Skip to content

Refactor: Coupon fraud INTER-459 (#118) #106

Refactor: Coupon fraud INTER-459 (#118)

Refactor: Coupon fraud INTER-459 (#118) #106

Triggered via push February 14, 2024 16:11
Status Success
Total duration 4m 9s
Artifacts 3

ci.yml

on: push
Matrix: Playwright e2e tests
Fit to window
Zoom out
Zoom in

Annotations

2 errors and 4 notices
[webkit] › credential-stuffing.spec.ts:22:7 › Credential stuffing › should lock user after 5 invalid login attempts: e2e/credential-stuffing.spec.ts#L1
1) [webkit] › credential-stuffing.spec.ts:22:7 › Credential stuffing › should lock user after 5 invalid login attempts Test timeout of 30000ms exceeded.
[webkit] › credential-stuffing.spec.ts:22:7 › Credential stuffing › should lock user after 5 invalid login attempts: e2e/credential-stuffing.spec.ts#L33
1) [webkit] › credential-stuffing.spec.ts:22:7 › Credential stuffing › should lock user after 5 invalid login attempts Error: locator.waitFor: Test timeout of 30000ms exceeded. Call log: - waiting for getByText('You had 5 or more attempts during the last 24 hours. This login attempt was not performed.') to be visible 31 | // 6th attempt with incorrect password not performed at all 32 | await submitForm(page); > 33 | await page.getByText(CREDENTIAL_STUFFING_COPY.tooManyAttempts).waitFor(); | ^ 34 | }); 35 | }); 36 | at /home/runner/work/fingerprintjs-pro-use-cases/fingerprintjs-pro-use-cases/e2e/credential-stuffing.spec.ts:33:68
🎭 Playwright Run Summary
29 passed (1.7m)
🎭 Playwright Run Summary
1 flaky [webkit] › credential-stuffing.spec.ts:22:7 › Credential stuffing › should lock user after 5 invalid login attempts 28 passed (2.4m)
🎭 Playwright Run Summary
29 passed (2.0m)
🎭 Playwright Run Summary
1 passed (25.9s)

Artifacts

Produced during runtime
Name Size
playwright-report-1 Expired
179 KB
playwright-report-2 Expired
193 KB
playwright-report-3 Expired
3.5 MB