feat: support for Python 3.13 #6773
12 passed, 8 failed and 0 skipped
❌ test-results/junit.xml
20 tests were completed in 1113s with 12 passed, 8 failed and 0 skipped.
Test suite | Passed | Failed | Skipped | Time |
---|---|---|---|---|
pytest | 12✅ | 8❌ | 1113s |
❌ pytest
test_alert_actions_page.chrome_TestAlertActions
✅ test_alert_help_text_entity
test_configuration_page_account_tab.chrome_TestAccount
✅ test_account_sort_functionality
✅ test_account_pagination
✅ test_account_add_valid_title
✅ test_account_basic_fields_label_entity
✅ test_account_default_value_example_environment
✅ test_account_list_example_environment
❌ test_account_clone_frontend_validation
item = <Function test_account_clone_frontend_validation>
❌ test_account_edit_backend_validation
item = <Function test_account_edit_backend_validation>
✅ test_account_action_values
test_configuration_page_custom_tab.chrome_TestCustomPage
❌ test_custom_valid_input_test_date
item = <Function test_custom_valid_input_test_date>
test_configuration_page_logging_tab.chrome_TestLoggingPage
✅ test_logging_label_log_level
test_configuration_page_proxy_tab.chrome_TestProxyPage
❌ test_proxy_host_field_length_validation
item = <Function test_proxy_host_field_length_validation>
❌ test_proxy_required_field_port
item = <Function test_proxy_required_field_port>
test_input_page.chrome_TestInputPage
❌ test_inputs_filter_functionality_negative
item = <Function test_inputs_filter_functionality_negative>
✅ test_inputs_input_type_list_values
✅ test_inputs_enable_disable
❌ test_example_input_one_required_field_object_fields
item = <Function test_example_input_one_required_field_object_fields>
❌ test_example_input_two_required_field_interval
item = <Function test_example_input_two_required_field_interval>
✅ test_example_input_two_help_text_entity
Annotations
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.3.2-10
pytest ► test_configuration_page_account_tab.chrome_TestAccount ► test_account_clone_frontend_validation
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_account_clone_frontend_validation>
Raw output
item = <Function test_account_clone_frontend_validation>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.3.2-10
pytest ► test_configuration_page_account_tab.chrome_TestAccount ► test_account_edit_backend_validation
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_account_edit_backend_validation>
Raw output
item = <Function test_account_edit_backend_validation>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.3.2-10
pytest ► test_configuration_page_custom_tab.chrome_TestCustomPage ► test_custom_valid_input_test_date
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_custom_valid_input_test_date>
Raw output
item = <Function test_custom_valid_input_test_date>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.3.2-10
pytest ► test_configuration_page_proxy_tab.chrome_TestProxyPage ► test_proxy_host_field_length_validation
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_proxy_host_field_length_validation>
Raw output
item = <Function test_proxy_host_field_length_validation>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.3.2-10
pytest ► test_configuration_page_proxy_tab.chrome_TestProxyPage ► test_proxy_required_field_port
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_proxy_required_field_port>
Raw output
item = <Function test_proxy_required_field_port>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.3.2-10
pytest ► test_input_page.chrome_TestInputPage ► test_inputs_filter_functionality_negative
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_inputs_filter_functionality_negative>
Raw output
item = <Function test_inputs_filter_functionality_negative>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.3.2-10
pytest ► test_input_page.chrome_TestInputPage ► test_example_input_one_required_field_object_fields
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_example_input_one_required_field_object_fields>
Raw output
item = <Function test_example_input_one_required_field_object_fields>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed
Check failure on line 0 in test-results/junit.xml
github-actions / test-report-ui-9.3.2-10
pytest ► test_input_page.chrome_TestInputPage ► test_example_input_two_required_field_interval
Failed test found in:
test-results/junit.xml
Error:
item = <Function test_example_input_two_required_field_interval>
Raw output
item = <Function test_example_input_two_required_field_interval>
@pytest.hookimpl(hookwrapper=True)
def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
"""
Implemented hook to:
- check browser logs for severe logs after each test run.
"""
yield
IGNORED: List[str] = []
browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
severe_logs = [
log
for log in browser_logs
if log.level == s_utils.LogLevel.SEVERE
and not any(ignored in log.message for ignored in IGNORED)
]
if severe_logs:
log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
> pytest.fail(msg, pytrace=True)
E Failed: Severe logs found in browser console logs:
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
tests/ui/conftest.py:48: Failed