Skip to content

Monitor Cron e2e Tests #257

Monitor Cron e2e Tests

Monitor Cron e2e Tests #257

Manually triggered June 6, 2024 18:15
Status Failure
Total duration 31m 25s
Artifacts 2

e2e_cron.yml

on: workflow_dispatch
Fit to window
Zoom out
Zoom in

Annotations

9 errors, 4 warnings, and 1 notice
e2e-tests
Timed out waiting 1800s for the test suite to run
e2e-tests
Timed out waiting 1800s for the teardown for test suite to run
[chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly: src/e2e/specs/dashboard.spec.ts#L1
1) [chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly Test timeout of 180000ms exceeded.
[chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly: src/e2e/specs/dashboard.spec.ts#L745
1) [chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly Error: page.waitForURL: Test timeout of 180000ms exceeded. =========================== logs =========================== waiting for navigation until "load" ============================================================ 743 | await expect(dashboardPage.upsellScreenButton).toBeVisible(); 744 | await dashboardPage.upsellScreenButton.click(); > 745 | await page.waitForURL(/.*\/data-broker-profiles\/view-data-brokers\/?/); | ^ 746 | await expect(dataBrokersPage.forwardArrowButton).toBeVisible(); 747 | await dataBrokersPage.forwardArrowButton.click(); 748 | await page.waitForURL(/.*\/high-risk-data-breaches.*/); at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:745:16
[chromium] › purchase.spec.ts:90:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L151
2) [chromium] › purchase.spec.ts:90:3 › stage - Breach Scan, Monitor Plus Purchase Flow Yearly › Verify that the user can purchase the plus subscription with a Stripe card - Monthly TimeoutError: locator.waitFor: Timeout 5000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Automatic data removal: On' }) 149 | 150 | // confirm successful payment > 151 | await dashboardPage.plusSubscription.waitFor({ | ^ 152 | state: "attached", 153 | timeout: 5000, 154 | }); at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:151:42
[chromium] › purchase.spec.ts:158:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L1
3) [chromium] › purchase.spec.ts:158:3 › stage - Breach Scan, Monitor Plus Purchase Flow Yearly › Verify that the user can purchase the plus subscription with a PayPal account - yearly Test timeout of 180000ms exceeded.
[chromium] › purchase.spec.ts:158:3 › stage - Breach Scan: src/e2e/pages/purchasePage.ts#L85
3) [chromium] › purchase.spec.ts:158:3 › stage - Breach Scan, Monitor Plus Purchase Flow Yearly › Verify that the user can purchase the plus subscription with a PayPal account - yearly Error: page.waitForURL: Test timeout of 180000ms exceeded. =========================== logs =========================== waiting for navigation until "load" navigated to "https://www.sandbox.paypal.com/signin/?intent=checkout&correlationId=f2123594ed616&flowId=EC-33D32109KW1415531&state=%3Fflow%3D1-P%26sessionID%3Duid_bec2b90766_mtg6mze6mjg%26buttonSessionID%3Duid_12eb33f582_mtg6mze6mjk%26stickinessID%3Duid_f54be558fa_mtg6mze6mjg%26smokeHash%3D%26sign_out_user%3Dfalse%26fundingSource%3Dpaypal%26buyerCountry%3DUS%26locale.x%3Den_US%26commit%3Dfalse%26client-metadata-id%3Duid_bec2b90766_mtg6mze6mjg%26clientID%3DAZDxjDScFpQtjWTOUtWKbyN_bDt4OgqaF4eYXlewfBP4-8aqX3PiV8e1GWU6liB2CUXlkA59kJXE7M6R%26env%3Dsandbox%26sdkMeta%3DeyJ1cmwiOiJodHRwczovL3d3dy5wYXlwYWwuY29tL3Nkay9qcz9jbGllbnQtaWQ9c2ImdmF1bHQ9dHJ1ZSZjb21taXQ9ZmFsc2UmaW50ZW50PWNhcHR1cmUmZGlzYWJsZS1mdW5kaW5nPWNyZWRpdCxjYXJkIiwiYXR0cnMiOnsiZGF0YS1jc3Atbm9uY2UiOiJiNWMyNzY1ZC1jYTZkLTQ5MTUtODkzMi1iOTY2NjAwOWExYzYiLCJkYXRhLXVpZCI6InVpZF9wc2tkaHZmdnBrb3pobnRseHV5Y29semZqcXV0amsifX0%26xcomponent%3D1%26version%3D5.0.442%26token%3DEC-33D32109KW1415531%26ssrt%3D1717698691010%26rcache%3D1%26cookieBannerVariant%3Dhidden&returnUri=%2Fwebapps%2Fhermes%2F" ============================================================ at ../pages/purchasePage.ts:85 83 | const newPage = await pagePromise; 84 | await newPage.waitForLoadState(); > 85 | await newPage.waitForURL(/.*paypal\.com.*\/checkout.*/); | ^ 86 | 87 | const emailPrompt = newPage.locator("#email"); 88 | await expect(emailPrompt).toBeVisible(); at PurchasePage.fillOutPaypalInfo (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/purchasePage.ts:85:19) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:177:5
[firefox] › purchase.spec.ts:42:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L73
4) [firefox] › purchase.spec.ts:42:3 › stage - Breach Scan, Monitor Plus Purchase Flow Yearly › Verify that the user can purchase the plus subscription with a Stripe card - Yearly Error: locator.check: Clicking the checkbox did not change its state Call log: - waiting for getByTestId('confirm') - locator resolved to <input name="confirm" type="checkbox" data-testid="conf…/> - attempting click action - waiting for element to be visible, enabled and stable - element is visible, enabled and stable - scrolling into view if needed - done scrolling - performing click action - click action done - waiting for scheduled navigations to finish - navigations have finished 71 | 72 | // fill out subscription payment > 73 | await purchasePage.authorizationCheckbox.check(); | ^ 74 | await purchasePage.fillOutStripeCardInfo(); 75 | await purchasePage.payNowButton.click(); 76 | await page.getByText("Subscription confirmation").waitFor(); at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:73:46
e2e-tests
The action 'Run Playwright tests - stage' has timed out after 30 minutes.
Slow Test: [firefox] › landing.spec.ts#L1
[firefox] › landing.spec.ts took 1.0m
Slow Test: [chromium] › landing.spec.ts#L1
[chromium] › landing.spec.ts took 59.5s
Slow Test: [chromium] › auth.spec.ts#L1
[chromium] › auth.spec.ts took 18.3s
Slow Test: [firefox] › auth.spec.ts#L1
[firefox] › auth.spec.ts took 17.9s
🎭 Playwright Run Summary
4 flaky [chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly [chromium] › purchase.spec.ts:90:3 › stage - Breach Scan, Monitor Plus Purchase Flow Yearly › Verify that the user can purchase the plus subscription with a Stripe card - Monthly [chromium] › purchase.spec.ts:158:3 › stage - Breach Scan, Monitor Plus Purchase Flow Yearly › Verify that the user can purchase the plus subscription with a PayPal account - yearly [firefox] › purchase.spec.ts:42:3 › stage - Breach Scan, Monitor Plus Purchase Flow Yearly › Verify that the user can purchase the plus subscription with a Stripe card - Yearly 5 skipped 3 did not run 72 passed (30.0m) Timed out waiting 1800s for the entire test run

Artifacts

Produced during runtime
Name Size Digest
playwright-report Expired
41.3 MB
sha256:1c3e0bbdcf4501fcb61dbde4b4c599be32943d5fbaaaf5b817b9ce6f514b811b
test-results Expired
56.7 MB
sha256:3bfdfc676565eb1aebfd0d16a0e2d767fc97e8e0ab03f84d0ba7a897ac1fa6f2