Skip to content

Monitor Cron e2e Tests #332

Monitor Cron e2e Tests

Monitor Cron e2e Tests #332

Triggered via schedule July 21, 2024 08:05
Status Failure
Total duration 31m 6s
Artifacts 2

e2e_cron.yml

on: schedule
Fit to window
Zoom out
Zoom in

Annotations

9 errors, 5 warnings, and 1 notice
e2e-tests
Timed out waiting 1800s for the test suite to run
e2e-tests
Timed out waiting 1800s for the teardown for test suite to run
[chromium] › dashboard.spec.ts:401:3 › stage - Breaches Dashboard - Breaches Scan: src/e2e/specs/dashboard.spec.ts#L379
1) [chromium] › dashboard.spec.ts:401:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed Test timeout of 180000ms exceeded while running "beforeEach" hook. 377 | test.use({ storageState: { cookies: [], origins: [] } }); 378 | > 379 | test.beforeEach(async ({ landingPage, page, authPage, welcomePage }) => { | ^ 380 | test.slow( 381 | true, 382 | "this test runs through the welcome scan flow, increasing timeout to address it", at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:379:8
[chromium] › dashboard.spec.ts:401:3 › stage - Breaches Dashboard - Breaches Scan: src/e2e/pages/authPage.ts#L60
1) [chromium] › dashboard.spec.ts:401:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed Error: locator.fill: Test timeout of 180000ms exceeded. Call log: - waiting for locator('[type="password"]').first() at ../pages/authPage.ts:60 58 | async signUp(email: string, page: Page) { 59 | await this.enterEmail(email); > 60 | await this.passwordInputField.fill( | ^ 61 | process.env.E2E_TEST_ACCOUNT_PASSWORD as string, 62 | ); 63 | await this.passwordConfirmInputField.fill( at AuthPage.signUp (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:60:35) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:394:5
[firefox] › dashboard.spec.ts:401:3 › stage - Breaches Dashboard - Breaches Scan: src/e2e/specs/dashboard.spec.ts#L379
2) [firefox] › dashboard.spec.ts:401:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed Test timeout of 180000ms exceeded while running "beforeEach" hook. 377 | test.use({ storageState: { cookies: [], origins: [] } }); 378 | > 379 | test.beforeEach(async ({ landingPage, page, authPage, welcomePage }) => { | ^ 380 | test.slow( 381 | true, 382 | "this test runs through the welcome scan flow, increasing timeout to address it", at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:379:8
[firefox] › dashboard.spec.ts:401:3 › stage - Breaches Dashboard - Breaches Scan: src/e2e/pages/authPage.ts#L60
2) [firefox] › dashboard.spec.ts:401:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed Error: locator.fill: Test timeout of 180000ms exceeded. Call log: - waiting for locator('[type="password"]').first() at ../pages/authPage.ts:60 58 | async signUp(email: string, page: Page) { 59 | await this.enterEmail(email); > 60 | await this.passwordInputField.fill( | ^ 61 | process.env.E2E_TEST_ACCOUNT_PASSWORD as string, 62 | ); 63 | await this.passwordConfirmInputField.fill( at AuthPage.signUp (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:60:35) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:394:5
[firefox] › purchase.spec.ts:87:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L9
3) [firefox] › purchase.spec.ts:87:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly Test timeout of 180000ms exceeded while running "beforeEach" hook. 7 | 8 | test.describe(`${process.env.E2E_TEST_ENV} - Breach Scan, Monitor Plus Purchase Flow`, () => { > 9 | test.beforeEach(async ({ page, authPage, landingPage, welcomePage }) => { | ^ 10 | test.info().annotations.push({ 11 | type: "testrail id", 12 | description: at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:9:8
[firefox] › purchase.spec.ts:87:3 › stage - Breach Scan: src/e2e/pages/landingPage.ts#L267
3) [firefox] › purchase.spec.ts:87:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly Error: page.waitForURL: Test timeout of 180000ms exceeded. =========================== logs =========================== waiting for navigation to "**/oauth/**" until "load" ============================================================ at ../pages/landingPage.ts:267 265 | await this.signInButton.click(); 266 | // FxA can take a while to load on stage: > 267 | await this.page.waitForURL("**/oauth/**"); | ^ 268 | } 269 | 270 | async enterFreeScanEmail(email: string) { at LandingPage.goToSignIn (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/landingPage.ts:267:21) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:30:5
e2e-tests
Process completed with exit code 1.
Slow Test: [chromium] › purchase.spec.ts#L1
[chromium] › purchase.spec.ts took 6.7m
Slow Test: [firefox] › landing.spec.ts#L1
[firefox] › landing.spec.ts took 56.5s
Slow Test: [chromium] › landing.spec.ts#L1
[chromium] › landing.spec.ts took 53.2s
Slow Test: [firefox] › auth.spec.ts#L1
[firefox] › auth.spec.ts took 47.6s
Slow Test: [chromium] › auth.spec.ts#L1
[chromium] › auth.spec.ts took 17.1s
🎭 Playwright Run Summary
3 flaky [chromium] › dashboard.spec.ts:401:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed [firefox] › dashboard.spec.ts:401:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed [firefox] › purchase.spec.ts:87:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly 7 skipped 3 did not run 71 passed (30.0m) Timed out waiting 1800s for the entire test run

Artifacts

Produced during runtime
Name Size
playwright-report Expired
36.7 MB
test-results Expired
51.4 MB