Skip to content

Monitor Cron e2e Tests #511

Monitor Cron e2e Tests

Monitor Cron e2e Tests #511

Triggered via schedule December 18, 2024 08:07
Status Success
Total duration 20m 41s
Artifacts 2

e2e_cron.yml

on: schedule
Fit to window
Zoom out
Zoom in

Annotations

3 errors, 6 warnings, and 1 notice
[firefox] › purchase.spec.ts:48:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L1
1) [firefox] › purchase.spec.ts:48:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Yearly Test timeout of 180000ms exceeded.
[firefox] › purchase.spec.ts:48:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L78
1) [firefox] › purchase.spec.ts:48:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Yearly Error: locator.waitFor: Test timeout of 180000ms exceeded. Call log: - waiting for getByText('Subscription confirmation') to be visible 76 | await purchasePage.fillOutStripeCardInfo(); 77 | await purchasePage.payNowButton.click({ force: true }); > 78 | await page.getByText("Subscription confirmation").waitFor(); | ^ 79 | // navigate to confirmation 80 | await purchasePage.getStartedButton.click(); 81 | await purchasePage.goToNextStep.waitFor(); at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:78:55
[firefox] › purchase.spec.ts:173:3 › stage - Breach Scan: src/e2e/pages/purchasePage.ts#L168
2) [firefox] › purchase.spec.ts:173:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - monthly TimeoutError: locator.waitFor: Timeout 10000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Automatic data removal: On' }) at ../pages/purchasePage.ts:168 166 | await this.goToNextStep.click(); 167 | // confirm successful payment > 168 | await dashboardPage.plusSubscription.waitFor({ | ^ 169 | state: "attached", 170 | timeout: 10000, 171 | }); at PurchasePage.postPaymentPageCheck (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/purchasePage.ts:168:42) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:189:5
e2e-tests
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Slow Test: [chromium] › purchase.spec.ts#L1
[chromium] › purchase.spec.ts took 3.4m
Slow Test: [firefox] › dashboard/dashboard-breaches-scan.spec.ts#L1
[firefox] › dashboard/dashboard-breaches-scan.spec.ts took 47.5s
Slow Test: [chromium] › dashboard/dashboard-breaches-scan.spec.ts#L1
[chromium] › dashboard/dashboard-breaches-scan.spec.ts took 39.0s
Slow Test: [firefox] › landing/landing-content.spec.ts#L1
[firefox] › landing/landing-content.spec.ts took 35.9s
Slow Test: [firefox] › landing/landing-new-account.spec.ts#L1
[firefox] › landing/landing-new-account.spec.ts took 25.1s
🎭 Playwright Run Summary
2 flaky [firefox] › purchase.spec.ts:48:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Yearly [firefox] › purchase.spec.ts:173:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - monthly 6 skipped 78 passed (19.8m)

Artifacts

Produced during runtime
Name Size
playwright-report
24.9 MB
test-results
23.7 MB