Skip to content

Monitor Cron e2e Tests #551

Monitor Cron e2e Tests

Monitor Cron e2e Tests #551

Triggered via schedule January 26, 2025 08:06
Status Failure
Total duration 30m 52s
Artifacts 2

e2e_cron.yml

on: schedule
Fit to window
Zoom out
Zoom in

Annotations

10 errors, 6 warnings, and 1 notice
e2e-tests
Timed out waiting 1800s for the test suite to run
e2e-tests
Timed out waiting 1800s for the teardown for test suite to run
[firefox] › landing/landing-existing-account.spec.ts:13:3 › stage - Verify the Landing Page Functionality - existing account › Verify "Get free scan" buttons functionality with an existing account: src/e2e/specs/landing/landing-existing-account.spec.ts#L1
1) [firefox] › landing/landing-existing-account.spec.ts:13:3 › stage - Verify the Landing Page Functionality - existing account › Verify "Get free scan" buttons functionality with an existing account Test timeout of 60000ms exceeded.
[firefox] › landing/landing-existing-account.spec.ts:13:3 › stage - Verify the Landing Page Functionality - existing account › Verify "Get free scan" buttons functionality with an existing account: src/e2e/specs/landing/landing-existing-account.spec.ts#L34
1) [firefox] › landing/landing-existing-account.spec.ts:13:3 › stage - Verify the Landing Page Functionality - existing account › Verify "Get free scan" buttons functionality with an existing account Error: locator.click: Test timeout of 60000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Get free scan' }).first() 32 | } else { 33 | // Scenario where direct redirection happens > 34 | await landingPage.monitorHeroFormInputSubmitButton.click(); | ^ 35 | await authPage.emailInputField.waitFor({ 36 | state: "visible", 37 | timeout: 10000, at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/landing/landing-existing-account.spec.ts:34:58
[firefox] › landing/landing-existing-account.spec.ts:13:3 › stage - Verify the Landing Page Functionality - existing account › Verify "Get free scan" buttons functionality with an existing account: src/e2e/specs/landing/landing-existing-account.spec.ts#L1
1) [firefox] › landing/landing-existing-account.spec.ts:13:3 › stage - Verify the Landing Page Functionality - existing account › Verify "Get free scan" buttons functionality with an existing account Retry #1 ─────────────────────────────────────────────────────────────────────────────────────── Test timeout of 60000ms exceeded.
[firefox] › landing/landing-existing-account.spec.ts:13:3 › stage - Verify the Landing Page Functionality - existing account › Verify "Get free scan" buttons functionality with an existing account: src/e2e/specs/landing/landing-existing-account.spec.ts#L34
1) [firefox] › landing/landing-existing-account.spec.ts:13:3 › stage - Verify the Landing Page Functionality - existing account › Verify "Get free scan" buttons functionality with an existing account Retry #1 ─────────────────────────────────────────────────────────────────────────────────────── Error: locator.click: Test timeout of 60000ms exceeded. Call log: - waiting for getByRole('button', { name: 'Get free scan' }).first() 32 | } else { 33 | // Scenario where direct redirection happens > 34 | await landingPage.monitorHeroFormInputSubmitButton.click(); | ^ 35 | await authPage.emailInputField.waitFor({ 36 | state: "visible", 37 | timeout: 10000, at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/landing/landing-existing-account.spec.ts:34:58
[chromium] › dashboard/dashboard-breaches-scan.spec.ts:36:3 › stage - Breaches Dashboard - Breaches Scan: src/e2e/specs/dashboard/dashboard-breaches-scan.spec.ts#L14
2) [chromium] › dashboard/dashboard-breaches-scan.spec.ts:36:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed Test timeout of 180000ms exceeded while running "beforeEach" hook. 12 | test.use({ storageState: { cookies: [], origins: [] } }); 13 | > 14 | test.beforeEach(async ({ landingPage, page, authPage, welcomePage }) => { | ^ 15 | test.slow( 16 | true, 17 | "this test runs through the welcome scan flow, increasing timeout to address it", at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard/dashboard-breaches-scan.spec.ts:14:8
[chromium] › dashboard/dashboard-breaches-scan.spec.ts:36:3 › stage - Breaches Dashboard - Breaches Scan: src/e2e/pages/welcomeScanPage.ts#L95
2) [chromium] › dashboard/dashboard-breaches-scan.spec.ts:36:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed Error: locator.waitFor: Test timeout of 180000ms exceeded. Call log: - waiting for getByText('Scanning for exposures…') to be visible at ../pages/welcomeScanPage.ts:95 93 | 94 | await this.modalConfirmButton.click(); > 95 | await this.findExposuresTitle.waitFor(); | ^ 96 | 97 | // reloading page skips the loader and routes directly to the dashboard 98 | if (options.skipLoader) { at WelcomePage.goThroughFirstScan (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/welcomeScanPage.ts:95:35) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/dashboard/dashboard-breaches-scan.spec.ts:32:5
[chromium] › purchase.spec.ts:48:3 › stage - Breach Scan: src/e2e/specs/purchase.spec.ts#L14
3) [chromium] › purchase.spec.ts:48:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Yearly Test timeout of 180000ms exceeded while running "beforeEach" hook. 12 | ); 13 | > 14 | test.beforeEach(async ({ page, authPage, landingPage, welcomePage }) => { | ^ 15 | test.info().annotations.push({ 16 | type: "testrail id", 17 | description: at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:14:8
[chromium] › purchase.spec.ts:48:3 › stage - Breach Scan: src/e2e/pages/welcomeScanPage.ts#L106
3) [chromium] › purchase.spec.ts:48:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Yearly Error: locator.waitFor: Test timeout of 180000ms exceeded. Call log: - waiting for getByRole('tab', { name: 'Action needed' }) to be visible at ../pages/welcomeScanPage.ts:106 104 | // Waiting for scan to complete 105 | const dashboardPage = new DashboardPage(this.page); > 106 | await dashboardPage.actionNeededTab.waitFor(); | ^ 107 | 108 | // TODO: Handle state in prod where it says "Scan still in progress:" 109 | } at WelcomePage.goThroughFirstScan (/home/runner/work/blurts-server/blurts-server/src/e2e/pages/welcomeScanPage.ts:106:41) at /home/runner/work/blurts-server/blurts-server/src/e2e/specs/purchase.spec.ts:43:5
e2e-tests
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Slow Test: [firefox] › purchase.spec.ts#L1
[firefox] › purchase.spec.ts took 2.7m
Slow Test: [firefox] › dashboard/dashboard-breaches-scan.spec.ts#L1
[firefox] › dashboard/dashboard-breaches-scan.spec.ts took 48.0s
Slow Test: [firefox] › landing/landing-new-account.spec.ts#L1
[firefox] › landing/landing-new-account.spec.ts took 27.1s
Slow Test: [chromium] › landing/landing-content.spec.ts#L1
[chromium] › landing/landing-content.spec.ts took 26.4s
Slow Test: [chromium] › landing/landing-new-account.spec.ts#L1
[chromium] › landing/landing-new-account.spec.ts took 25.1s
🎭 Playwright Run Summary
1 failed [firefox] › landing/landing-existing-account.spec.ts:13:3 › stage - Verify the Landing Page Functionality - existing account › Verify "Get free scan" buttons functionality with an existing account 6 flaky [chromium] › dashboard/dashboard-breaches-scan.spec.ts:36:3 › stage - Breaches Dashboard - Breaches Scan, Continuous Protection, Data Profile Actions › Verify that the Premium upsell modal is displayed correctly - Continuous Protection, verify that the user can mark Data broker profiles as fixed [chromium] › purchase.spec.ts:48:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Yearly [chromium] › purchase.spec.ts:89:3 › stage - Breach Scan, Monitor Plus Purchase Flow › Verify that the user can purchase the plus subscription with a Stripe card - Monthly [firefox] › dashboard/dashboard-footer.spec.ts:21:3 › stage - Breaches Dashboard - Footer › Verify that the site footer is displayed correctly [firefox] › landing/landing-content.spec.ts:116:3 › stage - Verify the Landing Page content › Observe FAQ section [firefox] › landing/landing-content.spec.ts:221:3 › stage - Verify the Landing Page content › Verify manual/automatic removal "more info" tips from "Choose your level of protection" section 6 skipped 3 did not run 70 passed (30.0m)

Artifacts

Produced during runtime
Name Size
playwright-report
48.9 MB
test-results
47.8 MB