-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Get QA Auth Smoke Tests passing #1975
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## develop #1975 +/- ##
========================================
Coverage 40.26% 40.26%
========================================
Files 400 400
Lines 11992 11992
Branches 2901 2901
========================================
Hits 4829 4829
Misses 4872 4872
Partials 2291 2291 ☔ View full report in Codecov by Sentry. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't remember the backstory on this.
Why do only the test-local-no-auth
, test-qa-no-auth
and test-qa-auth
jobs have --record
in the first place. i.e. we don't record in staging or prod
Overall, not objecting, but how did you come to suspect this as a potential fix and is there a theory for why? Or why it continues to work for those other jobs?
I don't know the background, but my guess is because QA is changing daily, the possibility for breakage is higher, and it's more convenient to have the artifacts so you can debug. Whereas once the tests are passing in staging/prod, it'll be months before the possibility of them breaking again happens (unless they tests themselves change). For
I looked at what's different between the passing and failing jobs and the After that worked, I looked around, and there were some bug reports/comments of Also, FWIW, I noted this in the JIRA issue but not in the PR, these failures started when Cypress 13 was merged to develop. In any case, my theory is there is some flakiness in Cypress. :) |
Does Also, this probably won't make a difference but I noticed that there's a new browser-tools version so could try updating that to 1.4.8 dockstore-ui2/.circleci/config.yml Line 6 in 6a4ee28
|
Good idea, that would see if the problem stems from something new in Dockstore 1.16 or if it's purely Cypress.
I think I tried that and it didn't make a difference. But I'll try again to be sure, and we might as well update anyway. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"Get rid of the --record option when running auth tests against QA"
Recording the tests was causing them to fail? If yes, is there clues/evidence as to why that's happening?
Ooops, nevermind. missed some of the comments, they discuss it. |
It also failed against staging with recording. |
Also didn't make a difference, alas. https://app.circleci.com/pipelines/github/dockstore/dockstore-ui2/11963/workflows/657f017b-212a-4f14-98d9-5a6ce40b88e1/jobs/53876 |
Thanks for testing it! |
|
Description
Get rid of the
--record
option when running auth tests against QA. The big con is that if the tests fail, we'll have to manually run them locally to see what the problem is, as the--record
option lets us save videos where we can see the failures.I spent about 8 hours trying to get the tests to pass on CircleCI and this is all I could figure out to get them passing. Here's what I tried, none of which worked; if anybody else has any other ideas, I'm happy to give them a shot first.
teamcity
instead ofjunit
.Some additional observations:
Review Instructions
Nightly auth tests should be passing on CircleCI.
Issue
SEAB-6459
Security
If there are any concerns that require extra attention from the security team, highlight them here.
Please make sure that you've checked the following before submitting your pull request. Thanks!
npm run build
markdown-wrapper
component, which does extra sanitizationnpm audit
and ensure you are not introducing new vulnerabilities