rspec-ee integration pg12 6/6
Passed Started
by
@stanhu

Stan Hu
1Running with gitlab-runner 15.6.0~beta.186.ga889181a (a889181a)2 on green-4.shared-gitlab-org.runners-manager.gitlab.com/default x5QiHUKw3 feature flags: FF_USE_FASTZIP:true6Using Docker executor with image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-2.7.patched-golang-1.18-node-16.14-postgresql-12:rubygems-3.2-git-2.36-lfs-2.9-chrome-103-yarn-1.22-graphicsmagick-1.3.36 ...7Starting service postgres:12 ...8Pulling docker image postgres:12 ...9Using docker image sha256:c5abf812eff57d99cd4ae9b4d688261207b59905c5d0ca50c5e57f75669dbf10 for postgres:12 with digest postgres@sha256:a66060c3beab11e6f8eac5581c28df727539653a3c11e860847b14149e678d3e ...10Starting service redis:6.0-alpine ...11Pulling docker image redis:6.0-alpine ...12Using docker image sha256:83c577984741ab5b2e78640e0524852998d539ea3961e6d56680f336371f5c83 for redis:6.0-alpine with digest redis@sha256:459e91c5fe54134da1601ef85a4d9bc40c953862737fdfbe8f3c2b2a3eb6b20b ...13Starting service elasticsearch:7.17.6 ...14Pulling docker image elasticsearch:7.17.6 ...15Using docker image sha256:5fad10241ffd65d817ed0ddfaf6e87eee1f7dc2a7db33db1047835560ea71fda for elasticsearch:7.17.6 with digest elasticsearch@sha256:6c128de5d01c0c130a806022d6bd99b3e4c27a9af5bfc33b6b81861ae117d028 ...16Waiting for services to be up and running (timeout 30 seconds)...17Authenticating with credentials from job payload (GitLab Registry)18Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-2.7.patched-golang-1.18-node-16.14-postgresql-12:rubygems-3.2-git-2.36-lfs-2.9-chrome-103-yarn-1.22-graphicsmagick-1.3.36 ...19Using docker image sha256:5c5404ecc69273636c3ef49645be715ef30ea99e51ad146a2efbeac2a1875f9c for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-2.7.patched-golang-1.18-node-16.14-postgresql-12:rubygems-3.2-git-2.36-lfs-2.9-chrome-103-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-2.7.patched-golang-1.18-node-16.14-postgresql-12@sha256:b032fe79dc0bf3ebfaeb610c82eacc500fbd0ec6e01889444011cf5a72b4135d ...21Running on runner-x5qihukw-project-278964-concurrent-0 via runner-x5qihukw-shared-gitlab-org-1668127483-eb1c58f2...23$ eval "$CI_PRE_CLONE_SCRIPT"24Fetching changes with git depth set to 20...25Initialized empty Git repository in /builds/gitlab-org/gitlab/.git/26Created fresh repository.27remote: Enumerating objects: 134695, done. 28remote: Counting objects: 100% (134695/134695), done. 29remote: Compressing objects: 100% (87197/87197), done. 30remote: Total 134695 (delta 60835), reused 93449 (delta 42513), pack-reused 0 31Receiving objects: 100% (134695/134695), 116.52 MiB | 33.48 MiB/s, done.32Resolving deltas: 100% (60835/60835), done.34 * [new ref] refs/pipelines/691761438 -> refs/pipelines/69176143835 * [new branch] master -> origin/master36Checking out 0a62f4a6 as master...37Skipping Git submodules setup38$ git remote set-url origin "${CI_REPOSITORY_URL}"40Checking cache for ruby-gems-debian-bullseye-ruby-2.7-16...41Downloading cache.zip from https://storage.googleapis.com/gitlab-com-runners-cache/project/278964/ruby-gems-debian-bullseye-ruby-2.7-16 42Successfully extracted cache43Checking cache for gitaly-ruby-gems-debian-bullseye-ruby-2.7-16...44Downloading cache.zip from https://storage.googleapis.com/gitlab-com-runners-cache/project/278964/gitaly-ruby-gems-debian-bullseye-ruby-2.7-16 45Successfully extracted cache47Downloading artifacts for compile-test-assets (3307837569)...48Downloading artifacts from coordinator... ok id=3307837569 responseStatus=200 OK token=_RkzBzjQ49Downloading artifacts for detect-tests (3307837577)...50Downloading artifacts from coordinator... ok id=3307837577 responseStatus=200 OK token=_RkzBzjQ51Downloading artifacts for retrieve-tests-metadata (3307837579)...52Downloading artifacts from coordinator... ok id=3307837579 responseStatus=200 OK token=_RkzBzjQ53Downloading artifacts for setup-test-env (3307837573)...54Downloading artifacts from coordinator... ok id=3307837573 responseStatus=200 OK token=_RkzBzjQ56Using docker image sha256:5c5404ecc69273636c3ef49645be715ef30ea99e51ad146a2efbeac2a1875f9c for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-2.7.patched-golang-1.18-node-16.14-postgresql-12:rubygems-3.2-git-2.36-lfs-2.9-chrome-103-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-2.7.patched-golang-1.18-node-16.14-postgresql-12@sha256:b032fe79dc0bf3ebfaeb610c82eacc500fbd0ec6e01889444011cf5a72b4135d ...57$ echo $FOSS_ONLY58$ [ "$FOSS_ONLY" = "1" ] && rm -rf ee/ qa/spec/ee/ qa/qa/specs/features/ee/ qa/qa/ee/ qa/qa/ee.rb59$ export GOPATH=$CI_PROJECT_DIR/.go60$ mkdir -p $GOPATH61$ source scripts/utils.sh62$ source scripts/prepare_build.sh691Using decomposed database config (config/database.yml.decomposed-postgresql)692$ setup_db_user_only693CREATE ROLE694GRANT695==> 'setup_db_user_only' succeeded in 0 seconds.696$ bundle exec rake db:drop db:create db:schema:load db:migrate697Dropped database 'gitlabhq_test'698Dropped database 'gitlabhq_test_ci'699Dropped database 'gitlabhq_geo_test'700Created database 'gitlabhq_test'701Created database 'gitlabhq_test_ci'702Created database 'gitlabhq_geo_test'703==> 'bundle exec rake db:drop db:create db:schema:load db:migrate' succeeded in 38 seconds.704$ setup_db_praefect705SELECT pg_catalog.set_config('search_path', '', false);706CREATE DATABASE praefect_test ENCODING 'UTF8';707==> 'setup_db_praefect' succeeded in 0 seconds.708$ source ./scripts/rspec_helpers.sh709$ run_timed_command "gem install knapsack --no-document"710$ gem install knapsack --no-document711Successfully installed knapsack-4.0.07121 gem installed713==> 'gem install knapsack --no-document' succeeded in 1 seconds.714$ echo -e "\e[0Ksection_start:`date +%s`:gitaly-test-spawn[collapsed=true]\r\e[0KStarting Gitaly"828$ rspec_paralellized_job "--tag ~quarantine --tag ~level:migration"829SKIP_FLAKY_TESTS_AUTOMATICALLY: true830RETRY_FAILED_TESTS_IN_NEW_PROCESS: true831KNAPSACK_GENERATE_REPORT: true832FLAKY_RSPEC_GENERATE_REPORT: true833KNAPSACK_TEST_FILE_PATTERN: {ee/}spec/{commands,controllers,mailers,requests}{,/**/}*_spec.rb834KNAPSACK_LOG_LEVEL: debug835KNAPSACK_REPORT_PATH: knapsack/rspec-ee_integration_pg12_6_6_report.json836FLAKY_RSPEC_SUITE_REPORT_PATH: rspec/flaky/report-suite.json837FLAKY_RSPEC_REPORT_PATH: rspec/flaky/all_rspec-ee_integration_pg12_6_6_report.json838NEW_FLAKY_RSPEC_REPORT_PATH: rspec/flaky/new_rspec-ee_integration_pg12_6_6_report.json839SKIPPED_FLAKY_TESTS_REPORT_PATH: rspec/flaky/skipped_flaky_tests_rspec-ee_integration_pg12_6_6_report.txt840RETRIED_TESTS_REPORT_PATH: rspec/flaky/retried_tests_rspec-ee_integration_pg12_6_6_report.txt841CRYSTALBALL: 842Knapsack node specs:843ee/spec/requests/api/graphql/geo/registries_spec.rb844ee/spec/requests/api/scim_spec.rb845ee/spec/controllers/projects_controller_spec.rb846ee/spec/controllers/groups/epics_controller_spec.rb847ee/spec/requests/api/epic_issues_spec.rb848ee/spec/requests/api/project_approval_settings_spec.rb849ee/spec/controllers/groups/clusters_controller_spec.rb850ee/spec/requests/api/group_push_rule_spec.rb851ee/spec/controllers/projects/merge_requests/creations_controller_spec.rb852ee/spec/controllers/groups/group_members_controller_spec.rb853ee/spec/requests/api/status_checks_spec.rb854ee/spec/controllers/groups/analytics/tasks_by_type_controller_spec.rb855ee/spec/requests/api/ml/ai_assist_spec.rb856ee/spec/controllers/projects/licenses_controller_spec.rb857ee/spec/requests/groups/security/credentials_controller_spec.rb858ee/spec/controllers/groups/epics/notes_controller_spec.rb859ee/spec/requests/api/graphql/project/vulnerability_severities_count_spec.rb860ee/spec/requests/api/users_spec.rb861ee/spec/requests/api/graphql/epics/epic_resolver_spec.rb862ee/spec/controllers/ee/projects/jobs_controller_spec.rb863ee/spec/requests/api/project_clusters_spec.rb864ee/spec/controllers/projects/feature_flag_issues_controller_spec.rb865ee/spec/controllers/projects/legacy_pipelines_controller_spec.rb866ee/spec/requests/api/geo_spec.rb867ee/spec/controllers/projects/approvers_controller_spec.rb868ee/spec/controllers/registrations/welcome_controller_spec.rb869ee/spec/requests/api/graphql/mutations/iterations/create_spec.rb870ee/spec/requests/api/graphql/group/epic/epic_children_spec.rb871ee/spec/controllers/oauth/geo_auth_controller_spec.rb872ee/spec/controllers/groups/analytics/cycle_analytics_controller_spec.rb873ee/spec/requests/api/graphql/boards/epic_board_list_epics_query_spec.rb874ee/spec/controllers/projects/security/api_fuzzing_configuration_controller_spec.rb875ee/spec/requests/api/graphql/project/code_coverage_summary_spec.rb876ee/spec/requests/api/graphql/mutations/issues/update_spec.rb877ee/spec/requests/api/graphql/instance_security_dashboard_spec.rb878ee/spec/requests/api/graphql/mutations/security_policy/unassign_security_policy_project_spec.rb879ee/spec/requests/api/graphql/mutations/security/finding/create_issue_spec.rb880ee/spec/requests/api/graphql/mutations/projects/set_compliance_framework_spec.rb881ee/spec/controllers/ee/dashboard/projects_controller_spec.rb882ee/spec/requests/api/internal/app_sec/dast/site_validations_spec.rb883ee/spec/requests/api/graphql/mutations/vulnerabilities/create_external_issue_link_spec.rb884ee/spec/requests/api/graphql/group/dast_profile_schedule_spec.rb885ee/spec/controllers/groups/analytics/cycle_analytics/value_streams_controller_spec.rb886ee/spec/controllers/admin/audit_logs_controller_spec.rb887ee/spec/requests/api/graphql/project/dast_site_profiles_spec.rb888ee/spec/requests/jwt_controller_spec.rb889ee/spec/requests/api/graphql/ci/runner_spec.rb890ee/spec/controllers/admin/geo/settings_controller_spec.rb891ee/spec/requests/api/ldap_spec.rb892ee/spec/requests/api/graphql/project/incident_management/escalation_policies_spec.rb893ee/spec/requests/api/graphql/mutations/compliance_management/frameworks/destroy_spec.rb894ee/spec/requests/api/graphql/mutations/issues/set_weight_spec.rb895ee/spec/controllers/projects/security/vulnerability_report_controller_spec.rb896ee/spec/controllers/groups/usage_quotas_controller_spec.rb897ee/spec/requests/api/graphql/mutations/ci/namespace_ci_cd_settings_update_spec.rb898ee/spec/requests/api/graphql/project/dast_profile_spec.rb899ee/spec/requests/api/graphql/mutations/iterations/delete_spec.rb900ee/spec/requests/api/templates_spec.rb901ee/spec/controllers/concerns/registrations/verification_spec.rb902ee/spec/requests/api/graphql/mutations/boards/issues/issue_move_list_spec.rb903ee/spec/requests/api/graphql/current_user/groups_query_spec.rb904ee/spec/requests/registrations/project_creation_spec.rb905ee/spec/requests/api/graphql/mutations/iterations/cadences/create_spec.rb906ee/spec/requests/api/graphql/mutations/dast_site_profiles/delete_spec.rb907ee/spec/requests/api/graphql/iterations/cadences_spec.rb908ee/spec/controllers/projects/incident_management/escalation_policies_controller_spec.rb909ee/spec/controllers/projects/security/scanned_resources_controller_spec.rb910ee/spec/controllers/projects/settings/repository_controller_spec.rb911ee/spec/requests/groups/feature_discovery_moments_spec.rb912ee/spec/requests/api/markdown_golden_master_spec.rb913ee/spec/controllers/projects/issue_links_controller_spec.rb914ee/spec/requests/api/graphql/merge_request_reviewer_spec.rb915ee/spec/requests/api/ci/runner/jobs_trace_spec.rb916ee/spec/requests/api/graphql/vulnerabilities/details_spec.rb917ee/spec/requests/api/graphql/group/epic/epic_ancestors_spec.rb918ee/spec/requests/api/ci/runner/jobs_put_spec.rb919ee/spec/requests/api/graphql/mutations/incident_management/issuable_resource_link/create_spec.rb920ee/spec/requests/customers_dot/proxy_controller_spec.rb921ee/spec/requests/api/graphql/project/merge_request_spec.rb922ee/spec/requests/api/graphql/project/push_rules_spec.rb923ee/spec/requests/api/graphql/geo/geo_node_spec.rb924ee/spec/requests/api/graphql/mutations/requirements_management/export_requirements_spec.rb925ee/spec/requests/api/ci/pipelines_spec.rb926ee/spec/requests/api/graphql/mutations/gitlab_subscriptions/activate_spec.rb927ee/spec/requests/callout_spec.rb928ee/spec/controllers/oauth/applications_controller_spec.rb929ee/spec/requests/api/issue_links_spec.rb930ee/spec/controllers/ee/groups/settings/ci_cd_controller_spec.rb931ee/spec/controllers/admin/groups_controller_spec.rb932ee/spec/requests/trial_registrations_controller_spec.rb933ee/spec/requests/api/api_spec.rb934ee/spec/requests/api/graphql/mutations/app_sec/fuzzing/api/ci_configuration/create_spec.rb935ee/spec/mailers/emails/user_cap_spec.rb936ee/spec/controllers/profiles/keys_controller_spec.rb937Filter specs:938Running specs:939Running all node tests without filter940ee/spec/requests/api/graphql/geo/registries_spec.rb941ee/spec/requests/api/scim_spec.rb942ee/spec/controllers/projects_controller_spec.rb943ee/spec/controllers/groups/epics_controller_spec.rb944ee/spec/requests/api/epic_issues_spec.rb945ee/spec/requests/api/project_approval_settings_spec.rb946ee/spec/controllers/groups/clusters_controller_spec.rb947ee/spec/requests/api/group_push_rule_spec.rb948ee/spec/controllers/projects/merge_requests/creations_controller_spec.rb949ee/spec/controllers/groups/group_members_controller_spec.rb950ee/spec/requests/api/status_checks_spec.rb951ee/spec/controllers/groups/analytics/tasks_by_type_controller_spec.rb952ee/spec/requests/api/ml/ai_assist_spec.rb953ee/spec/controllers/projects/licenses_controller_spec.rb954ee/spec/requests/groups/security/credentials_controller_spec.rb955ee/spec/controllers/groups/epics/notes_controller_spec.rb956ee/spec/requests/api/graphql/project/vulnerability_severities_count_spec.rb957ee/spec/requests/api/users_spec.rb958ee/spec/requests/api/graphql/epics/epic_resolver_spec.rb959ee/spec/controllers/ee/projects/jobs_controller_spec.rb960ee/spec/requests/api/project_clusters_spec.rb961ee/spec/controllers/projects/feature_flag_issues_controller_spec.rb962ee/spec/controllers/projects/legacy_pipelines_controller_spec.rb963ee/spec/requests/api/geo_spec.rb964ee/spec/controllers/projects/approvers_controller_spec.rb965ee/spec/controllers/registrations/welcome_controller_spec.rb966ee/spec/requests/api/graphql/mutations/iterations/create_spec.rb967ee/spec/requests/api/graphql/group/epic/epic_children_spec.rb968ee/spec/controllers/oauth/geo_auth_controller_spec.rb969ee/spec/controllers/groups/analytics/cycle_analytics_controller_spec.rb970ee/spec/requests/api/graphql/boards/epic_board_list_epics_query_spec.rb971ee/spec/controllers/projects/security/api_fuzzing_configuration_controller_spec.rb972ee/spec/requests/api/graphql/project/code_coverage_summary_spec.rb973ee/spec/requests/api/graphql/mutations/issues/update_spec.rb974ee/spec/requests/api/graphql/instance_security_dashboard_spec.rb975ee/spec/requests/api/graphql/mutations/security_policy/unassign_security_policy_project_spec.rb976ee/spec/requests/api/graphql/mutations/security/finding/create_issue_spec.rb977ee/spec/requests/api/graphql/mutations/projects/set_compliance_framework_spec.rb978ee/spec/controllers/ee/dashboard/projects_controller_spec.rb979ee/spec/requests/api/internal/app_sec/dast/site_validations_spec.rbKnapsack report generator started!980Run options: exclude {:quarantine=>true, :level=>"migration"}981Test environment set up in 1.697857613 seconds982Gets registries983 behaves like gets registries for984 returns registries985 behaves like a working graphql query986 returns a successful response987 when paginating988 supports cursor-based pagination989 returns the correct page of registries990 when the feature is enabled by default991 when the feature is disabled992 behaves like a working graphql query993 returns a successful response994 when the feature is disabled by default995 when the feature is disabled996 errors when requesting registries (PENDING: Skipping since Geo::MergeRequestDiffReplicator is enabled by default)997 behaves like gets registries for998 returns registries999 behaves like a working graphql query1000 returns a successful response1001 when paginating1002 supports cursor-based pagination1003 returns the correct page of registries1004 when the feature is enabled by default1005 when the feature is disabled1006 behaves like a working graphql query1007 returns a successful response1008 when the feature is disabled by default1009 when the feature is disabled1010 errors when requesting registries (PENDING: Skipping since Geo::PackageFileReplicator is enabled by default)1011 behaves like gets registries for1012 returns registries1013 behaves like a working graphql query1014 returns a successful response1015 when paginating1016 supports cursor-based pagination1017 returns the correct page of registries1018 when the feature is enabled by default1019 when the feature is disabled1020 behaves like a working graphql query1021 returns a successful response1022 when the feature is disabled by default1023 when the feature is disabled1024 errors when requesting registries (PENDING: Skipping since Geo::SnippetRepositoryReplicator is enabled by default)1025 behaves like gets registries for1026 returns registries1027 behaves like a working graphql query1028 returns a successful response1029 when paginating1030 supports cursor-based pagination1031 returns the correct page of registries1032 when the feature is enabled by default1033 when the feature is disabled1034 behaves like a working graphql query1035 returns a successful response1036 when the feature is disabled by default1037 when the feature is disabled1038 errors when requesting registries (PENDING: Skipping since Geo::TerraformStateVersionReplicator is enabled by default)1039 behaves like gets registries for1040 returns registries1041 behaves like a working graphql query1042 returns a successful response1043 when paginating1044 supports cursor-based pagination1045 returns the correct page of registries1046 when the feature is enabled by default1047 when the feature is disabled1048 behaves like a working graphql query1049 returns a successful response1050 when the feature is disabled by default1051 when the feature is disabled1052 errors when requesting registries (PENDING: Skipping since Geo::GroupWikiRepositoryReplicator is enabled by default)1053 behaves like gets registries for1054 returns registries1055 behaves like a working graphql query1056 returns a successful response1057 when paginating1058 supports cursor-based pagination1059 returns the correct page of registries1060 when the feature is enabled by default1061 when the feature is disabled1062 behaves like a working graphql query1063 returns a successful response1064 when the feature is disabled by default1065 when the feature is disabled1066 errors when requesting registries (PENDING: Skipping since Geo::PipelineArtifactReplicator is enabled by default)1067 behaves like gets registries for1068 returns registries1069 behaves like a working graphql query1070 returns a successful response1071 when paginating1072 supports cursor-based pagination1073 returns the correct page of registries1074 when the feature is enabled by default1075 when the feature is disabled1076 behaves like a working graphql query1077 returns a successful response1078 when the feature is disabled by default1079 when the feature is disabled1080 errors when requesting registries (PENDING: Skipping since Geo::PagesDeploymentReplicator is enabled by default)1081 behaves like gets registries for1082 returns registries1083 behaves like a working graphql query1084 returns a successful response1085 when paginating1086 supports cursor-based pagination1087 returns the correct page of registries1088 when the feature is enabled by default1089 when the feature is disabled1090 behaves like a working graphql query1091 returns a successful response1092 when the feature is disabled by default1093 when the feature is disabled1094 errors when requesting registries (PENDING: Skipping since Geo::UploadReplicator is enabled by default)1095 behaves like gets registries for1096 returns registries1097 behaves like a working graphql query1098 returns a successful response1099 when paginating1100 supports cursor-based pagination1101 returns the correct page of registries1102 when the feature is enabled by default1103 when the feature is disabled1104 behaves like a working graphql query1105 returns a successful response1106 when the feature is disabled by default1107 when the feature is disabled1108 errors when requesting registries (PENDING: Skipping since Geo::JobArtifactReplicator is enabled by default)1109 behaves like gets registries for1110 returns registries1111 behaves like a working graphql query1112 returns a successful response1113 when paginating1114 supports cursor-based pagination1115 returns the correct page of registries1116 when the feature is enabled by default1117 when the feature is disabled1118 behaves like a working graphql query1119 returns a successful response1120 when the feature is disabled by default1121 when the feature is disabled1122 errors when requesting registries (PENDING: Skipping since Geo::CiSecureFileReplicator is enabled by default)1123API::Scim1124 user with an alphanumeric extern_uid1125 behaves like SCIM API endpoints1126 GET api/scim/v2/groups/:group/Users1127 responds with 404 for a non existent group1128 responds with 404 for a group with no SAML SSO configuration1129 responds with paginated users when there is no filter1130 responds with an error for unsupported filters1131 behaves like SCIM token authenticated1132 without token auth1133 responds with 4011134 existing user matches filter1135 responds with 2001136 sets default values as required by the specification1137 no user matches filter1138 responds with 2001139 GET api/scim/v2/groups/:group/Users/:id1140 responds with 404 for a non existent group1141 responds with 404 for a group with no SAML SSO configuration1142 responds with 404 if there is no user1143 behaves like SCIM token authenticated1144 without token auth1145 responds with 4011146 existing user1147 responds with 2001148 POST api/scim/v2/groups/:group/Users1149 responds with 404 for a non existent group1150 responds with 404 for a group with no SAML SSO configuration1151 behaves like SCIM token authenticated1152 without token auth1153 responds with 4011154 when a provisioning error occurs1155 behaves like filtered params in errors1156 does not expose the password in error response1157 does not expose the access token in error response1158 without an existing user1159 responds with 2011160 has the user external ID1161 has the email1162 created the user1163 created the member with access level set in saml_provider1164 created the identity1165 marks the user as provisioned by the group1166 existing user1167 responds with 2011168 has the user external ID1169 does not mark the user as provisioned1170 behaves like storing arguments in the application context for the API1171 places the expected params in the application context1172 with allowed domain setting switched on1173 with different domains1174 created the user1175 did not create member1176 with invalid user params1177 returns user error1178 with matching domains1179 created the user1180 created the member with access level set in saml_provider1181 PATCH api/scim/v2/groups/:group/Users/:id1182 responds with 404 for a non existent group1183 responds with 404 for a group with no SAML SSO configuration1184 responds with 404 if there is no user1185 deactivates the scim_identity1186 behaves like SCIM token authenticated1187 without token auth1188 responds with 4011189 with owner1190 responds with 4121191 returns the last group owner error1192 does not deactivate the identity1193 Reprovision user1194 activates the scim_identity1195 does not call reprovision service when identity is already active1196 existing user1197 extern UID1198 responds with 2041199 updates the extern_uid1200 user attributes1201 name1202 responds with 2041203 does not update the name1204 responds with an empty response1205 email1206 does not update the email1207 responds with 2041208 userName1209 responds with 2041210 does not update the username1211 responds with an empty response1212 DELETE /scim/v2/groups/:group/Users/:id1213 responds with 404 if there is no user1214 responds with 404 for a non existent group1215 responds with 404 for a group with no SAML SSO configuration1216 existing user1217 responds with 2041218 responds with an empty response1219 deactivates the identity1220 with owner1221 responds with 4121222 returns the last group owner error1223 does not deactivate the identity1224 user with an email extern_uid1225 behaves like SCIM API endpoints1226 GET api/scim/v2/groups/:group/Users1227 responds with 404 for a non existent group1228 responds with 404 for a group with no SAML SSO configuration1229 responds with paginated users when there is no filter1230 responds with an error for unsupported filters1231 behaves like SCIM token authenticated1232 without token auth1233 responds with 4011234 existing user matches filter1235 responds with 2001236 sets default values as required by the specification1237 no user matches filter1238 responds with 2001239 GET api/scim/v2/groups/:group/Users/:id1240 responds with 404 for a non existent group1241 responds with 404 for a group with no SAML SSO configuration1242 responds with 404 if there is no user1243 behaves like SCIM token authenticated1244 without token auth1245 responds with 4011246 existing user1247 responds with 2001248 POST api/scim/v2/groups/:group/Users1249 responds with 404 for a non existent group1250 responds with 404 for a group with no SAML SSO configuration1251 behaves like SCIM token authenticated1252 without token auth1253 responds with 4011254 when a provisioning error occurs1255 behaves like filtered params in errors1256 does not expose the password in error response1257 does not expose the access token in error response1258 without an existing user1259 responds with 2011260 has the user external ID1261 has the email1262 created the user1263 created the member with access level set in saml_provider1264 created the identity1265 marks the user as provisioned by the group1266 existing user1267 responds with 2011268 has the user external ID1269 does not mark the user as provisioned1270 behaves like storing arguments in the application context for the API1271 places the expected params in the application context1272 with allowed domain setting switched on1273 with different domains1274 created the user1275 did not create member1276 with invalid user params1277 returns user error1278 with matching domains1279 created the user1280 created the member with access level set in saml_provider1281 PATCH api/scim/v2/groups/:group/Users/:id1282 responds with 404 for a non existent group1283 responds with 404 for a group with no SAML SSO configuration1284 responds with 404 if there is no user1285 deactivates the scim_identity1286 behaves like SCIM token authenticated1287 without token auth1288 responds with 4011289 with owner1290 responds with 4121291 returns the last group owner error1292 does not deactivate the identity1293 Reprovision user1294 activates the scim_identity1295 does not call reprovision service when identity is already active1296 existing user1297 extern UID1298 responds with 2041299 updates the extern_uid1300 user attributes1301 name1302 responds with 2041303 does not update the name1304 responds with an empty response1305 email1306 does not update the email1307 responds with 2041308 userName1309 responds with 2041310 does not update the username1311 responds with an empty response1312 DELETE /scim/v2/groups/:group/Users/:id1313 responds with 404 if there is no user1314 responds with 404 for a non existent group1315 responds with 404 for a group with no SAML SSO configuration1316 existing user1317 responds with 2041318 responds with an empty response1319 deactivates the identity1320 with owner1321 responds with 4121322 returns the last group owner error1323 does not deactivate the identity1324ProjectsController1325 GET show1326 additional repo storage by namespace1327 when automatic_purchased_storage_allocation setting is enabled1328 when usage_ratio < 0.751329 does not include the CTA for additional purchased storage1330 when usage_ratio >= 0.751331 includes the CTA for additional purchased storage1332 when automatic_purchased_storage_allocation setting is disabled1333 does not include the CTA for additional purchased storage1334 with automatic_purchased_storage_allocation set to true1335 does not show over size limit warning when above_size_limit1336 with automatic_purchased_storage_allocation set to false1337 shows the over size limit warning message if above_size_limit1338 does not show an over size warning if not above_size_limit1339 namespace storage limit1340 behaves like namespace storage limit alert1341 does render1342 when user has dismissed already1343 does not render alert1344 behaves like seat count alert1345 when the namespace qualifies for the alert1346 sets the seat_count_data1347 when the namespace does not qualify for the alert1348 sets the seat_count_data to nil1349 GET edit1350 does not allow an auditor user to access the page1351 POST create1352 with licensed repository mirrors1353 has mirror enabled in new project1354 with unlicensed repository mirrors1355 has mirror disabled in new project1356 built in project templates1357 creates one audit event1358 custom project templates1359 when licensed1360 object storage1361/builds/gitlab-org/gitlab/vendor/ruby/2.7.0/gems/carrierwave-1.3.2/lib/carrierwave/mounter.rb:113: warning: deprecated Object#=~ is called on TrueClass; it always returns nil1362/builds/gitlab-org/gitlab/vendor/ruby/2.7.0/gems/carrierwave-1.3.2/lib/carrierwave/mounter.rb:113: warning: deprecated Object#=~ is called on TrueClass; it always returns nil1363 creates the project from project template1364 when unlicensed1365 does not create the project from project template1366 PUT #update1367 updates EE attributes1368 updates Merge Request Approvers attributes1369 updates Issuable Default Templates attributes1370 updates cve_id_request_enabled1371 when merge_pipelines_enabled param is specified1372 updates the attribute1373 when license is not sufficient1374 does not update the attribute1375 when only_allow_merge_if_all_status_checks_passed param is specified1376 behaves like update only allow merge if all status checks passed1377 when only_allow_merge_if_all_status_checks_passed param is specified1378 updates the attribute1379 when license is not sufficient1380 does not update the attribute1381 when merge_trains_enabled param is specified1382 updates the attribute1383 when license is not sufficient1384 does not update the attribute1385 when auto_rollback_enabled param is specified1386 updates the attribute1387 when license is not sufficient1388 does not update the attribute1389 repository mirrors1390 when licensed1391 updates repository mirror attributes1392 ignores mirror_user_id1393 when unlicensed1394 does not update repository mirror attributes1395 merge request approvers settings1396 :disable_overriding_approvers_per_merge_request1397 behaves like merge request approvers rules1398 can_modify: true, param_value: true, final_value: true1399 updates project if needed1400 can_modify: true, param_value: false, final_value: false1401 updates project if needed1402 can_modify: false, param_value: true, final_value: nil1403 updates project if needed1404 can_modify: false, param_value: false, final_value: nil1405 updates project if needed1406 :merge_requests_author_approval1407 behaves like merge request approvers rules1408 can_modify: true, param_value: true, final_value: true1409 updates project if needed1410 can_modify: true, param_value: false, final_value: false1411 updates project if needed1412 can_modify: false, param_value: true, final_value: nil1413 updates project if needed1414 can_modify: false, param_value: false, final_value: nil1415 updates project if needed1416 :merge_requests_disable_committers_approval1417 behaves like merge request approvers rules1418 can_modify: true, param_value: true, final_value: true1419 updates project if needed1420 can_modify: true, param_value: false, final_value: false1421 updates project if needed1422 can_modify: false, param_value: true, final_value: nil1423 updates project if needed1424 can_modify: false, param_value: false, final_value: nil1425 updates project if needed1426 compliance framework settings1427 when unlicensed1428 behaves like no compliance framework is set1429 does not change compliance framework for project1430 when licensed1431 current_user is a project owner1432 sets the compliance framework1433 #download_export1434 when project export is enabled1435 logs the audit event1436 when project export is disabled1437 does not log an audit event1438 Archive & Unarchive actions1439 POST #archive1440 for a user with the ability to archive a project1441 logs the audit event1442 for a user that does not have the ability to archive a project1443 does not log the audit event1444 POST #unarchive1445 for a user with the ability to unarchive a project1446 logs the audit event1447 for a user that does not have the ability to unarchive a project1448 does not log the audit event1449 DELETE #destroy1450 feature is available1451 when feature is enabled for group1452 does not mark project for deletion because of error1453 behaves like marks project for deletion1454 is expected to redirect to "/group143/project158-deleted-162"1455 when instance setting is set to 0 days1456 deletes project right away1457 when project is already marked for deletion1458 when permanently_delete param is set1459 deletes project right away1460 when permanently_delete param is not set1461 does nothing1462 when feature is disabled for group1463 behaves like deletes project right away1464 is expected to redirect to "/dashboard/projects"1465 when feature is not available for the project1466 behaves like marks free project for deletion1467 is expected to redirect to "/dashboard/projects"1468 for projects in user namespace1469 behaves like deletes project right away1470 is expected to redirect to "/dashboard/projects"1471 feature is not available1472 behaves like deletes project right away1473 is expected to redirect to "/dashboard/projects"1474 POST #restore1475 restores project deletion1476 does not restore project because of error1477Groups::EpicsController1478 when epics feature is disabled1479 GET #index1480 behaves like 404 status1481 returns 404 status1482 GET #new1483 behaves like 404 status1484 returns 404 status1485 GET #show1486 behaves like 404 status1487 returns 404 status1488 PUT #update1489 behaves like 404 status1490 returns 404 status1491 when epics feature is enabled1492 GET #index1493 returns index1494 GET #discussions1495 when issue note is returned1496 project default namespace1497 behaves like issue link presence1498 the link to the issue is included1499 project group namespace1500 behaves like issue link presence1501 the link to the issue is included1502 setting notes filter1503 behaves like issuable notes filter1504 sets discussion filter1505 expires notes e-tag cache for issuable if filter changed1506 does not expires notes e-tag cache for issuable if filter did not change1507 does not set notes filter when database is in read-only mode1508 does not set notes filter when persist_filter param is false1509 returns only user comments1510 returns only activity notes1511 when filter is set to "only_comments"1512 does not merge label event notes1513 GET #new1514 renders template1515 with unauthorized user1516 returns a not found 404 response1517 GET #show1518 when format is HTML1519 renders template1520 logs the view with Gitlab::Search::RecentEpics1521 with unauthorized user1522 returns a not found 404 response1523 behaves like disabled when using an external authorization service1524 works when the feature is not enabled1525 renders a 404 with a message when the feature is enabled1526 when format is JSON1527 returns epic1528 with unauthorized user1529 returns a not found 404 response1530 PUT #update1531 with correct basic params1532 returns status 2001533 updates the epic correctly1534 when state_event param is close1535 allows epic to be closed1536 when state_event param is reopen1537 allows epic to be reopened1538 GET #realtime_changes1539 returns epic1540 with unauthorized user1541 returns a not found 404 response1542 behaves like disabled when using an external authorization service1543 works when the feature is not enabled1544 renders a 404 with a message when the feature is enabled1545 #create1546 when user has permissions to create an epic1547 when all required parameters are passed1548 returns 200 response1549 creates a new epic1550 assigns labels to the new epic1551 returns the correct json1552 behaves like disabled when using an external authorization service1553 works when the feature is not enabled1554 renders a 404 with a message when the feature is enabled1555 when required parameter is missing1556 returns 422 response1557 does not create a new epic1558 when the endpoint receives requests above the limit1559 prevents from creating more epics1560 logs the event on auth.log1561 with unauthorized user1562 returns a not found 404 response1563 DELETE #destroy1564 rejects a developer to destroy an epic1565 deletes the epic1566 POST #bulk_update1567 with correct params1568 when group bulk edit feature is disabled1569 returns status 4041570 does not update merge requests milestone1571 when group bulk edit feature is enabled1572 returns status 2001573 updates epics labels1574 behaves like DescriptionDiffActions1576 when license is available1577 GET description_diff1578 returns the diff with the previous version1579 returns the diff with the previous version of the specified start_version_id1580 when description version is from another issuable1581 returns 4041582 when start_version_id is from another issuable1583 returns 4041584 when start_version_id is deleted1585 returns 4041586 when description version is deleted1587 returns 4041588 DELETE description_diff1589 returns 2001590 when start_version_id is present1591 returns 2001592 when version is already deleted1593 returns 4041594 when user cannot admin issuable1595 returns 4041596 when license is not available1597 GET description_diff1598 returns 4041599 DELETE description_diff1600 returns 4041601API::EpicIssues1602 GET /groups/:id/epics/:epic_iid/issues1603 when epics feature is disabled1604 returns 403 forbidden error1605 when epics feature is enabled1606 when an error occurs1607 returns 401 unauthorized error for non authenticated user1608 returns 404 not found error for a user without permissions to see the group1609 when the request is correct1610 responds 200 and matches the response schema1611 accepts pagination params1612 returns multiple issues without performing N + 11613 returns multiple issues without performing N + 11614 POST /groups/:id/epics/:epic_iid/issues1615 when epics feature is disabled1616 returns 403 forbidden error1617 when epics feature is enabled1618 when an error occurs1619 returns 401 unauthorized error for non authenticated user1620 returns 404 not found error for a user without permissions to see the group1621 without permissions to admin the issue1622 returns 403 forbidden error1623 without permissions to read the epic1624 returns 403 forbidden error1625 when issue project is not under the epic group1626 returns an error1627 when the request is correct1628 returns 201 status1629 matches the response schema1630 assigns the issue to the epic1631 DELETE /groups/:id/epics/:epic_iid/issues/:epic_issue_id"1632 when epics feature is disabled1633 returns 403 forbidden error1634 when epics feature is enabled1635 when an error occurs1636 returns 401 unauthorized error for non authenticated user1637 returns 404 not found error for a user without permissions to see the group1638 With user without permissions to admin the issue1639 returns 403 forbidden error1640 without permissions to read the epic1641 returns 403 forbidden error1642 when epic_issue association does not include the epic in the url1643 returns 404 not found error1644 when the request is correct1645 returns 200 status1646 matches the response schema1647 removes the association1648 PUT /groups/:id/epics/:epic_iid/issues/:epic_issue_id1649 when epics feature is disabled1650 returns 403 forbidden error1651 when epics feature is enabled1652 when an error occurs1653 returns 401 unauthorized error for non authenticated user1654 returns 404 not found error for a user without permissions to see the group1655 returns 403 forbidden error for a user who can not move the issue1656 returns 404 not found error for the link of another epic1657 when the request is correct1658 returns 200 status1659 updates the positions values1660 matches the response schema1661API::ProjectApprovalSettings1662 GET /projects/:id/approval_settings1663 when the request is correct1664 matches the response schema1665 when target_branch is specified1666 filters the rules returned by target branch1667 private group filtering1668 excludes private groups if user has no access1669 includes private groups if user has access1670 report_approver rules1671 includes report_approver rules1672 when project is archived1673 when user has normal permissions1674 returns 4031675 when user has project admin permissions1676 allows access1677 POST /projects/:id/approval_settings/rules1678 behaves like an API endpoint for creating project approval rule1679 behaves like a restricted project approval rule API endpoint1680 when admin_merge_request_approvers_rules license feature is disabled1681 when disable_overriding_approvers_per_merge_request app setting is false1682 behaves like a user with access1683 returns 201 status1684 when disable_overriding_approvers_per_merge_request app setting is true1685 behaves like a user with access1686 returns 201 status1687 when admin_merge_request_approvers_rules license feature is enabled1688 when disable_overriding_approvers_per_merge_request app setting is false1689 behaves like a user with access1690 returns 201 status1691 when disable_overriding_approvers_per_merge_request app setting is true1692 behaves like a user without access1693 returns 4031694 when missing parameters1695 returns 400 status1696 when user is without access1697 behaves like a user without access1698 returns 4031699 when the request is correct1700 changes settings properly1701 behaves like a user with access1702 returns 201 status1703 when protected_branch_ids param is present1704 creates approval rule associated to specified protected branches1705 when applies_to_all_protected_branches param is present1706 returns a list of project protected branches in the response1707 with rule_type set to report_approver1708 without report_type1709 returns a error http status1710 when creating a approval rule for each report_type1711 rule_name: "License-Check", report_type: :license_scanning1712 specifies `report_rule` and `report_type`1713 rule_name: "Coverage-Check", report_type: :code_coverage1714 specifies `report_rule` and `report_type`1715 with valid scanners1716 returns 201 status1717 with valid severity_levels1718 returns 201 status1719 with vulnerabilities_allowed1720 returns 201 status1721 PUT /projects/:id/approval_settings/:approval_rule_id1722 behaves like an API endpoint for updating project approval rule1723 behaves like a restricted project approval rule API endpoint1724 when admin_merge_request_approvers_rules license feature is disabled1725 when disable_overriding_approvers_per_merge_request app setting is false1726 behaves like a user with access1727 sets approvers1728 when applies_to_all_protected_branches param is present1729 returns a list of project protected branches in the response1730 when protected_branch_ids param is present1731 associates approval rule to specified protected branches1732 with valid scanners1733 returns 200 status1734 with nil scanners1735 returns 200 status1736 when scanners is NULL in the database1737 returns 200 status1738 with valid severity_levels1739 returns 200 status1740 when approver already exists1741 when sending json data1742 removes all approvers if empty params are given1743 with vulnerabilities_allowed1744 returns 200 status1745 when disable_overriding_approvers_per_merge_request app setting is true1746 behaves like a user with access1747 sets approvers1748 when applies_to_all_protected_branches param is present1749 returns a list of project protected branches in the response1750 when protected_branch_ids param is present1751 associates approval rule to specified protected branches1752 with valid scanners1753 returns 200 status1754 with nil scanners1755 returns 200 status1756 when scanners is NULL in the database1757 returns 200 status1758 with valid severity_levels1759 returns 200 status1760 when approver already exists1761 when sending json data1762 removes all approvers if empty params are given1763 with vulnerabilities_allowed1764 returns 200 status1765 when admin_merge_request_approvers_rules license feature is enabled1766 when disable_overriding_approvers_per_merge_request app setting is false1767 behaves like a user with access1768 sets approvers1769 when applies_to_all_protected_branches param is present1770 returns a list of project protected branches in the response1771 when protected_branch_ids param is present1772 associates approval rule to specified protected branches1773 with valid scanners1774 returns 200 status1775 with nil scanners1776 returns 200 status1777 when scanners is NULL in the database1778 returns 200 status1779 with valid severity_levels1780 returns 200 status1781 when approver already exists1782 when sending json data1783 removes all approvers if empty params are given1784 with vulnerabilities_allowed1785 returns 200 status1786 when disable_overriding_approvers_per_merge_request app setting is true1787 behaves like a user without access1788 returns 4031789 as a project admin1790 behaves like a user with access1791 sets approvers1792 when applies_to_all_protected_branches param is present1793 returns a list of project protected branches in the response1794 when protected_branch_ids param is present1795 associates approval rule to specified protected branches1796 with valid scanners1797 returns 200 status1798 with nil scanners1799 returns 200 status1800 when scanners is NULL in the database1801 returns 200 status1802 with valid severity_levels1803 returns 200 status1804 when approver already exists1805 when sending json data1806 removes all approvers if empty params are given1807 with vulnerabilities_allowed1808 returns 200 status1809 as a global admin1810 behaves like a user with access1811 sets approvers1812 when applies_to_all_protected_branches param is present1813 returns a list of project protected branches in the response1814 when protected_branch_ids param is present1815 associates approval rule to specified protected branches1816 with valid scanners1817 returns 200 status1818 with nil scanners1819 returns 200 status1820 when scanners is NULL in the database1821 returns 200 status1822 with valid severity_levels1823 returns 200 status1824 when approver already exists1825 when sending json data1826 removes all approvers if empty params are given1827 with vulnerabilities_allowed1828 returns 200 status1829 as a random user1830 behaves like a user without access1831 returns 4031832 DELETE /projects/:id/approval_settings/rules/:approval_rule_id1833 behaves like an API endpoint for deleting project approval rule1834 behaves like a user with access1835 destroys1836 behaves like a restricted project approval rule API endpoint1837 when admin_merge_request_approvers_rules license feature is disabled1838 when disable_overriding_approvers_per_merge_request app setting is false1839 behaves like a user with access1840 destroys1841 when disable_overriding_approvers_per_merge_request app setting is true1842 behaves like a user with access1843 destroys1844 when admin_merge_request_approvers_rules license feature is enabled1845 when disable_overriding_approvers_per_merge_request app setting is false1846 behaves like a user with access1847 destroys1848 when disable_overriding_approvers_per_merge_request app setting is true1849 behaves like a user without access1850 returns 4031851 when approval rule not found1852 returns not found1853 when user is not eligible to delete1854 behaves like a user without access1855 returns 4031856Groups::ClustersController1857 behaves like cluster metrics1858 GET #metrics1859 functionality1860 can query Prometheus1861 queries cluster metrics1862 when response has content1863 returns prometheus query response1864 when response has no content1865 returns prometheus query response1866 without Prometheus1867 returns not found1868 cannot query Prometheus1869 returns not found1870 security1871 is expected to be allowed for owner. Expected: 200,201,204,302 Got: 2041872 is expected to be allowed for maintainer. Expected: 200,201,204,302 Got: 2041873 is expected to be denied for developer. Expected: 401,404 Got: 4041874 is expected to be denied for reporter. Expected: 401,404 Got: 4041875 is expected to be denied for guest. Expected: 401,404 Got: 4041876 is expected to be denied for user. Expected: 401,404 Got: 4041877 is expected to be denied for external. Expected: 401,404 Got: 4041878 when admin mode is enabled1879 is expected to be allowed for admin. Expected: 200,201,204,302 Got: 2041880 when admin mode is disabled1881 is expected to be denied for admin. Expected: 401,404 Got: 4041882 GET environments1883 functionality1884 responds successfully1885 security1886 is expected to be allowed for owner. Expected: 200,201,204,302 Got: 2001887 is expected to be allowed for maintainer. Expected: 200,201,204,302 Got: 2001888 is expected to be denied for developer. Expected: 401,404 Got: 4041889 is expected to be denied for reporter. Expected: 401,404 Got: 4041890 is expected to be denied for guest. Expected: 401,404 Got: 4041891 is expected to be denied for user. Expected: 401,404 Got: 4041892 is expected to be denied for external. Expected: 401,404 Got: 4041893 when admin mode is enabled1894 is expected to be allowed for admin. Expected: 200,201,204,302 Got: 2001895 when admin mode is disabled1896 is expected to be denied for admin. Expected: 401,404 Got: 4041897 GET show1898 expires etag cache to force reload environments list1899API::GroupPushRule GroupPushRule1900 GET /groups/:id/push_rule1901 when unlicensed1902 behaves like not found when feature is unavailable1903 is expected to respond with numeric status code not_found1904 authorized user1905 when licensed1906 returns attributes as expected1907 matches response schema1908 when reject_unsigned_commits is unavailable1909 is expected not to have key "reject_unsigned_commits"1910 when commit_committer_check is unavailable1911 is expected not to have key "commit_committer_check"1912 permissions1913 behaves like allow access to api based on role1914 is expected to be allowed for :admin1915 is expected to be allowed for :owner1916 is expected to be denied for :developer1917 is expected to be denied for :reporter1918 is expected to be denied for :guest1919 is expected to be denied for :anonymous1920 when push rule does not exist1921 returns not found1922 POST /groups/:id/push_rule1923 when unlicensed1924 behaves like not found when feature is unavailable1925 is expected to respond with numeric status code not_found1926 authorized user1927 when licensed1928 is expected to respond with numeric status code created1929 is expected to change `PushRule.count` by 11930 creates record with appropriate attributes1931 when push rule exists1932 is expected to eq "Group push rule exists, try updating"1933 permissions1934 behaves like allow access to api based on role1935 is expected to be allowed for :admin1936 is expected to be allowed for :owner1937 is expected to be denied for :developer1938 is expected to be denied for :reporter1939 is expected to be denied for :guest1940 is expected to be denied for :anonymous1941 when no rule is specified1942 is expected to include "at least one parameter must be provided"1943 when reject_unsigned_commits is unavailable1944 returns forbidden1945 and reject_unsigned_commits is not set1946 returns created1947 when commit_committer_check is unavailable1948 is expected to respond with numeric status code forbidden1949 and commit_committer_check is not set1950 returns created1951 PUT /groups/:id/push_rule1952 when unlicensed1953 behaves like not found when feature is unavailable1954 is expected to respond with numeric status code not_found1955 authorized user1956 when licensed1957 is expected to respond with numeric status code ok1958 updates attributes as expected1959 when push rule does not exist for group1960 returns not found1961 permissions1962 behaves like allow access to api based on role1963 is expected to be allowed for :admin1964 is expected to be allowed for :owner1965 is expected to be denied for :developer1966 is expected to be denied for :reporter1967 is expected to be denied for :guest1968 is expected to be denied for :anonymous1969 when no rule is specified1970 is expected to include "at least one parameter must be provided"1971 when reject_unsigned_commits is unavailable1972 returns forbidden1973 and reject_unsigned_commits is not set1974 returns status ok1975 when commit_committer_check is unavailable1976 is expected to respond with numeric status code forbidden1977 and commit_committer_check is not set1978 returns status ok1979 DELETE /groups/:id/push_rule1980 authorized user1981 when licensed1982 with group push rule1983 is expected to equal nil1984 when push rule does not exist1985 returns not found1986 when unlicensed1987 behaves like not found when feature is unavailable1988 is expected to respond with numeric status code not_found1989 permissions1990 behaves like allow access to api based on role1991 is expected to be allowed for :admin1992 is expected to be allowed for :owner1993 is expected to be denied for :developer1994 is expected to be denied for :reporter1995 is expected to be denied for :guest1996 is expected to be denied for :anonymous1997Projects::MergeRequests::CreationsController1998 GET #new1999 default templates2000 when a template has been set via project settings2001 does not select a default template2002 when a template has not been set via project settings2003 selects a default template2004 POST #create2005 disables query limiting2006 the approvals_before_merge param2007 when it is less than the one in the target project2008 sets the param to the project value2009 creates the merge request2010 when it is equal to the one in the target project2011 sets the param to the correct value2012 creates the merge request2013 when it is greater than the one in the target project2014 saves the param in the merge request2015 creates the merge request2016 when the target project is a fork of a deleted project2017 uses the default from the target project2018 creates the merge request2019 overriding approvers per MR2020 enabled2021 does create approval rules2022 disabled2023 does not create approval rules2024Groups::GroupMembersController2025 GET #index2026 with members, invites and requests queries2027 records queries2028 avoids extra group_link database queries utilizing pre-loading2029 DELETE #leave2030 when member is not an owner2031 creates an audit event2032 when member is an owner2033 does not create an audit event2034 when member requested access2035 creates an audit event2036 with external authorization enabled2037 POST #override2038 is successful2039 when user has minimal access2040 is not successful2041 when minimal_access_role feature is available2042 is successful2043 POST request_access2044 when users with unconfirmed emails are allowed to log-in2045 when group has email domain feature enabled2046 for a user with an un-verified email belonging to the allowed domain2047 does not create a new access request2048 behaves like creates access request for a verified user with email belonging to the allowed domain2049 for a user with a verified email belonging to the allowed domain2050 behaves like creates a new access request2051 creates a new access request to the group2052 when group has email domain feature disabled2053 for a user with an un-verified email belonging to the allowed domain2054 behaves like creates a new access request2055 creates a new access request to the group2056 for a user with an un-verified email belonging to a domain different from the allowed domain2057 behaves like creates a new access request2058 creates a new access request to the group2059 behaves like creates access request for a verified user with email belonging to the allowed domain2060 for a user with a verified email belonging to the allowed domain2061 behaves like creates a new access request2062 creates a new access request to the group2063 when users with unconfirmed emails are not allowed to log-in2064 when group has email domain feature enabled2065 for a user with an un-verified email belonging to the allowed domain2066 behaves like does not create a new access request due to user pending confirmation2067 does not create a new access request due to user pending confirmation2068 behaves like creates access request for a verified user with email belonging to the allowed domain2069 for a user with a verified email belonging to the allowed domain2070 behaves like creates a new access request2071 creates a new access request to the group2072 when group has email domain feature disabled2073 for a user with an un-verified email belonging to the allowed domain2074 behaves like does not create a new access request due to user pending confirmation2075 does not create a new access request due to user pending confirmation2076 for a user with an un-verified email belonging to a domain different from the allowed domain2077 behaves like does not create a new access request due to user pending confirmation2078 does not create a new access request due to user pending confirmation2079 behaves like creates access request for a verified user with email belonging to the allowed domain2080 for a user with a verified email belonging to the allowed domain2081 behaves like creates a new access request2082 creates a new access request to the group2083 GET #export_csv2084 when feature is unlicensed2085 responds with :not_found2086 when feature is licensed2087 enqueues a worker job2088 current user is a group maintainer2089 returns a 4042090 current user is a group developer2091 returns a 4042092 current user is a group guest2093 returns a 4042094 POST #resend_invite2095 when user has minimal access2096 is not successful2097 when minimal_access_role feature is available2098 is successful2099API::StatusChecks2100 GET :id/merge_requests/:merge_request_iid/status_checks2101 when current_user has access2102 when merge request has received status check responses2103 returns a 2002104 returns the total number of status checks for the MRs project2105 has the correct status values2106 POST :id/:merge_requests/:merge_request_iid/status_check_responses2107 permissions2108 user_permissions: :maintainer, applies_to_target_project: true, expected_status: :created2109 returns the correct status2110 user_permissions: :maintainer, applies_to_target_project: false, expected_status: :not_found2111 returns the correct status2112 user_permissions: :developer, applies_to_target_project: true, expected_status: :created2113 returns the correct status2114 user_permissions: :developer, applies_to_target_project: false, expected_status: :not_found2115 returns the correct status2116 user_permissions: :guest, applies_to_target_project: true, expected_status: :forbidden2117 returns the correct status2118 user_permissions: :guest, applies_to_target_project: false, expected_status: :not_found2119 returns the correct status2120 when user has access2121 when external status check ID does not belong to the requested project2122 returns a not found status2123 when sha is not the source branch HEAD2124 does not create a new approval2125 returns a conflict error2126 when user is not authenticated2127 returns an unauthorized status2128 DELETE projects/:id/external_status_checks/:check_id2129 deletes the specified rule2130 when feature is disabled, unlicensed or user has permission2131 licensed: false, project_owner: false, status: :not_found2132 returns the correct status code2133 licensed: false, project_owner: true, status: :unauthorized2134 returns the correct status code2135 licensed: true, project_owner: false, status: :not_found2136 returns the correct status code2137 licensed: true, project_owner: true, status: :success2138 returns the correct status code2139 POST projects/:id/external_status_checks2140 successfully creating new external approval rule2141 creates a new external approval rule2142 with protected branches2143 returns expected status code2144 creates protected branch records2145 responds with expected JSON2146 when feature is disabled, unlicensed or user has permission2147 licensed: false, project_owner: false, status: :not_found2148 returns the correct status code2149 licensed: false, project_owner: true, status: :unauthorized2150 returns the correct status code2151 licensed: true, project_owner: false, status: :not_found2152 returns the correct status code2153 licensed: true, project_owner: true, status: :created2154 returns the correct status code2155 GET projects/:id/external_status_checks2156 responds with expected JSON2157 paginates correctly2158 when feature is disabled, unlicensed or user has permission2159 licensed: false, project_owner: false, status: :not_found2160 returns the correct status code2161 licensed: false, project_owner: true, status: :unauthorized2162 returns the correct status code2163 licensed: true, project_owner: false, status: :not_found2164 returns the correct status code2165 licensed: true, project_owner: true, status: :success2166 returns the correct status code2167 PUT projects/:id/external_status_checks/:check_id2168 successfully updating external approval rule2169 updates an approval rule2170 responds with correct http status2171 when referencing a protected branch outside of the project2172 is invalid2173 with protected branches2174 returns expected status code2175 creates protected branch records2176 responds with expected JSON2177 when feature is disabled, unlicensed or user has permission2178 licensed: false, project_owner: false, status: :not_found2179 returns the correct status code2180 licensed: false, project_owner: true, status: :unauthorized2181 returns the correct status code2182 licensed: true, project_owner: false, status: :not_found2183 returns the correct status code2184 licensed: true, project_owner: true, status: :success2185 returns the correct status code2186Groups::Analytics::TasksByTypeController2187 GET #show2188 when valid parameters are given2189 succeeds2190 returns valid count2191 when `label_names` are missing2192 behaves like expects unprocessable_entity response2193 returns unprocessable_entity as response2194 behaves like parameter validation2195 when user access level is lower than reporter2196 returns forbidden as response2197 when license is missing2198 returns forbidden as response2199 when `created_after` parameter is invalid2200 behaves like expects unprocessable_entity response2201 returns unprocessable_entity as response2202 when `created_after` parameter is missing2203 behaves like expects unprocessable_entity response2204 returns unprocessable_entity as response2205 when `created_after` date is later than `created_before` date2206 behaves like expects unprocessable_entity response2207 returns unprocessable_entity as response2208 GET #top_labels2209 when valid parameters are given2210 succeeds2211 returns valid count2212 behaves like parameter validation2213 when user access level is lower than reporter2214 returns forbidden as response2215 when license is missing2216 returns forbidden as response2217 when `created_after` parameter is invalid2218 behaves like expects unprocessable_entity response2219 returns unprocessable_entity as response2220 when `created_after` parameter is missing2221 behaves like expects unprocessable_entity response2222 returns unprocessable_entity as response2223 when `created_after` date is later than `created_before` date2224 behaves like expects unprocessable_entity response2225 returns unprocessable_entity as response2226API::Ml::AiAssist2227 # order random2228 GET /ml/ai-assist user_is_allowed2229 when user not logged in2230 feature_flag: false, license_flag: false, result: :unauthorized2231 returns unauthorized2232 feature_flag: true, license_flag: false, result: :unauthorized2233 returns unauthorized2234 feature_flag: false, license_flag: true, result: :unauthorized2235 returns unauthorized2236 feature_flag: true, license_flag: true, result: :unauthorized2237 returns unauthorized2238 when user is logged in2239 feature_flag: false, license_flag: false, result: :not_found2240 returns not found2241 feature_flag: true, license_flag: false, result: :not_found2242 returns not found2243 feature_flag: false, license_flag: true, result: :not_found2244 returns not found2245 feature_flag: true, license_flag: true, result: :not_found2246 returns not found2247 when user is logged in and in group2248 feature_flag: false, license_flag: true, plan: nil, result: :not_found, body: {"message"=>"404 Not Found"}2249 returns not found except when both flags true2250 feature_flag: false, license_flag: false, plan: nil, result: :not_found, body: {"message"=>"404 Not Found"}2251 returns not found except when both flags true2252 feature_flag: true, license_flag: true, plan: nil, result: :ok, body: {"user_is_allowed"=>false}2253 returns not found except when both flags true2254 feature_flag: true, license_flag: false, plan: nil, result: :ok, body: {"user_is_allowed"=>false}2255 returns not found except when both flags true2256 feature_flag: false, license_flag: true, plan: :premium_plan, result: :not_found, body: {"message"=>"404 Not Found"}2257 returns not found except when both flags true2258 feature_flag: false, license_flag: false, plan: :premium_plan, result: :not_found, body: {"message"=>"404 Not Found"}2259 returns not found except when both flags true2260 feature_flag: true, license_flag: true, plan: :premium_plan, result: :ok, body: {"user_is_allowed"=>false}2261 returns not found except when both flags true2262 feature_flag: true, license_flag: false, plan: :premium_plan, result: :ok, body: {"user_is_allowed"=>false}2263 returns not found except when both flags true2264 feature_flag: false, license_flag: true, plan: :ultimate_plan, result: :not_found, body: {"message"=>"404 Not Found"}2265 returns not found except when both flags true2266 feature_flag: false, license_flag: false, plan: :ultimate_plan, result: :not_found, body: {"message"=>"404 Not Found"}2267 returns not found except when both flags true2268 feature_flag: true, license_flag: true, plan: :ultimate_plan, result: :ok, body: {"user_is_allowed"=>true}2269 returns not found except when both flags true2270 feature_flag: true, license_flag: false, plan: :ultimate_plan, result: :ok, body: {"user_is_allowed"=>true}2271 returns not found except when both flags true2272 when API feature flag is disabled2273 feature_flag: false, license_flag: true, plan: nil, result: :not_found, body: {"message"=>"404 Not Found"}2274 returns not found2275 feature_flag: false, license_flag: false, plan: nil, result: :not_found, body: {"message"=>"404 Not Found"}2276 returns not found2277 feature_flag: true, license_flag: true, plan: nil, result: :not_found, body: {"message"=>"404 Not Found"}2278 returns not found2279 feature_flag: true, license_flag: false, plan: nil, result: :not_found, body: {"message"=>"404 Not Found"}2280 returns not found2281 feature_flag: false, license_flag: true, plan: :premium_plan, result: :not_found, body: {"message"=>"404 Not Found"}2282 returns not found2283 feature_flag: false, license_flag: false, plan: :premium_plan, result: :not_found, body: {"message"=>"404 Not Found"}2284 returns not found2285 feature_flag: true, license_flag: true, plan: :premium_plan, result: :not_found, body: {"message"=>"404 Not Found"}2286 returns not found2287 feature_flag: true, license_flag: false, plan: :premium_plan, result: :not_found, body: {"message"=>"404 Not Found"}2288 returns not found2289 feature_flag: false, license_flag: true, plan: :ultimate_plan, result: :not_found, body: {"message"=>"404 Not Found"}2290 returns not found2291 feature_flag: false, license_flag: false, plan: :ultimate_plan, result: :not_found, body: {"message"=>"404 Not Found"}2292 returns not found2293 feature_flag: true, license_flag: true, plan: :ultimate_plan, result: :not_found, body: {"message"=>"404 Not Found"}2294 returns not found2295 feature_flag: true, license_flag: false, plan: :ultimate_plan, result: :not_found, body: {"message"=>"404 Not Found"}2296 returns not found2297Projects::LicensesController2298 GET #index2299 when the "Security & Compliance" feature is disabled2300 is expected to respond with numeric status code not_found2301 with authorized user2302 when feature is available2303 with reporter2304 counts usage of the feature2305 when requesting HTML2306 returns the necessary licenses app data2307 with existing report2308 returns success code2309 returns a hash with licenses2310 returns status ok2311 includes the pagination headers2312 with pagination params2313 return only 1 license2314 when software policies are applied to some of the most recently detected licenses2315 when loading all policies2316 is expected to respond with numeric status code ok2317 is expected to equal 42318 sorts by name by default2319 includes a policy for an unclassified and known license that was detected in the scan report2320 includes a policy for a denied license found in the scan report2321 includes a policy for an allowed license NOT found in the latest scan report2322 includes an entry for an unclassified and unknown license found in the scan report2323 when loading software policies that match licenses detected in the most recent license scan report2324 is expected to respond with numeric status code ok2325 only includes policies for licenses detected in the most recent scan report2326 includes an unclassified policy for a known license detected in the scan report2327 includes a classified license for a known license detected in the scan report2328 includes an unclassified and unknown license discovered in the scan report2329 when loading `allowed` software policies only2330 is expected to respond with numeric status code ok2331 is expected to equal 12332 includes only `allowed` policies2333 when loading `allowed` and `denied` software policies2334 is expected to respond with numeric status code ok2335 is expected to equal 22336 includes `denied` policies2337 includes `allowed` policies2338 when loading policies ordered by `classification` in `ascending` order2339 is expected to respond with numeric status code ok2340 is expected to eq ["allowed", "unclassified", "unclassified", "denied"]2341 when loading policies ordered by `classification` in `descending` order2342 is expected to respond with numeric status code ok2343 is expected to eq ["denied", "unclassified", "unclassified", "allowed"]2344 without existing report2345 returns status job_not_set_up2346 with maintainer2347 responds to an HTML request2348 when feature is not available2349 returns 4042350 with unauthorized user2351 returns 4042352Groups::Security::CredentialsController2353 GET #index2354 when `credentials_inventory` feature is enabled2355 for a group that enforces group managed accounts2356 for a user with access to view credentials inventory2357 responds with 2002358 filtering by type of credential2359 no credential type specified2360 behaves like filtering by `personal_access_tokens`2361 is expected to contain exactly #<PersonalAccessToken id: 297, user_id: 963, name: "PAT 297", revoked: false, expires_at: "2022-11-16...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>, #<PersonalAccessToken id: 298, user_id: 962, name: "PAT 298", revoked: false, expires_at: "2022-11-16...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>, and #<PersonalAccessToken id: 299, user_id: 963, name: "PAT 299", revoked: false, expires_at: "2022-11-16...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>2362 non-existent credential type specified2363 behaves like filtering by `personal_access_tokens`2364 is expected to contain exactly #<PersonalAccessToken id: 297, user_id: 963, name: "PAT 297", revoked: false, expires_at: "2022-11-16...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>, #<PersonalAccessToken id: 300, user_id: 962, name: "PAT 300", revoked: false, expires_at: "2022-11-16...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>, and #<PersonalAccessToken id: 301, user_id: 963, name: "PAT 301", revoked: false, expires_at: "2022-11-16...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>2365 credential type specified as `personal_access_tokens`2366 behaves like filtering by `personal_access_tokens`2367 is expected to contain exactly #<PersonalAccessToken id: 297, user_id: 963, name: "PAT 297", revoked: false, expires_at: "2022-11-16...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>, #<PersonalAccessToken id: 302, user_id: 962, name: "PAT 302", revoked: false, expires_at: "2022-11-16...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>, and #<PersonalAccessToken id: 303, user_id: 963, name: "PAT 303", revoked: false, expires_at: "2022-11-16...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>2368 user scope2369 does not show the credentials of a user outside the group2370 credential type specified as `ssh_keys`2371 filters by ssh keys2372 for a user without access to view credentials inventory2373 responds with 4042374 for a group that does not enforce group managed accounts2375 responds with 4042376 when `credentials_inventory` feature is disabled2377 returns 4042378 DELETE #destroy2379 behaves like credentials inventory delete SSH key2380 admin user2381 when `credentials_inventory` feature is enabled2382 and the ssh_key exists2383 and it removes the key2384 renders a success message2385 notifies the key owner2386 and it fails to remove the key2387 renders a failure message2388 and the ssh_key does not exist2389 renders a not found message2390 when `credentials_inventory` feature is disabled2391 returns 4042392 non-admin user2393 returns 4042394 PUT #revoke2395 when `credentials_inventory` feature is enabled2396 for a group that enforces group managed accounts2397 for a user with access to view credentials inventory2398 non-existent personal access token specified2399 behaves like responds with 4042400 is expected to respond with numeric status code not_found2401 with an existing personal access token2402 personal access token is already revoked2403 behaves like displays the flash success message2404 is expected to start with "Revoked personal access token "2405 personal access token is already expired2406 behaves like displays the flash success message2407 is expected to start with "Revoked personal access token "2408 does not have permissions to revoke the credential2409 behaves like responds with 4042410 is expected to respond with numeric status code not_found2411 personal access token is already revoked2412 behaves like displays the flash success message2413 is expected to start with "Revoked personal access token "2414 personal access token is already expired2415 behaves like displays the flash success message2416 is expected to start with "Revoked personal access token "2417 personal access token is not revoked or expired2418 informs the token owner2419 behaves like displays the flash success message2420 is expected to start with "Revoked personal access token "2421 for a user without access to view credentials inventory2422 behaves like responds with 4042423 is expected to respond with numeric status code not_found2424 for a group that does not enforce group managed accounts2425 responds with 4042426 when `credentials_inventory` feature is disabled2427 behaves like responds with 4042428 is expected to respond with numeric status code not_found2429Groups::Epics::NotesController2430 GET index2431 responds with array of notes2432 with cross-reference system note that is not visible to the current user2433 does not return any note2434 POST create2435 returns status 302 for html2436 returns status 200 for json2437 when epic was promoted from issue2438 creates reply note for discussion2439 behaves like create notes request exceeding rate limit2440 allows user in allow-list to create notes, even if the case is different2441 when rate limiter enabled2442 logs request and declines it when endpoint called more than the threshold2443 when rate limiter is disabled2444 does not log request and does not block the request2445 PUT update2446 updates the note2447 DELETE destroy2448 user is the author of a note2449 returns status 2002450 deletes the note2451 user is not the author of the note2452 returns status 4042453 POST toggle_award_emoji2454 toggles the award emoji2455 removes the already awarded emoji2456Query.project(fullPath).vulnerabilitySeveritiesCount2457 returns counts for each severity of the project's detected or confirmed vulnerabilities2458 with hasIssues filter2459 when counting vulnerabilities without issues2460 counts vulnerabilities with issues2461 when counting vulnerabilities with issues2462 counts vulnerabilities with issues2463 with hasResolution filter2464 when counting vulnerabilities without resolution2465 counts vulnerabilities with resolution2466 when counting vulnerabilities with resolution2467 counts vulnerabilities with resolution2468 with scannerId filter2469 counts vulnerabilities with issues2470API::Users2471 updating name2472 when authenticated and ldap is enabled2473 returns non-ldap user2474 when `disable_name_update_for_users` feature is available2475 when the ability to update their name is disabled for users2476 behaves like admin can update the name of a user2477 updates the user with new name2478 when the ability to update their name is not disabled for users2479 behaves like admin can update the name of a user2480 updates the user with new name2481 when `disable_name_update_for_users` feature is not available2482 behaves like admin can update the name of a user2483 updates the user with new name2484 extended audit events2485 PUT /users/:id2486 creates audit event when updating user with new password2487 POST /users/:id/block2488 creates audit event when blocking user2489 POST /user/keys2490 creates audit event when user adds a new SSH key2491 POST /users/:id/keys2492 creates audit event when admin adds a new key for a user2493 shared_runners_minutes_limit2494 PUT /users/:id2495 when user is an admin2496 updates shared_runners_minutes_limit2497 when user is not an admin2498 cannot update their own shared_runners_minutes_limit2499 when auditor field is specified2500 PUT /users/:id2501 when user is an admin2502 updates auditor status for the user2503 when licensed_feature is not available2504 cannot update auditor status for the user2505 when user is not an admin2506 cannot update auditor status for the user2507 POST /users/2508 when user is an admin2509 creates user with auditor status2510 when licensed_feature is not available2511 cannot create user with auditor status2512 when user is not an admin2513 cannot create user with auditor status2514 with group SAML2515 creates user with new identity2516 creates user with new identity without sending reset password email2517 updates user with new identity2518 fails to update user with nonexistent identity2519 fails to update user with nonexistent provider2520 contains provisioned_by_group_id parameter2521 GET /api/users?saml_provider_id2522 querying users by saml provider id2523 returns only users for the saml_provider_id2524 GET /user/:id2525 when authenticated2526 as an admin2527 and user has a plan2528 contains is_auditor parameter2529 and user is not a trial user2530 contains plan and trial2531 and user is a trial user2532 contains plan and trial2533 and user has no plan2534 returns `nil` for both plan and trial2535 as a user2536 does not contain plan and trial info2537 does not contain is_auditor parameter2538 does not contain provisioned_by_group_id parameter2539 when not authenticated2540 does not contain plan and trial info2541getting epics information2542 query for epics which start with an iid2543 when a valid iidStartsWith query is provided2544 returns the expected epics2545 when invalid iidStartsWith query is provided2546 fails with negative number2547 fails with string2548 fails if query contains line breaks2549 query for epics by created_at and updated_at2550 filters by createdBefore2551 filters by createdAfter2552 filters by updatedBefore2553 filters by updatedAfter2554 filters by a combination of created parameters provided2555 filters by a combination of created/updated parameters provided2556 returns nothing for impossible parameters2557 query for epics by time frame2558 when start_date and end_date are present2559 returns epics within timeframe2560 when only start_date is present2561 raises error2562 when only end_date is present2563 raises error2564 query for epics with events2565 can lookahead to prevent N+1 queries2566 query for epics with ancestors2567 returns only ancestors up to the last accessible ancestor2568 when user is member of cross-hierarchy group2569 returns all ancestors2570 when child_epics_from_different_hierarchies is disabled2571 returns only accessible ancestors from the same hierarchy2572 N+1 query checks2573 when requesting `award_emoji`2574 prevents N+1 queries2575 query for epics including their count2576 returns epics total count2577Projects::JobsController2578 GET #show2579 when requesting JSON2580 with shared runner that has quota2581 exposes quota information2582 with shared runner quota exceeded2583 exposes quota information2584 when shared runner has no quota2585 does not exposes quota information2586 when project is public2587 exposes quota information2588 the environment is protected2589 renders successfully2590 anonymous user2591 renders successfully2592API::ProjectClusters2593 POST /projects/:id/clusters/user2594 when user sets specific environment scope2595 creates a cluster with that specific environment2596 when does not set an specific environment scope2597 sets default environment2598 when another cluster exists2599 responds with 2012600 allows multiple clusters to be associated to project2601 PUT /projects/:id/clusters/:cluster_id2602 With a GCP cluster2603 updates the environment scope2604 With an user cluster2605 updates the environment scope2606Projects::FeatureFlagIssuesController2607 GET #index2608 returns linked issues2609 does not return linked issues for a reporter2610 orders by feature_flag_issue id2611 returns the correct relation_path when the feature flag is linked to multiple issues2612 returns the correct relation_path when multiple feature flags are linked to an issue2613 returns the correct relation_path when there are multiple linked feature flags and issues2614 does not make N+1 queries2615 returns only issues readable by the user2616 when feature flag related issues feature is unlicensed2617 does not return linked issues2618 POST #create2619 creates a link between the feature flag and the issue2620 creates a link for the correct feature flag when there are multiple feature flags and projects2621 creates a cross project link for a project in the same namespace2622 creates a cross project link for a project in another namespace2623 does not create a link for a reporter2624 does not create a cross project link when the user is not a member of the issue's project2625 does not create a cross project link when the user is a guest of the issue's project2626 does not create a link when the user cannot read the issue2627 when feature flag related issues feature is unlicensed2628 does not create a link between the feature flag and the issue2629 DELETE #destroy2630 unlinks the issue from the feature flag2631 does not unlink the issue for a reporter2632 when feature flag related issues feature is unlicensed2633 does not unlink the issue2634Projects::PipelinesController2635 GET security2636 with a sast artifact2637 with feature enabled2638 is expected to render template show2639 with feature disabled2640 is expected to redirect to "/namespace345/project356/-/pipelines/78"2641 without sast artifact2642 with feature enabled2643 is expected to redirect to "/namespace345/project356/-/pipelines/78"2644 with feature disabled2645 is expected to redirect to "/namespace345/project356/-/pipelines/78"2646 GET codequality_report2647 is expected to render template show2648 GET licenses2649 with a license scanning artifact2650 with feature enabled2651 is expected to render template show2652 with feature enabled json2653 will return license scanning report in json format2654 will return mit license allowed status2655 will return sorted by name2656 returns a JSON representation of the license data2657 approval_status2658 is expected to eq "allowed"2659 when not authorized2660 is expected to respond with numeric status code not_found2661 with feature disabled2662 is expected to redirect to "/namespace345/project356/-/pipelines/78"2663 with feature disabled json2664 will not return report2665 without license scanning artifact2666 with feature enabled2667 is expected to redirect to "/namespace345/project356/-/pipelines/78"2668 with feature enabled json2669 will return 4042670 with feature disabled2671 is expected to redirect to "/namespace345/project356/-/pipelines/78"2672 with feature disabled json2673 will return 4042674API::Geo2675 GET /geo/retrieve/:replicable_name/:replicable_id2676 valid requests2677 returns the file2678 allowed IPs2679 responds with 401 when IP is not allowed2680 responds with 200 when IP is allowed2681 invalid requests2682 responds with 401 with invalid auth header2683 responds with 401 with mismatched params in auth headers2684 responds with 404 when resource is not found2685 POST /geo/status2686 responds with 401 with invalid auth header2687 responds with 401 when the db_key_base is wrong2688 allowed IPs2689 responds with 401 when IP is not allowed2690 responds with 201 when IP is allowed2691 when requesting primary node with valid auth header2692 updates the status and responds with 2012693 ignores invalid attributes upon update2694 behaves like with terms enforced2695 responds with 2xx HTTP response code2696 /geo/proxy_git_ssh2697 POST /geo/proxy_git_ssh/info_refs_upload_pack2698 with all required params missing2699 responds with 4002700 with all required params2701 with an invalid jwt token2702 responds with 4012703 where an exception occurs2704 responds with 5002705 with a valid secret token2706 responds with 2002707 POST /geo/proxy_git_ssh/upload_pack2708 with all required params missing2709 responds with 4002710 with all required params2711 with an invalid jwt token2712 responds with 4012713 where an exception occurs2714 responds with 5002715 with a valid secret token2716 responds with 2012717 POST /geo/proxy_git_ssh/info_refs_receive_pack2718 with all required params missing2719 responds with 4002720 with all required params2721 with an invalid jwt token issuer2722 responds with 4012723 with a jwt token encoded by a different secret_token2724 responds with 4012725 where an exception occurs2726 responds with 5002727 with a valid secret token2728 responds with 2002729 POST /geo/proxy_git_ssh/receive_pack2730 with all required params missing2731 responds with 4002732 with all required params2733 with an invalid jwt token2734 responds with 4012735 where an exception occurs2736 responds with 5002737 with a valid secret token2738 responds with 2012739 GET /geo/proxy2740 rejects requests that bypassed gitlab-workhorse2741 with valid auth2742 when Geo is not being used2743 returns empty data2744 when this is a primary site2745 returns empty data2746 when this is a secondary site with unified URL2747 when a primary exists2748 returns the primary internal URL and extra proxy data2749 when a primary does not exist2750 returns empty data2751 when this is a secondary site with separate URLs2752 when a primary does not exist2753 returns empty data2754 when geo_secondary_proxy_separate_urls feature flag is disabled2755 returns empty data2756 when geo_secondary_proxy_separate_urls feature flag is enabled2757 returns the primary internal URL and extra proxy data2758 POST /geo/node_proxy/:id/graphql2759 denies access if not admin2760 requests the graphql endpoint with the post body and returns the output2761 returns empty output if remote fails2762 behaves like 404 response2763 returns 4042764Projects::ApproversController2765 #destroy2766 on a merge request2767 when the user cannot update approvers because they do not have access2768 returns a 4042769 does not destroy any approvers2770 when the user cannot update approvers because of the project setting2771 returns a 4042772 does not destroy any approvers2773 when the user can update approvers2774 destroys the provided approver2775 on a project2776 when the user cannot update approvers because they do not have access2777 returns a 4042778 does not destroy any approvers2779 when the user can update approvers2780 destroys the provided approver2781Registrations::WelcomeController2782 #continuous_onboarding_getting_started2783 without a signed in user2784 is expected to redirect to "/users/sign_in"2785 with an owner user signed in2786 is expected to render template continuous_onboarding_getting_started2787 sets the correct session key2788 with a non-owner user signed in2789 is expected to respond with numeric status code not_found2790 #trial_getting_started2791 without a signed in user2792 is expected to redirect to "/users/sign_in"2793 with an owner user signed in2794 is expected to render template trial_getting_started2795 with a non-owner user signed2796 is expected to respond with numeric status code not_found2797 #trial_onboarding_board2798 without a signed in user2799 is expected to redirect to "/users/sign_in"2800 with a non-owner user signin2801 is expected to respond with numeric status code not_found2802 with an owner user signs in2803 gitlab onboarding project is not imported yet2804 redirects to the boards path2805 gitlab onboarding project is imported yet2806 redirects to the board path2807 #update2808 without a signed in user2809 is expected to redirect to "/users/sign_up"2810 with a signed in user2811 email updates2812 when not on gitlab.com2813 when the user opted in2814 sets the email_opted_in field2815 when the user opted out2816 sets the email_opted_in field2817 when on gitlab.com2818 when registration_objective field is provided2819 sets the registration_objective2820 when setup for company is false2821 when the user opted in2822 sets the email_opted_in fields2823 when user opted out2824 does not set the rest of the email_opted_in fields2825 when setup for company is true2826 sets email_opted_in fields2827 redirection2828 when signup_onboarding is not enabled2829 is expected to redirect to "/dashboard/projects"2830 when signup_onboarding is enabled2831 when joining_project is "true"2832 is expected to redirect to "/dashboard/projects"2833 when joining_project is "false"2834 with group and project creation2835 is expected to redirect to "/users/sign_up/groups_projects/new"2836 when setup_for_company is "true"2837 is expected to redirect to "/users/sign_up/company/new?glm_content=some_content&glm_source=some_source&jobs_to_be_done_other=_jobs_to_be_done_other_®istration_objective=code_storage&role=software_developer"2838 when setup_for_company is "false"2839 is expected to redirect to "/users/sign_up/groups_projects/new"2840 when in subscription flow2841 is expected not to redirect to "/users/sign_up/groups_projects/new"2842 when in invitation flow2843 is expected not to redirect to "/users/sign_up/groups_projects/new"2844 when in trial flow2845 is expected not to redirect to "/users/sign_up/groups_projects/new"2846Creating an Iteration2847 when the user does not have permission2848 does not create iteration2849 behaves like a mutation that returns a top-level access error2850 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"2851 when the user has permission2852 when iterations are disabled2853 behaves like a mutation that returns top-level errors2854 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"2855 when iterations are enabled2856 behaves like iteration create request2857 when iteration cadence id is not provided2858 behaves like iteration creation request2859 creates a new iteration in the specified cadence2860 when iteration cadence id is provided2861 behaves like iteration creation request2862 creates a new iteration in the specified cadence2863 when title is not given2864 creates an iteration2865 when trying to add an iteration to the cadence that uses automatic scheduling2866 does not create the iteration2867 behaves like a mutation that returns errors in the response2868 is expected to contain exactly "Iterations cannot be manually added to cadences that use automatic scheduling"2869 when there are ActiveRecord validation errors2870 does not create the iteration2871 behaves like a mutation that returns errors in the response2872 is expected to contain exactly "Start date can't be blank" and "Due date can't be blank"2873 when the list of attributes is empty2874 does not create the iteration2875 behaves like a mutation that returns top-level errors2876 is expected to contain exactly "The list of iteration attributes is empty"2877 when the params contains neither group nor project path2878 does not create the iteration2879 behaves like a mutation that returns top-level errors2880 is expected to contain exactly "Exactly one of group_path or project_path arguments is required"2881 when the params contains both group and project path2882 does not create the iteration2883 behaves like a mutation that returns top-level errors2884 is expected to contain exactly "Exactly one of group_path or project_path arguments is required"2885Getting children of an epic2886 # order random2887 when epics are disabled2888 does not find the epic children2889 when epics are enabled2890 returns children from authorized groups2891 when user has access to all children groups2892 returns all children2893 executes limited number of N+1 queries2894 when include_ancestor_groups is `false`2895 excludes children from ancestor groups2896 when include_descendant_groups is `false`2897 excludes children from descendant groups2898 when include_descendant_groups and include_ancestor_groups are `false`2899 excludes children from descendant and ancestor groups2900 when child_epics_from_different_hierarchies is disabled2901 returns child epics from parent's group hierarchy2902Oauth::GeoAuthController2903 GET auth2904 redirects to root_url when state is invalid2905 without a tampered header2906 behaves like a valid redirect to to primary node's oauth endpoint2907 redirects to primary node's oauth endpoint2908 with a tampered HOST header2909 behaves like a valid redirect to to primary node's oauth endpoint2910 redirects to primary node's oauth endpoint2911 with a tampered X-Forwarded-Host header2912 behaves like a valid redirect to to primary node's oauth endpoint2913 redirects to primary node's oauth endpoint2914 GET callback2915 redirection2916 redirects to login screen if state is invalid2917 with a valid state2918 does not display a flash message2919 without a tampered header2920 behaves like a valid redirect to redirect_url2921 redirects to primary node's oauth endpoint2922 with a tampered HOST header2923 behaves like a valid redirect to redirect_url2924 redirects to primary node's oauth endpoint2925 with a tampered X-Forwarded-Host header2926 behaves like a valid redirect to redirect_url2927 redirects to primary node's oauth endpoint2928 invalid credentials2929 handles invalid credentials error2930 non-existent remote user2931 handles non-existent remote user error2932 non-existent local user2933 handles non-existent local user error2934 GET logout2935 when access_token is valid2936 logs out and redirects to the root_url2937 when access_token is invalid2938 shows access token errors2939Groups::Analytics::CycleAnalyticsController2940 GET show2941 when the license is available2942 succeeds2943 increments usage counter2944 renders `show` template when feature flag is enabled2945 when the initial, default value stream is requested2946 renders the default in memory value stream2947 when invalid name is given2948 renders 404 error2949 tracking events2950 tracks redis hll event2951 behaves like Snowplow event tracking2952 is not emitted if FF is disabled2953 is emitted2954 when the license is missing2955 renders 403 error2956 when non-existent group is given2957 renders 404 error2958 with group and value stream params2959 builds request params with group and value stream2960 GET use_aggregated_backend2961 when the license is not available2962 renders 403 error2963 when the license is available2964 succeeds2965 when non-existent group is given2966 renders 404 error2967 when the aggregation record is already created2968 succeeds2969get list of epics for an epic board list2970 sorting and pagination2971 behaves like sorted paginated query2972 behaves like requires variables2973 shared example requires variables to be set2975 when sorting2976 sorts correctly2977 when paginating2978 paginates correctly2979 with filters2980 finds only epics matching the filter2981 when negated2982 finds only epics matching the negated filter2983Projects::Security::ApiFuzzingConfigurationController2984 when the "Security & Compliance" feature is disabled2985 is expected to respond with numeric status code not_found2986 GET #show2987 behaves like SecurityDashboardsPermissions2988 access for all actions2989 when security dashboard feature is disabled2990 returns 4042991 when security dashboard feature is enabled2992 when user has guest access2993 denies access2994 when user has developer access2995 grants access2996 with authorized user2997 renders the show template2998 renders the side navigation with the correct submenu set as active2999 with unauthorized user3000 returns a 4033001Getting code coverage summary in a project3002 behaves like a working graphql query3003 returns a successful response3004 when project has coverage3005 for the default branch3006 contains code coverage summary data3007 not for the default branch3008 returns nil3009 when project does not have coverage3010 returns nil3011Update of an existing issue3012 updates the issue3013 setting epic3014 sets the epic3015 the epic is not readable to the current user3016 does not set the epic3017 the epic is not an epic3018 does not set the epic3019 removing epic3020 removes the epic3021 the epic argument is not provided3022 does not remove the epic3023Query.instanceSecurityDashboard.projects3024 with logged in user3025 requesting projects in the dashboard3026 behaves like a working graphql query3027 returns a successful response3028 finds only projects that were added to instance security dashboard3029 when loading vulnerabilityGrades alongside with Vulnerability.userNotesCount3030 behaves like a working graphql query3031 returns a successful response3032 finds vulnerability grades for only projects that were added to instance security dashboard3033 requesting clusterAgents in the dashboard3034 behaves like a working graphql query3035 returns a successful response3036 finds only projects that were added to instance security dashboard3037 with no user3038 behaves like a working graphql query3039 returns a successful response3040 is expected to be nil3041Unassigns scan execution policy project from a project/namespace3042 for project3043 behaves like unassigns security policy project3044 when licensed feature is available3045 when user is an owner of the container3046 when there is no security policy project assigned to the container3047 does not unassign the security policy project3048 when security policy project is assigned to the container3049 unassigns the security policy project3050 when user is not an owner3051 behaves like a mutation that returns top-level errors3052 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3053 when feature is not licensed3054 behaves like a mutation that returns top-level errors3055 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3056 for namespace3057 behaves like unassigns security policy project3058 when licensed feature is available3059 when user is an owner of the container3060 when there is no security policy project assigned to the container3061 does not unassign the security policy project3062 when security policy project is assigned to the container3063 unassigns the security policy project3064 when user is not an owner3065 behaves like a mutation that returns top-level errors3066 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3067 when feature is not licensed3068 behaves like a mutation that returns top-level errors3069 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3070Creating an Issue from a Security::Finding3071 # order random3072 when deprecate_vulnerabilities_feedback feature flag is enabled3073 when the user does not have permission3074 does not create a new vulnerability3075 does not create a new issue3076 does not create a new issue link3077 behaves like a mutation that returns a top-level access error3078 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3079 when the user has permission3080 with valid parameters3081 returns a successful response3082 does create a new vulnerability3083 does create a new issue3084 does create a new issue link3085 when security_dashboard is disabled3086 behaves like a mutation that returns top-level errors3087 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3088 when deprecate_vulnerabilities_feedback feature flag is disabled3089 returns a successful response with a blank issue3090Set project compliance framework3091 #resolve3092 when feature is not available3093 behaves like a mutation that returns top-level errors3094 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3095 when feature is available3096 behaves like a working GraphQL mutation3097 with a personal access token3098 behaves like prevents access to the mutation3099 does not resolve the mutation3100 behaves like allows access to the mutation3101 behaves like a working graphql query3102 returns a successful response3103 returns data3104 with an OAuth token3105 behaves like prevents access to the mutation3106 does not resolve the mutation3107 behaves like allows access to the mutation3108 behaves like a working graphql query3109 returns a successful response3110 returns data3111Dashboard::ProjectsController3112 #removed3113 when licensed3114 for admin users3115 returns success3116 paginates the records3117 returns projects marked for deletion3118 for non-admin users3119 returns success3120 paginates the records3121 for should_check_namespace_plan3122 should_check_namespace_plan: false, removed_projects_count: 33123 accounts total removable projects3124 should_check_namespace_plan: true, removed_projects_count: 23125 accounts total removable projects3126 when not licensed3127 behaves like returns not found3128 is expected to respond with numeric status code not_found3129API::Internal::AppSec::Dast::SiteValidations3130 POST /internal/dast/site_validations/:id/transition3131 when a job token header is not set3132 returns 4013133 when user token is set3134 returns 400 and a contextual error message3135 when a job token header is set3136 when user does not have access to the site validation3137 returns 4033138 when site validation does not exist3139 returns 4043140 when site validation and job are associated with different projects3141 returns 4003142 when the job project belongs to the same job token scope3143 returns 400 and a contextual error message3144 when site validation exists3145 when the licensed feature is not available3146 returns 4033147 when user has access to the site validation3148 when the state transition is unknown3149 returns 400 and a contextual error message3150 when the state transition is invalid3151 returns 400 and a contextual error message3152 when the state transition is valid3153 updates the record3154 behaves like it transitions3155 returns 200 and the new state3156 calls the underlying transition method: #start3157 behaves like it transitions3158 returns 200 and the new state3159 calls the underlying transition method: #fail_op3160 behaves like it transitions3161 returns 200 and the new state3162 calls the underlying transition method: #retry3163 behaves like it transitions3164 returns 200 and the new state3165 calls the underlying transition method: #pass3166Creating an External Issue Link3167 when the user does not have permission3168 does not create external issue link3169 behaves like a mutation that returns a top-level access error3170 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3171 when the user has permission3172 when security_dashboard is disabled3173 behaves like a mutation that returns top-level errors3174 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3175 when security_dashboard is enabled3176 when jira is not configured3177 responds with error3178 when jira is configured3179 when issue creation succeeds3180 and saving external issue link succeeds3181 creates the external issue link and returns nil for external issue to be fetched using query3182 and saving external issue link fails3183 creates the external issue link3184 when issue creation fails3185 does not create the external issue link3186Query.group(fullPath).projects.dastProfiles.dastProfileSchedule3187 when a user has access to dast_profile_schedule3188 returns a dast_profile_schedule3189 behaves like query dastProfiles.dastProfileSchedule shared examples3190 avoids N+1 queries3191Groups::Analytics::CycleAnalytics::ValueStreamsController3192 GET #index3193 returns an empty array3194 when persisted value streams present3195 succeeds3196 POST #create3197 with valid params3198 returns a successful 200 response3199 with invalid params3200 returns an unprocessable entity 422 response3201 with stages3202 persists the value stream with stages3203 when using the new start and end event params format3204 succeeds3205 when invalid stage is given3206 renders errors with unprocessable entity, 422 response3207 PUT #update3208 with valid params3209 returns a successful 200 response3210 when updating value stream with in-memory stages3211 returns a successful 200 response3212 with stages3213 returns a successful 200 response3214 when using the new start and end event params format3215 succeeds3216 when deleting the stage by excluding it from the stages array3217 returns a successful 200 response3218 DELETE #destroy3219 when it is a custom value stream3220 deletes the value stream and its stages, and returns a successful 200 response3221Admin::AuditLogsController3222 GET #index3223 licensed3224 tracks search event3225 pagination3226 paginates audit events, without casting a count query3227 behaves like tracking unique visits3228 tracks unique visit if the format is HTML3229 tracks unique visit if DNT is not enabled3230 does not track unique visit if DNT is enabled3231 does not track unique visit if the format is JSON3232 when invalid date3233 created_before: "invalid-date", created_after: nil3234 returns an error3235 created_before: nil, created_after: true3236 returns an error3237 created_before: "2021-13-10", created_after: nil3238 returns an error3239 created_before: nil, created_after: "2021-02-31"3240 returns an error3241 created_before: "2021-03-31", created_after: "2021-02-31"3242 returns an error3243 when date range is greater than limit3244 behaves like a date range error is returned3245 created_after: "2021-01-01", created_before: "2021-02-02"3246 returns an error3247 created_after: "2022-01-31", created_before: nil3248 returns an error3249 by user3250 finds the user by id when provided with a entity_id3251 finds the user by username when provided with a entity_username3252Query.project(fullPath).dastSiteProfiles3253 when a user does not have access to the project3254 returns a null project3255 when a user does not have access to dast_site_profiles3256 returns an empty edges array3257 when a user has access dast_site_profiles3258 returns populated edges array3259 returns a populated edges array containing a dast_site_profile associated with the project3260 avoids N+1 queries3261 when there are fewer dast_site_profiles than the page limit3262 indicates there are no more pages available3263 when there are more dast_site_profiles than the page limit3264 indicates there are more pages available3265 when on demand scan licensed feature is not available3266 returns an empty edges array3267JwtController3268 with IP restriction3269 group with restriction3270 address is within the range3271 behaves like successful JWT auth3272 allows access3273 with project deploy token3274 behaves like successful JWT auth with token3275 read: true, write: false, expected_actions: ["pull"]3276 behaves like successful JWT auth3277 allows access3278 read: false, write: true, expected_actions: ["push"]3279 behaves like successful JWT auth3280 allows access3281 read: true, write: true, expected_actions: ["push", "pull"]3282 behaves like successful JWT auth3283 allows access3284 with group deploy token3285 behaves like successful JWT auth with token3286 read: true, write: false, expected_actions: ["pull"]3287 behaves like successful JWT auth3288 allows access3289 read: false, write: true, expected_actions: ["push"]3290 behaves like successful JWT auth3291 allows access3292 read: true, write: true, expected_actions: ["push", "pull"]3293 behaves like successful JWT auth3294 allows access3295 address is outside the range3296 behaves like unsuccessful JWT auth3297 denies access3298 with deploy token credentials3299 with project deploy token3300 behaves like unsuccessful JWT auth3301 denies access3302 with group deploy token3303 behaves like unsuccessful JWT auth3304 denies access3305 authenticating against container registry3306 when Group SSO is enforced3307 behaves like successful JWT auth3308 allows access3309Query.runner(id)3310 upgradeStatus3311 requested by non-paid user3312 with RunnerUpgradeCheck returning :available3313 behaves like runner details fetch operation returning expected upgradeStatus3314 retrieves expected fields3315 requested on an instance with runner_upgrade_management3316 with RunnerUpgradeCheck returning :error3317 behaves like runner details fetch operation returning expected upgradeStatus3318 retrieves expected fields3319 with RunnerUpgradeCheck returning :not_available3320 behaves like runner details fetch operation returning expected upgradeStatus3321 retrieves expected fields3322 with RunnerUpgradeCheck returning :available3323 behaves like runner details fetch operation returning expected upgradeStatus3324 retrieves expected fields3325 with RunnerUpgradeCheck returning :recommended3326 behaves like runner details fetch operation returning expected upgradeStatus3327 retrieves expected fields3328 with RunnerUpgradeCheck returning :invalid_version3329 behaves like runner details fetch operation returning expected upgradeStatus3330 retrieves expected fields3331 requested by paid user3332 with RunnerUpgradeCheck returning :not_available3333 behaves like runner details fetch operation returning expected upgradeStatus3334 retrieves expected fields3335 with RunnerUpgradeCheck returning :available3336 behaves like runner details fetch operation returning expected upgradeStatus3337 retrieves expected fields3338 with RunnerUpgradeCheck returning :recommended3339 behaves like runner details fetch operation returning expected upgradeStatus3340 retrieves expected fields3341 integration test with Gitlab::Ci::RunnerUpgradeCheck3342 retrieves expected fields3343Admin::Geo::SettingsController3344 #show3345 without a valid license3346 does not redirects to the 403 page3347 does show license alert3348 with a valid license3349 does not show license alert3350 #update3351 with a valid license3352 sets the geo node property in ApplicationSetting3353 redirects the update to the referer3354API::Ldap3355 GET /ldap/groups3356 when unauthenticated3357 returns authentication error3358 when authenticated as user3359 returns authentication error3360 when group owners are allowed to manage LDAP3361 returns an array of ldap groups3362 when authenticated as admin3363 returns an array of ldap groups3364 GET /ldap/ldapmain/groups3365 when unauthenticated3366 returns authentication error3367 when authenticated as user3368 returns authentication error3369 when group owners are allowed to manage LDAP3370 returns an array of ldap groups3371 when authenticated as admin3372 returns an array of ldap groups3373getting Incident Management escalation policies3374 without project permissions3375 is expected to be nil3376 behaves like a working graphql query3377 returns a successful response3378 with project permissions3379 with unavailable feature3380 is expected to be empty3381 behaves like a working graphql query3382 returns a successful response3383 without escalation policies3384 is expected to be empty3385 behaves like a working graphql query3386 returns a successful response3387 with escalation policies3388 returns the correct properties of the escalation policy3389 behaves like a working graphql query3390 returns a successful response3391 requesting single policy3392 returns the correct properties of the escalation policy3393 behaves like a working graphql query3394 returns a successful response3395Delete a compliance framework3396 feature is unlicensed3397 does not destroy a compliance framework3398 behaves like a mutation that returns top-level errors3399 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3400 when licensed3401 current_user is namespace owner3402 has no errors3403 destroys a compliance framework3404 current_user is not namespace owner3405 does not destroy a compliance framework3406 behaves like a mutation that returns top-level errors3407 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3408Setting weight of an issue3409 returns an error if the user is not allowed to update the issue3410 when weight is a number3411 updates the issue weight3412 when weight is null3413 updates the issue weight3414 when weight is not an integer3415 raises invalid value error3416Projects::Security::VulnerabilityReportController3417 when the "Security & Compliance" feature is disabled3418 is expected to respond with numeric status code not_found3419 behaves like SecurityDashboardsPermissions3420 access for all actions3421 when security dashboard feature is disabled3422 returns 4043423 when security dashboard feature is enabled3424 when user has guest access3425 denies access3426 when user has developer access3427 grants access3428 GET #index3429 when project has no vulnerabilities3430 renders empty state3431 when project has vulnerabilities3432 renders dashboard with vulnerability metadata3433Groups::UsageQuotasController3434 GET #index3435 when user has read_usage_quotas permission3436 renders index with 200 status code3437 behaves like seat count alert3438 when the namespace qualifies for the alert3439 sets the seat_count_data3440 when the namespace does not qualify for the alert3441 sets the seat_count_data to nil3442 when user does not have read_usage_quotas permission3443 renders not_found3444 GET #pending_members3445 renders the pending members index3446 when user cap feature is unavailable3447 returns 4043448 when user does not have permission for pending members index3449 renders not_found3450NamespaceCiCdSettingsUpdate3451 when unauthorized3452 when not a namespace member3453 behaves like unauthorized3454 returns an error3455 when a non-admin namespace member3456 behaves like unauthorized3457 returns an error3458 when authorized3459 updates allow_stale_runner_pruning?3460 does not update allow_stale_runner_pruning? if not specified3461 when bad arguments are provided3462 returns the errors3463Query.project(fullPath).dastProfile3464 when a user does not have access to the project3465 returns a null project3466 when a user does not have access to the dast_profile3467 returns a null dast_profile3468 when a user has access to the dast_profile3469 returns a dast_profile3470 when on demand scan licensed feature is not available3471 returns a null dast_profile3472Deleting an iteration3473 when the user does not have permission3474 behaves like a mutation that returns a top-level access error3475 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3476 when the user has permission3477 when iterations feature is disabled3478 behaves like a mutation that returns top-level errors3479 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3480 when iterations feature is enabled3481 when iteration belongs to a manual cadence3482 deletes the iteration3483 when iteration belongs to an automatic cadence3484 behaves like a mutation that returns top-level errors3485 is expected to contain exactly "Deleting iterations from automatic iteration cadences is not allowed."3486 when required arguments are missing3487 returns error about required argument3488API::Templates3489 GET /templates/dockerfiles3490 includes the custom template in the response3491 excludes the custom template when the feature is disabled3492 GET /templates/dockerfiles/custom3493 returns the custom template3494 returns 404 when the feature is disabled3495 GET /templates/gitignores3496 includes the custom template in the response3497 excludes the custom template when the feature is disabled3498 GET /templates/gitignores/custom3499 returns the custom template3500 returns 404 when the feature is disabled3501 GET /templates/gitlab_ci_ymls3502 includes the custom template in the response3503 excludes the custom template when the feature is disabled3504 GET /templates/gitlab_ci_ymls/custom3505 returns the custom template3506 returns 404 when the feature is disabled3507 GET /templates/licenses3508 includes the custom template in the response3509 excludes the custom template when the feature is disabled3510 GET /templates/licenses/custom3511 returns the custom template3512 returns 404 when the feature is disabled3513Registrations::Verification3514 #require_verification3515 verification is not required3516 does not redirect3517 verification is required3518 redirects to the new users sign_up groups_project path3519 does not redirect on JS requests3520 does not redirect on POST requests3521 does not redirect when the experiment is inactive3522 #set_requires_verification3523 sets the requires_credit_card_verification attribute3524 when a credit card validation exists3525 does not change the requires_credit_card_verification attribute3526Reposition and move issue within board lists3527 when user can admin issue3528 when user can read epic3529 updates issue position and epic3530 when user sets nil epic3531 updates issue position and epic is unassigned3532 when user can not read epic3533 does not set epic3534Query current user groups3535 when permission_scope is CREATE_PROJECTS3536 behaves like a working graphql query3537 returns a successful response3538 when ip_restrictions feature is enabled3539 when check_namespace_plan setting is enabled3540 behaves like no N + 1 DB queries3541 avoids N+1 queries3542 when check_namespace_plan setting is disabled3543 behaves like no N + 1 DB queries3544 avoids N+1 queries3545Project creation via Registrations::GroupsProjectsController3546 # order random3547 POST #create3548 with an authenticated user3549 when group and project can be created3550 creates a group3551 when group already exists and project can be created3552 creates a project3553Creating an iteration cadence3554 when the user does not have permission3555 does not create iteration cadence3556 behaves like a mutation that returns a top-level access error3557 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3558 when the user has permission3559 when iterations feature is disabled3560 behaves like a mutation that returns top-level errors3561 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3562 when iterations feature is enabled3563 creates the iteration cadence for a group3564 when creating a manual iteration cadence3565 creates an iteration cadence3566 when there are ActiveRecord validation errors3567 does not create the iteration cadence3568 behaves like a mutation that returns errors in the response3569 is expected to contain exactly "Iterations in advance can't be blank", "Start date can't be blank", and "Title can't be blank"3570 when required arguments are missing3571 returns error about required argument3572 does not create the iteration cadence3573Deleting a DAST Site Profile3574 behaves like an on-demand scan mutation when user cannot run an on-demand scan3575 when a user does not have access to the project3576 behaves like a mutation that returns a top-level access error3577 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3578 when a user does not have access to run a dast scan on the project3579 behaves like a mutation that returns a top-level access error3580 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3581 behaves like an on-demand scan mutation when user can run an on-demand scan3582 returns an empty errors array3583 deletes the dast_site_profile3584 when on demand scan licensed feature is not available3585 behaves like a mutation that returns a top-level access error3586 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3587 when there is an issue deleting the dast_site_profile3588 behaves like a mutation that returns errors in the response3589 is expected to contain exactly "Name is weird"3590 when the dast_site_profile does not exist3591 behaves like a mutation that returns top-level errors3592 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3593 when wrong type of global id is passed3594 behaves like a mutation that returns top-level errors3595 is expected to eq ["Variable $dastSiteProfileDeleteInput of type DastSiteProfileDeleteInput! was provided invalid value for id (\"gid://gitlab/DastSite/18\" does not represent an instance of DastSiteProfile)"]3596getting iterations3597 query for iteration cadence3598 returns all group cadences3599 by global id3600 fetching cadences from group level3601 behaves like returns cadence by id3602 returns cadence3603 from a different group3604 behaves like returns cadence by id3605 returns cadence3606 fetching cadences from project level3607 behaves like returns cadence by id3608 returns cadence3609Projects::IncidentManagement::EscalationPoliciesController3610 GET #index3611 with read permissions3612 renders index with 200 status code3613 with admin permissions3614 renders index with 200 status code3615 unauthorized3616 responds with 4043617 with unavailable feature3618 responds with 4043619 with unavailable on-call schedules feature3620 responds with 4043621Projects::Security::ScannedResourcesController3622 GET index3623 when the "Security & Compliance" feature is disabled3624 is expected to respond with numeric status code not_found3625 when DAST security scan is found3626 returns the CSV data3627 when pipeline_id is from a dangling pipeline3628 returns the CSV data3629 when the pipeline id is missing3630 raises an error when pipeline_id param is missing3631Projects::Settings::RepositoryController3632 GET show3633 push rule3634 is created3635 is connected to project_settings3636 unlicensed3637 is not created3638learn about features3639 GET /groups/:group_id/-/discover_premium_and_ultimate3640 check_namespace_plan?: true, group_is_eligible_for_trial?: true, user_can_admin_group?: true, examples_to_run: "renders the page"3641 behaves like renders the page3642 renders the view3643 check_namespace_plan?: false, group_is_eligible_for_trial?: true, user_can_admin_group?: true, examples_to_run: "returns 404"3644 behaves like returns 4043645 returns a 404 status3646 check_namespace_plan?: true, group_is_eligible_for_trial?: false, user_can_admin_group?: true, examples_to_run: "returns 404"3647 behaves like returns 4043648 returns a 404 status3649 check_namespace_plan?: true, group_is_eligible_for_trial?: true, user_can_admin_group?: false, examples_to_run: "returns 404"3650 behaves like returns 4043651 returns a 404 status3652API::Markdown EE Golden Master3653 examples must be unique and alphabetized by name3654 for attachment_link_for_group_wiki (api_context: group_wiki)3655 verifies conversion of GFM to HTML3656Projects::IssueLinksController3657 GET #index3658 returns success response3659 POST #create3660 returns success response3661 when blocked issues is disabled3662 returns failure response3663MergeRequestReviewer3664 when requesting information about MR interactions3665 when the user does not have any applicable rules3666 returns null data3667 when the user has interacted3668 returns appropriate data3669API::Ci::Runner3670 PATCH /api/v4/jobs/:id/trace3671 tracks CI minutes usage of running job3672 when CI minutes usage is exceeded3673 drops the job3674 when CI minutes usage is not exceeded3675 does not drop the job3676Query.vulnerabilities.details3677 returns a vulnerability details3678Getting ancestors of an epic3679 when epics are enabled3680 finds ancestors from group3681 when user has access to the parent group epics3682 finds ancestors from group and parent group3683 when epics are disabled3684 does not find the epic ancestors3685API::Ci::Runner3686 PUT /api/v4/jobs/:id3687 tracks CI minutes usage of running job3688 when CI minutes usage is exceeded3689 drops the job3690 when CI minutes usage is not exceeded3691 does not drop the job3692Creating an issuable resource link3693 creates issuable resource link3694 returns error3695 when link is invalid3696 returns nil3697CustomersDot::ProxyController3698 POST graphql3699 with user signed in3700 behaves like customersdot proxy3701 forwards request body to customers dot3702 responds with customers dot status3703 responds with customers dot response body3704 with no user signed in3705 behaves like customersdot proxy3706 forwards request body to customers dot3707 responds with customers dot status3708 responds with customers dot response body3709getting merge request information nested in a project3710 # order random3711 suggestedReviewers3712 when suggested reviewers is available for the project3713 returns the right suggested reviewers3714 when suggested reviewers is not available for the project3715 returns nil3716Query.project(fullPath).pushRules3717 returns nil when push_rules license is false3718 pushRules.rejectUnsignedCommits3719 field_value: true, license_value: true, expected: true3720 returns3721 field_value: true, license_value: false, expected: false3722 returns3723 field_value: false, license_value: true, expected: false3724 returns3725 field_value: false, license_value: false, expected: false3726 returns3727Getting the current Geo node3728 returns the current GeoNode3729 behaves like a working graphql query3730 returns a successful response3731 connection fields3732 when selectiveSyncNamespaces is queried3733 returns selective sync namespaces3734 supports cursor-based pagination3735Exporting Requirements3736 when the user does not have permission3737 behaves like requirements export fails3738 does not schedule export job3739 behaves like a mutation that returns a top-level access error3740 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3741 when the user has permission3742 when requirements are disabled3743 behaves like requirements export fails3744 does not schedule export job3745 behaves like a mutation that returns a top-level access error3746 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3747 when requirements are enabled3748 schedules job to export requirements3749API::Ci::Pipelines3750 DELETE /projects/:id/pipelines/:pipeline_id3751 authorized user3752 when audit events is enabled3753 does not log an audit event3754Activate a subscription3755 persists license key3756 when there are future subscriptions3757 persists license key and stores future subscriptions3758callout alerts3759 new_user_signups_cap_reached3760 when cap reached3761 behaves like a visible alert3762 shows the alert3763 when cap not reached3764 behaves like a hidden alert3765 does not show the alert3766 when user is not admin3767 behaves like a hidden alert3768 does not show the alert3769Oauth::ApplicationsController3770 project members3771 POST #create3772 logs the audit event3773API::IssueLinks3774 POST /links3775 when creating a blocked relationship3776 when feature is enabled3777 returns 201 status and contains the expected link response3778 when feature is disabled3779 returns 4033780Groups::Settings::CiCdController3781 # order random3782 as an owner3783 GET #show3784 renders group protected environments3785 excludes the deployment tier from dropdown if a corresponding environment is protected3786Admin::GroupsController3787 POST #reset_runner_minutes3788 when the reset is successful3789 redirects to group path3790 PUT #update3791 converts the user entered MB value into bytes3792TrialRegistrationsController3793 POST new3794 when email_opted_in does not exist in params3795 sets user email_opted_in to false3796 when email_opted_in is true in params3797 sets user email_opted_in to true3798API::API3799 logging3800 when the method is not allowed3801 logs the route and context metadata for the client3802CreateApiFuzzingCiConfiguration3803 returns a YAML snippet that can be used to configure API fuzzing scans for the project3804Emails::UserCap3805 #user_cap_reached3806 sends mail with expected contents3807Profiles::KeysController3808 #create3809 logs the audit event3810Knapsack report was generated. Preview:3811{3812 "ee/spec/requests/api/graphql/geo/registries_spec.rb": 92.74669380099999,3813 "ee/spec/requests/api/scim_spec.rb": 84.49171373699994,3814 "ee/spec/controllers/projects_controller_spec.rb": 62.98797706899995,3815 "ee/spec/controllers/groups/epics_controller_spec.rb": 47.57004425100001,3816 "ee/spec/requests/api/epic_issues_spec.rb": 39.11605966999991,3817 "ee/spec/requests/api/project_approval_settings_spec.rb": 31.421855271999902,3818 "ee/spec/controllers/groups/clusters_controller_spec.rb": 36.863413921000074,3819 "ee/spec/requests/api/group_push_rule_spec.rb": 23.53088508099995,3820 "ee/spec/controllers/projects/merge_requests/creations_controller_spec.rb": 20.40166890499995,3821 "ee/spec/controllers/groups/group_members_controller_spec.rb": 22.077401675000146,3822 "ee/spec/requests/api/status_checks_spec.rb": 15.689683099999911,3823 "ee/spec/controllers/groups/analytics/tasks_by_type_controller_spec.rb": 16.775344523000058,3824 "ee/spec/requests/api/ml/ai_assist_spec.rb": 11.582738863999793,3825 "ee/spec/controllers/projects/licenses_controller_spec.rb": 17.29530779999982,3826 "ee/spec/requests/groups/security/credentials_controller_spec.rb": 18.59812636899983,3827 "ee/spec/controllers/groups/epics/notes_controller_spec.rb": 18.470325645999992,3828 "ee/spec/requests/api/graphql/project/vulnerability_severities_count_spec.rb": 15.84832776799999,3829 "ee/spec/requests/api/users_spec.rb": 14.393073268999842,3830 "ee/spec/requests/api/graphql/epics/epic_resolver_spec.rb": 16.941030386999955,3831 "ee/spec/controllers/ee/projects/jobs_controller_spec.rb": 15.377436173999968,3832 "ee/spec/requests/api/project_clusters_spec.rb": 10.354859110999996,3833 "ee/spec/controllers/projects/feature_flag_issues_controller_spec.rb": 8.761699958000008,3834 "ee/spec/controllers/projects/legacy_pipelines_controller_spec.rb": 8.291284245000043,3835 "ee/spec/requests/api/geo_spec.rb": 4.115570652000088,3836 "ee/spec/controllers/projects/approvers_controller_spec.rb": 9.86713115700013,3837 "ee/spec/controllers/registrations/welcome_controller_spec.rb": 5.377964637000105,3838 "ee/spec/requests/api/graphql/mutations/iterations/create_spec.rb": 6.940848254999992,3839 "ee/spec/requests/api/graphql/group/epic/epic_children_spec.rb": 9.07079804,3840 "ee/spec/controllers/oauth/geo_auth_controller_spec.rb": 8.012906235000173,3841 "ee/spec/controllers/groups/analytics/cycle_analytics_controller_spec.rb": 9.207361615000082,3842 "ee/spec/requests/api/graphql/boards/epic_board_list_epics_query_spec.rb": 8.16392458700011,3843 "ee/spec/controllers/projects/security/api_fuzzing_configuration_controller_spec.rb": 5.891910511999868,3844 "ee/spec/requests/api/graphql/project/code_coverage_summary_spec.rb": 5.95538112700001,3845 "ee/spec/requests/api/graphql/mutations/issues/update_spec.rb": 6.811056954000151,3846 "ee/spec/requests/api/graphql/instance_security_dashboard_spec.rb": 6.868068067999957,3847 "ee/spec/requests/api/graphql/mutations/security_policy/unassign_security_policy_project_spec.rb": 5.083274605000042,3848 "ee/spec/requests/api/graphql/mutations/security/finding/create_issue_spec.rb": 6.945121886999914,3849 "ee/spec/requests/api/graphql/mutations/projects/set_compliance_framework_spec.rb": 3.985032474000036,3850 "ee/spec/controllers/ee/dashboard/projects_controller_spec.rb": 5.859089800999982,3851 "ee/spec/requests/api/internal/app_sec/dast/site_validations_spec.rb": 4.174284603999922,3852 "ee/spec/requests/api/graphql/mutations/vulnerabilities/create_external_issue_link_spec.rb": 4.38439376700012,3853 "ee/spec/requests/api/graphql/group/dast_profile_schedule_spec.rb": 7.070607848999998,3854 "ee/spec/controllers/groups/analytics/cycle_analytics/value_streams_controller_spec.rb": 5.084186782000188,3855 "ee/spec/controllers/admin/audit_logs_controller_spec.rb": 1.904026303000137,3856 "ee/spec/requests/api/graphql/project/dast_site_profiles_spec.rb": 4.614176375999932,3857 "ee/spec/requests/jwt_controller_spec.rb": 4.657054369999969,3858 "ee/spec/requests/api/graphql/ci/runner_spec.rb": 2.983221618000016,3859 "ee/spec/controllers/admin/geo/settings_controller_spec.rb": 4.395113491999837,3860 "ee/spec/requests/api/ldap_spec.rb": 1.2842036810000081,3861 "ee/spec/requests/api/graphql/project/incident_management/escalation_policies_spec.rb": 3.985798749999958,3862 "ee/spec/requests/api/graphql/mutations/compliance_management/frameworks/destroy_spec.rb": 2.508811582999897,3863 "ee/spec/requests/api/graphql/mutations/issues/set_weight_spec.rb": 4.2564980439999545,3864 "ee/spec/controllers/projects/security/vulnerability_report_controller_spec.rb": 5.438054297000008,3865 "ee/spec/controllers/groups/usage_quotas_controller_spec.rb": 2.457575375000033,3866 "ee/spec/requests/api/graphql/mutations/ci/namespace_ci_cd_settings_update_spec.rb": 2.348546497000143,3867 "ee/spec/requests/api/graphql/project/dast_profile_spec.rb": 2.66307586899984,3868 "ee/spec/requests/api/graphql/mutations/iterations/delete_spec.rb": 2.6302626310000505,3869 "ee/spec/requests/api/templates_spec.rb": 2.211435749999964,3870 "ee/spec/controllers/concerns/registrations/verification_spec.rb": 2.293877957999939,3871 "ee/spec/requests/api/graphql/mutations/boards/issues/issue_move_list_spec.rb": 2.9005893439998545,3872 "ee/spec/requests/api/graphql/current_user/groups_query_spec.rb": 4.030115125000066,3873 "ee/spec/requests/registrations/project_creation_spec.rb": 2.5810476369999833,3874 "ee/spec/requests/api/graphql/mutations/iterations/cadences/create_spec.rb": 3.162600230999942,3875 "ee/spec/requests/api/graphql/mutations/dast_site_profiles/delete_spec.rb": 3.248848943999974,3876 "ee/spec/requests/api/graphql/iterations/cadences_spec.rb": 2.2673477220000677,3877 "ee/spec/controllers/projects/incident_management/escalation_policies_controller_spec.rb": 2.6372914420001052,3878 "ee/spec/controllers/projects/security/scanned_resources_controller_spec.rb": 2.4060927000000447,3879 "ee/spec/controllers/projects/settings/repository_controller_spec.rb": 2.6583205110000563,3880 "ee/spec/requests/groups/feature_discovery_moments_spec.rb": 1.7253115139999409,3881 "ee/spec/requests/api/markdown_golden_master_spec.rb": 2.481938085000138,3882 "ee/spec/controllers/projects/issue_links_controller_spec.rb": 2.184972947999995,3883 "ee/spec/requests/api/graphql/merge_request_reviewer_spec.rb": 2.0934115750001183,3884 "ee/spec/requests/api/ci/runner/jobs_trace_spec.rb": 1.568504996999991,3885 "ee/spec/requests/api/graphql/vulnerabilities/details_spec.rb": 2.03695087899996,3886 "ee/spec/requests/api/graphql/group/epic/epic_ancestors_spec.rb": 2.406826861000127,3887 "ee/spec/requests/api/ci/runner/jobs_put_spec.rb": 1.2592592600001353,3888 "ee/spec/requests/api/graphql/mutations/incident_management/issuable_resource_link/create_spec.rb": 1.2712094400001206,3889 "ee/spec/requests/customers_dot/proxy_controller_spec.rb": 1.2725206790000811,3890 "ee/spec/requests/api/graphql/project/merge_request_spec.rb": 1.7516578929999014,3891 "ee/spec/requests/api/graphql/project/push_rules_spec.rb": 1.5938581940001768,3892 "ee/spec/requests/api/graphql/geo/geo_node_spec.rb": 1.5542608779999227,3893 "ee/spec/requests/api/graphql/mutations/requirements_management/export_requirements_spec.rb": 1.6577663000000484,3894 "ee/spec/requests/api/ci/pipelines_spec.rb": 1.5089376910000283,3895 "ee/spec/requests/api/graphql/mutations/gitlab_subscriptions/activate_spec.rb": 1.3519101029999092,3896 "ee/spec/requests/callout_spec.rb": 1.630770560999963,3897 "ee/spec/controllers/oauth/applications_controller_spec.rb": 0.4141042669998569,3898 "ee/spec/requests/api/issue_links_spec.rb": 1.520623359999945,3899 "ee/spec/controllers/ee/groups/settings/ci_cd_controller_spec.rb": 1.123379302000103,3900 "ee/spec/controllers/admin/groups_controller_spec.rb": 1.0194947899999534,3901 "ee/spec/requests/trial_registrations_controller_spec.rb": 0.8304109240000344,3902 "ee/spec/requests/api/api_spec.rb": 0.5609427360000154,3903 "ee/spec/requests/api/graphql/mutations/app_sec/fuzzing/api/ci_configuration/create_spec.rb": 0.9010228990000542,3904 "ee/spec/mailers/emails/user_cap_spec.rb": 0.48597109199999977,3905 "ee/spec/controllers/profiles/keys_controller_spec.rb": 0.73513057200011643906}3907Knapsack global time execution for tests: 14m 51s3908Pending: (Failures listed here are expected and do not affect your suite's status)3909 1) Gets registries behaves like gets registries for when the feature is disabled by default when the feature is disabled errors when requesting registries3910 # Skipping since Geo::MergeRequestDiffReplicator is enabled by default3911 # ./ee/spec/support/shared_examples/requests/api/graphql/geo/registries_shared_examples.rb:1443912 2) Gets registries behaves like gets registries for when the feature is disabled by default when the feature is disabled errors when requesting registries3913 # Skipping since Geo::PackageFileReplicator is enabled by default3914 # ./ee/spec/support/shared_examples/requests/api/graphql/geo/registries_shared_examples.rb:1443915 3) Gets registries behaves like gets registries for when the feature is disabled by default when the feature is disabled errors when requesting registries3916 # Skipping since Geo::SnippetRepositoryReplicator is enabled by default3917 # ./ee/spec/support/shared_examples/requests/api/graphql/geo/registries_shared_examples.rb:1443918 4) Gets registries behaves like gets registries for when the feature is disabled by default when the feature is disabled errors when requesting registries3919 # Skipping since Geo::TerraformStateVersionReplicator is enabled by default3920 # ./ee/spec/support/shared_examples/requests/api/graphql/geo/registries_shared_examples.rb:1443921 5) Gets registries behaves like gets registries for when the feature is disabled by default when the feature is disabled errors when requesting registries3922 # Skipping since Geo::GroupWikiRepositoryReplicator is enabled by default3923 # ./ee/spec/support/shared_examples/requests/api/graphql/geo/registries_shared_examples.rb:1443924 6) Gets registries behaves like gets registries for when the feature is disabled by default when the feature is disabled errors when requesting registries3925 # Skipping since Geo::PipelineArtifactReplicator is enabled by default3926 # ./ee/spec/support/shared_examples/requests/api/graphql/geo/registries_shared_examples.rb:1443927 7) Gets registries behaves like gets registries for when the feature is disabled by default when the feature is disabled errors when requesting registries3928 # Skipping since Geo::PagesDeploymentReplicator is enabled by default3929 # ./ee/spec/support/shared_examples/requests/api/graphql/geo/registries_shared_examples.rb:1443930 8) Gets registries behaves like gets registries for when the feature is disabled by default when the feature is disabled errors when requesting registries3931 # Skipping since Geo::UploadReplicator is enabled by default3932 # ./ee/spec/support/shared_examples/requests/api/graphql/geo/registries_shared_examples.rb:1443933 9) Gets registries behaves like gets registries for when the feature is disabled by default when the feature is disabled errors when requesting registries3934 # Skipping since Geo::JobArtifactReplicator is enabled by default3935 # ./ee/spec/support/shared_examples/requests/api/graphql/geo/registries_shared_examples.rb:1443936 10) Gets registries behaves like gets registries for when the feature is disabled by default when the feature is disabled errors when requesting registries3937 # Skipping since Geo::CiSecureFileReplicator is enabled by default3938 # ./ee/spec/support/shared_examples/requests/api/graphql/geo/registries_shared_examples.rb:1443939Finished in 14 minutes 56 seconds (files took 45.47 seconds to load)39401269 examples, 0 failures, 10 pending3941Randomized with seed 543943942[TEST PROF INFO] Time spent in factories: 07:07.446 (47.53% of total time)3943RSpec exited with 0.3944No examples to retry, congrats!3946Not uploading cache ruby-gems-debian-bullseye-ruby-2.7-16 due to policy3947Not uploading cache gitaly-ruby-gems-debian-bullseye-ruby-2.7-16 due to policy3949Uploading artifacts...3950coverage/: found 5 matching files and directories 3951crystalball/: found 2 matching files and directories 3952WARNING: deprecations/: no matching files. Ensure that the artifact path is relative to the working directory 3953knapsack/: found 3 matching files and directories 3954rspec/: found 9 matching files and directories 3955WARNING: tmp/capybara/: no matching files. Ensure that the artifact path is relative to the working directory 3956log/*.log: found 19 matching files and directories 3957WARNING: Upload request redirected location=https://gitlab.com/api/v4/jobs/3307837907/artifacts?artifact_format=zip&artifact_type=archive&expire_in=31d new-url=https://gitlab.com3958WARNING: Retrying... context=artifacts-uploader error=request redirected3959Uploading artifacts as "archive" to coordinator... 201 Created id=3307837907 responseStatus=201 Created token=_RkzBzjQ3960Uploading artifacts...3961rspec/junit_rspec.xml: found 1 matching files and directories 3962WARNING: Upload request redirected location=https://gitlab.com/api/v4/jobs/3307837907/artifacts?artifact_format=gzip&artifact_type=junit&expire_in=31d new-url=https://gitlab.com3963WARNING: Retrying... context=artifacts-uploader error=request redirected3964Uploading artifacts as "junit" to coordinator... 201 Created id=3307837907 responseStatus=201 Created token=_RkzBzjQ3966Job succeeded