There was an error fetching the job.
rspec-ee integration pg13 single-db-ci-connection 1/6
Passed Started
by
@gitlab-bot

🤖 GitLab Bot 🤖
1Running with gitlab-runner 15.9.0~beta.212.g8ccc65e7 (8ccc65e7)2 on green-2.private.runners-manager.gitlab.com/gitlab.com/gitlab-org GaSD-S1F, system ID: s_5651e5b5643b3 feature flags: FF_NETWORK_PER_BUILD:true, FF_USE_FASTZIP:true, FF_USE_IMPROVED_URL_MASKING:true6Using Docker executor with image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.18-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 ...7Starting service postgres:13 ...8Pulling docker image postgres:13 ...9Using docker image sha256:dd421ca1f7f13d81c5c145d77d97d8d84cd0e6f1e045936ee506ce0f50ee397a for postgres:13 with digest postgres@sha256:00f455399f30cc3f2fe4185476601438b7a4959c74653665582d7c313a783d51 ...10Starting service redis:6.2-alpine ...11Pulling docker image redis:6.2-alpine ...12Using docker image sha256:3616f0c0705d2a35d30dde109daf3cbe58ae7284121aafa6f5cfa987db98d1a8 for redis:6.2-alpine with digest redis@sha256:edddbcad5a41d58df2f142d68439922f1860ea902903d016257337c3342f30fc ...13Starting service elasticsearch:7.17.6 ...14Pulling docker image elasticsearch:7.17.6 ...15Using docker image sha256:5fad10241ffd65d817ed0ddfaf6e87eee1f7dc2a7db33db1047835560ea71fda for elasticsearch:7.17.6 with digest elasticsearch@sha256:6c128de5d01c0c130a806022d6bd99b3e4c27a9af5bfc33b6b81861ae117d028 ...16Starting service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 ...17Authenticating with credentials from job payload (GitLab Registry)18Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 ...19Using docker image sha256:4777ec1fa89def7d692d4979d05cb05234df25da1c6a3f67a564a433ec5ba1c8 for registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:80c0cee4566aefe4f1f287e1091263e08b0ebc41ed3dc4e76930df3634ccb9aa ...20Waiting for services to be up and running (timeout 30 seconds)...21*** WARNING: Service runner-gasd-s1f-project-278964-concurrent-0-dbbec898f5772e59-elasticsearch-2 probably didn't start properly.22Health check error:23service "runner-gasd-s1f-project-278964-concurrent-0-dbbec898f5772e59-elasticsearch-2-wait-for-service" timeout24Health check container logs:25Service container logs:262023-03-30T11:37:29.802423747Z {"type": "server", "timestamp": "2023-03-30T11:37:29,757Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "version[7.17.6], pid[7], build[default/docker/f65e9d338dc1d07b642e14a27f338990148ee5b6/2022-08-23T11:08:48.893373482Z], OS[Linux/5.4.109+/amd64], JVM[Oracle Corporation/OpenJDK 64-Bit Server VM/18.0.2/18.0.2+9-61]" }272023-03-30T11:37:29.803104878Z {"type": "server", "timestamp": "2023-03-30T11:37:29,802Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "JVM home [/usr/share/elasticsearch/jdk], using bundled JDK [true]" }282023-03-30T11:37:29.803678947Z {"type": "server", "timestamp": "2023-03-30T11:37:29,803Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "JVM arguments [-Xshare:auto, -Des.networkaddress.cache.ttl=60, -Des.networkaddress.cache.negative.ttl=10, -XX:+AlwaysPreTouch, -Xss1m, -Djava.awt.headless=true, -Dfile.encoding=UTF-8, -Djna.nosys=true, -XX:-OmitStackTraceInFastThrow, -XX:+ShowCodeDetailsInExceptionMessages, -Dio.netty.noUnsafe=true, -Dio.netty.noKeySetOptimization=true, -Dio.netty.recycler.maxCapacityPerThread=0, -Dio.netty.allocator.numDirectArenas=0, -Dlog4j.shutdownHookEnabled=false, -Dlog4j2.disable.jmx=true, -Dlog4j2.formatMsgNoLookups=true, -Djava.locale.providers=SPI,COMPAT, --add-opens=java.base/java.io=ALL-UNNAMED, -Djava.security.manager=allow, -XX:+UseG1GC, -Djava.io.tmpdir=/tmp/elasticsearch-13405896987288216087, -XX:+HeapDumpOnOutOfMemoryError, -XX:+ExitOnOutOfMemoryError, -XX:HeapDumpPath=data, -XX:ErrorFile=logs/hs_err_pid%p.log, -Xlog:gc*,gc+age=trace,safepoint:file=logs/gc.log:utctime,pid,tags:filecount=32,filesize=64m, -Des.cgroups.hierarchy.override=/, -Xms256m, -Xmx256m, -XX:MaxDirectMemorySize=134217728, -XX:G1HeapRegionSize=4m, -XX:InitiatingHeapOccupancyPercent=30, -XX:G1ReservePercent=15, -Des.path.home=/usr/share/elasticsearch, -Des.path.conf=/usr/share/elasticsearch/config, -Des.distribution.flavor=default, -Des.distribution.type=docker, -Des.bundled_jdk=true]" }292023-03-30T11:37:38.006630435Z {"type": "server", "timestamp": "2023-03-30T11:37:38,006Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [aggs-matrix-stats]" }302023-03-30T11:37:38.007851595Z {"type": "server", "timestamp": "2023-03-30T11:37:38,006Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [analysis-common]" }312023-03-30T11:37:38.008506285Z {"type": "server", "timestamp": "2023-03-30T11:37:38,007Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [constant-keyword]" }322023-03-30T11:37:38.008742965Z {"type": "server", "timestamp": "2023-03-30T11:37:38,008Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [frozen-indices]" }332023-03-30T11:37:38.014794943Z {"type": "server", "timestamp": "2023-03-30T11:37:38,008Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [ingest-common]" }342023-03-30T11:37:38.015144433Z {"type": "server", "timestamp": "2023-03-30T11:37:38,014Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [ingest-geoip]" }352023-03-30T11:37:38.015363673Z {"type": "server", "timestamp": "2023-03-30T11:37:38,015Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [ingest-user-agent]" }362023-03-30T11:37:38.015586233Z {"type": "server", "timestamp": "2023-03-30T11:37:38,015Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [kibana]" }372023-03-30T11:37:38.015802363Z {"type": "server", "timestamp": "2023-03-30T11:37:38,015Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [lang-expression]" }382023-03-30T11:37:38.016003793Z {"type": "server", "timestamp": "2023-03-30T11:37:38,015Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [lang-mustache]" }392023-03-30T11:37:38.016234213Z {"type": "server", "timestamp": "2023-03-30T11:37:38,015Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [lang-painless]" }402023-03-30T11:37:38.016449053Z {"type": "server", "timestamp": "2023-03-30T11:37:38,016Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [legacy-geo]" }412023-03-30T11:37:38.016671513Z {"type": "server", "timestamp": "2023-03-30T11:37:38,016Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [mapper-extras]" }422023-03-30T11:37:38.016877383Z {"type": "server", "timestamp": "2023-03-30T11:37:38,016Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [mapper-version]" }432023-03-30T11:37:38.017092233Z {"type": "server", "timestamp": "2023-03-30T11:37:38,016Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [parent-join]" }442023-03-30T11:37:38.017301173Z {"type": "server", "timestamp": "2023-03-30T11:37:38,017Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [percolator]" }452023-03-30T11:37:38.017562513Z {"type": "server", "timestamp": "2023-03-30T11:37:38,017Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [rank-eval]" }462023-03-30T11:37:38.017787843Z {"type": "server", "timestamp": "2023-03-30T11:37:38,017Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [reindex]" }472023-03-30T11:37:38.017996063Z {"type": "server", "timestamp": "2023-03-30T11:37:38,017Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [repositories-metering-api]" }482023-03-30T11:37:38.018214732Z {"type": "server", "timestamp": "2023-03-30T11:37:38,017Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [repository-encrypted]" }492023-03-30T11:37:38.018412852Z {"type": "server", "timestamp": "2023-03-30T11:37:38,018Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [repository-url]" }502023-03-30T11:37:38.018649512Z {"type": "server", "timestamp": "2023-03-30T11:37:38,018Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [runtime-fields-common]" }512023-03-30T11:37:38.018856643Z {"type": "server", "timestamp": "2023-03-30T11:37:38,018Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [search-business-rules]" }522023-03-30T11:37:38.019148103Z {"type": "server", "timestamp": "2023-03-30T11:37:38,018Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [searchable-snapshots]" }532023-03-30T11:37:38.019365792Z {"type": "server", "timestamp": "2023-03-30T11:37:38,019Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [snapshot-repo-test-kit]" }542023-03-30T11:37:38.019593502Z {"type": "server", "timestamp": "2023-03-30T11:37:38,019Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [spatial]" }552023-03-30T11:37:38.019829902Z {"type": "server", "timestamp": "2023-03-30T11:37:38,019Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [transform]" }562023-03-30T11:37:38.020097902Z {"type": "server", "timestamp": "2023-03-30T11:37:38,019Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [transport-netty4]" }572023-03-30T11:37:38.020302242Z {"type": "server", "timestamp": "2023-03-30T11:37:38,020Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [unsigned-long]" }582023-03-30T11:37:38.020550562Z {"type": "server", "timestamp": "2023-03-30T11:37:38,020Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [vector-tile]" }592023-03-30T11:37:38.020741532Z {"type": "server", "timestamp": "2023-03-30T11:37:38,020Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [vectors]" }602023-03-30T11:37:38.020943132Z {"type": "server", "timestamp": "2023-03-30T11:37:38,020Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [wildcard]" }612023-03-30T11:37:38.021149052Z {"type": "server", "timestamp": "2023-03-30T11:37:38,020Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-aggregate-metric]" }622023-03-30T11:37:38.021360462Z {"type": "server", "timestamp": "2023-03-30T11:37:38,021Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-analytics]" }632023-03-30T11:37:38.022368222Z {"type": "server", "timestamp": "2023-03-30T11:37:38,021Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-async]" }642023-03-30T11:37:38.023005992Z {"type": "server", "timestamp": "2023-03-30T11:37:38,022Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-async-search]" }652023-03-30T11:37:38.023346111Z {"type": "server", "timestamp": "2023-03-30T11:37:38,022Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-autoscaling]" }662023-03-30T11:37:38.023584771Z {"type": "server", "timestamp": "2023-03-30T11:37:38,023Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-ccr]" }672023-03-30T11:37:38.024279702Z {"type": "server", "timestamp": "2023-03-30T11:37:38,023Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-core]" }682023-03-30T11:37:38.024846541Z {"type": "server", "timestamp": "2023-03-30T11:37:38,024Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-data-streams]" }692023-03-30T11:37:38.025467211Z {"type": "server", "timestamp": "2023-03-30T11:37:38,024Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-deprecation]" }702023-03-30T11:37:38.025679761Z {"type": "server", "timestamp": "2023-03-30T11:37:38,025Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-enrich]" }712023-03-30T11:37:38.026204011Z {"type": "server", "timestamp": "2023-03-30T11:37:38,025Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-eql]" }722023-03-30T11:37:38.026594641Z {"type": "server", "timestamp": "2023-03-30T11:37:38,026Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-fleet]" }732023-03-30T11:37:38.026799561Z {"type": "server", "timestamp": "2023-03-30T11:37:38,026Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-graph]" }742023-03-30T11:37:38.027010101Z {"type": "server", "timestamp": "2023-03-30T11:37:38,026Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-identity-provider]" }752023-03-30T11:37:38.027233111Z {"type": "server", "timestamp": "2023-03-30T11:37:38,026Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-ilm]" }762023-03-30T11:37:38.027460531Z {"type": "server", "timestamp": "2023-03-30T11:37:38,027Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-logstash]" }772023-03-30T11:37:38.027695591Z {"type": "server", "timestamp": "2023-03-30T11:37:38,027Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-ml]" }782023-03-30T11:37:38.027945921Z {"type": "server", "timestamp": "2023-03-30T11:37:38,027Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-monitoring]" }792023-03-30T11:37:38.028178991Z {"type": "server", "timestamp": "2023-03-30T11:37:38,027Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-ql]" }802023-03-30T11:37:38.028384901Z {"type": "server", "timestamp": "2023-03-30T11:37:38,028Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-rollup]" }812023-03-30T11:37:38.028619481Z {"type": "server", "timestamp": "2023-03-30T11:37:38,028Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-security]" }822023-03-30T11:37:38.028830701Z {"type": "server", "timestamp": "2023-03-30T11:37:38,028Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-shutdown]" }832023-03-30T11:37:38.029026741Z {"type": "server", "timestamp": "2023-03-30T11:37:38,028Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-sql]" }842023-03-30T11:37:38.029238261Z {"type": "server", "timestamp": "2023-03-30T11:37:38,028Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-stack]" }852023-03-30T11:37:38.029584830Z {"type": "server", "timestamp": "2023-03-30T11:37:38,029Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-text-structure]" }862023-03-30T11:37:38.029858490Z {"type": "server", "timestamp": "2023-03-30T11:37:38,029Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-voting-only-node]" }872023-03-30T11:37:38.030193840Z {"type": "server", "timestamp": "2023-03-30T11:37:38,029Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "loaded module [x-pack-watcher]" }882023-03-30T11:37:38.030844200Z {"type": "server", "timestamp": "2023-03-30T11:37:38,030Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "no plugins loaded" }892023-03-30T11:37:38.167681982Z {"type": "server", "timestamp": "2023-03-30T11:37:38,164Z", "level": "INFO", "component": "o.e.e.NodeEnvironment", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "using [1] data paths, mounts [[/ (overlay)]], net usable_space [79.6gb], net total_space [94.2gb], types [overlay]" }902023-03-30T11:37:38.168235233Z {"type": "server", "timestamp": "2023-03-30T11:37:38,167Z", "level": "INFO", "component": "o.e.e.NodeEnvironment", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "heap size [256mb], compressed ordinary object pointers [true]" }912023-03-30T11:37:38.263414263Z {"type": "server", "timestamp": "2023-03-30T11:37:38,262Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "node name [8be99d22c814], node ID [Hee9xUw4TuSfSdUs6stWyA], cluster name [docker-cluster], roles [transform, data_frozen, master, remote_cluster_client, data, ml, data_content, data_hot, data_warm, data_cold, ingest]" }922023-03-30T11:37:47.457019030Z {"type": "server", "timestamp": "2023-03-30T11:37:47,456Z", "level": "INFO", "component": "o.e.x.m.p.l.CppLogMessageHandler", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "[controller/210] [Main.cc@122] controller (64 bit): Version 7.17.6 (Build ea0305ae2a3b09) Copyright (c) 2022 Elasticsearch BV" }932023-03-30T11:37:48.668058776Z {"type": "server", "timestamp": "2023-03-30T11:37:48,667Z", "level": "INFO", "component": "o.e.i.g.ConfigDatabases", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "initialized default databases [[GeoLite2-Country.mmdb, GeoLite2-City.mmdb, GeoLite2-ASN.mmdb]], config databases [[]] and watching [/usr/share/elasticsearch/config/ingest-geoip] for changes" }942023-03-30T11:37:48.669255295Z {"type": "server", "timestamp": "2023-03-30T11:37:48,668Z", "level": "INFO", "component": "o.e.i.g.DatabaseNodeService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "initialized database registry, using geoip-databases directory [/tmp/elasticsearch-13405896987288216087/geoip-databases/Hee9xUw4TuSfSdUs6stWyA]" }952023-03-30T11:37:49.806275696Z {"type": "server", "timestamp": "2023-03-30T11:37:49,805Z", "level": "INFO", "component": "o.e.t.NettyAllocator", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "creating NettyAllocator with the following configs: [name=unpooled, suggested_max_allocation_size=1mb, factors={es.unsafe.use_unpooled_allocator=null, g1gc_enabled=true, g1gc_region_size=4mb, heap_size=256mb}]" }962023-03-30T11:37:49.866814914Z {"type": "server", "timestamp": "2023-03-30T11:37:49,866Z", "level": "INFO", "component": "o.e.i.r.RecoverySettings", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "using rate limit [40mb] with [default=40mb, read=0b, write=0b, max=0b]" }972023-03-30T11:37:49.948723578Z {"type": "server", "timestamp": "2023-03-30T11:37:49,948Z", "level": "INFO", "component": "o.e.d.DiscoveryModule", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "using discovery type [single-node] and seed hosts providers [settings]" }982023-03-30T11:37:50.606674715Z {"type": "server", "timestamp": "2023-03-30T11:37:50,606Z", "level": "INFO", "component": "o.e.g.DanglingIndicesState", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "gateway.auto_import_dangling_indices is disabled, dangling indices will not be automatically detected or imported and must be managed manually" }992023-03-30T11:37:51.696004106Z {"type": "server", "timestamp": "2023-03-30T11:37:51,695Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "initialized" }1002023-03-30T11:37:51.696268686Z {"type": "server", "timestamp": "2023-03-30T11:37:51,695Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "starting ..." }1012023-03-30T11:37:51.756795504Z {"type": "server", "timestamp": "2023-03-30T11:37:51,756Z", "level": "INFO", "component": "o.e.x.s.c.f.PersistentCache", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "persistent cache index loaded" }1022023-03-30T11:37:51.757818644Z {"type": "server", "timestamp": "2023-03-30T11:37:51,757Z", "level": "INFO", "component": "o.e.x.d.l.DeprecationIndexingComponent", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "deprecation component started" }1032023-03-30T11:37:52.254446484Z {"type": "server", "timestamp": "2023-03-30T11:37:52,253Z", "level": "INFO", "component": "o.e.t.TransportService", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "publish_address {172.27.0.4:9300}, bound_addresses {0.0.0.0:9300}" }1042023-03-30T11:37:52.266039691Z {"type": "server", "timestamp": "2023-03-30T11:37:52,265Z", "level": "INFO", "component": "o.e.x.m.Monitoring", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "creating template [.monitoring-alerts-7] with version [7]" }1052023-03-30T11:37:52.273818580Z {"type": "server", "timestamp": "2023-03-30T11:37:52,273Z", "level": "INFO", "component": "o.e.x.m.Monitoring", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "creating template [.monitoring-es] with version [7]" }1062023-03-30T11:37:52.275737129Z {"type": "server", "timestamp": "2023-03-30T11:37:52,275Z", "level": "INFO", "component": "o.e.x.m.Monitoring", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "creating template [.monitoring-kibana] with version [7]" }1072023-03-30T11:37:52.278233879Z {"type": "server", "timestamp": "2023-03-30T11:37:52,278Z", "level": "INFO", "component": "o.e.x.m.Monitoring", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "creating template [.monitoring-logstash] with version [7]" }1082023-03-30T11:37:52.282228638Z {"type": "server", "timestamp": "2023-03-30T11:37:52,281Z", "level": "INFO", "component": "o.e.x.m.Monitoring", "cluster.name": "docker-cluster", "node.name": "8be99d22c814", "message": "creating template [.monitoring-beats] with version [7]" }109*********110Authenticating with credentials from job payload (GitLab Registry)111Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.18-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 ...112Using docker image sha256:7a1b51158a1ee23b080b514ce6ebbf52ac51585877198fb52709e5cd01805a77 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.18-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.18-rust-1.65-node-16.14-postgresql-13@sha256:412d55913d43377094427ced549cb422ed2f2c7223e6a605d0d3e0151cb892b0 ...114Running on runner-gasd-s1f-project-278964-concurrent-0 via runner-gasd-s1f-private-1680166032-f0ed9beb...116$ eval "$CI_PRE_CLONE_SCRIPT"117Fetching changes with git depth set to 20...118Initialized empty Git repository in /builds/gitlab-org/gitlab/.git/119Created fresh repository.120remote: Enumerating objects: 135903, done. 121remote: Counting objects: 100% (135903/135903), done. 122remote: Compressing objects: 100% (88560/88560), done. 123remote: Total 135903 (delta 58315), reused 94618 (delta 42152), pack-reused 0 124Receiving objects: 100% (135903/135903), 121.35 MiB | 30.97 MiB/s, done.125Resolving deltas: 100% (58315/58315), done.127 * [new ref] refs/pipelines/822866544 -> refs/pipelines/822866544128Checking out 523abdde as detached HEAD (ref is refs/merge-requests/116270/merge)...129Skipping Git submodules setup130$ git remote set-url origin "${CI_REPOSITORY_URL}"132Checking cache for ruby-gems-debian-bullseye-ruby-3.0-16...133cache.zip is up to date 134Successfully extracted cache135Checking cache for gitaly-ruby-gems-debian-bullseye-ruby-3.0-16...136cache.zip is up to date 137Successfully extracted cache139Downloading artifacts for compile-test-assets (4031138198)...140Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4031138198 responseStatus=200 OK token=64_eFM2d141Downloading artifacts for detect-tests (4031138213)...142Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4031138213 responseStatus=200 OK token=64_eFM2d143Downloading artifacts for retrieve-tests-metadata (4031138217)...144Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4031138217 responseStatus=200 OK token=64_eFM2d145Downloading artifacts for setup-test-env (4031138204)...146Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4031138204 responseStatus=200 OK token=64_eFM2d148Using docker image sha256:7a1b51158a1ee23b080b514ce6ebbf52ac51585877198fb52709e5cd01805a77 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.18-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.18-rust-1.65-node-16.14-postgresql-13@sha256:412d55913d43377094427ced549cb422ed2f2c7223e6a605d0d3e0151cb892b0 ...149$ echo $FOSS_ONLY150$ [ "$FOSS_ONLY" = "1" ] && rm -rf ee/ qa/spec/ee/ qa/qa/specs/features/ee/ qa/qa/ee/ qa/qa/ee.rb151$ export GOPATH=$CI_PROJECT_DIR/.go152$ mkdir -p $GOPATH153$ source scripts/utils.sh154$ source scripts/prepare_build.sh805Using decomposed database config (config/database.yml.postgresql)806Enabling ci connection (database_tasks: false) in config/database.yml807Geo DB will be set up.808$ setup_db_user_only809CREATE ROLE810GRANT811==> 'setup_db_user_only' succeeded in 1 seconds.812$ bundle exec rake db:drop db:create db:schema:load db:migrate gitlab:db:lock_writes813Dropped database 'gitlabhq_test'814Dropped database 'gitlabhq_geo_test'815Created database 'gitlabhq_test'816Created database 'gitlabhq_geo_test'817==> 'bundle exec rake db:drop db:create db:schema:load db:migrate gitlab:db:lock_writes' succeeded in 34 seconds.818$ setup_db_praefect819SELECT pg_catalog.set_config('search_path', '', false);820CREATE DATABASE praefect_test ENCODING 'UTF8';821==> 'setup_db_praefect' succeeded in 0 seconds.822$ source ./scripts/rspec_helpers.sh823$ run_timed_command "gem install knapsack --no-document"824$ gem install knapsack --no-document825Successfully installed knapsack-4.0.08261 gem installed827==> 'gem install knapsack --no-document' succeeded in 1 seconds.828$ echo -e "\e[0Ksection_start:`date +%s`:gitaly-test-spawn[collapsed=true]\r\e[0KStarting Gitaly"932$ rspec_paralellized_job "--tag ~quarantine --tag ~level:background_migration"933SKIP_FLAKY_TESTS_AUTOMATICALLY: false934RETRY_FAILED_TESTS_IN_NEW_PROCESS: true935KNAPSACK_GENERATE_REPORT: true936FLAKY_RSPEC_GENERATE_REPORT: true937KNAPSACK_TEST_FILE_PATTERN: {ee/}spec/{commands,controllers,mailers,requests}{,/**/}*_spec.rb938KNAPSACK_LOG_LEVEL: debug939KNAPSACK_REPORT_PATH: knapsack/rspec-ee_integration_pg13_single-db-ci-connection_1_6_report.json940FLAKY_RSPEC_SUITE_REPORT_PATH: rspec/flaky/report-suite.json941FLAKY_RSPEC_REPORT_PATH: rspec/flaky/all_rspec-ee_integration_pg13_single-db-ci-connection_1_6_report.json942NEW_FLAKY_RSPEC_REPORT_PATH: rspec/flaky/new_rspec-ee_integration_pg13_single-db-ci-connection_1_6_report.json943SKIPPED_FLAKY_TESTS_REPORT_PATH: rspec/flaky/skipped_flaky_tests_rspec-ee_integration_pg13_single-db-ci-connection_1_6_report.txt944CRYSTALBALL: 945Knapsack node specs:946ee/spec/controllers/projects/merge_requests_controller_spec.rb947ee/spec/controllers/operations_controller_spec.rb948ee/spec/requests/api/issues_spec.rb949ee/spec/requests/api/releases_spec.rb950ee/spec/requests/api/project_approval_settings_spec.rb951ee/spec/requests/api/ldap_group_links_spec.rb952ee/spec/controllers/groups/analytics/cycle_analytics/summary_controller_spec.rb953ee/spec/controllers/groups/omniauth_callbacks_controller_spec.rb954ee/spec/requests/api/project_mirror_spec.rb955ee/spec/requests/lfs_http_spec.rb956ee/spec/requests/api/project_push_rule_spec.rb957ee/spec/controllers/subscriptions_controller_spec.rb958ee/spec/controllers/projects/clusters_controller_spec.rb959ee/spec/requests/api/vulnerability_exports_spec.rb960ee/spec/requests/api/graphql/mutations/work_items/update_spec.rb961ee/spec/controllers/projects/security/vulnerabilities/notes_controller_spec.rb962ee/spec/controllers/ldap/omniauth_callbacks_controller_spec.rb963ee/spec/requests/groups/epics_controller_spec.rb964ee/spec/requests/api/award_emoji_spec.rb965ee/spec/controllers/projects/protected_environments_controller_spec.rb966ee/spec/controllers/groups/analytics/tasks_by_type_controller_spec.rb967ee/spec/controllers/projects/security/vulnerabilities_controller_spec.rb968ee/spec/requests/api/graphql/group/epic/epic_aggregate_query_spec.rb969ee/spec/requests/api/graphql/project/pipeline/security_report_summary_spec.rb970ee/spec/requests/api/project_clusters_spec.rb971ee/spec/requests/trial_registrations_controller_spec.rb972ee/spec/requests/api/graphql/boards/boards_query_spec.rb973ee/spec/requests/api/graphql/boards/board_lists_query_spec.rb974ee/spec/controllers/projects/deploy_keys_controller_spec.rb975ee/spec/controllers/concerns/routable_actions_spec.rb976ee/spec/requests/groups/analytics/dashboards_controller_spec.rb977ee/spec/requests/api/graphql/mutations/iterations/create_spec.rb978ee/spec/controllers/ee/sessions_controller_spec.rb979ee/spec/requests/api/graphql/mutations/requirements_management/update_requirement_spec.rb980ee/spec/controllers/ee/registrations/welcome_controller_spec.rb981ee/spec/requests/ee/groups/autocomplete_sources_spec.rb982ee/spec/requests/api/graphql/mutations/issues/update_spec.rb983ee/spec/controllers/concerns/ee/routable_actions/sso_enforcement_redirect_spec.rb984ee/spec/requests/api/graphql/mutations/security/finding/create_merge_request_spec.rb985ee/spec/requests/api/graphql/iterations/iterations_spec.rb986ee/spec/requests/jwt_controller_spec.rb987ee/spec/requests/api/graphql/project/pipeline/security_report_finding_spec.rb988ee/spec/requests/api/member_roles_spec.rb989ee/spec/requests/api/graphql/audit_events/streaming/headers/update_spec.rb990ee/spec/requests/api/graphql/project/branch_protections/unprotect_access_levels_spec.rb991ee/spec/requests/projects/analytics/dashboards_controller_spec.rb992ee/spec/requests/api/graphql/mutations/projects/initialize_product_analytics_spec.rb993ee/spec/requests/api/graphql/project/code_coverage_summary_spec.rb994ee/spec/requests/api/graphql/namespace/projects_spec.rb995ee/spec/controllers/groups/analytics/cycle_analytics_controller_spec.rb996ee/spec/mailers/license_mailer_spec.rb997ee/spec/controllers/groups/roadmap_controller_spec.rb998ee/spec/requests/api/graphql/mutations/epics/add_issue_spec.rb999ee/spec/controllers/admin/geo/nodes_controller_spec.rb1000ee/spec/requests/api/graphql/mutations/security_policy/commit_scan_execution_policy_spec.rb1001ee/spec/requests/api/graphql/mutations/compliance_management/frameworks/create_spec.rb1002ee/spec/requests/api/resource_state_events_spec.rb1003ee/spec/controllers/registrations/verification_controller_spec.rb1004ee/spec/requests/api/graphql/current_user/groups_query_spec.rb1005ee/spec/requests/api/graphql/audit_events/streaming/headers/create_spec.rb1006ee/spec/requests/projects/audit_events_spec.rb1007ee/spec/controllers/admin/audit_logs_controller_spec.rb1008ee/spec/requests/api/graphql/project/dast_scanner_profiles_spec.rb1009ee/spec/controllers/admin/licenses/usage_exports_controller_spec.rb1010ee/spec/requests/api/graphql/project/pipeline/code_quality_reports_spec.rb1011ee/spec/requests/api/graphql/project/pipeline/dast_profile_spec.rb1012ee/spec/requests/api/graphql/mutations/iterations/delete_spec.rb1013ee/spec/requests/api/graphql/ci/minutes/usage_spec.rb1014ee/spec/requests/api/graphql/mutations/releases/create_spec.rb1015ee/spec/requests/projects/pipelines/email_campaigns_controller_spec.rb1016ee/spec/controllers/groups/analytics/repository_analytics_controller_spec.rb1017ee/spec/requests/api/graphql/mutations/dast/profiles/delete_spec.rb1018ee/spec/requests/ee/groups/settings/repository_controller_spec.rb1019ee/spec/requests/api/captcha_check_spec.rb1020ee/spec/requests/api/graphql/project/dast_profile_spec.rb1021ee/spec/controllers/groups/todos_controller_spec.rb1022ee/spec/controllers/projects/incident_management/escalation_policies_controller_spec.rb1023ee/spec/controllers/groups/runners_controller_spec.rb1024ee/spec/controllers/groups/security/dashboard_controller_spec.rb1025ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/create_spec.rb1026ee/spec/requests/api/graphql/vulnerabilities/external_issue_links_spec.rb1027ee/spec/requests/api/helm_packages_spec.rb1028ee/spec/controllers/profiles_controller_spec.rb1029ee/spec/requests/api/graphql/merge_request_reviewer_spec.rb1030ee/spec/requests/api/graphql/mutations/boards/lists/create_spec.rb1031ee/spec/requests/api/graphql/environments/deployments_spec.rb1032ee/spec/controllers/projects/imports_controller_spec.rb1033ee/spec/requests/api/ldap_spec.rb1034ee/spec/requests/api/graphql/project/compliance_frameworks_spec.rb1035ee/spec/requests/api/graphql/mutations/analytics/devops_adoption/enabled_namespaces/enable_spec.rb1036ee/spec/controllers/admin/runners_controller_spec.rb1037ee/spec/requests/api/graphql/mutations/gitlab_subscriptions/activate_spec.rb1038ee/spec/requests/api/rubygem_packages_spec.rb1039ee/spec/requests/projects/insights_controller_spec.rb1040ee/spec/mailers/emails/group_memberships_spec.rb1041ee/spec/requests/api/graphql/mutations/incident_management/issuable_resource_link/destroy_spec.rb1042ee/spec/controllers/ee/groups/variables_controller_spec.rb1043ee/spec/requests/api/graphql/mutations/members/groups/ee/bulk_update_spec.rb1044ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/destroy_spec.rb1045ee/spec/controllers/ee/profiles/preferences_controller_spec.rb1046ee/spec/controllers/concerns/internal_redirect_spec.rb1047ee/spec/requests/api/graphql/analytics/devops_adoption/enabled_namespaces_spec.rb1048ee/spec/requests/admin/impersonation_tokens_controller_spec.rb1049ee/spec/requests/api/search_spec.rb1050Filter specs:1051Running specs:1052Running all node tests without filter1053ee/spec/controllers/projects/merge_requests_controller_spec.rb1054ee/spec/controllers/operations_controller_spec.rb1055ee/spec/requests/api/issues_spec.rb1056ee/spec/requests/api/releases_spec.rb1057ee/spec/requests/api/project_approval_settings_spec.rb1058ee/spec/requests/api/ldap_group_links_spec.rb1059ee/spec/controllers/groups/analytics/cycle_analytics/summary_controller_spec.rb1060ee/spec/controllers/groups/omniauth_callbacks_controller_spec.rb1061ee/spec/requests/api/project_mirror_spec.rb1062ee/spec/requests/lfs_http_spec.rb1063ee/spec/requests/api/project_push_rule_spec.rb1064ee/spec/controllers/subscriptions_controller_spec.rb1065ee/spec/controllers/projects/clusters_controller_spec.rb1066ee/spec/requests/api/vulnerability_exports_spec.rb1067ee/spec/requests/api/graphql/mutations/work_items/update_spec.rb1068ee/spec/controllers/projects/security/vulnerabilities/notes_controller_spec.rb1069ee/spec/controllers/ldap/omniauth_callbacks_controller_spec.rb1070ee/spec/requests/groups/epics_controller_spec.rb1071ee/spec/requests/api/award_emoji_spec.rb1072ee/spec/controllers/projects/protected_environments_controller_spec.rb1073ee/spec/controllers/groups/analytics/tasks_by_type_controller_spec.rb1074ee/spec/controllers/projects/security/vulnerabilities_controller_spec.rb1075ee/spec/requests/api/graphql/group/epic/epic_aggregate_query_spec.rb1076ee/spec/requests/api/graphql/project/pipeline/security_report_summary_spec.rb1077ee/spec/requests/api/project_clusters_spec.rb1078ee/spec/requests/trial_registrations_controller_spec.rb1079ee/spec/requests/api/graphql/boards/boards_query_spec.rb1080ee/spec/requests/api/graphql/boards/board_lists_query_spec.rb1081ee/spec/controllers/projects/deploy_keys_controller_spec.rb1082ee/spec/controllers/concerns/routable_actions_spec.rb1083ee/spec/requests/groups/analytics/dashboards_controller_spec.rb1084ee/spec/requests/api/graphql/mutations/iterations/create_spec.rb1085ee/spec/controllers/ee/sessions_controller_spec.rb1086ee/spec/requests/api/graphql/mutations/requirements_management/update_requirement_spec.rb1087ee/spec/controllers/ee/registrations/welcome_controller_spec.rb1088ee/spec/requests/ee/groups/autocomplete_sources_spec.rb1089ee/spec/requests/api/graphql/mutations/issues/update_spec.rb1090ee/spec/controllers/concerns/ee/routable_actions/sso_enforcement_redirect_spec.rb1091ee/spec/requests/api/graphql/mutations/security/finding/create_merge_request_spec.rb1092ee/spec/requests/api/graphql/iterations/iterations_spec.rb1093ee/spec/requests/jwt_controller_spec.rb1094ee/spec/requests/api/graphql/project/pipeline/security_report_finding_spec.rb1095ee/spec/requests/api/member_roles_spec.rb1096ee/spec/requests/api/graphql/audit_events/streaming/headers/update_spec.rb1097ee/spec/requests/api/graphql/project/branch_protections/unprotect_access_levels_spec.rb1098ee/spec/requests/projects/analytics/dashboards_controller_spec.rb1099ee/spec/requests/api/graphql/mutations/projects/initialize_product_analytics_spec.rb1100ee/spec/requests/api/graphql/project/code_coverage_summary_spec.rb1101ee/spec/requests/api/graphql/namespace/projects_spec.rb1102ee/spec/controllers/groups/analytics/cycle_analytics_controller_spec.rb1103ee/spec/mailers/license_mailer_spec.rb1104ee/spec/controllers/groups/roadmap_controller_spec.rb1105ee/spec/requests/api/graphql/mutations/epics/add_issue_spec.rb1106ee/spec/controllers/admin/geo/nodes_controller_spec.rb1107ee/spec/requests/api/graphql/mutations/security_policy/commit_scan_execution_policy_spec.rb1108ee/spec/requests/api/graphql/mutations/compliance_management/frameworks/create_spec.rb1109ee/spec/requests/api/resource_state_events_spec.rb1110ee/spec/controllers/registrations/verification_controller_spec.rb1111ee/spec/requests/api/graphql/current_user/groups_query_spec.rb1112ee/spec/requests/api/graphql/audit_events/streaming/headers/create_spec.rb1113ee/spec/requests/projects/audit_events_spec.rb1114ee/spec/controllers/admin/audit_logs_controller_spec.rb1115ee/spec/requests/api/graphql/project/dast_scanner_profiles_spec.rb1116ee/spec/controllers/admin/licenses/usage_exports_controller_spec.rb1117ee/spec/requests/api/graphql/project/pipeline/code_quality_reports_spec.rb1118ee/spec/requests/api/graphql/project/pipeline/dast_profile_spec.rb1119ee/spec/requests/api/graphql/mutations/iterations/delete_spec.rb1120ee/spec/requests/api/graphql/ci/minutes/usage_spec.rb1121ee/spec/requests/api/graphql/mutations/releases/create_spec.rb1122ee/spec/requests/projects/pipelines/email_campaigns_controller_spec.rb1123ee/spec/controllers/groups/analytics/repository_analytics_controller_spec.rb1124ee/spec/requests/api/graphql/mutations/dast/profiles/delete_spec.rb1125ee/spec/requests/ee/groups/settings/repository_controller_spec.rb1126ee/spec/requests/api/captcha_check_spec.rb1127ee/spec/requests/api/graphql/project/dast_profile_spec.rb1128ee/spec/controllers/groups/todos_controller_spec.rb1129ee/spec/controllers/projects/incident_management/escalation_policies_controller_spec.rb1130ee/spec/controllers/groups/runners_controller_spec.rb1131ee/spec/controllers/groups/security/dashboard_controller_spec.rb1132ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/create_spec.rb1133ee/spec/requests/api/graphql/vulnerabilities/external_issue_links_spec.rb1134ee/spec/requests/api/helm_packages_spec.rb1135ee/spec/controllers/profiles_controller_spec.rb1136ee/spec/requests/api/graphql/merge_request_reviewer_spec.rb1137ee/spec/requests/api/graphql/mutations/boards/lists/create_spec.rb1138ee/spec/requests/api/graphql/environments/deployments_spec.rb1139ee/spec/controllers/projects/imports_controller_spec.rb1140ee/spec/requests/api/ldap_spec.rb1141ee/spec/requests/api/graphql/project/compliance_frameworks_spec.rb1142ee/spec/requests/api/graphql/mutations/analytics/devops_adoption/enabled_namespaces/enable_spec.rb1143ee/spec/controllers/admin/runners_controller_spec.rb1144ee/spec/requests/api/graphql/mutations/gitlab_subscriptions/activate_spec.rb1145ee/spec/requests/api/rubygem_packages_spec.rb1146ee/spec/requests/projects/insights_controller_spec.rb1147ee/spec/mailers/emails/group_memberships_spec.rb1148ee/spec/requests/api/graphql/mutations/incident_management/issuable_resource_link/destroy_spec.rb1149ee/spec/controllers/ee/groups/variables_controller_spec.rb1150ee/spec/requests/api/graphql/mutations/members/groups/ee/bulk_update_spec.rb1151ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/destroy_spec.rb1152ee/spec/controllers/ee/profiles/preferences_controller_spec.rb1153ee/spec/controllers/concerns/internal_redirect_spec.rb1154ee/spec/requests/api/graphql/analytics/devops_adoption/enabled_namespaces_spec.rb1155ee/spec/requests/admin/impersonation_tokens_controller_spec.rb1156ee/spec/requests/api/search_spec.rb1157Running all node tests without filter1158Running all node tests without filter1159Running command: bundle exec rspec -Ispec -rspec_helper --color --failure-exit-code 1 --error-exit-code 2 --format documentation --format RspecJunitFormatter --out rspec/junit_rspec.xml --tag ~quarantine --tag ~level:background_migration --default-path {ee -- ee/spec/controllers/projects/merge_requests_controller_spec.rb ee/spec/controllers/operations_controller_spec.rb ee/spec/requests/api/issues_spec.rb ee/spec/requests/api/releases_spec.rb ee/spec/requests/api/project_approval_settings_spec.rb ee/spec/requests/api/ldap_group_links_spec.rb ee/spec/controllers/groups/analytics/cycle_analytics/summary_controller_spec.rb ee/spec/controllers/groups/omniauth_callbacks_controller_spec.rb ee/spec/requests/api/project_mirror_spec.rb ee/spec/requests/lfs_http_spec.rb ee/spec/requests/api/project_push_rule_spec.rb ee/spec/controllers/subscriptions_controller_spec.rb ee/spec/controllers/projects/clusters_controller_spec.rb ee/spec/requests/api/vulnerability_exports_spec.rb ee/spec/requests/api/graphql/mutations/work_items/update_spec.rb ee/spec/controllers/projects/security/vulnerabilities/notes_controller_spec.rb ee/spec/controllers/ldap/omniauth_callbacks_controller_spec.rb ee/spec/requests/groups/epics_controller_spec.rb ee/spec/requests/api/award_emoji_spec.rb ee/spec/controllers/projects/protected_environments_controller_spec.rb ee/spec/controllers/groups/analytics/tasks_by_type_controller_spec.rb ee/spec/controllers/projects/security/vulnerabilities_controller_spec.rb ee/spec/requests/api/graphql/group/epic/epic_aggregate_query_spec.rb ee/spec/requests/api/graphql/project/pipeline/security_report_summary_spec.rb ee/spec/requests/api/project_clusters_spec.rb ee/spec/requests/trial_registrations_controller_spec.rb ee/spec/requests/api/graphql/boards/boards_query_spec.rb ee/spec/requests/api/graphql/boards/board_lists_query_spec.rb ee/spec/controllers/projects/deploy_keys_controller_spec.rb ee/spec/controllers/concerns/routable_actions_spec.rb ee/spec/requests/groups/analytics/dashboards_controller_spec.rb ee/spec/requests/api/graphql/mutations/iterations/create_spec.rb ee/spec/controllers/ee/sessions_controller_spec.rb ee/spec/requests/api/graphql/mutations/requirements_management/update_requirement_spec.rb ee/spec/controllers/ee/registrations/welcome_controller_spec.rb ee/spec/requests/ee/groups/autocomplete_sources_spec.rb ee/spec/requests/api/graphql/mutations/issues/update_spec.rb ee/spec/controllers/concerns/ee/routable_actions/sso_enforcement_redirect_spec.rb ee/spec/requests/api/graphql/mutations/security/finding/create_merge_request_spec.rb ee/spec/requests/api/graphql/iterations/iterations_spec.rb ee/spec/requests/jwt_controller_spec.rb ee/spec/requests/api/graphql/project/pipeline/security_report_finding_spec.rb ee/spec/requests/api/member_roles_spec.rb ee/spec/requests/api/graphql/audit_events/streaming/headers/update_spec.rb ee/spec/requests/api/graphql/project/branch_protections/unprotect_access_levels_spec.rb ee/spec/requests/projects/analytics/dashboards_controller_spec.rb ee/spec/requests/api/graphql/mutations/projects/initialize_product_analytics_spec.rb ee/spec/requests/api/graphql/project/code_coverage_summary_spec.rb ee/spec/requests/api/graphql/namespace/projects_spec.rb ee/spec/controllers/groups/analytics/cycle_analytics_controller_spec.rb ee/spec/mailers/license_mailer_spec.rb ee/spec/controllers/groups/roadmap_controller_spec.rb ee/spec/requests/api/graphql/mutations/epics/add_issue_spec.rb ee/spec/controllers/admin/geo/nodes_controller_spec.rb ee/spec/requests/api/graphql/mutations/security_policy/commit_scan_execution_policy_spec.rb ee/spec/requests/api/graphql/mutations/compliance_management/frameworks/create_spec.rb ee/spec/requests/api/resource_state_events_spec.rb ee/spec/controllers/registrations/verification_controller_spec.rb ee/spec/requests/api/graphql/current_user/groups_query_spec.rb ee/spec/requests/api/graphql/audit_events/streaming/headers/create_spec.rb ee/spec/requests/projects/audit_events_spec.rb ee/spec/controllers/admin/audit_logs_controller_spec.rb ee/spec/requests/api/graphql/project/dast_scanner_profiles_spec.rb ee/spec/controllers/admin/licenses/usage_exports_controller_spec.rb ee/spec/requests/api/graphql/project/pipeline/code_quality_reports_spec.rb ee/spec/requests/api/graphql/project/pipeline/dast_profile_spec.rb ee/spec/requests/api/graphql/mutations/iterations/delete_spec.rb ee/spec/requests/api/graphql/ci/minutes/usage_spec.rb ee/spec/requests/api/graphql/mutations/releases/create_spec.rb ee/spec/requests/projects/pipelines/email_campaigns_controller_spec.rb ee/spec/controllers/groups/analytics/repository_analytics_controller_spec.rb ee/spec/requests/api/graphql/mutations/dast/profiles/delete_spec.rb ee/spec/requests/ee/groups/settings/repository_controller_spec.rb ee/spec/requests/api/captcha_check_spec.rb ee/spec/requests/api/graphql/project/dast_profile_spec.rb ee/spec/controllers/groups/todos_controller_spec.rb ee/spec/controllers/projects/incident_management/escalation_policies_controller_spec.rb ee/spec/controllers/groups/runners_controller_spec.rb ee/spec/controllers/groups/security/dashboard_controller_spec.rb ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/create_spec.rb ee/spec/requests/api/graphql/vulnerabilities/external_issue_links_spec.rb ee/spec/requests/api/helm_packages_spec.rb ee/spec/controllers/profiles_controller_spec.rb ee/spec/requests/api/graphql/merge_request_reviewer_spec.rb ee/spec/requests/api/graphql/mutations/boards/lists/create_spec.rb ee/spec/requests/api/graphql/environments/deployments_spec.rb ee/spec/controllers/projects/imports_controller_spec.rb ee/spec/requests/api/ldap_spec.rb ee/spec/requests/api/graphql/project/compliance_frameworks_spec.rb ee/spec/requests/api/graphql/mutations/analytics/devops_adoption/enabled_namespaces/enable_spec.rb ee/spec/controllers/admin/runners_controller_spec.rb ee/spec/requests/api/graphql/mutations/gitlab_subscriptions/activate_spec.rb ee/spec/requests/api/rubygem_packages_spec.rb ee/spec/requests/projects/insights_controller_spec.rb ee/spec/mailers/emails/group_memberships_spec.rb ee/spec/requests/api/graphql/mutations/incident_management/issuable_resource_link/destroy_spec.rb ee/spec/controllers/ee/groups/variables_controller_spec.rb ee/spec/requests/api/graphql/mutations/members/groups/ee/bulk_update_spec.rb ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/destroy_spec.rb ee/spec/controllers/ee/profiles/preferences_controller_spec.rb ee/spec/controllers/concerns/internal_redirect_spec.rb ee/spec/requests/api/graphql/analytics/devops_adoption/enabled_namespaces_spec.rb ee/spec/requests/admin/impersonation_tokens_controller_spec.rb ee/spec/requests/api/search_spec.rbKnapsack report generator started!1160Run options: exclude {:quarantine=>true, :level=>"background_migration"}1161Test environment set up in 0.728765463 seconds1162Projects::MergeRequestsController1163 PUT update1164 when the merge request requires approval1165 behaves like update invalid issuable1166 when updating causes conflicts1167 renders edit when format is html1168 renders json error message when format is json1169 when updating an invalid issuable1170 renders edit when merge request is invalid1171 overriding approvers per MR1172 enabled1173 updates approvals1174 does not allow approvels before merge lower than the project setting1175 creates rules1176 disabled1177 does not update approvals_before_merge1178 does not update approver_ids1179 does not update approver_group_ids1180 does not create approval rules1181 when the MR targets the project1182 behaves like approvals_before_merge param1183 approvals_before_merge not set for the existing MR1184 when it is less than the one in the target project1185 sets the param to the sames as the project1186 updates the merge request1187 when it is equal to the one in the target project1188 sets the param to the same as the project1189 updates the merge request1190 when it is greater than the one in the target project1191 saves the param in the merge request1192 updates the merge request1193 approvals_before_merge set for the existing MR1194 when it is not set1195 does not change the merge request1196 updates the merge request1197 when it is less than the one in the target project1198 sets the param to the same as the target project1199 updates the merge request1200 when it is equal to the one in the target project1201 sets the param to the same as the target project1202 updates the merge request1203 when it is greater than the one in the target project1204 saves the param in the merge request1205 updates the merge request1206 when the project is a fork1207 when the MR target upstream1208 behaves like approvals_before_merge param1209 approvals_before_merge not set for the existing MR1210 when it is less than the one in the target project1211 sets the param to the sames as the project1212 updates the merge request1213 when it is equal to the one in the target project1214 sets the param to the same as the project1215 updates the merge request1216 when it is greater than the one in the target project1217 saves the param in the merge request1218 updates the merge request1219 approvals_before_merge set for the existing MR1220 when it is not set1221 does not change the merge request1222 updates the merge request1223 when it is less than the one in the target project1224 sets the param to the same as the target project1225 updates the merge request1226 when it is equal to the one in the target project1227 sets the param to the same as the target project1228 updates the merge request1229 when it is greater than the one in the target project1230 saves the param in the merge request1231 updates the merge request1232 when the MR target the fork1233 behaves like approvals_before_merge param1234 approvals_before_merge not set for the existing MR1235 when it is less than the one in the target project1236 sets the param to the sames as the project1237 updates the merge request1238 when it is equal to the one in the target project1239 sets the param to the same as the project1240 updates the merge request1241 when it is greater than the one in the target project1242 saves the param in the merge request1243 updates the merge request1244 approvals_before_merge set for the existing MR1245 when it is not set1246 does not change the merge request1247 updates the merge request1248 when it is less than the one in the target project1249 sets the param to the same as the target project1250 updates the merge request1251 when it is equal to the one in the target project1252 sets the param to the same as the target project1253 updates the merge request1254 when it is greater than the one in the target project1255 saves the param in the merge request1256 updates the merge request1257 POST #rebase1258 approvals pending1259 returns 2001260 GET #edit1261 default templates1262 when a merge request description has content1263 does not select a default template1264 when a merge request description is blank1265 when a default template does not exist in the repository1266 does not select a default template1267 when a default template exists in the repository1268 does not select a default template1269 GET #dependency_scanning_reports1270 behaves like pending pipeline response1271 when pipeline is pending1272 sends polling interval1273 returns 204 HTTP status1274 behaves like comparable report1275 when comparison is being processed1276 sends polling interval1277 returns 204 HTTP status1278 when comparison is done1279 does not send polling interval1280 returns 200 HTTP status1281 when user created corrupted reports1282 does not send polling interval1283 returns 400 HTTP status1284 behaves like authorize read pipeline1285 public project with private builds1286 restricts access to signed out users1287 restricts access to other users1288 GET #container_scanning_reports1289 behaves like pending pipeline response1290 when pipeline is pending1291 sends polling interval1292 returns 204 HTTP status1293 behaves like comparable report1294 when comparison is being processed1295 sends polling interval1296 returns 204 HTTP status1297 when comparison is done1298 does not send polling interval1299 returns 200 HTTP status1300 when user created corrupted reports1301 does not send polling interval1302 returns 400 HTTP status1303 behaves like authorize read pipeline1304 public project with private builds1305 restricts access to signed out users1306 restricts access to other users1307 GET #sast_reports1308 behaves like pending pipeline response1309 when pipeline is pending1310 sends polling interval1311 returns 204 HTTP status1312 behaves like comparable report1313 when comparison is being processed1314 sends polling interval1315 returns 204 HTTP status1316 when comparison is done1317 does not send polling interval1318 returns 200 HTTP status1319 when user created corrupted reports1320 does not send polling interval1321 returns 400 HTTP status1322 behaves like authorize read pipeline1323 public project with private builds1324 restricts access to signed out users1325 restricts access to other users1326 GET #coverage_fuzzing_reports1327 behaves like pending pipeline response1328 when pipeline is pending1329 sends polling interval1330 returns 204 HTTP status1331 behaves like comparable report1332 when comparison is being processed1333 sends polling interval1334 returns 204 HTTP status1335 when comparison is done1336 does not send polling interval1337 returns 200 HTTP status1338 when user created corrupted reports1339 does not send polling interval1340 returns 400 HTTP status1341 behaves like authorize read pipeline1342 public project with private builds1343 restricts access to signed out users1344 restricts access to other users1345 GET #api_fuzzing_reports1346 behaves like pending pipeline response1347 when pipeline is pending1348 sends polling interval1349 returns 204 HTTP status1350 behaves like comparable report1351 when comparison is being processed1352 sends polling interval1353 returns 204 HTTP status1354 when comparison is done1355 does not send polling interval1356 returns 200 HTTP status1357 when user created corrupted reports1358 does not send polling interval1359 returns 400 HTTP status1360 behaves like authorize read pipeline1361 public project with private builds1362 restricts access to signed out users1363 restricts access to other users1364 GET #secret_detection_reports1365 behaves like pending pipeline response1366 when pipeline is pending1367 sends polling interval1368 returns 204 HTTP status1369 behaves like comparable report1370 when comparison is being processed1371 sends polling interval1372 returns 204 HTTP status1373 when comparison is done1374 does not send polling interval1375 returns 200 HTTP status1376 when user created corrupted reports1377 does not send polling interval1378 returns 400 HTTP status1379 behaves like authorize read pipeline1380 public project with private builds1381 restricts access to signed out users1382 restricts access to other users1383 GET #dast_reports1384 behaves like pending pipeline response1385 when pipeline is pending1386 sends polling interval1387 returns 204 HTTP status1388 behaves like comparable report1389 when comparison is being processed1390 sends polling interval1391 returns 204 HTTP status1392 when comparison is done1393 does not send polling interval1394 returns 200 HTTP status1395 when user created corrupted reports1396 does not send polling interval1397 returns 400 HTTP status1398 behaves like authorize read pipeline1399 public project with private builds1400 restricts access to signed out users1401 restricts access to other users1402 GET #license_scanning_reports1403 when the license_scanning_sbom_scanner feature flag is false1404 behaves like license scanning report comparison1405 when the report is being parsed1406 returns 204 HTTP status1407 when comparison is being processed1408 sends polling interval1409 returns 204 HTTP status1410 when comparison is done1411 does not send polling interval1412 returns 200 HTTP status1413 when user created corrupted test reports1414 does not send polling interval1415 returns 400 HTTP status1416 when a user is authorized to read the licenses1417 returns 200 HTTP status1418 when license_scanning feature is disabled1419 returns 404 status1420 behaves like authorize read pipeline1421 public project with private builds1422 restricts access to signed out users1423 restricts access to other users1424 when the license_scanning_sbom_scanner feature flag is true1425 behaves like license scanning report comparison1426 when the report is being parsed1427 returns 204 HTTP status1428 when comparison is being processed1429 sends polling interval1430 returns 204 HTTP status1431 when comparison is done1432 does not send polling interval1433 returns 200 HTTP status1434 when user created corrupted test reports1435 does not send polling interval1436 returns 400 HTTP status1437 when a user is authorized to read the licenses1438 returns 200 HTTP status1439 when license_scanning feature is disabled1440 returns 404 status1441 behaves like authorize read pipeline1442 public project with private builds1443 restricts access to signed out users1444 restricts access to other users1445 GET #license_scanning_reports_collapsed1446 when the license_scanning_sbom_scanner feature flag is false1447 behaves like license scanning report comparison1448 when the report is being parsed1449 returns 204 HTTP status1450 when comparison is being processed1451 sends polling interval1452 returns 204 HTTP status1453 when comparison is done1454 does not send polling interval1455 returns 200 HTTP status1456 when user created corrupted test reports1457 does not send polling interval1458 returns 400 HTTP status1459 when a user is authorized to read the licenses1460 returns 200 HTTP status1461 when license_scanning feature is disabled1462 returns 404 status1463 behaves like authorize read pipeline1464 public project with private builds1465 restricts access to signed out users1466 restricts access to other users1467 when the license_scanning_sbom_scanner feature flag is true1468 behaves like license scanning report comparison1469 when the report is being parsed1470 returns 204 HTTP status1471 when comparison is being processed1472 sends polling interval1473 returns 204 HTTP status1474 when comparison is done1475 does not send polling interval1476 returns 200 HTTP status1477 when user created corrupted test reports1478 does not send polling interval1479 returns 400 HTTP status1480 when a user is authorized to read the licenses1481 returns 200 HTTP status1482 when license_scanning feature is disabled1483 returns 404 status1484 behaves like authorize read pipeline1485 public project with private builds1486 restricts access to signed out users1487 restricts access to other users1488 GET #metrics_reports1489 behaves like comparable report1490 when comparison is being processed1491 sends polling interval1492 returns 204 HTTP status1493 when comparison is done1494 does not send polling interval1495 returns 200 HTTP status1496 when user created corrupted reports1497 does not send polling interval1498 returns 400 HTTP status1499 behaves like authorize read pipeline1500 public project with private builds1501 restricts access to signed out users1502 restricts access to other users1503 behaves like DescriptionDiffActions1505 when license is available1506 GET description_diff1507 returns the diff with the previous version1508 returns the diff with the previous version of the specified start_version_id1509 when description version is from another issuable1510 returns 4041511 when start_version_id is from another issuable1512 returns 4041513 when start_version_id is deleted1514 returns 4041515 when description version is deleted1516 returns 4041517 DELETE description_diff1518 returns 2001519 when start_version_id is present1520 returns 2001521 when version is already deleted1522 returns 4041523 when user cannot admin issuable1524 returns 4041525 when license is not available1526 GET description_diff1527 returns 4041528 DELETE description_diff1529 returns 4041530OperationsController1531 GET #index1532 format html1533 renders index with 200 status code1534 behaves like unlicensed1535 renders 4041536 with an anonymous user1537 redirects to sign-in page1538 format json1539 behaves like unlicensed1540 renders 4041541 with added projects1542 returns a list of added projects1543 returns as many projects as are in the user's dashboard1544 returns a list of added projects1545 without sufficient access level1546 behaves like empty project list1547 returns an empty list1548 without projects1549 behaves like empty project list1550 returns an empty list1551 with an anonymous user1552 returns unauthorized response1553 GET #environments1554 format html1555 renders the view1556 behaves like unlicensed1557 renders 4041558 with an anonymous user1559 redirects to sign-in page1560 format json1561 behaves like unlicensed1562 renders 4041563 with an anonymous user1564 returns unauthorized response1565 with an authenticated user without sufficient access_level1566 returns an empty project list1567 with an authenticated developer1568 returns an empty project list1569 sets the polling interval header1570 returns an empty project list when the project is not in the developer's dashboard1571 with a project in the dashboard1572 returns a project without an environment1573 returns one project with one environment1574 returns multiple projects and environments1575 does not make N+1 queries with multiple environments1576 does not return environments that would be grouped into a folder1577 does not return environments that would be grouped into a folder even when there is only a single environment1578 returns an environment not in a folder1579 returns the last deployment for an environment1580 returns the last deployment's deployable1581 returns a failed deployment1582 does not return a project for which the operations dashboard feature is unavailable1583 returns seven projects when some projects do not have the dashboard feature available1584 returns a maximum of three environments for a project1585 returns a maximum of three environments for multiple projects1586 with environments pagination1587 pagination behaviour1588 with `per_page`1589 behaves like environments pagination1590 is expected to include pagination headers1591 with `page=1`1592 behaves like environments pagination1593 is expected to include pagination headers1594 with `page=2`1595 behaves like environments pagination1596 is expected to include pagination headers1597 N+1 queries1598 avoids N+1 database queries1599 with a pipeline1600 returns the last pipeline for an environment1601 returns the last pipeline details1602 returns an upstream pipeline1603 returns a downstream pipeline1604 POST #create1605 format json1606 behaves like unlicensed1607 renders 4041608 without added projects1609 adds projects to the dashboard1610 cannot add a project twice1611 does not add invalid project ids1612 with added project1613 does not add already added project1614 with an anonymous user1615 redirects to sign-in page1616 DELETE #destroy1617 behaves like unlicensed1618 renders 4041619 with added projects1620 removes a project successfully1621 without projects1622 cannot remove invalid project1623 with an anonymous user1624 redirects to sign-in page1625API::Issues1626 GET /issues1627 when authenticated1628 matches V4 response schema1629 blocking issues count1630 returns a blocking issues count of 0 if there are no blocking issues1631 returns a blocking issues count of 1 if there exists a blocking issue1632 filtering by weight1633 returns issues with specific weight1634 returns issues with no weight1635 returns issues with any weight1636 returns issues without specific weight1637 filtering by health status1638 returns issues with specific health_status1639 returns issues with any health_status1640 returns issues with no health_status1641 returns bad request when unsupported value is supplied1642 filtering by assignee_username1643 returns issues with multiple assignees1644 behaves like filtering by epic_id1645 returns issues without epic when epic_id is "None"1646 returns issues with any epic when epic_id is "Any"1647 returns issues with any epic when epic_id is specific1648 filtering by iteration1649 returns issues with specific iteration1650 returns issues with no iteration1651 returns issues with any iteration1652 returns no issues on user dashboard issues list1653 returns issues with a specific iteration title1654 GET /groups/:id/issues1655 avoids N+1 queries with epics1656 avoids N+1 queries with iterations1657 filtering by assignee_username1658 returns issues with multiple assignees1659 behaves like filtering by epic_id1660 returns issues without epic when epic_id is "None"1661 returns issues with any epic when epic_id is "Any"1662 returns issues with any epic when epic_id is specific1663 behaves like exposes epic1664 with epics feature1665 contains epic_iid in response1666 contains epic in response1667 and epic issue is not present1668 exposes epic as nil1669 without epics feature1670 does not contain epic_iid in response1671 does not contain epic_iid in response1672 behaves like exposes iteration1673 with iteration feature1674 contains iteration in response1675 without iterations feature1676 does not contain iteration in response1677 filtering by iteration1678 returns issues with Current iteration1679 GET /projects/:id/issues1680 filtering by assignee_username1681 returns issues with multiple assignees1682 behaves like filtering by epic_id1683 returns issues without epic when epic_id is "None"1684 returns issues with any epic when epic_id is "Any"1685 returns issues with any epic when epic_id is specific1686 on personal project1687 does not contain epic_iid in response1688 on group project1689 behaves like exposes epic1690 with epics feature1691 contains epic_iid in response1692 contains epic in response1693 and epic issue is not present1694 exposes epic as nil1695 without epics feature1696 does not contain epic_iid in response1697 does not contain epic_iid in response1698 behaves like exposes iteration1699 with iteration feature1700 contains iteration in response1701 without iterations feature1702 does not contain iteration in response1703 filtering by iteration1704 returns issues with Current iteration1705 GET /project/:id/issues/:issue_id1706 on personal project1707 does not contain epic_iid in response1708 on group project1709 behaves like exposes epic1710 with epics feature1711 contains epic_iid in response1712 contains epic in response1713 and epic issue is not present1714 exposes epic as nil1715 without epics feature1716 does not contain epic_iid in response1717 does not contain epic_iid in response1718 when specificied issue is of type task1719 returns a not found status code1720 POST /projects/:id/issues1721 creates a new project issue1722 does not allow the creation of an issue of type task1723 behaves like with epic parameter1724 for a group project1725 with epics feature1726 when user can read epics1727 with epic_id parameter1728 sets epic on issue1729 with deprecated epic_iid parameter1730 sets epic on issue1731 when user can not read the epic1732 does not set the epic1733 when user can not admin_issue_relation for the issue1734 returns an error1735 without epics feature1736 does not set epic on issue1737 when both epic_id and epic_iid is used1738 returns an error1739 for a user project1740 does not set epic on issue1741 PUT /projects/:id/issues/:issue_iid to update weight1742 updates an issue with no weight1743 removes a weight from an issue1744 returns 400 if weight is less than minimum weight1745 creates a ResourceWeightEvent1746 does not create a system note1747 adds a note when the weight is changed1748 issuable weights unlicensed1749 ignores the update1750 PUT /projects/:id/issues/:issue_iid to update epic1751 behaves like with epic parameter1752 for a group project1753 with epics feature1754 when user can read epics1755 with epic_id parameter1756 sets epic on issue1757 with deprecated epic_iid parameter1758 sets epic on issue1759 when user can not read the epic1760 does not set the epic1761 when user can not admin_issue_relation for the issue1762 returns an error1763 without epics feature1764 does not set epic on issue1765 when both epic_id and epic_iid is used1766 returns an error1767 for a user project1768 does not set epic on issue1769 PUT /projects/:id/issues/:issue_iid/metric_images/authorize1770 authorizes uploading with workhorse header1771 rejects requests that bypassed gitlab-workhorse1772 when using remote storage1773 when direct upload is enabled1774 responds with status 200, location of file remote store and object details1775 when direct upload is disabled1776 handles as a local file1777 POST /projects/:id/issues/:issue_iid/metric_images1778 user_role: :guest, own_issue: true, expected_status: :unauthorized_upload1779 behaves like unauthorized_upload1780 disallows the upload1781 user_role: :guest, own_issue: false, expected_status: :unauthorized_upload1782 behaves like unauthorized_upload1783 disallows the upload1784 user_role: :reporter, own_issue: true, expected_status: :can_upload_metric_image1785 behaves like can_upload_metric_image1786 creates a new metric image1787 user_role: :reporter, own_issue: false, expected_status: :can_upload_metric_image1788 behaves like can_upload_metric_image1789 creates a new metric image1790 file size too large1791 returns an error1792 object storage enabled1793 uploads to remote storage1794 behaves like can_upload_metric_image1795 creates a new metric image1796 GET /projects/:id/issues/:issue_iid/metric_images1797 user_role: :not_member, own_issue: false, issue_confidential: false, expected_status: :unauthorized_read1798 behaves like unauthorized_read1799 cannot read the metric images1800 user_role: :guest, own_issue: false, issue_confidential: true, expected_status: :unauthorized_read1801 behaves like unauthorized_read1802 cannot read the metric images1803 user_role: :guest, own_issue: true, issue_confidential: false, expected_status: :can_read_metric_image1804 behaves like can_read_metric_image1805 can read the metric images1806 user_role: :guest, own_issue: false, issue_confidential: false, expected_status: :can_read_metric_image1807 behaves like can_read_metric_image1808 can read the metric images1809 user_role: :reporter, own_issue: true, issue_confidential: false, expected_status: :can_read_metric_image1810 behaves like can_read_metric_image1811 can read the metric images1812 user_role: :reporter, own_issue: false, issue_confidential: false, expected_status: :can_read_metric_image1813 behaves like can_read_metric_image1814 can read the metric images1815 PUT /projects/:id/issues/:issue_iid/metric_images/:metric_image_id1816 user_role: :not_member, own_issue: false, issue_confidential: false, expected_status: :unauthorized_update1817 behaves like unauthorized_update1818 cannot delete the metric image1819 user_role: :not_member, own_issue: true, issue_confidential: false, expected_status: :unauthorized_update1820 behaves like unauthorized_update1821 cannot delete the metric image1822 user_role: :not_member, own_issue: true, issue_confidential: true, expected_status: :unauthorized_update1823 behaves like unauthorized_update1824 cannot delete the metric image1825 user_role: :guest, own_issue: false, issue_confidential: true, expected_status: :not_found1826 behaves like not_found1827 cannot delete the metric image1828 user_role: :guest, own_issue: false, issue_confidential: false, expected_status: :unauthorized_update1829 behaves like unauthorized_update1830 cannot delete the metric image1831 user_role: :guest, own_issue: true, issue_confidential: false, expected_status: :can_update_metric_image1832 behaves like can_update_metric_image1833 can update the metric images1834 user_role: :reporter, own_issue: true, issue_confidential: false, expected_status: :can_update_metric_image1835 behaves like can_update_metric_image1836 can update the metric images1837 user_role: :reporter, own_issue: false, issue_confidential: false, expected_status: :can_update_metric_image1838 behaves like can_update_metric_image1839 can update the metric images1840 user has access1841 metric image not found1842 returns an error1843 metric image cannot be updated1844 returns an error1845 DELETE /projects/:id/issues/:issue_iid/metric_images/:metric_image_id1846 user_role: :not_member, own_issue: false, issue_confidential: false, expected_status: :unauthorized_delete1847 behaves like unauthorized_delete1848 cannot delete the metric image1849 user_role: :not_member, own_issue: true, issue_confidential: false, expected_status: :unauthorized_delete1850 behaves like unauthorized_delete1851 cannot delete the metric image1852 user_role: :not_member, own_issue: true, issue_confidential: true, expected_status: :unauthorized_delete1853 behaves like unauthorized_delete1854 cannot delete the metric image1855 user_role: :guest, own_issue: false, issue_confidential: true, expected_status: :not_found1856 behaves like not_found1857 cannot delete the metric image1858 user_role: :guest, own_issue: false, issue_confidential: false, expected_status: :unauthorized_delete1859 behaves like unauthorized_delete1860 cannot delete the metric image1861 user_role: :guest, own_issue: true, issue_confidential: false, expected_status: :can_delete_metric_image1862 behaves like can_delete_metric_image1863 can delete the metric images1864 user_role: :reporter, own_issue: true, issue_confidential: false, expected_status: :can_delete_metric_image1865 behaves like can_delete_metric_image1866 can delete the metric images1867 user_role: :reporter, own_issue: false, issue_confidential: false, expected_status: :can_delete_metric_image1868 behaves like can_delete_metric_image1869 can delete the metric images1870 user has access1871 metric image not found1872 returns an error1873API::Releases1874 POST /projects/:id/releases1875 updates the AuditEvent1876 without milestone1877 with milestone1878 is expected to include {:custom_message => "Created Release v0.1 with Milestone v1.0", :target_type => "Release", :target_id => 2, :target_details => "New release"}1879 with a group milestone1880 succesfully adds a group milestone1881 adds the milestone1882 fails to add a group milestone if project does not belong to this group1883 returns a 400 error as milestone not found1884 when valid group and project milestones are passed1885 adds the milestone1886 with a supergroup milestone1887 returns a 400 error as milestone not found1888 PUT /projects/:id/releases/:tag_name1889 creates an AuditEvent when a release is updated1890 with milestones1891 no existing milestones1892 add single milestone1893 behaves like update with milestones1894 is expected to eq "Milestones associated with release changed to v1.0"1895 add multiple milestones1896 behaves like update with milestones1897 is expected to eq "Milestones associated with release changed to v1.0, v2.0"1898 existing milestone1899 add milestone1900 behaves like update with milestones1901 is expected to eq "Milestones associated with release changed to v0.1, v1.0"1902 replace milestone1903 behaves like update with milestones1904 is expected to eq "Milestones associated with release changed to v1.0"1905 remove all milestones1906 behaves like update with milestones1907 is expected to eq "Milestones associated with release changed to [none]"1908 with group milestones1909 when a group milestone is passed1910 when there is no project milestone1911 adds the group milestone1912 when there is an existing project milestone1913 replaces the project milestone with the group milestone1914 POST /projects/:id/releases/:tag_name/evidence1915 accepts the request1916 accepts the request when using JOB-TOKEN auth1917 creates the Evidence1918 when tag_name is invalid1919 returns a 4041920 when user is a reporter1921 forbids the request1922 when user is a developer1923 accepts the request1924 when user is not a project member1925 forbids the request1926 when project is public1927 forbids the request1928 DELETE /projects/:id/releases/:tag_name1929 creates an AuditEvent when a release is deleted1930API::ProjectApprovalSettings1931 GET /projects/:id/approval_settings1932 when the request is correct1933 matches the response schema1934 when target_branch is specified1935 filters the rules returned by target branch1936 private group filtering1937 excludes private groups if user has no access1938 includes private groups if user has access1939 report_approver rules1940 includes report_approver rules1941 when project is archived1942 when user has normal permissions1943 returns 4031944 when user has project admin permissions1945 allows access1946 POST /projects/:id/approval_settings/rules1947 behaves like an API endpoint for creating project approval rule1948 behaves like a restricted project approval rule API endpoint1949 when admin_merge_request_approvers_rules license feature is disabled1950 when disable_overriding_approvers_per_merge_request app setting is false1951 behaves like a user with access1952 returns 201 status1953 when disable_overriding_approvers_per_merge_request app setting is true1954 behaves like a user with access1955 returns 201 status1956 when admin_merge_request_approvers_rules license feature is enabled1957 when disable_overriding_approvers_per_merge_request app setting is false1958 behaves like a user with access1959 returns 201 status1960 when disable_overriding_approvers_per_merge_request app setting is true1961 behaves like a user without access1962 returns 4031963 when user is an admin1964 behaves like a user with access1965 returns 201 status1966 when missing parameters1967 returns 400 status1968 when user is without access1969 behaves like a user without access1970 returns 4031971 when the request is correct1972 changes settings properly1973 behaves like a user with access1974 returns 201 status1975 when protected_branch_ids param is present1976 creates approval rule associated to specified protected branches1977 when applies_to_all_protected_branches param is present1978 returns a list of project protected branches in the response1979 with rule_type set to report_approver1980 without report_type1981 returns a error http status1982 when creating a approval rule for each report_type1983 rule_name: "License-Check", report_type: :license_scanning1984 specifies `report_rule` and `report_type`1985 rule_name: "Coverage-Check", report_type: :code_coverage1986 specifies `report_rule` and `report_type`1987 with valid scanners1988 returns 201 status1989 with valid severity_levels1990 returns 201 status1991 with username1992 returns 201 status1993 with vulnerabilities_allowed1994 returns 201 status1995 PUT /projects/:id/approval_settings/:approval_rule_id1996 behaves like an API endpoint for updating project approval rule1997 behaves like a restricted project approval rule API endpoint1998 when admin_merge_request_approvers_rules license feature is disabled1999 when disable_overriding_approvers_per_merge_request app setting is false2000 behaves like a user with access2001 sets approvers2002 when applies_to_all_protected_branches param is present2003 returns a list of project protected branches in the response2004 when protected_branch_ids param is present2005 associates approval rule to specified protected branches2006 with valid scanners2007 returns 200 status2008 with nil scanners2009 returns 200 status2010 when scanners is NULL in the database2011 returns 200 status2012 with valid severity_levels2013 returns 200 status2014 when approver already exists2015 when sending json data2016 removes all approvers if empty params are given2017 with vulnerabilities_allowed2018 returns 200 status2019 when disable_overriding_approvers_per_merge_request app setting is true2020 behaves like a user with access2021 sets approvers2022 when applies_to_all_protected_branches param is present2023 returns a list of project protected branches in the response2024 when protected_branch_ids param is present2025 associates approval rule to specified protected branches2026 with valid scanners2027 returns 200 status2028 with nil scanners2029 returns 200 status2030 when scanners is NULL in the database2031 returns 200 status2032 with valid severity_levels2033 returns 200 status2034 when approver already exists2035 when sending json data2036 removes all approvers if empty params are given2037 with vulnerabilities_allowed2038 returns 200 status2039 when admin_merge_request_approvers_rules license feature is enabled2040 when disable_overriding_approvers_per_merge_request app setting is false2041 behaves like a user with access2042 sets approvers2043 when applies_to_all_protected_branches param is present2044 returns a list of project protected branches in the response2045 when protected_branch_ids param is present2046 associates approval rule to specified protected branches2047 with valid scanners2048 returns 200 status2049 with nil scanners2050 returns 200 status2051 when scanners is NULL in the database2052 returns 200 status2053 with valid severity_levels2054 returns 200 status2055 when approver already exists2056 when sending json data2057 removes all approvers if empty params are given2058 with vulnerabilities_allowed2059 returns 200 status2060 when disable_overriding_approvers_per_merge_request app setting is true2061 behaves like a user without access2062 returns 4032063 when user is an admin2064 behaves like a user with access2065 sets approvers2066 when applies_to_all_protected_branches param is present2067 returns a list of project protected branches in the response2068 when protected_branch_ids param is present2069 associates approval rule to specified protected branches2070 with valid scanners2071 returns 200 status2072 with nil scanners2073 returns 200 status2074 when scanners is NULL in the database2075 returns 200 status2076 with valid severity_levels2077 returns 200 status2078 when approver already exists2079 when sending json data2080 removes all approvers if empty params are given2081 with vulnerabilities_allowed2082 returns 200 status2083 as a project admin2084 behaves like a user with access2085 sets approvers2086 when applies_to_all_protected_branches param is present2087 returns a list of project protected branches in the response2088 when protected_branch_ids param is present2089 associates approval rule to specified protected branches2090 with valid scanners2091 returns 200 status2092 with nil scanners2093 returns 200 status2094 when scanners is NULL in the database2095 returns 200 status2096 with valid severity_levels2097 returns 200 status2098 when approver already exists2099 when sending json data2100 removes all approvers if empty params are given2101 with vulnerabilities_allowed2102 returns 200 status2103 as a global admin2104 behaves like a user with access2105 sets approvers2106 when applies_to_all_protected_branches param is present2107 returns a list of project protected branches in the response2108 when protected_branch_ids param is present2109 associates approval rule to specified protected branches2110 with valid scanners2111 returns 200 status2112 with nil scanners2113 returns 200 status2114 when scanners is NULL in the database2115 returns 200 status2116 with valid severity_levels2117 returns 200 status2118 when approver already exists2119 when sending json data2120 removes all approvers if empty params are given2121 with vulnerabilities_allowed2122 returns 200 status2123 as a random user2124 behaves like a user without access2125 returns 4032126 DELETE /projects/:id/approval_settings/rules/:approval_rule_id2127 behaves like an API endpoint for deleting project approval rule2128 behaves like a user with access2129 destroys2130 behaves like a restricted project approval rule API endpoint2131 when admin_merge_request_approvers_rules license feature is disabled2132 when disable_overriding_approvers_per_merge_request app setting is false2133 behaves like a user with access2134 destroys2135 when disable_overriding_approvers_per_merge_request app setting is true2136 behaves like a user with access2137 destroys2138 when admin_merge_request_approvers_rules license feature is enabled2139 when disable_overriding_approvers_per_merge_request app setting is false2140 behaves like a user with access2141 destroys2142 when disable_overriding_approvers_per_merge_request app setting is true2143 behaves like a user without access2144 returns 4032145 when user is an admin2146 behaves like a user with access2147 destroys2148 when approval rule not found2149 returns not found2150 when user is not eligible to delete2151 behaves like a user without access2152 returns 4032153API::LdapGroupLinks2154 GET /groups/:id/ldap_group_links2155 when unauthenticated2156 returns authentication error2157 when a less priviledged user2158 returns forbidden2159 when owner of the group2160 returns ldap group links2161 returns error if no ldap group links found2162 POST /groups/:id/ldap_group_links2163 adding a group link via CN2164 behaves like creates LDAP group link2165 when unauthenticated2166 returns authentication error2167 when a less priviledged user2168 does not allow less priviledged user to add LDAP group link2169 when owner of the group2170 returns ok and add ldap group link2171 returns error if LDAP group link already exists2172 returns a 400 error when CN or filter is not given2173 returns a 400 error when group access is not given2174 returns a 422 error when group access is not valid2175 adding a group link via filter2176 feature is available2177 behaves like creates LDAP group link2178 when unauthenticated2179 returns authentication error2180 when a less priviledged user2181 does not allow less priviledged user to add LDAP group link2182 when owner of the group2183 returns ok and add ldap group link2184 returns error if LDAP group link already exists2185 returns a 400 error when CN or filter is not given2186 returns a 400 error when group access is not given2187 returns a 422 error when group access is not valid2188 feature is not available2189 returns 4042190 DELETE /groups/:id/ldap_group_links/:cn2191 when unauthenticated2192 returns authentication error2193 when a less priviledged user2194 does not remove the LDAP group link2195 when owner of the group2196 removes ldap group link2197 returns 404 if LDAP group cn not used for a LDAP group link2198 DELETE /groups/:id/ldap_group_links/:provider/:cn2199 when unauthenticated2200 returns authentication error2201 when a less priviledged user2202 does not remove the LDAP group link2203 when owner of the group2204 returns 404 if LDAP group cn not used for a LDAP group link for the specified provider2205 removes ldap group link2206 DELETE /groups/:id/ldap_group_links2207 deleting a group link via CN and provider2208 behaves like deletes LDAP group link2209 when unauthenticated2210 returns authentication error2211 when a less priviledged user2212 does not remove the LDAP group link2213 when owner of the group2214 removes ldap group link2215 behaves like group link is not found2216 when owner of the group2217 returns 404 if LDAP input not used for a LDAP group link2218 deleting a group link via filter and provider2219 feature is available2220 behaves like deletes LDAP group link2221 when unauthenticated2222 returns authentication error2223 when a less priviledged user2224 does not remove the LDAP group link2225 when owner of the group2226 removes ldap group link2227 behaves like group link is not found2228 when owner of the group2229 returns 404 if LDAP input not used for a LDAP group link2230 feature is not available2231 returns 4042232Groups::Analytics::CycleAnalytics::SummaryController2233 GET "show"2234 passes the date filter to the query class2235 behaves like summary endpoint2236 succeeds2237 when valid parameters are given2238 succeeds2239 accepts optional `project_ids` array2240 succeeds2241 when `created_before` is missing2242 succeeds2243 when `created_after` is missing2244 succeeds2245 when `created_after` is invalid, falls back to default date2246 is expected to respond with numeric status code success2247 when `created_before` is invalid2248 renders `unprocessable_entity`2249 when `created_after` is later than `created_before`2250 renders `unprocessable_entity`2251 when the date range exceeds 180 days2252 renders `unprocessable_entity`2253 when `group_id` is not found2254 renders `not_found` when group is missing2255 when user has no lower access level than `reporter`2256 renders `forbidden` response2257 when feature is not available for the group2258 renders `forbidden` response2259 GET "time_summary"2260 passes the group to RequestParams2261 uses the aggregated VSA data collector2262 behaves like summary endpoint2263 succeeds2264 when valid parameters are given2265 succeeds2266 accepts optional `project_ids` array2267 succeeds2268 when `created_before` is missing2269 succeeds2270 when `created_after` is missing2271 succeeds2272 when `created_after` is invalid, falls back to default date2273 is expected to respond with numeric status code success2274 when `created_before` is invalid2275 renders `unprocessable_entity`2276 when `created_after` is later than `created_before`2277 renders `unprocessable_entity`2278 when the date range exceeds 180 days2279 renders `unprocessable_entity`2280 when `group_id` is not found2281 renders `not_found` when group is missing2282 when user has no lower access level than `reporter`2283 renders `forbidden` response2284 when feature is not available for the group2285 renders `forbidden` response2286 time series endpoints2287 GET "lead_times"2288 returns the daily average durations2289 behaves like summary endpoint2290 succeeds2291 when valid parameters are given2292 succeeds2293 accepts optional `project_ids` array2294 succeeds2295 when `created_before` is missing2296 succeeds2297 when `created_after` is missing2298 succeeds2299 when `created_after` is invalid, falls back to default date2300 is expected to respond with numeric status code success2301 when `created_before` is invalid2302 renders `unprocessable_entity`2303 when `created_after` is later than `created_before`2304 renders `unprocessable_entity`2305 when the date range exceeds 180 days2306 renders `unprocessable_entity`2307 when `group_id` is not found2308 renders `not_found` when group is missing2309 when user has no lower access level than `reporter`2310 renders `forbidden` response2311 when feature is not available for the group2312 renders `forbidden` response2313 GET "cycle_times"2314 returns the daily average durations2315 behaves like summary endpoint2316 succeeds2317 when valid parameters are given2318 succeeds2319 accepts optional `project_ids` array2320 succeeds2321 when `created_before` is missing2322 succeeds2323 when `created_after` is missing2324 succeeds2325 when `created_after` is invalid, falls back to default date2326 is expected to respond with numeric status code success2327 when `created_before` is invalid2328 renders `unprocessable_entity`2329 when `created_after` is later than `created_before`2330 renders `unprocessable_entity`2331 when the date range exceeds 180 days2332 renders `unprocessable_entity`2333 when `group_id` is not found2334 renders `not_found` when group is missing2335 when user has no lower access level than `reporter`2336 renders `forbidden` response2337 when feature is not available for the group2338 renders `forbidden` response2339Groups::OmniauthCallbacksController2340 when request hasn't been validated by omniauth middleware2341 prevents authentication2342 valid credentials2343 when user used to be a member of a group2344 displays a flash message verifying group sign in2345 adds linked identity2346 adds group membership2347 when user was provisioned by other group2348 displays a flash message verifying group sign in2349 does not add linked identity2350 does not add group membership2351 when signed in2352 behaves like and identity already linked2353 displays a flash message verifying group sign in2354 uses existing linked identity2355 skips authenticity token based forgery protection2356 behaves like SAML session initiated2357 redirects to RelayState2358 logs group audit event for authentication2359 stores that a SAML session is active2360 with 2FA2361 stores that a SAML session is active2362 oauth linked with different NameID2363 displays a flash message verifying group sign in2364 when user email address does not match auth hash email address2365 redirects and displays an error2366 oauth already linked to another account2367 redirects and displays an error2368 and identity hasn't been linked2369 links the identity2370 displays a flash indicating the account has been linked2371 logs group audit event for being added to the group2372 when a default access level is specified in the SAML provider2373 sets the access level of the member as per the specified `default_membership_role`2374 behaves like SAML session initiated2375 redirects to RelayState2376 logs group audit event for authentication2377 stores that a SAML session is active2378 with IdP initiated request2379 redirects to account link page2380 lets the user know their account isn't linked yet2381 with enforced_group_managed_accounts enabled2382 redirects to group sign up2383 when not signed in2384 and identity hasn't been linked2385 redirects to group sign up page2386 when sign_up_on_sso feature flag is disabled2387 redirects to sign in page with flash notice2388 behaves like and identity already linked2389 displays a flash message verifying group sign in2390 uses existing linked identity2391 skips authenticity token based forgery protection2392 behaves like SAML session initiated2393 redirects to RelayState2394 logs group audit event for authentication2395 stores that a SAML session is active2396 with 2FA2397 stores that a SAML session is active2398 identity verification2399 on sign up2400 behaves like identity verification not required2401 does not redirect to identity verification2402 on sign in when identity is not yet verified2403 behaves like identity verification not required2404 does not redirect to identity verification2405 #failure2406 not signed in2407 doesn't disclose group existence2408 group doesn't exist2409 doesn't disclose group non-existence2410 with access2411 has descriptive error flash2412 redirects back go the SSO page2413 with access to SAML settings for the group2414 redirects to the settings page2415API::ProjectMirror2416 POST /projects/:id/mirror/pull2417 when authenticated via GitHub signature2418 when project is not mirrored2419 is expected to respond with numeric status code bad_request2420 when project is mirrored2421 when "pull_request" event is received2422 behaves like triggering pipeline creation2423 enqueues Ci::ExternalPullRequests::CreatePipelineWorker2424 when any param is missing2425 returns the error message2426 when action is not supported2427 ignores it and return success status2428 when authenticated as user2429 behaves like triggering pipeline creation2430 enqueues Ci::ExternalPullRequests::CreatePipelineWorker2431 when ci_cd_projects is not available2432 returns the error message2433 when github_integration is not available2434 returns the error message2435 when "push" event is received2436 when import state is none2437 behaves like an API endpoint that triggers pull mirroring operation2438 executes UpdateAllMirrorsWorker2439 when import state is failed2440 behaves like an API endpoint that triggers pull mirroring operation2441 executes UpdateAllMirrorsWorker2442 and retried more than 14 times2443 behaves like an API endpoint that does not trigger pull mirroring operation2444 does not execute UpdateAllMirrorsWorker and returns forbidden2445 when import state is finished2446 behaves like an API endpoint that triggers pull mirroring operation2447 executes UpdateAllMirrorsWorker2448 when import state is scheduled2449 behaves like an API endpoint that does not trigger pull mirroring operation2450 does not execute UpdateAllMirrorsWorker and returns ok2451 when import state is started2452 behaves like an API endpoint that does not trigger pull mirroring operation2453 does not execute UpdateAllMirrorsWorker and returns ok2454 when authenticated as user2455 is authenticated as developer2456 returns forbidden error2457 is authenticated as reporter2458 returns forbidden error2459 is authenticated as guest2460 returns forbidden error2461 is authenticated as maintainer2462 triggers the pull mirroring operation2463 is authenticated as owner2464 triggers the pull mirroring operation2465 when repository_mirrors feature is not available2466 behaves like an API endpoint that does not trigger pull mirroring operation2467 does not execute UpdateAllMirrorsWorker and returns bad_request2468 when repository_mirrors feature is available2469 behaves like an API endpoint that triggers pull mirroring operation2470 executes UpdateAllMirrorsWorker2471 when not authenticated2472 with public project2473 returns a 401 status2474 with internal project2475 returns a 404 status2476 with private project2477 returns a 404 status2478 GET /projects/:id/mirror/pull2479 when user is missing2480 returns Unauthorized2481 when user has no admin permissions2482 returns forbidden error2483 when user has admin permissions2484 returns pull mirror details2485 when project does not support mirroring2486 returns BadRequest2487Git LFS API and storage2488 with group wikis2489 behaves like LFS http requests2490 when LFS is disabled globally2491 download request2492 behaves like LFS http 501 response2493 behaves like LFS http expected response code and message2494 is expected to eq "Git LFS is not enabled on this GitLab server, contact your admin."2495 upload request2496 behaves like LFS http 501 response2497 behaves like LFS http expected response code and message2498 is expected to eq "Git LFS is not enabled on this GitLab server, contact your admin."2499 unauthenticated2500 download request2501 behaves like LFS http 401 response2502 behaves like LFS http expected response code and message2503 is expected to match "text/plain"2504 upload request2505 behaves like LFS http 401 response2506 behaves like LFS http expected response code and message2507 is expected to match "text/plain"2508 without access2509 download request2510 behaves like LFS http 404 response2511 behaves like LFS http expected response code and message2512 is expected to match "application/vnd.git-lfs+json"2513 upload request2514 behaves like LFS http 404 response2515 behaves like LFS http expected response code and message2516 is expected to match "application/vnd.git-lfs+json"2517 with guest access2518 download request2519 behaves like LFS http 404 response2520 behaves like LFS http expected response code and message2521 is expected to match "application/vnd.git-lfs+json"2522 upload request2523 behaves like LFS http 404 response2524 behaves like LFS http expected response code and message2525 is expected to match "application/vnd.git-lfs+json"2526 with download permission2527 download request2528 behaves like LFS http 200 blob response2529 behaves like LFS http 404 response2530 behaves like LFS http expected response code and message2531 is expected to match "application/vnd.git-lfs+json"2532 when container does not exist2533 behaves like LFS http 404 response2534 behaves like LFS http expected response code and message2535 is expected to match "application/vnd.git-lfs+json"2536 upload request2537 behaves like LFS http 403 response2538 behaves like LFS http 404 response2539 behaves like LFS http expected response code and message2540 is expected to match "application/vnd.git-lfs+json"2541 with upload permission2542 upload request2543 behaves like LFS http 200 response2544 behaves like LFS http 404 response2545 behaves like LFS http expected response code and message2546 is expected to match "application/vnd.git-lfs+json"2547 deprecated API2548 when fetching LFS object using deprecated API2549 behaves like deprecated request2550 behaves like LFS http expected response code and message2551 is expected to eq "Server supports batch API only, please update your Git LFS client to version 1.0.1 and up."2552 when handling LFS request using deprecated API2553 behaves like deprecated request2554 behaves like LFS http expected response code and message2555 is expected to eq "Server supports batch API only, please update your Git LFS client to version 1.0.1 and up."2556 when handling lfs batch request2557 upload2558 when request is authenticated2559 when user has project push access2560 when pushing a lfs object that does not exist2561 behaves like pushes new LFS objects2562 and project is above the repository size limit2563 responds with status 4062564 and project will go over the repository size limit2565 responds with status 4062566 when the namespace storage limit is exceeded2567 responds with status 4062568 when the push size would exceed the namespace storage limit2569 responds with status 4062570 when the namespace is over the free user cap limit2571 responds with status 4062572 when pushing to a subgroup project2573 when the namespace storage limit is exceeded2574 responds with status 4062575 when Geo is not enabled2576 when custom_http_clone_url_root is not configured2577 returns hrefs based on external_url2578 when custom_http_clone_url_root is configured2579 returns hrefs based on custom_http_clone_url_root2580 when this site is a Geo primary site2581 when custom_http_clone_url_root is not configured2582 returns hrefs based on the Geo primary site URL2583 when custom_http_clone_url_root is configured2584 returns hrefs based on the Geo primary site URL2585 when deploy key has project push access2586 behaves like pushes new LFS objects2587 and project is above the repository size limit2588 responds with status 4062589 and project will go over the repository size limit2590 responds with status 4062591 when the namespace storage limit is exceeded2592 responds with status 4062593 when the push size would exceed the namespace storage limit2594 responds with status 4062595 when pushing a lfs object2596 to one project2597 when user is authenticated2598 when user has push access to the project2599 when project has repository size limit enabled2600 responds with status 200 when the push will stay under the limit2601 when namespace storage limits are enabled2602 responds with status 200 when the push is under the limit2603API::ProjectPushRule ProjectPushRule2604 GET /projects/:id/push_rule2605 authorized user2606 returns project push rule2607 the commit_committer_check feature is enabled2608 returns the commit_committer_check information2609 the reject_unsigned_commits feature is enabled2610 returns the reject_unsigned_commits information2611 the reject_unsigned_commits feature is not enabled2612 succeeds2613 does not return the reject_unsigned_commits information2614 push rules are not enabled2615 is forbidden2616 developer2617 does not have access to project push rule2618 POST /projects/:id/push_rule2619 adds push rule to project with no file size2620 returns 400 if no parameter is given2621 maintainer2622 is accepted2623 indicates that it belongs to the correct project2624 sets all given parameters2625 commit_committer_check not allowed by License2626 is forbidden to use this service2627 reject_unsigned_commits not allowed by License2628 is forbidden to use this service2629 commit_committer_check is not enabled2630 is forbidden to send the the :commit_committer_check parameter2631 without the :commit_committer_check parameter2632 sets all given parameters2633 reject_unsigned_commits is not enabled2634 is forbidden to send the the :reject_unsigned_commits parameter2635 without the :reject_unsigned_commits parameter2636 sets all given parameters2637 invalid params2638 returns an error2639 user with developer_access2640 does not add push rule to project2641 with existing push rule2642 returns an error response2643 PUT /projects/:id/push_rule2644 does not update push rule for unauthorized user2645 with existing push rule2646 setting deny_delete_tag and commit_message_regex2647 is successful2648 includes the expected settings2649 setting commit_committer_check2650 is successful2651 sets the commit_committer_check2652 the commit_committer_check feature is not enabled2653 is an error to provide this parameter2654 setting reject_unsigned_commits2655 is successful2656 sets the reject_unsigned_commits2657 the reject_unsigned_commits feature is not enabled2658 is an error to provide the this parameter2659 not providing parameters2660 is an error2661 invalid params2662 returns an error2663 without existing push rule2664 returns an error response2665 DELETE /projects/:id/push_rule2666 for existing push rule2667 maintainer2668 deletes push rule from project2669 user with developer_access2670 returns a 403 error2671 for non existing push rule2672 deletes push rule from project2673 returns a 403 error if not authorized2674SubscriptionsController2675 GET #new2676 for unauthenticated subscription request2677 is expected to respond with numeric status code redirect2678 is expected to redirect to "/users/sign_up?redirect_from=checkout"2679 stores subscription URL for later2680 with authenticated user2681 is expected to render template layouts/minimal2682 is expected to render template new2683 when there are groups eligible for the subscription2684 assigns the eligible groups for the subscription2685 and request specify which group to use2686 assign requested group2687 request does not specify namespace2688 falls back to users namespace2689 when there are no eligible groups for the subscription2690 assigns eligible groups as an empty array if CustomerDot returns empty payload2691 assigns eligible groups as an empty array if user is not owner of any groups2692 GET #buy_minutes2693 with authenticated user2694 when the add-on plan cannot be found2695 is expected to respond with numeric status code not_found2696 when there are groups eligible for the addon2697 is expected to render template layouts/minimal2698 is expected to render template buy_minutes2699 assigns the group for the addon2700 GET #buy_storage2701 with authenticated user2702 when the add-on plan cannot be found2703 is expected to respond with numeric status code not_found2704 when there are groups eligible for the addon2705 is expected to render template layouts/minimal2706 is expected to render template buy_storage2707 assigns the group for the addon2708 GET #payment_form2709 with unauthorized user2710 is expected to respond with numeric status code redirect2711 is expected to redirect to "/users/sign_in"2712 with authorized user2713 is expected to respond with numeric status code ok2714 returns the data attribute of the client response in JSON format2715 GET #payment_method2716 with unauthorized user2717 is expected to respond with numeric status code redirect2718 is expected to redirect to "/users/sign_in"2719 with authorized user2720 is expected to respond with numeric status code ok2721 returns the data attribute of the client response in JSON format2722 GET #validate_payment_method2723 with unauthorized user2724 is expected to respond with numeric status code unauthorized2725 with authorized user2726 is expected to respond with numeric status code ok2727 is expected to be successful2728 POST #create2729 with unauthorized user2730 is expected to respond with numeric status code unauthorized2731 with authorized user2732 when setting up for a company2733 updates the setup_for_company attribute of the current user2734 creates a group based on the company2735 when using a promo code2736 creates subscription using promo code2737 when not setting up for a company2738 does not update the setup_for_company attribute of the current user2739 creates a group based on the user2740 when an error occurs creating a group2741 returns the errors in json format2742 when invalid name is passed2743 returns the errors in json format2744 tracks errors2745 on successful creation of a subscription2746 is expected to respond with numeric status code ok2747 returns the group edit location in JSON format2748 on unsuccessful creation of a subscription2749 is expected to respond with numeric status code ok2750 returns the error message in JSON format2751 when selecting an existing group2752 when the selected group is eligible for a new subscription2753 does not create a group2754 returns the selected group location in JSON format2755 when having an explicit redirect2756 is expected to respond with numeric status code ok2757 returns the provided redirect path as location2758 tracks the creation of the subscriptions2759 purchasing an addon2760 tracks creation with add-on success message2761 when the selected group is ineligible for a new subscription2762 does not create a group2763 returns a 404 not found2764 when selected group is a sub group2765 is expected to respond with numeric status code not_found2766 when selecting a non existing group2767 is expected to respond with numeric status code not_found2768 when selecting a group without owner role2769 is expected to respond with numeric status code not_found2770Projects::ClustersController2771 behaves like cluster metrics2772 GET #metrics2773 functionality2774 can query Prometheus2775 queries cluster metrics2776 when response has content2777 returns prometheus query response2778 when response has no content2779 returns prometheus query response2780 without Prometheus2781 returns not found2782 cannot query Prometheus2783 returns not found2784 security2785 is allowed for admin when admin mode enabled2786 is denied for admin when admin mode disabled2787 is expected to be allowed for owner. Expected: 200,201,204,302 Got: 2042788 is expected to be allowed for maintainer. Expected: 200,201,204,302 Got: 2042789 is expected to be denied for developer. Expected: 401,404 Got: 4042790 is expected to be denied for reporter. Expected: 401,404 Got: 4042791 is expected to be denied for guest. Expected: 401,404 Got: 4042792 is expected to be denied for user. Expected: 401,404 Got: 4042793 is expected to be denied for external. Expected: 401,404 Got: 4042794API::VulnerabilityExports2795 POST /security/projects/:id/vulnerability_exports2796 behaves like creating export for exportable2797 when the request does not fulfill the requirements2798 responds with bad_request2799 when the request fulfills the requirements2800 when the user is not authorized to take the action2801 responds with 403 forbidden2802 when the user is authorized to take the action2803 when the export creation succeeds2804 returns information about new vulnerability export2805 when the export creation fails2806 returns the error message2807 behaves like forbids access to vulnerability API endpoint in case of disabled features2808 when security dashboard feature is not available2809 responds with 403 Forbidden2810 permissions2811 is expected to be allowed for :admin2812 is expected to be allowed for :owner2813 is expected to be allowed for :maintainer2814 is expected to be allowed for :developer2815 is expected to be allowed for :auditor2816 is expected to be denied for :reporter2817 is expected to be denied for :guest2818 is expected to be denied for :anonymous2819 POST /security/groups/:id/vulnerability_exports2820 behaves like creating export for exportable2821 when the request does not fulfill the requirements2822 responds with bad_request2823 when the request fulfills the requirements2824 when the user is not authorized to take the action2825 responds with 403 forbidden2826 when the user is authorized to take the action2827 when the export creation succeeds2828 returns information about new vulnerability export2829 when the export creation fails2830 returns the error message2831 behaves like forbids access to vulnerability API endpoint in case of disabled features2832 when security dashboard feature is not available2833 responds with 403 Forbidden2834 POST /security/vulnerability_exports2835 behaves like creating export for exportable2836 when the request does not fulfill the requirements2837 responds with bad_request2838 when the request fulfills the requirements2839 when the user is not authorized to take the action2840 responds with 403 forbidden2841 when the user is authorized to take the action2842 when the export creation succeeds2843 returns information about new vulnerability export2844 when the export creation fails2845 returns the error message2846 behaves like forbids access to vulnerability API endpoint in case of disabled features2847 when security dashboard feature is not available2848 responds with 403 Forbidden2849 GET /security/vulnerability_exports/:id2850 with an authorized user with proper permissions2851 when export is finished2852 returns information about vulnerability export2853 does not return Poll-Interval header2854 when export is running2855 returns information about vulnerability export2856 returns Poll-Interval header with value set to 5 seconds2857 permissions2858 is expected to be denied for :admin2859 is expected to be denied for :owner2860 is expected to be denied for :maintainer2861 is expected to be denied for :developer2862 is expected to be denied for :auditor2863 is expected to be denied for :reporter2864 is expected to be denied for :guest2865 is expected to be denied for :anonymous2866 for export author2867 is expected to be allowed for #<User id:764 @user565>2868 GET /security/vulnerability_exports/:id/download2869 with an authorized user with proper permissions2870 when export is running2871 renders 4042872 when export is failed2873 renders 4042874 when export is finished2875 renders 200 with CSV file2876 permissions2877 is expected to be denied for :admin2878 is expected to be denied for :owner2879 is expected to be denied for :maintainer2880 is expected to be denied for :developer2881 is expected to be denied for :auditor2882 is expected to be denied for :reporter2883 is expected to be denied for :guest2884 is expected to be denied for :anonymous2885 for export author2886 is expected to be allowed for #<User id:764 @user565>2887Update a work item2888 with iteration widget input2889 when iterations feature is unlicensed2890 behaves like work item is not updated2891 ignores the update2892 when iterations feature is licensed2893 behaves like user without permission to admin work item cannot update the attribute2894 when a guest user is also an author of the work item2895 behaves like work item is not updated2896 ignores the update2897 when user has permissions to admin a work item2898 when setting to a new iteration2899 behaves like work item's iteration is updated2900 updates the work item's iteration2901 when setting iteration to null2902 behaves like work item's iteration is updated2903 updates the work item's iteration2904 when the user does not have permission to update the work item2905 behaves like a mutation that returns top-level errors2906 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"2907 behaves like work item is not updated2908 ignores the update2909 with weight widget input2910 when issuable weights is unlicensed2911 behaves like work item is not updated2912 ignores the update2913 when issuable weights is licensed2914 when user has permissions to admin a work item2915 behaves like update work item weight widget2916 updates the weight widget2917 when the updated work item is not valid2918 returns validation errors without the work item2919 when setting weight to null2920 updates the work item2921 when using quick action2922 behaves like update work item weight widget2923 updates the weight widget2924 when the updated work item is not valid2925 returns validation errors without the work item2926 when setting weight to null2927 updates the work item2928 when the work item type does not support the weight widget2929 behaves like work item is not updated2930 ignores the update2931 behaves like user without permission to admin work item cannot update the attribute2932 when a guest user is also an author of the work item2933 behaves like work item is not updated2934 ignores the update2935 with progress widget input2936 when okrs is unlicensed2937 behaves like work item is not updated2938 ignores the update2939 when okrs is licensed2940 when user has permissions to admin a work item2941 behaves like update work item progress widget2942 updates the progress widget2943 when setting progress to an invalid value2944 if progress is greater than 1002945 behaves like does not update work_item progress widget2946 does not update progress widget2947 if progress is less than 02948 behaves like does not update work_item progress widget2949 does not update progress widget2950 behaves like user without permission to admin work item cannot update the attribute2951 when a guest user is also an author of the work item2952 behaves like work item is not updated2953 ignores the update2954 when the user does not have permission to update the work item2955 behaves like a mutation that returns top-level errors2956 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"2957 behaves like work item is not updated2958 ignores the update2959 with status widget input2960 when requirements is unlicensed2961 behaves like work item is not updated2962 ignores the update2963 when requirements is licensed2964 when user has permissions to admin a work item2965 behaves like update work item status widget2966 updates the status widget2967 when the updated work item is not valid2968 returns validation errors without the work item2969 when setting status to an invalid value2970 does not update the work item's status2971 behaves like user without permission to admin work item cannot update the attribute2972 when a guest user is also an author of the work item2973 behaves like work item is not updated2974 ignores the update2975 when the user does not have permission to update the work item2976 behaves like a mutation that returns top-level errors2977 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"2978 behaves like work item is not updated2979 ignores the update2980 with health status widget input2981 when issuable_health_status is unlicensed2982 behaves like work item is not updated2983 ignores the update2984 when issuable_health_status is licensed2985 behaves like user without permission to admin work item cannot update the attribute2986 when a guest user is also an author of the work item2987 behaves like work item is not updated2988 ignores the update2989 when user has permissions to update the work item2990 updates work item health status2991 when using quick action2992 updates work item health status2993 when clearing health status2994 updates the work item2995 when the work item type does not support the health status widget2996 behaves like work item is not updated2997 ignores the update2998Projects::Security::Vulnerabilities::NotesController2999 GET index3000 responds with array of notes3001 when the "Security and Compliance" feature is disabled3002 is expected to respond with numeric status code not_found3003 behaves like SecurityDashboardsPermissions3004 access for all actions3005 when security dashboard feature is disabled3006 returns 4043007 when security dashboard feature is enabled3008 when user has guest access3009 denies access3010 when user has developer access3011 grants access3012 POST create3013 when the "Security and Compliance" feature is disabled3014 is expected to respond with numeric status code not_found3015 when note is empty3016 does not create new note3017 returns status 4223018 when note is provided3019 creates new note3020 returns status 2003021 when user has no permission to create a note3022 does not create new note3023 returns status 4033024 when replying to the discussion3025 creates new note in reply to discussion3026 returns status 2003027 when return_discussion param is set3028 returns discussion JSON when the return_discussion param is set3029 behaves like create notes request exceeding rate limit3030 allows user in allow-list to create notes, even if the case is different3031 when rate limiter enabled3032 logs request and declines it when endpoint called more than the threshold3033 when rate limiter is disabled3034 does not log request and does not block the request3035 PUT update3036 when the "Security and Compliance" feature is disabled3037 is expected to respond with numeric status code not_found3038 when user is not an author of the note3039 returns status 4043040 when user is an author of the note3041 when note is provided3042 updates note3043 returns status 2003044 DELETE destroy3045 when the "Security and Compliance" feature is disabled3046 is expected to respond with numeric status code not_found3047 when user is not an author of the note3048 does not delete the note3049 returns status 4043050 when user is an author of the note3051 deletes the note3052 returns status 2003053 POST toggle_award_emoji3054 creates the award emoji3055 when the "Security and Compliance" feature is disabled3056 is expected to respond with numeric status code not_found3057 when award emoji was already created3058 deletes the award emoji3059Ldap::OmniauthCallbacksController3060 displays LDAP sync flash on first sign in3061 skips LDAP sync flash on subsequent sign ins3062 multiple ldap providers configured3063 multiple ldap servers licensed feature available3064 allows sign in to first provider3065 allows sign in to other provider3066 multiple ldap servers licensed feature not available3067 allows sign in3068 does not allow sign in for other providers3069 access denied3070 logs a failure event3071Groups::EpicsController3072 # order random3073 GET #new3074 behaves like observability csp policy3075 when there is no CSP config3076 does not add any csp header3077 when observability is disabled3078 does not add observability urls to the csp header3079 when frame-src exists in the CSP config3080 appends the proper url to frame-src CSP directives3081 when signin is already present in the policy3082 does not append signin again3083 when oauth is already present in the policy3084 does not append oauth again3085 when default-src exists in the CSP config3086 does not change default-src3087 appends the proper url to frame-src CSP directives3088 when frame-src and default-src exist in the CSP config3089 appends to frame-src CSP directives3090 GET #show3091 behaves like observability csp policy3092 when there is no CSP config3093 does not add any csp header3094 when observability is disabled3095 does not add observability urls to the csp header3096 when frame-src exists in the CSP config3097 appends the proper url to frame-src CSP directives3098 when signin is already present in the policy3099 does not append signin again3100 when oauth is already present in the policy3101 does not append oauth again3102 when default-src exists in the CSP config3103 does not change default-src3104 appends the proper url to frame-src CSP directives3105 when frame-src and default-src exist in the CSP config3106 appends to frame-src CSP directives3107API::AwardEmoji3108 GET /groups/:id/awardable/:awardable_id/award_emoji3109 on an epic3110 returns an array of award_emoji3111 returns a 404 error when epic id not found3112 GET /groups/:id/awardable/:awardable_id/notes/:note_id/award_emoji3113 returns an array of award emoji3114 GET /groups/:id/awardable/:awardable_id/award_emoji/:award_id3115 on an epic3116 returns the award emoji3117 returns a 404 error if the award is not found3118 GET /groups/:id/awardable/:awardable_id/notes/:note_id/award_emoji/:award_id3119 returns an award emoji3120 POST /groups/:id/awardable/:awardable_id/award_emoji3121 on an epic3122 creates a new award emoji3123 returns a 400 bad request error if the name is not given3124 returns a 404 if the user is not authenticated3125 normalizes +1 as thumbsup award3126 when the emoji already has been awarded3127 returns a 404 status code3128 POST /groups/:id/awardable/:awardable_id/notes/:note_id/award_emoji3129 creates a new award emoji3130 marks Todos on the Noteable as done3131 normalizes +1 as thumbsup award3132 when the emoji already has been awarded3133 returns a 404 status code3134 DELETE /groups/:id/awardable/:awardable_id/award_emoji/:award_id3135 when the awardable is an Epic3136 deletes the award3137 returns a 404 error when the award emoji can not be found3138 behaves like 412 response3139 for a modified ressource3140 returns 412 with a JSON error3141 for an unmodified ressource3142 returns 204 with an empty body3143 DELETE /groups/:id/awardable/:awardable_id/award_emoji/:award_emoji_id3144 deletes the award3145 behaves like 412 response3146 for a modified ressource3147 returns 412 with a JSON error3148 for an unmodified ressource3149 returns 204 with an empty body3150Projects::ProtectedEnvironmentsController3151 #POST create3152 with valid access and params3153 with valid params3154 creates a new ProtectedEnvironment3155 sets a flash3156 redirects to CI/CD settings3157 with invalid params3158 does not create a new ProtectedEnvironment3159 redirects to CI/CD settings3160 with invalid access3161 renders 4043162 #PUT update3163 when the user is authorized3164 finds the requested protected environment3165 updates the protected environment3166 is successful3167 when the user is not authorized3168 is not successful3169 #DELETE destroy3170 when the user is authorized3171 finds the requested protected environment3172 deletes the requested protected environment3173 redirects to CI/CD settings3174 when the user is not authorized3175 is not successful3176Groups::Analytics::TasksByTypeController3177 GET #show3178 when valid parameters are given3179 succeeds3180 returns valid count3181 when `label_names` are missing3182 behaves like expects unprocessable_entity response3183 returns unprocessable_entity as response3184 behaves like parameter validation3185 when user access level is lower than reporter3186 returns forbidden as response3187 when license is missing3188 returns forbidden as response3189 when `created_after` parameter is invalid3190 behaves like expects unprocessable_entity response3191 returns unprocessable_entity as response3192 when `created_after` parameter is missing3193 behaves like expects unprocessable_entity response3194 returns unprocessable_entity as response3195 when `created_after` date is later than `created_before` date3196 behaves like expects unprocessable_entity response3197 returns unprocessable_entity as response3198 GET #top_labels3199 when valid parameters are given3200 succeeds3201 returns valid count3202 behaves like parameter validation3203 when user access level is lower than reporter3204 returns forbidden as response3205 when license is missing3206 returns forbidden as response3207 when `created_after` parameter is invalid3208 behaves like expects unprocessable_entity response3209 returns unprocessable_entity as response3210 when `created_after` parameter is missing3211 behaves like expects unprocessable_entity response3212 returns unprocessable_entity as response3213 when `created_after` date is later than `created_before` date3214 behaves like expects unprocessable_entity response3215 returns unprocessable_entity as response3216Projects::Security::VulnerabilitiesController3217 GET #new3218 checks if the user can create a vulnerability3219 when the "Security and Compliance" feature is disabled3220 is expected to respond with numeric status code not_found3221 when user can create vulnerability3222 renders the add new finding page3223 when user can not create vulnerability3224 renders 404 page not found3225 GET #show3226 when the "Security and Compliance" feature is disabled3227 is expected to respond with numeric status code not_found3228 when there's an attached pipeline3229 renders the vulnerability page3230 renders the vulnerability component3231 when there's no attached pipeline3232 renders the vulnerability page3233 GET #discussions3234 renders discussions3235 when the "Security and Compliance" feature is disabled3236 is expected to respond with numeric status code not_found3237Epic aggregates (count and weight)3238 count and weight totals3239 uses the LazyEpicAggregate service3240 returns the weights3241 behaves like counts properly3242 returns the epic counts3243 returns the issue counts3244 behaves like a working graphql query3245 returns a successful response3246 when requesting has_issues3247 behaves like having correct values for3248 behaves like a working graphql query3249 returns a successful response3250 when target epic has child epics or issues3251 returns true3252 when target epic has no child epics nor issues3253 returns false3254 behaves like efficient query3255 does not result in N+13256 when requesting has_children3257 behaves like having correct values for3258 behaves like a working graphql query3259 returns a successful response3260 when target epic has child epics or issues3261 returns true3262 when target epic has no child epics nor issues3263 returns false3264 behaves like efficient query3265 does not result in N+13266Query.project(fullPath).pipeline(iid).securityReportSummary3267 when the required features are enabled3268 when user is member of the project3269 shows the vulnerabilitiesCount and scannedResourcesCount3270 shows the first 20 scanned resources3271 returns nil for the scannedResourcesCsvPath3272 when user is not a member of the project3273 returns no scanned resources3274 when the required features are disabled3275 returns no scanned resources3276API::ProjectClusters3277 POST /projects/:id/clusters/user3278 when user sets specific environment scope3279 creates a cluster with that specific environment3280 when does not set an specific environment scope3281 sets default environment3282 when another cluster exists3283 responds with 2013284 allows multiple clusters to be associated to project3285 PUT /projects/:id/clusters/:cluster_id3286 With a GCP cluster3287 updates the environment scope3288 With an user cluster3289 updates the environment scope3290TrialRegistrationsController3291 POST create3292 when email_opted_in does not exist in params3293 sets user email_opted_in to false3294 when email_opted_in is true in params3295 sets user email_opted_in to true3296 with snowplow tracking3297 when the password is weak3298 does not track failed form submission3299 when the password is not weak3300 tracks successful form submission3301 with email confirmation3302 when email confirmation settings is set to `soft`3303 does not track an almost there redirect3304 when email confirmation settings is not set to `soft`3305 tracks an almost there redirect3306 behaves like creates a user with ArkoseLabs risk band on signup request3307 when arkose_labs_token verification succeeds3308 records the user's data from Arkose Labs3309 behaves like creates the user3310 creates the user3311 when verification fails3312 does not record the user's data from Arkose Labs3313 behaves like renders new action with an alert flash3314 renders new action with an alert flash3315 when user is not persisted3316 does not record the user's data from Arkose Labs3317 when feature is disabled3318 behaves like creates the user3319 creates the user3320 behaves like skips verification and data recording3321 skips verification and data recording3322 when reCAPTCHA is enabled3323 behaves like creates the user3324 creates the user3325 when reCAPTCHA verification fails3326 does not create the user3327 when arkose_labs_token param is not present3328 behaves like renders new action with an alert flash3329 renders new action with an alert flash3330 behaves like skips verification and data recording3331 skips verification and data recording3332get list of boards3333 for a project3334 behaves like a board epics query3335 returns open epics referenced by issues in the board3336 when board is scoped to a wildcard milestone3337 returns milestone global ID in the correct format3338 for a group3339 behaves like group and project boards query3340 behaves like a working graphql query3341 returns a successful response3342 when the user does not have access to the board parent3343 returns nil3344 when no permission to read board3345 does not return any boards3346 when user can read the board parent3347 does not create a default board3348 sorting and pagination3349 when using default sorting3350 when ascending3351 behaves like sorted paginated query3352 behaves like requires variables3353 shared example requires variables to be set3355 when sorting3356 sorts correctly3357 when paginating3358 paginates correctly3359 when querying for a single board3360 finds the correct board3361 behaves like a working graphql query3362 returns a successful response3363 behaves like a board epics query3364 returns open epics referenced by issues in the board3365 when board is scoped to a wildcard milestone3366 returns milestone global ID in the correct format3367get board lists3368 for a project3369 behaves like group and project board lists query3370 when user can read the board3371 sorting and pagination3372 when using default sorting3373 when ascending3374 behaves like sorted paginated query3375 behaves like requires variables3376 shared example requires variables to be set3378 when sorting3379 sorts correctly3380 when paginating3381 paginates correctly3382 limit metric settings3383 returns the expected limit metric settings3384 total issue count and weight3385 returns total count and weight of issues matching issue filters3386 for a group3387 behaves like group and project board lists query3388 when user can read the board3389 sorting and pagination3390 when using default sorting3391 when ascending3392 behaves like sorted paginated query3393 behaves like requires variables3394 shared example requires variables to be set3396 when sorting3397 sorts correctly3398 when paginating3399 paginates correctly3400 limit metric settings3401 returns the expected limit metric settings3402 total issue count and weight3403 returns total count and weight of issues matching issue filters3404Projects::DeployKeysController3405 POST create3406 records an audit event3407 when the account has configured ssh key expiry3408 shows an alert with the validation error3409 /enable/:id3410 with user with permission3411 records an audit event3412 returns 4043413 /disable/:id3414 with admin3415 records an audit event3416RoutableActions3417 #find_routable!3418 when SSO enforcement prevents access3419 for a group3420 redirects to group sign in page3421 does not redirect on POST requests3422 for a nested group3423 redirects to group sign in page3424 does not redirect on POST requests3425 for a project3426 redirects to group sign in page3427 does not redirect on POST requests3428 for a nested project3429 redirects to group sign in page3430 does not redirect on POST requests3431Groups::Analytics::DashboardsController3432 # order random3433 GET value_streams_dashboard3434 when user is not logged in3435 redirects the user to the login page3436 when user is not authorized3437 behaves like forbidden response3438 returns forbidden response3439 when user is logged in3440 when the license is not available3441 when the feature is disabled3442 behaves like forbidden response3443 returns forbidden response3444 when the feature is enabled3445 behaves like forbidden response3446 returns forbidden response3447 when the license is available3448 when the feature is disabled3449 behaves like forbidden response3450 returns forbidden response3451 when the feature is enabled3452 succeeds3453 can accept a `query` params3454 will only return the first 4 namespaces3455 will return projects in a subgroup3456 tracks page view on usage ping3457 when the feature is not enabled for that group3458 behaves like forbidden response3459 returns forbidden response3460 GET index3461 when user is not logged in3462 redirects the user to the login page3463 when user is logged in3464 redirects to value stream dashboards3465Groups::Analytics::DashboardsController3466 # order random3467 behaves like tracking unique visits3468 tracks unique visit if the format is HTML3469 tracks unique visit if DNT is not enabled3470 does not track unique visit if DNT is enabled3471 does not track unique visit if the format is JSON3472Creating an Iteration3473 when the user does not have permission3474 does not create iteration3475 behaves like a mutation that returns a top-level access error3476 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3477 when the user has permission3478 when iterations are disabled3479 behaves like a mutation that returns top-level errors3480 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3481 when iterations are enabled3482 behaves like iteration create request3483 when iteration cadence id is not provided3484 behaves like iteration creation request3485 creates a new iteration in the specified cadence3486 when iteration cadence id is provided3487 behaves like iteration creation request3488 creates a new iteration in the specified cadence3489 when title is not given3490 creates an iteration3491 when trying to add an iteration to the cadence that uses automatic scheduling3492 does not create the iteration3493 behaves like a mutation that returns errors in the response3494 is expected to contain exactly "Iterations cannot be manually added to cadences that use automatic scheduling"3495 when there are ActiveRecord validation errors3496 does not create the iteration3497 behaves like a mutation that returns errors in the response3498 is expected to contain exactly "Start date can't be blank" and "Due date can't be blank"3499 when the list of attributes is empty3500 does not create the iteration3501 behaves like a mutation that returns top-level errors3502 is expected to contain exactly "The list of iteration attributes is empty"3503 when the params contains neither group nor project path3504 does not create the iteration3505 behaves like a mutation that returns top-level errors3506 is expected to contain exactly "Exactly one of group_path or project_path arguments is required"3507 when the params contains both group and project path3508 does not create the iteration3509 behaves like a mutation that returns top-level errors3510 is expected to contain exactly "Exactly one of group_path or project_path arguments is required"3511SessionsController3512 #new3513 on a Geo secondary node3514 when relative URL is configured3515 behaves like a valid oauth authentication redirect3516 redirects to the correct oauth_geo_auth_url3517 with a tampered HOST header3518 behaves like a valid oauth authentication redirect3519 redirects to the correct oauth_geo_auth_url3520 with a tampered X-Forwarded-Host header3521 behaves like a valid oauth authentication redirect3522 redirects to the correct oauth_geo_auth_url3523 without a tampered header3524 behaves like a valid oauth authentication redirect3525 redirects to the correct oauth_geo_auth_url3526 #create3527 with wrong credentials3528 when is a trial form3529 redirects to new trial sign in page3530 when is a regular form3531 redirects to the regular sign in page3532 when using two-factor authentication3533 when OTP authentication fails3534 behaves like an auditable failed authentication3535 log an audit event3536 when WebAuthn authentication fails3537 behaves like an auditable failed authentication3538 log an audit event3539 when user is not allowed to log in using password3540 does not authenticate the user3541 with Arkose reCAPTCHA3542 when ArkoseLabs namespace setting is not set3543 passes the default API domain to the view3544 when ArkoseLabs namespace setting is set3545 passes the custom API domain to the view3546 when the user was verified by Arkose3547 when user is low risk3548 successfully logs in the user3549 when user is NOT low risk3550 prevents the user from logging in3551 when the user was not verified by Arkose3552 prevents the user from logging in3553 sets gon variables3554 when the user should be verified by Arkose but the request does not contain the arkose token3555 prevents the user from logging in3556Updating a Requirement3557 when the user does not have permission3558 behaves like requirement update fails3559 does not update requirement3560 behaves like a mutation that returns a top-level access error3561 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3562 when the user has permission3563 when requirements are disabled3564 behaves like requirement update fails3565 does not update requirement3566 behaves like a mutation that returns a top-level access error3567 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3568 when requirements are enabled3569 when identifying requirement by legacy iid3570 updates the requirement3571 when identifying requirement by work item iid3572 updates the requirement3573 when there are ActiveRecord validation errors3574 does not update the requirement3575 behaves like a mutation that returns errors in the response3576 is expected to contain exactly "Title can't be blank"3577 when there are no update params3578 behaves like a mutation that returns top-level errors3579 is expected to contain exactly "At least one of title, state, last_test_report_state, description is required"3580 when neither iid nor work_item_iid are given3581 behaves like a mutation that returns top-level errors3582 is expected to contain exactly "One and only one of iid or workItemIid is required"3583 when there are no update params nor iid params3584 behaves like a mutation that returns top-level errors3585 is expected to contain exactly /one of iid or workItemIid is required; At least one of title/3586 when both iid and work_item_iid are given3587 behaves like a mutation that returns top-level errors3588 is expected to contain exactly "One and only one of iid or workItemIid is required"3589Registrations::WelcomeController3590 # order random3591 #show3592 tracks render event3593 when in invitation flow3594 tracks render event3595 when in trial flow3596 tracks render event3597 when completed welcome step3598 does not track render event3599 #update3600 without a signed in user3601 is expected to redirect to "/users/sign_up"3602 with a signed in user3603 with email updates3604 when not on gitlab.com3605 when the user opted in3606 sets the email_opted_in field3607 does not set the rest of the email_opted_in fields3608 when the user opted out3609 sets the email_opted_in field3610 when on gitlab.com3611 when registration_objective field is provided3612 sets the registration_objective3613 when setup for company is false3614 when the user opted in3615 sets the email_opted_in fields3616 when user opted out3617 does not set the rest of the email_opted_in fields3618 when setup for company is true3619 sets email_opted_in fields3620 redirection3621 when signup_onboarding is not enabled3622 is expected to redirect to "/dashboard/projects"3623 tracks successful submission event3624 when signup_onboarding is enabled3625 when joining_project is "true"3626 is expected to redirect to "/dashboard/projects"3627 when joining_project is "false"3628 with group and project creation3629 is expected to redirect to "/users/sign_up/groups_projects/new"3630 when setup_for_company is "true"3631 is expected to redirect to "/users/sign_up/company/new?glm_content=some_content&glm_source=some_source&jobs_to_be_done_other=_jobs_to_be_done_other_®istration_objective=code_storage&role=software_developer"3632 when setup_for_company is "false"3633 is expected to redirect to "/users/sign_up/groups_projects/new"3634 when trial is true3635 is expected to redirect to "/users/sign_up/company/new?glm_content=some_content&glm_source=some_source&jobs_to_be_done_other=_jobs_to_be_done_other_®istration_objective=code_storage&role=software_developer&trial=true"3636 when in subscription flow3637 is expected not to redirect to "/users/sign_up/groups_projects/new"3638 when in invitation flow3639 is expected not to redirect to "/users/sign_up/groups_projects/new"3640 tracks successful submission event3641 when in trial flow3642 is expected not to redirect to "/users/sign_up/groups_projects/new"3643 tracks successful submission event3644 when stored company path3645 is expected to redirect to "/users/sign_up/company/new?glm_content=some_content&glm_source=some_source&jobs_to_be_done_other=_jobs_to_be_done_other_®istration_objective=code_storage&role=software_developer"3646 when failed request3647 does not track submission event3648groups autocomplete3649 #issues3650 issue_types: nil, expected: :test_case3651 returns the correct response3652 issue_types: "", expected: :test_case3653 returns the correct response3654 issue_types: "invalid", expected: []3655 returns the correct response3656 issue_types: "test_case", expected: :test_case3657 returns the correct response3658 #epics3659 returns 200 status3660 returns the correct response3661 avoids N+1 queries3662 #iterations3663 when iterations feature is disabled3664 returns 404 status3665 when iterations feature is enabled3666 avoids N+1 queries3667 #iterations3668 returns the correct response3669 #vulnerabilities3670 returns 200 status3671 returns the correct response3672 #commands3673 returns 200 status3674 returns the correct response3675 handles new epics3676Update of an existing issue3677 updates the issue3678 setting epic3679 sets the epic3680 the epic is not readable to the current user3681 does not set the epic3682 the epic is not an epic3683 does not set the epic3684 removing epic3685 removes the epic3686 the epic argument is not provided3687 does not remove the epic3688EE::RoutableActions::SsoEnforcementRedirect3689 #should_redirect_to_group_saml_sso?3690 returns false for User routables3691 returns false when routable is nil3692 with a project3693 behaves like a routable with SSO enforcement redirect3694 is false when a new sso session is not needed3695 is true when a new sso session is needed3696 with a nested project3697 behaves like a routable with SSO enforcement redirect3698 is false when a new sso session is not needed3699 is true when a new sso session is needed3700 with a project in a personal namespace3701 returns false3702 with a group3703 behaves like a routable with SSO enforcement redirect3704 is false when a new sso session is not needed3705 is true when a new sso session is needed3706 with a nested group3707 behaves like a routable with SSO enforcement redirect3708 is false when a new sso session is not needed3709 is true when a new sso session is needed3710 #sso_redirect_url3711 with a group3712 behaves like a routable SSO url3713 returns the SSO url for the root group3714 with a nested group3715 behaves like a routable SSO url3716 returns the SSO url for the root group3717 with a project3718 behaves like a routable SSO url3719 returns the SSO url for the root group3720 with a nested project3721 behaves like a routable SSO url3722 returns the SSO url for the root group3723Creating a Merge Request from a Security::Finding3724 # order random3725 when the user does not have permission3726 does not create a merge request3727 behaves like a mutation that returns a top-level access error3728 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3729 when the user has permission3730 with valid parameters3731 returns a successful response3732 creates a new merge request3733 when security_dashboard is disabled3734 behaves like a mutation that returns top-level errors3735 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3736getting iterations3737 query for iterations by timeframe3738 without start date3739 returns error3740 without end date3741 returns error3742 with start and end date3743 does not have errors3744 query for iterations by cadence3745 with multiple cadences3746 returns iterations3747 searching by cadence title or iteration title and sorting by cadence and due date ASC3748 search: "two", ordered_expected_iterations: lazy { [past_iteration1, past_iteration2, upcoming_group_iteration] }3749 correctly returns ordered items3750 search: "iteration", ordered_expected_iterations: lazy { [closed_group_iteration, current_group_iteration, past_iteration1, past_iteration2, upcoming_group_iteration] }3751 correctly returns ordered items3752 query for iterations by state3753 with DEPRECATED `started` state3754 returns `current` iteration3755 with `current` state3756 returns `current` iteration3757 with `closed` state3758 returns `closed` iteration3759 when sorting by cadence and due date DESC3760 returns `closed` iteration sorted by due date DESC3761JwtController3762 with IP restriction3763 group with restriction3764 address is within the range3765 behaves like successful JWT auth3766 allows access3767 with project deploy token3768 behaves like successful JWT auth with token3769 read: true, write: false, expected_actions: ["pull"]3770 behaves like successful JWT auth3771 allows access3772 read: false, write: true, expected_actions: ["push"]3773 behaves like successful JWT auth3774 allows access3775 read: true, write: true, expected_actions: ["push", "pull"]3776 behaves like successful JWT auth3777 allows access3778 with group deploy token3779 behaves like successful JWT auth with token3780 read: true, write: false, expected_actions: ["pull"]3781 behaves like successful JWT auth3782 allows access3783 read: false, write: true, expected_actions: ["push"]3784 behaves like successful JWT auth3785 allows access3786 read: true, write: true, expected_actions: ["push", "pull"]3787 behaves like successful JWT auth3788 allows access3789 address is outside the range3790 behaves like unsuccessful JWT auth3791 denies access3792 with deploy token credentials3793 with project deploy token3794 behaves like unsuccessful JWT auth3795 denies access3796 with group deploy token3797 behaves like unsuccessful JWT auth3798 denies access3799 authenticating against container registry3800 when Group SSO is enforced3801 behaves like successful JWT auth3802 allows access3803Query.project(fullPath).pipeline(iid).securityReportFinding3804 when the required features are enabled3805 when user is member of the project3806 returns all the queried fields3807 when the finding has been dismissed3808 when :deprecate_vulnerabilities_feedback feature flag is disabled3809 returns a finding in the dismissed state3810 when :deprecate_vulnerabilities_feedback feature flag is enabled3811 returns a finding in the dismissed state3812 when user is not a member of the project3813 returns no vulnerability findings3814 when the required features are disabled3815 returns no vulnerability findings3816API::MemberRoles3817 # order random3818 DELETE /groups/:id/member_roles/:member_role_id3819 behaves like custom_roles license required3820 without a valid license3821 returns not found error3822 when custom_roles license is enabled3823 when unauthorized3824 returns unauthorized error3825 when a less privileged user3826 does not remove the member role3827 when owner of the group3828 removes member role3829 when invalid group name is passed3830 returns 404 if SAML group can not used for a SAML group link3831 GET /groups/:id/member_roles3832 behaves like custom_roles license required3833 without a valid license3834 returns not found error3835 when custom_roles license is enabled3836 when unauthorized3837 returns forbidden error3838 when a less privileged user3839 returns forbidden error3840 when owner of the group3841 returns associated member roles3842 when group does not have any associated member_roles3843 returns empty array as response3844 POST /groups/:id/member_roles3845 behaves like custom_roles license required3846 without a valid license3847 returns not found error3848 when custom_roles license is enabled3849 when unauthorized3850 returns unauthorized error3851 when a less privileged user3852 does not allow less privileged user to add member roles3853 when owner of the group3854 returns ok and add member role3855 when params are missing3856 returns a 400 error when params are missing3857 when params are invalid3858 returns a 400 error when params are invalid3859 when errors during creation of new record3860 returns a error message with 400 code3861Update an external audit event destination header3862 when feature is licensed3863 when current user is a group owner3864 updates the header with the correct attributes3865 when the header attributes are invalid3866 returns correct errors3867 returns the unmutated attribute values3868 behaves like a mutation that does not update a header3869 does not update a header key3870 does not update a header value3871 when current user is a group maintainer3872 behaves like a mutation that does not update a header3873 does not update a header key3874 does not update a header value3875 when current user is a group developer3876 behaves like a mutation that does not update a header3877 does not update a header key3878 does not update a header value3879 when current user is a group guest3880 behaves like a mutation that does not update a header3881 does not update a header key3882 does not update a header value3883 when feature is unlicensed3884 behaves like a mutation on an unauthorized resource3885 behaves like a mutation that returns top-level errors3886 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3887 behaves like a mutation that does not update a header3888 does not update a header key3889 does not update a header value3890getting unprotect access levels for a branch protection3891 # order random3892 behaves like a GraphQL query for access levels3893 when request AccessLevel type objects as a guest user3894 is expected not to be present3895 behaves like a working graphql query3896 returns a successful response3897 when request AccessLevel type objects as a maintainer3898 query3899 avoids N+1 queries3900 response3901 returns all the access level attributes3902 behaves like a working graphql query3903 returns a successful response3904 when request AccessLevel type objects as a maintainer3905 query3906 avoids N+1 queries3907 response3908 returns all the access level attributes3909 behaves like a working graphql query3910 returns a successful response3911Projects::Analytics::DashboardsController3912 # order random3913 GET /:namespace/:project/-/analytics/dashboards3914 with the feature flag disabled3915 behaves like returns not found3916 returns 404 response3917 with the feature flag enabled3918 without the licensed feature3919 behaves like returns not found3920DEPRECATION WARNING: Invalid Feature Flag combined_project_analytics_dashboards stubbed (called from each at /builds/gitlab-org/gitlab/spec/support/helpers/stub_feature_flags.rb:39)3921 returns 404 response3922 with the licensed feature3923 access_level: nil, example_to_run: "returns not found"3924 behaves like returns not found3925DEPRECATION WARNING: Invalid Feature Flag combined_project_analytics_dashboards stubbed (called from each at /builds/gitlab-org/gitlab/spec/support/helpers/stub_feature_flags.rb:39)3926 returns 404 response3927 access_level: :reporter, example_to_run: "returns success"3928 behaves like returns success3929DEPRECATION WARNING: Invalid Feature Flag combined_project_analytics_dashboards stubbed (called from each at /builds/gitlab-org/gitlab/spec/support/helpers/stub_feature_flags.rb:39)3930 returns 200 response3931 access_level: :developer, example_to_run: "returns success"3932 behaves like returns success3933DEPRECATION WARNING: Invalid Feature Flag combined_project_analytics_dashboards stubbed (called from each at /builds/gitlab-org/gitlab/spec/support/helpers/stub_feature_flags.rb:39)3934 returns 200 response3935 access_level: :maintainer, example_to_run: "returns success"3936 behaves like returns success3937DEPRECATION WARNING: Invalid Feature Flag combined_project_analytics_dashboards stubbed (called from each at /builds/gitlab-org/gitlab/spec/support/helpers/stub_feature_flags.rb:39)3938 returns 200 response3939Set project compliance framework3940 # order random3941 #resolve3942 when product analytics is enabled3943 when user is a project maintainer3944 enqueues the InitializeAnalyticsWorker3945 behaves like a working GraphQL mutation3946 with a personal access token3947 behaves like prevents access to the mutation3948 does not resolve the mutation3949 behaves like allows access to the mutation3950 behaves like a working graphql query3951 returns a successful response3952 returns data3953 with an OAuth token3954 behaves like prevents access to the mutation3955 does not resolve the mutation3956 behaves like allows access to the mutation3957 behaves like a working graphql query3958 returns a successful response3959 returns data3960 when an initialization is already in progress3961 behaves like a mutation that returns errors in the response3962 is expected to contain exactly "Product analytics initialization is already in progress"3963 when user is not a project member3964 behaves like a mutation that returns top-level errors3965 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3966 when product analytics is disabled3967 behaves like a mutation that returns errors in the response3968 is expected to contain exactly "Product analytics is disabled"3969Getting code coverage summary in a project3970 behaves like a working graphql query3971 returns a successful response3972 when project has coverage3973 for the default branch3974 contains code coverage summary data3975 not for the default branch3976 returns nil3977 when project does not have coverage3978 returns nil3979Namespace.projects3980 sorting and pagination3981 when sorting by STORAGE3982 behaves like sorted paginated query3983 behaves like requires variables3984 shared example requires variables to be set3986 when sorting3987 sorts correctly3988 when paginating3989 paginates correctly3990Groups::Analytics::CycleAnalyticsController3991 GET show3992 when the license is available3993 succeeds3994 increments usage counter3995 renders `show` template when feature flag is enabled3996 when the initial, default value stream is requested3997 renders the default in memory value stream3998 when invalid name is given3999 renders 404 error4000 tracking events4001 tracks redis hll event4002 behaves like Snowplow event tracking with RedisHLL context4003 behaves like Snowplow event tracking4004 is emitted4005 when the license is missing4006 renders 403 error4007 when non-existent group is given4008 renders 404 error4009 with group and value stream params4010 builds request params with group and value stream4011LicenseMailer4012 #approaching_active_user_count_limit4013 when license is present4014 is expected to have subject of "Your subscription is nearing its user limit"4015 is expected to be bcc'd to ["admin@example.com", "another_admin@example.com"]4016 is expected to have body including "your subscription GitLab Enterprise Edition Starter"4017 is expected to have body including "You have 20 active users"4018 is expected to have body including "the user limit of 21"4019 when license is not present4020 does not send email4021 when send with I18n.default_locale4022 is expected to have subject of "Your subscription is nearing its user limit"4023 is expected to be bcc'd to ["123@abc", "hjk@123"]4024 is expected to have body including "your subscription GitLab Enterprise Edition Starter"4025 is expected to have body including "You have 20 active users"4026 is expected to have body including "the user limit of 21"4027Groups::RoadmapController4028 #show4029 when the user is signed in4030 when the user has access to the group4031 when epics feature is disabled4032 behaves like returns 404 status4033 is expected to respond with numeric status code not_found4034 when epics feature is enabled4035 returns 200 status4036 when roadmaps_sort is nil4037 stores roadmaps sorting param in user preference4038 defaults to sort_value_start_date_soon4039 when roadmaps_sort is present4040 update roadmaps_sort with current value4041 when the user does not have access to the group4042 behaves like returns 404 status4043 is expected to respond with numeric status code not_found4044 when user is not signed in4045 when epics feature is enabled4046 when anonymous users does not have access to the group4047 redirects to login page4048 when anonymous users have access to the group4049 stores epics sorting param in a cookie4050Add an issue to an Epic4051 when epics feature is disabled4052 behaves like mutation without access4053 does not add issue to the epic4054 behaves like a mutation that returns a top-level access error4055 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4056 when epics feature is enabled4057 when the user is a group member4058 adds the issue to the epic4059 when the user is not a group member4060 behaves like mutation without access4061 does not add issue to the epic4062 behaves like a mutation that returns a top-level access error4063 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4064Admin::Geo::NodesController4065 #index4066 with valid license4067 does not show license alert4068 without valid license4069 does show license alert4070 does not redirects to the 403 page4071 #create4072 without add-on license4073 behaves like unlicensed geo action4074 redirects to the 403 page4075 with add-on license4076 delegates the create of the Geo node to Geo::NodeCreateService4077 #update4078 without add-on license4079 behaves like unlicensed geo action4080 redirects to the 403 page4081 with add-on license4082 updates the node4083 delegates the update of the Geo node to Geo::NodeUpdateService4084Create scan execution policy for a project/namespace4085 for project4086 behaves like commits scan execution policies4087 creates a branch with commit4088 when provided policy is invalid4089 returns error with detailed information4090 for namespace4091 behaves like commits scan execution policies4092 creates a branch with commit4093 when provided policy is invalid4094 returns error with detailed information4095Create a Compliance Framework4096 framework feature is unlicensed4097 behaves like a mutation that returns errors in the response4098 is expected to contain exactly "Not permitted to create framework"4099 pipeline configuration feature is unlicensed4100 behaves like a mutation that returns errors in the response4101 is expected to contain exactly "Pipeline configuration full path feature is not available"4102 feature is licensed4103 namespace is a personal namespace4104 current_user is namespace owner4105 does not create a new compliance framework4106 behaves like a mutation that returns errors in the response4107 is expected to contain exactly "Failed to create framework" and "Namespace must be a group, user namespaces are not supported."4108 namespace is a group4109 current_user is group owner4110 behaves like a mutation that creates a compliance framework4111 creates a new compliance framework4112 returns the newly created framework4113 current_user is not a group owner4114 current_user is group owner4115 does not create a new compliance framework4116 behaves like a mutation that returns errors in the response4117 is expected to contain exactly "Not permitted to create framework"4118API::ResourceStateEvents4119 # order random4120 when eventable is an Epic4121 behaves like resource_state_events API4122 GET /groups/:id/epics/:noteable_id/resource_state_events4123 returns an array of resource state events4124 returns a 404 error when eventable id not found4125 returns 404 when not authorized4126 GET /groups/:id/epics/:noteable_id/resource_state_events/:event_id4127 returns a resource state event by id4128 returns 404 when not authorized4129 returns a 404 error if resource state event not found4130 pagination4131 returns the second page4132Registrations::VerificationController4133 # order random4134 GET #new4135 with an unauthenticated user4136 is expected to respond with numeric status code redirect4137 is expected to redirect to "/users/sign_in"4138 with an authenticated user4139 when on .com4140 is expected to respond with numeric status code ok4141 is expected to render template layouts/minimal4142 is expected to render template new4143 publishes the experiment4144 with project_id in params4145 assigns to learn_gitlab onboarding4146 when project_id is blank4147 assigns to root_path4148 without project_id in params4149 assigns to root_path4150 when not on .com4151 is expected to respond with numeric status code not_found4152Query current user groups4153 when permission_scope is CREATE_PROJECTS4154 behaves like a working graphql query4155 returns a successful response4156 when ip_restrictions feature is enabled4157 when check_namespace_plan setting is enabled4158 behaves like no N + 1 DB queries4159 avoids N+1 queries4160 when check_namespace_plan setting is disabled4161 behaves like no N + 1 DB queries4162 avoids N+1 queries4163Create an external audit event destination header4164 when feature is licensed4165 when current user is a group owner4166 creates the header with the correct attributes4167 when the header attributes are invalid4168 returns correct errors4169 behaves like a mutation that does not create a header4170 does not create a header4171 when current user is a group maintainer4172 behaves like a mutation that does not create a header4173 does not create a header4174 when current user is a group developer4175 behaves like a mutation that does not create a header4176 does not create a header4177 when current user is a group guest4178 behaves like a mutation that does not create a header4179 does not create a header4180 when feature is unlicensed4181 behaves like a mutation on an unauthorized resource4182 behaves like a mutation that returns top-level errors4183 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4184 behaves like a mutation that does not create a header4185 does not create a header4186view audit events4187 GET /:namespace/:project/-/audit_events4188 returns 200 response4189 avoids N+1 DB queries4190Admin::AuditLogsController4191 GET #index4192 licensed4193 tracks search event4194 pagination4195 paginates audit events, without casting a count query4196 behaves like tracking unique visits4197 tracks unique visit if the format is HTML4198 tracks unique visit if DNT is not enabled4199 does not track unique visit if DNT is enabled4200 does not track unique visit if the format is JSON4201 behaves like Snowplow event tracking with RedisHLL context4202 behaves like Snowplow event tracking4203 is emitted4204 when invalid date4205 created_before: "invalid-date", created_after: nil4206 returns an error4207 created_before: nil, created_after: true4208 returns an error4209 created_before: "2021-13-10", created_after: nil4210 returns an error4211 created_before: nil, created_after: "2021-02-31"4212 returns an error4213 created_before: "2021-03-31", created_after: "2021-02-31"4214 returns an error4215 when date range is greater than limit4216 behaves like a date range error is returned4217 created_after: "2021-01-01", created_before: "2021-02-02"4218 returns an error4219 created_after: "2022-01-31", created_before: nil4220 returns an error4221 by user4222 finds the user by id when provided with a entity_id4223 finds the user by username when provided with a entity_username4224Query.project(fullPath).dastScannerProfiles4225 when a user does not have access to the project4226 project response4227 is expected to be nil4228 when the user can run a dast scan4229 dast scanner profiles4230 is expected to be empty4231 when a user has access to multiple projects4232 dast scanner profiles4233 returns only the dast_scanner_profile for the requested project4234 when a user has access dast_scanner_profiles4235 dast scanner profiles4236 is expected not to be empty4237 first dast scanner profile id4238 is expected to eq "gid://gitlab/DastScannerProfile/1"4239Admin::Licenses::UsageExportsController4240 GET show4241 with no current license4242 redirects the user4243 does not update the license usage data exported flag4244 does not attempt to create the CSV4245 with a current license4246 returns a csv file in response4247 returns the expected response body4248 when current license is an offline cloud license4249 updates the license usage data exported flag4250 when current license is an online cloud license4251 does not update the license usage data exported flag4252 when current license is a legacy license4253 does not update the license usage data exported flag4254 when data export fails4255 does not update the license usage data exported flag4256Query.project(fullPath).pipeline(iid).codeQualityReports4257 when pipeline has a code quality report4258 when user is member of the project4259 returns all the code quality degradations4260 returns all the queried fields4261 returns all the queried fields ordered by severity4262 when user is not a member of the project4263 returns no code quality degradations4264 when pipeline does not have a code quality report4265 returns an empty result4266Query.project(fullPath).pipeline(iid).dastProfile4267 when feature is not licensed4268 does not return dast profile data4269 when feature is licensed4270 when user is member of the project4271 returns the dast profile data4272 avoids N+1 queries4273 when user is not member of the project4274 does not return dast profile data4275 when feature flag is not enabled4276 returns the dast profile data4277Deleting an iteration4278 when the user does not have permission4279 behaves like a mutation that returns a top-level access error4280 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4281 when the user has permission4282 when iterations feature is disabled4283 behaves like a mutation that returns top-level errors4284 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4285 when iterations feature is enabled4286 when iteration belongs to a manual cadence4287 deletes the iteration4288 when iteration belongs to an automatic cadence4289 behaves like a mutation that returns top-level errors4290 is expected to contain exactly "Deleting iterations from automatic iteration cadences is not allowed."4291 when required arguments are missing4292 returns error about required argument4293Query.ciMinutesUsage4294 when no namespace_id is provided4295 returns usage data by month for the current user4296 does not create N+1 queries4297 when namespace_id is provided4298 when group is root4299 when user is an owner4300 returns the usage data4301 when user is not an owner4302 does not return usage data4303 when group is a subgroup4304 does not return usage data4305Creation of a new release4306 when the provided milestones include a group milestone4307 when the group milestone association feature is licensed4308 returns no errors4309 creates a release with both project and group milestone associations4310 when the group milestone association feature is not licensed4311 returns an error-as-data field with a message about an invalid license4312Projects::Pipelines::EmailCampaignsController4313 GET #validate_account4314 when user has access to the pipeline4315 emits a snowplow event4316 sets session[:start_account_validation] to true4317 redirects to the pipeline show page4318 when not in .com or dev env4319 returns 4044320 when user does not have access to the pipeline4321 returns :not_found4322 does not set session[:start_account_validation]4323Groups::Analytics::RepositoryAnalyticsController4324 GET show4325 is expected to respond with numeric status code success4326 tracks a pageview event in snowplow4327 when requesting a redirected path4328 redirects to the canonical path4329 when license is missing4330 is expected to respond with numeric status code forbidden4331 when the user has no access to the group4332 is expected to respond with numeric status code forbidden4333 when the user is an auditor4334 is expected to respond with numeric status code success4335Deleting a DAST Profile4336 behaves like an on-demand scan mutation when user cannot run an on-demand scan4337 when a user does not have access to the project4338 behaves like a mutation that returns a top-level access error4339 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4340 when a user does not have access to run a dast scan on the project4341 behaves like a mutation that returns a top-level access error4342 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4343 behaves like an on-demand scan mutation when user can run an on-demand scan4344 returns an empty errors array4345 deletes the dast_profile4346 when on demand scan licensed feature is not available4347 behaves like a mutation that returns a top-level access error4348 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4349Groups::Settings::RepositoryController4350 GET show4351 without push rules feature4352 when user is group owner4353 always allows access4354 when user is not group owner4355 renders 4044356 with push rules feature4357 when user is group maintainer4358 allows access4359 when user is not group maintainer4360 renders 4044361API::CaptchaCheck4362 POST users/captcha_check4363 when the feature flag arkose_labs_login_challenge is disabled4364 does return not found status4365 when the feature flag arkose_labs_login_challenge is enabled4366 when the username is invalid4367 does return 200 OK status to prevent enumeration4368 when the username has a dot4369 does return 200 status4370 when the username is nil4371 does return 200 OK status to prevent enumeration4372 when the username is an array4373 does return 200 OK status to prevent enumeration4374 when the email is valid4375 returns status ok4376 when the email is unknown4377 returns 200 OK status to prevent enumeration4378 when the email is invalid4379 returns 200 OK status to prevent enumeration4380 when the user meets the criteria for the captcha check4381 does return true4382 when the user does not meets the criteria for the captcha check4383 does return true4384 when the user reach the rate limit4385 does return true4386Query.project(fullPath).dastProfile4387 when a user does not have access to the project4388 returns a null project4389 when a user does not have access to the dast_profile4390 returns a null dast_profile4391 when a user has access to the dast_profile4392 returns a dast_profile4393 when on demand scan licensed feature is not available4394 returns a null dast_profile4395Groups::TodosController4396 POST create4397 when epic is not confidential4398 when epics are available4399 behaves like todos actions4400 when authorized4401 creates todo4402 returns todo path and pending count4403 when not authorized for project/group4404 does not create todo for resource that user has no access to4405 does not create todo when user is not logged in4406 when epics are not available4407 behaves like todo for inaccessible resource4408 does not create todo because resource can not be found4409 when the user can not access confidential epic in public group4410 behaves like todo for inaccessible resource4411 does not create todo because resource can not be found4412Projects::IncidentManagement::EscalationPoliciesController4413 # order random4414 GET #index4415 with read permissions4416 renders index with 200 status code4417 with admin permissions4418 renders index with 200 status code4419 unauthorized4420 responds with 4044421 with unavailable feature4422 responds with 4044423 with unavailable on-call schedules feature4424 responds with 4044425Groups::RunnersController4426 #index4427 enables runner_upgrade_management_for_namespace licensed feature4428 when fetching runner releases is disabled4429 does not enable runner_upgrade_management_for_namespace licensed feature4430 #show4431 enables runner_upgrade_management_for_namespace licensed feature4432 when fetching runner releases is disabled4433 does not enable runner_upgrade_management_for_namespace licensed feature4434Groups::Security::DashboardController4435 GET show4436 when security dashboard feature is enabled4437 and user is allowed to access group security dashboard4438 is expected to respond with numeric status code ok4439 when user is not allowed to access group security dashboard4440 is expected to respond with numeric status code ok4441 is expected to render template unavailable4442 when security dashboard feature is disabled4443 is expected to respond with numeric status code ok4444 is expected to render template unavailable4445creating escalation policy4446 # order random4447 successfully creates the policy and rules4448 errors4449 user does not have permission4450 raises an error4451 no rules given4452 raises an error4453 when rules are provided out of order4454 successfully creates the policy and reorders the rules4455Query.vulnerabilities.externalIssueLinks4456 when queried for the first time with reactive caching4457 schedules a background job to fetch data from Jira4458 returns null as value for externalIssue4459 when queried without reactive caching4460 returns a list of all VulnerabilityExternalIssueLink4461API::HelmPackages4462 # order random4463 GET /api/v4/projects/:id/packages/helm/:channel/charts/:file_name.tgz4464 behaves like applying ip restriction for group4465 in group without restriction4466 behaves like returning response status4467 returns ok4468 in group with restriction4469 with address within the range4470 behaves like returning response status4471 returns ok4472 with address outside the range4473 behaves like returning response status4474 returns not_found4475ProfilesController4476 PUT update4477 updating name4478 when `disable_name_update_for_users` feature is available4479 when the ability to update thier name is not disabled for users4480 behaves like a user can update their name4481 updates their name4482 behaves like a user can update their name4483 updates their name4484 when the ability to update their name is disabled for users4485 as a regular user4486 does not update their name4487 as an admin in admin mode4488 behaves like a user can update their name4489 updates their name4490 when `disable_name_update_for_users` feature is not available4491 behaves like a user can update their name4492 updates their name4493 behaves like a user can update their name4494 updates their name4495MergeRequestReviewer4496 when requesting information about MR interactions4497 when the user does not have any applicable rules4498 returns null data4499 when the user has interacted4500 returns appropriate data4501Create a milestone or assignee board list4502 the user is not allowed to read board lists4503 behaves like a mutation that returns a top-level access error4504 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4505 when user has permissions to admin board lists4506 milestone list4507 creates the list4508 assignee list4509 creates the list4510Environments Deployments query4511 # order random4512 when requesting user permissions4513 limits the result4514Projects::ImportsController4515 POST #create4516 mirror user is not the current user4517 only assigns the current user4518API::Ldap4519 GET /ldap/groups4520 when unauthenticated4521 returns authentication error4522 when authenticated as user4523 returns authentication error4524 when group owners are allowed to manage LDAP4525 returns an array of ldap groups4526 when authenticated as admin4527 returns an array of ldap groups4528 GET /ldap/ldapmain/groups4529 when unauthenticated4530 returns authentication error4531 when authenticated as user4532 returns authentication error4533 when group owners are allowed to manage LDAP4534 returns an array of ldap groups4535 when authenticated as admin4536 returns an array of ldap groups4537getting a compliance frameworks list for a project4538 when the project has no compliance framework assigned4539 is an empty array4540 when the project has a compliance framework assigned4541 includes its name4542Mutations::Analytics::DevopsAdoption::EnabledNamespaces::Enable4543 creates the enabled_namespace with the group4544 when the user cannot manage enabled_namespaces4545 behaves like a mutation that returns a top-level access error4546 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4547 when the feature is not available4548 behaves like a mutation that returns a top-level access error4549 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4550Admin::RunnersController4551 #index4552 enables runner_performance_insights and runner_upgrade_management licensed feature4553 when fetching runner releases is disabled4554 enables only runner_performance_insights licensed feature4555 #show4556 enables runner_upgrade_management, runner_maintenance_note licensed features4557 when fetching runner releases is disabled4558 enables only runner_maintenance_note licensed feature4559 #edit4560 enables runner_maintenance_note licensed feature4561Activate a subscription4562 persists license key4563 when there are future subscriptions4564 persists license key and stores future subscriptions4565API::RubygemPackages4566 # order random4567 GET /api/v4/projects/:project_id/packages/rubygems/gems/:file_name4568 behaves like applying ip restriction for group4569 in group without restriction4570 behaves like returning response status4571 returns ok4572 in group with restriction4573 with address within the range4574 behaves like returning response status4575 returns ok4576 with address outside the range4577 behaves like returning response status4578 returns not_found4579Projects::InsightsController4580 # order random4581 POST #query4582 succeeds4583 when statement timeout happens4584 returns error response4585Emails::GroupMemberships4586 #memberships_export_email4587 is expected to have subject of "Exported group membership list"4588 is expected to be delivered to ["user1454@example.org"]4589 contains one attachment4590 properly renders email4591Removing an issuable resource link4592 # order random4593 removes the issuable resource link4594Groups::VariablesController4595 PATCH #update4596 scoped variables are available4597 updates the environment scope4598 scoped variables are not available4599 does not update the environment scope4600GroupMemberBulkUpdate4601 # order random4602 updates the members with minimal access4603Removing an escalation policy4604 # order random4605 removes the escalation policy4606Profiles::PreferencesController4607 PATCH update4608 when security dashboard feature enabled4609 and valid group view choice is submitted4610 changes the user's preferences4611 and an invalid group view choice is submitted4612 responds with an error message4613 when security dashboard feature is disabled4614 when security dashboard feature enabled4615 is expected not to change `user.reload.group_view_security_dashboard?`4616InternalRedirect4617 #host_allowed?4618 allows redirecting to existing geo nodes4619devopsAdoptionEnabledNamespaces4620 returns measurement objects4621Admin::ImpersonationTokensController4622 # order random4623 when impersonation is enabled4624 when personal access tokens are disabled4625 responds with a 4044626Knapsack report was generated. Preview:4627{4628 "ee/spec/controllers/projects/merge_requests_controller_spec.rb": 142.83527385899833,4629 "ee/spec/controllers/operations_controller_spec.rb": 64.48006820800038,4630 "ee/spec/requests/api/issues_spec.rb": 49.4279669209991,4631 "ee/spec/requests/api/releases_spec.rb": 43.19212777699977,4632 "ee/spec/requests/api/project_approval_settings_spec.rb": 31.24081264400047,4633 "ee/spec/requests/api/ldap_group_links_spec.rb": 27.614735646000554,4634 "ee/spec/controllers/groups/analytics/cycle_analytics/summary_controller_spec.rb": 14.543609029000436,4635 "ee/spec/controllers/groups/omniauth_callbacks_controller_spec.rb": 20.576840163999805,4636 "ee/spec/requests/api/project_mirror_spec.rb": 25.307680010000695,4637 "ee/spec/requests/lfs_http_spec.rb": 16.201714236000043,4638 "ee/spec/requests/api/project_push_rule_spec.rb": 11.609676349999063,4639 "ee/spec/controllers/subscriptions_controller_spec.rb": 8.82867953099958,4640 "ee/spec/controllers/projects/clusters_controller_spec.rb": 10.57814160900125,4641 "ee/spec/requests/api/vulnerability_exports_spec.rb": 11.138423616001091,4642 "ee/spec/requests/api/graphql/mutations/work_items/update_spec.rb": 11.571327188001305,4643 "ee/spec/controllers/projects/security/vulnerabilities/notes_controller_spec.rb": 11.443751544000406,4644 "ee/spec/controllers/ldap/omniauth_callbacks_controller_spec.rb": 14.582955032001337,4645 "ee/spec/requests/groups/epics_controller_spec.rb": 13.128011973998582,4646 "ee/spec/requests/api/award_emoji_spec.rb": 7.0188190859989845,4647 "ee/spec/controllers/projects/protected_environments_controller_spec.rb": 8.604961926001124,4648 "ee/spec/controllers/groups/analytics/tasks_by_type_controller_spec.rb": 10.932175846999598,4649 "ee/spec/controllers/projects/security/vulnerabilities_controller_spec.rb": 9.966327281999838,4650 "ee/spec/requests/api/graphql/group/epic/epic_aggregate_query_spec.rb": 6.17135495599905,4651 "ee/spec/requests/api/graphql/project/pipeline/security_report_summary_spec.rb": 8.588344118999885,4652 "ee/spec/requests/api/project_clusters_spec.rb": 8.524080683000648,4653 "ee/spec/requests/trial_registrations_controller_spec.rb": 3.3564381239993963,4654 "ee/spec/requests/api/graphql/boards/boards_query_spec.rb": 7.215360046000569,4655 "ee/spec/requests/api/graphql/boards/board_lists_query_spec.rb": 6.294907522000358,4656 "ee/spec/controllers/projects/deploy_keys_controller_spec.rb": 6.423236475000522,4657 "ee/spec/controllers/concerns/routable_actions_spec.rb": 5.814060049000545,4658 "ee/spec/requests/groups/analytics/dashboards_controller_spec.rb": 5.790975572999741,4659 "ee/spec/requests/api/graphql/mutations/iterations/create_spec.rb": 5.089676435000001,4660 "ee/spec/controllers/ee/sessions_controller_spec.rb": 3.025253679999878,4661 "ee/spec/requests/api/graphql/mutations/requirements_management/update_requirement_spec.rb": 4.607849981000982,4662 "ee/spec/controllers/ee/registrations/welcome_controller_spec.rb": 4.518493440000384,4663 "ee/spec/requests/ee/groups/autocomplete_sources_spec.rb": 5.171951456999523,4664 "ee/spec/requests/api/graphql/mutations/issues/update_spec.rb": 5.4473347019993525,4665 "ee/spec/controllers/concerns/ee/routable_actions/sso_enforcement_redirect_spec.rb": 5.464543627998864,4666 "ee/spec/requests/api/graphql/mutations/security/finding/create_merge_request_spec.rb": 4.893260182001541,4667 "ee/spec/requests/api/graphql/iterations/iterations_spec.rb": 3.535048720001214,4668 "ee/spec/requests/jwt_controller_spec.rb": 4.2254893940007605,4669 "ee/spec/requests/api/graphql/project/pipeline/security_report_finding_spec.rb": 4.902601339999819,4670 "ee/spec/requests/api/member_roles_spec.rb": 2.918392372001108,4671 "ee/spec/requests/api/graphql/audit_events/streaming/headers/update_spec.rb": 4.358334177999495,4672 "ee/spec/requests/api/graphql/project/branch_protections/unprotect_access_levels_spec.rb": 5.636487484000099,4673 "ee/spec/requests/projects/analytics/dashboards_controller_spec.rb": 3.765080504999787,4674 "ee/spec/requests/api/graphql/mutations/projects/initialize_product_analytics_spec.rb": 3.490576799000337,4675 "ee/spec/requests/api/graphql/project/code_coverage_summary_spec.rb": 4.824756044999958,4676 "ee/spec/requests/api/graphql/namespace/projects_spec.rb": 4.127158093999242,4677 "ee/spec/controllers/groups/analytics/cycle_analytics_controller_spec.rb": 4.3104615270003706,4678 "ee/spec/mailers/license_mailer_spec.rb": 2.202264755000215,4679 "ee/spec/controllers/groups/roadmap_controller_spec.rb": 2.909792403999745,4680 "ee/spec/requests/api/graphql/mutations/epics/add_issue_spec.rb": 3.4533593059986742,4681 "ee/spec/controllers/admin/geo/nodes_controller_spec.rb": 3.2010923859998,4682 "ee/spec/requests/api/graphql/mutations/security_policy/commit_scan_execution_policy_spec.rb": 3.996654659000342,4683 "ee/spec/requests/api/graphql/mutations/compliance_management/frameworks/create_spec.rb": 3.1252880319989345,4684 "ee/spec/requests/api/resource_state_events_spec.rb": 3.9161226950000128,4685 "ee/spec/controllers/registrations/verification_controller_spec.rb": 1.4152407800011133,4686 "ee/spec/requests/api/graphql/current_user/groups_query_spec.rb": 3.3510054270009277,4687 "ee/spec/requests/api/graphql/audit_events/streaming/headers/create_spec.rb": 2.6380059469993284,4688 "ee/spec/requests/projects/audit_events_spec.rb": 3.9535595680008555,4689 "ee/spec/controllers/admin/audit_logs_controller_spec.rb": 2.4259781900000235,4690 "ee/spec/requests/api/graphql/project/dast_scanner_profiles_spec.rb": 2.420583770999656,4691 "ee/spec/controllers/admin/licenses/usage_exports_controller_spec.rb": 2.1377302470009454,4692 "ee/spec/requests/api/graphql/project/pipeline/code_quality_reports_spec.rb": 2.724759531000018,4693 "ee/spec/requests/api/graphql/project/pipeline/dast_profile_spec.rb": 3.151623275998645,4694 "ee/spec/requests/api/graphql/mutations/iterations/delete_spec.rb": 2.4099433029987267,4695 "ee/spec/requests/api/graphql/ci/minutes/usage_spec.rb": 2.2288667889988574,4696 "ee/spec/requests/api/graphql/mutations/releases/create_spec.rb": 2.5368447580003703,4697 "ee/spec/requests/projects/pipelines/email_campaigns_controller_spec.rb": 2.63863968700025,4698 "ee/spec/controllers/groups/analytics/repository_analytics_controller_spec.rb": 1.969567060999907,4699 "ee/spec/requests/api/graphql/mutations/dast/profiles/delete_spec.rb": 2.016371870999137,4700 "ee/spec/requests/ee/groups/settings/repository_controller_spec.rb": 2.2053110640008526,4701 "ee/spec/requests/api/captcha_check_spec.rb": 1.4906890949987428,4702 "ee/spec/requests/api/graphql/project/dast_profile_spec.rb": 2.598343866000505,4703 "ee/spec/controllers/groups/todos_controller_spec.rb": 1.979663227999481,4704 "ee/spec/controllers/projects/incident_management/escalation_policies_controller_spec.rb": 2.224964238999746,4705 "ee/spec/controllers/groups/runners_controller_spec.rb": 1.7470478439990984,4706 "ee/spec/controllers/groups/security/dashboard_controller_spec.rb": 1.6179570999993302,4707 "ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/create_spec.rb": 2.1328793180000503,4708 "ee/spec/requests/api/graphql/vulnerabilities/external_issue_links_spec.rb": 2.152426094000475,4709 "ee/spec/requests/api/helm_packages_spec.rb": 1.5415118349992554,4710 "ee/spec/controllers/profiles_controller_spec.rb": 1.1551424709996354,4711 "ee/spec/requests/api/graphql/merge_request_reviewer_spec.rb": 1.9521248940000078,4712 "ee/spec/requests/api/graphql/mutations/boards/lists/create_spec.rb": 1.6567334219998884,4713 "ee/spec/requests/api/graphql/environments/deployments_spec.rb": 1.693823435000013,4714 "ee/spec/controllers/projects/imports_controller_spec.rb": 1.1059986509990267,4715 "ee/spec/requests/api/ldap_spec.rb": 1.0881034340000042,4716 "ee/spec/requests/api/graphql/project/compliance_frameworks_spec.rb": 1.374630618000083,4717 "ee/spec/requests/api/graphql/mutations/analytics/devops_adoption/enabled_namespaces/enable_spec.rb": 1.3029545820008934,4718 "ee/spec/controllers/admin/runners_controller_spec.rb": 0.7166025690003153,4719 "ee/spec/requests/api/graphql/mutations/gitlab_subscriptions/activate_spec.rb": 1.591510885000389,4720 "ee/spec/requests/api/rubygem_packages_spec.rb": 1.487436245999561,4721 "ee/spec/requests/projects/insights_controller_spec.rb": 1.1471837129993219,4722 "ee/spec/mailers/emails/group_memberships_spec.rb": 0.8637368089985102,4723 "ee/spec/requests/api/graphql/mutations/incident_management/issuable_resource_link/destroy_spec.rb": 1.104823612000473,4724 "ee/spec/controllers/ee/groups/variables_controller_spec.rb": 0.9417327539995313,4725 "ee/spec/requests/api/graphql/mutations/members/groups/ee/bulk_update_spec.rb": 1.2123675100010587,4726 "ee/spec/requests/api/graphql/mutations/incident_management/escalation_policy/destroy_spec.rb": 0.8180621289993724,4727 "ee/spec/controllers/ee/profiles/preferences_controller_spec.rb": 0.7302904360003595,4728 "ee/spec/controllers/concerns/internal_redirect_spec.rb": 0.5421386819998588,4729 "ee/spec/requests/api/graphql/analytics/devops_adoption/enabled_namespaces_spec.rb": 0.6292019259999506,4730 "ee/spec/requests/admin/impersonation_tokens_controller_spec.rb": 0.65278572100032764731}4732Knapsack global time execution for tests: 13m 31s4733Finished in 13 minutes 36 seconds (files took 1 minute 5.21 seconds to load)47341505 examples, 0 failures4735Randomized with seed 5064736[TEST PROF INFO] Time spent in factories: 05:54.165 (42.01% of total time)4737RSpec exited with 0.4738No examples to retry, congrats!4740Not uploading cache ruby-gems-debian-bullseye-ruby-3.0-16 due to policy4741Not uploading cache gitaly-ruby-gems-debian-bullseye-ruby-3.0-16 due to policy4743Uploading artifacts...4744coverage/: found 5 matching artifact files and directories 4745crystalball/: found 2 matching artifact files and directories 4746deprecations/: found 7 matching artifact files and directories 4747knapsack/: found 3 matching artifact files and directories 4748WARNING: query_recorder/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab) 4749rspec/: found 14 matching artifact files and directories 4750WARNING: tmp/capybara/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab) 4751log/*.log: found 15 matching artifact files and directories 4752WARNING: Upload request redirected location=https://gitlab.com/api/v4/jobs/4031139349/artifacts?artifact_format=zip&artifact_type=archive&expire_in=31d new-url=https://gitlab.com4753WARNING: Retrying... context=artifacts-uploader error=request redirected4754Uploading artifacts as "archive" to coordinator... 201 Created id=4031139349 responseStatus=201 Created token=64_eFM2d4755Uploading artifacts...4756rspec/junit_rspec.xml: found 1 matching artifact files and directories 4757WARNING: Upload request redirected location=https://gitlab.com/api/v4/jobs/4031139349/artifacts?artifact_format=gzip&artifact_type=junit&expire_in=31d new-url=https://gitlab.com4758WARNING: Retrying... context=artifacts-uploader error=request redirected4759Uploading artifacts as "junit" to coordinator... 201 Created id=4031139349 responseStatus=201 Created token=64_eFM2d4761Job succeeded