Monitor Cron e2e Tests #309
Annotations
10 errors, 2 warnings, and 1 notice
e2e-tests
Timed out waiting 1800s for the test suite to run
|
e2e-tests
Timed out waiting 1800s for the teardown for test suite to run
|
[chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly:
src/e2e/specs/dashboard.spec.ts#L723
1) [chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly
Test timeout of 180000ms exceeded while running "beforeEach" hook.
721 |
722 | test.describe(`${process.env.E2E_TEST_ENV} - Breaches Dashboard - Data Breaches`, () => {
> 723 | test.beforeEach(async ({ landingPage, page, authPage }) => {
| ^
724 | const emailToUse = process.env
725 | .E2E_TEST_ACCOUNT_EMAIL_EXPOSURES_STARTED as string;
726 | const pwdToUse = process.env.E2E_TEST_ACCOUNT_PASSWORD as string;
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:723:8
|
[chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly:
src/e2e/pages/authPage.ts#L40
1) [chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly
Error: locator.fill: Test timeout of 180000ms exceeded.
Call log:
- waiting for locator('input[name="email"]')
at ../pages/authPage.ts:40
38 |
39 | async enterEmail(email: string) {
> 40 | await this.emailInputField.fill(email);
| ^
41 | await this.continue({ waitForURL: "**/oauth/**" });
42 | }
43 |
at AuthPage.enterEmail (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:40:32)
at AuthPage.signIn (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:52:16)
at forceLoginAs (/home/runner/work/blurts-server/blurts-server/src/e2e/utils/helpers.ts:221:18)
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:729:5
|
[chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly:
src/e2e/specs/dashboard.spec.ts#L723
1) [chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly
Retry #1 ───────────────────────────────────────────────────────────────────────────────────────
Test timeout of 180000ms exceeded while running "beforeEach" hook.
721 |
722 | test.describe(`${process.env.E2E_TEST_ENV} - Breaches Dashboard - Data Breaches`, () => {
> 723 | test.beforeEach(async ({ landingPage, page, authPage }) => {
| ^
724 | const emailToUse = process.env
725 | .E2E_TEST_ACCOUNT_EMAIL_EXPOSURES_STARTED as string;
726 | const pwdToUse = process.env.E2E_TEST_ACCOUNT_PASSWORD as string;
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:723:8
|
[chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly:
src/e2e/pages/authPage.ts#L40
1) [chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly
Retry #1 ───────────────────────────────────────────────────────────────────────────────────────
Error: locator.fill: Test timeout of 180000ms exceeded.
Call log:
- waiting for locator('input[name="email"]')
at ../pages/authPage.ts:40
38 |
39 | async enterEmail(email: string) {
> 40 | await this.emailInputField.fill(email);
| ^
41 | await this.continue({ waitForURL: "**/oauth/**" });
42 | }
43 |
at AuthPage.enterEmail (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:40:32)
at AuthPage.signIn (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/authPage.ts:52:16)
at forceLoginAs (/home/runner/work/blurts-server/blurts-server/src/e2e/utils/helpers.ts:221:18)
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard.spec.ts:729:5
|
[chromium] › purchase.spec.ts:156:3 › stage - Breach Scan:
src/e2e/specs/purchase.spec.ts#L1
2) [chromium] › purchase.spec.ts:156:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - yearly
Test timeout of 180000ms exceeded.
|
[chromium] › purchase.spec.ts:156:3 › stage - Breach Scan:
src/e2e/pages/purchasePage.ts#L82
2) [chromium] › purchase.spec.ts:156:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - yearly
Error: locator.click: Test timeout of 180000ms exceeded.
Call log:
- waiting for getByTitle('PayPal').nth(1)
- locator resolved to <iframe title="PayPal" scrolling="no" allowtransparency=…></iframe>
- attempting click action
- waiting for element to be visible, enabled and stable
- element is not visible
- retrying click action, attempt #1
- waiting for element to be visible, enabled and stable
- element is not visible
- retrying click action, attempt #2
- waiting 20ms
- waiting for element to be visible, enabled and stable
- element is not visible
- retrying click action, attempt #3
- waiting 100ms
- waiting for element to be visible, enabled and stable
- element is not stable
- retrying click action, attempt #4
- waiting 100ms
- waiting for element to be visible, enabled and stable
- element is visible, enabled and stable
- scrolling into view if needed
- done scrolling
- <iframe title="PayPal" scrolling="no" allowtransparency=…></iframe> intercepts pointer events
- retrying click action, attempt #5
- waiting 500ms
- waiting for element to be visible, enabled and stable
- element is visible, enabled and stable
- scrolling into view if needed
- done scrolling
- <iframe title="PayPal" scrolling="no" allowtransparency=…></iframe> intercepts pointer events
- retrying click action, attempt #6
- waiting 500ms
- waiting for element to be visible, enabled and stable
- element was detached from the DOM, retrying
at ../pages/purchasePage.ts:82
80 | //away from mozilla
81 | const pagePromise = context.waitForEvent("page");
> 82 | await this.paypalButton.click();
| ^
83 | const newPage = await pagePromise;
84 | await newPage.waitForLoadState();
85 | await newPage.waitForURL(/.*paypal\.com.*checkout.*/);
at PurchasePage.fillOutPaypalInfo (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/purchasePage.ts:82:29)
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:175:24
|
[chromium] › purchase.spec.ts:156:3 › stage - Breach Scan:
src/e2e/pages/purchasePage.ts#L81
2) [chromium] › purchase.spec.ts:156:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - yearly
Error: browserContext.waitForEvent: Test timeout of 180000ms exceeded.
at ../pages/purchasePage.ts:81
79 |
80 | //away from mozilla
> 81 | const pagePromise = context.waitForEvent("page");
| ^
82 | await this.paypalButton.click();
83 | const newPage = await pagePromise;
84 | await newPage.waitForLoadState();
at PurchasePage.fillOutPaypalInfo (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/purchasePage.ts:81:33)
at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:175:24
|
[chromium] › purchase.spec.ts:156:3 › stage - Breach Scan:
src/e2e/specs/purchase.spec.ts#L1
2) [chromium] › purchase.spec.ts:156:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - yearly
Retry #1 ───────────────────────────────────────────────────────────────────────────────────────
Test timeout of 180000ms exceeded.
|
Slow Test:
[chromium] › landing.spec.ts#L1
[chromium] › landing.spec.ts took 1.0m
|
Slow Test:
[chromium] › auth.spec.ts#L1
[chromium] › auth.spec.ts took 18.0s
|
🎭 Playwright Run Summary
3 failed
[chromium] › dashboard.spec.ts:732:3 › stage - Breaches Dashboard - Data Breaches › Verify that the High risk data breaches step is displayed correctly
[chromium] › purchase.spec.ts:156:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - yearly
[chromium] › purchase.spec.ts:179:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a PayPal account - monthly
1 flaky
[chromium] › dashboard.spec.ts:401:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed
3 skipped
41 did not run
36 passed (30.0m)
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
playwright-report
Expired
|
29.9 MB |
|
test-results
Expired
|
32.5 MB |
|