-
-
Notifications
You must be signed in to change notification settings - Fork 964
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
test: improve stability of refresh test #4037
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #4037 +/- ##
==========================================
+ Coverage 78.34% 78.37% +0.03%
==========================================
Files 370 370
Lines 26120 26120
==========================================
+ Hits 20463 20472 +9
+ Misses 4097 4090 -7
+ Partials 1560 1558 -2 ☔ View full report in Codecov by Sentry. |
@@ -8,7 +8,7 @@ import { test } from "../../../fixtures" | |||
import { extractCode, toConfig } from "../../../lib/helper" | |||
import { LoginPage } from "../../../models/elements/login" | |||
|
|||
test.describe.parallel("account enumeration protection off", () => { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We use workers:1 so this doesn't make sense.
enabled: true, | ||
}, | ||
code: { | ||
passwordless_enabled: false, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Flaky because if this method is enabled the form looks different.
5ae9d33
to
313f6b8
Compare
Related issue(s)
Checklist
introduces a new feature.
contributing code guidelines.
vulnerability. If this pull request addresses a security vulnerability, I
confirm that I got the approval (please contact
security@ory.sh) from the maintainers to push
the changes.
works.
Further Comments