Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: support for Python 3.13 #1517

Merged
merged 4 commits into from
Jan 3, 2025

chore: bump SmartX to the latest

e6c17aa
Select commit
Loading
Failed to load commit list.
Sign in for the full log view
Merged

feat: support for Python 3.13 #1517

chore: bump SmartX to the latest
e6c17aa
Select commit
Loading
Failed to load commit list.
GitHub Actions / test-report-ui-9.3.2-10 failed Jan 3, 2025 in 0s

12 passed, 8 failed and 0 skipped

Tests failed

❌ test-results/junit.xml

20 tests were completed in 1113s with 12 passed, 8 failed and 0 skipped.

Test suite Passed Failed Skipped Time
pytest 12✅ 8❌ 1113s

❌ pytest

test_alert_actions_page.chrome_TestAlertActions
  ✅ test_alert_help_text_entity
test_configuration_page_account_tab.chrome_TestAccount
  ✅ test_account_sort_functionality
  ✅ test_account_pagination
  ✅ test_account_add_valid_title
  ✅ test_account_basic_fields_label_entity
  ✅ test_account_default_value_example_environment
  ✅ test_account_list_example_environment
  ❌ test_account_clone_frontend_validation
	item = <Function test_account_clone_frontend_validation>
  ❌ test_account_edit_backend_validation
	item = <Function test_account_edit_backend_validation>
  ✅ test_account_action_values
test_configuration_page_custom_tab.chrome_TestCustomPage
  ❌ test_custom_valid_input_test_date
	item = <Function test_custom_valid_input_test_date>
test_configuration_page_logging_tab.chrome_TestLoggingPage
  ✅ test_logging_label_log_level
test_configuration_page_proxy_tab.chrome_TestProxyPage
  ❌ test_proxy_host_field_length_validation
	item = <Function test_proxy_host_field_length_validation>
  ❌ test_proxy_required_field_port
	item = <Function test_proxy_required_field_port>
test_input_page.chrome_TestInputPage
  ❌ test_inputs_filter_functionality_negative
	item = <Function test_inputs_filter_functionality_negative>
  ✅ test_inputs_input_type_list_values
  ✅ test_inputs_enable_disable
  ❌ test_example_input_one_required_field_object_fields
	item = <Function test_example_input_one_required_field_object_fields>
  ❌ test_example_input_two_required_field_interval
	item = <Function test_example_input_two_required_field_interval>
  ✅ test_example_input_two_help_text_entity

Annotations

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_configuration_page_account_tab.chrome_TestAccount ► test_account_clone_frontend_validation

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_account_clone_frontend_validation>
Raw output
item = <Function test_account_clone_frontend_validation>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_configuration_page_account_tab.chrome_TestAccount ► test_account_edit_backend_validation

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_account_edit_backend_validation>
Raw output
item = <Function test_account_edit_backend_validation>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_configuration_page_custom_tab.chrome_TestCustomPage ► test_custom_valid_input_test_date

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_custom_valid_input_test_date>
Raw output
item = <Function test_custom_valid_input_test_date>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_configuration_page_proxy_tab.chrome_TestProxyPage ► test_proxy_host_field_length_validation

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_proxy_host_field_length_validation>
Raw output
item = <Function test_proxy_host_field_length_validation>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_configuration_page_proxy_tab.chrome_TestProxyPage ► test_proxy_required_field_port

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_proxy_required_field_port>
Raw output
item = <Function test_proxy_required_field_port>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_input_page.chrome_TestInputPage ► test_inputs_filter_functionality_negative

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_inputs_filter_functionality_negative>
Raw output
item = <Function test_inputs_filter_functionality_negative>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_input_page.chrome_TestInputPage ► test_example_input_one_required_field_object_fields

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_example_input_one_required_field_object_fields>
Raw output
item = <Function test_example_input_one_required_field_object_fields>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_input_page.chrome_TestInputPage ► test_example_input_two_required_field_interval

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_example_input_two_required_field_interval>
Raw output
item = <Function test_example_input_two_required_field_interval>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed