There was an error fetching the job.
rspec-ee integration pg13 1/6
Passed Started
by
@gitlab-bot

🤖 GitLab Bot 🤖
1Running with gitlab-runner 15.9.0~beta.212.g8ccc65e7 (8ccc65e7)2 on green-4.private.runners-manager.gitlab.com/gitlab.com/gitlab-org rpvz2FF9, system ID: s_d704414ba02a3 feature flags: FF_NETWORK_PER_BUILD:true, FF_USE_FASTZIP:true, FF_USE_IMPROVED_URL_MASKING:true6Using Docker executor with image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.18-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 ...7Starting service postgres:13 ...8Pulling docker image postgres:13 ...9Using docker image sha256:dd421ca1f7f13d81c5c145d77d97d8d84cd0e6f1e045936ee506ce0f50ee397a for postgres:13 with digest postgres@sha256:00f455399f30cc3f2fe4185476601438b7a4959c74653665582d7c313a783d51 ...10Starting service redis:6.2-alpine ...11Pulling docker image redis:6.2-alpine ...12Using docker image sha256:3616f0c0705d2a35d30dde109daf3cbe58ae7284121aafa6f5cfa987db98d1a8 for redis:6.2-alpine with digest redis@sha256:edddbcad5a41d58df2f142d68439922f1860ea902903d016257337c3342f30fc ...13Starting service elasticsearch:7.17.6 ...14Pulling docker image elasticsearch:7.17.6 ...15Using docker image sha256:5fad10241ffd65d817ed0ddfaf6e87eee1f7dc2a7db33db1047835560ea71fda for elasticsearch:7.17.6 with digest elasticsearch@sha256:6c128de5d01c0c130a806022d6bd99b3e4c27a9af5bfc33b6b81861ae117d028 ...16Starting service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 ...17Authenticating with credentials from job payload (GitLab Registry)18Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 ...19Using docker image sha256:4777ec1fa89def7d692d4979d05cb05234df25da1c6a3f67a564a433ec5ba1c8 for registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:80c0cee4566aefe4f1f287e1091263e08b0ebc41ed3dc4e76930df3634ccb9aa ...20Waiting for services to be up and running (timeout 30 seconds)...21*** WARNING: Service runner-rpvz2ff9-project-278964-concurrent-0-c7afb1b11ccfa62f-elasticsearch-2 probably didn't start properly.22Health check error:23service "runner-rpvz2ff9-project-278964-concurrent-0-c7afb1b11ccfa62f-elasticsearch-2-wait-for-service" timeout24Health check container logs:25Service container logs:262023-03-30T11:37:30.117593830Z {"type": "server", "timestamp": "2023-03-30T11:37:30,076Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "version[7.17.6], pid[6], build[default/docker/f65e9d338dc1d07b642e14a27f338990148ee5b6/2022-08-23T11:08:48.893373482Z], OS[Linux/5.4.109+/amd64], JVM[Oracle Corporation/OpenJDK 64-Bit Server VM/18.0.2/18.0.2+9-61]" }272023-03-30T11:37:30.118321390Z {"type": "server", "timestamp": "2023-03-30T11:37:30,117Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "JVM home [/usr/share/elasticsearch/jdk], using bundled JDK [true]" }282023-03-30T11:37:30.119025980Z {"type": "server", "timestamp": "2023-03-30T11:37:30,118Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "JVM arguments [-Xshare:auto, -Des.networkaddress.cache.ttl=60, -Des.networkaddress.cache.negative.ttl=10, -XX:+AlwaysPreTouch, -Xss1m, -Djava.awt.headless=true, -Dfile.encoding=UTF-8, -Djna.nosys=true, -XX:-OmitStackTraceInFastThrow, -XX:+ShowCodeDetailsInExceptionMessages, -Dio.netty.noUnsafe=true, -Dio.netty.noKeySetOptimization=true, -Dio.netty.recycler.maxCapacityPerThread=0, -Dio.netty.allocator.numDirectArenas=0, -Dlog4j.shutdownHookEnabled=false, -Dlog4j2.disable.jmx=true, -Dlog4j2.formatMsgNoLookups=true, -Djava.locale.providers=SPI,COMPAT, --add-opens=java.base/java.io=ALL-UNNAMED, -Djava.security.manager=allow, -XX:+UseG1GC, -Djava.io.tmpdir=/tmp/elasticsearch-17459202997781972393, -XX:+HeapDumpOnOutOfMemoryError, -XX:+ExitOnOutOfMemoryError, -XX:HeapDumpPath=data, -XX:ErrorFile=logs/hs_err_pid%p.log, -Xlog:gc*,gc+age=trace,safepoint:file=logs/gc.log:utctime,pid,tags:filecount=32,filesize=64m, -Des.cgroups.hierarchy.override=/, -Xms256m, -Xmx256m, -XX:MaxDirectMemorySize=134217728, -XX:G1HeapRegionSize=4m, -XX:InitiatingHeapOccupancyPercent=30, -XX:G1ReservePercent=15, -Des.path.home=/usr/share/elasticsearch, -Des.path.conf=/usr/share/elasticsearch/config, -Des.distribution.flavor=default, -Des.distribution.type=docker, -Des.bundled_jdk=true]" }292023-03-30T11:37:38.199792516Z {"type": "server", "timestamp": "2023-03-30T11:37:38,199Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [aggs-matrix-stats]" }302023-03-30T11:37:38.200204596Z {"type": "server", "timestamp": "2023-03-30T11:37:38,199Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [analysis-common]" }312023-03-30T11:37:38.200577846Z {"type": "server", "timestamp": "2023-03-30T11:37:38,200Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [constant-keyword]" }322023-03-30T11:37:38.200917386Z {"type": "server", "timestamp": "2023-03-30T11:37:38,200Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [frozen-indices]" }332023-03-30T11:37:38.201235726Z {"type": "server", "timestamp": "2023-03-30T11:37:38,200Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [ingest-common]" }342023-03-30T11:37:38.201534906Z {"type": "server", "timestamp": "2023-03-30T11:37:38,201Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [ingest-geoip]" }352023-03-30T11:37:38.201828586Z {"type": "server", "timestamp": "2023-03-30T11:37:38,201Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [ingest-user-agent]" }362023-03-30T11:37:38.202108016Z {"type": "server", "timestamp": "2023-03-30T11:37:38,201Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [kibana]" }372023-03-30T11:37:38.202402286Z {"type": "server", "timestamp": "2023-03-30T11:37:38,202Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [lang-expression]" }382023-03-30T11:37:38.202734966Z {"type": "server", "timestamp": "2023-03-30T11:37:38,202Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [lang-mustache]" }392023-03-30T11:37:38.203027736Z {"type": "server", "timestamp": "2023-03-30T11:37:38,202Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [lang-painless]" }402023-03-30T11:37:38.203306366Z {"type": "server", "timestamp": "2023-03-30T11:37:38,203Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [legacy-geo]" }412023-03-30T11:37:38.203611236Z {"type": "server", "timestamp": "2023-03-30T11:37:38,203Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [mapper-extras]" }422023-03-30T11:37:38.203926796Z {"type": "server", "timestamp": "2023-03-30T11:37:38,203Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [mapper-version]" }432023-03-30T11:37:38.204192056Z {"type": "server", "timestamp": "2023-03-30T11:37:38,203Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [parent-join]" }442023-03-30T11:37:38.204466496Z {"type": "server", "timestamp": "2023-03-30T11:37:38,204Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [percolator]" }452023-03-30T11:37:38.204733396Z {"type": "server", "timestamp": "2023-03-30T11:37:38,204Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [rank-eval]" }462023-03-30T11:37:38.204989166Z {"type": "server", "timestamp": "2023-03-30T11:37:38,204Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [reindex]" }472023-03-30T11:37:38.205276736Z {"type": "server", "timestamp": "2023-03-30T11:37:38,204Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [repositories-metering-api]" }482023-03-30T11:37:38.205556565Z {"type": "server", "timestamp": "2023-03-30T11:37:38,205Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [repository-encrypted]" }492023-03-30T11:37:38.205839025Z {"type": "server", "timestamp": "2023-03-30T11:37:38,205Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [repository-url]" }502023-03-30T11:37:38.206100905Z {"type": "server", "timestamp": "2023-03-30T11:37:38,205Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [runtime-fields-common]" }512023-03-30T11:37:38.206392165Z {"type": "server", "timestamp": "2023-03-30T11:37:38,206Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [search-business-rules]" }522023-03-30T11:37:38.206661336Z {"type": "server", "timestamp": "2023-03-30T11:37:38,206Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [searchable-snapshots]" }532023-03-30T11:37:38.206936816Z {"type": "server", "timestamp": "2023-03-30T11:37:38,206Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [snapshot-repo-test-kit]" }542023-03-30T11:37:38.207210205Z {"type": "server", "timestamp": "2023-03-30T11:37:38,206Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [spatial]" }552023-03-30T11:37:38.207573905Z {"type": "server", "timestamp": "2023-03-30T11:37:38,207Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [transform]" }562023-03-30T11:37:38.207840745Z {"type": "server", "timestamp": "2023-03-30T11:37:38,207Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [transport-netty4]" }572023-03-30T11:37:38.208116516Z {"type": "server", "timestamp": "2023-03-30T11:37:38,207Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [unsigned-long]" }582023-03-30T11:37:38.208404645Z {"type": "server", "timestamp": "2023-03-30T11:37:38,208Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [vector-tile]" }592023-03-30T11:37:38.208667845Z {"type": "server", "timestamp": "2023-03-30T11:37:38,208Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [vectors]" }602023-03-30T11:37:38.208945825Z {"type": "server", "timestamp": "2023-03-30T11:37:38,208Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [wildcard]" }612023-03-30T11:37:38.209326045Z {"type": "server", "timestamp": "2023-03-30T11:37:38,208Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-aggregate-metric]" }622023-03-30T11:37:38.209583015Z {"type": "server", "timestamp": "2023-03-30T11:37:38,209Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-analytics]" }632023-03-30T11:37:38.209946745Z {"type": "server", "timestamp": "2023-03-30T11:37:38,209Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-async]" }642023-03-30T11:37:38.210251225Z {"type": "server", "timestamp": "2023-03-30T11:37:38,209Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-async-search]" }652023-03-30T11:37:38.210556935Z {"type": "server", "timestamp": "2023-03-30T11:37:38,210Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-autoscaling]" }662023-03-30T11:37:38.210848695Z {"type": "server", "timestamp": "2023-03-30T11:37:38,210Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-ccr]" }672023-03-30T11:37:38.211132985Z {"type": "server", "timestamp": "2023-03-30T11:37:38,210Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-core]" }682023-03-30T11:37:38.211416975Z {"type": "server", "timestamp": "2023-03-30T11:37:38,211Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-data-streams]" }692023-03-30T11:37:38.211689545Z {"type": "server", "timestamp": "2023-03-30T11:37:38,211Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-deprecation]" }702023-03-30T11:37:38.211953635Z {"type": "server", "timestamp": "2023-03-30T11:37:38,211Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-enrich]" }712023-03-30T11:37:38.212213155Z {"type": "server", "timestamp": "2023-03-30T11:37:38,211Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-eql]" }722023-03-30T11:37:38.212496185Z {"type": "server", "timestamp": "2023-03-30T11:37:38,212Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-fleet]" }732023-03-30T11:37:38.212806185Z {"type": "server", "timestamp": "2023-03-30T11:37:38,212Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-graph]" }742023-03-30T11:37:38.213073195Z {"type": "server", "timestamp": "2023-03-30T11:37:38,212Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-identity-provider]" }752023-03-30T11:37:38.213332845Z {"type": "server", "timestamp": "2023-03-30T11:37:38,213Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-ilm]" }762023-03-30T11:37:38.213592675Z {"type": "server", "timestamp": "2023-03-30T11:37:38,213Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-logstash]" }772023-03-30T11:37:38.213899395Z {"type": "server", "timestamp": "2023-03-30T11:37:38,213Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-ml]" }782023-03-30T11:37:38.214171555Z {"type": "server", "timestamp": "2023-03-30T11:37:38,213Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-monitoring]" }792023-03-30T11:37:38.214443425Z {"type": "server", "timestamp": "2023-03-30T11:37:38,214Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-ql]" }802023-03-30T11:37:38.214707925Z {"type": "server", "timestamp": "2023-03-30T11:37:38,214Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-rollup]" }812023-03-30T11:37:38.214977375Z {"type": "server", "timestamp": "2023-03-30T11:37:38,214Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-security]" }822023-03-30T11:37:38.215250475Z {"type": "server", "timestamp": "2023-03-30T11:37:38,214Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-shutdown]" }832023-03-30T11:37:38.215524775Z {"type": "server", "timestamp": "2023-03-30T11:37:38,215Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-sql]" }842023-03-30T11:37:38.215804115Z {"type": "server", "timestamp": "2023-03-30T11:37:38,215Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-stack]" }852023-03-30T11:37:38.216063625Z {"type": "server", "timestamp": "2023-03-30T11:37:38,215Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-text-structure]" }862023-03-30T11:37:38.216334735Z {"type": "server", "timestamp": "2023-03-30T11:37:38,216Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-voting-only-node]" }872023-03-30T11:37:38.216589325Z {"type": "server", "timestamp": "2023-03-30T11:37:38,216Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "loaded module [x-pack-watcher]" }882023-03-30T11:37:38.217294045Z {"type": "server", "timestamp": "2023-03-30T11:37:38,217Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "no plugins loaded" }892023-03-30T11:37:38.365481744Z {"type": "server", "timestamp": "2023-03-30T11:37:38,364Z", "level": "INFO", "component": "o.e.e.NodeEnvironment", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "using [1] data paths, mounts [[/ (overlay)]], net usable_space [78.9gb], net total_space [94.2gb], types [overlay]" }902023-03-30T11:37:38.367335684Z {"type": "server", "timestamp": "2023-03-30T11:37:38,366Z", "level": "INFO", "component": "o.e.e.NodeEnvironment", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "heap size [256mb], compressed ordinary object pointers [true]" }912023-03-30T11:37:38.530925481Z {"type": "server", "timestamp": "2023-03-30T11:37:38,530Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "node name [a14443095d5c], node ID [pIyMtvrrSNaZ0WKCVBUOqQ], cluster name [docker-cluster], roles [transform, data_frozen, master, remote_cluster_client, data, ml, data_content, data_hot, data_warm, data_cold, ingest]" }922023-03-30T11:37:49.054112552Z {"type": "server", "timestamp": "2023-03-30T11:37:49,053Z", "level": "INFO", "component": "o.e.x.m.p.l.CppLogMessageHandler", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "[controller/209] [Main.cc@122] controller (64 bit): Version 7.17.6 (Build ea0305ae2a3b09) Copyright (c) 2022 Elasticsearch BV" }932023-03-30T11:37:50.099516526Z {"type": "server", "timestamp": "2023-03-30T11:37:50,098Z", "level": "INFO", "component": "o.e.i.g.ConfigDatabases", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "initialized default databases [[GeoLite2-Country.mmdb, GeoLite2-City.mmdb, GeoLite2-ASN.mmdb]], config databases [[]] and watching [/usr/share/elasticsearch/config/ingest-geoip] for changes" }942023-03-30T11:37:50.101436856Z {"type": "server", "timestamp": "2023-03-30T11:37:50,100Z", "level": "INFO", "component": "o.e.i.g.DatabaseNodeService", "cluster.name": "docker-cluster", "node.name": "a14443095d5c", "message": "initialized database registry, using geoip-databases directory [/tmp/elasticsearch-17459202997781972393/geoip-databases/pIyMtvrrSNaZ0WKCVBUOqQ]" }95*********96Authenticating with credentials from job payload (GitLab Registry)97Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.18-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 ...98Using docker image sha256:7a1b51158a1ee23b080b514ce6ebbf52ac51585877198fb52709e5cd01805a77 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.18-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.18-rust-1.65-node-16.14-postgresql-13@sha256:412d55913d43377094427ced549cb422ed2f2c7223e6a605d0d3e0151cb892b0 ...100Running on runner-rpvz2ff9-project-278964-concurrent-0 via runner-rpvz2ff9-private-1680164903-86e2c65e...102$ eval "$CI_PRE_CLONE_SCRIPT"103Fetching changes with git depth set to 20...104Initialized empty Git repository in /builds/gitlab-org/gitlab/.git/105Created fresh repository.106remote: Enumerating objects: 135903, done. 107remote: Counting objects: 100% (135903/135903), done. 108remote: Compressing objects: 100% (88560/88560), done. 109remote: Total 135903 (delta 58315), reused 94618 (delta 42152), pack-reused 0 110Receiving objects: 100% (135903/135903), 121.35 MiB | 25.01 MiB/s, done.111Resolving deltas: 100% (58315/58315), done.113 * [new ref] refs/pipelines/822866544 -> refs/pipelines/822866544114Checking out 523abdde as detached HEAD (ref is refs/merge-requests/116270/merge)...115Skipping Git submodules setup116$ git remote set-url origin "${CI_REPOSITORY_URL}"118Checking cache for ruby-gems-debian-bullseye-ruby-3.0-16...119cache.zip is up to date 120Successfully extracted cache121Checking cache for gitaly-ruby-gems-debian-bullseye-ruby-3.0-16...122cache.zip is up to date 123Successfully extracted cache125Downloading artifacts for compile-test-assets (4031138198)...126Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4031138198 responseStatus=200 OK token=64_B8MpF127Downloading artifacts for detect-tests (4031138213)...128Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4031138213 responseStatus=200 OK token=64_B8MpF129Downloading artifacts for retrieve-tests-metadata (4031138217)...130Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4031138217 responseStatus=200 OK token=64_B8MpF131Downloading artifacts for setup-test-env (4031138204)...132Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4031138204 responseStatus=200 OK token=64_B8MpF134Using docker image sha256:7a1b51158a1ee23b080b514ce6ebbf52ac51585877198fb52709e5cd01805a77 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.18-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.18-rust-1.65-node-16.14-postgresql-13@sha256:412d55913d43377094427ced549cb422ed2f2c7223e6a605d0d3e0151cb892b0 ...135$ echo $FOSS_ONLY136$ [ "$FOSS_ONLY" = "1" ] && rm -rf ee/ qa/spec/ee/ qa/qa/specs/features/ee/ qa/qa/ee/ qa/qa/ee.rb137$ export GOPATH=$CI_PROJECT_DIR/.go138$ mkdir -p $GOPATH139$ source scripts/utils.sh140$ source scripts/prepare_build.sh791Using decomposed database config (config/database.yml.decomposed-postgresql)792Geo DB will be set up.793$ setup_db_user_only794CREATE ROLE795GRANT796==> 'setup_db_user_only' succeeded in 0 seconds.797$ bundle exec rake db:drop db:create db:schema:load db:migrate gitlab:db:lock_writes798Dropped database 'gitlabhq_test'799Dropped database 'gitlabhq_test_ci'800Dropped database 'gitlabhq_geo_test'801Created database 'gitlabhq_test'802Created database 'gitlabhq_test_ci'803Created database 'gitlabhq_geo_test'804==> 'bundle exec rake db:drop db:create db:schema:load db:migrate gitlab:db:lock_writes' succeeded in 54 seconds.805$ setup_db_praefect806SELECT pg_catalog.set_config('search_path', '', false);807CREATE DATABASE praefect_test ENCODING 'UTF8';808==> 'setup_db_praefect' succeeded in 0 seconds.809$ source ./scripts/rspec_helpers.sh810$ run_timed_command "gem install knapsack --no-document"811$ gem install knapsack --no-document812Successfully installed knapsack-4.0.08131 gem installed814==> 'gem install knapsack --no-document' succeeded in 0 seconds.815$ echo -e "\e[0Ksection_start:`date +%s`:gitaly-test-spawn[collapsed=true]\r\e[0KStarting Gitaly"919$ rspec_paralellized_job "--tag ~quarantine --tag ~level:background_migration"920SKIP_FLAKY_TESTS_AUTOMATICALLY: false921RETRY_FAILED_TESTS_IN_NEW_PROCESS: true922KNAPSACK_GENERATE_REPORT: true923FLAKY_RSPEC_GENERATE_REPORT: true924KNAPSACK_TEST_FILE_PATTERN: {ee/}spec/{commands,controllers,mailers,requests}{,/**/}*_spec.rb925KNAPSACK_LOG_LEVEL: debug926KNAPSACK_REPORT_PATH: knapsack/rspec-ee_integration_pg13_1_6_report.json927FLAKY_RSPEC_SUITE_REPORT_PATH: rspec/flaky/report-suite.json928FLAKY_RSPEC_REPORT_PATH: rspec/flaky/all_rspec-ee_integration_pg13_1_6_report.json929NEW_FLAKY_RSPEC_REPORT_PATH: rspec/flaky/new_rspec-ee_integration_pg13_1_6_report.json930SKIPPED_FLAKY_TESTS_REPORT_PATH: rspec/flaky/skipped_flaky_tests_rspec-ee_integration_pg13_1_6_report.txt931CRYSTALBALL: 932Knapsack node specs:933ee/spec/controllers/projects/merge_requests_controller_spec.rb934ee/spec/controllers/operations_controller_spec.rb935ee/spec/requests/api/issues_spec.rb936ee/spec/requests/api/releases_spec.rb937ee/spec/requests/api/project_approval_settings_spec.rb938ee/spec/requests/api/ldap_group_links_spec.rb939ee/spec/controllers/groups/analytics/cycle_analytics/summary_controller_spec.rb940ee/spec/controllers/groups/omniauth_callbacks_controller_spec.rb941ee/spec/requests/api/project_mirror_spec.rb942ee/spec/requests/lfs_http_spec.rb943ee/spec/requests/api/project_push_rule_spec.rb944ee/spec/controllers/subscriptions_controller_spec.rb945ee/spec/controllers/projects/clusters_controller_spec.rb946ee/spec/requests/api/vulnerability_exports_spec.rb947ee/spec/requests/api/graphql/mutations/work_items/update_spec.rb948ee/spec/controllers/projects/security/vulnerabilities/notes_controller_spec.rb949ee/spec/controllers/ldap/omniauth_callbacks_controller_spec.rb950ee/spec/requests/groups/epics_controller_spec.rb951ee/spec/requests/api/award_emoji_spec.rb952ee/spec/controllers/projects/protected_environments_controller_spec.rb953ee/spec/controllers/groups/analytics/tasks_by_type_controller_spec.rb954ee/spec/controllers/projects/security/vulnerabilities_controller_spec.rb955ee/spec/requests/api/graphql/group/epic/epic_aggregate_query_spec.rb956ee/spec/requests/api/graphql/project/pipeline/security_report_summary_spec.rb957ee/spec/requests/api/project_clusters_spec.rb958ee/spec/requests/trial_registrations_controller_spec.rb959ee/spec/requests/api/graphql/boards/boards_query_spec.rb960ee/spec/requests/api/graphql/boards/board_lists_query_spec.rb961ee/spec/controllers/projects/deploy_keys_controller_spec.rb962ee/spec/controllers/concerns/routable_actions_spec.rb963ee/spec/requests/groups/analytics/dashboards_controller_spec.rb964ee/spec/requests/api/graphql/mutations/iterations/create_spec.rb965ee/spec/controllers/ee/sessions_controller_spec.rb966ee/spec/requests/api/graphql/mutations/requirements_management/update_requirement_spec.rb967ee/spec/controllers/ee/registrations/welcome_controller_spec.rb968ee/spec/requests/ee/groups/autocomplete_sources_spec.rb969ee/spec/requests/api/graphql/mutations/issues/update_spec.rb970ee/spec/controllers/concerns/ee/routable_actions/sso_enforcement_redirect_spec.rb971ee/spec/requests/api/graphql/mutations/security/finding/create_merge_request_spec.rb972ee/spec/requests/api/graphql/iterations/iterations_spec.rb973ee/spec/requests/jwt_controller_spec.rb974ee/spec/requests/api/graphql/project/pipeline/security_report_finding_spec.rb975ee/spec/requests/api/member_roles_spec.rb976ee/spec/requests/api/graphql/audit_events/streaming/headers/update_spec.rb977ee/spec/requests/api/graphql/project/branch_protections/unprotect_access_levels_spec.rb978ee/spec/requests/projects/analytics/dashboards_controller_spec.rb979ee/spec/requests/api/graphql/mutations/projects/initialize_product_analytics_spec.rb980ee/spec/requests/api/graphql/project/code_coverage_summary_spec.rb981ee/spec/requests/api/graphql/namespace/projects_spec.rb982ee/spec/controllers/groups/analytics/cycle_analytics_controller_spec.rb983ee/spec/mailers/license_mailer_spec.rb984ee/spec/controllers/groups/roadmap_controller_spec.rb985ee/spec/requests/api/graphql/mutations/epics/add_issue_spec.rb986ee/spec/controllers/admin/geo/nodes_controller_spec.rb987ee/spec/requests/api/graphql/mutations/security_policy/commit_scan_execution_policy_spec.rb988ee/spec/requests/api/graphql/mutations/compliance_management/frameworks/create_spec.rb989ee/spec/requests/api/resource_state_events_spec.rb990ee/spec/controllers/registrations/verification_controller_spec.rb991ee/spec/requests/api/graphql/current_user/groups_query_spec.rb992ee/spec/requests/api/graphql/audit_events/streaming/headers/create_spec.rb993ee/spec/requests/projects/audit_events_spec.rb994ee/spec/controllers/admin/audit_logs_controller_spec.rb995ee/spec/requests/api/graphql/project/dast_scanner_profiles_spec.rb996ee/spec/controllers/admin/licenses/usage_exports_controller_spec.rb997ee/spec/requests/api/graphql/project/pipeline/code_quality_reports_spec.rb998ee/spec/requests/api/graphql/project/pipeline/dast_profile_spec.rb999ee/spec/requests/api/graphql/mutations/iterations/delete_spec.rb1000ee/spec/requests/api/graphql/ci/minutes/usage_spec.rb1001ee/spec/requests/api/graphql/mutations/releases/create_spec.rb1002ee/spec/requests/projects/pipelines/email_campaigns_controller_spec.rb1003ee/spec/controllers/groups/analytics/repository_analytics_controller_spec.rb1004ee/spec/requests/api/graphql/mutations/dast/profiles/delete_spec.rb1005ee/spec/requests/ee/groups/settings/repository_controller_spec.rb1006ee/spec/requests/api/captcha_check_spec.rb1007ee/spec/requests/api/graphql/project/dast_profile_spec.rb1008ee/spec/controllers/groups/todos_controller_spec.rb1009ee/spec/controllers/projects/incident_management/escalation_policies_controller_spec.rb1010ee/spec/controllers/groups/runners_controller_spec.rb1011ee/spec/controllers/groups/security/dashboard_controller_spec.rb1012ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/create_spec.rb1013ee/spec/requests/api/graphql/vulnerabilities/external_issue_links_spec.rb1014ee/spec/requests/api/helm_packages_spec.rb1015ee/spec/controllers/profiles_controller_spec.rb1016ee/spec/requests/api/graphql/merge_request_reviewer_spec.rb1017ee/spec/requests/api/graphql/mutations/boards/lists/create_spec.rb1018ee/spec/requests/api/graphql/environments/deployments_spec.rb1019ee/spec/controllers/projects/imports_controller_spec.rb1020ee/spec/requests/api/ldap_spec.rb1021ee/spec/requests/api/graphql/project/compliance_frameworks_spec.rb1022ee/spec/requests/api/graphql/mutations/analytics/devops_adoption/enabled_namespaces/enable_spec.rb1023ee/spec/controllers/admin/runners_controller_spec.rb1024ee/spec/requests/api/graphql/mutations/gitlab_subscriptions/activate_spec.rb1025ee/spec/requests/api/rubygem_packages_spec.rb1026ee/spec/requests/projects/insights_controller_spec.rb1027ee/spec/mailers/emails/group_memberships_spec.rb1028ee/spec/requests/api/graphql/mutations/incident_management/issuable_resource_link/destroy_spec.rb1029ee/spec/controllers/ee/groups/variables_controller_spec.rb1030ee/spec/requests/api/graphql/mutations/members/groups/ee/bulk_update_spec.rb1031ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/destroy_spec.rb1032ee/spec/controllers/ee/profiles/preferences_controller_spec.rb1033ee/spec/controllers/concerns/internal_redirect_spec.rb1034ee/spec/requests/api/graphql/analytics/devops_adoption/enabled_namespaces_spec.rb1035ee/spec/requests/admin/impersonation_tokens_controller_spec.rb1036ee/spec/requests/api/search_spec.rb1037Filter specs:1038Running specs:1039Running all node tests without filter1040ee/spec/controllers/projects/merge_requests_controller_spec.rb1041ee/spec/controllers/operations_controller_spec.rb1042ee/spec/requests/api/issues_spec.rb1043ee/spec/requests/api/releases_spec.rb1044ee/spec/requests/api/project_approval_settings_spec.rb1045ee/spec/requests/api/ldap_group_links_spec.rb1046ee/spec/controllers/groups/analytics/cycle_analytics/summary_controller_spec.rb1047ee/spec/controllers/groups/omniauth_callbacks_controller_spec.rb1048ee/spec/requests/api/project_mirror_spec.rb1049ee/spec/requests/lfs_http_spec.rb1050ee/spec/requests/api/project_push_rule_spec.rb1051ee/spec/controllers/subscriptions_controller_spec.rb1052ee/spec/controllers/projects/clusters_controller_spec.rb1053ee/spec/requests/api/vulnerability_exports_spec.rb1054ee/spec/requests/api/graphql/mutations/work_items/update_spec.rb1055ee/spec/controllers/projects/security/vulnerabilities/notes_controller_spec.rb1056ee/spec/controllers/ldap/omniauth_callbacks_controller_spec.rb1057ee/spec/requests/groups/epics_controller_spec.rb1058ee/spec/requests/api/award_emoji_spec.rb1059ee/spec/controllers/projects/protected_environments_controller_spec.rb1060ee/spec/controllers/groups/analytics/tasks_by_type_controller_spec.rb1061ee/spec/controllers/projects/security/vulnerabilities_controller_spec.rb1062ee/spec/requests/api/graphql/group/epic/epic_aggregate_query_spec.rb1063ee/spec/requests/api/graphql/project/pipeline/security_report_summary_spec.rb1064ee/spec/requests/api/project_clusters_spec.rb1065ee/spec/requests/trial_registrations_controller_spec.rb1066ee/spec/requests/api/graphql/boards/boards_query_spec.rb1067ee/spec/requests/api/graphql/boards/board_lists_query_spec.rb1068ee/spec/controllers/projects/deploy_keys_controller_spec.rb1069ee/spec/controllers/concerns/routable_actions_spec.rb1070ee/spec/requests/groups/analytics/dashboards_controller_spec.rb1071ee/spec/requests/api/graphql/mutations/iterations/create_spec.rb1072ee/spec/controllers/ee/sessions_controller_spec.rb1073ee/spec/requests/api/graphql/mutations/requirements_management/update_requirement_spec.rb1074ee/spec/controllers/ee/registrations/welcome_controller_spec.rb1075ee/spec/requests/ee/groups/autocomplete_sources_spec.rb1076ee/spec/requests/api/graphql/mutations/issues/update_spec.rb1077ee/spec/controllers/concerns/ee/routable_actions/sso_enforcement_redirect_spec.rb1078ee/spec/requests/api/graphql/mutations/security/finding/create_merge_request_spec.rb1079ee/spec/requests/api/graphql/iterations/iterations_spec.rb1080ee/spec/requests/jwt_controller_spec.rb1081ee/spec/requests/api/graphql/project/pipeline/security_report_finding_spec.rb1082ee/spec/requests/api/member_roles_spec.rb1083ee/spec/requests/api/graphql/audit_events/streaming/headers/update_spec.rb1084ee/spec/requests/api/graphql/project/branch_protections/unprotect_access_levels_spec.rb1085ee/spec/requests/projects/analytics/dashboards_controller_spec.rb1086ee/spec/requests/api/graphql/mutations/projects/initialize_product_analytics_spec.rb1087ee/spec/requests/api/graphql/project/code_coverage_summary_spec.rb1088ee/spec/requests/api/graphql/namespace/projects_spec.rb1089ee/spec/controllers/groups/analytics/cycle_analytics_controller_spec.rb1090ee/spec/mailers/license_mailer_spec.rb1091ee/spec/controllers/groups/roadmap_controller_spec.rb1092ee/spec/requests/api/graphql/mutations/epics/add_issue_spec.rb1093ee/spec/controllers/admin/geo/nodes_controller_spec.rb1094ee/spec/requests/api/graphql/mutations/security_policy/commit_scan_execution_policy_spec.rb1095ee/spec/requests/api/graphql/mutations/compliance_management/frameworks/create_spec.rb1096ee/spec/requests/api/resource_state_events_spec.rb1097ee/spec/controllers/registrations/verification_controller_spec.rb1098ee/spec/requests/api/graphql/current_user/groups_query_spec.rb1099ee/spec/requests/api/graphql/audit_events/streaming/headers/create_spec.rb1100ee/spec/requests/projects/audit_events_spec.rb1101ee/spec/controllers/admin/audit_logs_controller_spec.rb1102ee/spec/requests/api/graphql/project/dast_scanner_profiles_spec.rb1103ee/spec/controllers/admin/licenses/usage_exports_controller_spec.rb1104ee/spec/requests/api/graphql/project/pipeline/code_quality_reports_spec.rb1105ee/spec/requests/api/graphql/project/pipeline/dast_profile_spec.rb1106ee/spec/requests/api/graphql/mutations/iterations/delete_spec.rb1107ee/spec/requests/api/graphql/ci/minutes/usage_spec.rb1108ee/spec/requests/api/graphql/mutations/releases/create_spec.rb1109ee/spec/requests/projects/pipelines/email_campaigns_controller_spec.rb1110ee/spec/controllers/groups/analytics/repository_analytics_controller_spec.rb1111ee/spec/requests/api/graphql/mutations/dast/profiles/delete_spec.rb1112ee/spec/requests/ee/groups/settings/repository_controller_spec.rb1113ee/spec/requests/api/captcha_check_spec.rb1114ee/spec/requests/api/graphql/project/dast_profile_spec.rb1115ee/spec/controllers/groups/todos_controller_spec.rb1116ee/spec/controllers/projects/incident_management/escalation_policies_controller_spec.rb1117ee/spec/controllers/groups/runners_controller_spec.rb1118ee/spec/controllers/groups/security/dashboard_controller_spec.rb1119ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/create_spec.rb1120ee/spec/requests/api/graphql/vulnerabilities/external_issue_links_spec.rb1121ee/spec/requests/api/helm_packages_spec.rb1122ee/spec/controllers/profiles_controller_spec.rb1123ee/spec/requests/api/graphql/merge_request_reviewer_spec.rb1124ee/spec/requests/api/graphql/mutations/boards/lists/create_spec.rb1125ee/spec/requests/api/graphql/environments/deployments_spec.rb1126ee/spec/controllers/projects/imports_controller_spec.rb1127ee/spec/requests/api/ldap_spec.rb1128ee/spec/requests/api/graphql/project/compliance_frameworks_spec.rb1129ee/spec/requests/api/graphql/mutations/analytics/devops_adoption/enabled_namespaces/enable_spec.rb1130ee/spec/controllers/admin/runners_controller_spec.rb1131ee/spec/requests/api/graphql/mutations/gitlab_subscriptions/activate_spec.rb1132ee/spec/requests/api/rubygem_packages_spec.rb1133ee/spec/requests/projects/insights_controller_spec.rb1134ee/spec/mailers/emails/group_memberships_spec.rb1135ee/spec/requests/api/graphql/mutations/incident_management/issuable_resource_link/destroy_spec.rb1136ee/spec/controllers/ee/groups/variables_controller_spec.rb1137ee/spec/requests/api/graphql/mutations/members/groups/ee/bulk_update_spec.rb1138ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/destroy_spec.rb1139ee/spec/controllers/ee/profiles/preferences_controller_spec.rb1140ee/spec/controllers/concerns/internal_redirect_spec.rb1141ee/spec/requests/api/graphql/analytics/devops_adoption/enabled_namespaces_spec.rb1142ee/spec/requests/admin/impersonation_tokens_controller_spec.rb1143ee/spec/requests/api/search_spec.rb1144Running all node tests without filter1145Running all node tests without filter1146Running command: bundle exec rspec -Ispec -rspec_helper --color --failure-exit-code 1 --error-exit-code 2 --format documentation --format RspecJunitFormatter --out rspec/junit_rspec.xml --tag ~quarantine --tag ~level:background_migration --default-path {ee -- ee/spec/controllers/projects/merge_requests_controller_spec.rb ee/spec/controllers/operations_controller_spec.rb ee/spec/requests/api/issues_spec.rb ee/spec/requests/api/releases_spec.rb ee/spec/requests/api/project_approval_settings_spec.rb ee/spec/requests/api/ldap_group_links_spec.rb ee/spec/controllers/groups/analytics/cycle_analytics/summary_controller_spec.rb ee/spec/controllers/groups/omniauth_callbacks_controller_spec.rb ee/spec/requests/api/project_mirror_spec.rb ee/spec/requests/lfs_http_spec.rb ee/spec/requests/api/project_push_rule_spec.rb ee/spec/controllers/subscriptions_controller_spec.rb ee/spec/controllers/projects/clusters_controller_spec.rb ee/spec/requests/api/vulnerability_exports_spec.rb ee/spec/requests/api/graphql/mutations/work_items/update_spec.rb ee/spec/controllers/projects/security/vulnerabilities/notes_controller_spec.rb ee/spec/controllers/ldap/omniauth_callbacks_controller_spec.rb ee/spec/requests/groups/epics_controller_spec.rb ee/spec/requests/api/award_emoji_spec.rb ee/spec/controllers/projects/protected_environments_controller_spec.rb ee/spec/controllers/groups/analytics/tasks_by_type_controller_spec.rb ee/spec/controllers/projects/security/vulnerabilities_controller_spec.rb ee/spec/requests/api/graphql/group/epic/epic_aggregate_query_spec.rb ee/spec/requests/api/graphql/project/pipeline/security_report_summary_spec.rb ee/spec/requests/api/project_clusters_spec.rb ee/spec/requests/trial_registrations_controller_spec.rb ee/spec/requests/api/graphql/boards/boards_query_spec.rb ee/spec/requests/api/graphql/boards/board_lists_query_spec.rb ee/spec/controllers/projects/deploy_keys_controller_spec.rb ee/spec/controllers/concerns/routable_actions_spec.rb ee/spec/requests/groups/analytics/dashboards_controller_spec.rb ee/spec/requests/api/graphql/mutations/iterations/create_spec.rb ee/spec/controllers/ee/sessions_controller_spec.rb ee/spec/requests/api/graphql/mutations/requirements_management/update_requirement_spec.rb ee/spec/controllers/ee/registrations/welcome_controller_spec.rb ee/spec/requests/ee/groups/autocomplete_sources_spec.rb ee/spec/requests/api/graphql/mutations/issues/update_spec.rb ee/spec/controllers/concerns/ee/routable_actions/sso_enforcement_redirect_spec.rb ee/spec/requests/api/graphql/mutations/security/finding/create_merge_request_spec.rb ee/spec/requests/api/graphql/iterations/iterations_spec.rb ee/spec/requests/jwt_controller_spec.rb ee/spec/requests/api/graphql/project/pipeline/security_report_finding_spec.rb ee/spec/requests/api/member_roles_spec.rb ee/spec/requests/api/graphql/audit_events/streaming/headers/update_spec.rb ee/spec/requests/api/graphql/project/branch_protections/unprotect_access_levels_spec.rb ee/spec/requests/projects/analytics/dashboards_controller_spec.rb ee/spec/requests/api/graphql/mutations/projects/initialize_product_analytics_spec.rb ee/spec/requests/api/graphql/project/code_coverage_summary_spec.rb ee/spec/requests/api/graphql/namespace/projects_spec.rb ee/spec/controllers/groups/analytics/cycle_analytics_controller_spec.rb ee/spec/mailers/license_mailer_spec.rb ee/spec/controllers/groups/roadmap_controller_spec.rb ee/spec/requests/api/graphql/mutations/epics/add_issue_spec.rb ee/spec/controllers/admin/geo/nodes_controller_spec.rb ee/spec/requests/api/graphql/mutations/security_policy/commit_scan_execution_policy_spec.rb ee/spec/requests/api/graphql/mutations/compliance_management/frameworks/create_spec.rb ee/spec/requests/api/resource_state_events_spec.rb ee/spec/controllers/registrations/verification_controller_spec.rb ee/spec/requests/api/graphql/current_user/groups_query_spec.rb ee/spec/requests/api/graphql/audit_events/streaming/headers/create_spec.rb ee/spec/requests/projects/audit_events_spec.rb ee/spec/controllers/admin/audit_logs_controller_spec.rb ee/spec/requests/api/graphql/project/dast_scanner_profiles_spec.rb ee/spec/controllers/admin/licenses/usage_exports_controller_spec.rb ee/spec/requests/api/graphql/project/pipeline/code_quality_reports_spec.rb ee/spec/requests/api/graphql/project/pipeline/dast_profile_spec.rb ee/spec/requests/api/graphql/mutations/iterations/delete_spec.rb ee/spec/requests/api/graphql/ci/minutes/usage_spec.rb ee/spec/requests/api/graphql/mutations/releases/create_spec.rb ee/spec/requests/projects/pipelines/email_campaigns_controller_spec.rb ee/spec/controllers/groups/analytics/repository_analytics_controller_spec.rb ee/spec/requests/api/graphql/mutations/dast/profiles/delete_spec.rb ee/spec/requests/ee/groups/settings/repository_controller_spec.rb ee/spec/requests/api/captcha_check_spec.rb ee/spec/requests/api/graphql/project/dast_profile_spec.rb ee/spec/controllers/groups/todos_controller_spec.rb ee/spec/controllers/projects/incident_management/escalation_policies_controller_spec.rb ee/spec/controllers/groups/runners_controller_spec.rb ee/spec/controllers/groups/security/dashboard_controller_spec.rb ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/create_spec.rb ee/spec/requests/api/graphql/vulnerabilities/external_issue_links_spec.rb ee/spec/requests/api/helm_packages_spec.rb ee/spec/controllers/profiles_controller_spec.rb ee/spec/requests/api/graphql/merge_request_reviewer_spec.rb ee/spec/requests/api/graphql/mutations/boards/lists/create_spec.rb ee/spec/requests/api/graphql/environments/deployments_spec.rb ee/spec/controllers/projects/imports_controller_spec.rb ee/spec/requests/api/ldap_spec.rb ee/spec/requests/api/graphql/project/compliance_frameworks_spec.rb ee/spec/requests/api/graphql/mutations/analytics/devops_adoption/enabled_namespaces/enable_spec.rb ee/spec/controllers/admin/runners_controller_spec.rb ee/spec/requests/api/graphql/mutations/gitlab_subscriptions/activate_spec.rb ee/spec/requests/api/rubygem_packages_spec.rb ee/spec/requests/projects/insights_controller_spec.rb ee/spec/mailers/emails/group_memberships_spec.rb ee/spec/requests/api/graphql/mutations/incident_management/issuable_resource_link/destroy_spec.rb ee/spec/controllers/ee/groups/variables_controller_spec.rb ee/spec/requests/api/graphql/mutations/members/groups/ee/bulk_update_spec.rb ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/destroy_spec.rb ee/spec/controllers/ee/profiles/preferences_controller_spec.rb ee/spec/controllers/concerns/internal_redirect_spec.rb ee/spec/requests/api/graphql/analytics/devops_adoption/enabled_namespaces_spec.rb ee/spec/requests/admin/impersonation_tokens_controller_spec.rb ee/spec/requests/api/search_spec.rbKnapsack report generator started!1147Run options: exclude {:quarantine=>true, :level=>"background_migration"}1148Test environment set up in 1.560989297 seconds1149Projects::MergeRequestsController1150 PUT update1151 when the merge request requires approval1152 behaves like update invalid issuable1153 when updating causes conflicts1154 renders edit when format is html1155 renders json error message when format is json1156 when updating an invalid issuable1157 renders edit when merge request is invalid1158 overriding approvers per MR1159 enabled1160 updates approvals1161 does not allow approvels before merge lower than the project setting1162 creates rules1163 disabled1164 does not update approvals_before_merge1165 does not update approver_ids1166 does not update approver_group_ids1167 does not create approval rules1168 when the MR targets the project1169 behaves like approvals_before_merge param1170 approvals_before_merge not set for the existing MR1171 when it is less than the one in the target project1172 sets the param to the sames as the project1173 updates the merge request1174 when it is equal to the one in the target project1175 sets the param to the same as the project1176 updates the merge request1177 when it is greater than the one in the target project1178 saves the param in the merge request1179 updates the merge request1180 approvals_before_merge set for the existing MR1181 when it is not set1182 does not change the merge request1183 updates the merge request1184 when it is less than the one in the target project1185 sets the param to the same as the target project1186 updates the merge request1187 when it is equal to the one in the target project1188 sets the param to the same as the target project1189 updates the merge request1190 when it is greater than the one in the target project1191 saves the param in the merge request1192 updates the merge request1193 when the project is a fork1194 when the MR target upstream1195 behaves like approvals_before_merge param1196 approvals_before_merge not set for the existing MR1197 when it is less than the one in the target project1198 sets the param to the sames as the project1199 updates the merge request1200 when it is equal to the one in the target project1201 sets the param to the same as the project1202 updates the merge request1203 when it is greater than the one in the target project1204 saves the param in the merge request1205 updates the merge request1206 approvals_before_merge set for the existing MR1207 when it is not set1208 does not change the merge request1209 updates the merge request1210 when it is less than the one in the target project1211 sets the param to the same as the target project1212 updates the merge request1213 when it is equal to the one in the target project1214 sets the param to the same as the target project1215 updates the merge request1216 when it is greater than the one in the target project1217 saves the param in the merge request1218 updates the merge request1219 when the MR target the fork1220 behaves like approvals_before_merge param1221 approvals_before_merge not set for the existing MR1222 when it is less than the one in the target project1223 sets the param to the sames as the project1224 updates the merge request1225 when it is equal to the one in the target project1226 sets the param to the same as the project1227 updates the merge request1228 when it is greater than the one in the target project1229 saves the param in the merge request1230 updates the merge request1231 approvals_before_merge set for the existing MR1232 when it is not set1233 does not change the merge request1234 updates the merge request1235 when it is less than the one in the target project1236 sets the param to the same as the target project1237 updates the merge request1238 when it is equal to the one in the target project1239 sets the param to the same as the target project1240 updates the merge request1241 when it is greater than the one in the target project1242 saves the param in the merge request1243 updates the merge request1244 POST #rebase1245 approvals pending1246 returns 2001247 GET #edit1248 default templates1249 when a merge request description has content1250 does not select a default template1251 when a merge request description is blank1252 when a default template does not exist in the repository1253 does not select a default template1254 when a default template exists in the repository1255 does not select a default template1256 GET #dependency_scanning_reports1257 behaves like pending pipeline response1258 when pipeline is pending1259 sends polling interval1260 returns 204 HTTP status1261 behaves like comparable report1262 when comparison is being processed1263 sends polling interval1264 returns 204 HTTP status1265 when comparison is done1266 does not send polling interval1267 returns 200 HTTP status1268 when user created corrupted reports1269 does not send polling interval1270 returns 400 HTTP status1271 behaves like authorize read pipeline1272 public project with private builds1273 restricts access to signed out users1274 restricts access to other users1275 GET #container_scanning_reports1276 behaves like pending pipeline response1277 when pipeline is pending1278 sends polling interval1279 returns 204 HTTP status1280 behaves like comparable report1281 when comparison is being processed1282 sends polling interval1283 returns 204 HTTP status1284 when comparison is done1285 does not send polling interval1286 returns 200 HTTP status1287 when user created corrupted reports1288 does not send polling interval1289 returns 400 HTTP status1290 behaves like authorize read pipeline1291 public project with private builds1292 restricts access to signed out users1293 restricts access to other users1294 GET #sast_reports1295 behaves like pending pipeline response1296 when pipeline is pending1297 sends polling interval1298 returns 204 HTTP status1299 behaves like comparable report1300 when comparison is being processed1301 sends polling interval1302 returns 204 HTTP status1303 when comparison is done1304 does not send polling interval1305 returns 200 HTTP status1306 when user created corrupted reports1307 does not send polling interval1308 returns 400 HTTP status1309 behaves like authorize read pipeline1310 public project with private builds1311 restricts access to signed out users1312 restricts access to other users1313 GET #coverage_fuzzing_reports1314 behaves like pending pipeline response1315 when pipeline is pending1316 sends polling interval1317 returns 204 HTTP status1318 behaves like comparable report1319 when comparison is being processed1320 sends polling interval1321 returns 204 HTTP status1322 when comparison is done1323 does not send polling interval1324 returns 200 HTTP status1325 when user created corrupted reports1326 does not send polling interval1327 returns 400 HTTP status1328 behaves like authorize read pipeline1329 public project with private builds1330 restricts access to signed out users1331 restricts access to other users1332 GET #api_fuzzing_reports1333 behaves like pending pipeline response1334 when pipeline is pending1335 sends polling interval1336 returns 204 HTTP status1337 behaves like comparable report1338 when comparison is being processed1339 sends polling interval1340 returns 204 HTTP status1341 when comparison is done1342 does not send polling interval1343 returns 200 HTTP status1344 when user created corrupted reports1345 does not send polling interval1346 returns 400 HTTP status1347 behaves like authorize read pipeline1348 public project with private builds1349 restricts access to signed out users1350 restricts access to other users1351 GET #secret_detection_reports1352 behaves like pending pipeline response1353 when pipeline is pending1354 sends polling interval1355 returns 204 HTTP status1356 behaves like comparable report1357 when comparison is being processed1358 sends polling interval1359 returns 204 HTTP status1360 when comparison is done1361 does not send polling interval1362 returns 200 HTTP status1363 when user created corrupted reports1364 does not send polling interval1365 returns 400 HTTP status1366 behaves like authorize read pipeline1367 public project with private builds1368 restricts access to signed out users1369 restricts access to other users1370 GET #dast_reports1371 behaves like pending pipeline response1372 when pipeline is pending1373 sends polling interval1374 returns 204 HTTP status1375 behaves like comparable report1376 when comparison is being processed1377 sends polling interval1378 returns 204 HTTP status1379 when comparison is done1380 does not send polling interval1381 returns 200 HTTP status1382 when user created corrupted reports1383 does not send polling interval1384 returns 400 HTTP status1385 behaves like authorize read pipeline1386 public project with private builds1387 restricts access to signed out users1388 restricts access to other users1389 GET #license_scanning_reports1390 when the license_scanning_sbom_scanner feature flag is false1391 behaves like license scanning report comparison1392 when the report is being parsed1393 returns 204 HTTP status1394 when comparison is being processed1395 sends polling interval1396 returns 204 HTTP status1397 when comparison is done1398 does not send polling interval1399 returns 200 HTTP status1400 when user created corrupted test reports1401 does not send polling interval1402 returns 400 HTTP status1403 when a user is authorized to read the licenses1404 returns 200 HTTP status1405 when license_scanning feature is disabled1406 returns 404 status1407 behaves like authorize read pipeline1408 public project with private builds1409 restricts access to signed out users1410 restricts access to other users1411 when the license_scanning_sbom_scanner feature flag is true1412 behaves like license scanning report comparison1413 when the report is being parsed1414 returns 204 HTTP status1415 when comparison is being processed1416 sends polling interval1417 returns 204 HTTP status1418 when comparison is done1419 does not send polling interval1420 returns 200 HTTP status1421 when user created corrupted test reports1422 does not send polling interval1423 returns 400 HTTP status1424 when a user is authorized to read the licenses1425 returns 200 HTTP status1426 when license_scanning feature is disabled1427 returns 404 status1428 behaves like authorize read pipeline1429 public project with private builds1430 restricts access to signed out users1431 restricts access to other users1432 GET #license_scanning_reports_collapsed1433 when the license_scanning_sbom_scanner feature flag is false1434 behaves like license scanning report comparison1435 when the report is being parsed1436 returns 204 HTTP status1437 when comparison is being processed1438 sends polling interval1439 returns 204 HTTP status1440 when comparison is done1441 does not send polling interval1442 returns 200 HTTP status1443 when user created corrupted test reports1444 does not send polling interval1445 returns 400 HTTP status1446 when a user is authorized to read the licenses1447 returns 200 HTTP status1448 when license_scanning feature is disabled1449 returns 404 status1450 behaves like authorize read pipeline1451 public project with private builds1452 restricts access to signed out users1453 restricts access to other users1454 when the license_scanning_sbom_scanner feature flag is true1455 behaves like license scanning report comparison1456 when the report is being parsed1457 returns 204 HTTP status1458 when comparison is being processed1459 sends polling interval1460 returns 204 HTTP status1461 when comparison is done1462 does not send polling interval1463 returns 200 HTTP status1464 when user created corrupted test reports1465 does not send polling interval1466 returns 400 HTTP status1467 when a user is authorized to read the licenses1468 returns 200 HTTP status1469 when license_scanning feature is disabled1470 returns 404 status1471 behaves like authorize read pipeline1472 public project with private builds1473 restricts access to signed out users1474 restricts access to other users1475 GET #metrics_reports1476 behaves like comparable report1477 when comparison is being processed1478 sends polling interval1479 returns 204 HTTP status1480 when comparison is done1481 does not send polling interval1482 returns 200 HTTP status1483 when user created corrupted reports1484 does not send polling interval1485 returns 400 HTTP status1486 behaves like authorize read pipeline1487 public project with private builds1488 restricts access to signed out users1489 restricts access to other users1490 behaves like DescriptionDiffActions1492 when license is available1493 GET description_diff1494 returns the diff with the previous version1495 returns the diff with the previous version of the specified start_version_id1496 when description version is from another issuable1497 returns 4041498 when start_version_id is from another issuable1499 returns 4041500 when start_version_id is deleted1501 returns 4041502 when description version is deleted1503 returns 4041504 DELETE description_diff1505 returns 2001506 when start_version_id is present1507 returns 2001508 when version is already deleted1509 returns 4041510 when user cannot admin issuable1511 returns 4041512 when license is not available1513 GET description_diff1514 returns 4041515 DELETE description_diff1516 returns 4041517OperationsController1518 GET #index1519 format html1520 renders index with 200 status code1521 behaves like unlicensed1522 renders 4041523 with an anonymous user1524 redirects to sign-in page1525 format json1526 behaves like unlicensed1527 renders 4041528 with added projects1529 returns a list of added projects1530 returns as many projects as are in the user's dashboard1531 returns a list of added projects1532 without sufficient access level1533 behaves like empty project list1534 returns an empty list1535 without projects1536 behaves like empty project list1537 returns an empty list1538 with an anonymous user1539 returns unauthorized response1540 GET #environments1541 format html1542 renders the view1543 behaves like unlicensed1544 renders 4041545 with an anonymous user1546 redirects to sign-in page1547 format json1548 behaves like unlicensed1549 renders 4041550 with an anonymous user1551 returns unauthorized response1552 with an authenticated user without sufficient access_level1553 returns an empty project list1554 with an authenticated developer1555 returns an empty project list1556 sets the polling interval header1557 returns an empty project list when the project is not in the developer's dashboard1558 with a project in the dashboard1559 returns a project without an environment1560 returns one project with one environment1561 returns multiple projects and environments1562 does not make N+1 queries with multiple environments1563 does not return environments that would be grouped into a folder1564 does not return environments that would be grouped into a folder even when there is only a single environment1565 returns an environment not in a folder1566 returns the last deployment for an environment1567 returns the last deployment's deployable1568 returns a failed deployment1569 does not return a project for which the operations dashboard feature is unavailable1570 returns seven projects when some projects do not have the dashboard feature available1571 returns a maximum of three environments for a project1572 returns a maximum of three environments for multiple projects1573 with environments pagination1574 pagination behaviour1575 with `per_page`1576 behaves like environments pagination1577 is expected to include pagination headers1578 with `page=1`1579 behaves like environments pagination1580 is expected to include pagination headers1581 with `page=2`1582 behaves like environments pagination1583 is expected to include pagination headers1584 N+1 queries1585 avoids N+1 database queries1586 with a pipeline1587 returns the last pipeline for an environment1588 returns the last pipeline details1589 returns an upstream pipeline1590 returns a downstream pipeline1591 POST #create1592 format json1593 behaves like unlicensed1594 renders 4041595 without added projects1596 adds projects to the dashboard1597 cannot add a project twice1598 does not add invalid project ids1599 with added project1600 does not add already added project1601 with an anonymous user1602 redirects to sign-in page1603 DELETE #destroy1604 behaves like unlicensed1605 renders 4041606 with added projects1607 removes a project successfully1608 without projects1609 cannot remove invalid project1610 with an anonymous user1611 redirects to sign-in page1612API::Issues1613 GET /issues1614 when authenticated1615 matches V4 response schema1616 blocking issues count1617 returns a blocking issues count of 0 if there are no blocking issues1618 returns a blocking issues count of 1 if there exists a blocking issue1619 filtering by weight1620 returns issues with specific weight1621 returns issues with no weight1622 returns issues with any weight1623 returns issues without specific weight1624 filtering by health status1625 returns issues with specific health_status1626 returns issues with any health_status1627 returns issues with no health_status1628 returns bad request when unsupported value is supplied1629 filtering by assignee_username1630 returns issues with multiple assignees1631 behaves like filtering by epic_id1632 returns issues without epic when epic_id is "None"1633 returns issues with any epic when epic_id is "Any"1634 returns issues with any epic when epic_id is specific1635 filtering by iteration1636 returns issues with specific iteration1637 returns issues with no iteration1638 returns issues with any iteration1639 returns no issues on user dashboard issues list1640 returns issues with a specific iteration title1641 GET /groups/:id/issues1642 avoids N+1 queries with epics1643 avoids N+1 queries with iterations1644 filtering by assignee_username1645 returns issues with multiple assignees1646 behaves like filtering by epic_id1647 returns issues without epic when epic_id is "None"1648 returns issues with any epic when epic_id is "Any"1649 returns issues with any epic when epic_id is specific1650 behaves like exposes epic1651 with epics feature1652 contains epic_iid in response1653 contains epic in response1654 and epic issue is not present1655 exposes epic as nil1656 without epics feature1657 does not contain epic_iid in response1658 does not contain epic_iid in response1659 behaves like exposes iteration1660 with iteration feature1661 contains iteration in response1662 without iterations feature1663 does not contain iteration in response1664 filtering by iteration1665 returns issues with Current iteration1666 GET /projects/:id/issues1667 filtering by assignee_username1668 returns issues with multiple assignees1669 behaves like filtering by epic_id1670 returns issues without epic when epic_id is "None"1671 returns issues with any epic when epic_id is "Any"1672 returns issues with any epic when epic_id is specific1673 on personal project1674 does not contain epic_iid in response1675 on group project1676 behaves like exposes epic1677 with epics feature1678 contains epic_iid in response1679 contains epic in response1680 and epic issue is not present1681 exposes epic as nil1682 without epics feature1683 does not contain epic_iid in response1684 does not contain epic_iid in response1685 behaves like exposes iteration1686 with iteration feature1687 contains iteration in response1688 without iterations feature1689 does not contain iteration in response1690 filtering by iteration1691 returns issues with Current iteration1692 GET /project/:id/issues/:issue_id1693 on personal project1694 does not contain epic_iid in response1695 on group project1696 behaves like exposes epic1697 with epics feature1698 contains epic_iid in response1699 contains epic in response1700 and epic issue is not present1701 exposes epic as nil1702 without epics feature1703 does not contain epic_iid in response1704 does not contain epic_iid in response1705 when specificied issue is of type task1706 returns a not found status code1707 POST /projects/:id/issues1708 creates a new project issue1709 does not allow the creation of an issue of type task1710 behaves like with epic parameter1711 for a group project1712 with epics feature1713 when user can read epics1714 with epic_id parameter1715 sets epic on issue1716 with deprecated epic_iid parameter1717 sets epic on issue1718 when user can not read the epic1719 does not set the epic1720 when user can not admin_issue_relation for the issue1721 returns an error1722 without epics feature1723 does not set epic on issue1724 when both epic_id and epic_iid is used1725 returns an error1726 for a user project1727 does not set epic on issue1728 PUT /projects/:id/issues/:issue_iid to update weight1729 updates an issue with no weight1730 removes a weight from an issue1731 returns 400 if weight is less than minimum weight1732 creates a ResourceWeightEvent1733 does not create a system note1734 adds a note when the weight is changed1735 issuable weights unlicensed1736 ignores the update1737 PUT /projects/:id/issues/:issue_iid to update epic1738 behaves like with epic parameter1739 for a group project1740 with epics feature1741 when user can read epics1742 with epic_id parameter1743 sets epic on issue1744 with deprecated epic_iid parameter1745 sets epic on issue1746 when user can not read the epic1747 does not set the epic1748 when user can not admin_issue_relation for the issue1749 returns an error1750 without epics feature1751 does not set epic on issue1752 when both epic_id and epic_iid is used1753 returns an error1754 for a user project1755 does not set epic on issue1756 PUT /projects/:id/issues/:issue_iid/metric_images/authorize1757 authorizes uploading with workhorse header1758 rejects requests that bypassed gitlab-workhorse1759 when using remote storage1760 when direct upload is enabled1761 responds with status 200, location of file remote store and object details1762 when direct upload is disabled1763 handles as a local file1764 POST /projects/:id/issues/:issue_iid/metric_images1765 user_role: :guest, own_issue: true, expected_status: :unauthorized_upload1766 behaves like unauthorized_upload1767 disallows the upload1768 user_role: :guest, own_issue: false, expected_status: :unauthorized_upload1769 behaves like unauthorized_upload1770 disallows the upload1771 user_role: :reporter, own_issue: true, expected_status: :can_upload_metric_image1772 behaves like can_upload_metric_image1773 creates a new metric image1774 user_role: :reporter, own_issue: false, expected_status: :can_upload_metric_image1775 behaves like can_upload_metric_image1776 creates a new metric image1777 file size too large1778 returns an error1779 object storage enabled1780 uploads to remote storage1781 behaves like can_upload_metric_image1782 creates a new metric image1783 GET /projects/:id/issues/:issue_iid/metric_images1784 user_role: :not_member, own_issue: false, issue_confidential: false, expected_status: :unauthorized_read1785 behaves like unauthorized_read1786 cannot read the metric images1787 user_role: :guest, own_issue: false, issue_confidential: true, expected_status: :unauthorized_read1788 behaves like unauthorized_read1789 cannot read the metric images1790 user_role: :guest, own_issue: true, issue_confidential: false, expected_status: :can_read_metric_image1791 behaves like can_read_metric_image1792 can read the metric images1793 user_role: :guest, own_issue: false, issue_confidential: false, expected_status: :can_read_metric_image1794 behaves like can_read_metric_image1795 can read the metric images1796 user_role: :reporter, own_issue: true, issue_confidential: false, expected_status: :can_read_metric_image1797 behaves like can_read_metric_image1798 can read the metric images1799 user_role: :reporter, own_issue: false, issue_confidential: false, expected_status: :can_read_metric_image1800 behaves like can_read_metric_image1801 can read the metric images1802 PUT /projects/:id/issues/:issue_iid/metric_images/:metric_image_id1803 user_role: :not_member, own_issue: false, issue_confidential: false, expected_status: :unauthorized_update1804 behaves like unauthorized_update1805 cannot delete the metric image1806 user_role: :not_member, own_issue: true, issue_confidential: false, expected_status: :unauthorized_update1807 behaves like unauthorized_update1808 cannot delete the metric image1809 user_role: :not_member, own_issue: true, issue_confidential: true, expected_status: :unauthorized_update1810 behaves like unauthorized_update1811 cannot delete the metric image1812 user_role: :guest, own_issue: false, issue_confidential: true, expected_status: :not_found1813 behaves like not_found1814 cannot delete the metric image1815 user_role: :guest, own_issue: false, issue_confidential: false, expected_status: :unauthorized_update1816 behaves like unauthorized_update1817 cannot delete the metric image1818 user_role: :guest, own_issue: true, issue_confidential: false, expected_status: :can_update_metric_image1819 behaves like can_update_metric_image1820 can update the metric images1821 user_role: :reporter, own_issue: true, issue_confidential: false, expected_status: :can_update_metric_image1822 behaves like can_update_metric_image1823 can update the metric images1824 user_role: :reporter, own_issue: false, issue_confidential: false, expected_status: :can_update_metric_image1825 behaves like can_update_metric_image1826 can update the metric images1827 user has access1828 metric image not found1829 returns an error1830 metric image cannot be updated1831 returns an error1832 DELETE /projects/:id/issues/:issue_iid/metric_images/:metric_image_id1833 user_role: :not_member, own_issue: false, issue_confidential: false, expected_status: :unauthorized_delete1834 behaves like unauthorized_delete1835 cannot delete the metric image1836 user_role: :not_member, own_issue: true, issue_confidential: false, expected_status: :unauthorized_delete1837 behaves like unauthorized_delete1838 cannot delete the metric image1839 user_role: :not_member, own_issue: true, issue_confidential: true, expected_status: :unauthorized_delete1840 behaves like unauthorized_delete1841 cannot delete the metric image1842 user_role: :guest, own_issue: false, issue_confidential: true, expected_status: :not_found1843 behaves like not_found1844 cannot delete the metric image1845 user_role: :guest, own_issue: false, issue_confidential: false, expected_status: :unauthorized_delete1846 behaves like unauthorized_delete1847 cannot delete the metric image1848 user_role: :guest, own_issue: true, issue_confidential: false, expected_status: :can_delete_metric_image1849 behaves like can_delete_metric_image1850 can delete the metric images1851 user_role: :reporter, own_issue: true, issue_confidential: false, expected_status: :can_delete_metric_image1852 behaves like can_delete_metric_image1853 can delete the metric images1854 user_role: :reporter, own_issue: false, issue_confidential: false, expected_status: :can_delete_metric_image1855 behaves like can_delete_metric_image1856 can delete the metric images1857 user has access1858 metric image not found1859 returns an error1860API::Releases1861 POST /projects/:id/releases1862 updates the AuditEvent1863 without milestone1864 with milestone1865 is expected to include {:custom_message => "Created Release v0.1 with Milestone v1.0", :target_type => "Release", :target_id => 2, :target_details => "New release"}1866 with a group milestone1867 succesfully adds a group milestone1868 adds the milestone1869 fails to add a group milestone if project does not belong to this group1870 returns a 400 error as milestone not found1871 when valid group and project milestones are passed1872 adds the milestone1873 with a supergroup milestone1874 returns a 400 error as milestone not found1875 PUT /projects/:id/releases/:tag_name1876 creates an AuditEvent when a release is updated1877 with milestones1878 no existing milestones1879 add single milestone1880 behaves like update with milestones1881 is expected to eq "Milestones associated with release changed to v1.0"1882 add multiple milestones1883 behaves like update with milestones1884 is expected to eq "Milestones associated with release changed to v1.0, v2.0"1885 existing milestone1886 add milestone1887 behaves like update with milestones1888 is expected to eq "Milestones associated with release changed to v0.1, v1.0"1889 replace milestone1890 behaves like update with milestones1891 is expected to eq "Milestones associated with release changed to v1.0"1892 remove all milestones1893 behaves like update with milestones1894 is expected to eq "Milestones associated with release changed to [none]"1895 with group milestones1896 when a group milestone is passed1897 when there is no project milestone1898 adds the group milestone1899 when there is an existing project milestone1900 replaces the project milestone with the group milestone1901 POST /projects/:id/releases/:tag_name/evidence1902 accepts the request1903 accepts the request when using JOB-TOKEN auth1904 creates the Evidence1905 when tag_name is invalid1906 returns a 4041907 when user is a reporter1908 forbids the request1909 when user is a developer1910 accepts the request1911 when user is not a project member1912 forbids the request1913 when project is public1914 forbids the request1915 DELETE /projects/:id/releases/:tag_name1916 creates an AuditEvent when a release is deleted1917API::ProjectApprovalSettings1918 GET /projects/:id/approval_settings1919 when the request is correct1920 matches the response schema1921 when target_branch is specified1922 filters the rules returned by target branch1923 private group filtering1924 excludes private groups if user has no access1925 includes private groups if user has access1926 report_approver rules1927 includes report_approver rules1928 when project is archived1929 when user has normal permissions1930 returns 4031931 when user has project admin permissions1932 allows access1933 POST /projects/:id/approval_settings/rules1934 behaves like an API endpoint for creating project approval rule1935 behaves like a restricted project approval rule API endpoint1936 when admin_merge_request_approvers_rules license feature is disabled1937 when disable_overriding_approvers_per_merge_request app setting is false1938 behaves like a user with access1939 returns 201 status1940 when disable_overriding_approvers_per_merge_request app setting is true1941 behaves like a user with access1942 returns 201 status1943 when admin_merge_request_approvers_rules license feature is enabled1944 when disable_overriding_approvers_per_merge_request app setting is false1945 behaves like a user with access1946 returns 201 status1947 when disable_overriding_approvers_per_merge_request app setting is true1948 behaves like a user without access1949 returns 4031950 when user is an admin1951 behaves like a user with access1952 returns 201 status1953 when missing parameters1954 returns 400 status1955 when user is without access1956 behaves like a user without access1957 returns 4031958 when the request is correct1959 changes settings properly1960 behaves like a user with access1961 returns 201 status1962 when protected_branch_ids param is present1963 creates approval rule associated to specified protected branches1964 when applies_to_all_protected_branches param is present1965 returns a list of project protected branches in the response1966 with rule_type set to report_approver1967 without report_type1968 returns a error http status1969 when creating a approval rule for each report_type1970 rule_name: "License-Check", report_type: :license_scanning1971 specifies `report_rule` and `report_type`1972 rule_name: "Coverage-Check", report_type: :code_coverage1973 specifies `report_rule` and `report_type`1974 with valid scanners1975 returns 201 status1976 with valid severity_levels1977 returns 201 status1978 with username1979 returns 201 status1980 with vulnerabilities_allowed1981 returns 201 status1982 PUT /projects/:id/approval_settings/:approval_rule_id1983 behaves like an API endpoint for updating project approval rule1984 behaves like a restricted project approval rule API endpoint1985 when admin_merge_request_approvers_rules license feature is disabled1986 when disable_overriding_approvers_per_merge_request app setting is false1987 behaves like a user with access1988 sets approvers1989 when applies_to_all_protected_branches param is present1990 returns a list of project protected branches in the response1991 when protected_branch_ids param is present1992 associates approval rule to specified protected branches1993 with valid scanners1994 returns 200 status1995 with nil scanners1996 returns 200 status1997 when scanners is NULL in the database1998 returns 200 status1999 with valid severity_levels2000 returns 200 status2001 when approver already exists2002 when sending json data2003 removes all approvers if empty params are given2004 with vulnerabilities_allowed2005 returns 200 status2006 when disable_overriding_approvers_per_merge_request app setting is true2007 behaves like a user with access2008 sets approvers2009 when applies_to_all_protected_branches param is present2010 returns a list of project protected branches in the response2011 when protected_branch_ids param is present2012 associates approval rule to specified protected branches2013 with valid scanners2014 returns 200 status2015 with nil scanners2016 returns 200 status2017 when scanners is NULL in the database2018 returns 200 status2019 with valid severity_levels2020 returns 200 status2021 when approver already exists2022 when sending json data2023 removes all approvers if empty params are given2024 with vulnerabilities_allowed2025 returns 200 status2026 when admin_merge_request_approvers_rules license feature is enabled2027 when disable_overriding_approvers_per_merge_request app setting is false2028 behaves like a user with access2029 sets approvers2030 when applies_to_all_protected_branches param is present2031 returns a list of project protected branches in the response2032 when protected_branch_ids param is present2033 associates approval rule to specified protected branches2034 with valid scanners2035 returns 200 status2036 with nil scanners2037 returns 200 status2038 when scanners is NULL in the database2039 returns 200 status2040 with valid severity_levels2041 returns 200 status2042 when approver already exists2043 when sending json data2044 removes all approvers if empty params are given2045 with vulnerabilities_allowed2046 returns 200 status2047 when disable_overriding_approvers_per_merge_request app setting is true2048 behaves like a user without access2049 returns 4032050 when user is an admin2051 behaves like a user with access2052 sets approvers2053 when applies_to_all_protected_branches param is present2054 returns a list of project protected branches in the response2055 when protected_branch_ids param is present2056 associates approval rule to specified protected branches2057 with valid scanners2058 returns 200 status2059 with nil scanners2060 returns 200 status2061 when scanners is NULL in the database2062 returns 200 status2063 with valid severity_levels2064 returns 200 status2065 when approver already exists2066 when sending json data2067 removes all approvers if empty params are given2068 with vulnerabilities_allowed2069 returns 200 status2070 as a project admin2071 behaves like a user with access2072 sets approvers2073 when applies_to_all_protected_branches param is present2074 returns a list of project protected branches in the response2075 when protected_branch_ids param is present2076 associates approval rule to specified protected branches2077 with valid scanners2078 returns 200 status2079 with nil scanners2080 returns 200 status2081 when scanners is NULL in the database2082 returns 200 status2083 with valid severity_levels2084 returns 200 status2085 when approver already exists2086 when sending json data2087 removes all approvers if empty params are given2088 with vulnerabilities_allowed2089 returns 200 status2090 as a global admin2091 behaves like a user with access2092 sets approvers2093 when applies_to_all_protected_branches param is present2094 returns a list of project protected branches in the response2095 when protected_branch_ids param is present2096 associates approval rule to specified protected branches2097 with valid scanners2098 returns 200 status2099 with nil scanners2100 returns 200 status2101 when scanners is NULL in the database2102 returns 200 status2103 with valid severity_levels2104 returns 200 status2105 when approver already exists2106 when sending json data2107 removes all approvers if empty params are given2108 with vulnerabilities_allowed2109 returns 200 status2110 as a random user2111 behaves like a user without access2112 returns 4032113 DELETE /projects/:id/approval_settings/rules/:approval_rule_id2114 behaves like an API endpoint for deleting project approval rule2115 behaves like a user with access2116 destroys2117 behaves like a restricted project approval rule API endpoint2118 when admin_merge_request_approvers_rules license feature is disabled2119 when disable_overriding_approvers_per_merge_request app setting is false2120 behaves like a user with access2121 destroys2122 when disable_overriding_approvers_per_merge_request app setting is true2123 behaves like a user with access2124 destroys2125 when admin_merge_request_approvers_rules license feature is enabled2126 when disable_overriding_approvers_per_merge_request app setting is false2127 behaves like a user with access2128 destroys2129 when disable_overriding_approvers_per_merge_request app setting is true2130 behaves like a user without access2131 returns 4032132 when user is an admin2133 behaves like a user with access2134 destroys2135 when approval rule not found2136 returns not found2137 when user is not eligible to delete2138 behaves like a user without access2139 returns 4032140API::LdapGroupLinks2141 GET /groups/:id/ldap_group_links2142 when unauthenticated2143 returns authentication error2144 when a less priviledged user2145 returns forbidden2146 when owner of the group2147 returns ldap group links2148 returns error if no ldap group links found2149 POST /groups/:id/ldap_group_links2150 adding a group link via CN2151 behaves like creates LDAP group link2152 when unauthenticated2153 returns authentication error2154 when a less priviledged user2155 does not allow less priviledged user to add LDAP group link2156 when owner of the group2157 returns ok and add ldap group link2158 returns error if LDAP group link already exists2159 returns a 400 error when CN or filter is not given2160 returns a 400 error when group access is not given2161 returns a 422 error when group access is not valid2162 adding a group link via filter2163 feature is available2164 behaves like creates LDAP group link2165 when unauthenticated2166 returns authentication error2167 when a less priviledged user2168 does not allow less priviledged user to add LDAP group link2169 when owner of the group2170 returns ok and add ldap group link2171 returns error if LDAP group link already exists2172 returns a 400 error when CN or filter is not given2173 returns a 400 error when group access is not given2174 returns a 422 error when group access is not valid2175 feature is not available2176 returns 4042177 DELETE /groups/:id/ldap_group_links/:cn2178 when unauthenticated2179 returns authentication error2180 when a less priviledged user2181 does not remove the LDAP group link2182 when owner of the group2183 removes ldap group link2184 returns 404 if LDAP group cn not used for a LDAP group link2185 DELETE /groups/:id/ldap_group_links/:provider/:cn2186 when unauthenticated2187 returns authentication error2188 when a less priviledged user2189 does not remove the LDAP group link2190 when owner of the group2191 returns 404 if LDAP group cn not used for a LDAP group link for the specified provider2192 removes ldap group link2193 DELETE /groups/:id/ldap_group_links2194 deleting a group link via CN and provider2195 behaves like deletes LDAP group link2196 when unauthenticated2197 returns authentication error2198 when a less priviledged user2199 does not remove the LDAP group link2200 when owner of the group2201 removes ldap group link2202 behaves like group link is not found2203 when owner of the group2204 returns 404 if LDAP input not used for a LDAP group link2205 deleting a group link via filter and provider2206 feature is available2207 behaves like deletes LDAP group link2208 when unauthenticated2209 returns authentication error2210 when a less priviledged user2211 does not remove the LDAP group link2212 when owner of the group2213 removes ldap group link2214 behaves like group link is not found2215 when owner of the group2216 returns 404 if LDAP input not used for a LDAP group link2217 feature is not available2218 returns 4042219Groups::Analytics::CycleAnalytics::SummaryController2220 GET "show"2221 passes the date filter to the query class2222 behaves like summary endpoint2223 succeeds2224 when valid parameters are given2225 succeeds2226 accepts optional `project_ids` array2227 succeeds2228 when `created_before` is missing2229 succeeds2230 when `created_after` is missing2231 succeeds2232 when `created_after` is invalid, falls back to default date2233 is expected to respond with numeric status code success2234 when `created_before` is invalid2235 renders `unprocessable_entity`2236 when `created_after` is later than `created_before`2237 renders `unprocessable_entity`2238 when the date range exceeds 180 days2239 renders `unprocessable_entity`2240 when `group_id` is not found2241 renders `not_found` when group is missing2242 when user has no lower access level than `reporter`2243 renders `forbidden` response2244 when feature is not available for the group2245 renders `forbidden` response2246 GET "time_summary"2247 passes the group to RequestParams2248 uses the aggregated VSA data collector2249 behaves like summary endpoint2250 succeeds2251 when valid parameters are given2252 succeeds2253 accepts optional `project_ids` array2254 succeeds2255 when `created_before` is missing2256 succeeds2257 when `created_after` is missing2258 succeeds2259 when `created_after` is invalid, falls back to default date2260 is expected to respond with numeric status code success2261 when `created_before` is invalid2262 renders `unprocessable_entity`2263 when `created_after` is later than `created_before`2264 renders `unprocessable_entity`2265 when the date range exceeds 180 days2266 renders `unprocessable_entity`2267 when `group_id` is not found2268 renders `not_found` when group is missing2269 when user has no lower access level than `reporter`2270 renders `forbidden` response2271 when feature is not available for the group2272 renders `forbidden` response2273 time series endpoints2274 GET "lead_times"2275 returns the daily average durations2276 behaves like summary endpoint2277 succeeds2278 when valid parameters are given2279 succeeds2280 accepts optional `project_ids` array2281 succeeds2282 when `created_before` is missing2283 succeeds2284 when `created_after` is missing2285 succeeds2286 when `created_after` is invalid, falls back to default date2287 is expected to respond with numeric status code success2288 when `created_before` is invalid2289 renders `unprocessable_entity`2290 when `created_after` is later than `created_before`2291 renders `unprocessable_entity`2292 when the date range exceeds 180 days2293 renders `unprocessable_entity`2294 when `group_id` is not found2295 renders `not_found` when group is missing2296 when user has no lower access level than `reporter`2297 renders `forbidden` response2298 when feature is not available for the group2299 renders `forbidden` response2300 GET "cycle_times"2301 returns the daily average durations2302 behaves like summary endpoint2303 succeeds2304 when valid parameters are given2305 succeeds2306 accepts optional `project_ids` array2307 succeeds2308 when `created_before` is missing2309 succeeds2310 when `created_after` is missing2311 succeeds2312 when `created_after` is invalid, falls back to default date2313 is expected to respond with numeric status code success2314 when `created_before` is invalid2315 renders `unprocessable_entity`2316 when `created_after` is later than `created_before`2317 renders `unprocessable_entity`2318 when the date range exceeds 180 days2319 renders `unprocessable_entity`2320 when `group_id` is not found2321 renders `not_found` when group is missing2322 when user has no lower access level than `reporter`2323 renders `forbidden` response2324 when feature is not available for the group2325 renders `forbidden` response2326Groups::OmniauthCallbacksController2327 when request hasn't been validated by omniauth middleware2328 prevents authentication2329 valid credentials2330 when user used to be a member of a group2331 displays a flash message verifying group sign in2332 adds linked identity2333 adds group membership2334 when user was provisioned by other group2335 displays a flash message verifying group sign in2336 does not add linked identity2337 does not add group membership2338 when signed in2339 behaves like and identity already linked2340 displays a flash message verifying group sign in2341 uses existing linked identity2342 skips authenticity token based forgery protection2343 behaves like SAML session initiated2344 redirects to RelayState2345 logs group audit event for authentication2346 stores that a SAML session is active2347 with 2FA2348 stores that a SAML session is active2349 oauth linked with different NameID2350 displays a flash message verifying group sign in2351 when user email address does not match auth hash email address2352 redirects and displays an error2353 oauth already linked to another account2354 redirects and displays an error2355 and identity hasn't been linked2356 links the identity2357 displays a flash indicating the account has been linked2358 logs group audit event for being added to the group2359 when a default access level is specified in the SAML provider2360 sets the access level of the member as per the specified `default_membership_role`2361 behaves like SAML session initiated2362 redirects to RelayState2363 logs group audit event for authentication2364 stores that a SAML session is active2365 with IdP initiated request2366 redirects to account link page2367 lets the user know their account isn't linked yet2368 with enforced_group_managed_accounts enabled2369 redirects to group sign up2370 when not signed in2371 and identity hasn't been linked2372 redirects to group sign up page2373 when sign_up_on_sso feature flag is disabled2374 redirects to sign in page with flash notice2375 behaves like and identity already linked2376 displays a flash message verifying group sign in2377 uses existing linked identity2378 skips authenticity token based forgery protection2379 behaves like SAML session initiated2380 redirects to RelayState2381 logs group audit event for authentication2382 stores that a SAML session is active2383 with 2FA2384 stores that a SAML session is active2385 identity verification2386 on sign up2387 behaves like identity verification not required2388 does not redirect to identity verification2389 on sign in when identity is not yet verified2390 behaves like identity verification not required2391 does not redirect to identity verification2392 #failure2393 not signed in2394 doesn't disclose group existence2395 group doesn't exist2396 doesn't disclose group non-existence2397 with access2398 has descriptive error flash2399 redirects back go the SSO page2400 with access to SAML settings for the group2401 redirects to the settings page2402API::ProjectMirror2403 POST /projects/:id/mirror/pull2404 when authenticated via GitHub signature2405 when project is not mirrored2406 is expected to respond with numeric status code bad_request2407 when project is mirrored2408 when "pull_request" event is received2409 behaves like triggering pipeline creation2410 enqueues Ci::ExternalPullRequests::CreatePipelineWorker2411 when any param is missing2412 returns the error message2413 when action is not supported2414 ignores it and return success status2415 when authenticated as user2416 behaves like triggering pipeline creation2417 enqueues Ci::ExternalPullRequests::CreatePipelineWorker2418 when ci_cd_projects is not available2419 returns the error message2420 when github_integration is not available2421 returns the error message2422 when "push" event is received2423 when import state is none2424 behaves like an API endpoint that triggers pull mirroring operation2425 executes UpdateAllMirrorsWorker2426 when import state is failed2427 behaves like an API endpoint that triggers pull mirroring operation2428 executes UpdateAllMirrorsWorker2429 and retried more than 14 times2430 behaves like an API endpoint that does not trigger pull mirroring operation2431 does not execute UpdateAllMirrorsWorker and returns forbidden2432 when import state is finished2433 behaves like an API endpoint that triggers pull mirroring operation2434 executes UpdateAllMirrorsWorker2435 when import state is scheduled2436 behaves like an API endpoint that does not trigger pull mirroring operation2437 does not execute UpdateAllMirrorsWorker and returns ok2438 when import state is started2439 behaves like an API endpoint that does not trigger pull mirroring operation2440 does not execute UpdateAllMirrorsWorker and returns ok2441 when authenticated as user2442 is authenticated as developer2443 returns forbidden error2444 is authenticated as reporter2445 returns forbidden error2446 is authenticated as guest2447 returns forbidden error2448 is authenticated as maintainer2449 triggers the pull mirroring operation2450 is authenticated as owner2451 triggers the pull mirroring operation2452 when repository_mirrors feature is not available2453 behaves like an API endpoint that does not trigger pull mirroring operation2454 does not execute UpdateAllMirrorsWorker and returns bad_request2455 when repository_mirrors feature is available2456 behaves like an API endpoint that triggers pull mirroring operation2457 executes UpdateAllMirrorsWorker2458 when not authenticated2459 with public project2460 returns a 401 status2461 with internal project2462 returns a 404 status2463 with private project2464 returns a 404 status2465 GET /projects/:id/mirror/pull2466 when user is missing2467 returns Unauthorized2468 when user has no admin permissions2469 returns forbidden error2470 when user has admin permissions2471 returns pull mirror details2472 when project does not support mirroring2473 returns BadRequest2474Git LFS API and storage2475 with group wikis2476 behaves like LFS http requests2477 when LFS is disabled globally2478 download request2479 behaves like LFS http 501 response2480 behaves like LFS http expected response code and message2481 is expected to eq "Git LFS is not enabled on this GitLab server, contact your admin."2482 upload request2483 behaves like LFS http 501 response2484 behaves like LFS http expected response code and message2485 is expected to eq "Git LFS is not enabled on this GitLab server, contact your admin."2486 unauthenticated2487 download request2488 behaves like LFS http 401 response2489 behaves like LFS http expected response code and message2490 is expected to match "text/plain"2491 upload request2492 behaves like LFS http 401 response2493 behaves like LFS http expected response code and message2494 is expected to match "text/plain"2495 without access2496 download request2497 behaves like LFS http 404 response2498 behaves like LFS http expected response code and message2499 is expected to match "application/vnd.git-lfs+json"2500 upload request2501 behaves like LFS http 404 response2502 behaves like LFS http expected response code and message2503 is expected to match "application/vnd.git-lfs+json"2504 with guest access2505 download request2506 behaves like LFS http 404 response2507 behaves like LFS http expected response code and message2508 is expected to match "application/vnd.git-lfs+json"2509 upload request2510 behaves like LFS http 404 response2511 behaves like LFS http expected response code and message2512 is expected to match "application/vnd.git-lfs+json"2513 with download permission2514 download request2515 behaves like LFS http 200 blob response2516 behaves like LFS http 404 response2517 behaves like LFS http expected response code and message2518 is expected to match "application/vnd.git-lfs+json"2519 when container does not exist2520 behaves like LFS http 404 response2521 behaves like LFS http expected response code and message2522 is expected to match "application/vnd.git-lfs+json"2523 upload request2524 behaves like LFS http 403 response2525 behaves like LFS http 404 response2526 behaves like LFS http expected response code and message2527 is expected to match "application/vnd.git-lfs+json"2528 with upload permission2529 upload request2530 behaves like LFS http 200 response2531 behaves like LFS http 404 response2532 behaves like LFS http expected response code and message2533 is expected to match "application/vnd.git-lfs+json"2534 deprecated API2535 when fetching LFS object using deprecated API2536 behaves like deprecated request2537 behaves like LFS http expected response code and message2538 is expected to eq "Server supports batch API only, please update your Git LFS client to version 1.0.1 and up."2539 when handling LFS request using deprecated API2540 behaves like deprecated request2541 behaves like LFS http expected response code and message2542 is expected to eq "Server supports batch API only, please update your Git LFS client to version 1.0.1 and up."2543 when handling lfs batch request2544 upload2545 when request is authenticated2546 when user has project push access2547 when pushing a lfs object that does not exist2548 behaves like pushes new LFS objects2549 and project is above the repository size limit2550 responds with status 4062551 and project will go over the repository size limit2552 responds with status 4062553 when the namespace storage limit is exceeded2554 responds with status 4062555 when the push size would exceed the namespace storage limit2556 responds with status 4062557 when the namespace is over the free user cap limit2558 responds with status 4062559 when pushing to a subgroup project2560 when the namespace storage limit is exceeded2561 responds with status 4062562 when Geo is not enabled2563 when custom_http_clone_url_root is not configured2564 returns hrefs based on external_url2565 when custom_http_clone_url_root is configured2566 returns hrefs based on custom_http_clone_url_root2567 when this site is a Geo primary site2568 when custom_http_clone_url_root is not configured2569 returns hrefs based on the Geo primary site URL2570 when custom_http_clone_url_root is configured2571 returns hrefs based on the Geo primary site URL2572 when deploy key has project push access2573 behaves like pushes new LFS objects2574 and project is above the repository size limit2575 responds with status 4062576 and project will go over the repository size limit2577 responds with status 4062578 when the namespace storage limit is exceeded2579 responds with status 4062580 when the push size would exceed the namespace storage limit2581 responds with status 4062582 when pushing a lfs object2583 to one project2584 when user is authenticated2585 when user has push access to the project2586 when project has repository size limit enabled2587 responds with status 200 when the push will stay under the limit2588 when namespace storage limits are enabled2589 responds with status 200 when the push is under the limit2590API::ProjectPushRule ProjectPushRule2591 GET /projects/:id/push_rule2592 authorized user2593 returns project push rule2594 the commit_committer_check feature is enabled2595 returns the commit_committer_check information2596 the reject_unsigned_commits feature is enabled2597 returns the reject_unsigned_commits information2598 the reject_unsigned_commits feature is not enabled2599 succeeds2600 does not return the reject_unsigned_commits information2601 push rules are not enabled2602 is forbidden2603 developer2604 does not have access to project push rule2605 POST /projects/:id/push_rule2606 adds push rule to project with no file size2607 returns 400 if no parameter is given2608 maintainer2609 is accepted2610 indicates that it belongs to the correct project2611 sets all given parameters2612 commit_committer_check not allowed by License2613 is forbidden to use this service2614 reject_unsigned_commits not allowed by License2615 is forbidden to use this service2616 commit_committer_check is not enabled2617 is forbidden to send the the :commit_committer_check parameter2618 without the :commit_committer_check parameter2619 sets all given parameters2620 reject_unsigned_commits is not enabled2621 is forbidden to send the the :reject_unsigned_commits parameter2622 without the :reject_unsigned_commits parameter2623 sets all given parameters2624 invalid params2625 returns an error2626 user with developer_access2627 does not add push rule to project2628 with existing push rule2629 returns an error response2630 PUT /projects/:id/push_rule2631 does not update push rule for unauthorized user2632 with existing push rule2633 setting deny_delete_tag and commit_message_regex2634 is successful2635 includes the expected settings2636 setting commit_committer_check2637 is successful2638 sets the commit_committer_check2639 the commit_committer_check feature is not enabled2640 is an error to provide this parameter2641 setting reject_unsigned_commits2642 is successful2643 sets the reject_unsigned_commits2644 the reject_unsigned_commits feature is not enabled2645 is an error to provide the this parameter2646 not providing parameters2647 is an error2648 invalid params2649 returns an error2650 without existing push rule2651 returns an error response2652 DELETE /projects/:id/push_rule2653 for existing push rule2654 maintainer2655 deletes push rule from project2656 user with developer_access2657 returns a 403 error2658 for non existing push rule2659 deletes push rule from project2660 returns a 403 error if not authorized2661SubscriptionsController2662 GET #new2663 for unauthenticated subscription request2664 is expected to respond with numeric status code redirect2665 is expected to redirect to "/users/sign_up?redirect_from=checkout"2666 stores subscription URL for later2667 with authenticated user2668 is expected to render template layouts/minimal2669 is expected to render template new2670 when there are groups eligible for the subscription2671 assigns the eligible groups for the subscription2672 and request specify which group to use2673 assign requested group2674 request does not specify namespace2675 falls back to users namespace2676 when there are no eligible groups for the subscription2677 assigns eligible groups as an empty array if CustomerDot returns empty payload2678 assigns eligible groups as an empty array if user is not owner of any groups2679 GET #buy_minutes2680 with authenticated user2681 when the add-on plan cannot be found2682 is expected to respond with numeric status code not_found2683 when there are groups eligible for the addon2684 is expected to render template layouts/minimal2685 is expected to render template buy_minutes2686 assigns the group for the addon2687 GET #buy_storage2688 with authenticated user2689 when the add-on plan cannot be found2690 is expected to respond with numeric status code not_found2691 when there are groups eligible for the addon2692 is expected to render template layouts/minimal2693 is expected to render template buy_storage2694 assigns the group for the addon2695 GET #payment_form2696 with unauthorized user2697 is expected to respond with numeric status code redirect2698 is expected to redirect to "/users/sign_in"2699 with authorized user2700 is expected to respond with numeric status code ok2701 returns the data attribute of the client response in JSON format2702 GET #payment_method2703 with unauthorized user2704 is expected to respond with numeric status code redirect2705 is expected to redirect to "/users/sign_in"2706 with authorized user2707 is expected to respond with numeric status code ok2708 returns the data attribute of the client response in JSON format2709 GET #validate_payment_method2710 with unauthorized user2711 is expected to respond with numeric status code unauthorized2712 with authorized user2713 is expected to respond with numeric status code ok2714 is expected to be successful2715 POST #create2716 with unauthorized user2717 is expected to respond with numeric status code unauthorized2718 with authorized user2719 when setting up for a company2720 updates the setup_for_company attribute of the current user2721 creates a group based on the company2722 when using a promo code2723 creates subscription using promo code2724 when not setting up for a company2725 does not update the setup_for_company attribute of the current user2726 creates a group based on the user2727 when an error occurs creating a group2728 returns the errors in json format2729 when invalid name is passed2730 returns the errors in json format2731 tracks errors2732 on successful creation of a subscription2733 is expected to respond with numeric status code ok2734 returns the group edit location in JSON format2735 on unsuccessful creation of a subscription2736 is expected to respond with numeric status code ok2737 returns the error message in JSON format2738 when selecting an existing group2739 when the selected group is eligible for a new subscription2740 does not create a group2741 returns the selected group location in JSON format2742 when having an explicit redirect2743 is expected to respond with numeric status code ok2744 returns the provided redirect path as location2745 tracks the creation of the subscriptions2746 purchasing an addon2747 tracks creation with add-on success message2748 when the selected group is ineligible for a new subscription2749 does not create a group2750 returns a 404 not found2751 when selected group is a sub group2752 is expected to respond with numeric status code not_found2753 when selecting a non existing group2754 is expected to respond with numeric status code not_found2755 when selecting a group without owner role2756 is expected to respond with numeric status code not_found2757Projects::ClustersController2758 behaves like cluster metrics2759 GET #metrics2760 functionality2761 can query Prometheus2762 queries cluster metrics2763 when response has content2764 returns prometheus query response2765 when response has no content2766 returns prometheus query response2767 without Prometheus2768 returns not found2769 cannot query Prometheus2770 returns not found2771 security2772 is allowed for admin when admin mode enabled2773 is denied for admin when admin mode disabled2774 is expected to be allowed for owner. Expected: 200,201,204,302 Got: 2042775 is expected to be allowed for maintainer. Expected: 200,201,204,302 Got: 2042776 is expected to be denied for developer. Expected: 401,404 Got: 4042777 is expected to be denied for reporter. Expected: 401,404 Got: 4042778 is expected to be denied for guest. Expected: 401,404 Got: 4042779 is expected to be denied for user. Expected: 401,404 Got: 4042780 is expected to be denied for external. Expected: 401,404 Got: 4042781API::VulnerabilityExports2782 POST /security/projects/:id/vulnerability_exports2783 behaves like creating export for exportable2784 when the request does not fulfill the requirements2785 responds with bad_request2786 when the request fulfills the requirements2787 when the user is not authorized to take the action2788 responds with 403 forbidden2789 when the user is authorized to take the action2790 when the export creation succeeds2791 returns information about new vulnerability export2792 when the export creation fails2793 returns the error message2794 behaves like forbids access to vulnerability API endpoint in case of disabled features2795 when security dashboard feature is not available2796 responds with 403 Forbidden2797 permissions2798 is expected to be allowed for :admin2799 is expected to be allowed for :owner2800 is expected to be allowed for :maintainer2801 is expected to be allowed for :developer2802 is expected to be allowed for :auditor2803 is expected to be denied for :reporter2804 is expected to be denied for :guest2805 is expected to be denied for :anonymous2806 POST /security/groups/:id/vulnerability_exports2807 behaves like creating export for exportable2808 when the request does not fulfill the requirements2809 responds with bad_request2810 when the request fulfills the requirements2811 when the user is not authorized to take the action2812 responds with 403 forbidden2813 when the user is authorized to take the action2814 when the export creation succeeds2815 returns information about new vulnerability export2816 when the export creation fails2817 returns the error message2818 behaves like forbids access to vulnerability API endpoint in case of disabled features2819 when security dashboard feature is not available2820 responds with 403 Forbidden2821 POST /security/vulnerability_exports2822 behaves like creating export for exportable2823 when the request does not fulfill the requirements2824 responds with bad_request2825 when the request fulfills the requirements2826 when the user is not authorized to take the action2827 responds with 403 forbidden2828 when the user is authorized to take the action2829 when the export creation succeeds2830 returns information about new vulnerability export2831 when the export creation fails2832 returns the error message2833 behaves like forbids access to vulnerability API endpoint in case of disabled features2834 when security dashboard feature is not available2835 responds with 403 Forbidden2836 GET /security/vulnerability_exports/:id2837 with an authorized user with proper permissions2838 when export is finished2839 returns information about vulnerability export2840 does not return Poll-Interval header2841 when export is running2842 returns information about vulnerability export2843 returns Poll-Interval header with value set to 5 seconds2844 permissions2845 is expected to be denied for :admin2846 is expected to be denied for :owner2847 is expected to be denied for :maintainer2848 is expected to be denied for :developer2849 is expected to be denied for :auditor2850 is expected to be denied for :reporter2851 is expected to be denied for :guest2852 is expected to be denied for :anonymous2853 for export author2854 is expected to be allowed for #<User id:764 @user565>2855 GET /security/vulnerability_exports/:id/download2856 with an authorized user with proper permissions2857 when export is running2858 renders 4042859 when export is failed2860 renders 4042861 when export is finished2862 renders 200 with CSV file2863 permissions2864 is expected to be denied for :admin2865 is expected to be denied for :owner2866 is expected to be denied for :maintainer2867 is expected to be denied for :developer2868 is expected to be denied for :auditor2869 is expected to be denied for :reporter2870 is expected to be denied for :guest2871 is expected to be denied for :anonymous2872 for export author2873 is expected to be allowed for #<User id:764 @user565>2874Update a work item2875 with iteration widget input2876 when iterations feature is unlicensed2877 behaves like work item is not updated2878 ignores the update2879 when iterations feature is licensed2880 behaves like user without permission to admin work item cannot update the attribute2881 when a guest user is also an author of the work item2882 behaves like work item is not updated2883 ignores the update2884 when user has permissions to admin a work item2885 when setting to a new iteration2886 behaves like work item's iteration is updated2887 updates the work item's iteration2888 when setting iteration to null2889 behaves like work item's iteration is updated2890 updates the work item's iteration2891 when the user does not have permission to update the work item2892 behaves like a mutation that returns top-level errors2893 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"2894 behaves like work item is not updated2895 ignores the update2896 with weight widget input2897 when issuable weights is unlicensed2898 behaves like work item is not updated2899 ignores the update2900 when issuable weights is licensed2901 when user has permissions to admin a work item2902 behaves like update work item weight widget2903 updates the weight widget2904 when the updated work item is not valid2905 returns validation errors without the work item2906 when setting weight to null2907 updates the work item2908 when using quick action2909 behaves like update work item weight widget2910 updates the weight widget2911 when the updated work item is not valid2912 returns validation errors without the work item2913 when setting weight to null2914 updates the work item2915 when the work item type does not support the weight widget2916 behaves like work item is not updated2917 ignores the update2918 behaves like user without permission to admin work item cannot update the attribute2919 when a guest user is also an author of the work item2920 behaves like work item is not updated2921 ignores the update2922 with progress widget input2923 when okrs is unlicensed2924 behaves like work item is not updated2925 ignores the update2926 when okrs is licensed2927 when user has permissions to admin a work item2928 behaves like update work item progress widget2929 updates the progress widget2930 when setting progress to an invalid value2931 if progress is greater than 1002932 behaves like does not update work_item progress widget2933 does not update progress widget2934 if progress is less than 02935 behaves like does not update work_item progress widget2936 does not update progress widget2937 behaves like user without permission to admin work item cannot update the attribute2938 when a guest user is also an author of the work item2939 behaves like work item is not updated2940 ignores the update2941 when the user does not have permission to update the work item2942 behaves like a mutation that returns top-level errors2943 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"2944 behaves like work item is not updated2945 ignores the update2946 with status widget input2947 when requirements is unlicensed2948 behaves like work item is not updated2949 ignores the update2950 when requirements is licensed2951 when user has permissions to admin a work item2952 behaves like update work item status widget2953 updates the status widget2954 when the updated work item is not valid2955 returns validation errors without the work item2956 when setting status to an invalid value2957 does not update the work item's status2958 behaves like user without permission to admin work item cannot update the attribute2959 when a guest user is also an author of the work item2960 behaves like work item is not updated2961 ignores the update2962 when the user does not have permission to update the work item2963 behaves like a mutation that returns top-level errors2964 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"2965 behaves like work item is not updated2966 ignores the update2967 with health status widget input2968 when issuable_health_status is unlicensed2969 behaves like work item is not updated2970 ignores the update2971 when issuable_health_status is licensed2972 behaves like user without permission to admin work item cannot update the attribute2973 when a guest user is also an author of the work item2974 behaves like work item is not updated2975 ignores the update2976 when user has permissions to update the work item2977 updates work item health status2978 when using quick action2979 updates work item health status2980 when clearing health status2981 updates the work item2982 when the work item type does not support the health status widget2983 behaves like work item is not updated2984 ignores the update2985Projects::Security::Vulnerabilities::NotesController2986 GET index2987 responds with array of notes2988 when the "Security and Compliance" feature is disabled2989 is expected to respond with numeric status code not_found2990 behaves like SecurityDashboardsPermissions2991 access for all actions2992 when security dashboard feature is disabled2993 returns 4042994 when security dashboard feature is enabled2995 when user has guest access2996 denies access2997 when user has developer access2998 grants access2999 POST create3000 when the "Security and Compliance" feature is disabled3001 is expected to respond with numeric status code not_found3002 when note is empty3003 does not create new note3004 returns status 4223005 when note is provided3006 creates new note3007 returns status 2003008 when user has no permission to create a note3009 does not create new note3010 returns status 4033011 when replying to the discussion3012 creates new note in reply to discussion3013 returns status 2003014 when return_discussion param is set3015 returns discussion JSON when the return_discussion param is set3016 behaves like create notes request exceeding rate limit3017 allows user in allow-list to create notes, even if the case is different3018 when rate limiter enabled3019 logs request and declines it when endpoint called more than the threshold3020 when rate limiter is disabled3021 does not log request and does not block the request3022 PUT update3023 when the "Security and Compliance" feature is disabled3024 is expected to respond with numeric status code not_found3025 when user is not an author of the note3026 returns status 4043027 when user is an author of the note3028 when note is provided3029 updates note3030 returns status 2003031 DELETE destroy3032 when the "Security and Compliance" feature is disabled3033 is expected to respond with numeric status code not_found3034 when user is not an author of the note3035 does not delete the note3036 returns status 4043037 when user is an author of the note3038 deletes the note3039 returns status 2003040 POST toggle_award_emoji3041 creates the award emoji3042 when the "Security and Compliance" feature is disabled3043 is expected to respond with numeric status code not_found3044 when award emoji was already created3045 deletes the award emoji3046Ldap::OmniauthCallbacksController3047 displays LDAP sync flash on first sign in3048 skips LDAP sync flash on subsequent sign ins3049 multiple ldap providers configured3050 multiple ldap servers licensed feature available3051 allows sign in to first provider3052 allows sign in to other provider3053 multiple ldap servers licensed feature not available3054 allows sign in3055 does not allow sign in for other providers3056 access denied3057 logs a failure event3058Groups::EpicsController3059 # order random3060 GET #new3061 behaves like observability csp policy3062 when there is no CSP config3063 does not add any csp header3064 when observability is disabled3065 does not add observability urls to the csp header3066 when frame-src exists in the CSP config3067 appends the proper url to frame-src CSP directives3068 when signin is already present in the policy3069 does not append signin again3070 when oauth is already present in the policy3071 does not append oauth again3072 when default-src exists in the CSP config3073 does not change default-src3074 appends the proper url to frame-src CSP directives3075 when frame-src and default-src exist in the CSP config3076 appends to frame-src CSP directives3077 GET #show3078 behaves like observability csp policy3079 when there is no CSP config3080 does not add any csp header3081 when observability is disabled3082 does not add observability urls to the csp header3083 when frame-src exists in the CSP config3084 appends the proper url to frame-src CSP directives3085 when signin is already present in the policy3086 does not append signin again3087 when oauth is already present in the policy3088 does not append oauth again3089 when default-src exists in the CSP config3090 does not change default-src3091 appends the proper url to frame-src CSP directives3092 when frame-src and default-src exist in the CSP config3093 appends to frame-src CSP directives3094API::AwardEmoji3095 GET /groups/:id/awardable/:awardable_id/award_emoji3096 on an epic3097 returns an array of award_emoji3098 returns a 404 error when epic id not found3099 GET /groups/:id/awardable/:awardable_id/notes/:note_id/award_emoji3100 returns an array of award emoji3101 GET /groups/:id/awardable/:awardable_id/award_emoji/:award_id3102 on an epic3103 returns the award emoji3104 returns a 404 error if the award is not found3105 GET /groups/:id/awardable/:awardable_id/notes/:note_id/award_emoji/:award_id3106 returns an award emoji3107 POST /groups/:id/awardable/:awardable_id/award_emoji3108 on an epic3109 creates a new award emoji3110 returns a 400 bad request error if the name is not given3111 returns a 404 if the user is not authenticated3112 normalizes +1 as thumbsup award3113 when the emoji already has been awarded3114 returns a 404 status code3115 POST /groups/:id/awardable/:awardable_id/notes/:note_id/award_emoji3116 creates a new award emoji3117 marks Todos on the Noteable as done3118 normalizes +1 as thumbsup award3119 when the emoji already has been awarded3120 returns a 404 status code3121 DELETE /groups/:id/awardable/:awardable_id/award_emoji/:award_id3122 when the awardable is an Epic3123 deletes the award3124 returns a 404 error when the award emoji can not be found3125 behaves like 412 response3126 for a modified ressource3127 returns 412 with a JSON error3128 for an unmodified ressource3129 returns 204 with an empty body3130 DELETE /groups/:id/awardable/:awardable_id/award_emoji/:award_emoji_id3131 deletes the award3132 behaves like 412 response3133 for a modified ressource3134 returns 412 with a JSON error3135 for an unmodified ressource3136 returns 204 with an empty body3137Projects::ProtectedEnvironmentsController3138 #POST create3139 with valid access and params3140 with valid params3141 creates a new ProtectedEnvironment3142 sets a flash3143 redirects to CI/CD settings3144 with invalid params3145 does not create a new ProtectedEnvironment3146 redirects to CI/CD settings3147 with invalid access3148 renders 4043149 #PUT update3150 when the user is authorized3151 finds the requested protected environment3152 updates the protected environment3153 is successful3154 when the user is not authorized3155 is not successful3156 #DELETE destroy3157 when the user is authorized3158 finds the requested protected environment3159 deletes the requested protected environment3160 redirects to CI/CD settings3161 when the user is not authorized3162 is not successful3163Groups::Analytics::TasksByTypeController3164 GET #show3165 when valid parameters are given3166 succeeds3167 returns valid count3168 when `label_names` are missing3169 behaves like expects unprocessable_entity response3170 returns unprocessable_entity as response3171 behaves like parameter validation3172 when user access level is lower than reporter3173 returns forbidden as response3174 when license is missing3175 returns forbidden as response3176 when `created_after` parameter is invalid3177 behaves like expects unprocessable_entity response3178 returns unprocessable_entity as response3179 when `created_after` parameter is missing3180 behaves like expects unprocessable_entity response3181 returns unprocessable_entity as response3182 when `created_after` date is later than `created_before` date3183 behaves like expects unprocessable_entity response3184 returns unprocessable_entity as response3185 GET #top_labels3186 when valid parameters are given3187 succeeds3188 returns valid count3189 behaves like parameter validation3190 when user access level is lower than reporter3191 returns forbidden as response3192 when license is missing3193 returns forbidden as response3194 when `created_after` parameter is invalid3195 behaves like expects unprocessable_entity response3196 returns unprocessable_entity as response3197 when `created_after` parameter is missing3198 behaves like expects unprocessable_entity response3199 returns unprocessable_entity as response3200 when `created_after` date is later than `created_before` date3201 behaves like expects unprocessable_entity response3202 returns unprocessable_entity as response3203Projects::Security::VulnerabilitiesController3204 GET #new3205 checks if the user can create a vulnerability3206 when the "Security and Compliance" feature is disabled3207 is expected to respond with numeric status code not_found3208 when user can create vulnerability3209 renders the add new finding page3210 when user can not create vulnerability3211 renders 404 page not found3212 GET #show3213 when the "Security and Compliance" feature is disabled3214 is expected to respond with numeric status code not_found3215 when there's an attached pipeline3216 renders the vulnerability page3217 renders the vulnerability component3218 when there's no attached pipeline3219 renders the vulnerability page3220 GET #discussions3221 renders discussions3222 when the "Security and Compliance" feature is disabled3223 is expected to respond with numeric status code not_found3224Epic aggregates (count and weight)3225 count and weight totals3226 uses the LazyEpicAggregate service3227 returns the weights3228 behaves like counts properly3229 returns the epic counts3230 returns the issue counts3231 behaves like a working graphql query3232 returns a successful response3233 when requesting has_issues3234 behaves like having correct values for3235 behaves like a working graphql query3236 returns a successful response3237 when target epic has child epics or issues3238 returns true3239 when target epic has no child epics nor issues3240 returns false3241 behaves like efficient query3242 does not result in N+13243 when requesting has_children3244 behaves like having correct values for3245 behaves like a working graphql query3246 returns a successful response3247 when target epic has child epics or issues3248 returns true3249 when target epic has no child epics nor issues3250 returns false3251 behaves like efficient query3252 does not result in N+13253Query.project(fullPath).pipeline(iid).securityReportSummary3254 when the required features are enabled3255 when user is member of the project3256 shows the vulnerabilitiesCount and scannedResourcesCount3257 shows the first 20 scanned resources3258 returns nil for the scannedResourcesCsvPath3259 when user is not a member of the project3260 returns no scanned resources3261 when the required features are disabled3262 returns no scanned resources3263API::ProjectClusters3264 POST /projects/:id/clusters/user3265 when user sets specific environment scope3266 creates a cluster with that specific environment3267 when does not set an specific environment scope3268 sets default environment3269 when another cluster exists3270 responds with 2013271 allows multiple clusters to be associated to project3272 PUT /projects/:id/clusters/:cluster_id3273 With a GCP cluster3274 updates the environment scope3275 With an user cluster3276 updates the environment scope3277TrialRegistrationsController3278 POST create3279 when email_opted_in does not exist in params3280 sets user email_opted_in to false3281 when email_opted_in is true in params3282 sets user email_opted_in to true3283 with snowplow tracking3284 when the password is weak3285 does not track failed form submission3286 when the password is not weak3287 tracks successful form submission3288 with email confirmation3289 when email confirmation settings is set to `soft`3290 does not track an almost there redirect3291 when email confirmation settings is not set to `soft`3292 tracks an almost there redirect3293 behaves like creates a user with ArkoseLabs risk band on signup request3294 when arkose_labs_token verification succeeds3295 records the user's data from Arkose Labs3296 behaves like creates the user3297 creates the user3298 when verification fails3299 does not record the user's data from Arkose Labs3300 behaves like renders new action with an alert flash3301 renders new action with an alert flash3302 when user is not persisted3303 does not record the user's data from Arkose Labs3304 when feature is disabled3305 behaves like creates the user3306 creates the user3307 behaves like skips verification and data recording3308 skips verification and data recording3309 when reCAPTCHA is enabled3310 behaves like creates the user3311 creates the user3312 when reCAPTCHA verification fails3313 does not create the user3314 when arkose_labs_token param is not present3315 behaves like renders new action with an alert flash3316 renders new action with an alert flash3317 behaves like skips verification and data recording3318 skips verification and data recording3319get list of boards3320 for a project3321 behaves like a board epics query3322 returns open epics referenced by issues in the board3323 when board is scoped to a wildcard milestone3324 returns milestone global ID in the correct format3325 for a group3326 behaves like group and project boards query3327 behaves like a working graphql query3328 returns a successful response3329 when the user does not have access to the board parent3330 returns nil3331 when no permission to read board3332 does not return any boards3333 when user can read the board parent3334 does not create a default board3335 sorting and pagination3336 when using default sorting3337 when ascending3338 behaves like sorted paginated query3339 behaves like requires variables3340 shared example requires variables to be set3342 when sorting3343 sorts correctly3344 when paginating3345 paginates correctly3346 when querying for a single board3347 finds the correct board3348 behaves like a working graphql query3349 returns a successful response3350 behaves like a board epics query3351 returns open epics referenced by issues in the board3352 when board is scoped to a wildcard milestone3353 returns milestone global ID in the correct format3354get board lists3355 for a project3356 behaves like group and project board lists query3357 when user can read the board3358 sorting and pagination3359 when using default sorting3360 when ascending3361 behaves like sorted paginated query3362 behaves like requires variables3363 shared example requires variables to be set3365 when sorting3366 sorts correctly3367 when paginating3368 paginates correctly3369 limit metric settings3370 returns the expected limit metric settings3371 total issue count and weight3372 returns total count and weight of issues matching issue filters3373 for a group3374 behaves like group and project board lists query3375 when user can read the board3376 sorting and pagination3377 when using default sorting3378 when ascending3379 behaves like sorted paginated query3380 behaves like requires variables3381 shared example requires variables to be set3383 when sorting3384 sorts correctly3385 when paginating3386 paginates correctly3387 limit metric settings3388 returns the expected limit metric settings3389 total issue count and weight3390 returns total count and weight of issues matching issue filters3391Projects::DeployKeysController3392 POST create3393 records an audit event3394 when the account has configured ssh key expiry3395 shows an alert with the validation error3396 /enable/:id3397 with user with permission3398 records an audit event3399 returns 4043400 /disable/:id3401 with admin3402 records an audit event3403RoutableActions3404 #find_routable!3405 when SSO enforcement prevents access3406 for a group3407 redirects to group sign in page3408 does not redirect on POST requests3409 for a nested group3410 redirects to group sign in page3411 does not redirect on POST requests3412 for a project3413 redirects to group sign in page3414 does not redirect on POST requests3415 for a nested project3416 redirects to group sign in page3417 does not redirect on POST requests3418Groups::Analytics::DashboardsController3419 # order random3420 GET value_streams_dashboard3421 when user is not logged in3422 redirects the user to the login page3423 when user is not authorized3424 behaves like forbidden response3425 returns forbidden response3426 when user is logged in3427 when the license is not available3428 when the feature is disabled3429 behaves like forbidden response3430 returns forbidden response3431 when the feature is enabled3432 behaves like forbidden response3433 returns forbidden response3434 when the license is available3435 when the feature is disabled3436 behaves like forbidden response3437 returns forbidden response3438 when the feature is enabled3439 succeeds3440 can accept a `query` params3441 will only return the first 4 namespaces3442 will return projects in a subgroup3443 tracks page view on usage ping3444 when the feature is not enabled for that group3445 behaves like forbidden response3446 returns forbidden response3447 GET index3448 when user is not logged in3449 redirects the user to the login page3450 when user is logged in3451 redirects to value stream dashboards3452Groups::Analytics::DashboardsController3453 # order random3454 behaves like tracking unique visits3455 tracks unique visit if the format is HTML3456 tracks unique visit if DNT is not enabled3457 does not track unique visit if DNT is enabled3458 does not track unique visit if the format is JSON3459Creating an Iteration3460 when the user does not have permission3461 does not create iteration3462 behaves like a mutation that returns a top-level access error3463 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3464 when the user has permission3465 when iterations are disabled3466 behaves like a mutation that returns top-level errors3467 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3468 when iterations are enabled3469 behaves like iteration create request3470 when iteration cadence id is not provided3471 behaves like iteration creation request3472 creates a new iteration in the specified cadence3473 when iteration cadence id is provided3474 behaves like iteration creation request3475 creates a new iteration in the specified cadence3476 when title is not given3477 creates an iteration3478 when trying to add an iteration to the cadence that uses automatic scheduling3479 does not create the iteration3480 behaves like a mutation that returns errors in the response3481 is expected to contain exactly "Iterations cannot be manually added to cadences that use automatic scheduling"3482 when there are ActiveRecord validation errors3483 does not create the iteration3484 behaves like a mutation that returns errors in the response3485 is expected to contain exactly "Start date can't be blank" and "Due date can't be blank"3486 when the list of attributes is empty3487 does not create the iteration3488 behaves like a mutation that returns top-level errors3489 is expected to contain exactly "The list of iteration attributes is empty"3490 when the params contains neither group nor project path3491 does not create the iteration3492 behaves like a mutation that returns top-level errors3493 is expected to contain exactly "Exactly one of group_path or project_path arguments is required"3494 when the params contains both group and project path3495 does not create the iteration3496 behaves like a mutation that returns top-level errors3497 is expected to contain exactly "Exactly one of group_path or project_path arguments is required"3498SessionsController3499 #new3500 on a Geo secondary node3501 when relative URL is configured3502 behaves like a valid oauth authentication redirect3503 redirects to the correct oauth_geo_auth_url3504 with a tampered HOST header3505 behaves like a valid oauth authentication redirect3506 redirects to the correct oauth_geo_auth_url3507 with a tampered X-Forwarded-Host header3508 behaves like a valid oauth authentication redirect3509 redirects to the correct oauth_geo_auth_url3510 without a tampered header3511 behaves like a valid oauth authentication redirect3512 redirects to the correct oauth_geo_auth_url3513 #create3514 with wrong credentials3515 when is a trial form3516 redirects to new trial sign in page3517 when is a regular form3518 redirects to the regular sign in page3519 when using two-factor authentication3520 when OTP authentication fails3521 behaves like an auditable failed authentication3522 log an audit event3523 when WebAuthn authentication fails3524 behaves like an auditable failed authentication3525 log an audit event3526 when user is not allowed to log in using password3527 does not authenticate the user3528 with Arkose reCAPTCHA3529 when ArkoseLabs namespace setting is not set3530 passes the default API domain to the view3531 when ArkoseLabs namespace setting is set3532 passes the custom API domain to the view3533 when the user was verified by Arkose3534 when user is low risk3535 successfully logs in the user3536 when user is NOT low risk3537 prevents the user from logging in3538 when the user was not verified by Arkose3539 prevents the user from logging in3540 sets gon variables3541 when the user should be verified by Arkose but the request does not contain the arkose token3542 prevents the user from logging in3543Updating a Requirement3544 when the user does not have permission3545 behaves like requirement update fails3546 does not update requirement3547 behaves like a mutation that returns a top-level access error3548 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3549 when the user has permission3550 when requirements are disabled3551 behaves like requirement update fails3552 does not update requirement3553 behaves like a mutation that returns a top-level access error3554 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3555 when requirements are enabled3556 when identifying requirement by legacy iid3557 updates the requirement3558 when identifying requirement by work item iid3559 updates the requirement3560 when there are ActiveRecord validation errors3561 does not update the requirement3562 behaves like a mutation that returns errors in the response3563 is expected to contain exactly "Title can't be blank"3564 when there are no update params3565 behaves like a mutation that returns top-level errors3566 is expected to contain exactly "At least one of title, state, last_test_report_state, description is required"3567 when neither iid nor work_item_iid are given3568 behaves like a mutation that returns top-level errors3569 is expected to contain exactly "One and only one of iid or workItemIid is required"3570 when there are no update params nor iid params3571 behaves like a mutation that returns top-level errors3572 is expected to contain exactly /one of iid or workItemIid is required; At least one of title/3573 when both iid and work_item_iid are given3574 behaves like a mutation that returns top-level errors3575 is expected to contain exactly "One and only one of iid or workItemIid is required"3576Registrations::WelcomeController3577 # order random3578 #update3579 without a signed in user3580 is expected to redirect to "/users/sign_up"3581 with a signed in user3582 with email updates3583 when not on gitlab.com3584 when the user opted in3585 sets the email_opted_in field3586 does not set the rest of the email_opted_in fields3587 when the user opted out3588 sets the email_opted_in field3589 when on gitlab.com3590 when registration_objective field is provided3591 sets the registration_objective3592 when setup for company is false3593 when the user opted in3594 sets the email_opted_in fields3595 when user opted out3596 does not set the rest of the email_opted_in fields3597 when setup for company is true3598 sets email_opted_in fields3599 redirection3600 when signup_onboarding is not enabled3601 is expected to redirect to "/dashboard/projects"3602 tracks successful submission event3603 when signup_onboarding is enabled3604 when joining_project is "true"3605 is expected to redirect to "/dashboard/projects"3606 when joining_project is "false"3607 with group and project creation3608 is expected to redirect to "/users/sign_up/groups_projects/new"3609 when setup_for_company is "true"3610 is expected to redirect to "/users/sign_up/company/new?glm_content=some_content&glm_source=some_source&jobs_to_be_done_other=_jobs_to_be_done_other_®istration_objective=code_storage&role=software_developer"3611 when setup_for_company is "false"3612 is expected to redirect to "/users/sign_up/groups_projects/new"3613 when trial is true3614 is expected to redirect to "/users/sign_up/company/new?glm_content=some_content&glm_source=some_source&jobs_to_be_done_other=_jobs_to_be_done_other_®istration_objective=code_storage&role=software_developer&trial=true"3615 when in subscription flow3616 is expected not to redirect to "/users/sign_up/groups_projects/new"3617 when in invitation flow3618 is expected not to redirect to "/users/sign_up/groups_projects/new"3619 tracks successful submission event3620 when in trial flow3621 is expected not to redirect to "/users/sign_up/groups_projects/new"3622 tracks successful submission event3623 when stored company path3624 is expected to redirect to "/users/sign_up/company/new?glm_content=some_content&glm_source=some_source&jobs_to_be_done_other=_jobs_to_be_done_other_®istration_objective=code_storage&role=software_developer"3625 when failed request3626 does not track submission event3627 #show3628 tracks render event3629 when in invitation flow3630 tracks render event3631 when in trial flow3632 tracks render event3633 when completed welcome step3634 does not track render event3635groups autocomplete3636 #issues3637 issue_types: nil, expected: :test_case3638 returns the correct response3639 issue_types: "", expected: :test_case3640 returns the correct response3641 issue_types: "invalid", expected: []3642 returns the correct response3643 issue_types: "test_case", expected: :test_case3644 returns the correct response3645 #epics3646 returns 200 status3647 returns the correct response3648 avoids N+1 queries3649 #iterations3650 when iterations feature is disabled3651 returns 404 status3652 when iterations feature is enabled3653 avoids N+1 queries3654 #iterations3655 returns the correct response3656 #vulnerabilities3657 returns 200 status3658 returns the correct response3659 #commands3660 returns 200 status3661 returns the correct response3662 handles new epics3663Update of an existing issue3664 updates the issue3665 setting epic3666 sets the epic3667 the epic is not readable to the current user3668 does not set the epic3669 the epic is not an epic3670 does not set the epic3671 removing epic3672 removes the epic3673 the epic argument is not provided3674 does not remove the epic3675EE::RoutableActions::SsoEnforcementRedirect3676 #should_redirect_to_group_saml_sso?3677 returns false for User routables3678 returns false when routable is nil3679 with a project3680 behaves like a routable with SSO enforcement redirect3681 is false when a new sso session is not needed3682 is true when a new sso session is needed3683 with a nested project3684 behaves like a routable with SSO enforcement redirect3685 is false when a new sso session is not needed3686 is true when a new sso session is needed3687 with a project in a personal namespace3688 returns false3689 with a group3690 behaves like a routable with SSO enforcement redirect3691 is false when a new sso session is not needed3692 is true when a new sso session is needed3693 with a nested group3694 behaves like a routable with SSO enforcement redirect3695 is false when a new sso session is not needed3696 is true when a new sso session is needed3697 #sso_redirect_url3698 with a group3699 behaves like a routable SSO url3700 returns the SSO url for the root group3701 with a nested group3702 behaves like a routable SSO url3703 returns the SSO url for the root group3704 with a project3705 behaves like a routable SSO url3706 returns the SSO url for the root group3707 with a nested project3708 behaves like a routable SSO url3709 returns the SSO url for the root group3710Creating a Merge Request from a Security::Finding3711 # order random3712 when the user does not have permission3713 does not create a merge request3714 behaves like a mutation that returns a top-level access error3715 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3716 when the user has permission3717 with valid parameters3718 returns a successful response3719 creates a new merge request3720 when security_dashboard is disabled3721 behaves like a mutation that returns top-level errors3722 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3723getting iterations3724 query for iterations by timeframe3725 without start date3726 returns error3727 without end date3728 returns error3729 with start and end date3730 does not have errors3731 query for iterations by cadence3732 with multiple cadences3733 returns iterations3734 searching by cadence title or iteration title and sorting by cadence and due date ASC3735 search: "two", ordered_expected_iterations: lazy { [past_iteration1, past_iteration2, upcoming_group_iteration] }3736 correctly returns ordered items3737 search: "iteration", ordered_expected_iterations: lazy { [closed_group_iteration, current_group_iteration, past_iteration1, past_iteration2, upcoming_group_iteration] }3738 correctly returns ordered items3739 query for iterations by state3740 with DEPRECATED `started` state3741 returns `current` iteration3742 with `current` state3743 returns `current` iteration3744 with `closed` state3745 returns `closed` iteration3746 when sorting by cadence and due date DESC3747 returns `closed` iteration sorted by due date DESC3748JwtController3749 with IP restriction3750 group with restriction3751 address is within the range3752 behaves like successful JWT auth3753 allows access3754 with project deploy token3755 behaves like successful JWT auth with token3756 read: true, write: false, expected_actions: ["pull"]3757 behaves like successful JWT auth3758 allows access3759 read: false, write: true, expected_actions: ["push"]3760 behaves like successful JWT auth3761 allows access3762 read: true, write: true, expected_actions: ["push", "pull"]3763 behaves like successful JWT auth3764 allows access3765 with group deploy token3766 behaves like successful JWT auth with token3767 read: true, write: false, expected_actions: ["pull"]3768 behaves like successful JWT auth3769 allows access3770 read: false, write: true, expected_actions: ["push"]3771 behaves like successful JWT auth3772 allows access3773 read: true, write: true, expected_actions: ["push", "pull"]3774 behaves like successful JWT auth3775 allows access3776 address is outside the range3777 behaves like unsuccessful JWT auth3778 denies access3779 with deploy token credentials3780 with project deploy token3781 behaves like unsuccessful JWT auth3782 denies access3783 with group deploy token3784 behaves like unsuccessful JWT auth3785 denies access3786 authenticating against container registry3787 when Group SSO is enforced3788 behaves like successful JWT auth3789 allows access3790Query.project(fullPath).pipeline(iid).securityReportFinding3791 when the required features are enabled3792 when user is member of the project3793 returns all the queried fields3794 when the finding has been dismissed3795 when :deprecate_vulnerabilities_feedback feature flag is disabled3796 returns a finding in the dismissed state3797 when :deprecate_vulnerabilities_feedback feature flag is enabled3798 returns a finding in the dismissed state3799 when user is not a member of the project3800 returns no vulnerability findings3801 when the required features are disabled3802 returns no vulnerability findings3803API::MemberRoles3804 # order random3805 DELETE /groups/:id/member_roles/:member_role_id3806 behaves like custom_roles license required3807 without a valid license3808 returns not found error3809 when custom_roles license is enabled3810 when unauthorized3811 returns unauthorized error3812 when a less privileged user3813 does not remove the member role3814 when owner of the group3815 removes member role3816 when invalid group name is passed3817 returns 404 if SAML group can not used for a SAML group link3818 POST /groups/:id/member_roles3819 behaves like custom_roles license required3820 without a valid license3821 returns not found error3822 when custom_roles license is enabled3823 when unauthorized3824 returns unauthorized error3825 when a less privileged user3826 does not allow less privileged user to add member roles3827 when owner of the group3828 returns ok and add member role3829 when params are missing3830 returns a 400 error when params are missing3831 when params are invalid3832 returns a 400 error when params are invalid3833 when errors during creation of new record3834 returns a error message with 400 code3835 GET /groups/:id/member_roles3836 behaves like custom_roles license required3837 without a valid license3838 returns not found error3839 when custom_roles license is enabled3840 when unauthorized3841 returns forbidden error3842 when a less privileged user3843 returns forbidden error3844 when owner of the group3845 returns associated member roles3846 when group does not have any associated member_roles3847 returns empty array as response3848Update an external audit event destination header3849 when feature is licensed3850 when current user is a group owner3851 updates the header with the correct attributes3852 when the header attributes are invalid3853 returns correct errors3854 returns the unmutated attribute values3855 behaves like a mutation that does not update a header3856 does not update a header key3857 does not update a header value3858 when current user is a group maintainer3859 behaves like a mutation that does not update a header3860 does not update a header key3861 does not update a header value3862 when current user is a group developer3863 behaves like a mutation that does not update a header3864 does not update a header key3865 does not update a header value3866 when current user is a group guest3867 behaves like a mutation that does not update a header3868 does not update a header key3869 does not update a header value3870 when feature is unlicensed3871 behaves like a mutation on an unauthorized resource3872 behaves like a mutation that returns top-level errors3873 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3874 behaves like a mutation that does not update a header3875 does not update a header key3876 does not update a header value3877getting unprotect access levels for a branch protection3878 # order random3879 behaves like a GraphQL query for access levels3880 when request AccessLevel type objects as a guest user3881 is expected not to be present3882 behaves like a working graphql query3883 returns a successful response3884 when request AccessLevel type objects as a maintainer3885 query3886 avoids N+1 queries3887 response3888 returns all the access level attributes3889 behaves like a working graphql query3890 returns a successful response3891 when request AccessLevel type objects as a maintainer3892 query3893 avoids N+1 queries3894 response3895 returns all the access level attributes3896 behaves like a working graphql query3897 returns a successful response3898Projects::Analytics::DashboardsController3899 # order random3900 GET /:namespace/:project/-/analytics/dashboards3901 with the feature flag disabled3902 behaves like returns not found3903 returns 404 response3904 with the feature flag enabled3905 without the licensed feature3906 behaves like returns not found3907DEPRECATION WARNING: Invalid Feature Flag combined_project_analytics_dashboards stubbed (called from each at /builds/gitlab-org/gitlab/spec/support/helpers/stub_feature_flags.rb:39)3908 returns 404 response3909 with the licensed feature3910 access_level: nil, example_to_run: "returns not found"3911 behaves like returns not found3912DEPRECATION WARNING: Invalid Feature Flag combined_project_analytics_dashboards stubbed (called from each at /builds/gitlab-org/gitlab/spec/support/helpers/stub_feature_flags.rb:39)3913 returns 404 response3914 access_level: :reporter, example_to_run: "returns success"3915 behaves like returns success3916DEPRECATION WARNING: Invalid Feature Flag combined_project_analytics_dashboards stubbed (called from each at /builds/gitlab-org/gitlab/spec/support/helpers/stub_feature_flags.rb:39)3917 returns 200 response3918 access_level: :developer, example_to_run: "returns success"3919 behaves like returns success3920DEPRECATION WARNING: Invalid Feature Flag combined_project_analytics_dashboards stubbed (called from each at /builds/gitlab-org/gitlab/spec/support/helpers/stub_feature_flags.rb:39)3921 returns 200 response3922 access_level: :maintainer, example_to_run: "returns success"3923 behaves like returns success3924DEPRECATION WARNING: Invalid Feature Flag combined_project_analytics_dashboards stubbed (called from each at /builds/gitlab-org/gitlab/spec/support/helpers/stub_feature_flags.rb:39)3925 returns 200 response3926Set project compliance framework3927 # order random3928 #resolve3929 when product analytics is enabled3930 when user is a project maintainer3931 enqueues the InitializeAnalyticsWorker3932 behaves like a working GraphQL mutation3933 with a personal access token3934 behaves like prevents access to the mutation3935 does not resolve the mutation3936 behaves like allows access to the mutation3937 behaves like a working graphql query3938 returns a successful response3939 returns data3940 with an OAuth token3941 behaves like prevents access to the mutation3942 does not resolve the mutation3943 behaves like allows access to the mutation3944 behaves like a working graphql query3945 returns a successful response3946 returns data3947 when an initialization is already in progress3948 behaves like a mutation that returns errors in the response3949 is expected to contain exactly "Product analytics initialization is already in progress"3950 when user is not a project member3951 behaves like a mutation that returns top-level errors3952 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3953 when product analytics is disabled3954 behaves like a mutation that returns errors in the response3955 is expected to contain exactly "Product analytics is disabled"3956Getting code coverage summary in a project3957 behaves like a working graphql query3958 returns a successful response3959 when project has coverage3960 for the default branch3961 contains code coverage summary data3962 not for the default branch3963 returns nil3964 when project does not have coverage3965 returns nil3966Namespace.projects3967 sorting and pagination3968 when sorting by STORAGE3969 behaves like sorted paginated query3970 behaves like requires variables3971 shared example requires variables to be set3973 when sorting3974 sorts correctly3975 when paginating3976 paginates correctly3977Groups::Analytics::CycleAnalyticsController3978 GET show3979 when the license is available3980 succeeds3981 increments usage counter3982 renders `show` template when feature flag is enabled3983 when the initial, default value stream is requested3984 renders the default in memory value stream3985 when invalid name is given3986 renders 404 error3987 tracking events3988 tracks redis hll event3989 behaves like Snowplow event tracking with RedisHLL context3990 behaves like Snowplow event tracking3991 is emitted3992 when the license is missing3993 renders 403 error3994 when non-existent group is given3995 renders 404 error3996 with group and value stream params3997 builds request params with group and value stream3998LicenseMailer3999 #approaching_active_user_count_limit4000 when license is present4001 is expected to have subject of "Your subscription is nearing its user limit"4002 is expected to be bcc'd to ["admin@example.com", "another_admin@example.com"]4003 is expected to have body including "your subscription GitLab Enterprise Edition Starter"4004 is expected to have body including "You have 20 active users"4005 is expected to have body including "the user limit of 21"4006 when license is not present4007 does not send email4008 when send with I18n.default_locale4009 is expected to have subject of "Your subscription is nearing its user limit"4010 is expected to be bcc'd to ["123@abc", "hjk@123"]4011 is expected to have body including "your subscription GitLab Enterprise Edition Starter"4012 is expected to have body including "You have 20 active users"4013 is expected to have body including "the user limit of 21"4014Groups::RoadmapController4015 #show4016 when the user is signed in4017 when the user has access to the group4018 when epics feature is disabled4019 behaves like returns 404 status4020 is expected to respond with numeric status code not_found4021 when epics feature is enabled4022 returns 200 status4023 when roadmaps_sort is nil4024 stores roadmaps sorting param in user preference4025 defaults to sort_value_start_date_soon4026 when roadmaps_sort is present4027 update roadmaps_sort with current value4028 when the user does not have access to the group4029 behaves like returns 404 status4030 is expected to respond with numeric status code not_found4031 when user is not signed in4032 when epics feature is enabled4033 when anonymous users does not have access to the group4034 redirects to login page4035 when anonymous users have access to the group4036 stores epics sorting param in a cookie4037Add an issue to an Epic4038 when epics feature is disabled4039 behaves like mutation without access4040 does not add issue to the epic4041 behaves like a mutation that returns a top-level access error4042 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4043 when epics feature is enabled4044 when the user is a group member4045 adds the issue to the epic4046 when the user is not a group member4047 behaves like mutation without access4048 does not add issue to the epic4049 behaves like a mutation that returns a top-level access error4050 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4051Admin::Geo::NodesController4052 #index4053 with valid license4054 does not show license alert4055 without valid license4056 does show license alert4057 does not redirects to the 403 page4058 #create4059 without add-on license4060 behaves like unlicensed geo action4061 redirects to the 403 page4062 with add-on license4063 delegates the create of the Geo node to Geo::NodeCreateService4064 #update4065 without add-on license4066 behaves like unlicensed geo action4067 redirects to the 403 page4068 with add-on license4069 updates the node4070 delegates the update of the Geo node to Geo::NodeUpdateService4071Create scan execution policy for a project/namespace4072 for project4073 behaves like commits scan execution policies4074 creates a branch with commit4075 when provided policy is invalid4076 returns error with detailed information4077 for namespace4078 behaves like commits scan execution policies4079 creates a branch with commit4080 when provided policy is invalid4081 returns error with detailed information4082Create a Compliance Framework4083 framework feature is unlicensed4084 behaves like a mutation that returns errors in the response4085 is expected to contain exactly "Not permitted to create framework"4086 pipeline configuration feature is unlicensed4087 behaves like a mutation that returns errors in the response4088 is expected to contain exactly "Pipeline configuration full path feature is not available"4089 feature is licensed4090 namespace is a personal namespace4091 current_user is namespace owner4092 does not create a new compliance framework4093 behaves like a mutation that returns errors in the response4094 is expected to contain exactly "Failed to create framework" and "Namespace must be a group, user namespaces are not supported."4095 namespace is a group4096 current_user is group owner4097 behaves like a mutation that creates a compliance framework4098 creates a new compliance framework4099 returns the newly created framework4100 current_user is not a group owner4101 current_user is group owner4102 does not create a new compliance framework4103 behaves like a mutation that returns errors in the response4104 is expected to contain exactly "Not permitted to create framework"4105API::ResourceStateEvents4106 # order random4107 when eventable is an Epic4108 behaves like resource_state_events API4109 GET /groups/:id/epics/:noteable_id/resource_state_events4110 returns an array of resource state events4111 returns a 404 error when eventable id not found4112 returns 404 when not authorized4113 GET /groups/:id/epics/:noteable_id/resource_state_events/:event_id4114 returns a resource state event by id4115 returns 404 when not authorized4116 returns a 404 error if resource state event not found4117 pagination4118 returns the second page4119Registrations::VerificationController4120 # order random4121 GET #new4122 with an unauthenticated user4123 is expected to respond with numeric status code redirect4124 is expected to redirect to "/users/sign_in"4125 with an authenticated user4126 when on .com4127 is expected to respond with numeric status code ok4128 is expected to render template layouts/minimal4129 is expected to render template new4130 publishes the experiment4131 with project_id in params4132 assigns to learn_gitlab onboarding4133 when project_id is blank4134 assigns to root_path4135 without project_id in params4136 assigns to root_path4137 when not on .com4138 is expected to respond with numeric status code not_found4139Query current user groups4140 when permission_scope is CREATE_PROJECTS4141 behaves like a working graphql query4142 returns a successful response4143 when ip_restrictions feature is enabled4144 when check_namespace_plan setting is enabled4145 behaves like no N + 1 DB queries4146 avoids N+1 queries4147 when check_namespace_plan setting is disabled4148 behaves like no N + 1 DB queries4149 avoids N+1 queries4150Create an external audit event destination header4151 when feature is licensed4152 when current user is a group owner4153 creates the header with the correct attributes4154 when the header attributes are invalid4155 returns correct errors4156 behaves like a mutation that does not create a header4157 does not create a header4158 when current user is a group maintainer4159 behaves like a mutation that does not create a header4160 does not create a header4161 when current user is a group developer4162 behaves like a mutation that does not create a header4163 does not create a header4164 when current user is a group guest4165 behaves like a mutation that does not create a header4166 does not create a header4167 when feature is unlicensed4168 behaves like a mutation on an unauthorized resource4169 behaves like a mutation that returns top-level errors4170 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4171 behaves like a mutation that does not create a header4172 does not create a header4173view audit events4174 GET /:namespace/:project/-/audit_events4175 returns 200 response4176 avoids N+1 DB queries4177Admin::AuditLogsController4178 GET #index4179 licensed4180 tracks search event4181 pagination4182 paginates audit events, without casting a count query4183 behaves like tracking unique visits4184 tracks unique visit if the format is HTML4185 tracks unique visit if DNT is not enabled4186 does not track unique visit if DNT is enabled4187 does not track unique visit if the format is JSON4188 behaves like Snowplow event tracking with RedisHLL context4189 behaves like Snowplow event tracking4190 is emitted4191 when invalid date4192 created_before: "invalid-date", created_after: nil4193 returns an error4194 created_before: nil, created_after: true4195 returns an error4196 created_before: "2021-13-10", created_after: nil4197 returns an error4198 created_before: nil, created_after: "2021-02-31"4199 returns an error4200 created_before: "2021-03-31", created_after: "2021-02-31"4201 returns an error4202 when date range is greater than limit4203 behaves like a date range error is returned4204 created_after: "2021-01-01", created_before: "2021-02-02"4205 returns an error4206 created_after: "2022-01-31", created_before: nil4207 returns an error4208 by user4209 finds the user by id when provided with a entity_id4210 finds the user by username when provided with a entity_username4211Query.project(fullPath).dastScannerProfiles4212 when a user does not have access to the project4213 project response4214 is expected to be nil4215 when the user can run a dast scan4216 dast scanner profiles4217 is expected to be empty4218 when a user has access to multiple projects4219 dast scanner profiles4220 returns only the dast_scanner_profile for the requested project4221 when a user has access dast_scanner_profiles4222 dast scanner profiles4223 is expected not to be empty4224 first dast scanner profile id4225 is expected to eq "gid://gitlab/DastScannerProfile/1"4226Admin::Licenses::UsageExportsController4227 GET show4228 with no current license4229 redirects the user4230 does not update the license usage data exported flag4231 does not attempt to create the CSV4232 with a current license4233 returns a csv file in response4234 returns the expected response body4235 when current license is an offline cloud license4236 updates the license usage data exported flag4237 when current license is an online cloud license4238 does not update the license usage data exported flag4239 when current license is a legacy license4240 does not update the license usage data exported flag4241 when data export fails4242 does not update the license usage data exported flag4243Query.project(fullPath).pipeline(iid).codeQualityReports4244 when pipeline has a code quality report4245 when user is member of the project4246 returns all the code quality degradations4247 returns all the queried fields4248 returns all the queried fields ordered by severity4249 when user is not a member of the project4250 returns no code quality degradations4251 when pipeline does not have a code quality report4252 returns an empty result4253Query.project(fullPath).pipeline(iid).dastProfile4254 when feature is not licensed4255 does not return dast profile data4256 when feature is licensed4257 when user is member of the project4258 returns the dast profile data4259 avoids N+1 queries4260 when user is not member of the project4261 does not return dast profile data4262 when feature flag is not enabled4263 returns the dast profile data4264Deleting an iteration4265 when the user does not have permission4266 behaves like a mutation that returns a top-level access error4267 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4268 when the user has permission4269 when iterations feature is disabled4270 behaves like a mutation that returns top-level errors4271 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4272 when iterations feature is enabled4273 when iteration belongs to a manual cadence4274 deletes the iteration4275 when iteration belongs to an automatic cadence4276 behaves like a mutation that returns top-level errors4277 is expected to contain exactly "Deleting iterations from automatic iteration cadences is not allowed."4278 when required arguments are missing4279 returns error about required argument4280Query.ciMinutesUsage4281 when no namespace_id is provided4282 returns usage data by month for the current user4283 does not create N+1 queries4284 when namespace_id is provided4285 when group is root4286 when user is an owner4287 returns the usage data4288 when user is not an owner4289 does not return usage data4290 when group is a subgroup4291 does not return usage data4292Creation of a new release4293 when the provided milestones include a group milestone4294 when the group milestone association feature is licensed4295 returns no errors4296 creates a release with both project and group milestone associations4297 when the group milestone association feature is not licensed4298 returns an error-as-data field with a message about an invalid license4299Projects::Pipelines::EmailCampaignsController4300 GET #validate_account4301 when user has access to the pipeline4302 emits a snowplow event4303 sets session[:start_account_validation] to true4304 redirects to the pipeline show page4305 when not in .com or dev env4306 returns 4044307 when user does not have access to the pipeline4308 returns :not_found4309 does not set session[:start_account_validation]4310Groups::Analytics::RepositoryAnalyticsController4311 GET show4312 is expected to respond with numeric status code success4313 tracks a pageview event in snowplow4314 when requesting a redirected path4315 redirects to the canonical path4316 when license is missing4317 is expected to respond with numeric status code forbidden4318 when the user has no access to the group4319 is expected to respond with numeric status code forbidden4320 when the user is an auditor4321 is expected to respond with numeric status code success4322Deleting a DAST Profile4323 behaves like an on-demand scan mutation when user cannot run an on-demand scan4324 when a user does not have access to the project4325 behaves like a mutation that returns a top-level access error4326 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4327 when a user does not have access to run a dast scan on the project4328 behaves like a mutation that returns a top-level access error4329 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4330 behaves like an on-demand scan mutation when user can run an on-demand scan4331 returns an empty errors array4332 deletes the dast_profile4333 when on demand scan licensed feature is not available4334 behaves like a mutation that returns a top-level access error4335 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4336Groups::Settings::RepositoryController4337 GET show4338 without push rules feature4339 when user is group owner4340 always allows access4341 when user is not group owner4342 renders 4044343 with push rules feature4344 when user is group maintainer4345 allows access4346 when user is not group maintainer4347 renders 4044348API::CaptchaCheck4349 POST users/captcha_check4350 when the feature flag arkose_labs_login_challenge is disabled4351 does return not found status4352 when the feature flag arkose_labs_login_challenge is enabled4353 when the username is invalid4354 does return 200 OK status to prevent enumeration4355 when the username has a dot4356 does return 200 status4357 when the username is nil4358 does return 200 OK status to prevent enumeration4359 when the username is an array4360 does return 200 OK status to prevent enumeration4361 when the email is valid4362 returns status ok4363 when the email is unknown4364 returns 200 OK status to prevent enumeration4365 when the email is invalid4366 returns 200 OK status to prevent enumeration4367 when the user meets the criteria for the captcha check4368 does return true4369 when the user does not meets the criteria for the captcha check4370 does return true4371 when the user reach the rate limit4372 does return true4373Query.project(fullPath).dastProfile4374 when a user does not have access to the project4375 returns a null project4376 when a user does not have access to the dast_profile4377 returns a null dast_profile4378 when a user has access to the dast_profile4379 returns a dast_profile4380 when on demand scan licensed feature is not available4381 returns a null dast_profile4382Groups::TodosController4383 POST create4384 when epic is not confidential4385 when epics are available4386 behaves like todos actions4387 when authorized4388 creates todo4389 returns todo path and pending count4390 when not authorized for project/group4391 does not create todo for resource that user has no access to4392 does not create todo when user is not logged in4393 when epics are not available4394 behaves like todo for inaccessible resource4395 does not create todo because resource can not be found4396 when the user can not access confidential epic in public group4397 behaves like todo for inaccessible resource4398 does not create todo because resource can not be found4399Projects::IncidentManagement::EscalationPoliciesController4400 # order random4401 GET #index4402 with read permissions4403 renders index with 200 status code4404 with admin permissions4405 renders index with 200 status code4406 unauthorized4407 responds with 4044408 with unavailable feature4409 responds with 4044410 with unavailable on-call schedules feature4411 responds with 4044412Groups::RunnersController4413 #index4414 enables runner_upgrade_management_for_namespace licensed feature4415 when fetching runner releases is disabled4416 does not enable runner_upgrade_management_for_namespace licensed feature4417 #show4418 enables runner_upgrade_management_for_namespace licensed feature4419 when fetching runner releases is disabled4420 does not enable runner_upgrade_management_for_namespace licensed feature4421Groups::Security::DashboardController4422 GET show4423 when security dashboard feature is enabled4424 and user is allowed to access group security dashboard4425 is expected to respond with numeric status code ok4426 when user is not allowed to access group security dashboard4427 is expected to respond with numeric status code ok4428 is expected to render template unavailable4429 when security dashboard feature is disabled4430 is expected to respond with numeric status code ok4431 is expected to render template unavailable4432creating escalation policy4433 # order random4434 successfully creates the policy and rules4435 when rules are provided out of order4436 successfully creates the policy and reorders the rules4437 errors4438 user does not have permission4439 raises an error4440 no rules given4441 raises an error4442Query.vulnerabilities.externalIssueLinks4443 when queried for the first time with reactive caching4444 schedules a background job to fetch data from Jira4445 returns null as value for externalIssue4446 when queried without reactive caching4447 returns a list of all VulnerabilityExternalIssueLink4448API::HelmPackages4449 # order random4450 GET /api/v4/projects/:id/packages/helm/:channel/charts/:file_name.tgz4451 behaves like applying ip restriction for group4452 in group without restriction4453 behaves like returning response status4454 returns ok4455 in group with restriction4456 with address within the range4457 behaves like returning response status4458 returns ok4459 with address outside the range4460 behaves like returning response status4461 returns not_found4462ProfilesController4463 PUT update4464 updating name4465 when `disable_name_update_for_users` feature is available4466 when the ability to update thier name is not disabled for users4467 behaves like a user can update their name4468 updates their name4469 behaves like a user can update their name4470 updates their name4471 when the ability to update their name is disabled for users4472 as a regular user4473 does not update their name4474 as an admin in admin mode4475 behaves like a user can update their name4476 updates their name4477 when `disable_name_update_for_users` feature is not available4478 behaves like a user can update their name4479 updates their name4480 behaves like a user can update their name4481 updates their name4482MergeRequestReviewer4483 when requesting information about MR interactions4484 when the user does not have any applicable rules4485 returns null data4486 when the user has interacted4487 returns appropriate data4488Create a milestone or assignee board list4489 the user is not allowed to read board lists4490 behaves like a mutation that returns a top-level access error4491 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4492 when user has permissions to admin board lists4493 milestone list4494 creates the list4495 assignee list4496 creates the list4497Environments Deployments query4498 # order random4499 when requesting user permissions4500 limits the result4501Projects::ImportsController4502 POST #create4503 mirror user is not the current user4504 only assigns the current user4505API::Ldap4506 GET /ldap/groups4507 when unauthenticated4508 returns authentication error4509 when authenticated as user4510 returns authentication error4511 when group owners are allowed to manage LDAP4512 returns an array of ldap groups4513 when authenticated as admin4514 returns an array of ldap groups4515 GET /ldap/ldapmain/groups4516 when unauthenticated4517 returns authentication error4518 when authenticated as user4519 returns authentication error4520 when group owners are allowed to manage LDAP4521 returns an array of ldap groups4522 when authenticated as admin4523 returns an array of ldap groups4524getting a compliance frameworks list for a project4525 when the project has no compliance framework assigned4526 is an empty array4527 when the project has a compliance framework assigned4528 includes its name4529Mutations::Analytics::DevopsAdoption::EnabledNamespaces::Enable4530 creates the enabled_namespace with the group4531 when the user cannot manage enabled_namespaces4532 behaves like a mutation that returns a top-level access error4533 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4534 when the feature is not available4535 behaves like a mutation that returns a top-level access error4536 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4537Admin::RunnersController4538 #index4539 enables runner_performance_insights and runner_upgrade_management licensed feature4540 when fetching runner releases is disabled4541 enables only runner_performance_insights licensed feature4542 #show4543 enables runner_upgrade_management, runner_maintenance_note licensed features4544 when fetching runner releases is disabled4545 enables only runner_maintenance_note licensed feature4546 #edit4547 enables runner_maintenance_note licensed feature4548Activate a subscription4549 persists license key4550 when there are future subscriptions4551 persists license key and stores future subscriptions4552API::RubygemPackages4553 # order random4554 GET /api/v4/projects/:project_id/packages/rubygems/gems/:file_name4555 behaves like applying ip restriction for group4556 in group without restriction4557 behaves like returning response status4558 returns ok4559 in group with restriction4560 with address within the range4561 behaves like returning response status4562 returns ok4563 with address outside the range4564 behaves like returning response status4565 returns not_found4566Projects::InsightsController4567 # order random4568 POST #query4569 succeeds4570 when statement timeout happens4571 returns error response4572Emails::GroupMemberships4573 #memberships_export_email4574 is expected to have subject of "Exported group membership list"4575 is expected to be delivered to ["user1454@example.org"]4576 contains one attachment4577 properly renders email4578Removing an issuable resource link4579 # order random4580 removes the issuable resource link4581Groups::VariablesController4582 PATCH #update4583 scoped variables are available4584 updates the environment scope4585 scoped variables are not available4586 does not update the environment scope4587GroupMemberBulkUpdate4588 # order random4589 updates the members with minimal access4590Removing an escalation policy4591 # order random4592 removes the escalation policy4593Profiles::PreferencesController4594 PATCH update4595 when security dashboard feature enabled4596 and valid group view choice is submitted4597 changes the user's preferences4598 and an invalid group view choice is submitted4599 responds with an error message4600 when security dashboard feature is disabled4601 when security dashboard feature enabled4602 is expected not to change `user.reload.group_view_security_dashboard?`4603InternalRedirect4604 #host_allowed?4605 allows redirecting to existing geo nodes4606devopsAdoptionEnabledNamespaces4607 returns measurement objects4608Admin::ImpersonationTokensController4609 # order random4610 when impersonation is enabled4611 when personal access tokens are disabled4612 responds with a 4044613Knapsack report was generated. Preview:4614{4615 "ee/spec/controllers/projects/merge_requests_controller_spec.rb": 170.15041381300034,4616 "ee/spec/controllers/operations_controller_spec.rb": 78.08000961400103,4617 "ee/spec/requests/api/issues_spec.rb": 59.19270632699954,4618 "ee/spec/requests/api/releases_spec.rb": 53.327800060998925,4619 "ee/spec/requests/api/project_approval_settings_spec.rb": 38.14559966699926,4620 "ee/spec/requests/api/ldap_group_links_spec.rb": 33.78134203099944,4621 "ee/spec/controllers/groups/analytics/cycle_analytics/summary_controller_spec.rb": 17.248812514999372,4622 "ee/spec/controllers/groups/omniauth_callbacks_controller_spec.rb": 25.692134125998564,4623 "ee/spec/requests/api/project_mirror_spec.rb": 29.090346689999933,4624 "ee/spec/requests/lfs_http_spec.rb": 19.919465891998698,4625 "ee/spec/requests/api/project_push_rule_spec.rb": 13.924002464998921,4626 "ee/spec/controllers/subscriptions_controller_spec.rb": 10.319757324999955,4627 "ee/spec/controllers/projects/clusters_controller_spec.rb": 12.72567589100072,4628 "ee/spec/requests/api/vulnerability_exports_spec.rb": 14.557896979000361,4629 "ee/spec/requests/api/graphql/mutations/work_items/update_spec.rb": 15.25454326900035,4630 "ee/spec/controllers/projects/security/vulnerabilities/notes_controller_spec.rb": 13.61377027799972,4631 "ee/spec/controllers/ldap/omniauth_callbacks_controller_spec.rb": 15.434204146000411,4632 "ee/spec/requests/groups/epics_controller_spec.rb": 14.812914480999098,4633 "ee/spec/requests/api/award_emoji_spec.rb": 8.885389258999567,4634 "ee/spec/controllers/projects/protected_environments_controller_spec.rb": 12.658069646000513,4635 "ee/spec/controllers/groups/analytics/tasks_by_type_controller_spec.rb": 14.439948528000969,4636 "ee/spec/controllers/projects/security/vulnerabilities_controller_spec.rb": 11.393854276999264,4637 "ee/spec/requests/api/graphql/group/epic/epic_aggregate_query_spec.rb": 7.796861437000189,4638 "ee/spec/requests/api/graphql/project/pipeline/security_report_summary_spec.rb": 10.536717969000165,4639 "ee/spec/requests/api/project_clusters_spec.rb": 10.353423389000454,4640 "ee/spec/requests/trial_registrations_controller_spec.rb": 4.5355998530012585,4641 "ee/spec/requests/api/graphql/boards/boards_query_spec.rb": 8.813006980000864,4642 "ee/spec/requests/api/graphql/boards/board_lists_query_spec.rb": 7.660995787000502,4643 "ee/spec/controllers/projects/deploy_keys_controller_spec.rb": 8.019577066999773,4644 "ee/spec/controllers/concerns/routable_actions_spec.rb": 7.114847640999869,4645 "ee/spec/requests/groups/analytics/dashboards_controller_spec.rb": 6.838934637999046,4646 "ee/spec/requests/api/graphql/mutations/iterations/create_spec.rb": 5.894904872000552,4647 "ee/spec/controllers/ee/sessions_controller_spec.rb": 3.619861266000953,4648 "ee/spec/requests/api/graphql/mutations/requirements_management/update_requirement_spec.rb": 5.9464545489991,4649 "ee/spec/controllers/ee/registrations/welcome_controller_spec.rb": 5.320547245999478,4650 "ee/spec/requests/ee/groups/autocomplete_sources_spec.rb": 5.932304549000037,4651 "ee/spec/requests/api/graphql/mutations/issues/update_spec.rb": 6.157840945999851,4652 "ee/spec/controllers/concerns/ee/routable_actions/sso_enforcement_redirect_spec.rb": 6.469045669000479,4653 "ee/spec/requests/api/graphql/mutations/security/finding/create_merge_request_spec.rb": 5.775805498999034,4654 "ee/spec/requests/api/graphql/iterations/iterations_spec.rb": 4.345532803001333,4655 "ee/spec/requests/jwt_controller_spec.rb": 4.898698191000221,4656 "ee/spec/requests/api/graphql/project/pipeline/security_report_finding_spec.rb": 6.265888440999333,4657 "ee/spec/requests/api/member_roles_spec.rb": 3.8012936350005475,4658 "ee/spec/requests/api/graphql/audit_events/streaming/headers/update_spec.rb": 5.358772323999801,4659 "ee/spec/requests/api/graphql/project/branch_protections/unprotect_access_levels_spec.rb": 5.367017004000445,4660 "ee/spec/requests/projects/analytics/dashboards_controller_spec.rb": 5.717827132999446,4661 "ee/spec/requests/api/graphql/mutations/projects/initialize_product_analytics_spec.rb": 4.502425355000014,4662 "ee/spec/requests/api/graphql/project/code_coverage_summary_spec.rb": 6.489594737000516,4663 "ee/spec/requests/api/graphql/namespace/projects_spec.rb": 5.368756514000779,4664 "ee/spec/controllers/groups/analytics/cycle_analytics_controller_spec.rb": 5.412286561000656,4665 "ee/spec/mailers/license_mailer_spec.rb": 2.235967927999809,4666 "ee/spec/controllers/groups/roadmap_controller_spec.rb": 3.634014004999699,4667 "ee/spec/requests/api/graphql/mutations/epics/add_issue_spec.rb": 4.070805530000143,4668 "ee/spec/controllers/admin/geo/nodes_controller_spec.rb": 3.6888174419982533,4669 "ee/spec/requests/api/graphql/mutations/security_policy/commit_scan_execution_policy_spec.rb": 4.6481558560008125,4670 "ee/spec/requests/api/graphql/mutations/compliance_management/frameworks/create_spec.rb": 3.6780149129990605,4671 "ee/spec/requests/api/resource_state_events_spec.rb": 4.613590128001306,4672 "ee/spec/controllers/registrations/verification_controller_spec.rb": 1.6962530099990545,4673 "ee/spec/requests/api/graphql/current_user/groups_query_spec.rb": 4.2590482989999146,4674 "ee/spec/requests/api/graphql/audit_events/streaming/headers/create_spec.rb": 3.4597741960005806,4675 "ee/spec/requests/projects/audit_events_spec.rb": 4.457039626999176,4676 "ee/spec/controllers/admin/audit_logs_controller_spec.rb": 2.7450608679992,4677 "ee/spec/requests/api/graphql/project/dast_scanner_profiles_spec.rb": 2.7358734190001996,4678 "ee/spec/controllers/admin/licenses/usage_exports_controller_spec.rb": 2.2191049689990905,4679 "ee/spec/requests/api/graphql/project/pipeline/code_quality_reports_spec.rb": 3.265721976998975,4680 "ee/spec/requests/api/graphql/project/pipeline/dast_profile_spec.rb": 3.7763236869996035,4681 "ee/spec/requests/api/graphql/mutations/iterations/delete_spec.rb": 3.0067484230003174,4682 "ee/spec/requests/api/graphql/ci/minutes/usage_spec.rb": 2.948952286000349,4683 "ee/spec/requests/api/graphql/mutations/releases/create_spec.rb": 2.9349019069995848,4684 "ee/spec/requests/projects/pipelines/email_campaigns_controller_spec.rb": 3.3281000240003777,4685 "ee/spec/controllers/groups/analytics/repository_analytics_controller_spec.rb": 2.2151808900016476,4686 "ee/spec/requests/api/graphql/mutations/dast/profiles/delete_spec.rb": 2.499596911999106,4687 "ee/spec/requests/ee/groups/settings/repository_controller_spec.rb": 2.424273026999799,4688 "ee/spec/requests/api/captcha_check_spec.rb": 1.5269212900002458,4689 "ee/spec/requests/api/graphql/project/dast_profile_spec.rb": 2.731632069000625,4690 "ee/spec/controllers/groups/todos_controller_spec.rb": 2.479012503999911,4691 "ee/spec/controllers/projects/incident_management/escalation_policies_controller_spec.rb": 2.9934139540000615,4692 "ee/spec/controllers/groups/runners_controller_spec.rb": 1.9186322369987465,4693 "ee/spec/controllers/groups/security/dashboard_controller_spec.rb": 2.033803310998337,4694 "ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/create_spec.rb": 2.7320210189991485,4695 "ee/spec/requests/api/graphql/vulnerabilities/external_issue_links_spec.rb": 2.5998665369988885,4696 "ee/spec/requests/api/helm_packages_spec.rb": 1.753885096999511,4697 "ee/spec/controllers/profiles_controller_spec.rb": 1.3976188669985277,4698 "ee/spec/requests/api/graphql/merge_request_reviewer_spec.rb": 2.631497215001218,4699 "ee/spec/requests/api/graphql/mutations/boards/lists/create_spec.rb": 2.036643039999035,4700 "ee/spec/requests/api/graphql/environments/deployments_spec.rb": 2.256963186999201,4701 "ee/spec/controllers/projects/imports_controller_spec.rb": 1.2403416969991667,4702 "ee/spec/requests/api/ldap_spec.rb": 1.2970783040000242,4703 "ee/spec/requests/api/graphql/project/compliance_frameworks_spec.rb": 1.7342988869986584,4704 "ee/spec/requests/api/graphql/mutations/analytics/devops_adoption/enabled_namespaces/enable_spec.rb": 1.5775760670003365,4705 "ee/spec/controllers/admin/runners_controller_spec.rb": 1.0799535460009793,4706 "ee/spec/requests/api/graphql/mutations/gitlab_subscriptions/activate_spec.rb": 1.4304153360008058,4707 "ee/spec/requests/api/rubygem_packages_spec.rb": 1.5661260479992052,4708 "ee/spec/requests/projects/insights_controller_spec.rb": 1.4269407960000535,4709 "ee/spec/mailers/emails/group_memberships_spec.rb": 0.9747727030007809,4710 "ee/spec/requests/api/graphql/mutations/incident_management/issuable_resource_link/destroy_spec.rb": 1.6220885739985533,4711 "ee/spec/controllers/ee/groups/variables_controller_spec.rb": 1.0597432280010253,4712 "ee/spec/requests/api/graphql/mutations/members/groups/ee/bulk_update_spec.rb": 1.2414304570011154,4713 "ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/destroy_spec.rb": 1.1759606309988158,4714 "ee/spec/controllers/ee/profiles/preferences_controller_spec.rb": 0.9528519340001367,4715 "ee/spec/controllers/concerns/internal_redirect_spec.rb": 0.4529624330007209,4716 "ee/spec/requests/api/graphql/analytics/devops_adoption/enabled_namespaces_spec.rb": 0.8573787599998468,4717 "ee/spec/requests/admin/impersonation_tokens_controller_spec.rb": 0.7218676069987854718}4719Knapsack global time execution for tests: 16m 21s4720Finished in 16 minutes 26 seconds (files took 1 minute 18.81 seconds to load)47211505 examples, 0 failures4722Randomized with seed 174064723[TEST PROF INFO] Time spent in factories: 07:11.674 (42.15% of total time)4724RSpec exited with 0.4725No examples to retry, congrats!4727Not uploading cache ruby-gems-debian-bullseye-ruby-3.0-16 due to policy4728Not uploading cache gitaly-ruby-gems-debian-bullseye-ruby-3.0-16 due to policy4730Uploading artifacts...4731coverage/: found 5 matching artifact files and directories 4732crystalball/: found 2 matching artifact files and directories 4733deprecations/: found 7 matching artifact files and directories 4734knapsack/: found 3 matching artifact files and directories 4735WARNING: query_recorder/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab) 4736rspec/: found 14 matching artifact files and directories 4737WARNING: tmp/capybara/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab) 4738log/*.log: found 15 matching artifact files and directories 4739WARNING: Upload request redirected location=https://gitlab.com/api/v4/jobs/4031139299/artifacts?artifact_format=zip&artifact_type=archive&expire_in=31d new-url=https://gitlab.com4740WARNING: Retrying... context=artifacts-uploader error=request redirected4741Uploading artifacts as "archive" to coordinator... 201 Created id=4031139299 responseStatus=201 Created token=64_B8MpF4742Uploading artifacts...4743rspec/junit_rspec.xml: found 1 matching artifact files and directories 4744WARNING: Upload request redirected location=https://gitlab.com/api/v4/jobs/4031139299/artifacts?artifact_format=gzip&artifact_type=junit&expire_in=31d new-url=https://gitlab.com4745WARNING: Retrying... context=artifacts-uploader error=request redirected4746Uploading artifacts as "junit" to coordinator... 201 Created id=4031139299 responseStatus=201 Created token=64_B8MpF4748Job succeeded