Skip to content

Bot firewall demo: update design and release INTER-499 #56

Bot firewall demo: update design and release INTER-499

Bot firewall demo: update design and release INTER-499 #56

Triggered via pull request January 15, 2024 19:22
Status Success
Total duration 4m 6s
Artifacts 1

ci.yml

on: pull_request
Matrix: Playwright e2e tests
Fit to window
Zoom out
Zoom in

Annotations

5 errors and 4 notices
[chromium] › bot-firewall.spec.ts:16:7 › Bot Firewall Demo CHROME_ONLY › Should display bot visit and allow blocking/unblocking its IP address: e2e/bot-firewall.spec.ts#L46
1) [chromium] › bot-firewall.spec.ts:16:7 › Bot Firewall Demo CHROME_ONLY › Should display bot visit and allow blocking/unblocking its IP address Error: Timed out 5000ms waiting for expect(locator).toContainText(expected) Locator: getByTestId('alert') Expected string: "Malicious bot detected" Received string: "" Call log: - expect.toContainText with timeout 5000ms - waiting for getByTestId('alert') 44 | await secondTab.goto('https://staging.fingerprinthub.com/web-scraping'); 45 | await secondTab.reload(); > 46 | await expect(secondTab.getByTestId(TEST_IDS.common.alert)).toContainText('Malicious bot detected'); | ^ 47 | }); 48 | }); 49 | at /home/runner/work/fingerprintjs-pro-use-cases/fingerprintjs-pro-use-cases/e2e/bot-firewall.spec.ts:46:64
[webkit] › payment-fraud.spec.ts:47:7 › Payment fraud › should prevent another purchase if card was flagged as stolen: e2e/payment-fraud.spec.ts#L1
1) [webkit] › payment-fraud.spec.ts:47:7 › Payment fraud › should prevent another purchase if card was flagged as stolen Test timeout of 30000ms exceeded.
[webkit] › payment-fraud.spec.ts:47:7 › Payment fraud › should prevent another purchase if card was flagged as stolen: e2e/payment-fraud.spec.ts#L52
1) [webkit] › payment-fraud.spec.ts:47:7 › Payment fraud › should prevent another purchase if card was flagged as stolen Error: locator.waitFor: Test timeout of 30000ms exceeded. Call log: - waiting for getByText('According to our records, you paid with a stolen card. We did not process the payment.') to be visible 50 | 51 | await submit(page); > 52 | await page.getByText(PAYMENT_FRAUD_COPY.stolenCard).waitFor(); | ^ 53 | }); 54 | }); 55 | at /home/runner/work/fingerprintjs-pro-use-cases/fingerprintjs-pro-use-cases/e2e/payment-fraud.spec.ts:52:57
[webkit] › payment-fraud.spec.ts:47:7 › Payment fraud › should prevent another purchase if card was flagged as stolen: e2e/payment-fraud.spec.ts#L1
1) [webkit] › payment-fraud.spec.ts:47:7 › Payment fraud › should prevent another purchase if card was flagged as stolen Retry #1 ─────────────────────────────────────────────────────────────────────────────────────── Test timeout of 30000ms exceeded.
[webkit] › payment-fraud.spec.ts:47:7 › Payment fraud › should prevent another purchase if card was flagged as stolen: e2e/payment-fraud.spec.ts#L52
1) [webkit] › payment-fraud.spec.ts:47:7 › Payment fraud › should prevent another purchase if card was flagged as stolen Retry #1 ─────────────────────────────────────────────────────────────────────────────────────── Error: locator.waitFor: Test timeout of 30000ms exceeded. Call log: - waiting for getByText('According to our records, you paid with a stolen card. We did not process the payment.') to be visible 50 | 51 | await submit(page); > 52 | await page.getByText(PAYMENT_FRAUD_COPY.stolenCard).waitFor(); | ^ 53 | }); 54 | }); 55 | at /home/runner/work/fingerprintjs-pro-use-cases/fingerprintjs-pro-use-cases/e2e/payment-fraud.spec.ts:52:57
🎭 Playwright Run Summary
27 passed (1.4m)
🎭 Playwright Run Summary
27 passed (1.4m)
🎭 Playwright Run Summary
1 flaky [chromium] › bot-firewall.spec.ts:16:7 › Bot Firewall Demo CHROME_ONLY › Should display bot visit and allow blocking/unblocking its IP address
🎭 Playwright Run Summary
1 flaky [webkit] › payment-fraud.spec.ts:47:7 › Payment fraud › should prevent another purchase if card was flagged as stolen 26 passed (2.7m)

Artifacts

Produced during runtime
Name Size
playwright-report Expired
7.97 MB