Skip to content

Monitor Cron e2e Tests #473

Monitor Cron e2e Tests

Monitor Cron e2e Tests #473

Triggered via schedule November 14, 2024 08:07
Status Success
Total duration 23m 11s
Artifacts 2

e2e_cron.yml

on: schedule
Fit to window
Zoom out
Zoom in

Annotations

9 errors, 5 warnings, and 1 notice
[chromium] › dashboard/dashboard-headers.spec.ts:141:3 › stage - Breaches Dashboard - Headers @smoke › Verify that the Apps and Services header options work correctly.: src/e2e/specs/dashboard/dashboard-headers.spec.ts#L1
1) [chromium] › dashboard/dashboard-headers.spec.ts:141:3 › stage - Breaches Dashboard - Headers @smoke › Verify that the Apps and Services header options work correctly. Test timeout of 60000ms exceeded.
[chromium] › dashboard/dashboard-headers.spec.ts:141:3 › stage - Breaches Dashboard - Headers @smoke › Verify that the Apps and Services header options work correctly.: src/e2e/specs/dashboard/dashboard-headers.spec.ts#L203
1) [chromium] › dashboard/dashboard-headers.spec.ts:141:3 › stage - Breaches Dashboard - Headers @smoke › Verify that the Apps and Services header options work correctly. Error: locator.click: Test timeout of 60000ms exceeded. Call log: - waiting for getByTitle('Profile').nth(1) 201 | ) => { 202 | await dashboardPage.open(); > 203 | await dashboardPage.profileButton.click(); | ^ 204 | await expect(what).toBeVisible(); 205 | if (await what.evaluate((e) => e.hasAttribute("href"))) { 206 | const href = await what.getAttribute("href"); at openProfileMenuItem (/home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard/dashboard-headers.spec.ts:203:41) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard/dashboard-headers.spec.ts:215:5
[chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields: src/e2e/specs/landing/landing-content.spec.ts#L1
2) [chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields Test timeout of 60000ms exceeded.
[chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields: src/e2e/specs/landing/landing-content.spec.ts#L204
2) [chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields Error: locator.waitFor: Test timeout of 60000ms exceeded. Call log: - waiting for locator('[type="password"]').first() to be visible 202 | await landingPage.monitorHeroFormEmailInputField.fill(randomEmail); 203 | await landingPage.monitorHeroFormInputSubmitButton.click(); > 204 | await authPage.passwordInputField.waitFor(); | ^ 205 | await expect(authPage.passwordInputField).toBeVisible(); 206 | } else { 207 | ///free-scan-cta experiment is on at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/landing/landing-content.spec.ts:204:41
[chromium] › purchase.spec.ts:48:3 › stage - Breach Scan: src/e2e/pages/purchasePage.ts#L70
3) [chromium] › purchase.spec.ts:48:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Yearly Error: frame.fill: Frame was detached Call log: - waiting for locator('.InputElement[name=cardnumber]') at ../pages/purchasePage.ts:70 68 | } 69 | > 70 | await frame.fill(".InputElement[name=cardnumber]", ""); | ^ 71 | await frame.fill(".InputElement[name=cardnumber]", "4242424242424242"); 72 | await frame.fill(".InputElement[name=exp-date]", "555"); 73 | await frame.fill(".InputElement[name=cvc]", "333"); at PurchasePage.fillOutStripeCardInfo (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/purchasePage.ts:70:17) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:76:5
[firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields: src/e2e/specs/landing/landing-content.spec.ts#L1
4) [firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields Test timeout of 60000ms exceeded.
[firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields: src/e2e/specs/landing/landing-content.spec.ts#L204
4) [firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields Error: locator.waitFor: Test timeout of 60000ms exceeded. Call log: - waiting for locator('[type="password"]').first() to be visible 202 | await landingPage.monitorHeroFormEmailInputField.fill(randomEmail); 203 | await landingPage.monitorHeroFormInputSubmitButton.click(); > 204 | await authPage.passwordInputField.waitFor(); | ^ 205 | await expect(authPage.passwordInputField).toBeVisible(); 206 | } else { 207 | ///free-scan-cta experiment is on at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/landing/landing-content.spec.ts:204:41
[firefox] › purchase.spec.ts:89:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L147
5) [firefox] › purchase.spec.ts:89:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly TimeoutError: locator.waitFor: Timeout 5000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Automatic data removal: On' }) 145 | 146 | // confirm successful payment > 147 | await dashboardPage.plusSubscription.waitFor({ | ^ 148 | state: "attached", 149 | timeout: 5000, 150 | }); at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:147:42
[firefox] › purchase.spec.ts:173:3 › stage - Breach Scan: src/e2e/pages/purchasePage.ts#L168
6) [firefox] › purchase.spec.ts:173:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - monthly TimeoutError: locator.waitFor: Timeout 10000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Automatic data removal: On' }) at ../pages/purchasePage.ts:168 166 | await this.goToNextStep.click(); 167 | // confirm successful payment > 168 | await dashboardPage.plusSubscription.waitFor({ | ^ 169 | state: "attached", 170 | timeout: 10000, 171 | }); at PurchasePage.postPaymentPageCheck (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/purchasePage.ts:168:42) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:189:5
Slow Test: [chromium] › dashboard/dashboard-breaches-scan.spec.ts#L1
[chromium] › dashboard/dashboard-breaches-scan.spec.ts took 44.3s
Slow Test: [firefox] › dashboard/dashboard-breaches-scan.spec.ts#L1
[firefox] › dashboard/dashboard-breaches-scan.spec.ts took 44.1s
Slow Test: [firefox] › landing/landing-new-account.spec.ts#L1
[firefox] › landing/landing-new-account.spec.ts took 23.7s
Slow Test: [chromium] › landing/landing-new-account.spec.ts#L1
[chromium] › landing/landing-new-account.spec.ts took 23.6s
Slow Test: [firefox] › auth.spec.ts#L1
[firefox] › auth.spec.ts took 21.8s
🎭 Playwright Run Summary
6 flaky [chromium] › dashboard/dashboard-headers.spec.ts:141:3 › stage - Breaches Dashboard - Headers @smoke › Verify that the Apps and Services header options work correctly. [chromium] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields [chromium] › purchase.spec.ts:48:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Yearly [firefox] › landing/landing-content.spec.ts:186:3 › stage - Verify the Landing Page content › Verify the "Get free scan" corresponding email fields [firefox] › purchase.spec.ts:89:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly [firefox] › purchase.spec.ts:173:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - monthly 6 skipped 74 passed (22.3m)

Artifacts

Produced during runtime
Name Size
playwright-report
50.6 MB
test-results
49.7 MB