feat: support for Python 3.13 #6773
15 passed, 9 failed and 0 skipped
❌ test-results/junit.xml
24 tests were completed in 894s with 15 passed, 9 failed and 0 skipped.
Test suite | Passed | Failed | Skipped | Time |
---|---|---|---|---|
pytest | 15✅ | 9❌ | 894s |
❌ pytest
test_configuration_page.chrome_TestConfigurationPage
✅ test_openapi_json_download_button
test_configuration_page_account_tab.chrome_TestAccount
❌ test_account_required_field_username
item = <Function test_account_required_field_username>
❌ test_account_required_field_name
item = <Function test_account_required_field_name>
✅ test_account_encrypted_field_client_secret
✅ test_account_default_value_auth_type
✅ test_account_credentials_encrypted_value
✅ test_account_clone_default_values
✅ test_account_select_value_auth_type
✅ test_account_url_validation
❌ test_example_validation_of_oauth_valid
item = <Function test_example_validation_of_oauth_valid>
test_configuration_page_logging_tab.chrome_TestLoggingPage
✅ test_logging_default_log_level
✅ test_logging_list_log_levels
test_input_page.chrome_TestInputPage
❌ test_inputs_default_rows_in_table
item = <Function test_inputs_default_rows_in_table>
❌ test_example_input_one_valid_length_name
item = <Function test_example_input_one_valid_length_name>
❌ test_example_input_one_required_field_interval
item = <Function test_example_input_one_required_field_interval>
✅ test_example_input_one_clone_close_entity
✅ test_example_input_one_clone_save_entity
✅ test_example_input_one_clone_duplicate_names
❌ test_example_input_two_required_field_name
item = <Function test_example_input_two_required_field_name>
❌ test_example_input_two_delete_valid_title
item = <Function test_example_input_two_delete_valid_title>
✅ test_inputs_enable_all_close
✅ test_inputs_disable_all_deny
✅ test_inputs_textarea_scroll
❌ test_example_inputs_with_not_valid_interval[0a 0,11 2 */2 *]
item = <Function test_example_inputs_with_not_valid_interval[0a 0,11 2 */2 *]>
Annotations
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.1.7-6
pytest ► test_configuration_page_account_tab.chrome_TestAccount ► test_account_required_field_username
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_account_required_field_username>
Raw output
item = <Function test_account_required_field_username>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.1.7-6
pytest ► test_configuration_page_account_tab.chrome_TestAccount ► test_account_required_field_name
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_account_required_field_name>
Raw output
item = <Function test_account_required_field_name>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.1.7-6
pytest ► test_configuration_page_account_tab.chrome_TestAccount ► test_example_validation_of_oauth_valid
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_example_validation_of_oauth_valid>
Raw output
item = <Function test_example_validation_of_oauth_valid>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.1.7-6
pytest ► test_input_page.chrome_TestInputPage ► test_inputs_default_rows_in_table
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_inputs_default_rows_in_table>
Raw output
item = <Function test_inputs_default_rows_in_table>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.1.7-6
pytest ► test_input_page.chrome_TestInputPage ► test_example_input_one_valid_length_name
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_example_input_one_valid_length_name>
Raw output
item = <Function test_example_input_one_valid_length_name>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.1.7-6
pytest ► test_input_page.chrome_TestInputPage ► test_example_input_one_required_field_interval
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_example_input_one_required_field_interval>
Raw output
item = <Function test_example_input_one_required_field_interval>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.1.7-6
pytest ► test_input_page.chrome_TestInputPage ► test_example_input_two_required_field_name
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_example_input_two_required_field_name>
Raw output
item = <Function test_example_input_two_required_field_name>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.1.7-6
pytest ► test_input_page.chrome_TestInputPage ► test_example_input_two_delete_valid_title
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_example_input_two_delete_valid_title>
Raw output
item = <Function test_example_input_two_delete_valid_title>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.1.7-6
pytest ► test_input_page.chrome_TestInputPage ► test_example_inputs_with_not_valid_interval[0a 0,11 2 */2 *]
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_example_inputs_with_not_valid_interval[0a 0,11 2 */2 *]>
Raw output
item = <Function test_example_inputs_with_not_valid_interval[0a 0,11 2 */2 *]>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed