Monitor Cron e2e Tests #444
Annotations
8 errors, 5 warnings, and 1 notice
[chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields:
src/e2e/specs/landing/landing-content.spec.ts#L1
1) [chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields
Test timeout of 60000ms exceeded.
|
[chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields:
src/e2e/specs/landing/landing-content.spec.ts#L204
1) [chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields
Error: locator.waitFor: Test timeout of 60000ms exceeded.
Call log:
- waiting for locator('[type="password"]').first() to be visible
202 | await landingPage.monitorHeroFormEmailInputField.fill(randomEmail);
203 | await landingPage.monitorHeroFormInputSubmitButton.click();
> 204 | await authPage.passwordInputField.waitFor();
| ^
205 | await expect(authPage.passwordInputField).toBeVisible();
206 | } else {
207 | ///free-scan-cta experiment is on
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/landing/landing-content.spec.ts:204:41
|
[chromium] › purchase.spec.ts:89:3 › stage - Breach Scan:
src/e2e/specs/purchase.spec.ts#L14
2) [chromium] › purchase.spec.ts:89:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly
Test timeout of 180000ms exceeded while running "beforeEach" hook.
12 | );
13 |
> 14 | test.beforeEach(async ({ page, authPage, landingPage, welcomePage }) => {
| ^
15 | test.info().annotations.push({
16 | type: "testrail id",
17 | description:
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:14:8
|
[chromium] › purchase.spec.ts:89:3 › stage - Breach Scan:
src/e2e/pages/welcomeScanPage.ts#L90
2) [chromium] › purchase.spec.ts:89:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly
Error: locator.click: Test timeout of 180000ms exceeded.
Call log:
- waiting for getByText('AtlantaGA, USA', { exact: true })
at ../pages/welcomeScanPage.ts:90
88 | await this.lastNameInputField.fill("Ackerman");
89 | await this.cityStateInputField.pressSequentially("Atlanta, GA, USA");
> 90 | await this.page.getByText("AtlantaGA, USA", { exact: true }).click();
| ^
91 | await this.dobInputField.fill("2002-01-01");
92 | await this.findExposuresButton.click();
93 |
at WelcomePage.goThroughFirstScan (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/welcomeScanPage.ts:90:66)
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:43:5
|
[firefox] › dashboard/dashboard-payment.spec.ts:22:3 › stage - Breaches Dashboard - Payment › Verify that the user can select what type of plan they want:
src/e2e/specs/dashboard/dashboard-payment.spec.ts#L1
3) [firefox] › dashboard/dashboard-payment.spec.ts:22:3 › stage - Breaches Dashboard - Payment › Verify that the user can select what type of plan they want, verify that the Premium upsell modal is displayed correctly
TypeError: Cannot read properties of undefined (reading 'childFrames')
|
[firefox] › dashboard/dashboard-payment.spec.ts:22:3 › stage - Breaches Dashboard - Payment › Verify that the user can select what type of plan they want:
src/e2e/pages/purchasePage.ts#L122
3) [firefox] › dashboard/dashboard-payment.spec.ts:22:3 › stage - Breaches Dashboard - Payment › Verify that the user can select what type of plan they want, verify that the Premium upsell modal is displayed correctly
Error: locator.waitFor: Test ended.
Call log:
- waiting for getByRole('heading', { name: 'Set up your subscription' }) to be visible
at ../pages/purchasePage.ts:122
120 |
121 | async verifyYearlyPlanDetails() {
> 122 | await this.subscriptionHeader.waitFor();
| ^
123 | const planDetails = removeUnicodeChars(
124 | (await this.planDetails.textContent()) as string,
125 | );
at PurchasePage.verifyYearlyPlanDetails (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/purchasePage.ts:122:35)
at DashboardPage.verifyPremiumUpsellModalOptions (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/dashBoardPage.ts:314:24)
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard/dashboard-payment.spec.ts:44:5
|
[firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields:
src/e2e/specs/landing/landing-content.spec.ts#L1
4) [firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields
Test timeout of 60000ms exceeded.
|
[firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields:
src/e2e/specs/landing/landing-content.spec.ts#L204
4) [firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields
Error: locator.waitFor: Test timeout of 60000ms exceeded.
Call log:
- waiting for locator('[type="password"]').first() to be visible
202 | await landingPage.monitorHeroFormEmailInputField.fill(randomEmail);
203 | await landingPage.monitorHeroFormInputSubmitButton.click();
> 204 | await authPage.passwordInputField.waitFor();
| ^
205 | await expect(authPage.passwordInputField).toBeVisible();
206 | } else {
207 | ///free-scan-cta experiment is on
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/landing/landing-content.spec.ts:204:41
|
Slow Test:
[firefox] › purchase.spec.ts#L1
[firefox] › purchase.spec.ts took 3.3m
|
Slow Test:
[chromium] › dashboard/dashboard-breaches-scan.spec.ts#L1
[chromium] › dashboard/dashboard-breaches-scan.spec.ts took 40.5s
|
Slow Test:
[firefox] › dashboard/dashboard-breaches-scan.spec.ts#L1
[firefox] › dashboard/dashboard-breaches-scan.spec.ts took 38.0s
|
Slow Test:
[chromium] › landing/landing-new-account.spec.ts#L1
[chromium] › landing/landing-new-account.spec.ts took 24.3s
|
Slow Test:
[firefox] › landing/landing-new-account.spec.ts#L1
[firefox] › landing/landing-new-account.spec.ts took 19.3s
|
🎭 Playwright Run Summary
4 flaky
[chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields
[chromium] › purchase.spec.ts:89:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly
[firefox] › dashboard/dashboard-payment.spec.ts:22:3 › stage - Breaches Dashboard - Payment › Verify that the user can select what type of plan they want, verify that the Premium upsell modal is displayed correctly
[firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields
6 skipped
76 passed (19.6m)
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
playwright-report
|
18.2 MB |
|
test-results
|
17.2 MB |
|