testdriverai 6.1.10 → 6.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (67) hide show
  1. package/.github/workflows/acceptance-tests.yml +0 -2
  2. package/.github/workflows/acceptance-v6.yml +0 -2
  3. package/.github/workflows/lint.yml +1 -4
  4. package/.github/workflows/publish-canary.yml +0 -2
  5. package/.github/workflows/publish-latest.yml +0 -1
  6. package/.prettierignore +0 -1
  7. package/.vscode/settings.json +1 -4
  8. package/agent/events.js +10 -1
  9. package/agent/index.js +76 -104
  10. package/agent/interface.js +6 -43
  11. package/agent/lib/censorship.js +10 -15
  12. package/agent/lib/commander.js +18 -31
  13. package/agent/lib/commands.js +63 -81
  14. package/agent/lib/debugger-server.js +5 -0
  15. package/agent/lib/generator.js +2 -2
  16. package/agent/lib/redraw.js +1 -0
  17. package/agent/lib/sandbox.js +2 -0
  18. package/agent/lib/sdk.js +1 -2
  19. package/agent/lib/source-mapper.js +1 -1
  20. package/agent/lib/system.js +6 -1
  21. package/docs/account/enterprise.mdx +12 -8
  22. package/docs/account/pricing.mdx +2 -2
  23. package/docs/account/projects.mdx +0 -5
  24. package/docs/cli/overview.mdx +6 -6
  25. package/docs/commands/assert.mdx +0 -1
  26. package/docs/commands/hover-text.mdx +1 -3
  27. package/docs/commands/match-image.mdx +4 -5
  28. package/docs/commands/press-keys.mdx +8 -6
  29. package/docs/commands/scroll-until-image.mdx +7 -8
  30. package/docs/commands/scroll-until-text.mdx +6 -7
  31. package/docs/commands/wait-for-image.mdx +4 -5
  32. package/docs/commands/wait-for-text.mdx +5 -6
  33. package/docs/docs.json +40 -42
  34. package/docs/getting-started/vscode.mdx +56 -67
  35. package/docs/guide/environment-variables.mdx +5 -5
  36. package/docs/overview/comparison.mdx +39 -22
  37. package/docs/overview/quickstart.mdx +32 -84
  38. package/docs/styles.css +1 -10
  39. package/interfaces/cli/lib/base.js +6 -27
  40. package/interfaces/cli/utils/factory.js +4 -17
  41. package/interfaces/logger.js +5 -4
  42. package/interfaces/readline.js +1 -1
  43. package/package.json +3 -3
  44. package/schema.json +2 -22
  45. package/testdriver/acceptance/hover-text.yaml +1 -2
  46. package/testdriver/acceptance/prompt.yaml +1 -4
  47. package/testdriver/acceptance/scroll-until-image.yaml +0 -5
  48. package/testdriver/{lifecycle/prerun.yaml → examples/web/lifecycle/provision.yaml} +0 -6
  49. package/testdriver/lifecycle/provision.yaml +20 -0
  50. package/.github/workflows/self-hosted.yml +0 -102
  51. package/docs/apps/tauri-apps.mdx +0 -361
  52. package/docs/getting-started/playwright.mdx +0 -342
  53. package/docs/getting-started/self-hosting.mdx +0 -370
  54. package/docs/guide/dashcam.mdx +0 -118
  55. package/docs/images/content/self-hosted/launchtemplateid.png +0 -0
  56. package/docs/images/content/vscode/ide-full.png +0 -0
  57. package/docs/images/content/vscode/running.png +0 -0
  58. package/interfaces/cli/commands/generate.js +0 -3
  59. package/setup/aws/cloudformation.yaml +0 -463
  60. package/setup/aws/spawn-runner.sh +0 -190
  61. package/testdriver/edge-cases/js-exception.yaml +0 -8
  62. package/testdriver/edge-cases/js-promise.yaml +0 -19
  63. package/testdriver/edge-cases/lifecycle/postrun.yaml +0 -10
  64. package/testdriver/edge-cases/success-test.yaml +0 -9
  65. package/testdriver/examples/web/lifecycle/postrun.yaml +0 -7
  66. package/testdriver/examples/web/lifecycle/prerun.yaml +0 -17
  67. package/testdriver/lifecycle/postrun.yaml +0 -7
@@ -1,370 +0,0 @@
1
- ---
2
- title: "Self-Hosting TestDriver"
3
- sidebarTitle: "Self-Hosting"
4
- description: "Complete guide to self-hosting TestDriver instances on AWS"
5
- icon: "server"
6
- ---
7
-
8
- ```mermaid
9
- graph LR
10
- A[CLI] <--> B[api.testdriver.ai]
11
- B <--> C[Your AWS EC2 Instance]
12
- ```
13
-
14
- Self-hosting TestDriver allows you to run tests on your own infrastructure, giving you full control over the environment, security, and configurations. This guide walks you through setting up and managing self-hosted TestDriver instances using AWS.
15
-
16
- ## Why self host?
17
-
18
- Self-hosting TestDriver gives you complete control over your test execution environment:
19
-
20
- - **Enhanced security**: Get complete control over ingress and egress rules.
21
- - **Complete customization**: Modify the TestDriver Golden Image (our pre-configured AMI) to include custom dependencies, software, and configurations at launch time.
22
- - **Powerful Infrastructure**: Run tests on bare metal infrastructure that support emulators and simulators.
23
-
24
- You'll use the [TestDriver CLI repository](https://github.com/testdriverai/cli) which contains all the infrastructure templates and setup scripts needed for self-hosting.
25
-
26
- ## Overview
27
-
28
- By the end of this guide, you'll have a complete self-hosted testing infrastructure that can:
29
-
30
- - Spawn TestDriver instances on-demand in your AWS account
31
- - Run tests on your own AWS infrastructure with custom configurations
32
- - Integrate seamlessly with GitHub Actions CI/CD workflows
33
- - Automatically clean up resources after test completion
34
-
35
- The setup process involves three main steps:
36
-
37
- 1. **CloudFormation Infrastructure**: Deploy our `setup/aws/cloudformation.yaml` template to create the foundational AWS resources (VPC, security groups, IAM roles, and a launch template for instance creation).
38
- 2. **On-Demand Instance Spawning**: Use `setup/aws/spawn-runner.sh` with your Launch Template ID to programmatically spawn TestDriver instances whenever you need to run tests.
39
- 3. **GitHub Actions Integration**: Use `.github/workflows/self-hosted.yml` as a template for running tests in CI. This workflow demonstrates the complete lifecycle: spawning an instance, running tests, and shutting down the instance to minimize costs.
40
-
41
- ## Prerequisites
42
-
43
- - AWS account with permissions to run CloudFormation.
44
- - [AWS CLI](https://aws.amazon.com/cli/) installed locally.
45
-
46
- <Tip>Be sure to run `aws configure` with your credentials</Tip>
47
-
48
- - Access to the TestDriver AMI (Golden Image)\
49
- [Contact us with your preferred AWS Region for access](https://form.typeform.com/to/UECf9rDx?typeform-source=testdriver.ai).
50
- - A GitHub repository for committing your tests & workflow.
51
-
52
- ## Step 1: Set Up AWS Infrastructure
53
-
54
- ### Deploy CloudFormation Stack
55
-
56
- Our [`setup/aws/cloudformation.yaml`](https://github.com/testdriverai/cli/tree/main/setup/aws/cloudformation.yaml) template creates:
57
-
58
- - Dedicated VPC with public subnet
59
- - Security group with proper port access
60
- - IAM roles and instance profiles
61
- - EC2 launch template for programmatic instance creation
62
-
63
- This is a one-time setup used to generate a template ID for launching instances.
64
-
65
- ```bash
66
- # Deploy the CloudFormation stack
67
- aws cloudformation deploy \
68
- --template-file setup/aws/cloudformation.yaml \
69
- --stack-name my-testdriver-infrastructure \
70
- --parameter-overrides \
71
- ProjectTag=testdriver \
72
- AllowedIngressCidr=0.0.0.0/0 \
73
- InstanceType=c5.xlarge \
74
- CreateKeyPair=true \
75
- --capabilities CAPABILITY_IAM
76
- ```
77
-
78
- <Danger>
79
- **Security**: Replace `AllowedIngressCidr=0.0.0.0/0` with your specific IP
80
- ranges to lock down access to your VPC.
81
- </Danger>
82
-
83
- ### Get Launch Template ID
84
-
85
- After CloudFormation completes, find the launch template ID in the stack outputs:
86
-
87
- ```bash
88
- aws cloudformation describe-stacks \
89
- --stack-name my-testdriver-infrastructure \
90
- --query 'Stacks[0].Outputs[?OutputKey==`LaunchTemplateId`].OutputValue' \
91
- --output text
92
- ```
93
-
94
- <Tip>**Save this ID** – you'll need it for the next step.</Tip>
95
-
96
- ## Step 2: Spawn a New TestDriver Runner
97
-
98
- This step is performed **every time you want to run tests**. The `spawn-runner.sh` script launches a new EC2 instance on-demand for test execution.
99
-
100
- ### Using spawn-runner.sh
101
-
102
- Our [`setup/aws/spawn-runner.sh`](https://github.com/testdriverai/cli/tree/main/setup/aws/spawn-runner.sh) script:
103
-
104
- - Launches a new EC2 instance using your launch template from Step 1
105
- - Waits for the instance to become ready
106
- - Completes the TestDriver handshake
107
- - Returns instance details (IP, instance ID) for CLI usage
108
-
109
- The script accepts parameters as either environment variables or CLI arguments:
110
-
111
- ```bash
112
- # Launch an instance using environment variables
113
- export AWS_REGION=us-east-2
114
- export AMI_ID=ami-•••••••••• # Your TestDriver AMI (contact us to get one)
115
- export AWS_LAUNCH_TEMPLATE_ID=lt-•••••••••• # From CloudFormation output from step 1
116
- export RESOLUTION=1440x900 # Change screen resolution if desired (default is 1440x900)
117
-
118
- /bin/bash ./setup/aws/spawn-runner.sh
119
- ```
120
-
121
- The script outputs:
122
-
123
- ```
124
- PUBLIC_IP=1.2.3.4
125
- INSTANCE_ID=i-1234567890abcdef0
126
- AWS_REGION=us-east-2
127
- ```
128
-
129
- <Note>
130
- **Instance Lifecycle**: Instances spawned by this script will continue running
131
- until you manually terminate them. They are automatically tagged with
132
- `Name=TestDriverRunner` and `Project=[your ProjectTag value]` for easy
133
- identification in the AWS console.
134
- </Note>
135
-
136
- #### Changing Resolution in Lifecycle Files
137
-
138
- You can also change the resolution before running tests by adding an `exec` command in your `lifecycle/provision.yaml` file:
139
-
140
- ```yaml lifecycle/provision.yaml
141
- version: 6.0.0
142
- steps:
143
- - prompt: set screen resolution
144
- commands:
145
- - command: exec
146
- lang: pwsh
147
- code: |
148
- C:\testdriver\SetResolution.ps1 -Width 1920 -Height 1080
149
- ```
150
-
151
- This approach is useful when you need different resolutions for different test scenarios. See the [Lifecycle Files documentation](/guide/lifecycle) for more information about provision scripts.
152
-
153
- ### CLI Usage
154
-
155
- Once you have an instance IP, run tests directly:
156
-
157
- ```bash
158
- # Basic test execution
159
- npx testdriverai@latest run test.yaml --ip=1.2.3.4
160
- ```
161
-
162
- You can use the `PUBLIC_IP` to target the instance you just spawned via `./setup/aws/spawn-runner.sh`:
163
-
164
- ```sh
165
- npx testdriverai@latest run testdriver/your-test.yaml \
166
- --ip="$PUBLIC_IP" \
167
- ```
168
-
169
- ### Terminating Instances
170
-
171
- After your tests complete, terminate the instance to avoid unnecessary costs:
172
-
173
- ```bash
174
- # Terminate the instance
175
- aws ec2 terminate-instances --instance-ids $INSTANCE_ID --region $AWS_REGION
176
- ```
177
-
178
- You can also terminate instances manually through the AWS console by searching for instances tagged with `Name=TestDriverRunner`.
179
-
180
- ## Step 3: GitHub Actions Integration
181
-
182
- This step shows you how to automate the entire test lifecycle in CI/CD.
183
-
184
- ### Example Workflow
185
-
186
- Our [`.github/workflows/self-hosted.yml`](https://github.com/testdriverai/cli/tree/main/.github/workflows/self-hosted.yml) demonstrates the complete workflow: spawning an EC2 instance, running your tests, and shutting down the instance automatically to minimize costs.
187
-
188
- The workflow uses the GitHub secrets you configure (see below) to authenticate with AWS and spawn instances on-demand:
189
-
190
- ```yaml
191
- name: TestDriver Self-Hosted
192
-
193
- on:
194
- workflow_dispatch:
195
- push:
196
-
197
- jobs:
198
- test:
199
- runs-on: ubuntu-latest
200
- steps:
201
- - name: Checkout repository
202
- uses: actions/checkout@v4
203
-
204
- - name: Setup AWS Instance
205
- id: aws-setup
206
- run: |
207
- OUTPUT=$(./setup/aws/spawn-runner.sh | tee /dev/stderr)
208
- PUBLIC_IP=$(echo "$OUTPUT" | grep "PUBLIC_IP=" | cut -d'=' -f2)
209
- INSTANCE_ID=$(echo "$OUTPUT" | grep "INSTANCE_ID=" | cut -d'=' -f2)
210
- echo "public-ip=$PUBLIC_IP" >> $GITHUB_OUTPUT
211
- echo "instance-id=$INSTANCE_ID" >> $GITHUB_OUTPUT
212
- env:
213
- AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
214
- AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
215
- AWS_REGION: ${{ secrets.AWS_REGION }}
216
- AWS_LAUNCH_TEMPLATE_ID: ${{ secrets.AWS_LAUNCH_TEMPLATE_ID }}
217
- AMI_ID: ${{ secrets.AMI_ID }}
218
-
219
- - name: Run TestDriver
220
- run: |
221
- npx testdriverai run your-test.yaml \
222
- --ip="${{ steps.aws-setup.outputs.public-ip }}"
223
- env:
224
- TD_API_KEY: ${{ secrets.TD_API_KEY }}
225
-
226
- - name: Shutdown AWS Instance
227
- if: always()
228
- run: |
229
- aws ec2 terminate-instances \
230
- --region ${{ secrets.AWS_REGION }}
231
- --instance-ids ${{ steps.aws-setup.outputs.instance-id }}
232
- env:
233
- AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }}
234
- AWS_REGION: ${{ secrets.AWS_REGION }}
235
- AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
236
- ```
237
-
238
- ### Required Secrets
239
-
240
- Configure these secrets in your GitHub repository:
241
-
242
- | Secret | Description | Example |
243
- | ------------------------ | ----------------------------------- | ------------------------------------------------------------ |
244
- | `AWS_ACCESS_KEY_ID` | AWS access key | `AKIAIOSFODNN7EXAMPLE` |
245
- | `AWS_REGION` | AWS Region | `us-east-2` |
246
- | `AWS_SECRET_ACCESS_KEY` | AWS secret key | `wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY` |
247
- | `AWS_LAUNCH_TEMPLATE_ID` | Launch template from CloudFormation | `lt-07c53ce8349b958d1` |
248
- | `AMI_ID` | TestDriver AMI ID | `ami-085f872ca0cd80fed` |
249
- | `TD_API_KEY` | TestDriver API key | Your API key from [the dashboard](https://app.testdriver.ai) |
250
-
251
- ## AMI Customization
252
-
253
- ### Using the Base AMI
254
-
255
- Our TestDriver Golden Image (AMI) comes pre-configured with everything you need to run tests:
256
-
257
- **Operating System & Environment:**
258
-
259
- - Windows Server with desktop environment
260
- - VNC + web server for remote desktop access through the browser
261
-
262
- **Development Tools:**
263
-
264
- - Python (with pip)
265
- - Node.js (with npm)
266
- - Git
267
-
268
- **Test Infrastructure:**
269
-
270
- - TestDriver agent and dependencies
271
- - Optimized settings for test execution
272
- - Pre-configured networking for TestDriver CLI communication
273
-
274
- ### Modifying the AMI
275
-
276
- You can customize the AMI for your specific needs:
277
-
278
- 1. **Launch an instance** from our base AMI
279
- 2. **Make your changes** (install software, configure settings)
280
- 3. **Create a new AMI** from your modified instance
281
- 4. **Update your workflow** to use the new AMI ID
282
-
283
- ### Amazon Image Builder
284
-
285
- For automated AMI builds, use [Amazon EC2 Image Builder](https://aws.amazon.com/image-builder/):
286
-
287
- ```yaml
288
- # Example Image Builder pipeline
289
- Components:
290
- - Name: testdriver-base
291
- Version: 1.0.0
292
- Platform: Windows
293
- Type: BUILD
294
- Data: |
295
- name: TestDriver Custom Setup
296
- description: Custom TestDriver AMI with additional software
297
- schemaVersion: 1.0
298
- phases:
299
- - name: build
300
- steps:
301
- - name: InstallSoftware
302
- action: ExecutePowerShell
303
- inputs:
304
- commands:
305
- - "# Your custom installation commands here"
306
- ```
307
-
308
- ## Security Considerations
309
-
310
- ### Network Security
311
-
312
- 1. **Restrict CIDR blocks**: Only allow access from your known IP ranges
313
- 2. **Use VPC endpoints**: For private communication with AWS services
314
- 3. **Enable VPC Flow Logs**: For network monitoring and debugging
315
-
316
- ### AWS Authentication
317
-
318
- Use [OIDC for GitHub Actions](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect) instead of long-term credentials:
319
-
320
- ```yaml
321
- permissions:
322
- id-token: write
323
- contents: read
324
-
325
- steps:
326
- - name: Configure AWS credentials
327
- uses: aws-actions/configure-aws-credentials@v4
328
- with:
329
- role-to-assume: arn:aws:iam::123456789012:role/GitHubActionsRole
330
- aws-region: us-east-2
331
- ```
332
-
333
- ### Instance Security
334
-
335
- - **Terminate instances** immediately after use
336
- - **Monitor costs** with AWS billing alerts
337
- - **Use least-privilege IAM roles** for instance profiles
338
- - **Enable CloudTrail** for audit logging
339
-
340
- ## Troubleshooting
341
-
342
- ### Common Issues
343
-
344
- **Instance not responding in TestDriver CLI:**
345
-
346
- When the CLI displays connection errors or timeouts, check:
347
-
348
- - **Security group rules**: The CloudFormation template configures all necessary ports (RDP 3389, VNC 5900, and TestDriver communication ports). Verify your security group hasn't been modified.
349
- - **Instance status checks**: Ensure the instance has passed both system and instance status checks in the AWS console.
350
- - **AMI compatibility**: Verify the AMI is compatible with your selected instance type (some instance types don't support certain AMIs).
351
-
352
- **Connection timeouts:**
353
-
354
- - Verify network connectivity from runner to instance
355
- - Check VPC routing and internet gateway configuration
356
- - Confirm instance is in correct subnet
357
-
358
- **AWS CLI errors:**
359
-
360
- - Validate AWS credentials and permissions
361
- - Check AWS service quotas and limits
362
- - Verify region consistency across all resources
363
-
364
- ### Getting Help
365
-
366
- For enterprise customers:
367
-
368
- - Contact your account manager for AMI access issues
369
- - Use support channels for infrastructure questions
370
- - Check the TestDriver documentation for CLI usage
@@ -1,118 +0,0 @@
1
- ---
2
- title: "Dashcam Replays"
3
- sidebarTitle: "Dashcam"
4
- description: "Learn how to use Dashcam to record and replay test sessions in TestDriver."
5
- icon: "video"
6
- ---
7
-
8
- [Dashcam](https://www.dashcam.io), from the makers of TestDriver, is a powerful feature in TestDriver that allows you to record and replay your test sessions. This is particularly useful for debugging, sharing test runs with team members, or reviewing the steps taken during a test. For the full docs see the [Dashcam docs](https://docs.dashcam.io/dashcam/).
9
-
10
- ## Recording a Test Session
11
-
12
- To record a test session, you can use the `dashcam` command in your lifecycle scripts. There are two main lifecycle scripts where you can integrate Dashcam: `lifecycle/prerun.yaml` and `lifecycle/postrun.yaml`.
13
-
14
- ## Ways to use Dashcam
15
-
16
- Dashcam comes as a standalone app and a Chrome extension. You can use either or both to capture your test sessions.
17
-
18
- <Info>
19
- To capture web logs, make sure to install the Dashcam Chrome extension on the
20
- browser you are testing with. We recommend installing it via CLI to Chrome for
21
- Testing. You can also find the extension [in the Chrome
22
- Webstore](https://chromewebstore.google.com/detail/dashcam/dkcoeknmlfnfimigfagbcjgpokhdcbbp)
23
- </Info>
24
-
25
- ### Installing the Dashcam Chrome extension via command line in prerun.yaml
26
-
27
- In this lifecycle script, we install Chrome for Testing with a user profile that has the password manager disabled and sets up TestDriver Dashcam for replays and logs.
28
-
29
- ```yaml lifecycle/prerun.yaml [expandable]
30
- - prompt: launch chrome for testing and setup dashcam
31
- commands:
32
- # this script installs chrome for testing with a userprofile that has password manager disabled and sets up TestDriver Dashcam for replays and logs
33
- - command: exec
34
- lang: pwsh
35
- code: |
36
- cd $env:TEMP
37
- Write-Host "Changed directory to TEMP: $env:TEMP"
38
-
39
- Write-Host "Running 'npm init -y'..."
40
- npm init -y
41
-
42
- Write-Host "Installing dependencies: @puppeteer/browsers and dashcam-chrome..."
43
- npm install @puppeteer/browsers dashcam-chrome
44
-
45
- Write-Host "Installing Chromium via '@puppeteer/browsers'..."
46
- npx @puppeteer/browsers install chrome
47
-
48
- # Define paths
49
- $extensionPath = Join-Path (Get-Location) "node_modules/dashcam-chrome/build"
50
- $profilePath = Join-Path $env:TEMP "chrome-profile-$(Get-Random)"
51
-
52
- Write-Host "Extension path: $extensionPath"
53
- Write-Host "Chrome user data dir: $profilePath"
54
-
55
- # Validate extension path
56
- if (-not (Test-Path $extensionPath)) {
57
- Write-Host "Extension not found at $extensionPath"
58
- }
59
-
60
- $chromeArgs = @(
61
- "--start-maximized",
62
- "--load-extension=$extensionPath",
63
- "--user-data-dir=$profilePath",
64
- "--no-first-run",
65
- "--no-default-browser-check",
66
- "--disable-infobars"
67
- "${TD_WEBSITE}"
68
- ) -join ' '
69
-
70
- Start-Process "cmd.exe" -ArgumentList "/c", "npx @puppeteer/browsers launch chrome -- $chromeArgs"
71
-
72
- Write-Host "Script complete."
73
- exit 0
74
- ```
75
-
76
- ### Using the Chrome extension and capturing web logs
77
-
78
- Now in the same `lifecycle/prerun.yaml` script, we set up Dashcam to track web logs and application logs. You can customize the patterns to match your needs. Testing Desktop? You can skip the web logs and just track application logs.
79
-
80
- ```yaml lifecycle/prerun.yaml
81
- ...
82
- - command: exec
83
- lang: pwsh
84
- code: |
85
- dashcam track --name="Web Logs" --type="web" --pattern="*"
86
- dashcam track --name=TestDriver --type=application --pattern="C:\Users\testdriver\Documents\testdriver.log"
87
- ```
88
-
89
- ### Starting Dashcam
90
-
91
- The final step in our `lifecycle/prerun.yaml` script is to start Dashcam recording.
92
-
93
- ```yaml lifecycle/prerun.yaml
94
- ...
95
- - command: exec
96
- lang: pwsh
97
- code: dashcam start
98
- ```
99
-
100
- ### Publishing replays to a project in your account
101
-
102
- Lastly, in the `lifecycle/postrun.yaml` script, we publish the recorded Dashcam session to a project in your Dashcam account. Make sure to replace `<YOUR_PROJECT_ID>` with the actual ID of your project.
103
-
104
- ```yaml lifecycle/postrun.yaml
105
- - prompt: send dashcam recording to server
106
- # this script tells TestDriver Dashcam to send the recording to the server
107
- commands:
108
- - command: exec
109
- lang: pwsh
110
- code: dashcam -t '${TD_THIS_FILE}' -p -k <YOUR_PROJECT_ID> # optional add `-k MYFOLDERID` for the id of a folder in your Projects page at app.testdriver.ai
111
- ```
112
-
113
- <Info>
114
- `${TD_THIS_FILE}` is an environment variable set by TestDriver that contains
115
- the name of the current test file being executed. This will be used as the
116
- title of the Dashcam recording. For more info see [parallel testing
117
- docs](/features/parallel-testing).
118
- </Info>
@@ -1,3 +0,0 @@
1
- const { createOclifCommand } = require("../utils/factory.js");
2
-
3
- module.exports = createOclifCommand("generate");