrl = http://localhost:61131/app/security/administration/policy/91681479-3c96-48cc-844a-6c85694df3ee
[00:03:21]                   │          appUrl = http://localhost:61131/app/security/administration/policy/91681479-3c96-48cc-844a-6c85694df3ee
[00:03:21]                   │ debg TestSubjects.find(kibanaChrome)
[00:03:21]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:23]                   │ debg isGlobalLoadingIndicatorVisible
[00:03:23]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:03:23]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:03:23]                   │ proc [kibana]   log   [10:37:05.723] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:23]                   │ info [docker:registry] 2021/02/24 10:37:05 source.ip: 172.17.0.1:59730, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:24]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:03:24]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:03:24]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:24]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:24]                 │ debg TestSubjects.find(advancedPolicyButton)
[00:03:24]                 │ debg Find.findByCssSelector('[data-test-subj="advancedPolicyButton"]') with timeout=10000
[00:03:24]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:24]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:24]                 │ debg TestSubjects.find(linux.advanced.agent.connection_delay)
[00:03:24]                 │ debg Find.findByCssSelector('[data-test-subj="linux.advanced.agent.connection_delay"]') with timeout=10000
[00:03:25]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:25]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:25]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:25]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:25]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:03:25]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:03:25]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:03:25]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:03:25]                 │ debg Clicking modal confirm
[00:03:25]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:03:25]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:03:25]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:03:25]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:03:25]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:03:25]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:03:25]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:03:25]                 │ proc [kibana]   log   [10:37:07.698] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:25]                 │ info [docker:registry] 2021/02/24 10:37:07 source.ip: 172.17.0.1:60012, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:25]                 │ proc [kibana]   log   [10:37:07.707] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:25]                 │ info [docker:registry] 2021/02/24 10:37:07 source.ip: 172.17.0.1:60016, url.original: /package/endpoint/0.17.1
[00:03:25]                 │ info [docker:registry] 2021/02/24 10:37:07 source.ip: 172.17.0.1:60020, url.original: /package/endpoint/0.17.1/
[00:03:28]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:03:28]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:03:28]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:03:28]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:28]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:28]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:28]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:28]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:03:28]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:03:30]                 │ warn WebElementWrapper.click: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItem" id="0">...</div>
[00:03:30]                 │        (Session info: headless chrome=88.0.4324.182)
[00:03:30]                 │ debg finding element 'By(css selector, [data-test-subj="policyDetailsSaveButton"])' again, 2 attempts left
[00:03:31]                 │ warn WebElementWrapper.click: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItem" id="0">...</div>
[00:03:31]                 │        (Session info: headless chrome=88.0.4324.182)
[00:03:31]                 │ debg finding element 'By(css selector, [data-test-subj="policyDetailsSaveButton"])' again, 1 attempts left
[00:03:32]                 │ warn WebElementWrapper.click: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItem" id="0">...</div>
[00:03:32]                 │        (Session info: headless chrome=88.0.4324.182)
[00:03:32]                 │ debg finding element 'By(css selector, [data-test-subj="policyDetailsSaveButton"])' again, 0 attempts left
[00:03:33]                 │ info Taking screenshot "/dev/shm/workspace/parallel/13/kibana/x-pack/test/functional/screenshots/failure/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value.png"
[00:03:34]                 │ info Current URL is: http://localhost:61131/app/security/administration/policy/91681479-3c96-48cc-844a-6c85694df3ee
[00:03:34]                 │ info Saving page source to: /dev/shm/workspace/parallel/13/kibana/x-pack/test/functional/failure_debug/html/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value.html
[00:03:34]                 └- ✖ fail: endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value
[00:03:34]                 │       ElementClickInterceptedError: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItemeuiGlobalToastListItem-isDismissed" id="0">...</div>
[00:03:34]                 │   (Session info: headless chrome=88.0.4324.182)
[00:03:34]                 │       at Object.throwDecodedError (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/error.js:550:15)
[00:03:34]                 │       at parseHttpResponse (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/http.js:565:13)
[00:03:34]                 │       at Executor.execute (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/http.js:491:26)
[00:03:34]                 │       at runMicrotasks (<anonymous>)
[00:03:34]                 │       at processTicksAndRejections (internal/process/task_queues.js:93:5)
[00:03:34]                 │       at Task.exec (/dev/shm/workspace/parallel/13/kibana/test/functional/services/remote/prevent_parallel_calls.ts:29:22)
[00:03:34]                 │ 
[00:03:34]                 │ 

Stack Trace

ElementClickInterceptedError: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItem euiGlobalToastListItem-isDismissed" id="0">...</div>
  (Session info: headless chrome=88.0.4324.182)
    at Object.throwDecodedError (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/error.js:550:15)
    at parseHttpResponse (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/http.js:565:13)
    at Executor.execute (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/http.js:491:26)
    at runMicrotasks (<anonymous>)
    at processTicksAndRejections (internal/process/task_queues.js:93:5)
    at Task.exec (/dev/shm/workspace/parallel/13/kibana/test/functional/services/remote/prevent_parallel_calls.ts:29:22) {
  remoteStacktrace: '#0 0x562ef52f7199 <unknown>\n'
}

Metrics [docs]

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
lens 918.2KB 918.3KB +107.0B

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

@wylieconlon wylieconlon merged commit 78bed9e into elastic:master Feb 24, 2021
@wylieconlon wylieconlon deleted the lens/fix-focus-firefox branch February 24, 2021 19:05
wylieconlon pushed a commit to wylieconlon/kibana that referenced this pull request Feb 24, 2021
wylieconlon pushed a commit that referenced this pull request Feb 24, 2021
wylieconlon pushed a commit that referenced this pull request Feb 24, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Lens] Inputs with dropdowns in Safari keeps on opening if when clicking elsewhere
4 participants