Skip to content

Monitor Cron e2e Tests #458

Monitor Cron e2e Tests

Monitor Cron e2e Tests #458

Re-run triggered October 31, 2024 15:35
Status Success
Total duration 27m 2s
Artifacts 4

e2e_cron.yml

on: workflow_dispatch
Fit to window
Zoom out
Zoom in

Annotations

10 errors, 5 warnings, and 1 notice
[chromium] › dashboard/dashboard-breaches-scan.spec.ts:36:3 › stage - Breaches Dashboard - Breaches Scan: src/e2e/specs/dashboard/dashboard-breaches-scan.spec.ts#L1
1) [chromium] › dashboard/dashboard-breaches-scan.spec.ts:36:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed Test timeout of 180000ms exceeded.
[chromium] › dashboard/dashboard-breaches-scan.spec.ts:36:3 › stage - Breaches Dashboard - Breaches Scan: src/e2e/specs/dashboard/dashboard-breaches-scan.spec.ts#L77
1) [chromium] › dashboard/dashboard-breaches-scan.spec.ts:36:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed Error: locator.waitFor: Test timeout of 180000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Get continuous protection' }) to be visible 75 | } 76 | > 77 | await dashboardPage.continuousProtectionButton.waitFor(); | ^ 78 | await expect(dashboardPage.continuousProtectionButton).toBeVisible(); 79 | await dashboardPage.continuousProtectionButton.click(); 80 | await dashboardPage.verifyPremiumUpsellModalOptions(); at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard/dashboard-breaches-scan.spec.ts:77:52
[chromium] › dashboard/dashboard-headers.spec.ts:33:3 › stage - Breaches Dashboard - Headers @smoke › Verify that the site header is displayed correctly for signed in users: src/e2e/specs/dashboard/dashboard-headers.spec.ts#L14
2) [chromium] › dashboard/dashboard-headers.spec.ts:33:3 › stage - Breaches Dashboard - Headers @smoke › Verify that the site header is displayed correctly for signed in users Test timeout of 60000ms exceeded while running "beforeEach" hook. 12 | 13 | test.describe(`${process.env.E2E_TEST_ENV} - Breaches Dashboard - Headers @smoke`, () => { > 14 | test.beforeEach(async ({ dashboardPage, welcomePage, page }) => { | ^ 15 | await dashboardPage.open(); 16 | 17 | try { at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard/dashboard-headers.spec.ts:14:8
[chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields: src/e2e/specs/landing/landing-content.spec.ts#L1
3) [chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields Test timeout of 60000ms exceeded.
[chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields: src/e2e/specs/landing/landing-content.spec.ts#L204
3) [chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields Error: locator.waitFor: Test timeout of 60000ms exceeded. Call log: - waiting for locator('[type="password"]').first() to be visible 202 | await landingPage.monitorHeroFormEmailInputField.fill(randomEmail); 203 | await landingPage.monitorHeroFormInputSubmitButton.click(); > 204 | await authPage.passwordInputField.waitFor(); | ^ 205 | await expect(authPage.passwordInputField).toBeVisible(); 206 | } else { 207 | ///free-scan-cta experiment is on at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/landing/landing-content.spec.ts:204:41
[chromium] › purchase.spec.ts:173:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L1
4) [chromium] › purchase.spec.ts:173:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - monthly Test timeout of 180000ms exceeded.
[chromium] › purchase.spec.ts:173:3 › stage - Breach Scan: src/e2e/pages/purchasePage.ts#L163
4) [chromium] › purchase.spec.ts:173:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - monthly Error: locator.waitFor: Test timeout of 180000ms exceeded. Call log: - waiting for getByText('Subscription confirmation') to be visible at ../pages/purchasePage.ts:163 161 | 162 | async postPaymentPageCheck(dashboardPage: DashboardPage) { > 163 | await this.page.getByText("Subscription confirmation").waitFor(); | ^ 164 | // navigate to confirmation 165 | await this.getStartedButton.click(); 166 | await this.goToNextStep.click(); at PurchasePage.postPaymentPageCheck (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/purchasePage.ts:163:60) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:189:24
[firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields: src/e2e/specs/landing/landing-content.spec.ts#L1
5) [firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields Test timeout of 60000ms exceeded.
[firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields: src/e2e/specs/landing/landing-content.spec.ts#L204
5) [firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields Error: locator.waitFor: Test timeout of 60000ms exceeded. Call log: - waiting for locator('[type="password"]').first() to be visible 202 | await landingPage.monitorHeroFormEmailInputField.fill(randomEmail); 203 | await landingPage.monitorHeroFormInputSubmitButton.click(); > 204 | await authPage.passwordInputField.waitFor(); | ^ 205 | await expect(authPage.passwordInputField).toBeVisible(); 206 | } else { 207 | ///free-scan-cta experiment is on at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/landing/landing-content.spec.ts:204:41
[firefox] › purchase.spec.ts:173:3 › stage - Breach Scan: src/e2e/pages/purchasePage.ts#L168
6) [firefox] › purchase.spec.ts:173:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - monthly TimeoutError: locator.waitFor: Timeout 10000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Automatic data removal: On' }) at ../pages/purchasePage.ts:168 166 | await this.goToNextStep.click(); 167 | // confirm successful payment > 168 | await dashboardPage.plusSubscription.waitFor({ | ^ 169 | state: "attached", 170 | timeout: 10000, 171 | }); at PurchasePage.postPaymentPageCheck (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/purchasePage.ts:168:42) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:189:5
Slow Test: [firefox] › dashboard/dashboard-breaches-scan.spec.ts#L1
[firefox] › dashboard/dashboard-breaches-scan.spec.ts took 45.4s
Slow Test: [firefox] › landing/landing-new-account.spec.ts#L1
[firefox] › landing/landing-new-account.spec.ts took 22.5s
Slow Test: [chromium] › landing/landing-new-account.spec.ts#L1
[chromium] › landing/landing-new-account.spec.ts took 22.2s
Slow Test: [firefox] › auth.spec.ts#L1
[firefox] › auth.spec.ts took 20.1s
Slow Test: [firefox] › dashboard/dashboard-footer.spec.ts#L1
[firefox] › dashboard/dashboard-footer.spec.ts took 18.6s
🎭 Playwright Run Summary
6 flaky [chromium] › dashboard/dashboard-breaches-scan.spec.ts:36:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed [chromium] › dashboard/dashboard-headers.spec.ts:33:3 › stage - Breaches Dashboard - Headers @smoke › Verify that the site header is displayed correctly for signed in users [chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields [chromium] › purchase.spec.ts:173:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - monthly [firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields [firefox] › purchase.spec.ts:173:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - monthly 6 skipped 74 passed (26.1m)

Artifacts

Produced during runtime
Name Size
playwright-report Expired
37.3 MB
test-results Expired
36.4 MB