Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[7.17] [Maps] Update [email protected] #188121

Merged
merged 1 commit into from
Jul 12, 2024

Update [email protected]

ececa4b
Select commit
Loading
Failed to load commit list.
Merged

[7.17] [Maps] Update [email protected] #188121

Update [email protected]
ececa4b
Select commit
Loading
Failed to load commit list.
checks-reporter / X-Pack Chrome Functional tests / Group Docker succeeded Jul 11, 2024 in 49m 35s

node scripts/functional_tests --bail --kibana-install-dir /opt/local-ssd/buildkite/builds/bk-agent-prod-gcp-1720714042198591974/elastic/kibana-pull-request/kibana-build-xpack --include-tag ciGroupDocker

Details

[truncated]
ok: global before each for "should not upgrade an unenrolling agent during bulk_upgrade"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should not upgrade an unenrolling agent during bulk_upgrade"
             └-> "before each" hook for "should not upgrade an unenrolling agent during bulk_upgrade"
             └- ✓ pass  (3.4s)
           └-> "after each" hook for "should not upgrade an unenrolling agent during bulk_upgrade"
           └-> should not upgrade an unenrolled agent during bulk_upgrade
             └-> "before each" hook: global before each for "should not upgrade an unenrolled agent during bulk_upgrade"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should not upgrade an unenrolled agent during bulk_upgrade"
             └-> "before each" hook for "should not upgrade an unenrolled agent during bulk_upgrade"
             └- ✓ pass  (2.4s)
           └-> "after each" hook for "should not upgrade an unenrolled agent during bulk_upgrade"
           └-> should not upgrade an non upgradeable agent during bulk_upgrade
             └-> "before each" hook: global before each for "should not upgrade an non upgradeable agent during bulk_upgrade"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should not upgrade an non upgradeable agent during bulk_upgrade"
             └-> "before each" hook for "should not upgrade an non upgradeable agent during bulk_upgrade"
             └- ✓ pass  (3.4s)
           └-> "after each" hook for "should not upgrade an non upgradeable agent during bulk_upgrade"
           └-> should upgrade a non upgradeable agent during bulk_upgrade with force flag
             └-> "before each" hook: global before each for "should upgrade a non upgradeable agent during bulk_upgrade with force flag"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should upgrade a non upgradeable agent during bulk_upgrade with force flag"
             └-> "before each" hook for "should upgrade a non upgradeable agent during bulk_upgrade with force flag"
             └- ✓ pass  (3.3s)
           └-> "after each" hook for "should upgrade a non upgradeable agent during bulk_upgrade with force flag"
           └-> should respond 400 if trying to bulk upgrade to a version that does not match installed kibana version
             └-> "before each" hook: global before each for "should respond 400 if trying to bulk upgrade to a version that does not match installed kibana version"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should respond 400 if trying to bulk upgrade to a version that does not match installed kibana version"
             └-> "before each" hook for "should respond 400 if trying to bulk upgrade to a version that does not match installed kibana version"
             └- ✓ pass  (1.4s)
           └-> "after each" hook for "should respond 400 if trying to bulk upgrade to a version that does not match installed kibana version"
           └-> should respond 400 if trying to bulk upgrade to a version that does not match installed kibana version
             └-> "before each" hook: global before each for "should respond 400 if trying to bulk upgrade to a version that does not match installed kibana version"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should respond 400 if trying to bulk upgrade to a version that does not match installed kibana version"
             └-> "before each" hook for "should respond 400 if trying to bulk upgrade to a version that does not match installed kibana version"
             └- ✓ pass  (1.4s)
           └-> "after each" hook for "should respond 400 if trying to bulk upgrade to a version that does not match installed kibana version"
           └-> enrolled in a hosted agent policy bulk upgrade should respond with 200 and object of results. Should not update the hosted agent SOs
             └-> "before each" hook: global before each for "enrolled in a hosted agent policy bulk upgrade should respond with 200 and object of results. Should not update the hosted agent SOs"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "enrolled in a hosted agent policy bulk upgrade should respond with 200 and object of results. Should not update the hosted agent SOs"
             └-> "before each" hook for "enrolled in a hosted agent policy bulk upgrade should respond with 200 and object of results. Should not update the hosted agent SOs"
             └- ✓ pass  (4.4s)
           └-> "after each" hook for "enrolled in a hosted agent policy bulk upgrade should respond with 200 and object of results. Should not update the hosted agent SOs"
           └-> enrolled in a hosted agent policy bulk upgrade with force flag should respond with 200 and update the agent SOs
             └-> "before each" hook: global before each for "enrolled in a hosted agent policy bulk upgrade with force flag should respond with 200 and update the agent SOs"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "enrolled in a hosted agent policy bulk upgrade with force flag should respond with 200 and update the agent SOs"
             └-> "before each" hook for "enrolled in a hosted agent policy bulk upgrade with force flag should respond with 200 and update the agent SOs"
             └- ✓ pass  (3.3s)
           └-> "after each" hook for "enrolled in a hosted agent policy bulk upgrade with force flag should respond with 200 and update the agent SOs"
           └-> "after all" hook: afterTestSuite.trigger for "enrolled in a hosted agent policy bulk upgrade with force flag should respond with 200 and update the agent SOs"
         └-> "after all" hook in "fleet upgrade"
         └-> "after all" hook: afterTestSuite.trigger in "fleet upgrade"
       └-: fleet_reassign_agent
         └-> "before all" hook: beforeTestSuite.trigger in "fleet_reassign_agent"
         └-> "before all" hook in "fleet_reassign_agent"
         └-> "before all" hook in "fleet_reassign_agent"
         └-: reassign single agent
           └-> "before all" hook: beforeTestSuite.trigger for "should allow to reassign single agent"
           └-> should allow to reassign single agent
             └-> "before each" hook: global before each for "should allow to reassign single agent"
             └-> "before each" hook for "should allow to reassign single agent"
             └- ✓ pass  (1.8s)
           └-> "after each" hook for "should allow to reassign single agent"
           └-> should throw an error for invalid policy id for single reassign
             └-> "before each" hook: global before each for "should throw an error for invalid policy id for single reassign"
             └-> "before each" hook for "should throw an error for invalid policy id for single reassign"
             └- ✓ pass  (29ms)
           └-> "after each" hook for "should throw an error for invalid policy id for single reassign"
           └-> can reassign from regular agent policy to regular
             └-> "before each" hook: global before each for "can reassign from regular agent policy to regular"
             └-> "before each" hook for "can reassign from regular agent policy to regular"
             └- ✓ pass  (1.8s)
           └-> "after each" hook for "can reassign from regular agent policy to regular"
           └-> cannot reassign from regular agent policy to hosted
             └-> "before each" hook: global before each for "cannot reassign from regular agent policy to hosted"
             └-> "before each" hook for "cannot reassign from regular agent policy to hosted"
             └- ✓ pass  (1.0s)
           └-> "after each" hook for "cannot reassign from regular agent policy to hosted"
           └-> "after all" hook: afterTestSuite.trigger for "cannot reassign from regular agent policy to hosted"
         └-: bulk reassign agents
           └-> "before all" hook: beforeTestSuite.trigger for "should allow to reassign multiple agents by id"
           └-> should allow to reassign multiple agents by id
             └-> "before each" hook: global before each for "should allow to reassign multiple agents by id"
             └-> "before each" hook for "should allow to reassign multiple agents by id"
             └- ✓ pass  (909ms)
           └-> "after each" hook for "should allow to reassign multiple agents by id"
           └-> should allow to reassign multiple agents by id -- mix valid & invalid
             └-> "before each" hook: global before each for "should allow to reassign multiple agents by id -- mix valid & invalid"
             └-> "before each" hook for "should allow to reassign multiple agents by id -- mix valid & invalid"
             └- ✓ pass  (910ms)
           └-> "after each" hook for "should allow to reassign multiple agents by id -- mix valid & invalid"
           └-> should allow to reassign multiple agents by id -- mixed invalid, hosted, etc
             └-> "before each" hook: global before each for "should allow to reassign multiple agents by id -- mixed invalid, hosted, etc"
             └-> "before each" hook for "should allow to reassign multiple agents by id -- mixed invalid, hosted, etc"
             └- ✓ pass  (1.0s)
           └-> "after each" hook for "should allow to reassign multiple agents by id -- mixed invalid, hosted, etc"
           └-> should allow to reassign multiple agents by kuery
             └-> "before each" hook: global before each for "should allow to reassign multiple agents by kuery"
             └-> "before each" hook for "should allow to reassign multiple agents by kuery"
             └- ✓ pass  (919ms)
           └-> "after each" hook for "should allow to reassign multiple agents by kuery"
           └-> should throw an error for invalid policy id for bulk reassign
             └-> "before each" hook: global before each for "should throw an error for invalid policy id for bulk reassign"
             └-> "before each" hook for "should throw an error for invalid policy id for bulk reassign"
             └- ✓ pass  (28ms)
           └-> "after each" hook for "should throw an error for invalid policy id for bulk reassign"
           └-> "after all" hook: afterTestSuite.trigger for "should throw an error for invalid policy id for bulk reassign"
         └-> "after all" hook in "fleet_reassign_agent"
         └-> "after all" hook: afterTestSuite.trigger in "fleet_reassign_agent"
       └-: fleet_agents_status
         └-> "before all" hook: beforeTestSuite.trigger for "should return the status of agents"
         └-> "before all" hook for "should return the status of agents"
         └-> should return the status of agents
           └-> "before each" hook: global before each for "should return the status of agents"
           └- ✓ pass  (117ms)
         └-> "after all" hook for "should return the status of agents"
         └-> "after all" hook: afterTestSuite.trigger for "should return the status of agents"
       └-: fleet_enrollment_api_keys_crud
         └-> "before all" hook: beforeTestSuite.trigger in "fleet_enrollment_api_keys_crud"
         └-> "before all" hook in "fleet_enrollment_api_keys_crud"
         └-> "before all" hook in "fleet_enrollment_api_keys_crud"
         └-: GET /fleet/enrollment-api-keys
           └-> "before all" hook: beforeTestSuite.trigger for "should list existing api keys"
           └-> should list existing api keys
             └-> "before each" hook: global before each for "should list existing api keys"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should list existing api keys"
             └- ✓ pass  (15ms)
           └-> "after all" hook: afterTestSuite.trigger for "should list existing api keys"
         └-: GET /fleet/enrollment-api-keys/{id}
           └-> "before all" hook: beforeTestSuite.trigger for "should allow to retrieve existing api keys"
           └-> should allow to retrieve existing api keys
             └-> "before each" hook: global before each for "should allow to retrieve existing api keys"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should allow to retrieve existing api keys"
             └- ✓ pass  (10ms)
           └-> "after all" hook: afterTestSuite.trigger for "should allow to retrieve existing api keys"
         └-: DELETE /fleet/enrollment-api-keys/{id}
           └-> "before all" hook: beforeTestSuite.trigger for "should invalide an existing api keys"
           └-> "before all" hook for "should invalide an existing api keys"
           └-> should invalide an existing api keys
             └-> "before each" hook: global before each for "should invalide an existing api keys"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should invalide an existing api keys"
             └- ✓ pass  (1.0s)
           └-> "after all" hook: afterTestSuite.trigger for "should invalide an existing api keys"
         └-: POST /fleet/enrollment-api-keys
           └-> "before all" hook: beforeTestSuite.trigger for "should not accept bad parameters"
           └-> should not accept bad parameters
             └-> "before each" hook: global before each for "should not accept bad parameters"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should not accept bad parameters"
             └- ✓ pass  (23ms)
           └-> should return a 400 if the fleet admin user is modifed outside of Fleet
             └-> "before each" hook: global before each for "should return a 400 if the fleet admin user is modifed outside of Fleet"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 400 if the fleet admin user is modifed outside of Fleet"
             └- ✓ pass  (23ms)
           └-> should allow to create an enrollment api key with only an agent policy
             └-> "before each" hook: global before each for "should allow to create an enrollment api key with only an agent policy"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should allow to create an enrollment api key with only an agent policy"
             └- ✓ pass  (955ms)
           └-> should allow to create an enrollment api key with agent policy and unique name
             └-> "before each" hook: global before each for "should allow to create an enrollment api key with agent policy and unique name"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should allow to create an enrollment api key with agent policy and unique name"
             └- ✓ pass  (2.1s)
           └-> should create an ES ApiKey with metadata
             └-> "before each" hook: global before each for "should create an ES ApiKey with metadata"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should create an ES ApiKey with metadata"
             └- ✓ pass  (934ms)
           └-> should create an ES ApiKey with limited privileges
             └-> "before each" hook: global before each for "should create an ES ApiKey with limited privileges"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should create an ES ApiKey with limited privileges"
(node:4241) ProductNotSupportedSecurityError: The client is unable to verify that the server is Elasticsearch due to security privileges on the server side. Some functionality may not be compatible if the server is running an unsupported product.
(Use `node --trace-warnings ...` to show where the warning was created)
             └- ✓ pass  (1.1s)
           └-> "after all" hook: afterTestSuite.trigger for "should create an ES ApiKey with limited privileges"
         └-> "after all" hook in "fleet_enrollment_api_keys_crud"
         └-> "after all" hook: afterTestSuite.trigger in "fleet_enrollment_api_keys_crud"
       └-: Package Policy - create
         └-> "before all" hook: beforeTestSuite.trigger for "can only add to hosted agent policies using the force parameter"
         └-> "before all" hook for "can only add to hosted agent policies using the force parameter"
         └-> "before all" hook for "can only add to hosted agent policies using the force parameter"
         └-> can only add to hosted agent policies using the force parameter
           └-> "before each" hook: global before each for "can only add to hosted agent policies using the force parameter"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "can only add to hosted agent policies using the force parameter"
           └- ✓ pass  (10.9s)
         └-> should work with valid values
           └-> "before each" hook: global before each for "should work with valid values"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should work with valid values"
           └- ✓ pass  (2.0s)
         └-> should return a 400 with an empty namespace
           └-> "before each" hook: global before each for "should return a 400 with an empty namespace"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 400 with an empty namespace"
           └- ✓ pass  (22ms)
         └-> should return a 400 with an invalid namespace
           └-> "before each" hook: global before each for "should return a 400 with an invalid namespace"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 400 with an invalid namespace"
           └- ✓ pass  (43ms)
         └-> should not allow multiple limited packages on the same agent policy
           └-> "before each" hook: global before each for "should not allow multiple limited packages on the same agent policy"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should not allow multiple limited packages on the same agent policy"
           └- ✓ pass  (26.7s)
         └-> should return a 400 if there is another package policy with the same name
           └-> "before each" hook: global before each for "should return a 400 if there is another package policy with the same name"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 400 if there is another package policy with the same name"
           └- ✓ pass  (1.6s)
         └-> should return a 400 if there is a package policy with the same name on a different policy
           └-> "before each" hook: global before each for "should return a 400 if there is a package policy with the same name on a different policy"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 400 if there is a package policy with the same name on a different policy"
           └- ✓ pass  (3.0s)
         └-> "after all" hook for "should return a 400 if there is a package policy with the same name on a different policy"
         └-> "after all" hook for "should return a 400 if there is a package policy with the same name on a different policy"
         └-> "after all" hook: afterTestSuite.trigger for "should return a 400 if there is a package policy with the same name on a different policy"
       └-: Package Policy - update
         └-> "before all" hook: beforeTestSuite.trigger for "should work with valid values on "regular" policies"
         └-> "before all" hook for "should work with valid values on "regular" policies"
         └-> "before all" hook for "should work with valid values on "regular" policies"
         └-> should work with valid values on "regular" policies
           └-> "before each" hook: global before each for "should work with valid values on "regular" policies"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should work with valid values on "regular" policies"
           └- ✓ pass  (2.0s)
         └-> should work with valid values on hosted policies
           └-> "before each" hook: global before each for "should work with valid values on hosted policies"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should work with valid values on hosted policies"
           └- ✓ pass  (2.0s)
         └-> should return a 400 if there is another package policy with the same name
           └-> "before each" hook: global before each for "should return a 400 if there is another package policy with the same name"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 400 if there is another package policy with the same name"
           └- ✓ pass  (47ms)
         └-> should return a 400 if there is another package policy with the same name on a different policy
           └-> "before each" hook: global before each for "should return a 400 if there is another package policy with the same name on a different policy"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 400 if there is another package policy with the same name on a different policy"
           └- ✓ pass  (2.0s)
         └-> should work with frozen input vars
           └-> "before each" hook: global before each for "should work with frozen input vars"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should work with frozen input vars"
           └- ✓ pass  (2.0s)
         └-> "after all" hook for "should work with frozen input vars"
         └-> "after all" hook for "should work with frozen input vars"
         └-> "after all" hook: afterTestSuite.trigger for "should work with frozen input vars"
       └-: Package Policy - get by id
         └-> "before all" hook: beforeTestSuite.trigger for "should succeed with a valid id"
         └-> "before all" hook for "should succeed with a valid id"
         └-> "before all" hook for "should succeed with a valid id"
         └-> should succeed with a valid id
           └-> "before each" hook: global before each for "should succeed with a valid id"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should succeed with a valid id"
           └- ✓ pass  (20ms)
         └-> should return a 404 with an invalid id
           └-> "before each" hook: global before each for "should return a 404 with an invalid id"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 404 with an invalid id"
           └- ✓ pass  (30ms)
         └-> "after all" hook for "should return a 404 with an invalid id"
         └-> "after all" hook for "should return a 404 with an invalid id"
         └-> "after all" hook: afterTestSuite.trigger for "should return a 404 with an invalid id"
       └-: Package Policy - delete
         └-> "before all" hook: beforeTestSuite.trigger for "should fail on hosted agent policies"
         └-> "before all" hook for "should fail on hosted agent policies"
         └-> "before all" hook for "should fail on hosted agent policies"
         └-> should fail on hosted agent policies
           └-> "before each" hook: global before each for "should fail on hosted agent policies"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should fail on hosted agent policies"
           └- ✓ pass  (4.0s)
         └-> should work for regular policies
           └-> "before each" hook: global before each for "should work for regular policies"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should work for regular policies"
           └- ✓ pass  (20ms)
         └-> "after all" hook for "should work for regular policies"
         └-> "after all" hook for "should work for regular policies"
         └-> "after all" hook: afterTestSuite.trigger for "should work for regular policies"
       └-: Package Policy - upgrade
         └-> "before all" hook: beforeTestSuite.trigger in "Package Policy - upgrade"
         └-> "before all" hook in "Package Policy - upgrade"
         └-> "before all" hook in "Package Policy - upgrade"
         └-: when package version is not installed
           └-> "before all" hook: beforeTestSuite.trigger in "when package version is not installed"
           └-: dry run
             └-> "before all" hook: beforeTestSuite.trigger for "returns a valid diff"
             └-> "before all" hook for "returns a valid diff"
             └-> returns a valid diff
               └-> "before each" hook: global before each for "returns a valid diff"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "returns a valid diff"
               └-> "before each" hook for "returns a valid diff"
               └- ✓ pass  (49ms)
             └-> "after each" hook for "returns a valid diff"
             └-> "after all" hook for "returns a valid diff"
             └-> "after all" hook: afterTestSuite.trigger for "returns a valid diff"
           └-: upgrade
             └-> "before all" hook: beforeTestSuite.trigger for "should respond with an error"
             └-> "before all" hook for "should respond with an error"
             └-> should respond with an error
               └-> "before each" hook: global before each for "should respond with an error"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should respond with an error"
               └-> "before each" hook for "should respond with an error"
               └- ✓ pass  (12.4s)
             └-> "after each" hook for "should respond with an error"
             └-> "after all" hook for "should respond with an error"
             └-> "after all" hook: afterTestSuite.trigger for "should respond with an error"
           └-> "after all" hook: afterTestSuite.trigger in "when package version is not installed"
         └-: when upgrading to a version with no breaking changes
           └-> "before all" hook: beforeTestSuite.trigger in "when upgrading to a version with no breaking changes"
           └-> "before all" hook in "when upgrading to a version with no breaking changes"
           └-: dry run
             └-> "before all" hook: beforeTestSuite.trigger for "returns a valid diff"
             └-> returns a valid diff
               └-> "before each" hook: global before each for "returns a valid diff"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "returns a valid diff"
               └-> "before each" hook for "returns a valid diff"
               └- ✓ pass  (51ms)
             └-> "after each" hook for "returns a valid diff"
             └-> "after all" hook: afterTestSuite.trigger for "returns a valid diff"
           └-: upgrade
             └-> "before all" hook: beforeTestSuite.trigger for "successfully upgrades package policy"
             └-> successfully upgrades package policy
               └-> "before each" hook: global before each for "successfully upgrades package policy"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "successfully upgrades package policy"
               └-> "before each" hook for "successfully upgrades package policy"
               └- ✓ pass  (2.0s)
             └-> "after each" hook for "successfully upgrades package policy"
             └-> "after all" hook: afterTestSuite.trigger for "successfully upgrades package policy"
           └-> "after all" hook in "when upgrading to a version with no breaking changes"
           └-> "after all" hook: afterTestSuite.trigger in "when upgrading to a version with no breaking changes"
         └-: when upgrading to a version where a non-required variable has been added
           └-> "before all" hook: beforeTestSuite.trigger in "when upgrading to a version where a non-required variable has been added"
           └-> "before all" hook in "when upgrading to a version where a non-required variable has been added"
           └-: dry run
             └-> "before all" hook: beforeTestSuite.trigger for "returns a valid diff"
             └-> returns a valid diff
               └-> "before each" hook: global before each for "returns a valid diff"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "returns a valid diff"
               └-> "before each" hook for "returns a valid diff"
               └- ✓ pass  (40ms)
             └-> "after each" hook for "returns a valid diff"
             └-> "after all" hook: afterTestSuite.trigger for "returns a valid diff"
           └-: upgrade
             └-> "before all" hook: beforeTestSuite.trigger for "successfully upgrades package policy"
             └-> successfully upgrades package policy
               └-> "before each" hook: global before each for "successfully upgrades package policy"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "successfully upgrades package policy"
               └-> "before each" hook for "successfully upgrades package policy"
               └- ✓ pass  (2.0s)
             └-> "after each" hook for "successfully upgrades package policy"
             └-> "after all" hook: afterTestSuite.trigger for "successfully upgrades package policy"
           └-> "after all" hook in "when upgrading to a version where a non-required variable has been added"
           └-> "after all" hook: afterTestSuite.trigger in "when upgrading to a version where a non-required variable has been added"
         └-: when upgrading to a version where a variable has been removed
           └-> "before all" hook: beforeTestSuite.trigger in "when upgrading to a version where a variable has been removed"
           └-> "before all" hook in "when upgrading to a version where a variable has been removed"
           └-: dry run
             └-> "before all" hook: beforeTestSuite.trigger for "returns a valid diff"
             └-> returns a valid diff
               └-> "before each" hook: global before each for "returns a valid diff"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "returns a valid diff"
               └-> "before each" hook for "returns a valid diff"
               └- ✓ pass  (36ms)
             └-> "after each" hook for "returns a valid diff"
             └-> "after all" hook: afterTestSuite.trigger for "returns a valid diff"
           └-: upgrade
             └-> "before all" hook: beforeTestSuite.trigger for "successfully upgrades package policy"
             └-> successfully upgrades package policy
               └-> "before each" hook: global before each for "successfully upgrades package policy"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "successfully upgrades package policy"
               └-> "before each" hook for "successfully upgrades package policy"
               └- ✓ pass  (2.0s)
             └-> "after each" hook for "successfully upgrades package policy"
             └-> "after all" hook: afterTestSuite.trigger for "successfully upgrades package policy"
           └-> "after all" hook in "when upgrading to a version where a variable has been removed"
           └-> "after all" hook: afterTestSuite.trigger in "when upgrading to a version where a variable has been removed"
         └-: when upgrading to a version where a required variable has been added
           └-> "before all" hook: beforeTestSuite.trigger in "when upgrading to a version where a required variable has been added"
           └-> "before all" hook in "when upgrading to a version where a required variable has been added"
           └-: dry run
             └-> "before all" hook: beforeTestSuite.trigger for "returns a diff with errors"
             └-> returns a diff with errors
               └-> "before each" hook: global before each for "returns a diff with errors"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "returns a diff with errors"
               └-> "before each" hook for "returns a diff with errors"
               └- ✓ pass  (38ms)
             └-> "after each" hook for "returns a diff with errors"
             └-> "after all" hook: afterTestSuite.trigger for "returns a diff with errors"
           └-: upgrade
             └-> "before all" hook: beforeTestSuite.trigger for "fails to upgrade package policy"
             └-> fails to upgrade package policy
               └-> "before each" hook: global before each for "fails to upgrade package policy"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "fails to upgrade package policy"
               └-> "before each" hook for "fails to upgrade package policy"
               └- ✓ pass  (41ms)
             └-> "after each" hook for "fails to upgrade package policy"
             └-> "after all" hook: afterTestSuite.trigger for "fails to upgrade package policy"
           └-> "after all" hook in "when upgrading to a version where a required variable has been added"
           └-> "after all" hook: afterTestSuite.trigger in "when upgrading to a version where a required variable has been added"
         └-: when upgrading to a version where a variable has changed types
           └-> "before all" hook: beforeTestSuite.trigger in "when upgrading to a version where a variable has changed types"
           └-> "before all" hook in "when upgrading to a version where a variable has changed types"
           └-: dry run
             └-> "before all" hook: beforeTestSuite.trigger for "returns a diff with errors"
             └-> returns a diff with errors
               └-> "before each" hook: global before each for "returns a diff with errors"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "returns a diff with errors"
               └-> "before each" hook for "returns a diff with errors"
               └- ✓ pass  (37ms)
             └-> "after each" hook for "returns a diff with errors"
             └-> "after all" hook: afterTestSuite.trigger for "returns a diff with errors"
           └-: upgrade
             └-> "before all" hook: beforeTestSuite.trigger for "fails to upgrade package policy"
             └-> fails to upgrade package policy
               └-> "before each" hook: global before each for "fails to upgrade package policy"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "fails to upgrade package policy"
               └-> "before each" hook for "fails to upgrade package policy"
               └- ✓ pass  (39ms)
             └-> "after each" hook for "fails to upgrade package policy"
             └-> "after all" hook: afterTestSuite.trigger for "fails to upgrade package policy"
           └-> "after all" hook in "when upgrading to a version where a variable has changed types"
           └-> "after all" hook: afterTestSuite.trigger in "when upgrading to a version where a variable has changed types"
         └-: when upgrading to a version where inputs have been restructured
           └-> "before all" hook: beforeTestSuite.trigger in "when upgrading to a version where inputs have been restructured"
           └-> "before all" hook in "when upgrading to a version where inputs have been restructured"
           └-: dry run
             └-> "before all" hook: beforeTestSuite.trigger for "returns a valid diff"
             └-> returns a valid diff
               └-> "before each" hook: global before each for "returns a valid diff"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "returns a valid diff"
               └-> "before each" hook for "returns a valid diff"
               └- ✓ pass  (34ms)
             └-> "after each" hook for "returns a valid diff"
             └-> "after all" hook: afterTestSuite.trigger for "returns a valid diff"
           └-: upgrade
             └-> "before all" hook: beforeTestSuite.trigger for "successfully upgrades package policy"
             └-> successfully upgrades package policy
               └-> "before each" hook: global before each for "successfully upgrades package policy"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "successfully upgrades package policy"
               └-> "before each" hook for "successfully upgrades package policy"
               └- ✓ pass  (2.0s)
             └-> "after each" hook for "successfully upgrades package policy"
             └-> "after all" hook: afterTestSuite.trigger for "successfully upgrades package policy"
           └-> "after all" hook in "when upgrading to a version where inputs have been restructured"
           └-> "after all" hook: afterTestSuite.trigger in "when upgrading to a version where inputs have been restructured"
         └-: when upgrading to a version where policy templates have been restructured
           └-> "before all" hook: beforeTestSuite.trigger in "when upgrading to a version where policy templates have been restructured"
           └-> "before all" hook in "when upgrading to a version where policy templates have been restructured"
           └-: dry run
             └-> "before all" hook: beforeTestSuite.trigger for "returns a valid diff"
             └-> returns a valid diff
               └-> "before each" hook: global before each for "returns a valid diff"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "returns a valid diff"
               └-> "before each" hook for "returns a valid diff"
               └- ✓ pass  (36ms)
             └-> "after each" hook for "returns a valid diff"
             └-> "after all" hook: afterTestSuite.trigger for "returns a valid diff"
           └-: upgrade
             └-> "before all" hook: beforeTestSuite.trigger for "successfully upgrades package policy"
             └-> successfully upgrades package policy
               └-> "before each" hook: global before each for "successfully upgrades package policy"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "successfully upgrades package policy"
               └-> "before each" hook for "successfully upgrades package policy"
               └- ✓ pass  (2.0s)
             └-> "after each" hook for "successfully upgrades package policy"
             └-> "after all" hook: afterTestSuite.trigger for "successfully upgrades package policy"
           └-> "after all" hook in "when upgrading to a version where policy templates have been restructured"
           └-> "after all" hook: afterTestSuite.trigger in "when upgrading to a version where policy templates have been restructured"
         └-: when upgrading to a version where an input with no variables has variables added
           └-> "before all" hook: beforeTestSuite.trigger in "when upgrading to a version where an input with no variables has variables added"
           └-> "before all" hook in "when upgrading to a version where an input with no variables has variables added"
           └-: dry run
             └-> "before all" hook: beforeTestSuite.trigger for "returns a valid diff"
             └-> returns a valid diff
               └-> "before each" hook: global before each for "returns a valid diff"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "returns a valid diff"
               └-> "before each" hook for "returns a valid diff"
               └- ✓ pass  (33ms)
             └-> "after each" hook for "returns a valid diff"
             └-> "after all" hook: afterTestSuite.trigger for "returns a valid diff"
           └-: upgrade
             └-> "before all" hook: beforeTestSuite.trigger for "successfully upgrades package policy"
             └-> successfully upgrades package policy
               └-> "before each" hook: global before each for "successfully upgrades package policy"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "successfully upgrades package policy"
               └-> "before each" hook for "successfully upgrades package policy"
               └- ✓ pass  (2.0s)
             └-> "after each" hook for "successfully upgrades package policy"
             └-> "after all" hook: afterTestSuite.trigger for "successfully upgrades package policy"
           └-> "after all" hook in "when upgrading to a version where an input with no variables has variables added"
           └-> "after all" hook: afterTestSuite.trigger in "when upgrading to a version where an input with no variables has variables added"
         └-: when package policy is not found
           └-> "before all" hook: beforeTestSuite.trigger for "should return an 200 with errors when "dryRun:true" is provided"
           └-> should return an 200 with errors when "dryRun:true" is provided
             └-> "before each" hook: global before each for "should return an 200 with errors when "dryRun:true" is provided"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should return an 200 with errors when "dryRun:true" is provided"
             └- ✓ pass  (36ms)
           └-> should return a 200 with errors and "success:false" when "dryRun:false" is provided
             └-> "before each" hook: global before each for "should return a 200 with errors and "success:false" when "dryRun:false" is provided"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 200 with errors and "success:false" when "dryRun:false" is provided"
             └- ✓ pass  (35ms)
           └-> "after all" hook: afterTestSuite.trigger for "should return a 200 with errors and "success:false" when "dryRun:false" is provided"
         └-: when policy's package version is up to date
           └-> "before all" hook: beforeTestSuite.trigger in "when policy's package version is up to date"
           └-> "before all" hook in "when policy's package version is up to date"
           └-: dry run
             └-> "before all" hook: beforeTestSuite.trigger for "should respond with a 200 ok"
             └-> should respond with a 200 ok
               └-> "before each" hook: global before each for "should respond with a 200 ok"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should respond with a 200 ok"
               └-> "before each" hook for "should respond with a 200 ok"
               └- ✓ pass  (30ms)
             └-> "after each" hook for "should respond with a 200 ok"
             └-> "after all" hook: afterTestSuite.trigger for "should respond with a 200 ok"
           └-: upgrade
             └-> "before all" hook: beforeTestSuite.trigger for "should respond with a 200 ok"
             └-> should respond with a 200 ok
               └-> "before each" hook: global before each for "should respond with a 200 ok"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should respond with a 200 ok"
               └-> "before each" hook for "should respond with a 200 ok"
               └- ✓ pass  (2.0s)
             └-> "after each" hook for "should respond with a 200 ok"
             └-> "after all" hook: afterTestSuite.trigger for "should respond with a 200 ok"
           └-> "after all" hook in "when policy's package version is up to date"
           └-> "after all" hook: afterTestSuite.trigger in "when policy's package version is up to date"
         └-> "after all" hook in "Package Policy - upgrade"
         └-> "after all" hook: afterTestSuite.trigger in "Package Policy - upgrade"
       └-: Fleet Endpoints
         └-> "before all" hook: beforeTestSuite.trigger in "Fleet Endpoints"
         └-: fleet_agent_policies_with_agents_setup
           └-> "before all" hook: beforeTestSuite.trigger in "fleet_agent_policies_with_agents_setup"
           └-> "before all" hook in "fleet_agent_policies_with_agents_setup"
           └-> "before all" hook in "fleet_agent_policies_with_agents_setup"
           └-: POST /api/fleet/agent_policies
             └-> "before all" hook: beforeTestSuite.trigger for "should create an enrollment key and an agent action `POLICY_CHANGE` for the policy"
             └-> should create an enrollment key and an agent action `POLICY_CHANGE` for the policy
               └-> "before each" hook: global before each for "should create an enrollment key and an agent action `POLICY_CHANGE` for the policy"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should create an enrollment key and an agent action `POLICY_CHANGE` for the policy"
               └- ✓ pass  (4.0s)
             └-> "after all" hook: afterTestSuite.trigger for "should create an enrollment key and an agent action `POLICY_CHANGE` for the policy"
           └-: POST /api/fleet/agent_policies/copy
             └-> "before all" hook: beforeTestSuite.trigger for "should create an enrollment key and an agent action `POLICY_CHANGE` for the policy"
             └-> should create an enrollment key and an agent action `POLICY_CHANGE` for the policy
               └-> "before each" hook: global before each for "should create an enrollment key and an agent action `POLICY_CHANGE` for the policy"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should create an enrollment key and an agent action `POLICY_CHANGE` for the policy"
               └- ✓ pass  (3.0s)
             └-> "after all" hook: afterTestSuite.trigger for "should create an enrollment key and an agent action `POLICY_CHANGE` for the policy"
           └-> "after all" hook in "fleet_agent_policies_with_agents_setup"
           └-> "after all" hook in "fleet_agent_policies_with_agents_setup"
           └-> "after all" hook: afterTestSuite.trigger in "fleet_agent_policies_with_agents_setup"
         └-: fleet_agent_policies
           └-> "before all" hook: beforeTestSuite.trigger in "fleet_agent_policies"
           └-: POST /api/fleet/agent_policies
             └-> "before all" hook: beforeTestSuite.trigger for "should work with valid minimum required values"
             └-> "before all" hook for "should work with valid minimum required values"
             └-> "before all" hook for "should work with valid minimum required values"
             └-> should work with valid minimum required values
               └-> "before each" hook: global before each for "should work with valid minimum required values"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should work with valid minimum required values"
               └- ✓ pass  (3.0s)
             └-> sets given is_managed value
               └-> "before each" hook: global before each for "sets given is_managed value"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "sets given is_managed value"
               └- ✓ pass  (6.0s)
             └-> should return a 400 with an empty namespace
               └-> "before each" hook: global before each for "should return a 400 with an empty namespace"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 400 with an empty namespace"
               └- ✓ pass  (26ms)
             └-> should return a 400 with an invalid namespace
               └-> "before each" hook: global before each for "should return a 400 with an invalid namespace"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 400 with an invalid namespace"
               └- ✓ pass  (27ms)
             └-> should return a 409 if policy already exists with name given
               └-> "before each" hook: global before each for "should return a 409 if policy already exists with name given"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 409 if policy already exists with name given"
               └- ✓ pass  (3.0s)
             └-> should allow to create policy with the system integration policy and increment correctly the name if there is more than 10 package policy
               └-> "before each" hook: global before each for "should allow to create policy with the system integration policy and increment correctly the name if there is more than 10 package policy"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should allow to create policy with the system integration policy and increment correctly the name if there is more than 10 package policy"
               └- ✓ pass  (15.0s)
             └-> should allow to create policy with the system integration policy and increment correctly the name
               └-> "before each" hook: global before each for "should allow to create policy with the system integration policy and increment correctly the name"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should allow to create policy with the system integration policy and increment correctly the name"
               └- ✓ pass  (7.0s)
             └-> "after all" hook for "should allow to create policy with the system integration policy and increment correctly the name"
             └-> "after all" hook: afterTestSuite.trigger for "should allow to create policy with the system integration policy and increment correctly the name"
           └-: POST /api/fleet/agent_policies/{agentPolicyId}/copy
             └-> "before all" hook: beforeTestSuite.trigger for "should work with valid values"
             └-> "before all" hook for "should work with valid values"
             └-> "before all" hook for "should work with valid values"
             └-> should work with valid values
               └-> "before each" hook: global before each for "should work with valid values"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should work with valid values"
               └- ✓ pass  (2.9s)
             └-> should increment package policy copy names
               └-> "before each" hook: global before each for "should increment package policy copy names"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should increment package policy copy names"
               └- ✓ pass  (20.1s)
             └-> should return a 404 with invalid source policy
               └-> "before each" hook: global before each for "should return a 404 with invalid source policy"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 404 with invalid source policy"
               └- ✓ pass  (41ms)
             └-> should return a 400 with invalid payload
               └-> "before each" hook: global before each for "should return a 400 with invalid payload"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 400 with invalid payload"
               └- ✓ pass  (28ms)
             └-> should return a 400 with invalid name
               └-> "before each" hook: global before each for "should return a 400 with invalid name"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 400 with invalid name"
               └- ✓ pass  (28ms)
             └-> should return a 409 if policy already exists with name given
               └-> "before each" hook: global before each for "should return a 409 if policy already exists with name given"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 409 if policy already exists with name given"
               └- ✓ pass  (68ms)
             └-> "after all" hook for "should return a 409 if policy already exists with name given"
             └-> "after all" hook: afterTestSuite.trigger for "should return a 409 if policy already exists with name given"
           └-: PUT /api/fleet/agent_policies/{agentPolicyId}
             └-> "before all" hook: beforeTestSuite.trigger for "should work with valid values"
             └-> "before all" hook for "should work with valid values"
             └-> should work with valid values
               └-> "before each" hook: global before each for "should work with valid values"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should work with valid values"
               └- ✓ pass  (2.1s)
             └-> sets given is_managed value
               └-> "before each" hook: global before each for "sets given is_managed value"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "sets given is_managed value"
               └- ✓ pass  (2.0s)
             └-> should return a 409 if policy already exists with name given
               └-> "before each" hook: global before each for "should return a 409 if policy already exists with name given"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should return a 409 if policy already exists with name given"
               └- ✓ pass  (1.8s)
             └-> "after all" hook for "should return a 409 if policy already exists with name given"
             └-> "after all" hook for "should return a 409 if policy already exists with name given"
             └-> "after all" hook: afterTestSuite.trigger for "should return a 409 if policy already exists with name given"
           └-: POST /api/fleet/agent_policies/delete
             └-> "before all" hook: beforeTestSuite.trigger for "should prevent hosted policies being deleted"
             └-> "before all" hook for "should prevent hosted policies being deleted"
             └-> should prevent hosted policies being deleted
               └-> "before each" hook: global before each for "should prevent hosted policies being deleted"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should prevent hosted policies being deleted"
               └- ✓ pass  (1.9s)
             └-> should allow regular policies being deleted
               └-> "before each" hook: global before each for "should allow regular policies being deleted"
               └-> "before each" hook: beforeSetupWithDockerRegistry for "should allow regular policies being deleted"
               └- ✓ pass  (3.0s)
             └-> "after all" hook for "should allow regular policies being deleted"
             └-> "after all" hook: afterTestSuite.trigger for "should allow regular policies being deleted"
           └-> "after all" hook: afterTestSuite.trigger in "fleet_agent_policies"
         └-> "after all" hook: afterTestSuite.trigger in "Fleet Endpoints"
       └-: Data Stream Endpoints
         └-> "before all" hook: beforeTestSuite.trigger in "Data Stream Endpoints"
         └-: data_streams_list
           └-> "before all" hook: beforeTestSuite.trigger for "should return no data streams when there isn't any data yet"
           └-> should return no data streams when there isn't any data yet
             └-> "before each" hook: global before each for "should return no data streams when there isn't any data yet"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should return no data streams when there isn't any data yet"
             └-> "before each" hook for "should return no data streams when there isn't any data yet"
             └- ✓ pass  (33ms)
           └-> "after each" hook for "should return no data streams when there isn't any data yet"
           └-> should return correct basic data stream information
             └-> "before each" hook: global before each for "should return correct basic data stream information"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should return correct basic data stream information"
             └-> "before each" hook for "should return correct basic data stream information"
             └- ✓ pass  (1.3s)
           └-> "after each" hook for "should return correct basic data stream information"
           └-> should use event.ingested instead of @timestamp for last_activity_ms
             └-> "before each" hook: global before each for "should use event.ingested instead of @timestamp for last_activity_ms"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should use event.ingested instead of @timestamp for last_activity_ms"
             └-> "before each" hook for "should use event.ingested instead of @timestamp for last_activity_ms"
             └- ✓ pass  (1.3s)
           └-> "after each" hook for "should use event.ingested instead of @timestamp for last_activity_ms"
           └-> should return correct number of data streams regardless of number of backing indices
             └-> "before each" hook: global before each for "should return correct number of data streams regardless of number of backing indices"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should return correct number of data streams regardless of number of backing indices"
             └-> "before each" hook for "should return correct number of data streams regardless of number of backing indices"
             └- ✓ pass  (2.6s)
           └-> "after each" hook for "should return correct number of data streams regardless of number of backing indices"
           └-> "after all" hook: afterTestSuite.trigger for "should return correct number of data streams regardless of number of backing indices"
         └-> "after all" hook: afterTestSuite.trigger in "Data Stream Endpoints"
       └-: Settings Endpoints
         └-> "before all" hook: beforeTestSuite.trigger in "Settings Endpoints"
         └-: Settings - update
           └-> "before all" hook: beforeTestSuite.trigger for "should explicitly set port on fleet_server_hosts"
           └-> "before all" hook for "should explicitly set port on fleet_server_hosts"
           └-> "before all" hook for "should explicitly set port on fleet_server_hosts"
           └-> should explicitly set port on fleet_server_hosts
             └-> "before each" hook: global before each for "should explicitly set port on fleet_server_hosts"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should explicitly set port on fleet_server_hosts"
             └- ✓ pass  (2.0s)
           └-> should bump all agent policy's revision
             └-> "before each" hook: global before each for "should bump all agent policy's revision"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should bump all agent policy's revision"
             └- ✓ pass  (8.0s)
           └-> should create agent actions
             └-> "before each" hook: global before each for "should create agent actions"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should create agent actions"
             └- ✓ pass  (6.0s)
           └-> "after all" hook for "should create agent actions"
           └-> "after all" hook for "should create agent actions"
           └-> "after all" hook: afterTestSuite.trigger for "should create agent actions"
         └-> "after all" hook: afterTestSuite.trigger in "Settings Endpoints"
       └-: Preconfiguration Endpoints
         └-> "before all" hook: beforeTestSuite.trigger in "Preconfiguration Endpoints"
         └-: Preconfiguration
           └-> "before all" hook: beforeTestSuite.trigger for "should succeed with an empty payload"
           └-> "before all" hook for "should succeed with an empty payload"
           └-> should succeed with an empty payload
             └-> "before each" hook: global before each for "should succeed with an empty payload"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "should succeed with an empty payload"
             └- ✓ pass  (700ms)
           └-> "after all" hook for "should succeed with an empty payload"
           └-> "after all" hook: afterTestSuite.trigger for "should succeed with an empty payload"
         └-> "after all" hook: afterTestSuite.trigger in "Preconfiguration Endpoints"
       └-: fleet_service_tokens
         └-> "before all" hook: beforeTestSuite.trigger in "fleet_service_tokens"
         └-> "before all" hook in "fleet_service_tokens"
         └-: POST /api/fleet/service-tokens
           └-> "before all" hook: beforeTestSuite.trigger for "should create a valid service account token"
           └-> should create a valid service account token
             └-> "before each" hook: global before each for "should create a valid service account token"
             └- ✓ pass  (43ms)
           └-> "after all" hook: afterTestSuite.trigger for "should create a valid service account token"
         └-> "after all" hook in "fleet_service_tokens"
         └-> "after all" hook: afterTestSuite.trigger in "fleet_service_tokens"
       └-: Output Endpoints
         └-> "before all" hook: beforeTestSuite.trigger in "Output Endpoints"
         └-: fleet_output_crud
           └-> "before all" hook: beforeTestSuite.trigger for "GET /outputs should list the default output"
           └-> "before all" hook for "GET /outputs should list the default output"
           └-> "before all" hook for "GET /outputs should list the default output"
           └-> "before all" hook for "GET /outputs should list the default output"
           └-> GET /outputs should list the default output
             └-> "before each" hook: global before each for "GET /outputs should list the default output"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "GET /outputs should list the default output"
             └- ✓ pass  (18ms)
           └-> GET /outputs/{defaultOutputId} should return the default output
             └-> "before each" hook: global before each for "GET /outputs/{defaultOutputId} should return the default output"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "GET /outputs/{defaultOutputId} should return the default output"
             └- ✓ pass  (19ms)
           └-> PUT /output/{defaultOutputId} should explicitly set port on ES hosts
             └-> "before each" hook: global before each for "PUT /output/{defaultOutputId} should explicitly set port on ES hosts"
             └-> "before each" hook: beforeSetupWithDockerRegistry for "PUT /output/{defaultOutputId} should explicitly set port on ES hosts"
             └- ✓ pass  (898ms)
           └-> "after all" hook for "PUT /output/{defaultOutputId} should explicitly set port on ES hosts"
           └-> "after all" hook: afterTestSuite.trigger for "PUT /output/{defaultOutputId} should explicitly set port on ES hosts"
         └-> "after all" hook: afterTestSuite.trigger in "Output Endpoints"
       └-: fleet_telemetry
         └-> "before all" hook: beforeTestSuite.trigger for "should return the correct telemetry values for fleet"
         └-> "before all" hook for "should return the correct telemetry values for fleet"
         └-> "before all" hook for "should return the correct telemetry values for fleet"
         └-> "before all" hook for "should return the correct telemetry values for fleet"
         └-> should return the correct telemetry values for fleet
           └-> "before each" hook: global before each for "should return the correct telemetry values for fleet"
           └-> "before each" hook: beforeSetupWithDockerRegistry for "should return the correct telemetry values for fleet"
           └- ✓ pass  (1.1s)
         └-> "after all" hook for "should return the correct telemetry values for fleet"
         └-> "after all" hook: afterTestSuite.trigger for "should return the correct telemetry values for fleet"
       └-> "after all" hook: afterTestSuite.trigger in "Fleet Endpoints"
   │
   │242 passing (32.0m)
   │5 pending
   │
   │ proc [kibana]   log   [17:01:45.881] [info][plugins-system][standard] Stopping all plugins.
   │ proc [kibana]   log   [17:01:45.883] [info][kibana-monitoring][monitoring][monitoring][plugins] Monitoring stats collection is stopped
   │ info [kibana] exited with null after 2009.8 seconds
   │ info [es] stopping node ftr
   │ info [o.e.x.m.p.NativeController] [ftr] Native controller process has stopped - no new native processes can be started
   │ info [o.e.n.Node] [ftr] stopping ...
   │ info [o.e.x.w.WatcherService] [ftr] stopping watch service, reason [shutdown initiated]
   │ info [o.e.x.w.WatcherLifeCycleService] [ftr] watcher has stopped and shutdown
   │ info [o.e.n.Node] [ftr] stopped
   │ info [o.e.n.Node] [ftr] closing ...
   │ info [o.e.n.Node] [ftr] closed
   │ info [es] stopped
   │ info [es] no debug files found, assuming es did not write any
   │ info [es] cleanup complete