Skip to content

feat: support for Python 3.13 #6773

feat: support for Python 3.13

feat: support for Python 3.13 #6773

GitHub Actions / test-report-ui-9.3.2-10 failed Jan 3, 2025 in 0s

12 passed, 8 failed and 0 skipped

Tests failed

❌ test-results/junit.xml

20 tests were completed in 1113s with 12 passed, 8 failed and 0 skipped.

Test suite Passed Failed Skipped Time
pytest 12✅ 8❌ 1113s

❌ pytest

test_alert_actions_page.chrome_TestAlertActions
  ✅ test_alert_help_text_entity
test_configuration_page_account_tab.chrome_TestAccount
  ✅ test_account_sort_functionality
  ✅ test_account_pagination
  ✅ test_account_add_valid_title
  ✅ test_account_basic_fields_label_entity
  ✅ test_account_default_value_example_environment
  ✅ test_account_list_example_environment
  ❌ test_account_clone_frontend_validation
	item = <Function test_account_clone_frontend_validation>
  ❌ test_account_edit_backend_validation
	item = <Function test_account_edit_backend_validation>
  ✅ test_account_action_values
test_configuration_page_custom_tab.chrome_TestCustomPage
  ❌ test_custom_valid_input_test_date
	item = <Function test_custom_valid_input_test_date>
test_configuration_page_logging_tab.chrome_TestLoggingPage
  ✅ test_logging_label_log_level
test_configuration_page_proxy_tab.chrome_TestProxyPage
  ❌ test_proxy_host_field_length_validation
	item = <Function test_proxy_host_field_length_validation>
  ❌ test_proxy_required_field_port
	item = <Function test_proxy_required_field_port>
test_input_page.chrome_TestInputPage
  ❌ test_inputs_filter_functionality_negative
	item = <Function test_inputs_filter_functionality_negative>
  ✅ test_inputs_input_type_list_values
  ✅ test_inputs_enable_disable
  ❌ test_example_input_one_required_field_object_fields
	item = <Function test_example_input_one_required_field_object_fields>
  ❌ test_example_input_two_required_field_interval
	item = <Function test_example_input_two_required_field_interval>
  ✅ test_example_input_two_help_text_entity

Annotations

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_configuration_page_account_tab.chrome_TestAccount ► test_account_clone_frontend_validation

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_account_clone_frontend_validation>
Raw output
item = <Function test_account_clone_frontend_validation>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_configuration_page_account_tab.chrome_TestAccount ► test_account_edit_backend_validation

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_account_edit_backend_validation>
Raw output
item = <Function test_account_edit_backend_validation>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_configuration_page_custom_tab.chrome_TestCustomPage ► test_custom_valid_input_test_date

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_custom_valid_input_test_date>
Raw output
item = <Function test_custom_valid_input_test_date>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_configuration_page_proxy_tab.chrome_TestProxyPage ► test_proxy_host_field_length_validation

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_proxy_host_field_length_validation>
Raw output
item = <Function test_proxy_host_field_length_validation>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_configuration_page_proxy_tab.chrome_TestProxyPage ► test_proxy_required_field_port

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_proxy_required_field_port>
Raw output
item = <Function test_proxy_required_field_port>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/configuration - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_input_page.chrome_TestInputPage ► test_inputs_filter_functionality_negative

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_inputs_filter_functionality_negative>
Raw output
item = <Function test_inputs_filter_functionality_negative>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_input_page.chrome_TestInputPage ► test_example_input_one_required_field_object_fields

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_example_input_one_required_field_object_fields>
Raw output
item = <Function test_example_input_one_required_field_object_fields>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed

Check failure on line 0 in test-results/junit.xml

See this annotation in the file changed.

@github-actions github-actions / test-report-ui-9.3.2-10

pytest ► test_input_page.chrome_TestInputPage ► test_example_input_two_required_field_interval

Failed test found in:
  test-results/junit.xml
Error:
  item = <Function test_example_input_two_required_field_interval>
Raw output
item = <Function test_example_input_two_required_field_interval>

    @pytest.hookimpl(hookwrapper=True)
    def pytest_runtest_call(item: pytest.Item) -> Iterator[Any]:
        """
        Implemented hook to:
        - check browser logs for severe logs after each test run.
        """
    
        yield
    
        IGNORED: List[str] = []
    
        browser_logs = s_utils.get_browser_logs(item.selenium_helper.browser)
        severe_logs = [
            log
            for log in browser_logs
            if log.level == s_utils.LogLevel.SEVERE
            and not any(ignored in log.message for ignored in IGNORED)
        ]
    
        if severe_logs:
            log_msg = [f"{log.level}: {log.source} - {log.message}" for log in severe_logs]
            msg = "Severe logs found in browser console logs: \n" + "\n".join(log_msg)
>           pytest.fail(msg, pytrace=True)
E           Failed: Severe logs found in browser console logs: 
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED
E           LogLevel.SEVERE: LogSource.JAVASCRIPT - http://localhost:8000/en-US/app/Splunk_TA_UCCExample/inputs - Access to fetch at 'https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g' from origin 'http://localhost:8000' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource. If an opaque response serves your needs, set the request's mode to 'no-cors' to fetch the resource with CORS disabled.
E           LogLevel.SEVERE: LogSource.NETWORK - https://rum-ingest.us1.signalfx.com/v1/rumreplay?auth=68xvZWqFlJfwwinCZhxu1g - Failed to load resource: net::ERR_FAILED

tests/ui/conftest.py:48: Failed