Foss specs failing with feature_available? wrong number of arguments (given 1, expected 2)
Job #610069103 failed for gitlab-foss@c59765a5:
Failure/Error:
def feature_available?(feature, user)
# This feature might not be behind a feature flag at all, so default to true
return false unless ::Feature.enabled?(feature, user, default_enabled: true)
get_permission(user, feature)
end
ActionView::Template::Error:
wrong number of arguments (given 1, expected 2)
Recreated locally with: FOSS_ONLY=1 bundle exec rspec ./spec/features/projects/active_tabs_spec.rb
Failures
These are all the failures from https://gitlab.com/gitlab-org/gitlab-foss/-/pipelines/159753857/failures
-
https://gitlab.com/gitlab-org/gitlab-foss/-/jobs/610069103
rspec ./spec/features/projects/settings/user_changes_default_branch_spec.rb:19 # Projects > Settings > User changes default branch with normal project allows to change the default branch
rspec ./spec/features/projects/settings/user_changes_default_branch_spec.rb:36 # Projects > Settings > User changes default branch with empty project does not show default branch selector
rspec ./spec/features/projects/remote_mirror_spec.rb:17 # Project remote mirror On a project when last_error is present but last_update_at is not renders error message without timstamp
rspec ./spec/features/projects/remote_mirror_spec.rb:27 # Project remote mirror On a project when last_error and last_update_at are present renders error message with timestamp
-
https://gitlab.com/gitlab-org/gitlab-foss/-/jobs/610069107
rspec ./spec/features/projects/settings/user_sees_revoke_deploy_token_modal_spec.rb:19 # Repository Settings > User sees revoke deploy token modal shows the revoke deploy token modal
rspec ./spec/features/projects/settings/user_sees_revoke_deploy_token_modal_spec.rb:23 # Repository Settings > User sees revoke deploy token modal closes the revoke deploy token modal with escape keypress
-
https://gitlab.com/gitlab-org/gitlab-foss/-/jobs/610069113
rspec ./spec/features/projects/settings/user_interacts_with_deploy_keys_spec.rb:40 # User interacts with deploy keys viewing deploy keys when project has keys shows deploy keys
rspec ./spec/features/projects/settings/user_interacts_with_deploy_keys_spec.rb:58 # User interacts with deploy keys viewing deploy keys when another project has keys shows deploy keys
rspec ./spec/features/projects/settings/user_interacts_with_deploy_keys_spec.rb:73 # User interacts with deploy keys viewing deploy keys when there are public deploy keys shows public deploy keys
rspec ./spec/features/projects/settings/user_interacts_with_deploy_keys_spec.rb:90 # User interacts with deploy keys adding deploy keys adds new key
rspec './spec/features/projects/settings/user_interacts_with_deploy_keys_spec.rb[1:3:1:1:1]' # User interacts with deploy keys attaching existing keys from another project behaves like attaches a key attaches key
rspec './spec/features/projects/settings/user_interacts_with_deploy_keys_spec.rb[1:3:2:1:1]' # User interacts with deploy keys attaching existing keys when keys are public behaves like attaches a key attaches key
-
https://gitlab.com/gitlab-org/gitlab-foss/-/jobs/610069100
rspec ./spec/features/security/project/private_access_spec.rb:119 # Private Project Access GET /:project_path/-/settings/repository is expected to be allowed for admin
rspec ./spec/features/security/project/private_access_spec.rb:120 # Private Project Access GET /:project_path/-/settings/repository is expected to be allowed for owner
rspec ./spec/features/security/project/private_access_spec.rb:121 # Private Project Access GET /:project_path/-/settings/repository is expected to be allowed for maintainer
rspec ./spec/features/security/project/private_access_spec.rb:163 # Private Project Access GET /:project_path/deploy_keys is expected to be allowed for admin
rspec ./spec/features/security/project/private_access_spec.rb:164 # Private Project Access GET /:project_path/deploy_keys is expected to be allowed for owner
rspec ./spec/features/security/project/private_access_spec.rb:165 # Private Project Access GET /:project_path/deploy_keys is expected to be allowed for maintainer
-
https://gitlab.com/gitlab-org/gitlab-foss/-/jobs/610069093
rspec ./spec/features/protected_tags_spec.rb:16 # Protected Tags explicit protected tags allows creating explicit protected tags
rspec ./spec/features/protected_tags_spec.rb:27 # Protected Tags explicit protected tags displays the last commit on the matching tag if it exists
rspec ./spec/features/protected_tags_spec.rb:39 # Protected Tags explicit protected tags displays an error message if the named tag does not exist
rspec ./spec/features/protected_tags_spec.rb:50 # Protected Tags wildcard protected tags allows creating protected tags with a wildcard
rspec ./spec/features/protected_tags_spec.rb:61 # Protected Tags wildcard protected tags displays the number of matching tags
rspec ./spec/features/protected_tags_spec.rb:76 # Protected Tags wildcard protected tags displays all the tags matching the wildcard
rspec './spec/features/protected_tags_spec.rb[1:3:1]' # Protected Tags access control allows creating protected tags that Maintainers can create
rspec './spec/features/protected_tags_spec.rb[1:3:2]' # Protected Tags access control allows updating protected tags so that Maintainers can create them
rspec './spec/features/protected_tags_spec.rb[1:3:3]' # Protected Tags access control allows creating protected tags that Developers + Maintainers can create
rspec './spec/features/protected_tags_spec.rb[1:3:4]' # Protected Tags access control allows updating protected tags so that Developers + Maintainers can create them
rspec './spec/features/protected_tags_spec.rb[1:3:5]' # Protected Tags access control allows creating protected tags that No one can create
rspec './spec/features/protected_tags_spec.rb[1:3:6]' # Protected Tags access control allows updating protected tags so that No one can create them
-
https://gitlab.com/gitlab-org/gitlab-foss/-/jobs/610069098
rspec ./spec/features/security/project/internal_access_spec.rb:119 # Internal Project Access GET /:project_path/-/settings/repository is expected to be allowed for admin
rspec ./spec/features/security/project/internal_access_spec.rb:120 # Internal Project Access GET /:project_path/-/settings/repository is expected to be allowed for owner
rspec ./spec/features/security/project/internal_access_spec.rb:121 # Internal Project Access GET /:project_path/-/settings/repository is expected to be allowed for maintainer
rspec ./spec/features/security/project/internal_access_spec.rb:163 # Internal Project Access GET /:project_path/deploy_keys is expected to be allowed for admin
rspec ./spec/features/security/project/internal_access_spec.rb:164 # Internal Project Access GET /:project_path/deploy_keys is expected to be allowed for owner
rspec ./spec/features/security/project/internal_access_spec.rb:165 # Internal Project Access GET /:project_path/deploy_keys is expected to be allowed for maintainer
rspec ./spec/features/projects/settings/repository_settings_spec.rb:265 # Projects > Settings > Repository settings for maintainer shows a disabled mirror
rspec './spec/features/projects/settings/repository_settings_spec.rb[1:2:1:1:1]' # Projects > Settings > Repository settings for maintainer Deploy tokens behaves like a deploy token in settings view deploy tokens
rspec './spec/features/projects/settings/repository_settings_spec.rb[1:2:1:1:2]' # Projects > Settings > Repository settings for maintainer Deploy tokens behaves like a deploy token in settings add a new deploy token
rspec ./spec/features/projects/settings/repository_settings_spec.rb:47 # Projects > Settings > Repository settings for maintainer Deploy Keys get list of keys
rspec ./spec/features/projects/settings/repository_settings_spec.rb:57 # Projects > Settings > Repository settings for maintainer Deploy Keys add a new deploy key
rspec ./spec/features/projects/settings/repository_settings_spec.rb:69 # Projects > Settings > Repository settings for maintainer Deploy Keys edit an existing deploy key
rspec ./spec/features/projects/settings/repository_settings_spec.rb:83 # Projects > Settings > Repository settings for maintainer Deploy Keys edit an existing public deploy key to be writable
rspec ./spec/features/projects/settings/repository_settings_spec.rb:96 # Projects > Settings > Repository settings for maintainer Deploy Keys edit a deploy key from projects user has access to
rspec ./spec/features/projects/settings/repository_settings_spec.rb:115 # Projects > Settings > Repository settings for maintainer Deploy Keys remove an existing deploy key
rspec ./spec/features/projects/settings/repository_settings_spec.rb:130 # Projects > Settings > Repository settings for maintainer remote mirror settings shows push mirror settings
rspec ./spec/features/projects/settings/repository_settings_spec.rb:134 # Projects > Settings > Repository settings for maintainer remote mirror settings creates a push mirror that mirrors all branches
rspec ./spec/features/projects/settings/repository_settings_spec.rb:152 # Projects > Settings > Repository settings for maintainer remote mirror settings creates a push mirror that only mirrors protected branches
rspec ./spec/features/projects/settings/repository_settings_spec.rb:172 # Projects > Settings > Repository settings for maintainer remote mirror settings creates a push mirror that keeps divergent refs
rspec ./spec/features/projects/settings/repository_settings_spec.rb:187 # Projects > Settings > Repository settings for maintainer remote mirror settings generates an SSH public key on submission
rspec ./spec/features/projects/settings/repository_settings_spec.rb:207 # Projects > Settings > Repository settings for maintainer remote mirror settings when project mirroring is disabled hides remote mirror settings
rspec ./spec/features/projects/settings/repository_settings_spec.rb:228 # Projects > Settings > Repository settings for maintainer repository cleanup settings uploads an object map file
rspec ./spec/features/projects/settings/repository_settings_spec.rb:255 # Projects > Settings > Repository settings for maintainer with an existing mirror delete remote mirrors
rspec './spec/features/projects/settings/repository_settings_spec.rb[1:3:1:1]' # Projects > Settings > Repository settings for admin when project mirroring is enabled shows mirror settings
rspec './spec/features/projects/settings/repository_settings_spec.rb[1:3:2:1]' # Projects > Settings > Repository settings for admin when project mirroring is disabled shows mirror settings
-
https://gitlab.com/gitlab-org/gitlab-foss/-/jobs/610069092
rspec ./spec/features/protected_branches_spec.rb:75 # Protected Branches logged in as admin explicit protected branches allows creating explicit protected branches
rspec ./spec/features/protected_branches_spec.rb:86 # Protected Branches logged in as admin explicit protected branches displays the last commit on the matching branch if it exists
rspec ./spec/features/protected_branches_spec.rb:101 # Protected Branches logged in as admin explicit protected branches displays an error message if the named branch does not exist
rspec ./spec/features/protected_branches_spec.rb:112 # Protected Branches logged in as admin wildcard protected branches allows creating protected branches with a wildcard
rspec ./spec/features/protected_branches_spec.rb:123 # Protected Branches logged in as admin wildcard protected branches displays the number of matching branches
rspec ./spec/features/protected_branches_spec.rb:137 # Protected Branches logged in as admin wildcard protected branches displays all the branches matching the wildcard
rspec './spec/features/protected_branches_spec.rb[1:3:3:1]' # Protected Branches logged in as admin access control allows creating protected branches that Maintainers can push to
rspec './spec/features/protected_branches_spec.rb[1:3:3:2]' # Protected Branches logged in as admin access control allows updating protected branches so that Maintainers can push to them
rspec './spec/features/protected_branches_spec.rb[1:3:3:3]' # Protected Branches logged in as admin access control allows creating protected branches that Developers + Maintainers can push to
rspec './spec/features/protected_branches_spec.rb[1:3:3:4]' # Protected Branches logged in as admin access control allows updating protected branches so that Developers + Maintainers can push to them
rspec './spec/features/protected_branches_spec.rb[1:3:3:5]' # Protected Branches logged in as admin access control allows creating protected branches that No one can push to
rspec './spec/features/protected_branches_spec.rb[1:3:3:6]' # Protected Branches logged in as admin access control allows updating protected branches so that No one can push to them
rspec './spec/features/protected_branches_spec.rb[1:3:3:7]' # Protected Branches logged in as admin access control allows creating protected branches that Maintainers can merge to
rspec './spec/features/protected_branches_spec.rb[1:3:3:8]' # Protected Branches logged in as admin access control allows updating protected branches so that Maintainers can merge to them
rspec './spec/features/protected_branches_spec.rb[1:3:3:9]' # Protected Branches logged in as admin access control allows creating protected branches that Developers + Maintainers can merge to
rspec './spec/features/protected_branches_spec.rb[1:3:3:10]' # Protected Branches logged in as admin access control allows updating protected branches so that Developers + Maintainers can merge to them
rspec './spec/features/protected_branches_spec.rb[1:3:3:11]' # Protected Branches logged in as admin access control allows creating protected branches that No one can merge to
rspec './spec/features/protected_branches_spec.rb[1:3:3:12]' # Protected Branches logged in as admin access control allows updating protected branches so that No one can merge to them
-
https://gitlab.com/gitlab-org/gitlab-foss/-/jobs/610069108
rspec ./spec/features/projects/active_tabs_spec.rb:120 # Project active tab on project Settings on project Settings/Repository behaves like page has active tab activates Settings tab
rspec ./spec/features/projects/active_tabs_spec.rb:121 # Project active tab on project Settings on project Settings/Repository behaves like page has active sub tab activates Repository sub tab
-
https://gitlab.com/gitlab-org/gitlab-foss/-/jobs/610069105
rspec ./spec/features/projects/deploy_keys_spec.rb:19 # Project deploy keys removing key removes association between project and deploy key
rspec ./spec/features/projects/branches/user_views_branches_spec.rb:32 # User views branches protected branches shows branches
-
https://gitlab.com/gitlab-org/gitlab-foss/-/jobs/610069089
rspec ./spec/features/security/project/public_access_spec.rb:119 # Public Project Access GET /:project_path/-/settings/repository is expected to be allowed for admin
rspec ./spec/features/security/project/public_access_spec.rb:120 # Public Project Access GET /:project_path/-/settings/repository is expected to be allowed for owner
rspec ./spec/features/security/project/public_access_spec.rb:121 # Public Project Access GET /:project_path/-/settings/repository is expected to be allowed for maintainer
rspec ./spec/features/security/project/public_access_spec.rb:380 # Public Project Access GET /:project_path/deploy_keys is expected to be allowed for admin
rspec ./spec/features/security/project/public_access_spec.rb:381 # Public Project Access GET /:project_path/deploy_keys is expected to be allowed for owner
rspec ./spec/features/security/project/public_access_spec.rb:382 # Public Project Access GET /:project_path/deploy_keys is expected to be allowed for maintainer
Edited by Kyle Wiebers