Skip to content

Brute Force Protection: Do not log failed attempt logging on password validation failure #100969

Brute Force Protection: Do not log failed attempt logging on password validation failure

Brute Force Protection: Do not log failed attempt logging on password validation failure #100969

Triggered via pull request February 21, 2025 03:47
Status Success
Total duration 15m 5s
Artifacts 4

e2e-tests.yml

on: pull_request
Determine tests matrix
1m 23s
Determine tests matrix
Matrix: build-projects
Matrix: e2e-tests
Test report
2s
Test report
Slack notification
1m 6s
Slack notification
Fit to window
Zoom out
Zoom in

Annotations

1 error, 4 warnings, and 4 notices
[chromium] › specs/post-connection/account-protection.test.js:30:2 › Compromised Password Detection › Detects compromised passwords: tools/e2e-commons/pages/page-actions.js#L320
1) [chromium] › specs/post-connection/account-protection.test.js:30:2 › Compromised Password Detection › Detects compromised passwords › Enforces account protection 2FA for administrator users TimeoutError: locator.waitFor: Timeout 20000ms exceeded. Call log: - waiting for locator('.action-input').first() to be visible at ../../../../../tools/e2e-commons/pages/page-actions.js:320 318 | ); 319 | const element = this.page.locator( selector ).first(); > 320 | await element.waitFor( { state, timeout } ); | ^ 321 | return element; 322 | } 323 | at WPLoginPage.waitForElementState (/home/runner/work/jetpack/jetpack/tools/e2e-commons/pages/page-actions.js:320:17) at WPLoginPage.waitForElementToBeVisible (/home/runner/work/jetpack/jetpack/tools/e2e-commons/pages/page-actions.js:269:21) at /home/runner/work/jetpack/jetpack/projects/plugins/jetpack/tests/e2e/specs/post-connection/account-protection.test.js:42:21 at /home/runner/work/jetpack/jetpack/projects/plugins/jetpack/tests/e2e/specs/post-connection/account-protection.test.js:32:4
Determine tests matrix
Failed to save: Failed to CreateCacheEntry: Received non-retryable error: Failed request: (409) Conflict: cache entry with the same key, version, and scope already exists
Jetpack post editor e2e tests
Failed to save: Failed to CreateCacheEntry: Received non-retryable error: Failed request: (409) Conflict: cache entry with the same key, version, and scope already exists
Jetpack connection e2e tests
Failed to save: Failed to CreateCacheEntry: Received non-retryable error: Failed request: (409) Conflict: cache entry with the same key, version, and scope already exists
Jetpack post-connection e2e tests
Failed to save: Failed to CreateCacheEntry: Received non-retryable error: Failed request: (409) Conflict: cache entry with the same key, version, and scope already exists
🎭 Playwright Run Summary
1 passed (40.9s)
🎭 Playwright Run Summary
1 passed (1.1m)
🎭 Playwright Run Summary
2 passed (2.1m)
🎭 Playwright Run Summary
1 flaky [chromium] › specs/post-connection/account-protection.test.js:30:2 › Compromised Password Detection › Detects compromised passwords 3 passed (5.6m)

Artifacts

Produced during runtime
Name Size
test-output-Jetpack connection
13.3 KB
test-output-Jetpack post editor
11.4 KB
test-output-Jetpack post-connection
389 KB
test-output-Jetpack pre-connection
7.5 KB