Skip to content

Monitor Cron e2e Tests #358

Monitor Cron e2e Tests

Monitor Cron e2e Tests #358

Triggered via schedule August 10, 2024 08:05
Status Failure
Total duration 30m 56s
Artifacts 2

e2e_cron.yml

on: schedule
Fit to window
Zoom out
Zoom in

Annotations

8 errors, 5 warnings, and 1 notice
e2e-tests
Timed out waiting 1800s for the test suite to run
e2e-tests
Timed out waiting 1800s for the teardown for test suite to run
[chromium] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan: src/e2e/specs/dashboard.spec.ts#L384
1) [chromium] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed Test timeout of 180000ms exceeded while running "beforeEach" hook. 382 | test.use({ storageState: { cookies: [], origins: [] } }); 383 | > 384 | test.beforeEach(async ({ landingPage, page, authPage, welcomePage }) => { | ^ 385 | test.slow( 386 | true, 387 | "this test runs through the welcome scan flow, increasing timeout to address it", at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:384:8
[chromium] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan: src/e2e/pages/authPage.ts#L60
1) [chromium] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed Error: locator.fill: Test timeout of 180000ms exceeded. Call log: - waiting for locator('[type="password"]').first() at ../pages/authPage.ts:60 58 | async signUp(email: string, page: Page) { 59 | await this.enterEmail(email); > 60 | await this.passwordInputField.fill( | ^ 61 | process.env.E2E_TEST_ACCOUNT_PASSWORD as string, 62 | ); 63 | await this.passwordConfirmInputField.fill( at AuthPage.signUp (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:60:35) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:399:5
[chromium] › purchase.spec.ts:87:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L149
2) [chromium] › purchase.spec.ts:87:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly TimeoutError: locator.waitFor: Timeout 5000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Automatic data removal: On' }) 147 | 148 | // confirm successful payment > 149 | await dashboardPage.plusSubscription.waitFor({ | ^ 150 | state: "attached", 151 | timeout: 5000, 152 | }); at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:149:42
[firefox] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan: src/e2e/specs/dashboard.spec.ts#L384
3) [firefox] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed Test timeout of 180000ms exceeded while running "beforeEach" hook. 382 | test.use({ storageState: { cookies: [], origins: [] } }); 383 | > 384 | test.beforeEach(async ({ landingPage, page, authPage, welcomePage }) => { | ^ 385 | test.slow( 386 | true, 387 | "this test runs through the welcome scan flow, increasing timeout to address it", at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:384:8
[firefox] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan: src/e2e/pages/authPage.ts#L60
3) [firefox] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed Error: locator.fill: Test timeout of 180000ms exceeded. Call log: - waiting for locator('[type="password"]').first() at ../pages/authPage.ts:60 58 | async signUp(email: string, page: Page) { 59 | await this.enterEmail(email); > 60 | await this.passwordInputField.fill( | ^ 61 | process.env.E2E_TEST_ACCOUNT_PASSWORD as string, 62 | ); 63 | await this.passwordConfirmInputField.fill( at AuthPage.signUp (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:60:35) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:399:5
e2e-tests
Process completed with exit code 1.
Slow Test: [firefox] › purchase.spec.ts#L1
[firefox] › purchase.spec.ts took 4.9m
Slow Test: [firefox] › landing.spec.ts#L1
[firefox] › landing.spec.ts took 1.2m
Slow Test: [chromium] › landing.spec.ts#L1
[chromium] › landing.spec.ts took 1.1m
Slow Test: [firefox] › auth.spec.ts#L1
[firefox] › auth.spec.ts took 17.8s
Slow Test: [chromium] › auth.spec.ts#L1
[chromium] › auth.spec.ts took 17.6s
🎭 Playwright Run Summary
3 flaky [chromium] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed [chromium] › purchase.spec.ts:87:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly [firefox] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed 7 skipped 2 did not run 74 passed (30.0m) Timed out waiting 1800s for the entire test run

Artifacts

Produced during runtime
Name Size
playwright-report Expired
39.6 MB
test-results Expired
62 MB