Skip to content

Monitor Cron e2e Tests #309

Monitor Cron e2e Tests

Monitor Cron e2e Tests #309

Triggered via schedule July 12, 2024 08:07
Status Failure
Total duration 30m 56s
Artifacts 2

e2e_cron.yml

on: schedule
Fit to window
Zoom out
Zoom in

Annotations

10 errors, 2 warnings, and 1 notice
e2e-tests
Timed out waiting 1800s for the test suite to run
e2e-tests
Timed out waiting 1800s for the teardown for test suite to run
[chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly: src/e2e/specs/dashboard.spec.ts#L723
1) [chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly Test timeout of 180000ms exceeded while running "beforeEach" hook. 721 | 722 | test.describe(`${process.env.E2E_TEST_ENV} - Breaches Dashboard - Data Breaches`, () => { > 723 | test.beforeEach(async ({ landingPage, page, authPage }) => { | ^ 724 | const emailToUse = process.env 725 | .E2E_TEST_ACCOUNT_EMAIL_EXPOSURES_STARTED as string; 726 | const pwdToUse = process.env.E2E_TEST_ACCOUNT_PASSWORD as string; at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:723:8
[chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly: src/e2e/pages/authPage.ts#L40
1) [chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly Error: locator.fill: Test timeout of 180000ms exceeded. Call log: - waiting for locator('input[name="email"]') at ../pages/authPage.ts:40 38 | 39 | async enterEmail(email: string) { > 40 | await this.emailInputField.fill(email); | ^ 41 | await this.continue({ waitForURL: "**/oauth/**" }); 42 | } 43 | at AuthPage.enterEmail (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:40:32) at AuthPage.signIn (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:52:16) at forceLoginAs (/home/runner/work/blurts-server/blurts-server/src/e2e/utils/helpers.ts:221:18) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:729:5
[chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly: src/e2e/specs/dashboard.spec.ts#L723
1) [chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly Retry #1 ─────────────────────────────────────────────────────────────────────────────────────── Test timeout of 180000ms exceeded while running "beforeEach" hook. 721 | 722 | test.describe(`${process.env.E2E_TEST_ENV} - Breaches Dashboard - Data Breaches`, () => { > 723 | test.beforeEach(async ({ landingPage, page, authPage }) => { | ^ 724 | const emailToUse = process.env 725 | .E2E_TEST_ACCOUNT_EMAIL_EXPOSURES_STARTED as string; 726 | const pwdToUse = process.env.E2E_TEST_ACCOUNT_PASSWORD as string; at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:723:8
[chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly: src/e2e/pages/authPage.ts#L40
1) [chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly Retry #1 ─────────────────────────────────────────────────────────────────────────────────────── Error: locator.fill: Test timeout of 180000ms exceeded. Call log: - waiting for locator('input[name="email"]') at ../pages/authPage.ts:40 38 | 39 | async enterEmail(email: string) { > 40 | await this.emailInputField.fill(email); | ^ 41 | await this.continue({ waitForURL: "**/oauth/**" }); 42 | } 43 | at AuthPage.enterEmail (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:40:32) at AuthPage.signIn (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:52:16) at forceLoginAs (/home/runner/work/blurts-server/blurts-server/src/e2e/utils/helpers.ts:221:18) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:729:5
[chromium] › purchase.spec.ts:156:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L1
2) [chromium] › purchase.spec.ts:156:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - yearly Test timeout of 180000ms exceeded.
[chromium] › purchase.spec.ts:156:3 › stage - Breach Scan: src/e2e/pages/purchasePage.ts#L82
2) [chromium] › purchase.spec.ts:156:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - yearly Error: locator.click: Test timeout of 180000ms exceeded. Call log: - waiting for getByTitle('PayPal').nth(1) - locator resolved to <iframe title="PayPal" scrolling="no" allowtransparency=…></iframe> - attempting click action - waiting for element to be visible, enabled and stable - element is not visible - retrying click action, attempt #1 - waiting for element to be visible, enabled and stable - element is not visible - retrying click action, attempt #2 - waiting 20ms - waiting for element to be visible, enabled and stable - element is not visible - retrying click action, attempt #3 - waiting 100ms - waiting for element to be visible, enabled and stable - element is not stable - retrying click action, attempt #4 - waiting 100ms - waiting for element to be visible, enabled and stable - element is visible, enabled and stable - scrolling into view if needed - done scrolling - <iframe title="PayPal" scrolling="no" allowtransparency=…></iframe> intercepts pointer events - retrying click action, attempt #5 - waiting 500ms - waiting for element to be visible, enabled and stable - element is visible, enabled and stable - scrolling into view if needed - done scrolling - <iframe title="PayPal" scrolling="no" allowtransparency=…></iframe> intercepts pointer events - retrying click action, attempt #6 - waiting 500ms - waiting for element to be visible, enabled and stable - element was detached from the DOM, retrying at ../pages/purchasePage.ts:82 80 | //away from mozilla 81 | const pagePromise = context.waitForEvent("page"); > 82 | await this.paypalButton.click(); | ^ 83 | const newPage = await pagePromise; 84 | await newPage.waitForLoadState(); 85 | await newPage.waitForURL(/.*paypal\.com.*checkout.*/); at PurchasePage.fillOutPaypalInfo (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/purchasePage.ts:82:29) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:175:24
[chromium] › purchase.spec.ts:156:3 › stage - Breach Scan: src/e2e/pages/purchasePage.ts#L81
2) [chromium] › purchase.spec.ts:156:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - yearly Error: browserContext.waitForEvent: Test timeout of 180000ms exceeded. at ../pages/purchasePage.ts:81 79 | 80 | //away from mozilla > 81 | const pagePromise = context.waitForEvent("page"); | ^ 82 | await this.paypalButton.click(); 83 | const newPage = await pagePromise; 84 | await newPage.waitForLoadState(); at PurchasePage.fillOutPaypalInfo (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/purchasePage.ts:81:33) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:175:24
[chromium] › purchase.spec.ts:156:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L1
2) [chromium] › purchase.spec.ts:156:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - yearly Retry #1 ─────────────────────────────────────────────────────────────────────────────────────── Test timeout of 180000ms exceeded.
Slow Test: [chromium] › landing.spec.ts#L1
[chromium] › landing.spec.ts took 1.0m
Slow Test: [chromium] › auth.spec.ts#L1
[chromium] › auth.spec.ts took 18.0s
🎭 Playwright Run Summary
3 failed [chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly [chromium] › purchase.spec.ts:156:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - yearly [chromium] › purchase.spec.ts:179:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - monthly 1 flaky [chromium] › dashboard.spec.ts:401:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed 3 skipped 41 did not run 36 passed (30.0m)

Artifacts

Produced during runtime
Name Size
playwright-report Expired
29.9 MB
test-results Expired
32.5 MB