Monitor Cron e2e Tests #358
Annotations
8 errors, 5 warnings, and 1 notice
e2e-tests
Timed out waiting 1800s for the test suite to run
|
e2e-tests
Timed out waiting 1800s for the teardown for test suite to run
|
[chromium] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan:
src/e2e/specs/dashboard.spec.ts#L384
1) [chromium] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed
Test timeout of 180000ms exceeded while running "beforeEach" hook.
382 | test.use({ storageState: { cookies: [], origins: [] } });
383 |
> 384 | test.beforeEach(async ({ landingPage, page, authPage, welcomePage }) => {
| ^
385 | test.slow(
386 | true,
387 | "this test runs through the welcome scan flow, increasing timeout to address it",
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:384:8
|
[chromium] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan:
src/e2e/pages/authPage.ts#L60
1) [chromium] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed
Error: locator.fill: Test timeout of 180000ms exceeded.
Call log:
- waiting for locator('[type="password"]').first()
at ../pages/authPage.ts:60
58 | async signUp(email: string, page: Page) {
59 | await this.enterEmail(email);
> 60 | await this.passwordInputField.fill(
| ^
61 | process.env.E2E_TEST_ACCOUNT_PASSWORD as string,
62 | );
63 | await this.passwordConfirmInputField.fill(
at AuthPage.signUp (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:60:35)
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:399:5
|
[chromium] › purchase.spec.ts:87:3 › stage - Breach Scan:
src/e2e/specs/purchase.spec.ts#L149
2) [chromium] › purchase.spec.ts:87:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly
TimeoutError: locator.waitFor: Timeout 5000ms exceeded.
Call log:
- waiting for getByRole('button', { name: 'Automatic data removal: On' })
147 |
148 | // confirm successful payment
> 149 | await dashboardPage.plusSubscription.waitFor({
| ^
150 | state: "attached",
151 | timeout: 5000,
152 | });
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:149:42
|
[firefox] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan:
src/e2e/specs/dashboard.spec.ts#L384
3) [firefox] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed
Test timeout of 180000ms exceeded while running "beforeEach" hook.
382 | test.use({ storageState: { cookies: [], origins: [] } });
383 |
> 384 | test.beforeEach(async ({ landingPage, page, authPage, welcomePage }) => {
| ^
385 | test.slow(
386 | true,
387 | "this test runs through the welcome scan flow, increasing timeout to address it",
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:384:8
|
[firefox] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan:
src/e2e/pages/authPage.ts#L60
3) [firefox] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed
Error: locator.fill: Test timeout of 180000ms exceeded.
Call log:
- waiting for locator('[type="password"]').first()
at ../pages/authPage.ts:60
58 | async signUp(email: string, page: Page) {
59 | await this.enterEmail(email);
> 60 | await this.passwordInputField.fill(
| ^
61 | process.env.E2E_TEST_ACCOUNT_PASSWORD as string,
62 | );
63 | await this.passwordConfirmInputField.fill(
at AuthPage.signUp (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:60:35)
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:399:5
|
e2e-tests
Process completed with exit code 1.
|
Slow Test:
[firefox] › purchase.spec.ts#L1
[firefox] › purchase.spec.ts took 4.9m
|
Slow Test:
[firefox] › landing.spec.ts#L1
[firefox] › landing.spec.ts took 1.2m
|
Slow Test:
[chromium] › landing.spec.ts#L1
[chromium] › landing.spec.ts took 1.1m
|
Slow Test:
[firefox] › auth.spec.ts#L1
[firefox] › auth.spec.ts took 17.8s
|
Slow Test:
[chromium] › auth.spec.ts#L1
[chromium] › auth.spec.ts took 17.6s
|
🎭 Playwright Run Summary
3 flaky
[chromium] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed
[chromium] › purchase.spec.ts:87:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly
[firefox] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed
7 skipped
2 did not run
74 passed (30.0m)
Timed out waiting 1800s for the entire test run
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
playwright-report
Expired
|
39.6 MB |
|
test-results
Expired
|
62 MB |
|