Skip to content

Monitor Cron e2e Tests #345

Monitor Cron e2e Tests

Monitor Cron e2e Tests #345

Triggered via schedule August 1, 2024 08:06
Status Failure
Total duration 30m 56s
Artifacts 2

e2e_cron.yml

on: schedule
Fit to window
Zoom out
Zoom in

Annotations

10 errors, 3 warnings, and 1 notice
e2e-tests
Timed out waiting 1800s for the test suite to run
e2e-tests
Timed out waiting 1800s for the teardown for test suite to run
[chromium] › purchase.spec.ts:42:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L1
1) [chromium] › purchase.spec.ts:42:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Yearly Test timeout of 180000ms exceeded.
[chromium] › purchase.spec.ts:42:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L83
1) [chromium] › purchase.spec.ts:42:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Yearly Error: locator.waitFor: Test timeout of 180000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Automatic data removal: On' }) to be visible 81 | 82 | // confirm successful payment > 83 | await dashboardPage.plusSubscription.waitFor(); | ^ 84 | await expect(dashboardPage.plusSubscription).toBeVisible(); 85 | }); 86 | at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:83:42
[chromium] › purchase.spec.ts:42:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L1
1) [chromium] › purchase.spec.ts:42:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Yearly Retry #1 ─────────────────────────────────────────────────────────────────────────────────────── Test timeout of 180000ms exceeded.
[chromium] › purchase.spec.ts:42:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L83
1) [chromium] › purchase.spec.ts:42:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Yearly Retry #1 ─────────────────────────────────────────────────────────────────────────────────────── Error: locator.waitFor: Test timeout of 180000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Automatic data removal: On' }) to be visible 81 | 82 | // confirm successful payment > 83 | await dashboardPage.plusSubscription.waitFor(); | ^ 84 | await expect(dashboardPage.plusSubscription).toBeVisible(); 85 | }); 86 | at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:83:42
[chromium] › purchase.spec.ts:87:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L149
2) [chromium] › purchase.spec.ts:87:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly TimeoutError: locator.waitFor: Timeout 5000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Automatic data removal: On' }) 147 | 148 | // confirm successful payment > 149 | await dashboardPage.plusSubscription.waitFor({ | ^ 150 | state: "attached", 151 | timeout: 5000, 152 | }); at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:149:42
[chromium] › purchase.spec.ts:87:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L149
2) [chromium] › purchase.spec.ts:87:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly Retry #1 ─────────────────────────────────────────────────────────────────────────────────────── TimeoutError: locator.waitFor: Timeout 5000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Automatic data removal: On' }) 147 | 148 | // confirm successful payment > 149 | await dashboardPage.plusSubscription.waitFor({ | ^ 150 | state: "attached", 151 | timeout: 5000, 152 | }); at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:149:42
[chromium] › purchase.spec.ts:156:3 › stage - Breach Scan: src/e2e/pages/purchasePage.ts#L168
3) [chromium] › purchase.spec.ts:156:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - yearly TimeoutError: locator.waitFor: Timeout 10000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Automatic data removal: On' }) at ../pages/purchasePage.ts:168 166 | await this.goToNextStep.click(); 167 | // confirm successful payment > 168 | await dashboardPage.plusSubscription.waitFor({ | ^ 169 | state: "attached", 170 | timeout: 10000, 171 | }); at PurchasePage.postPaymentPageCheck (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/purchasePage.ts:168:42) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:176:5
[chromium] › purchase.spec.ts:156:3 › stage - Breach Scan: src/e2e/pages/purchasePage.ts#L168
3) [chromium] › purchase.spec.ts:156:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - yearly Retry #1 ─────────────────────────────────────────────────────────────────────────────────────── TimeoutError: locator.waitFor: Timeout 10000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Automatic data removal: On' }) at ../pages/purchasePage.ts:168 166 | await this.goToNextStep.click(); 167 | // confirm successful payment > 168 | await dashboardPage.plusSubscription.waitFor({ | ^ 169 | state: "attached", 170 | timeout: 10000, 171 | }); at PurchasePage.postPaymentPageCheck (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/purchasePage.ts:168:42) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:176:5
Slow Test: [chromium] › landing.spec.ts#L1
[chromium] › landing.spec.ts took 1.4m
Slow Test: [firefox] › auth.spec.ts#L1
[firefox] › auth.spec.ts took 19.2s
Slow Test: [chromium] › auth.spec.ts#L1
[chromium] › auth.spec.ts took 18.3s
🎭 Playwright Run Summary
4 failed [chromium] › purchase.spec.ts:42:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Yearly [chromium] › purchase.spec.ts:87:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly [chromium] › purchase.spec.ts:156:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - yearly [chromium] › purchase.spec.ts:179:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - monthly 2 flaky [chromium] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed [firefox] › dashboard.spec.ts:406:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed 5 skipped 28 did not run 47 passed (30.0m)

Artifacts

Produced during runtime
Name Size
playwright-report Expired
73.2 MB
test-results Expired
78.7 MB