rspec-pg 6/50
Passed Started
by
@eread

Evan Read
1Running with gitlab-runner 11.8.0 (4745a6f3)2 on docker-auto-scale-com 8a6210b83Using Docker executor with image dev.gitlab.org:5005/gitlab/gitlab-build-images:ruby-2.5.3-golang-1.11-git-2.18-chrome-71.0-node-10.x-yarn-1.12-postgresql-9.6-graphicsmagick-1.3.29 ...4Starting service postgres:9.6 ...5Pulling docker image postgres:9.6 ...6Using docker image sha256:5e8319b0f67bf0c214dd4e43a1155a69ecbfdcd6ce2739da155a81e6d15ab303 for postgres:9.6 ...7Starting service redis:alpine ...8Pulling docker image redis:alpine ...9Using docker image sha256:3d2a373f46ae28f3376c356d27210759aa9348fd94c517cf77e9df2a2c41c37f for redis:alpine ...10Waiting for services to be up and running...11Pulling docker image dev.gitlab.org:5005/gitlab/gitlab-build-images:ruby-2.5.3-golang-1.11-git-2.18-chrome-71.0-node-10.x-yarn-1.12-postgresql-9.6-graphicsmagick-1.3.29 ...12Using docker image sha256:ac6482d398ed0ce8bef4327b0bb15dfe815331f073f5b6ba3e04c5cd8317402d for dev.gitlab.org:5005/gitlab/gitlab-build-images:ruby-2.5.3-golang-1.11-git-2.18-chrome-71.0-node-10.x-yarn-1.12-postgresql-9.6-graphicsmagick-1.3.29 ... 13 Running on runner-8a6210b8-project-13083-concurrent-0 via runner-8a6210b8-gsrm-1552527169-bcae7133...
00:02
15Removing .gitlab_shell_secret16Removing .gitlab_workhorse_secret17Removing config/database.yml18Removing config/gitlab.yml19Removing config/redis.cache.yml20Removing config/redis.queues.yml21Removing config/redis.shared_state.yml22Removing config/resque.yml23Removing config/secrets.yml24Removing coverage/25Removing junit_rspec.xml26Removing knapsack/27Removing log/api_json.log28Removing log/application.log29Removing log/audit_json.log30Removing log/gitaly-test.log31Removing log/grpc.log32Removing log/integrations_json.log33Removing log/test_json.log34Removing node_modules/35Removing public/assets/36Removing rspec_flaky/37Removing rspec_profiling/38Removing tmp/cache/39Removing tmp/prometheus_multiproc_dir/counter_process_id_104-0.db40Removing tmp/prometheus_multiproc_dir/gauge_all_process_id_104-0.db41Removing tmp/prometheus_multiproc_dir/histogram_process_id_104-0.db42Removing tmp/prometheus_multiproc_dir/summary_process_id_104-0.db43Removing tmp/tests/44Removing vendor/gitaly-ruby/45Removing vendor/ruby/46HEAD is now at cee71371 Merge branch 'docs-fe-jest-link-fix' into 'master'48 cee71371..ae8cbffa master -> origin/master49Checking out ae8cbffa as master...50Skipping Git submodules setup52Downloading cache.zip from https://storage.googleapis.com/gitlab-com-runners-cache/project/13083/debian-stretch-ruby-2.5.3-node-10.x-3 53Successfully extracted cache55Downloading artifacts from coordinator... ok id=177320529 responseStatus=200 OK token=X8zvZUGm56Downloading artifacts for compile-assets (177320531)...57Downloading artifacts from coordinator... ok id=177320531 responseStatus=200 OK token=LucBTJi358Downloading artifacts for setup-test-env (177320533)...59Downloading artifacts from coordinator... ok id=177320533 responseStatus=200 OK token=GssumYh360WARNING: tmp/tests/gitlab-shell/.gitlab_shell_secret: chmod tmp/tests/gitlab-shell/.gitlab_shell_secret: no such file or directory (suppressing repeats) 62Bundler version 1.17.263$ date64Thu Mar 14 02:15:26 UTC 201965$ source scripts/utils.sh66$ date67Thu Mar 14 02:15:26 UTC 201968$ source scripts/prepare_build.sh69Warning: the running version of Bundler (1.17.2) is older than the version that created the lockfile (1.17.3). We suggest you upgrade to the latest version of Bundler by running `gem install bundler`.70The Gemfile's dependencies are satisfied71Successfully installed knapsack-1.17.1721 gem installed73CREATE ROLE74GRANT75Dropped database 'gitlabhq_test'76Created database 'gitlabhq_test'77-- enable_extension("plpgsql")78 -> 0.0232s79-- enable_extension("pg_trgm")80 -> 0.0176s81-- create_table("abuse_reports", {:force=>:cascade})82 -> 0.0129s83-- create_table("appearances", {:force=>:cascade})84 -> 0.0126s85-- create_table("application_setting_terms", {:force=>:cascade})86 -> 0.0093s87-- create_table("application_settings", {:force=>:cascade})88 -> 0.0636s89-- create_table("audit_events", {:force=>:cascade})90 -> 0.0159s91-- create_table("award_emoji", {:force=>:cascade})92 -> 0.0212s93-- create_table("badges", {:force=>:cascade})94 -> 0.0214s95-- create_table("board_group_recent_visits", {:id=>:bigserial, :force=>:cascade})96 -> 0.0311s97-- create_table("board_project_recent_visits", {:id=>:bigserial, :force=>:cascade})98 -> 0.0338s99-- create_table("boards", {:force=>:cascade})100 -> 0.0178s101-- create_table("broadcast_messages", {:force=>:cascade})102 -> 0.0155s103-- create_table("chat_names", {:force=>:cascade})104 -> 0.0213s105-- create_table("chat_teams", {:force=>:cascade})106 -> 0.0138s107-- create_table("ci_build_trace_chunks", {:id=>:bigserial, :force=>:cascade})108 -> 0.0141s109-- create_table("ci_build_trace_section_names", {:force=>:cascade})110 -> 0.0144s111-- create_table("ci_build_trace_sections", {:force=>:cascade})112 -> 0.0235s113-- create_table("ci_builds", {:force=>:cascade})114 -> 0.1283s115-- create_table("ci_builds_metadata", {:force=>:cascade})116 -> 0.0234s117-- create_table("ci_builds_runner_session", {:id=>:bigserial, :force=>:cascade})118 -> 0.0162s119-- create_table("ci_group_variables", {:force=>:cascade})120 -> 0.0178s121-- create_table("ci_job_artifacts", {:force=>:cascade})122 -> 0.0363s123-- create_table("ci_pipeline_chat_data", {:id=>:bigserial, :force=>:cascade})124 -> 0.0221s125-- create_table("ci_pipeline_schedule_variables", {:force=>:cascade})126 -> 0.0146s127-- create_table("ci_pipeline_schedules", {:force=>:cascade})128 -> 0.0256s129-- create_table("ci_pipeline_variables", {:force=>:cascade})130 -> 0.0142s131-- create_table("ci_pipelines", {:force=>:cascade})132 -> 0.0779s133-- create_table("ci_runner_namespaces", {:force=>:cascade})134 -> 0.0171s135-- create_table("ci_runner_projects", {:force=>:cascade})136 -> 0.0174s137-- create_table("ci_runners", {:force=>:cascade})138 -> 0.0505s139-- create_table("ci_stages", {:force=>:cascade})140 -> 0.0370s141-- create_table("ci_trigger_requests", {:force=>:cascade})142 -> 0.0208s143-- create_table("ci_triggers", {:force=>:cascade})144 -> 0.0218s145-- create_table("ci_variables", {:force=>:cascade})146 -> 0.0172s147-- create_table("cluster_groups", {:force=>:cascade})148 -> 0.0180s149-- create_table("cluster_platforms_kubernetes", {:force=>:cascade})150 -> 0.0159s151-- create_table("cluster_projects", {:force=>:cascade})152 -> 0.0191s153-- create_table("cluster_providers_gcp", {:force=>:cascade})154 -> 0.0172s155-- create_table("clusters", {:force=>:cascade})156 -> 0.0237s157-- create_table("clusters_applications_cert_managers", {:force=>:cascade})158 -> 0.0159s159-- create_table("clusters_applications_helm", {:force=>:cascade})160 -> 0.0171s161-- create_table("clusters_applications_ingress", {:force=>:cascade})162 -> 0.0156s163-- create_table("clusters_applications_jupyter", {:force=>:cascade})164 -> 0.0207s165-- create_table("clusters_applications_knative", {:force=>:cascade})166 -> 0.0144s167-- create_table("clusters_applications_prometheus", {:force=>:cascade})168 -> 0.0147s169-- create_table("clusters_applications_runners", {:force=>:cascade})170 -> 0.0205s171-- create_table("clusters_kubernetes_namespaces", {:id=>:bigserial, :force=>:cascade})172 -> 0.0315s173-- create_table("container_repositories", {:force=>:cascade})174 -> 0.0208s175-- create_table("conversational_development_index_metrics", {:force=>:cascade})176 -> 0.0121s177-- create_table("deploy_keys_projects", {:force=>:cascade})178 -> 0.0158s179-- create_table("deploy_tokens", {:force=>:cascade})180 -> 0.0247s181-- create_table("deployments", {:force=>:cascade})182 -> 0.0680s183-- create_table("emails", {:force=>:cascade})184 -> 0.0307s185-- create_table("environments", {:force=>:cascade})186 -> 0.0269s187-- create_table("events", {:force=>:cascade})188 -> 0.0421s189-- create_table("feature_gates", {:force=>:cascade})190 -> 0.0166s191-- create_table("features", {:force=>:cascade})192 -> 0.0164s193-- create_table("fork_network_members", {:force=>:cascade})194 -> 0.0254s195-- create_table("fork_networks", {:force=>:cascade})196 -> 0.0169s197-- create_table("forked_project_links", {:force=>:cascade})198 -> 0.0146s199-- create_table("gpg_key_subkeys", {:force=>:cascade})200 -> 0.0305s201-- create_table("gpg_keys", {:force=>:cascade})202 -> 0.0308s203-- create_table("gpg_signatures", {:force=>:cascade})204 -> 0.0471s205-- create_table("group_custom_attributes", {:force=>:cascade})206 -> 0.0244s207-- create_table("identities", {:force=>:cascade})208 -> 0.0171s209-- create_table("import_export_uploads", {:force=>:cascade})210 -> 0.0315s211-- create_table("internal_ids", {:id=>:bigserial, :force=>:cascade})212 -> 0.0314s213-- create_table("issue_assignees", {:id=>false, :force=>:cascade})214 -> 0.0148s215-- create_table("issue_metrics", {:force=>:cascade})216 -> 0.0123s217-- create_table("issues", {:force=>:cascade})218 -> 0.0949s219-- create_table("keys", {:force=>:cascade})220 -> 0.0225s221-- create_table("label_links", {:force=>:cascade})222 -> 0.0223s223-- create_table("label_priorities", {:force=>:cascade})224 -> 0.0244s225-- create_table("labels", {:force=>:cascade})226 -> 0.0408s227-- create_table("lfs_file_locks", {:force=>:cascade})228 -> 0.0206s229-- create_table("lfs_objects", {:force=>:cascade})230 -> 0.0205s231-- create_table("lfs_objects_projects", {:force=>:cascade})232 -> 0.0124s233-- create_table("lists", {:force=>:cascade})234 -> 0.0290s235-- create_table("members", {:force=>:cascade})236 -> 0.0409s237-- create_table("merge_request_diff_commits", {:id=>false, :force=>:cascade})238 -> 0.0185s239-- create_table("merge_request_diff_files", {:id=>false, :force=>:cascade})240 -> 0.0128s241-- create_table("merge_request_diffs", {:force=>:cascade})242 -> 0.0155s243-- create_table("merge_request_metrics", {:force=>:cascade})244 -> 0.0344s245-- create_table("merge_requests", {:force=>:cascade})246 -> 0.1139s247-- create_table("merge_requests_closing_issues", {:force=>:cascade})248 -> 0.0179s249-- create_table("milestones", {:force=>:cascade})250 -> 0.0406s251-- create_table("namespaces", {:force=>:cascade})252 -> 0.0747s253-- create_table("note_diff_files", {:force=>:cascade})254 -> 0.0150s255-- create_table("notes", {:force=>:cascade})256 -> 0.0614s257-- create_table("notification_settings", {:force=>:cascade})258 -> 0.0304s259-- create_table("oauth_access_grants", {:force=>:cascade})260 -> 0.0167s261-- create_table("oauth_access_tokens", {:force=>:cascade})262 -> 0.0290s263-- create_table("oauth_applications", {:force=>:cascade})264 -> 0.0279s265-- create_table("oauth_openid_requests", {:force=>:cascade})266 -> 0.0163s267-- create_table("pages_domains", {:force=>:cascade})268 -> 0.0407s269-- create_table("personal_access_tokens", {:force=>:cascade})270 -> 0.0236s271-- create_table("pool_repositories", {:id=>:bigserial, :force=>:cascade})272 -> 0.0769s273-- create_table("programming_languages", {:force=>:cascade})274 -> 0.0160s275-- create_table("project_authorizations", {:id=>false, :force=>:cascade})276 -> 0.0142s277-- create_table("project_auto_devops", {:force=>:cascade})278 -> 0.0174s279-- create_table("project_ci_cd_settings", {:force=>:cascade})280 -> 0.0137s281-- create_table("project_custom_attributes", {:force=>:cascade})282 -> 0.0218s283-- create_table("project_daily_statistics", {:id=>:bigserial, :force=>:cascade})284 -> 0.0123s285-- create_table("project_deploy_tokens", {:force=>:cascade})286 -> 0.0180s287-- create_table("project_error_tracking_settings", {:primary_key=>"project_id", :id=>:integer, :force=>:cascade})288 -> 0.0087s289-- create_table("project_features", {:force=>:cascade})290 -> 0.0136s291-- create_table("project_group_links", {:force=>:cascade})292 -> 0.0194s293-- create_table("project_import_data", {:force=>:cascade})294 -> 0.0150s295-- create_table("project_mirror_data", {:force=>:cascade})296 -> 0.0269s297-- create_table("project_repositories", {:id=>:bigserial, :force=>:cascade})298 -> 0.0268s299-- create_table("project_statistics", {:force=>:cascade})300 -> 0.0202s301-- create_table("projects", {:force=>:cascade})302 -> 0.1306s303-- create_table("prometheus_metrics", {:force=>:cascade})304 -> 0.0322s305-- create_table("protected_branch_merge_access_levels", {:force=>:cascade})306 -> 0.0127s307-- create_table("protected_branch_push_access_levels", {:force=>:cascade})308 -> 0.0129s309-- create_table("protected_branches", {:force=>:cascade})310 -> 0.0152s311-- create_table("protected_tag_create_access_levels", {:force=>:cascade})312 -> 0.0245s313-- create_table("protected_tags", {:force=>:cascade})314 -> 0.0214s315-- create_table("push_event_payloads", {:id=>false, :force=>:cascade})316 -> 0.0120s317-- create_table("redirect_routes", {:force=>:cascade})318 -> 0.0209s319-- create_table("release_links", {:id=>:bigserial, :force=>:cascade})320 -> 0.0197s321-- create_table("releases", {:force=>:cascade})322 -> 0.0251s323-- create_table("remote_mirrors", {:force=>:cascade})324 -> 0.0218s325-- create_table("repository_languages", {:id=>false, :force=>:cascade})326 -> 0.0079s327-- create_table("resource_label_events", {:id=>:bigserial, :force=>:cascade})328 -> 0.0307s329-- create_table("routes", {:force=>:cascade})330 -> 0.0245s331-- create_table("sent_notifications", {:force=>:cascade})332 -> 0.0144s333-- create_table("services", {:force=>:cascade})334 -> 0.0299s335-- create_table("shards", {:force=>:cascade})336 -> 0.0137s337-- create_table("snippets", {:force=>:cascade})338 -> 0.0368s339-- create_table("spam_logs", {:force=>:cascade})340 -> 0.0099s341-- create_table("subscriptions", {:force=>:cascade})342 -> 0.0202s343-- create_table("suggestions", {:id=>:bigserial, :force=>:cascade})344 -> 0.0178s345-- create_table("system_note_metadata", {:force=>:cascade})346 -> 0.0166s347-- create_table("taggings", {:force=>:cascade})348 -> 0.0355s349-- create_table("tags", {:force=>:cascade})350 -> 0.0185s351-- create_table("term_agreements", {:force=>:cascade})352 -> 0.0236s353-- create_table("timelogs", {:force=>:cascade})354 -> 0.0225s355-- create_table("todos", {:force=>:cascade})356 -> 0.0567s357-- create_table("trending_projects", {:force=>:cascade})358 -> 0.0114s359-- create_table("u2f_registrations", {:force=>:cascade})360 -> 0.0219s361-- create_table("uploads", {:force=>:cascade})362 -> 0.0344s363-- create_table("user_agent_details", {:force=>:cascade})364 -> 0.0166s365-- create_table("user_callouts", {:force=>:cascade})366 -> 0.0177s367-- create_table("user_custom_attributes", {:force=>:cascade})368 -> 0.0216s369-- create_table("user_interacted_projects", {:id=>false, :force=>:cascade})370 -> 0.0142s371-- create_table("user_preferences", {:force=>:cascade})372 -> 0.0165s373-- create_table("user_statuses", {:primary_key=>"user_id", :force=>:cascade})374 -> 0.0144s375-- create_table("user_synced_attributes_metadata", {:force=>:cascade})376 -> 0.0151s377-- create_table("users", {:force=>:cascade})378 -> 0.1070s379-- create_table("users_star_projects", {:force=>:cascade})380 -> 0.0180s381-- create_table("web_hook_logs", {:force=>:cascade})382 -> 0.0222s383-- create_table("web_hooks", {:force=>:cascade})384 -> 0.0267s385-- add_foreign_key("application_settings", "users", {:column=>"usage_stats_set_by_user_id", :name=>"fk_964370041d", :on_delete=>:nullify})386 -> 0.0053s387-- add_foreign_key("badges", "namespaces", {:column=>"group_id", :on_delete=>:cascade})388 -> 0.0033s389-- add_foreign_key("badges", "projects", {:on_delete=>:cascade})390 -> 0.0038s391-- add_foreign_key("board_group_recent_visits", "boards", {:on_delete=>:cascade})392 -> 0.0028s393-- add_foreign_key("board_group_recent_visits", "namespaces", {:column=>"group_id", :on_delete=>:cascade})394 -> 0.0025s395-- add_foreign_key("board_group_recent_visits", "users", {:on_delete=>:cascade})396 -> 0.0029s397-- add_foreign_key("board_project_recent_visits", "boards", {:on_delete=>:cascade})398 -> 0.0026s399-- add_foreign_key("board_project_recent_visits", "projects", {:on_delete=>:cascade})400 -> 0.0027s401-- add_foreign_key("board_project_recent_visits", "users", {:on_delete=>:cascade})402 -> 0.0025s403-- add_foreign_key("boards", "namespaces", {:column=>"group_id", :on_delete=>:cascade})404 -> 0.0021s405-- add_foreign_key("boards", "projects", {:name=>"fk_f15266b5f9", :on_delete=>:cascade})406 -> 0.0026s407-- add_foreign_key("chat_teams", "namespaces", {:on_delete=>:cascade})408 -> 0.0025s409-- add_foreign_key("ci_build_trace_chunks", "ci_builds", {:column=>"build_id", :on_delete=>:cascade})410 -> 0.0034s411-- add_foreign_key("ci_build_trace_section_names", "projects", {:on_delete=>:cascade})412 -> 0.0027s413-- add_foreign_key("ci_build_trace_sections", "ci_build_trace_section_names", {:column=>"section_name_id", :name=>"fk_264e112c66", :on_delete=>:cascade})414 -> 0.0023s415-- add_foreign_key("ci_build_trace_sections", "ci_builds", {:column=>"build_id", :name=>"fk_4ebe41f502", :on_delete=>:cascade})416 -> 0.0022s417-- add_foreign_key("ci_build_trace_sections", "projects", {:on_delete=>:cascade})418 -> 0.0025s419-- add_foreign_key("ci_builds", "ci_pipelines", {:column=>"auto_canceled_by_id", :name=>"fk_a2141b1522", :on_delete=>:nullify})420 -> 0.0032s421-- add_foreign_key("ci_builds", "ci_pipelines", {:column=>"commit_id", :name=>"fk_d3130c9a7f", :on_delete=>:cascade})422 -> 0.0026s423-- add_foreign_key("ci_builds", "ci_stages", {:column=>"stage_id", :name=>"fk_3a9eaa254d", :on_delete=>:cascade})424 -> 0.0024s425-- add_foreign_key("ci_builds", "projects", {:name=>"fk_befce0568a", :on_delete=>:cascade})426 -> 0.0026s427-- add_foreign_key("ci_builds_metadata", "ci_builds", {:column=>"build_id", :on_delete=>:cascade})428 -> 0.0023s429-- add_foreign_key("ci_builds_metadata", "projects", {:on_delete=>:cascade})430 -> 0.0024s431-- add_foreign_key("ci_builds_runner_session", "ci_builds", {:column=>"build_id", :on_delete=>:cascade})432 -> 0.0022s433-- add_foreign_key("ci_group_variables", "namespaces", {:column=>"group_id", :name=>"fk_33ae4d58d8", :on_delete=>:cascade})434 -> 0.0023s435-- add_foreign_key("ci_job_artifacts", "ci_builds", {:column=>"job_id", :on_delete=>:cascade})436 -> 0.0024s437-- add_foreign_key("ci_job_artifacts", "projects", {:on_delete=>:cascade})438 -> 0.0025s439-- add_foreign_key("ci_pipeline_chat_data", "chat_names", {:on_delete=>:cascade})440 -> 0.0024s441-- add_foreign_key("ci_pipeline_chat_data", "ci_pipelines", {:column=>"pipeline_id", :on_delete=>:cascade})442 -> 0.0022s443-- add_foreign_key("ci_pipeline_schedule_variables", "ci_pipeline_schedules", {:column=>"pipeline_schedule_id", :name=>"fk_41c35fda51", :on_delete=>:cascade})444 -> 0.0022s445-- add_foreign_key("ci_pipeline_schedules", "projects", {:name=>"fk_8ead60fcc4", :on_delete=>:cascade})446 -> 0.0025s447-- add_foreign_key("ci_pipeline_schedules", "users", {:column=>"owner_id", :name=>"fk_9ea99f58d2", :on_delete=>:nullify})448 -> 0.0023s449-- add_foreign_key("ci_pipeline_variables", "ci_pipelines", {:column=>"pipeline_id", :name=>"fk_f29c5f4380", :on_delete=>:cascade})450 -> 0.0021s451-- add_foreign_key("ci_pipelines", "ci_pipeline_schedules", {:column=>"pipeline_schedule_id", :name=>"fk_3d34ab2e06", :on_delete=>:nullify})452 -> 0.0023s453-- add_foreign_key("ci_pipelines", "ci_pipelines", {:column=>"auto_canceled_by_id", :name=>"fk_262d4c2d19", :on_delete=>:nullify})454 -> 0.0021s455-- add_foreign_key("ci_pipelines", "merge_requests", {:name=>"fk_a23be95014", :on_delete=>:cascade})456 -> 0.0035s457-- add_foreign_key("ci_pipelines", "projects", {:name=>"fk_86635dbd80", :on_delete=>:cascade})458 -> 0.0027s459-- add_foreign_key("ci_runner_namespaces", "ci_runners", {:column=>"runner_id", :on_delete=>:cascade})460 -> 0.0026s461-- add_foreign_key("ci_runner_namespaces", "namespaces", {:on_delete=>:cascade})462 -> 0.0024s463-- add_foreign_key("ci_runner_projects", "projects", {:name=>"fk_4478a6f1e4", :on_delete=>:cascade})464 -> 0.0027s465-- add_foreign_key("ci_stages", "ci_pipelines", {:column=>"pipeline_id", :name=>"fk_fb57e6cc56", :on_delete=>:cascade})466 -> 0.0023s467-- add_foreign_key("ci_stages", "projects", {:name=>"fk_2360681d1d", :on_delete=>:cascade})468 -> 0.0026s469-- add_foreign_key("ci_trigger_requests", "ci_triggers", {:column=>"trigger_id", :name=>"fk_b8ec8b7245", :on_delete=>:cascade})470 -> 0.0024s471-- add_foreign_key("ci_triggers", "projects", {:name=>"fk_e3e63f966e", :on_delete=>:cascade})472 -> 0.0029s473-- add_foreign_key("ci_triggers", "users", {:column=>"owner_id", :name=>"fk_e8e10d1964", :on_delete=>:cascade})474 -> 0.0030s475-- add_foreign_key("ci_variables", "projects", {:name=>"fk_ada5eb64b3", :on_delete=>:cascade})476 -> 0.0028s477-- add_foreign_key("cluster_groups", "clusters", {:on_delete=>:cascade})478 -> 0.0026s479-- add_foreign_key("cluster_groups", "namespaces", {:column=>"group_id", :on_delete=>:cascade})480 -> 0.0023s481-- add_foreign_key("cluster_platforms_kubernetes", "clusters", {:on_delete=>:cascade})482 -> 0.0024s483-- add_foreign_key("cluster_projects", "clusters", {:on_delete=>:cascade})484 -> 0.0023s485-- add_foreign_key("cluster_projects", "projects", {:on_delete=>:cascade})486 -> 0.0026s487-- add_foreign_key("cluster_providers_gcp", "clusters", {:on_delete=>:cascade})488 -> 0.0024s489-- add_foreign_key("clusters", "users", {:on_delete=>:nullify})490 -> 0.0026s491-- add_foreign_key("clusters_applications_cert_managers", "clusters", {:on_delete=>:cascade})492 -> 0.0024s493-- add_foreign_key("clusters_applications_helm", "clusters", {:on_delete=>:cascade})494 -> 0.0023s495-- add_foreign_key("clusters_applications_ingress", "clusters", {:name=>"fk_753a7b41c1", :on_delete=>:cascade})496 -> 0.0022s497-- add_foreign_key("clusters_applications_jupyter", "clusters", {:on_delete=>:cascade})498 -> 0.0026s499-- add_foreign_key("clusters_applications_jupyter", "oauth_applications", {:on_delete=>:nullify})500 -> 0.0024s501-- add_foreign_key("clusters_applications_knative", "clusters", {:on_delete=>:cascade})502 -> 0.0022s503-- add_foreign_key("clusters_applications_prometheus", "clusters", {:name=>"fk_557e773639", :on_delete=>:cascade})504 -> 0.0022s505-- add_foreign_key("clusters_applications_runners", "ci_runners", {:column=>"runner_id", :name=>"fk_02de2ded36", :on_delete=>:nullify})506 -> 0.0022s507-- add_foreign_key("clusters_applications_runners", "clusters", {:on_delete=>:cascade})508 -> 0.0021s509-- add_foreign_key("clusters_kubernetes_namespaces", "cluster_projects", {:on_delete=>:nullify})510 -> 0.0025s511-- add_foreign_key("clusters_kubernetes_namespaces", "clusters", {:on_delete=>:cascade})512 -> 0.0023s513-- add_foreign_key("clusters_kubernetes_namespaces", "projects", {:on_delete=>:nullify})514 -> 0.0028s515-- add_foreign_key("container_repositories", "projects")516 -> 0.0026s517-- add_foreign_key("deploy_keys_projects", "projects", {:name=>"fk_58a901ca7e", :on_delete=>:cascade})518 -> 0.0024s519-- add_foreign_key("deployments", "projects", {:name=>"fk_b9a3851b82", :on_delete=>:cascade})520 -> 0.0030s521-- add_foreign_key("environments", "projects", {:name=>"fk_d1c8c1da6a", :on_delete=>:cascade})522 -> 0.0027s523-- add_foreign_key("events", "projects", {:on_delete=>:cascade})524 -> 0.0030s525-- add_foreign_key("events", "users", {:column=>"author_id", :name=>"fk_edfd187b6f", :on_delete=>:cascade})526 -> 0.0023s527-- add_foreign_key("fork_network_members", "fork_networks", {:on_delete=>:cascade})528 -> 0.0024s529-- add_foreign_key("fork_network_members", "projects", {:column=>"forked_from_project_id", :name=>"fk_b01280dae4", :on_delete=>:nullify})530 -> 0.0024s531-- add_foreign_key("fork_network_members", "projects", {:on_delete=>:cascade})532 -> 0.0024s533-- add_foreign_key("fork_networks", "projects", {:column=>"root_project_id", :name=>"fk_e7b436b2b5", :on_delete=>:nullify})534 -> 0.0024s535-- add_foreign_key("forked_project_links", "projects", {:column=>"forked_to_project_id", :name=>"fk_434510edb0", :on_delete=>:cascade})536 -> 0.0024s537-- add_foreign_key("gpg_key_subkeys", "gpg_keys", {:on_delete=>:cascade})538 -> 0.0026s539-- add_foreign_key("gpg_keys", "users", {:on_delete=>:cascade})540 -> 0.0024s541-- add_foreign_key("gpg_signatures", "gpg_key_subkeys", {:on_delete=>:nullify})542 -> 0.0026s543-- add_foreign_key("gpg_signatures", "gpg_keys", {:on_delete=>:nullify})544 -> 0.0023s545-- add_foreign_key("gpg_signatures", "projects", {:on_delete=>:cascade})546 -> 0.0025s547-- add_foreign_key("group_custom_attributes", "namespaces", {:column=>"group_id", :on_delete=>:cascade})548 -> 0.0024s549-- add_foreign_key("import_export_uploads", "projects", {:on_delete=>:cascade})550 -> 0.0025s551-- add_foreign_key("internal_ids", "namespaces", {:name=>"fk_162941d509", :on_delete=>:cascade})552 -> 0.0025s553-- add_foreign_key("internal_ids", "projects", {:on_delete=>:cascade})554 -> 0.0024s555-- add_foreign_key("issue_assignees", "issues", {:name=>"fk_b7d881734a", :on_delete=>:cascade})556 -> 0.0028s557-- add_foreign_key("issue_assignees", "users", {:name=>"fk_5e0c8d9154", :on_delete=>:cascade})558 -> 0.0023s559-- add_foreign_key("issue_metrics", "issues", {:on_delete=>:cascade})560 -> 0.0023s561-- add_foreign_key("issues", "issues", {:column=>"moved_to_id", :name=>"fk_a194299be1", :on_delete=>:nullify})562 -> 0.0022s563-- add_foreign_key("issues", "milestones", {:name=>"fk_96b1dd429c", :on_delete=>:nullify})564 -> 0.0026s565-- add_foreign_key("issues", "projects", {:name=>"fk_899c8f3231", :on_delete=>:cascade})566 -> 0.0027s567-- add_foreign_key("issues", "users", {:column=>"author_id", :name=>"fk_05f1e72feb", :on_delete=>:nullify})568 -> 0.0027s569-- add_foreign_key("issues", "users", {:column=>"closed_by_id", :name=>"fk_c63cbf6c25", :on_delete=>:nullify})570 -> 0.0027s571-- add_foreign_key("issues", "users", {:column=>"updated_by_id", :name=>"fk_ffed080f01", :on_delete=>:nullify})572 -> 0.0027s573-- add_foreign_key("label_links", "labels", {:name=>"fk_d97dd08678", :on_delete=>:cascade})574 -> 0.0025s575-- add_foreign_key("label_priorities", "labels", {:on_delete=>:cascade})576 -> 0.0025s577-- add_foreign_key("label_priorities", "projects", {:on_delete=>:cascade})578 -> 0.0026s579-- add_foreign_key("labels", "namespaces", {:column=>"group_id", :on_delete=>:cascade})580 -> 0.0023s581-- add_foreign_key("labels", "projects", {:name=>"fk_7de4989a69", :on_delete=>:cascade})582 -> 0.0025s583-- add_foreign_key("lfs_file_locks", "projects", {:on_delete=>:cascade})584 -> 0.0026s585-- add_foreign_key("lfs_file_locks", "users", {:on_delete=>:cascade})586 -> 0.0023s587-- add_foreign_key("lists", "boards", {:name=>"fk_0d3f677137", :on_delete=>:cascade})588 -> 0.0026s589-- add_foreign_key("lists", "labels", {:name=>"fk_7a5553d60f", :on_delete=>:cascade})590 -> 0.0022s591-- add_foreign_key("members", "users", {:name=>"fk_2e88fb7ce9", :on_delete=>:cascade})592 -> 0.0026s593-- add_foreign_key("merge_request_diff_commits", "merge_request_diffs", {:on_delete=>:cascade})594 -> 0.0022s595-- add_foreign_key("merge_request_diff_files", "merge_request_diffs", {:on_delete=>:cascade})596 -> 0.0020s597-- add_foreign_key("merge_request_diffs", "merge_requests", {:name=>"fk_8483f3258f", :on_delete=>:cascade})598 -> 0.0022s599-- add_foreign_key("merge_request_metrics", "ci_pipelines", {:column=>"pipeline_id", :on_delete=>:cascade})600 -> 0.0026s601-- add_foreign_key("merge_request_metrics", "merge_requests", {:on_delete=>:cascade})602 -> 0.0025s603-- add_foreign_key("merge_request_metrics", "users", {:column=>"latest_closed_by_id", :name=>"fk_ae440388cc", :on_delete=>:nullify})604 -> 0.0023s605-- add_foreign_key("merge_request_metrics", "users", {:column=>"merged_by_id", :name=>"fk_7f28d925f3", :on_delete=>:nullify})606 -> 0.0021s607-- add_foreign_key("merge_requests", "ci_pipelines", {:column=>"head_pipeline_id", :name=>"fk_fd82eae0b9", :on_delete=>:nullify})608 -> 0.0022s609-- add_foreign_key("merge_requests", "merge_request_diffs", {:column=>"latest_merge_request_diff_id", :name=>"fk_06067f5644", :on_delete=>:nullify})610 -> 0.0022s611-- add_foreign_key("merge_requests", "milestones", {:name=>"fk_6a5165a692", :on_delete=>:nullify})612 -> 0.0024s613-- add_foreign_key("merge_requests", "projects", {:column=>"source_project_id", :name=>"fk_3308fe130c", :on_delete=>:nullify})614 -> 0.0027s615-- add_foreign_key("merge_requests", "projects", {:column=>"target_project_id", :name=>"fk_a6963e8447", :on_delete=>:cascade})616 -> 0.0025s617-- add_foreign_key("merge_requests", "users", {:column=>"assignee_id", :name=>"fk_6149611a04", :on_delete=>:nullify})618 -> 0.0025s619-- add_foreign_key("merge_requests", "users", {:column=>"author_id", :name=>"fk_e719a85f8a", :on_delete=>:nullify})620 -> 0.0026s621-- add_foreign_key("merge_requests", "users", {:column=>"merge_user_id", :name=>"fk_ad525e1f87", :on_delete=>:nullify})622 -> 0.0026s623-- add_foreign_key("merge_requests", "users", {:column=>"updated_by_id", :name=>"fk_641731faff", :on_delete=>:nullify})624 -> 0.0026s625-- add_foreign_key("merge_requests_closing_issues", "issues", {:on_delete=>:cascade})626 -> 0.0025s627-- add_foreign_key("merge_requests_closing_issues", "merge_requests", {:on_delete=>:cascade})628 -> 0.0027s629-- add_foreign_key("milestones", "namespaces", {:column=>"group_id", :name=>"fk_95650a40d4", :on_delete=>:cascade})630 -> 0.0020s631-- add_foreign_key("milestones", "projects", {:name=>"fk_9bd0a0c791", :on_delete=>:cascade})632 -> 0.0026s633-- add_foreign_key("note_diff_files", "notes", {:column=>"diff_note_id", :on_delete=>:cascade})634 -> 0.0028s635-- add_foreign_key("notes", "projects", {:name=>"fk_99e097b079", :on_delete=>:cascade})636 -> 0.0026s637-- add_foreign_key("notification_settings", "users", {:name=>"fk_0c95e91db7", :on_delete=>:cascade})638 -> 0.0027s639-- add_foreign_key("oauth_openid_requests", "oauth_access_grants", {:column=>"access_grant_id", :name=>"fk_oauth_openid_requests_oauth_access_grants_access_grant_id"})640 -> 0.0021s641-- add_foreign_key("pages_domains", "projects", {:name=>"fk_ea2f6dfc6f", :on_delete=>:cascade})642 -> 0.0027s643-- add_foreign_key("personal_access_tokens", "users")644 -> 0.0026s645-- add_foreign_key("pool_repositories", "projects", {:column=>"source_project_id", :on_delete=>:nullify})646 -> 0.0027s647-- add_foreign_key("pool_repositories", "shards", {:on_delete=>:restrict})648 -> 0.0022s649-- add_foreign_key("project_authorizations", "projects", {:on_delete=>:cascade})650 -> 0.0024s651-- add_foreign_key("project_authorizations", "users", {:on_delete=>:cascade})652 -> 0.0024s653-- add_foreign_key("project_auto_devops", "projects", {:on_delete=>:cascade})654 -> 0.0024s655-- add_foreign_key("project_ci_cd_settings", "projects", {:name=>"fk_24c15d2f2e", :on_delete=>:cascade})656 -> 0.0025s657-- add_foreign_key("project_custom_attributes", "projects", {:on_delete=>:cascade})658 -> 0.0027s659-- add_foreign_key("project_daily_statistics", "projects", {:on_delete=>:cascade})660 -> 0.0025s661-- add_foreign_key("project_deploy_tokens", "deploy_tokens", {:on_delete=>:cascade})662 -> 0.0025s663-- add_foreign_key("project_deploy_tokens", "projects", {:on_delete=>:cascade})664 -> 0.0024s665-- add_foreign_key("project_error_tracking_settings", "projects", {:on_delete=>:cascade})666 -> 0.0025s667-- add_foreign_key("project_features", "projects", {:name=>"fk_18513d9b92", :on_delete=>:cascade})668 -> 0.0024s669-- add_foreign_key("project_group_links", "projects", {:name=>"fk_daa8cee94c", :on_delete=>:cascade})670 -> 0.0028s671-- add_foreign_key("project_import_data", "projects", {:name=>"fk_ffb9ee3a10", :on_delete=>:cascade})672 -> 0.0026s673-- add_foreign_key("project_mirror_data", "projects", {:on_delete=>:cascade})674 -> 0.0026s675-- add_foreign_key("project_repositories", "projects", {:on_delete=>:cascade})676 -> 0.0027s677-- add_foreign_key("project_repositories", "shards", {:on_delete=>:restrict})678 -> 0.0022s679-- add_foreign_key("project_statistics", "projects", {:on_delete=>:cascade})680 -> 0.0025s681-- add_foreign_key("projects", "pool_repositories", {:name=>"fk_6e5c14658a", :on_delete=>:nullify})682 -> 0.0027s683-- add_foreign_key("prometheus_metrics", "projects", {:on_delete=>:cascade})684 -> 0.0025s685-- add_foreign_key("protected_branch_merge_access_levels", "protected_branches", {:name=>"fk_8a3072ccb3", :on_delete=>:cascade})686 -> 0.0022s687-- add_foreign_key("protected_branch_push_access_levels", "protected_branches", {:name=>"fk_9ffc86a3d9", :on_delete=>:cascade})688 -> 0.0019s689-- add_foreign_key("protected_branches", "projects", {:name=>"fk_7a9c6d93e7", :on_delete=>:cascade})690 -> 0.0024s691-- add_foreign_key("protected_tag_create_access_levels", "namespaces", {:column=>"group_id"})692 -> 0.0022s693-- add_foreign_key("protected_tag_create_access_levels", "protected_tags", {:name=>"fk_f7dfda8c51", :on_delete=>:cascade})694 -> 0.0022s695-- add_foreign_key("protected_tag_create_access_levels", "users")696 -> 0.0024s697-- add_foreign_key("protected_tags", "projects", {:name=>"fk_8e4af87648", :on_delete=>:cascade})698 -> 0.0024s699-- add_foreign_key("push_event_payloads", "events", {:name=>"fk_36c74129da", :on_delete=>:cascade})700 -> 0.0021s701-- add_foreign_key("release_links", "releases", {:on_delete=>:cascade})702 -> 0.0027s703-- add_foreign_key("releases", "projects", {:name=>"fk_47fe2a0596", :on_delete=>:cascade})704 -> 0.0023s705-- add_foreign_key("releases", "users", {:column=>"author_id", :name=>"fk_8e4456f90f", :on_delete=>:nullify})706 -> 0.0023s707-- add_foreign_key("remote_mirrors", "projects", {:on_delete=>:cascade})708 -> 0.0026s709-- add_foreign_key("repository_languages", "projects", {:on_delete=>:cascade})710 -> 0.0026s711-- add_foreign_key("resource_label_events", "issues", {:on_delete=>:cascade})712 -> 0.0027s713-- add_foreign_key("resource_label_events", "labels", {:on_delete=>:nullify})714 -> 0.0024s715-- add_foreign_key("resource_label_events", "merge_requests", {:on_delete=>:cascade})716 -> 0.0026s717-- add_foreign_key("resource_label_events", "users", {:on_delete=>:nullify})718 -> 0.0028s719-- add_foreign_key("services", "projects", {:name=>"fk_71cce407f9", :on_delete=>:cascade})720 -> 0.0032s721-- add_foreign_key("snippets", "projects", {:name=>"fk_be41fd4bb7", :on_delete=>:cascade})722 -> 0.0030s723-- add_foreign_key("subscriptions", "projects", {:on_delete=>:cascade})724 -> 0.0027s725-- add_foreign_key("suggestions", "notes", {:on_delete=>:cascade})726 -> 0.0026s727-- add_foreign_key("system_note_metadata", "notes", {:name=>"fk_d83a918cb1", :on_delete=>:cascade})728 -> 0.0025s729-- add_foreign_key("term_agreements", "application_setting_terms", {:column=>"term_id"})730 -> 0.0045s731-- add_foreign_key("term_agreements", "users", {:on_delete=>:cascade})732 -> 0.0029s733-- add_foreign_key("timelogs", "issues", {:name=>"fk_timelogs_issues_issue_id", :on_delete=>:cascade})734 -> 0.0027s735-- add_foreign_key("timelogs", "merge_requests", {:name=>"fk_timelogs_merge_requests_merge_request_id", :on_delete=>:cascade})736 -> 0.0025s737-- add_foreign_key("todos", "namespaces", {:column=>"group_id", :on_delete=>:cascade})738 -> 0.0029s739-- add_foreign_key("todos", "notes", {:name=>"fk_91d1f47b13", :on_delete=>:cascade})740 -> 0.0024s741-- add_foreign_key("todos", "projects", {:name=>"fk_45054f9c45", :on_delete=>:cascade})742 -> 0.0028s743-- add_foreign_key("todos", "users", {:column=>"author_id", :name=>"fk_ccf0373936", :on_delete=>:cascade})744 -> 0.0027s745-- add_foreign_key("todos", "users", {:name=>"fk_d94154aa95", :on_delete=>:cascade})746 -> 0.0026s747-- add_foreign_key("trending_projects", "projects", {:on_delete=>:cascade})748 -> 0.0028s749-- add_foreign_key("u2f_registrations", "users")750 -> 0.0027s751-- add_foreign_key("user_callouts", "users", {:on_delete=>:cascade})752 -> 0.0025s753-- add_foreign_key("user_custom_attributes", "users", {:on_delete=>:cascade})754 -> 0.0030s755-- add_foreign_key("user_interacted_projects", "projects", {:name=>"fk_722ceba4f7", :on_delete=>:cascade})756 -> 0.0031s757-- add_foreign_key("user_interacted_projects", "users", {:name=>"fk_0894651f08", :on_delete=>:cascade})758 -> 0.0033s759-- add_foreign_key("user_preferences", "users", {:on_delete=>:cascade})760 -> 0.0033s761-- add_foreign_key("user_statuses", "users", {:on_delete=>:cascade})762 -> 0.0034s763-- add_foreign_key("user_synced_attributes_metadata", "users", {:on_delete=>:cascade})764 -> 0.0033s765-- add_foreign_key("users", "application_setting_terms", {:column=>"accepted_term_id", :name=>"fk_789cd90b35", :on_delete=>:cascade})766 -> 0.0031s767-- add_foreign_key("users_star_projects", "projects", {:name=>"fk_22cd27ddfc", :on_delete=>:cascade})768 -> 0.0032s769-- add_foreign_key("web_hook_logs", "web_hooks", {:on_delete=>:cascade})770 -> 0.0027s771-- add_foreign_key("web_hooks", "projects", {:name=>"fk_0c8ca6d9d1", :on_delete=>:cascade})772 -> 0.0029s773-- initialize_schema_migrations_table()774 -> 0.0121s775$ date776Thu Mar 14 02:15:52 UTC 2019777$ JOB_NAME=( $CI_JOB_NAME )778$ TEST_TOOL=${JOB_NAME[0]}779$ export KNAPSACK_REPORT_PATH=knapsack/${CI_PROJECT_NAME}/${TEST_TOOL}_node_${CI_NODE_INDEX}_${CI_NODE_TOTAL}_report.json780$ export KNAPSACK_GENERATE_REPORT=true781$ export SUITE_FLAKY_RSPEC_REPORT_PATH=${FLAKY_RSPEC_SUITE_REPORT_PATH}782$ export FLAKY_RSPEC_REPORT_PATH=rspec_flaky/all_${TEST_TOOL}_${CI_NODE_INDEX}_${CI_NODE_TOTAL}_report.json783$ export NEW_FLAKY_RSPEC_REPORT_PATH=rspec_flaky/new_${TEST_TOOL}_${CI_NODE_INDEX}_${CI_NODE_TOTAL}_report.json784$ export FLAKY_RSPEC_GENERATE_REPORT=true785$ export CACHE_CLASSES=true786$ cp ${KNAPSACK_RSPEC_SUITE_REPORT_PATH} ${KNAPSACK_REPORT_PATH}787$ [[ -f $FLAKY_RSPEC_REPORT_PATH ]] || echo "{}" > ${FLAKY_RSPEC_REPORT_PATH}788$ [[ -f $NEW_FLAKY_RSPEC_REPORT_PATH ]] || echo "{}" > ${NEW_FLAKY_RSPEC_REPORT_PATH}789$ scripts/gitaly-test-spawn790Checking gitaly-ruby bundle...791Warning: the running version of Bundler (1.17.2) is older than the version that created the lockfile (1.17.3). We suggest you upgrade to the latest version of Bundler by running `gem install bundler`.792The Gemfile's dependencies are satisfied793Trying to connect to gitaly: ..... OK794$ knapsack rspec "--color --format documentation --format RspecJunitFormatter --out junit_rspec.xml"795RSpec's reporter has already been initialized with #<IO:<STDERR>> as the deprecation stream, so your change to `deprecation_stream` will be ignored. You should configure it earlier for it to take effect, or use the `--deprecation-out` CLI option. (Called from /builds/gitlab-org/gitlab-ce/spec/support/rspec.rb:8:in `block in <top (required)>')796Knapsack report generator started!797==> Setting up GitLab Shell...798 GitLab Shell set up in 0.078924754 seconds...799==> Setting up Gitaly...800 Gitaly set up in 0.000109481 seconds...801SnippetsFinder802 #initialize803 raises ArgumentError when a project and author are given804 filter by scope805 returns all snippets for 'all' scope806 returns all snippets for 'are_private' scope807 returns all snippets for 'are_internal' scope808 returns all snippets for 'are_private' scope809 filter by author810 returns all public and internal snippets811 returns internal snippets812 returns private snippets813 returns public snippets814 returns all snippets815 returns only public snippets if unauthenticated user816 returns all snippets for an admin817 filter by project818 returns public snippets for unauthorized user819 returns public and internal snippets for non project members820 returns public snippets for non project members821 returns internal snippets for non project members822 does not return private snippets for non project members823 returns all snippets for project members824 returns private snippets for project members825 returns all snippets for an admin826 #execute827 returns project- and personal snippets828 when the user cannot read cross project829 returns only personal snippets when the user cannot read cross project830 behaves like snippet visibility831 For project snippets832 project_type: :public, feature_visibility: :enabled, user_type: :unauthenticated, snippet_type: :public, outcome: true833 For public project and unauthenticated users834 should agree with the read_project_snippet policy835 should return proper outcome836 Without a given project and unauthenticated users837 should return proper outcome838 returns no snippets when the user cannot read cross project839 project_type: :public, feature_visibility: :enabled, user_type: :unauthenticated, snippet_type: :internal, outcome: false840 For public project and unauthenticated users841 should agree with the read_project_snippet policy842 should return proper outcome843 Without a given project and unauthenticated users844 should return proper outcome845 returns no snippets when the user cannot read cross project846 project_type: :public, feature_visibility: :enabled, user_type: :unauthenticated, snippet_type: :private, outcome: false847 For public project and unauthenticated users848 should agree with the read_project_snippet policy849 should return proper outcome850 Without a given project and unauthenticated users851 should return proper outcome852 returns no snippets when the user cannot read cross project853 project_type: :public, feature_visibility: :enabled, user_type: :external, snippet_type: :public, outcome: true854 For public project and external users855 should agree with the read_project_snippet policy856 should return proper outcome857 Without a given project and external users858 should return proper outcome859 returns no snippets when the user cannot read cross project860 project_type: :public, feature_visibility: :enabled, user_type: :external, snippet_type: :internal, outcome: false861 For public project and external users862 should agree with the read_project_snippet policy863 should return proper outcome864 Without a given project and external users865 should return proper outcome866 returns no snippets when the user cannot read cross project867 project_type: :public, feature_visibility: :enabled, user_type: :external, snippet_type: :private, outcome: false868 For public project and external users869 should agree with the read_project_snippet policy870 should return proper outcome871 Without a given project and external users872 should return proper outcome873 returns no snippets when the user cannot read cross project874 project_type: :public, feature_visibility: :enabled, user_type: :non_member, snippet_type: :public, outcome: true875 For public project and non_member users876 should agree with the read_project_snippet policy877 should return proper outcome878 Without a given project and non_member users879 should return proper outcome880 returns no snippets when the user cannot read cross project881 project_type: :public, feature_visibility: :enabled, user_type: :non_member, snippet_type: :internal, outcome: true882 For public project and non_member users883 should agree with the read_project_snippet policy884 should return proper outcome885 Without a given project and non_member users886 should return proper outcome887 returns no snippets when the user cannot read cross project888 project_type: :public, feature_visibility: :enabled, user_type: :non_member, snippet_type: :private, outcome: false889 For public project and non_member users890 should agree with the read_project_snippet policy891 should return proper outcome892 Without a given project and non_member users893 should return proper outcome894 returns no snippets when the user cannot read cross project895 project_type: :public, feature_visibility: :enabled, user_type: :member, snippet_type: :public, outcome: true896 For public project and member users897 should agree with the read_project_snippet policy898 should return proper outcome899 Without a given project and member users900 should return proper outcome901 returns no snippets when the user cannot read cross project902 project_type: :public, feature_visibility: :enabled, user_type: :member, snippet_type: :internal, outcome: true903 For public project and member users904 should agree with the read_project_snippet policy905 should return proper outcome906 Without a given project and member users907 should return proper outcome908 returns no snippets when the user cannot read cross project909 project_type: :public, feature_visibility: :enabled, user_type: :member, snippet_type: :private, outcome: true910 For public project and member users911 should agree with the read_project_snippet policy912 should return proper outcome913 Without a given project and member users914 should return proper outcome915 returns no snippets when the user cannot read cross project916 project_type: :public, feature_visibility: :enabled, user_type: :author, snippet_type: :public, outcome: true917 For public project and author users918 should agree with the read_project_snippet policy919 should return proper outcome920 Without a given project and author users921 should return proper outcome922 returns no snippets when the user cannot read cross project923 project_type: :public, feature_visibility: :enabled, user_type: :author, snippet_type: :internal, outcome: true924 For public project and author users925 should agree with the read_project_snippet policy926 should return proper outcome927 Without a given project and author users928 should return proper outcome929 returns no snippets when the user cannot read cross project930 project_type: :public, feature_visibility: :enabled, user_type: :author, snippet_type: :private, outcome: true931 For public project and author users932 should agree with the read_project_snippet policy933 should return proper outcome934 Without a given project and author users935 should return proper outcome936 returns no snippets when the user cannot read cross project937 project_type: :public, feature_visibility: :private, user_type: :unauthenticated, snippet_type: :public, outcome: false938 For public project and unauthenticated users939 should agree with the read_project_snippet policy940 should return proper outcome941 Without a given project and unauthenticated users942 should return proper outcome943 returns no snippets when the user cannot read cross project944 project_type: :public, feature_visibility: :private, user_type: :unauthenticated, snippet_type: :internal, outcome: false945 For public project and unauthenticated users946 should agree with the read_project_snippet policy947 should return proper outcome948 Without a given project and unauthenticated users949 should return proper outcome950 returns no snippets when the user cannot read cross project951 project_type: :public, feature_visibility: :private, user_type: :unauthenticated, snippet_type: :private, outcome: false952 For public project and unauthenticated users953 should agree with the read_project_snippet policy954 should return proper outcome955 Without a given project and unauthenticated users956 should return proper outcome957 returns no snippets when the user cannot read cross project958 project_type: :public, feature_visibility: :private, user_type: :external, snippet_type: :public, outcome: false959 For public project and external users960 should agree with the read_project_snippet policy961 should return proper outcome962 Without a given project and external users963 should return proper outcome964 returns no snippets when the user cannot read cross project965 project_type: :public, feature_visibility: :private, user_type: :external, snippet_type: :internal, outcome: false966 For public project and external users967 should agree with the read_project_snippet policy968 should return proper outcome969 Without a given project and external users970 should return proper outcome971 returns no snippets when the user cannot read cross project972 project_type: :public, feature_visibility: :private, user_type: :external, snippet_type: :private, outcome: false973 For public project and external users974 should agree with the read_project_snippet policy975 should return proper outcome976 Without a given project and external users977 should return proper outcome978 returns no snippets when the user cannot read cross project979 project_type: :public, feature_visibility: :private, user_type: :non_member, snippet_type: :public, outcome: false980 For public project and non_member users981 should agree with the read_project_snippet policy982 should return proper outcome983 Without a given project and non_member users984 should return proper outcome985 returns no snippets when the user cannot read cross project986 project_type: :public, feature_visibility: :private, user_type: :non_member, snippet_type: :internal, outcome: false987 For public project and non_member users988 should agree with the read_project_snippet policy989 should return proper outcome990 Without a given project and non_member users991 should return proper outcome992 returns no snippets when the user cannot read cross project993 project_type: :public, feature_visibility: :private, user_type: :non_member, snippet_type: :private, outcome: false994 For public project and non_member users995 should agree with the read_project_snippet policy996 should return proper outcome997 Without a given project and non_member users998 should return proper outcome999 returns no snippets when the user cannot read cross project1000 project_type: :public, feature_visibility: :private, user_type: :member, snippet_type: :public, outcome: true1001 For public project and member users1002 should agree with the read_project_snippet policy1003 should return proper outcome1004 Without a given project and member users1005 should return proper outcome1006 returns no snippets when the user cannot read cross project1007 project_type: :public, feature_visibility: :private, user_type: :member, snippet_type: :internal, outcome: true1008 For public project and member users1009 should agree with the read_project_snippet policy1010 should return proper outcome1011 Without a given project and member users1012 should return proper outcome1013 returns no snippets when the user cannot read cross project1014 project_type: :public, feature_visibility: :private, user_type: :member, snippet_type: :private, outcome: true1015 For public project and member users1016 should agree with the read_project_snippet policy1017 should return proper outcome1018 Without a given project and member users1019 should return proper outcome1020 returns no snippets when the user cannot read cross project1021 project_type: :public, feature_visibility: :private, user_type: :author, snippet_type: :public, outcome: true1022 For public project and author users1023 should agree with the read_project_snippet policy1024 should return proper outcome1025 Without a given project and author users1026 should return proper outcome1027 returns no snippets when the user cannot read cross project1028 project_type: :public, feature_visibility: :private, user_type: :author, snippet_type: :internal, outcome: true1029 For public project and author users1030 should agree with the read_project_snippet policy1031 should return proper outcome1032 Without a given project and author users1033 should return proper outcome1034 returns no snippets when the user cannot read cross project1035 project_type: :public, feature_visibility: :private, user_type: :author, snippet_type: :private, outcome: true1036 For public project and author users1037 should agree with the read_project_snippet policy1038 should return proper outcome1039 Without a given project and author users1040 should return proper outcome1041 returns no snippets when the user cannot read cross project1042 project_type: :public, feature_visibility: :disabled, user_type: :unauthenticated, snippet_type: :public, outcome: false1043 For public project and unauthenticated users1044 should agree with the read_project_snippet policy1045 should return proper outcome1046 Without a given project and unauthenticated users1047 should return proper outcome1048 returns no snippets when the user cannot read cross project1049 project_type: :public, feature_visibility: :disabled, user_type: :unauthenticated, snippet_type: :internal, outcome: false1050 For public project and unauthenticated users1051 should agree with the read_project_snippet policy1052 should return proper outcome1053 Without a given project and unauthenticated users1054 should return proper outcome1055 returns no snippets when the user cannot read cross project1056 project_type: :public, feature_visibility: :disabled, user_type: :unauthenticated, snippet_type: :private, outcome: false1057 For public project and unauthenticated users1058 should agree with the read_project_snippet policy1059 should return proper outcome1060 Without a given project and unauthenticated users1061 should return proper outcome1062 returns no snippets when the user cannot read cross project1063 project_type: :public, feature_visibility: :disabled, user_type: :external, snippet_type: :public, outcome: false1064 For public project and external users1065 should agree with the read_project_snippet policy1066 should return proper outcome1067 Without a given project and external users1068 should return proper outcome1069 returns no snippets when the user cannot read cross project1070 project_type: :public, feature_visibility: :disabled, user_type: :external, snippet_type: :internal, outcome: false1071 For public project and external users1072 should agree with the read_project_snippet policy1073 should return proper outcome1074 Without a given project and external users1075 should return proper outcome1076 returns no snippets when the user cannot read cross project1077 project_type: :public, feature_visibility: :disabled, user_type: :external, snippet_type: :private, outcome: false1078 For public project and external users1079 should agree with the read_project_snippet policy1080 should return proper outcome1081 Without a given project and external users1082 should return proper outcome1083 returns no snippets when the user cannot read cross project1084 project_type: :public, feature_visibility: :disabled, user_type: :non_member, snippet_type: :public, outcome: false1085 For public project and non_member users1086 should agree with the read_project_snippet policy1087 should return proper outcome1088 Without a given project and non_member users1089 should return proper outcome1090 returns no snippets when the user cannot read cross project1091 project_type: :public, feature_visibility: :disabled, user_type: :non_member, snippet_type: :internal, outcome: false1092 For public project and non_member users1093 should agree with the read_project_snippet policy1094 should return proper outcome1095 Without a given project and non_member users1096 should return proper outcome1097 returns no snippets when the user cannot read cross project1098 project_type: :public, feature_visibility: :disabled, user_type: :non_member, snippet_type: :private, outcome: false1099 For public project and non_member users1100 should agree with the read_project_snippet policy1101 should return proper outcome1102 Without a given project and non_member users1103 should return proper outcome1104 returns no snippets when the user cannot read cross project1105 project_type: :public, feature_visibility: :disabled, user_type: :member, snippet_type: :public, outcome: false1106 For public project and member users1107 should agree with the read_project_snippet policy1108 should return proper outcome1109 Without a given project and member users1110 should return proper outcome1111 returns no snippets when the user cannot read cross project1112 project_type: :public, feature_visibility: :disabled, user_type: :member, snippet_type: :internal, outcome: false1113 For public project and member users1114 should agree with the read_project_snippet policy1115 should return proper outcome1116 Without a given project and member users1117 should return proper outcome1118 returns no snippets when the user cannot read cross project1119 project_type: :public, feature_visibility: :disabled, user_type: :member, snippet_type: :private, outcome: false1120 For public project and member users1121 should agree with the read_project_snippet policy1122 should return proper outcome1123 Without a given project and member users1124 should return proper outcome1125 returns no snippets when the user cannot read cross project1126 project_type: :public, feature_visibility: :disabled, user_type: :author, snippet_type: :public, outcome: false1127 For public project and author users1128 should agree with the read_project_snippet policy1129 should return proper outcome1130 Without a given project and author users1131 should return proper outcome1132 returns no snippets when the user cannot read cross project1133 project_type: :public, feature_visibility: :disabled, user_type: :author, snippet_type: :internal, outcome: false1134 For public project and author users1135 should agree with the read_project_snippet policy1136 should return proper outcome1137 Without a given project and author users1138 should return proper outcome1139 returns no snippets when the user cannot read cross project1140 project_type: :public, feature_visibility: :disabled, user_type: :author, snippet_type: :private, outcome: false1141 For public project and author users1142 should agree with the read_project_snippet policy1143 should return proper outcome1144 Without a given project and author users1145 should return proper outcome1146 returns no snippets when the user cannot read cross project1147 project_type: :internal, feature_visibility: :enabled, user_type: :unauthenticated, snippet_type: :public, outcome: false1148 For internal project and unauthenticated users1149 should agree with the read_project_snippet policy1150 should return proper outcome1151 Without a given project and unauthenticated users1152 should return proper outcome1153 returns no snippets when the user cannot read cross project1154 project_type: :internal, feature_visibility: :enabled, user_type: :unauthenticated, snippet_type: :internal, outcome: false1155 For internal project and unauthenticated users1156 should agree with the read_project_snippet policy1157 should return proper outcome1158 Without a given project and unauthenticated users1159 should return proper outcome1160 returns no snippets when the user cannot read cross project1161 project_type: :internal, feature_visibility: :enabled, user_type: :unauthenticated, snippet_type: :private, outcome: false1162 For internal project and unauthenticated users1163 should agree with the read_project_snippet policy1164 should return proper outcome1165 Without a given project and unauthenticated users1166 should return proper outcome1167 returns no snippets when the user cannot read cross project1168 project_type: :internal, feature_visibility: :enabled, user_type: :external, snippet_type: :public, outcome: false1169 For internal project and external users1170 should agree with the read_project_snippet policy1171 should return proper outcome1172 Without a given project and external users1173 should return proper outcome1174 returns no snippets when the user cannot read cross project1175 project_type: :internal, feature_visibility: :enabled, user_type: :external, snippet_type: :internal, outcome: false1176 For internal project and external users1177 should agree with the read_project_snippet policy1178 should return proper outcome1179 Without a given project and external users1180 should return proper outcome1181 returns no snippets when the user cannot read cross project1182 project_type: :internal, feature_visibility: :enabled, user_type: :external, snippet_type: :private, outcome: false1183 For internal project and external users1184 should agree with the read_project_snippet policy1185 should return proper outcome1186 Without a given project and external users1187 should return proper outcome1188 returns no snippets when the user cannot read cross project1189 project_type: :internal, feature_visibility: :enabled, user_type: :non_member, snippet_type: :public, outcome: true1190 For internal project and non_member users1191 should agree with the read_project_snippet policy1192 should return proper outcome1193 Without a given project and non_member users1194 should return proper outcome1195 returns no snippets when the user cannot read cross project1196 project_type: :internal, feature_visibility: :enabled, user_type: :non_member, snippet_type: :internal, outcome: true1197 For internal project and non_member users1198 should agree with the read_project_snippet policy1199 should return proper outcome1200 Without a given project and non_member users1201 should return proper outcome1202 returns no snippets when the user cannot read cross project1203 project_type: :internal, feature_visibility: :enabled, user_type: :non_member, snippet_type: :private, outcome: false1204 For internal project and non_member users1205 should agree with the read_project_snippet policy1206 should return proper outcome1207 Without a given project and non_member users1208 should return proper outcome1209 returns no snippets when the user cannot read cross project1210 project_type: :internal, feature_visibility: :enabled, user_type: :member, snippet_type: :public, outcome: true1211 For internal project and member users1212 should agree with the read_project_snippet policy1213 should return proper outcome1214 Without a given project and member users1215 should return proper outcome1216 returns no snippets when the user cannot read cross project1217 project_type: :internal, feature_visibility: :enabled, user_type: :member, snippet_type: :internal, outcome: true1218 For internal project and member users1219 should agree with the read_project_snippet policy1220 should return proper outcome1221 Without a given project and member users1222 should return proper outcome1223 returns no snippets when the user cannot read cross project1224 project_type: :internal, feature_visibility: :enabled, user_type: :member, snippet_type: :private, outcome: true1225 For internal project and member users1226 should agree with the read_project_snippet policy1227 should return proper outcome1228 Without a given project and member users1229 should return proper outcome1230 returns no snippets when the user cannot read cross project1231 project_type: :internal, feature_visibility: :enabled, user_type: :author, snippet_type: :public, outcome: true1232 For internal project and author users1233 should agree with the read_project_snippet policy1234 should return proper outcome1235 Without a given project and author users1236 should return proper outcome1237 returns no snippets when the user cannot read cross project1238 project_type: :internal, feature_visibility: :enabled, user_type: :author, snippet_type: :internal, outcome: true1239 For internal project and author users1240 should agree with the read_project_snippet policy1241 should return proper outcome1242 Without a given project and author users1243 should return proper outcome1244 returns no snippets when the user cannot read cross project1245 project_type: :internal, feature_visibility: :enabled, user_type: :author, snippet_type: :private, outcome: true1246 For internal project and author users1247 should agree with the read_project_snippet policy1248 should return proper outcome1249 Without a given project and author users1250 should return proper outcome1251 returns no snippets when the user cannot read cross project1252 project_type: :internal, feature_visibility: :private, user_type: :unauthenticated, snippet_type: :public, outcome: false1253 For internal project and unauthenticated users1254 should agree with the read_project_snippet policy1255 should return proper outcome1256 Without a given project and unauthenticated users1257 should return proper outcome1258 returns no snippets when the user cannot read cross project1259 project_type: :internal, feature_visibility: :private, user_type: :unauthenticated, snippet_type: :internal, outcome: false1260 For internal project and unauthenticated users1261 should agree with the read_project_snippet policy1262 should return proper outcome1263 Without a given project and unauthenticated users1264 should return proper outcome1265 returns no snippets when the user cannot read cross project1266 project_type: :internal, feature_visibility: :private, user_type: :unauthenticated, snippet_type: :private, outcome: false1267 For internal project and unauthenticated users1268 should agree with the read_project_snippet policy1269 should return proper outcome1270 Without a given project and unauthenticated users1271 should return proper outcome1272 returns no snippets when the user cannot read cross project1273 project_type: :internal, feature_visibility: :private, user_type: :external, snippet_type: :public, outcome: false1274 For internal project and external users1275 should agree with the read_project_snippet policy1276 should return proper outcome1277 Without a given project and external users1278 should return proper outcome1279 returns no snippets when the user cannot read cross project1280 project_type: :internal, feature_visibility: :private, user_type: :external, snippet_type: :internal, outcome: false1281 For internal project and external users1282 should agree with the read_project_snippet policy1283 should return proper outcome1284 Without a given project and external users1285 should return proper outcome1286 returns no snippets when the user cannot read cross project1287 project_type: :internal, feature_visibility: :private, user_type: :external, snippet_type: :private, outcome: false1288 For internal project and external users1289 should agree with the read_project_snippet policy1290 should return proper outcome1291 Without a given project and external users1292 should return proper outcome1293 returns no snippets when the user cannot read cross project1294 project_type: :internal, feature_visibility: :private, user_type: :non_member, snippet_type: :public, outcome: false1295 For internal project and non_member users1296 should agree with the read_project_snippet policy1297 should return proper outcome1298 Without a given project and non_member users1299 should return proper outcome1300 returns no snippets when the user cannot read cross project1301 project_type: :internal, feature_visibility: :private, user_type: :non_member, snippet_type: :internal, outcome: false1302 For internal project and non_member users1303 should agree with the read_project_snippet policy1304 should return proper outcome1305 Without a given project and non_member users1306 should return proper outcome1307 returns no snippets when the user cannot read cross project1308 project_type: :internal, feature_visibility: :private, user_type: :non_member, snippet_type: :private, outcome: false1309 For internal project and non_member users1310 should agree with the read_project_snippet policy1311 should return proper outcome1312 Without a given project and non_member users1313 should return proper outcome1314 returns no snippets when the user cannot read cross project1315 project_type: :internal, feature_visibility: :private, user_type: :member, snippet_type: :public, outcome: true1316 For internal project and member users1317 should agree with the read_project_snippet policy1318 should return proper outcome1319 Without a given project and member users1320 should return proper outcome1321 returns no snippets when the user cannot read cross project1322 project_type: :internal, feature_visibility: :private, user_type: :member, snippet_type: :internal, outcome: true1323 For internal project and member users1324 should agree with the read_project_snippet policy1325 should return proper outcome1326 Without a given project and member users1327 should return proper outcome1328 returns no snippets when the user cannot read cross project1329 project_type: :internal, feature_visibility: :private, user_type: :member, snippet_type: :private, outcome: true1330 For internal project and member users1331 should agree with the read_project_snippet policy1332 should return proper outcome1333 Without a given project and member users1334 should return proper outcome1335 returns no snippets when the user cannot read cross project1336 project_type: :internal, feature_visibility: :private, user_type: :author, snippet_type: :public, outcome: true1337 For internal project and author users1338 should agree with the read_project_snippet policy1339 should return proper outcome1340 Without a given project and author users1341 should return proper outcome1342 returns no snippets when the user cannot read cross project1343 project_type: :internal, feature_visibility: :private, user_type: :author, snippet_type: :internal, outcome: true1344 For internal project and author users1345 should agree with the read_project_snippet policy1346 should return proper outcome1347 Without a given project and author users1348 should return proper outcome1349 returns no snippets when the user cannot read cross project1350 project_type: :internal, feature_visibility: :private, user_type: :author, snippet_type: :private, outcome: true1351 For internal project and author users1352 should agree with the read_project_snippet policy1353 should return proper outcome1354 Without a given project and author users1355 should return proper outcome1356 returns no snippets when the user cannot read cross project1357 project_type: :internal, feature_visibility: :disabled, user_type: :unauthenticated, snippet_type: :public, outcome: false1358 For internal project and unauthenticated users1359 should agree with the read_project_snippet policy1360 should return proper outcome1361 Without a given project and unauthenticated users1362 should return proper outcome1363 returns no snippets when the user cannot read cross project1364 project_type: :internal, feature_visibility: :disabled, user_type: :unauthenticated, snippet_type: :internal, outcome: false1365 For internal project and unauthenticated users1366 should agree with the read_project_snippet policy1367 should return proper outcome1368 Without a given project and unauthenticated users1369 should return proper outcome1370 returns no snippets when the user cannot read cross project1371 project_type: :internal, feature_visibility: :disabled, user_type: :unauthenticated, snippet_type: :private, outcome: false1372 For internal project and unauthenticated users1373 should agree with the read_project_snippet policy1374 should return proper outcome1375 Without a given project and unauthenticated users1376 should return proper outcome1377 returns no snippets when the user cannot read cross project1378 project_type: :internal, feature_visibility: :disabled, user_type: :external, snippet_type: :public, outcome: false1379 For internal project and external users1380 should agree with the read_project_snippet policy1381 should return proper outcome1382 Without a given project and external users1383 should return proper outcome1384 returns no snippets when the user cannot read cross project1385 project_type: :internal, feature_visibility: :disabled, user_type: :external, snippet_type: :internal, outcome: false1386 For internal project and external users1387 should agree with the read_project_snippet policy1388 should return proper outcome1389 Without a given project and external users1390 should return proper outcome1391 returns no snippets when the user cannot read cross project1392 project_type: :internal, feature_visibility: :disabled, user_type: :external, snippet_type: :private, outcome: false1393 For internal project and external users1394 should agree with the read_project_snippet policy1395 should return proper outcome1396 Without a given project and external users1397 should return proper outcome1398 returns no snippets when the user cannot read cross project1399 project_type: :internal, feature_visibility: :disabled, user_type: :non_member, snippet_type: :public, outcome: false1400 For internal project and non_member users1401 should agree with the read_project_snippet policy1402 should return proper outcome1403 Without a given project and non_member users1404 should return proper outcome1405 returns no snippets when the user cannot read cross project1406 project_type: :internal, feature_visibility: :disabled, user_type: :non_member, snippet_type: :internal, outcome: false1407 For internal project and non_member users1408 should agree with the read_project_snippet policy1409 should return proper outcome1410 Without a given project and non_member users1411 should return proper outcome1412 returns no snippets when the user cannot read cross project1413 project_type: :internal, feature_visibility: :disabled, user_type: :non_member, snippet_type: :private, outcome: false1414 For internal project and non_member users1415 should agree with the read_project_snippet policy1416 should return proper outcome1417 Without a given project and non_member users1418 should return proper outcome1419 returns no snippets when the user cannot read cross project1420 project_type: :internal, feature_visibility: :disabled, user_type: :member, snippet_type: :public, outcome: false1421 For internal project and member users1422 should agree with the read_project_snippet policy1423 should return proper outcome1424 Without a given project and member users1425 should return proper outcome1426 returns no snippets when the user cannot read cross project1427 project_type: :internal, feature_visibility: :disabled, user_type: :member, snippet_type: :internal, outcome: false1428 For internal project and member users1429 should agree with the read_project_snippet policy1430 should return proper outcome1431 Without a given project and member users1432 should return proper outcome1433 returns no snippets when the user cannot read cross project1434 project_type: :internal, feature_visibility: :disabled, user_type: :member, snippet_type: :private, outcome: false1435 For internal project and member users1436 should agree with the read_project_snippet policy1437 should return proper outcome1438 Without a given project and member users1439 should return proper outcome1440 returns no snippets when the user cannot read cross project1441 project_type: :internal, feature_visibility: :disabled, user_type: :author, snippet_type: :public, outcome: false1442 For internal project and author users1443 should agree with the read_project_snippet policy1444 should return proper outcome1445 Without a given project and author users1446 should return proper outcome1447 returns no snippets when the user cannot read cross project1448 project_type: :internal, feature_visibility: :disabled, user_type: :author, snippet_type: :internal, outcome: false1449 For internal project and author users1450 should agree with the read_project_snippet policy1451 should return proper outcome1452 Without a given project and author users1453 should return proper outcome1454 returns no snippets when the user cannot read cross project1455 project_type: :internal, feature_visibility: :disabled, user_type: :author, snippet_type: :private, outcome: false1456 For internal project and author users1457 should agree with the read_project_snippet policy1458 should return proper outcome1459 Without a given project and author users1460 should return proper outcome1461 returns no snippets when the user cannot read cross project1462 project_type: :private, feature_visibility: :enabled, user_type: :unauthenticated, snippet_type: :public, outcome: false1463 For private project and unauthenticated users1464 should agree with the read_project_snippet policy1465 should return proper outcome1466 Without a given project and unauthenticated users1467 should return proper outcome1468 returns no snippets when the user cannot read cross project1469 project_type: :private, feature_visibility: :enabled, user_type: :unauthenticated, snippet_type: :internal, outcome: false1470 For private project and unauthenticated users1471 should agree with the read_project_snippet policy1472 should return proper outcome1473 Without a given project and unauthenticated users1474 should return proper outcome1475 returns no snippets when the user cannot read cross project1476 project_type: :private, feature_visibility: :enabled, user_type: :unauthenticated, snippet_type: :private, outcome: false1477 For private project and unauthenticated users1478 should agree with the read_project_snippet policy1479 should return proper outcome1480 Without a given project and unauthenticated users1481 should return proper outcome1482 returns no snippets when the user cannot read cross project1483 project_type: :private, feature_visibility: :enabled, user_type: :external, snippet_type: :public, outcome: true1484 For private project and external users1485 should agree with the read_project_snippet policy1486 should return proper outcome1487 Without a given project and external users1488 should return proper outcome1489 returns no snippets when the user cannot read cross project1490 project_type: :private, feature_visibility: :enabled, user_type: :external, snippet_type: :internal, outcome: true1491 For private project and external users1492 should agree with the read_project_snippet policy1493 should return proper outcome1494 Without a given project and external users1495 should return proper outcome1496 returns no snippets when the user cannot read cross project1497 project_type: :private, feature_visibility: :enabled, user_type: :external, snippet_type: :private, outcome: true1498 For private project and external users1499 should agree with the read_project_snippet policy1500 should return proper outcome1501 Without a given project and external users1502 should return proper outcome1503 returns no snippets when the user cannot read cross project1504 project_type: :private, feature_visibility: :enabled, user_type: :non_member, snippet_type: :public, outcome: false1505 For private project and non_member users1506 should agree with the read_project_snippet policy1507 should return proper outcome1508 Without a given project and non_member users1509 should return proper outcome1510 returns no snippets when the user cannot read cross project1511 project_type: :private, feature_visibility: :enabled, user_type: :non_member, snippet_type: :internal, outcome: false1512 For private project and non_member users1513 should agree with the read_project_snippet policy1514 should return proper outcome1515 Without a given project and non_member users1516 should return proper outcome1517 returns no snippets when the user cannot read cross project1518 project_type: :private, feature_visibility: :enabled, user_type: :non_member, snippet_type: :private, outcome: false1519 For private project and non_member users1520 should agree with the read_project_snippet policy1521 should return proper outcome1522 Without a given project and non_member users1523 should return proper outcome1524 returns no snippets when the user cannot read cross project1525 project_type: :private, feature_visibility: :enabled, user_type: :member, snippet_type: :public, outcome: true1526 For private project and member users1527 should agree with the read_project_snippet policy1528 should return proper outcome1529 Without a given project and member users1530 should return proper outcome1531 returns no snippets when the user cannot read cross project1532 project_type: :private, feature_visibility: :enabled, user_type: :member, snippet_type: :internal, outcome: true1533 For private project and member users1534 should agree with the read_project_snippet policy1535 should return proper outcome1536 Without a given project and member users1537 should return proper outcome1538 returns no snippets when the user cannot read cross project1539 project_type: :private, feature_visibility: :enabled, user_type: :member, snippet_type: :private, outcome: true1540 For private project and member users1541 should agree with the read_project_snippet policy1542 should return proper outcome1543 Without a given project and member users1544 should return proper outcome1545 returns no snippets when the user cannot read cross project1546 project_type: :private, feature_visibility: :enabled, user_type: :author, snippet_type: :public, outcome: true1547 For private project and author users1548 should agree with the read_project_snippet policy1549 should return proper outcome1550 Without a given project and author users1551 should return proper outcome1552 returns no snippets when the user cannot read cross project1553 project_type: :private, feature_visibility: :enabled, user_type: :author, snippet_type: :internal, outcome: true1554 For private project and author users1555 should agree with the read_project_snippet policy1556 should return proper outcome1557 Without a given project and author users1558 should return proper outcome1559 returns no snippets when the user cannot read cross project1560 project_type: :private, feature_visibility: :enabled, user_type: :author, snippet_type: :private, outcome: true1561 For private project and author users1562 should agree with the read_project_snippet policy1563 should return proper outcome1564 Without a given project and author users1565 should return proper outcome1566 returns no snippets when the user cannot read cross project1567 project_type: :private, feature_visibility: :private, user_type: :unauthenticated, snippet_type: :public, outcome: false1568 For private project and unauthenticated users1569 should agree with the read_project_snippet policy1570 should return proper outcome1571 Without a given project and unauthenticated users1572 should return proper outcome1573 returns no snippets when the user cannot read cross project1574 project_type: :private, feature_visibility: :private, user_type: :unauthenticated, snippet_type: :internal, outcome: false1575 For private project and unauthenticated users1576 should agree with the read_project_snippet policy1577 should return proper outcome1578 Without a given project and unauthenticated users1579 should return proper outcome1580 returns no snippets when the user cannot read cross project1581 project_type: :private, feature_visibility: :private, user_type: :unauthenticated, snippet_type: :private, outcome: false1582 For private project and unauthenticated users1583 should agree with the read_project_snippet policy1584 should return proper outcome1585 Without a given project and unauthenticated users1586 should return proper outcome1587 returns no snippets when the user cannot read cross project1588 project_type: :private, feature_visibility: :private, user_type: :external, snippet_type: :public, outcome: true1589 For private project and external users1590 should agree with the read_project_snippet policy1591 should return proper outcome1592 Without a given project and external users1593 should return proper outcome1594 returns no snippets when the user cannot read cross project1595 project_type: :private, feature_visibility: :private, user_type: :external, snippet_type: :internal, outcome: true1596 For private project and external users1597 should agree with the read_project_snippet policy1598 should return proper outcome1599 Without a given project and external users1600 should return proper outcome1601 returns no snippets when the user cannot read cross project1602 project_type: :private, feature_visibility: :private, user_type: :external, snippet_type: :private, outcome: true1603 For private project and external users1604 should agree with the read_project_snippet policy1605 should return proper outcome1606 Without a given project and external users1607 should return proper outcome1608 returns no snippets when the user cannot read cross project1609 project_type: :private, feature_visibility: :private, user_type: :non_member, snippet_type: :public, outcome: false1610 For private project and non_member users1611 should agree with the read_project_snippet policy1612 should return proper outcome1613 Without a given project and non_member users1614 should return proper outcome1615 returns no snippets when the user cannot read cross project1616 project_type: :private, feature_visibility: :private, user_type: :non_member, snippet_type: :internal, outcome: false1617 For private project and non_member users1618 should agree with the read_project_snippet policy1619 should return proper outcome1620 Without a given project and non_member users1621 should return proper outcome1622 returns no snippets when the user cannot read cross project1623 project_type: :private, feature_visibility: :private, user_type: :non_member, snippet_type: :private, outcome: false1624 For private project and non_member users1625 should agree with the read_project_snippet policy1626 should return proper outcome1627 Without a given project and non_member users1628 should return proper outcome1629 returns no snippets when the user cannot read cross project1630 project_type: :private, feature_visibility: :private, user_type: :member, snippet_type: :public, outcome: true1631 For private project and member users1632 should agree with the read_project_snippet policy1633 should return proper outcome1634 Without a given project and member users1635 should return proper outcome1636 returns no snippets when the user cannot read cross project1637 project_type: :private, feature_visibility: :private, user_type: :member, snippet_type: :internal, outcome: true1638 For private project and member users1639 should agree with the read_project_snippet policy1640 should return proper outcome1641 Without a given project and member users1642 should return proper outcome1643 returns no snippets when the user cannot read cross project1644 project_type: :private, feature_visibility: :private, user_type: :member, snippet_type: :private, outcome: true1645 For private project and member users1646 should agree with the read_project_snippet policy1647 should return proper outcome1648 Without a given project and member users1649 should return proper outcome1650 returns no snippets when the user cannot read cross project1651 project_type: :private, feature_visibility: :private, user_type: :author, snippet_type: :public, outcome: true1652 For private project and author users1653 should agree with the read_project_snippet policy1654 should return proper outcome1655 Without a given project and author users1656 should return proper outcome1657 returns no snippets when the user cannot read cross project1658 project_type: :private, feature_visibility: :private, user_type: :author, snippet_type: :internal, outcome: true1659 For private project and author users1660 should agree with the read_project_snippet policy1661 should return proper outcome1662 Without a given project and author users1663 should return proper outcome1664 returns no snippets when the user cannot read cross project1665 project_type: :private, feature_visibility: :private, user_type: :author, snippet_type: :private, outcome: true1666 For private project and author users1667 should agree with the read_project_snippet policy1668 should return proper outcome1669 Without a given project and author users1670 should return proper outcome1671 returns no snippets when the user cannot read cross project1672 project_type: :private, feature_visibility: :disabled, user_type: :unauthenticated, snippet_type: :public, outcome: false1673 For private project and unauthenticated users1674 should agree with the read_project_snippet policy1675 should return proper outcome1676 Without a given project and unauthenticated users1677 should return proper outcome1678 returns no snippets when the user cannot read cross project1679 project_type: :private, feature_visibility: :disabled, user_type: :unauthenticated, snippet_type: :internal, outcome: false1680 For private project and unauthenticated users1681 should agree with the read_project_snippet policy1682 should return proper outcome1683 Without a given project and unauthenticated users1684 should return proper outcome1685 returns no snippets when the user cannot read cross project1686 project_type: :private, feature_visibility: :disabled, user_type: :unauthenticated, snippet_type: :private, outcome: false1687 For private project and unauthenticated users1688 should agree with the read_project_snippet policy1689 should return proper outcome1690 Without a given project and unauthenticated users1691 should return proper outcome1692 returns no snippets when the user cannot read cross project1693 project_type: :private, feature_visibility: :disabled, user_type: :external, snippet_type: :public, outcome: false1694 For private project and external users1695 should agree with the read_project_snippet policy1696 should return proper outcome1697 Without a given project and external users1698 should return proper outcome1699 returns no snippets when the user cannot read cross project1700 project_type: :private, feature_visibility: :disabled, user_type: :external, snippet_type: :internal, outcome: false1701 For private project and external users1702 should agree with the read_project_snippet policy1703 should return proper outcome1704 Without a given project and external users1705 should return proper outcome1706 returns no snippets when the user cannot read cross project1707 project_type: :private, feature_visibility: :disabled, user_type: :external, snippet_type: :private, outcome: false1708 For private project and external users1709 should agree with the read_project_snippet policy1710 should return proper outcome1711 Without a given project and external users1712 should return proper outcome1713 returns no snippets when the user cannot read cross project1714 project_type: :private, feature_visibility: :disabled, user_type: :non_member, snippet_type: :public, outcome: false1715 For private project and non_member users1716 should agree with the read_project_snippet policy1717 should return proper outcome1718 Without a given project and non_member users1719 should return proper outcome1720 returns no snippets when the user cannot read cross project1721 project_type: :private, feature_visibility: :disabled, user_type: :non_member, snippet_type: :internal, outcome: false1722 For private project and non_member users1723 should agree with the read_project_snippet policy1724 should return proper outcome1725 Without a given project and non_member users1726 should return proper outcome1727 returns no snippets when the user cannot read cross project1728 project_type: :private, feature_visibility: :disabled, user_type: :non_member, snippet_type: :private, outcome: false1729 For private project and non_member users1730 should agree with the read_project_snippet policy1731 should return proper outcome1732 Without a given project and non_member users1733 should return proper outcome1734 returns no snippets when the user cannot read cross project1735 project_type: :private, feature_visibility: :disabled, user_type: :member, snippet_type: :public, outcome: false1736 For private project and member users1737 should agree with the read_project_snippet policy1738 should return proper outcome1739 Without a given project and member users1740 should return proper outcome1741 returns no snippets when the user cannot read cross project1742 project_type: :private, feature_visibility: :disabled, user_type: :member, snippet_type: :internal, outcome: false1743 For private project and member users1744 should agree with the read_project_snippet policy1745 should return proper outcome1746 Without a given project and member users1747 should return proper outcome1748 returns no snippets when the user cannot read cross project1749 project_type: :private, feature_visibility: :disabled, user_type: :member, snippet_type: :private, outcome: false1750 For private project and member users1751 should agree with the read_project_snippet policy1752 should return proper outcome1753 Without a given project and member users1754 should return proper outcome1755 returns no snippets when the user cannot read cross project1756 project_type: :private, feature_visibility: :disabled, user_type: :author, snippet_type: :public, outcome: false1757 For private project and author users1758 should agree with the read_project_snippet policy1759 should return proper outcome1760 Without a given project and author users1761 should return proper outcome1762 returns no snippets when the user cannot read cross project1763 project_type: :private, feature_visibility: :disabled, user_type: :author, snippet_type: :internal, outcome: false1764 For private project and author users1765 should agree with the read_project_snippet policy1766 should return proper outcome1767 Without a given project and author users1768 should return proper outcome1769 returns no snippets when the user cannot read cross project1770 project_type: :private, feature_visibility: :disabled, user_type: :author, snippet_type: :private, outcome: false1771 For private project and author users1772 should agree with the read_project_snippet policy1773 should return proper outcome1774 Without a given project and author users1775 should return proper outcome1776 returns no snippets when the user cannot read cross project1777 For personal snippets1778 snippet_visibility: :public, user_type: :unauthenticated, outcome: true1779 For personal and public snippets with unauthenticated user1780 should agree with read_personal_snippet policy1781 should return proper outcome1782 should return personal snippets when the user cannot read cross project1783 snippet_visibility: :public, user_type: :external, outcome: true1784 For personal and public snippets with external user1785 should agree with read_personal_snippet policy1786 should return proper outcome1787 should return personal snippets when the user cannot read cross project1788 snippet_visibility: :public, user_type: :non_member, outcome: true1789 For personal and public snippets with non_member user1790 should agree with read_personal_snippet policy1791 should return proper outcome1792 should return personal snippets when the user cannot read cross project1793 snippet_visibility: :public, user_type: :author, outcome: true1794 For personal and public snippets with author user1795 should agree with read_personal_snippet policy1796 should return proper outcome1797 should return personal snippets when the user cannot read cross project1798 snippet_visibility: :internal, user_type: :unauthenticated, outcome: false1799 For personal and internal snippets with unauthenticated user1800 should agree with read_personal_snippet policy1801 should return proper outcome1802 should return personal snippets when the user cannot read cross project1803 snippet_visibility: :internal, user_type: :external, outcome: false1804 For personal and internal snippets with external user1805 should agree with read_personal_snippet policy1806 should return proper outcome1807 should return personal snippets when the user cannot read cross project1808 snippet_visibility: :internal, user_type: :non_member, outcome: true1809 For personal and internal snippets with non_member user1810 should agree with read_personal_snippet policy1811 should return proper outcome1812 should return personal snippets when the user cannot read cross project1813 snippet_visibility: :internal, user_type: :author, outcome: true1814 For personal and internal snippets with author user1815 should agree with read_personal_snippet policy1816 should return proper outcome1817 should return personal snippets when the user cannot read cross project1818 snippet_visibility: :private, user_type: :unauthenticated, outcome: false1819 For personal and private snippets with unauthenticated user1820 should agree with read_personal_snippet policy1821 should return proper outcome1822 should return personal snippets when the user cannot read cross project1823 snippet_visibility: :private, user_type: :external, outcome: false1824 For personal and private snippets with external user1825 should agree with read_personal_snippet policy1826 should return proper outcome1827 should return personal snippets when the user cannot read cross project1828 snippet_visibility: :private, user_type: :non_member, outcome: false1829 For personal and private snippets with non_member user1830 should agree with read_personal_snippet policy1831 should return proper outcome1832 should return personal snippets when the user cannot read cross project1833 snippet_visibility: :private, user_type: :author, outcome: true1834 For personal and private snippets with author user1835 should agree with read_personal_snippet policy1836 should return proper outcome1837 should return personal snippets when the user cannot read cross project1838File blob1839Starting the Capybara driver server...1840 Ruby file1841 displays the blob1842 displays file actions on all screen sizes1843 Markdown file1844 visiting directly1845 displays the blob using the rich viewer1846 switching to the simple viewer1847 displays the blob using the simple viewer1848 switching to the rich viewer again1849 displays the blob using the rich viewer1850 visiting with a line number anchor1851 displays the blob using the simple viewer1852 Markdown rendering1853 when rendering default markdown1854 renders using CommonMark1855 Markdown file (stored in LFS)1856 when LFS is enabled on the project1857 displays an error1858 switching to the simple viewer1859 displays an error1860 when LFS is disabled on the project1861 displays the blob1862 PDF file1863 displays the blob1864 ISO file (stored in LFS)1865 when LFS is enabled on the project1866 displays the blob1867 when LFS is disabled on the project1868 displays the blob1869 ZIP file1870 displays the blob1871 empty file1872 displays an error1873 binary file that appears to be text in the first 1024 bytes1874 displays the blob1875 .gitlab-ci.yml1876 displays an auxiliary viewer1877 .gitlab/route-map.yml1878 displays an auxiliary viewer1879 LICENSE1880 displays an auxiliary viewer1881 *.gemspec1882 displays an auxiliary viewer1883 realtime pipelines1884 should show the realtime pipeline status1885 for subgroups1886 renders tree table without errors1887 displays a GPG badge1888 on signed merge commit1889 displays a GPG badge1890Note1891 associations1892 should belong to project1893 should belong to noteable1894 should belong to author class_name => User1895 should have many todos1896 modules1897 should includes the Participable module1898 should includes the Mentionable module1899 should includes the Awardable module1900 validation1901 should validate that :note cannot be empty/falsy1902 should validate that :project cannot be empty/falsy1903 when note is on commit1904 should validate that :commit_id cannot be empty/falsy1905 should not validate that :noteable_id cannot be empty/falsy1906 when note is not on commit1907 should not validate that :commit_id cannot be empty/falsy1908 should validate that :noteable_id cannot be empty/falsy1909 when noteable and note project differ1910 should be invalid1911 when noteable and note project are the same1912 should be valid1913 when project is missing for a project related note1914 should be invalid1915 when noteable is a personal snippet1916 is valid without project1917 Commit notes1918 is accessible through #noteable1919 saves a valid note1920 is recognized by #for_commit?1921 keeps the commit around1922 does not generate N+1 queries for participants1923 authorization1924 read1925 should be falsey1926 should be truthy1927 should be falsey1928 write1929 should be falsey1930 should be truthy1931 should be falsey1932 admin1933 should be falsey1934 should be truthy1935 should be falsey1936 behaves like an editable mentionable1937 creates new cross-reference notes when the mentionable text is edited1938 behaves like a mentionable1939 generates a descriptive back-reference1940 extracts references from its reference property1941 creates cross-reference notes1942 #all_references1943 reads the rendered note body from the cache1944 editable?1945 returns true1946 returns false1947 confidential?1948 delegates to noteable1949 is falsey when noteable can't be confidential1950 cross_reference_not_visible_for?1951 when there is one reference in note1952 behaves like checks references1953 returns true1954 returns false1955 returns false if user visible reference count set1956 returns true if ref count is 01957 when there are two references in note1958 returns true if user visible reference count set and there is a private reference1959 behaves like checks references1960 returns true1961 returns false1962 returns false if user visible reference count set1963 returns true if ref count is 01964 #cross_reference?1965 falsey for user-generated notes1966 when the note might contain cross references1967 delegates to the cross-reference regex1968 delegates to the cross-reference regex1969 delegates to the cross-reference regex1970 delegates to the cross-reference regex1971 delegates to the cross-reference regex1972 when the note cannot contain cross references1973 scan for a `mentioned in` prefix1974 clear_blank_line_code!1975 clears a blank line code before validation1976 #participants1977 includes the note author1978 .find_discussion1979 returns a discussion with multiple notes1980 .grouped_diff_discussions1981 active diff discussions1982 includes active discussions1983 doesn't include outdated discussions1984 groups the discussions by line code1985 with image discussions1986 groups image discussions by file identifier1987 groups text discussions by line code1988 diff discussions for older diff refs1989 for diff refs a discussion was created at1990 includes discussions that were created then1991 groups the discussions by original line code1992 for diff refs a discussion was last active at1993 includes discussions that were last active1994 groups the discussions by line code1995 #for_personal_snippet?1996 returns false for a project snippet note1997 returns true for a personal snippet note1998 #to_ability_name1999 returns snippet for a project snippet note2000 returns personal_snippet for a personal snippet note2001 returns merge_request for an MR note2002 returns issue for an issue note2003 returns issue for a commit note2004 #cache_markdown_field2005 note for a project snippet2006 creates a note2007 note for a personal snippet2008 creates a note2009 #can_be_discussion_note?2010 for a note on a merge request2011 returns true2012 for a note on an issue2013 returns true2014 for a note on a commit2015 returns true2016 for a note on a snippet2017 returns true2018 for a diff note on merge request2019 returns false2020 for a diff note on commit2021 returns false2022 for a discussion note2023 returns false2024 #discussion_class2025 when the note is displayed out of context2026 returns OutOfContextDiscussion2027 when the note is displayed in the original context2028 returns IndividualNoteDiscussion2029 #discussion_id2030 when it is newly created2031 has a discussion id2032 when it didn't store a discussion id before2033 has a discussion id2034 when the note is displayed out of context2035 overrides the discussion id2036 #to_discussion2037 returns a discussion with just this note2038 #discussion2039 when the note is part of a discussion2040 returns the discussion this note is in2041 when the note is not part of a discussion2042 returns a discussion with just this note2043 #part_of_discussion?2044 for a regular note2045 returns false2046 for a diff note2047 returns true2048 for a discussion note2049 returns true2050 #in_reply_to?2051 for a note2052 when part of a discussion2053 checks if the note is in reply to the other discussion2054 when not part of a discussion2055 checks if the note is in reply to the other noteable2056 for a discussion2057 when part of the same discussion2058 returns true2059 when not part of the same discussion2060 returns false2061 for a noteable2062 when a comment on the same noteable2063 returns true2064 when not a comment on the same noteable2065 returns false2066 #references2067 when part of a discussion2068 references all earlier notes in the discussion2069 when not part of a discussion2070 returns the noteable2071 expiring ETag cache2072 expires cache for note's issue when note is saved2073 expires cache for note's issue when note is destroyed2074 when issuable etag caching is disabled2075 does not store cache key2076 #with_notes_filter2077 when notes filter is nil2078 should include #<Note id: 120, note: "My title 2169", noteable_type: "Issue", author_id: 3077, created_at: "2019-03-...auto\">My title 2...", cached_markdown_version: 917504, change_position: nil, resolved_by_push: nil> and #<Note id: 121, note: "My title 2171", noteable_type: "Issue", author_id: 3078, created_at: "2019-03-...auto\">My title 2...", cached_markdown_version: 917504, change_position: nil, resolved_by_push: nil>2079 when notes filter is set to all notes2080 should include #<Note id: 122, note: "My title 2173", noteable_type: "Issue", author_id: 3079, created_at: "2019-03-...auto\">My title 2...", cached_markdown_version: 917504, change_position: nil, resolved_by_push: nil> and #<Note id: 123, note: "My title 2175", noteable_type: "Issue", author_id: 3080, created_at: "2019-03-...auto\">My title 2...", cached_markdown_version: 917504, change_position: nil, resolved_by_push: nil>2081 when notes filter is set to only comments2082 should include #<Note id: 124, note: "My title 2177", noteable_type: "Issue", author_id: 3081, created_at: "2019-03-...auto\">My title 2...", cached_markdown_version: 917504, change_position: nil, resolved_by_push: nil>2083 should not include #<Note id: 127, note: "My title 2183", noteable_type: "Issue", author_id: 3084, created_at: "2019-03-...auto\">My title 2...", cached_markdown_version: 917504, change_position: nil, resolved_by_push: nil>2084 #parent2085 returns project for project notes2086 returns nil for personal snippet note2087Triggers2088 create trigger workflow2089 prevents adding new trigger with no description2090 adds new trigger with description2091 edit trigger workflow2092 click on edit trigger opens edit trigger page2093 edit trigger and save2094 edit "legacy" trigger and save2095 trigger "Take ownership" workflow2096 button "Take ownership" has correct alert2097 take trigger ownership2098 trigger "Revoke" workflow2099 button "Revoke" has correct alert2100 revoke trigger2101 show triggers workflow2102 contains trigger description placeholder2103 show "legacy" badge for legacy trigger2104 show "invalid" badge for trigger with owner having insufficient permissions2105 do not show "Edit" or full token for not owned trigger2106 show "Edit" and full token for owned trigger2107Reportable note on commit2108 a normal note2109 behaves like reportable note2110 has an edit button2111 has a `More actions` dropdown2112 dropdown has Report and Delete links2113 Report button links to a report page2114 a diff note2115 behaves like reportable note2116 has an edit button2117 has a `More actions` dropdown2118 dropdown has Report and Delete links2119 Report button links to a report page2120Merge request < User sees mini pipeline graph2121 displays a mini pipeline graph2122 as json2123 avoids repeated database queries (PENDING: Temporarily skipped with xit)2124 build list toggle2125 has unique styles for default, :hover, :active, and :focus states2126 shows tooltip when hovered2127 builds list menu2128 pens when toggle is clicked2129 closes when toggle is clicked again2130 closes when clicking somewhere else2131 build list build item2132 visits the build page when clicked2133 shows tooltip when hovered2134Merge Requests > User filters by milestones2135 filters by no milestone2136 filters by a specific milestone2137 filters by upcoming milestone2138 does not show merge requests with no expiry2139 with an upcoming milestone2140 shows merge requests2141 with a due milestone2142 does not show any merge requests2143Project Badges2144 shows a list of badges2145 adding a badge2146 user can preview a badge2148 editing a badge2149 form is shown when clicking edit button in list2150 updates a badge when submitting the edit form2151 deleting a badge2152 shows a modal when deleting a badge2153 deletes a badge when confirming the modal2154ProjectMember2155 associations2156 should belong to project2157 validations2158 should allow :source_type to be ‹"Project"›2159 should not allow :source_type to be ‹"project"›2160 should validate that :access_level is either ‹10›, ‹20›, ‹30›, or ‹40›2161 .access_level_roles2162 returns Gitlab::Access.options2163 .add_user2164 adds the user as a member2165 #real_source_type2166 should eq "Project"2167 #destroy2168 creates an expired event when left due to expiry2169 creates a left event when left due to leave2170 .import_team2171 should be truthy2172 project 2 should get user 1 as developer. user_2 should not be changed2173 should include #<User id:3203 @user3207>2174 should include #<User id:3208 @user3212>2175 should be truthy2176 should be truthy2177 project 1 should not be changed2178 should include #<User id:3219 @user3223>2179 should not include #<User id:3224 @user3228>2180 .add_users_to_projects2181 adds the given users to the given projects2182 .truncate_teams2183 should be empty2184 should be empty2185 behaves like members notifications2186 #after_create2187 sends email to user2188 #after_update2189 calls NotificationService.update_project_member2190 does not send an email when the access level has not changed2191 #accept_request2192 calls NotificationService.new_project_member2193 #accept_invite!2194 calls NotificationService.accept_project_invite2195 #decline_invite!2196 calls NotificationService.decline_project_invite2197 access levels2198 with parent group2199 behaves like inherited access level as a member of entity2200 with root parent_entity developer member2201 is allowed to be a maintainer of the entity2202 is not allowed to be a reporter of the entity2203 is allowed to change to be a developer of the entity2204 is not allowed to change to be a guest of the entity2205 shows an error if the member can't be updated2206 allows changing the level from a non existing member2207 with parent group and a subgroup2208 behaves like inherited access level as a member of entity2209 with root parent_entity developer member2210 is allowed to be a maintainer of the entity2211 is not allowed to be a reporter of the entity2212 is allowed to change to be a developer of the entity2213 is not allowed to change to be a guest of the entity2214 shows an error if the member can't be updated2215 allows changing the level from a non existing member2216User browse group projects page2217 when user is owner2218 when user signed in2219 when group has archived project2220 renders projects list2221RunnersHelper2222 returns - not contacted yet2223 returns offline text2224 returns online text2225 #runner_contacted_at2226 without sorting2227 returns cached value2228 with sorting set to created_date2229 returns cached value2230 with sorting set to contacted_asc2231 returns stored value2232EntityRequest2233 methods created2234 defines accessible attributes2235 raises error when attribute is not defined2236Knapsack report was generated. Preview:2237{2238 "spec/finders/snippets_finder_spec.rb": 340.4153587818146,2239 "spec/features/projects/blobs/blob_show_spec.rb": 105.46073055267334,2240 "spec/models/note_spec.rb": 59.013768911361694,2241 "spec/features/triggers_spec.rb": 59.32976460456848,2242 "spec/features/reportable_note/commit_spec.rb": 29.620219230651855,2243 "spec/features/merge_request/user_sees_mini_pipeline_graph_spec.rb": 31.347888946533203,2244 "spec/features/merge_requests/user_filters_by_milestones_spec.rb": 23.125015258789062,2245 "spec/features/projects/settings/project_badges_spec.rb": 22.878352880477905,2246 "spec/models/members/project_member_spec.rb": 17.611238956451416,2247 "spec/features/groups/user_browse_projects_group_page_spec.rb": 2.1750264167785645,2248 "spec/helpers/runners_helper_spec.rb": 0.16642069816589355,2249 "spec/serializers/entity_request_spec.rb": 0.0081796646118164062250}2251Knapsack global time execution for tests: 11m 31s2252Pending: (Failures listed here are expected and do not affect your suite's status)2253 1) Merge request < User sees mini pipeline graph as json avoids repeated database queries2254 # Temporarily skipped with xit2255 # ./spec/features/merge_request/user_sees_mini_pipeline_graph_spec.rb:352256Finished in 12 minutes 43 seconds (files took 13.28 seconds to load)2257823 examples, 0 failures, 1 pending2259$ date2260Thu Mar 14 02:29:56 UTC 20192263coverage/: found 5 matching files 2264knapsack/: found 4 matching files 2265rspec_flaky/: found 4 matching files 2266rspec_profiling/: found 2 matching files 2267WARNING: tmp/capybara/: no matching files 2268Uploading artifacts to coordinator... ok id=177320545 responseStatus=201 Created token=JfztdzH52269Uploading artifacts...2270junit_rspec.xml: found 1 matching files 2271Uploading artifacts to coordinator... ok id=177320545 responseStatus=201 Created token=JfztdzH52272Job succeeded