This repository has been archived by the owner on Sep 11, 2024. It is now read-only.
End to End Tests #6434
Triggered via workflow run
January 2, 2024 19:10
BillCarsonFr
completed
a0c8575
Status
Failure
Total duration
26m 22s
Artifacts
2
Annotations
12 errors, 5 warnings, and 1 notice
Run Tests 5/8
The process '/usr/bin/xvfb-run' failed with exit code 1
|
Run Tests 1/8
The process '/usr/bin/xvfb-run' failed with exit code 1
|
[Legacy Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login:
matrix-react-sdk/playwright/e2e/crypto/utils.ts#L128
1) [Legacy Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login
Error: expect(received).toBe(expected) // Object.is equality
Expected: "1 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
Received: "2 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
at crypto/utils.ts:128
126 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(5) td")
127 | .textContent();
> 128 | expect(serverVersion.trim()).toBe(expectedBackupVersion + " (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)");
| ^
129 |
130 | const activeVersion = await page
131 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(6) td")
at checkDeviceIsConnectedKeyBackup (/home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/utils.ts:128:34)
at /home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/verification.spec.ts:153:9
|
[Legacy Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login:
matrix-react-sdk/playwright/e2e/crypto/utils.ts#L128
1) [Legacy Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login
Retry #1 ───────────────────────────────────────────────────────────────────────────────────────
Error: expect(received).toBe(expected) // Object.is equality
Expected: "1 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
Received: "2 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
at crypto/utils.ts:128
126 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(5) td")
127 | .textContent();
> 128 | expect(serverVersion.trim()).toBe(expectedBackupVersion + " (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)");
| ^
129 |
130 | const activeVersion = await page
131 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(6) td")
at checkDeviceIsConnectedKeyBackup (/home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/utils.ts:128:34)
at /home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/verification.spec.ts:153:9
|
[Legacy Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login:
matrix-react-sdk/playwright/e2e/crypto/utils.ts#L128
1) [Legacy Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login
Retry #2 ───────────────────────────────────────────────────────────────────────────────────────
Error: expect(received).toBe(expected) // Object.is equality
Expected: "1 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
Received: "2 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
at crypto/utils.ts:128
126 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(5) td")
127 | .textContent();
> 128 | expect(serverVersion.trim()).toBe(expectedBackupVersion + " (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)");
| ^
129 |
130 | const activeVersion = await page
131 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(6) td")
at checkDeviceIsConnectedKeyBackup (/home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/utils.ts:128:34)
at /home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/verification.spec.ts:153:9
|
[Legacy Crypto] › crypto/verification.spec.ts:156:9 › Device verification › Verify device with Security Key during login:
matrix-react-sdk/playwright/e2e/crypto/utils.ts#L128
2) [Legacy Crypto] › crypto/verification.spec.ts:156:9 › Device verification › Verify device with Security Key during login
Error: expect(received).toBe(expected) // Object.is equality
Expected: "1 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
Received: "2 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
at crypto/utils.ts:128
126 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(5) td")
127 | .textContent();
> 128 | expect(serverVersion.trim()).toBe(expectedBackupVersion + " (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)");
| ^
129 |
130 | const activeVersion = await page
131 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(6) td")
at checkDeviceIsConnectedKeyBackup (/home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/utils.ts:128:34)
at /home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/verification.spec.ts:175:9
|
[Legacy Crypto] › crypto/verification.spec.ts:156:9 › Device verification › Verify device with Security Key during login:
matrix-react-sdk/playwright/e2e/crypto/utils.ts#L128
2) [Legacy Crypto] › crypto/verification.spec.ts:156:9 › Device verification › Verify device with Security Key during login
Retry #1 ───────────────────────────────────────────────────────────────────────────────────────
Error: expect(received).toBe(expected) // Object.is equality
Expected: "1 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
Received: "2 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
at crypto/utils.ts:128
126 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(5) td")
127 | .textContent();
> 128 | expect(serverVersion.trim()).toBe(expectedBackupVersion + " (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)");
| ^
129 |
130 | const activeVersion = await page
131 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(6) td")
at checkDeviceIsConnectedKeyBackup (/home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/utils.ts:128:34)
at /home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/verification.spec.ts:175:9
|
[Legacy Crypto] › crypto/verification.spec.ts:156:9 › Device verification › Verify device with Security Key during login:
matrix-react-sdk/playwright/e2e/crypto/utils.ts#L128
2) [Legacy Crypto] › crypto/verification.spec.ts:156:9 › Device verification › Verify device with Security Key during login
Retry #2 ───────────────────────────────────────────────────────────────────────────────────────
Error: expect(received).toBe(expected) // Object.is equality
Expected: "1 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
Received: "2 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
at crypto/utils.ts:128
126 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(5) td")
127 | .textContent();
> 128 | expect(serverVersion.trim()).toBe(expectedBackupVersion + " (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)");
| ^
129 |
130 | const activeVersion = await page
131 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(6) td")
at checkDeviceIsConnectedKeyBackup (/home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/utils.ts:128:34)
at /home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/verification.spec.ts:175:9
|
[Rust Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login:
matrix-react-sdk/playwright/e2e/crypto/utils.ts#L128
3) [Rust Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login
Error: expect(received).toBe(expected) // Object.is equality
Expected: "1 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
Received: "2 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
at crypto/utils.ts:128
126 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(5) td")
127 | .textContent();
> 128 | expect(serverVersion.trim()).toBe(expectedBackupVersion + " (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)");
| ^
129 |
130 | const activeVersion = await page
131 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(6) td")
at checkDeviceIsConnectedKeyBackup (/home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/utils.ts:128:34)
at /home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/verification.spec.ts:153:9
|
[Rust Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login:
matrix-react-sdk/playwright/e2e/crypto/utils.ts#L128
3) [Rust Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login
Retry #1 ───────────────────────────────────────────────────────────────────────────────────────
Error: expect(received).toBe(expected) // Object.is equality
Expected: "1 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
Received: "2 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
at crypto/utils.ts:128
126 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(5) td")
127 | .textContent();
> 128 | expect(serverVersion.trim()).toBe(expectedBackupVersion + " (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)");
| ^
129 |
130 | const activeVersion = await page
131 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(6) td")
at checkDeviceIsConnectedKeyBackup (/home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/utils.ts:128:34)
at /home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/verification.spec.ts:153:9
|
[Rust Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login:
matrix-react-sdk/playwright/e2e/crypto/utils.ts#L128
3) [Rust Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login
Retry #2 ───────────────────────────────────────────────────────────────────────────────────────
Error: expect(received).toBe(expected) // Object.is equality
Expected: "1 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
Received: "2 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
at crypto/utils.ts:128
126 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(5) td")
127 | .textContent();
> 128 | expect(serverVersion.trim()).toBe(expectedBackupVersion + " (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)");
| ^
129 |
130 | const activeVersion = await page
131 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(6) td")
at checkDeviceIsConnectedKeyBackup (/home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/utils.ts:128:34)
at /home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/verification.spec.ts:153:9
|
[Rust Crypto] › crypto/verification.spec.ts:156:9 › Device verification › Verify device with Security Key during login:
matrix-react-sdk/playwright/e2e/crypto/utils.ts#L128
4) [Rust Crypto] › crypto/verification.spec.ts:156:9 › Device verification › Verify device with Security Key during login
Error: expect(received).toBe(expected) // Object.is equality
Expected: "1 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
Received: "2 (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)"
at crypto/utils.ts:128
126 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(5) td")
127 | .textContent();
> 128 | expect(serverVersion.trim()).toBe(expectedBackupVersion + " (Algorithm: m.megolm_backup.v1.curve25519-aes-sha2)");
| ^
129 |
130 | const activeVersion = await page
131 | .locator(".mx_Dialog .mx_SecureBackupPanel_statusList tr:nth-child(6) td")
at checkDeviceIsConnectedKeyBackup (/home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/utils.ts:128:34)
at /home/runner/work/matrix-react-sdk/matrix-react-sdk/matrix-react-sdk/playwright/e2e/crypto/verification.spec.ts:175:9
|
Slow Test:
[Rust Crypto] › read-receipts/redactions.spec.ts#L1
[Rust Crypto] › read-receipts/redactions.spec.ts took 6.0m
|
Slow Test:
[Legacy Crypto] › crypto/verification.spec.ts#L1
[Legacy Crypto] › crypto/verification.spec.ts took 5.8m
|
Slow Test:
[Legacy Crypto] › read-receipts/redactions.spec.ts#L1
[Legacy Crypto] › read-receipts/redactions.spec.ts took 5.4m
|
Slow Test:
[Rust Crypto] › crypto/verification.spec.ts#L1
[Rust Crypto] › crypto/verification.spec.ts took 5.3m
|
Slow Test:
[Rust Crypto] › read-receipts/new-messages.spec.ts#L1
[Rust Crypto] › read-receipts/new-messages.spec.ts took 3.9m
|
🎭 Playwright Run Summary
4 failed
[Legacy Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login
[Legacy Crypto] › crypto/verification.spec.ts:156:9 › Device verification › Verify device with Security Key during login
[Rust Crypto] › crypto/verification.spec.ts:136:9 › Device verification › Verify device with Security Phrase during login
[Rust Crypto] › crypto/verification.spec.ts:156:9 › Device verification › Verify device with Security Key during login
5 flaky
[Legacy Crypto] › crypto/verification.spec.ts:93:9 › Device verification › Verify device with QR code during login
[Legacy Crypto] › room/room.spec.ts:64:9 › Room Directory › should memorize the timeline position when switch Room A -> Room B -> Room A
[Rust Crypto] › crypto/verification.spec.ts:69:9 › Device verification › Verify device with SAS during login
[Rust Crypto] › room/room.spec.ts:64:9 › Room Directory › should memorize the timeline position when switch Room A -> Room B -> Room A
[Rust Crypto] › timeline/timeline.spec.ts:555:13 › Timeline › message displaying › should set inline start padding to a hidden event line
113 skipped
608 passed (18.8m)
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
all-blob-reports
Expired
|
109 MB |
|
html-report--attempt-1
Expired
|
129 MB |
|