forked from fixin.me/fixin.me
The test injects a submit button into a table row to simulate an unauthorized PATCH request, verifying the server returns 422. The button was obscured by a full-row <a class="link"> overlay, causing Selenium to throw ElementClickInterceptedError. Since the test exercises server-side authorization rather than UI behavior, switched to a JS click via execute_script to bypass the visual interception check. Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>