rspec-ee unit pg13 16/18
Passed Started
by
@alipniagov

Aleksei Lipniagov
1Running with gitlab-runner 15.9.0~beta.115.g598a7c91 (598a7c91)2 on green-2.shared-gitlab-org.runners-manager.gitlab.com/default 8zCxmpPt, system ID: s_130a96ce9e653 feature flags: FF_NETWORK_PER_BUILD:true, FF_USE_FASTZIP:true, FF_USE_IMPROVED_URL_MASKING:true6Using Docker executor with image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.19-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 ...7Starting service postgres:13 ...8Pulling docker image postgres:13 ...9Using docker image sha256:ab3945c8cf7160ed1381efd47c6a203ba9a84fc7327a17e4a389601eb3738b3b for postgres:13 with digest postgres@sha256:67edfda7deeecfda8e40c9b00818eae76573a9e9466ba7edbc536662d128173b ...10Starting service redis:6.2-alpine ...11Pulling docker image redis:6.2-alpine ...12Using docker image sha256:3616f0c0705d2a35d30dde109daf3cbe58ae7284121aafa6f5cfa987db98d1a8 for redis:6.2-alpine with digest redis@sha256:63e95f069a7ee668f1fcd0b0f8865e473510f98b56e5db4c8517d6cfbd073470 ...13Starting service elasticsearch:7.17.6 ...14Pulling docker image elasticsearch:7.17.6 ...15Using docker image sha256:5fad10241ffd65d817ed0ddfaf6e87eee1f7dc2a7db33db1047835560ea71fda for elasticsearch:7.17.6 with digest elasticsearch@sha256:6c128de5d01c0c130a806022d6bd99b3e4c27a9af5bfc33b6b81861ae117d028 ...16Starting service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 ...17Authenticating with credentials from job payload (GitLab Registry)18Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 ...19Using docker image sha256:4777ec1fa89def7d692d4979d05cb05234df25da1c6a3f67a564a433ec5ba1c8 for registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:80c0cee4566aefe4f1f287e1091263e08b0ebc41ed3dc4e76930df3634ccb9aa ...20Waiting for services to be up and running (timeout 30 seconds)...21Authenticating with credentials from job payload (GitLab Registry)22Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.19-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 ...23Using docker image sha256:667531aab48d3d73584a6ae24a2aea1de3972ab11b24d34d65740089d1635940 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.19-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.19-rust-1.65-node-16.14-postgresql-13@sha256:32a5178f22d0b62740cacea13dc02b6d5a1c9528c0a9af52124abe4455dd0a15 ...25Running on runner-8zcxmppt-project-278964-concurrent-0 via runner-8zcxmppt-shared-gitlab-org-1681308054-4f1f042a...27$ eval "$CI_PRE_CLONE_SCRIPT"28Fetching changes with git depth set to 20...29Initialized empty Git repository in /builds/gitlab-org/gitlab/.git/30Created fresh repository.31remote: Enumerating objects: 141454, done. 32remote: Counting objects: 100% (141454/141454), done. 33remote: Compressing objects: 100% (90405/90405), done. 34remote: Total 141454 (delta 62786), reused 98969 (delta 45741), pack-reused 0 35Receiving objects: 100% (141454/141454), 122.89 MiB | 33.73 MiB/s, done.36Resolving deltas: 100% (62786/62786), done.38 * [new ref] refs/pipelines/835170457 -> refs/pipelines/83517045739Checking out aa21306d as detached HEAD (ref is refs/merge-requests/116974/merge)...40Skipping Git submodules setup41$ git remote set-url origin "${CI_REPOSITORY_URL}"43Checking cache for ruby-gems-debian-bullseye-ruby-3.0-16...44Downloading cache.zip from https://storage.googleapis.com/gitlab-com-runners-cache/project/278964/ruby-gems-debian-bullseye-ruby-3.0-16 45Successfully extracted cache46Checking cache for gitaly-ruby-gems-debian-bullseye-ruby-3.0-16...47Downloading cache.zip from https://storage.googleapis.com/gitlab-com-runners-cache/project/278964/gitaly-ruby-gems-debian-bullseye-ruby-3.0-16 48Successfully extracted cache50Downloading artifacts for compile-test-assets (4101394559)...51Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4101394559 responseStatus=200 OK token=64_f488r52Downloading artifacts for detect-tests (4101394577)...53Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4101394577 responseStatus=200 OK token=64_f488r54Downloading artifacts for retrieve-tests-metadata (4101394581)...55Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4101394581 responseStatus=200 OK token=64_f488r56Downloading artifacts for setup-test-env (4101394571)...57Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4101394571 responseStatus=200 OK token=64_f488r59Using docker image sha256:667531aab48d3d73584a6ae24a2aea1de3972ab11b24d34d65740089d1635940 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.19-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.19-rust-1.65-node-16.14-postgresql-13@sha256:32a5178f22d0b62740cacea13dc02b6d5a1c9528c0a9af52124abe4455dd0a15 ...60$ echo $FOSS_ONLY61$ [ "$FOSS_ONLY" = "1" ] && rm -rf ee/ qa/spec/ee/ qa/qa/specs/features/ee/ qa/qa/ee/ qa/qa/ee.rb62$ export GOPATH=$CI_PROJECT_DIR/.go63$ mkdir -p $GOPATH64$ source scripts/utils.sh65$ source scripts/prepare_build.sh718Using decomposed database config (config/database.yml.decomposed-postgresql)719Geo DB will be set up.720$ setup_db_user_only721CREATE ROLE722GRANT723==> 'setup_db_user_only' succeeded in 0 seconds.724$ bundle exec rake db:drop db:create db:schema:load db:migrate gitlab:db:lock_writes725Dropped database 'gitlabhq_test'726Dropped database 'gitlabhq_test_ci'727Dropped database 'gitlabhq_geo_test'728Created database 'gitlabhq_test'729Created database 'gitlabhq_test_ci'730Created database 'gitlabhq_geo_test'731main: == [advisory_lock_connection] object_id: 274240, pg_backend_pid: 109732main: == [advisory_lock_connection] object_id: 274240, pg_backend_pid: 109733ci: == [advisory_lock_connection] object_id: 274340, pg_backend_pid: 111734ci: == [advisory_lock_connection] object_id: 274340, pg_backend_pid: 111735geo: == [advisory_lock_connection] object_id: 274420, pg_backend_pid: 113736geo: == [advisory_lock_connection] object_id: 274420, pg_backend_pid: 113737==> 'bundle exec rake db:drop db:create db:schema:load db:migrate gitlab:db:lock_writes' succeeded in 53 seconds.738$ setup_db_praefect739SELECT pg_catalog.set_config('search_path', '', false);740CREATE DATABASE praefect_test ENCODING 'UTF8';741$ source ./scripts/rspec_helpers.sh742==> 'setup_db_praefect' succeeded in 0 seconds.743$ run_timed_command "gem install knapsack --no-document"744$ gem install knapsack --no-document745Successfully installed knapsack-4.0.07461 gem installed747==> 'gem install knapsack --no-document' succeeded in 0 seconds.748$ echo -e "\e[0Ksection_start:`date +%s`:gitaly-test-spawn[collapsed=true]\r\e[0KStarting Gitaly"768$ rspec_paralellized_job "--tag ~quarantine --tag ~level:background_migration"769SKIP_FLAKY_TESTS_AUTOMATICALLY: false770RETRY_FAILED_TESTS_IN_NEW_PROCESS: true771KNAPSACK_GENERATE_REPORT: true772FLAKY_RSPEC_GENERATE_REPORT: true773KNAPSACK_TEST_FILE_PATTERN: {ee/}spec/{bin,channels,components,config,contracts,db,dependencies,elastic,elastic_integration,experiments,factories,finders,frontend,graphql,haml_lint,helpers,initializers,lib,metrics_server,models,policies,presenters,rack_servers,replicators,routing,rubocop,scripts,serializers,services,sidekiq,sidekiq_cluster,spam,support_specs,tasks,uploaders,validators,views,workers,tooling}{,/**/}*_spec.rb774KNAPSACK_LOG_LEVEL: debug775KNAPSACK_REPORT_PATH: knapsack/rspec-ee_unit_pg13_16_18_report.json776FLAKY_RSPEC_SUITE_REPORT_PATH: rspec/flaky/report-suite.json777FLAKY_RSPEC_REPORT_PATH: rspec/flaky/all_rspec-ee_unit_pg13_16_18_report.json778NEW_FLAKY_RSPEC_REPORT_PATH: rspec/flaky/new_rspec-ee_unit_pg13_16_18_report.json779SKIPPED_FLAKY_TESTS_REPORT_PATH: rspec/flaky/skipped_flaky_tests_rspec-ee_unit_pg13_16_18_report.txt780CRYSTALBALL: 781Knapsack node specs:782ee/spec/services/ee/notification_service_spec.rb783ee/spec/lib/gitlab/insights/finders/issuable_finder_spec.rb784ee/spec/policies/group_policy_spec.rb785ee/spec/models/geo/merge_request_diff_registry_spec.rb786ee/spec/tasks/gitlab/seed/group_seed_rake_spec.rb787ee/spec/services/projects/update_mirror_service_spec.rb788ee/spec/services/projects/update_service_spec.rb789ee/spec/lib/ee/gitlab/middleware/read_only_spec.rb790ee/spec/policies/epic_policy_spec.rb791ee/spec/services/epics/issue_promote_service_spec.rb792ee/spec/lib/gitlab/background_migration/remove_all_trace_expiration_dates_spec.rb793ee/spec/services/ee/notes/quick_actions_service_spec.rb794ee/spec/models/vulnerabilities/stat_diff_spec.rb795ee/spec/models/namespaces/storage/root_size_spec.rb796ee/spec/services/todo_service_spec.rb797ee/spec/services/approval_rules/params_filtering_service_spec.rb798ee/spec/elastic/migrate/20220825102900_backfill_label_ids_for_issues_spec.rb799ee/spec/services/vulnerability_external_issue_links/create_service_spec.rb800ee/spec/services/security/sync_license_scanning_rules_service_spec.rb801ee/spec/graphql/resolvers/requirements_management/requirements_resolver_spec.rb802ee/spec/lib/gitlab/analytics/cycle_analytics/summary/stage_time_summary_spec.rb803ee/spec/models/ee/audit_event_spec.rb804ee/spec/services/vulnerabilities/finding_dismiss_service_spec.rb805ee/spec/policies/global_policy_spec.rb806ee/spec/models/dast/profile_spec.rb807ee/spec/models/slack_integration_spec.rb808ee/spec/lib/gitlab/geo/log_cursor/events/design_repository_updated_event_spec.rb809ee/spec/graphql/resolvers/geo/pipeline_artifact_registries_resolver_spec.rb810ee/spec/lib/gitlab/licenses/submit_license_usage_data_banner_spec.rb811ee/spec/services/security/findings/dismiss_service_spec.rb812ee/spec/models/project_ci_cd_setting_spec.rb813ee/spec/graphql/resolvers/vulnerabilities_resolver_spec.rb814ee/spec/services/groups/destroy_service_spec.rb815ee/spec/services/ee/members/update_service_spec.rb816ee/spec/lib/ee/gitlab/checks/push_rules/branch_check_spec.rb817ee/spec/workers/elastic_delete_project_worker_spec.rb818ee/spec/models/packages/package_file_spec.rb819ee/spec/services/security/security_orchestration_policies/policy_commit_service_spec.rb820ee/spec/services/app_sec/dast/profiles/create_service_spec.rb821ee/spec/lib/gitlab/ci/minutes/runners_availability_spec.rb822ee/spec/workers/sync_seat_link_request_worker_spec.rb823ee/spec/services/security/store_scan_service_spec.rb824ee/spec/helpers/ee/personal_access_tokens_helper_spec.rb825ee/spec/helpers/groups/security_features_helper_spec.rb826ee/spec/graphql/mutations/projects/set_locked_spec.rb827ee/spec/services/security/ingestion/tasks/ingest_finding_signatures_spec.rb828ee/spec/services/geo/metrics_update_service_spec.rb829ee/spec/elastic_integration/repository_index_spec.rb830ee/spec/lib/ee/gitlab/group_search_results_spec.rb831ee/spec/policies/saml_provider_policy_spec.rb832ee/spec/services/security/ingestion/tasks/ingest_finding_identifiers_spec.rb833ee/spec/finders/template_finder_spec.rb834ee/spec/workers/ee/repository_check/batch_worker_spec.rb835ee/spec/models/projects/all_protected_branches_rule_spec.rb836ee/spec/graphql/resolvers/geo/dependency_proxy_blob_registries_resolver_spec.rb837ee/spec/workers/project_template_export_worker_spec.rb838ee/spec/graphql/resolvers/user_notes_count_resolver_spec.rb839ee/spec/lib/gitlab/ci/reports/security/locations/cluster_image_scanning_spec.rb840ee/spec/services/merge_requests/capture_suggested_reviewers_accepted_service_spec.rb841ee/spec/lib/gitlab/ci/pipeline/chain/limit/activity_spec.rb842ee/spec/services/boards/epics/create_service_spec.rb843ee/spec/services/groups/mark_for_deletion_service_spec.rb844ee/spec/services/ee/members/invite_service_spec.rb845ee/spec/services/ci/process_pipeline_service_spec.rb846ee/spec/lib/gitlab/license_scanning_spec.rb847ee/spec/lib/gitlab/mirror_spec.rb848ee/spec/services/app_sec/dast/scanner_profiles/destroy_service_spec.rb849ee/spec/services/ee/post_receive_service_spec.rb850ee/spec/graphql/types/vulnerability_detail_type_spec.rb851ee/spec/models/incident_management/pending_escalations/alert_spec.rb852ee/spec/services/audit_events/build_service_spec.rb853ee/spec/graphql/types/dast_scanner_profile_type_spec.rb854ee/spec/finders/approval_rules/group_finder_spec.rb855ee/spec/lib/ee/gitlab/usage_data_counters/issue_activity_unique_counter_spec.rb856ee/spec/workers/namespaces/sync_namespace_name_worker_spec.rb857ee/spec/lib/system_check/geo/current_node_check_spec.rb858ee/spec/views/vulnerabilities/issue_description.md_spec.rb859ee/spec/services/projects/after_rename_service_spec.rb860ee/spec/lib/elastic/multi_version_instance_proxy_spec.rb861ee/spec/lib/elastic/latest/user_instance_proxy_spec.rb862ee/spec/services/namespaces/free_user_cap/notify_over_limit_service_spec.rb863ee/spec/lib/gitlab/geo/oauth/session_spec.rb864ee/spec/services/projects/deregister_suggested_reviewers_project_service_spec.rb865ee/spec/models/dast/profiles_pipeline_spec.rb866ee/spec/finders/incident_management/escalation_rules_finder_spec.rb867ee/spec/workers/elastic_index_bulk_cron_worker_spec.rb868ee/spec/lib/gitlab/usage/metrics/instrumentations/count_external_status_checks_metric_spec.rb869ee/spec/workers/gitlab_subscriptions/refresh_seats_worker_spec.rb870ee/spec/graphql/types/asset_type_spec.rb871ee/spec/models/vulnerabilities/finding_link_spec.rb872ee/spec/models/dast/pre_scan_verification_step_spec.rb873ee/spec/serializers/ee/issue_entity_spec.rb874ee/spec/services/vulnerabilities/statistics/update_service_spec.rb875ee/spec/lib/gitlab/sidekiq_config_spec.rb876ee/spec/services/users/captcha_challenge_service_spec.rb877ee/spec/services/projects/import_service_spec.rb878ee/spec/services/projects/setup_ci_cd_spec.rb879ee/spec/services/users_ops_dashboard_projects/destroy_service_spec.rb880ee/spec/finders/security/approval_groups_finder_spec.rb881ee/spec/services/app_sec/fuzzing/coverage/corpuses/create_service_spec.rb882ee/spec/workers/deployments/approval_worker_spec.rb883ee/spec/services/security/scanned_resources_service_spec.rb884ee/spec/services/namespaces/in_product_marketing_emails_service_spec.rb885ee/spec/lib/elastic/latest/custom_language_analyzers_spec.rb886ee/spec/views/clusters/clusters/show.html.haml_spec.rb887ee/spec/graphql/types/sbom/dependency_type_spec.rb888ee/spec/finders/dast_scanner_profiles_finder_spec.rb889ee/spec/workers/search/project_index_integrity_worker_spec.rb890ee/spec/lib/gitlab/ci/templates/dast_runner_validation_gitlab_ci_yaml_spec.rb891ee/spec/workers/active_user_count_threshold_worker_spec.rb892ee/spec/lib/ee/sidebars/your_work/menus/security_dashboard_menu_spec.rb893ee/spec/serializers/ee/group_child_entity_spec.rb894ee/spec/lib/ee/api/helpers/issues_helpers_spec.rb895ee/spec/lib/bulk_imports/projects/pipelines/push_rule_pipeline_spec.rb896ee/spec/workers/ldap_all_groups_sync_worker_spec.rb897ee/spec/finders/boards/users_finder_spec.rb898ee/spec/serializers/metrics_report_metric_entity_spec.rb899ee/spec/services/users/update_highest_member_role_service_spec.rb900ee/spec/components/namespaces/free_user_cap/notification_alert_component_spec.rb901ee/spec/services/ee/groups/group_links/destroy_service_spec.rb902ee/spec/services/geo/repository_base_sync_service_spec.rb903ee/spec/helpers/admin/emails_helper_spec.rb904ee/spec/graphql/mutations/incident_management/oncall_schedule/destroy_spec.rb905ee/spec/workers/analytics/cycle_analytics/reaggregation_worker_spec.rb906ee/spec/helpers/admin/ip_restriction_helper_spec.rb907ee/spec/models/ee/appearance_spec.rb908ee/spec/routing/operations_routing_spec.rb909ee/spec/models/geo/hashed_storage_migrated_event_spec.rb910ee/spec/lib/ee/gitlab/verify/uploads_spec.rb911ee/spec/graphql/mutations/boards/epic_boards/update_spec.rb912ee/spec/helpers/ee/ci/pipeline_editor_helper_spec.rb913ee/spec/views/subscriptions/buy_storage.html.haml_spec.rb914ee/spec/presenters/ci/build_presenter_spec.rb915ee/spec/services/geo/container_repository_registry_removal_service_spec.rb916ee/spec/services/security/configuration/save_auto_fix_service_spec.rb917ee/spec/helpers/ee/projects/security/sast_configuration_helper_spec.rb918ee/spec/services/users/abuse/namespace_bans/create_service_spec.rb919ee/spec/finders/analytics/devops_adoption/snapshots_finder_spec.rb920ee/spec/models/user_preference_spec.rb921ee/spec/helpers/trial_status_widget_helper_spec.rb922ee/spec/services/audit_events/release_artifacts_downloaded_audit_event_service_spec.rb923ee/spec/lib/gitlab/audit/levels/instance_spec.rb924ee/spec/services/elastic/metrics_update_service_spec.rb925ee/spec/models/ee/system_note_metadata_spec.rb926ee/spec/services/applications/create_service_spec.rb927ee/spec/lib/ee/gitlab/auth/ldap/access_levels_spec.rb928ee/spec/models/concerns/projects/custom_branch_rule_spec.rb929ee/spec/views/shared/web_hooks/_group_web_hook_disabled_alert.html.haml_spec.rb930ee/spec/lib/elastic/latest/user_config_spec.rb931ee/spec/workers/geo/verification_batch_worker_spec.rb932ee/spec/presenters/ee/instance_clusterable_presenter_spec.rb933ee/spec/lib/gitlab/geo/log_cursor/events/repositories_changed_event_spec.rb934ee/spec/services/emails/destroy_service_spec.rb935ee/spec/lib/gitlab/import_export/group/group_and_descendants_repo_saver_spec.rb936ee/spec/views/admin/application_settings/_git_abuse_rate_limit.html.haml_spec.rb937ee/spec/lib/ee/gitlab/auth/ldap/config_spec.rb938ee/spec/graphql/types/geo/terraform_state_version_registry_type_spec.rb939ee/spec/models/elastic/reindexing_subtask_spec.rb940ee/spec/services/keys/create_service_spec.rb941ee/spec/graphql/types/path_lock_type_spec.rb942ee/spec/services/epics/base_service_spec.rb943ee/spec/lib/gitlab/bullet/exclusions_spec.rb944ee/spec/graphql/types/health_status_enum_spec.rb945ee/spec/routing/projects/security/configuration_controller_routing_spec.rb946ee/spec/lib/gitlab/ci/reports/metrics/report_spec.rb947ee/spec/lib/ee/gitlab/event_store_spec.rb948ee/spec/graphql/types/scanned_resource_type_spec.rb949ee/spec/lib/gitlab/ci/reports/coverage_fuzzing/report_spec.rb950ee/spec/graphql/types/dast/scan_method_type_enum_spec.rb951ee/spec/graphql/ee/types/branch_protections/push_access_level_type_spec.rb952ee/spec/lib/gem_extensions/elasticsearch/model/indexing/instance_methods_spec.rb953ee/spec/models/milestone_spec.rb954ee/spec/lib/gitlab/email/feature_flag_wrapper_spec.rb955ee/spec/serializers/security/vulnerability_report_data_serializer_spec.rb956ee/spec/graphql/types/vulnerability_details/base_type_spec.rb957Filter specs:958Running specs:959Running all node tests without filter960ee/spec/services/ee/notification_service_spec.rb961ee/spec/lib/gitlab/insights/finders/issuable_finder_spec.rb962ee/spec/policies/group_policy_spec.rb963ee/spec/models/geo/merge_request_diff_registry_spec.rb964ee/spec/tasks/gitlab/seed/group_seed_rake_spec.rb965ee/spec/services/projects/update_mirror_service_spec.rb966ee/spec/services/projects/update_service_spec.rb967ee/spec/lib/ee/gitlab/middleware/read_only_spec.rb968ee/spec/policies/epic_policy_spec.rb969ee/spec/services/epics/issue_promote_service_spec.rb970ee/spec/lib/gitlab/background_migration/remove_all_trace_expiration_dates_spec.rb971ee/spec/services/ee/notes/quick_actions_service_spec.rb972ee/spec/models/vulnerabilities/stat_diff_spec.rb973ee/spec/models/namespaces/storage/root_size_spec.rb974ee/spec/services/todo_service_spec.rb975ee/spec/services/approval_rules/params_filtering_service_spec.rb976ee/spec/elastic/migrate/20220825102900_backfill_label_ids_for_issues_spec.rb977ee/spec/services/vulnerability_external_issue_links/create_service_spec.rb978ee/spec/services/security/sync_license_scanning_rules_service_spec.rb979ee/spec/graphql/resolvers/requirements_management/requirements_resolver_spec.rb980ee/spec/lib/gitlab/analytics/cycle_analytics/summary/stage_time_summary_spec.rb981ee/spec/models/ee/audit_event_spec.rb982ee/spec/services/vulnerabilities/finding_dismiss_service_spec.rb983ee/spec/policies/global_policy_spec.rb984ee/spec/models/dast/profile_spec.rb985ee/spec/models/slack_integration_spec.rb986ee/spec/lib/gitlab/geo/log_cursor/events/design_repository_updated_event_spec.rb987ee/spec/graphql/resolvers/geo/pipeline_artifact_registries_resolver_spec.rb988ee/spec/lib/gitlab/licenses/submit_license_usage_data_banner_spec.rb989ee/spec/services/security/findings/dismiss_service_spec.rb990ee/spec/models/project_ci_cd_setting_spec.rb991ee/spec/graphql/resolvers/vulnerabilities_resolver_spec.rb992ee/spec/services/groups/destroy_service_spec.rb993ee/spec/services/ee/members/update_service_spec.rb994ee/spec/lib/ee/gitlab/checks/push_rules/branch_check_spec.rb995ee/spec/workers/elastic_delete_project_worker_spec.rb996ee/spec/models/packages/package_file_spec.rb997ee/spec/services/security/security_orchestration_policies/policy_commit_service_spec.rb998ee/spec/services/app_sec/dast/profiles/create_service_spec.rb999ee/spec/lib/gitlab/ci/minutes/runners_availability_spec.rb1000ee/spec/workers/sync_seat_link_request_worker_spec.rb1001ee/spec/services/security/store_scan_service_spec.rb1002ee/spec/helpers/ee/personal_access_tokens_helper_spec.rb1003ee/spec/helpers/groups/security_features_helper_spec.rb1004ee/spec/graphql/mutations/projects/set_locked_spec.rb1005ee/spec/services/security/ingestion/tasks/ingest_finding_signatures_spec.rb1006ee/spec/services/geo/metrics_update_service_spec.rb1007ee/spec/elastic_integration/repository_index_spec.rb1008ee/spec/lib/ee/gitlab/group_search_results_spec.rb1009ee/spec/policies/saml_provider_policy_spec.rb1010ee/spec/services/security/ingestion/tasks/ingest_finding_identifiers_spec.rb1011ee/spec/finders/template_finder_spec.rb1012ee/spec/workers/ee/repository_check/batch_worker_spec.rb1013ee/spec/models/projects/all_protected_branches_rule_spec.rb1014ee/spec/graphql/resolvers/geo/dependency_proxy_blob_registries_resolver_spec.rb1015ee/spec/workers/project_template_export_worker_spec.rb1016ee/spec/graphql/resolvers/user_notes_count_resolver_spec.rb1017ee/spec/lib/gitlab/ci/reports/security/locations/cluster_image_scanning_spec.rb1018ee/spec/services/merge_requests/capture_suggested_reviewers_accepted_service_spec.rb1019ee/spec/lib/gitlab/ci/pipeline/chain/limit/activity_spec.rb1020ee/spec/services/boards/epics/create_service_spec.rb1021ee/spec/services/groups/mark_for_deletion_service_spec.rb1022ee/spec/services/ee/members/invite_service_spec.rb1023ee/spec/services/ci/process_pipeline_service_spec.rb1024ee/spec/lib/gitlab/license_scanning_spec.rb1025ee/spec/lib/gitlab/mirror_spec.rb1026ee/spec/services/app_sec/dast/scanner_profiles/destroy_service_spec.rb1027ee/spec/services/ee/post_receive_service_spec.rb1028ee/spec/graphql/types/vulnerability_detail_type_spec.rb1029ee/spec/models/incident_management/pending_escalations/alert_spec.rb1030ee/spec/services/audit_events/build_service_spec.rb1031ee/spec/graphql/types/dast_scanner_profile_type_spec.rb1032ee/spec/finders/approval_rules/group_finder_spec.rb1033ee/spec/lib/ee/gitlab/usage_data_counters/issue_activity_unique_counter_spec.rb1034ee/spec/workers/namespaces/sync_namespace_name_worker_spec.rb1035ee/spec/lib/system_check/geo/current_node_check_spec.rb1036ee/spec/views/vulnerabilities/issue_description.md_spec.rb1037ee/spec/services/projects/after_rename_service_spec.rb1038ee/spec/lib/elastic/multi_version_instance_proxy_spec.rb1039ee/spec/lib/elastic/latest/user_instance_proxy_spec.rb1040ee/spec/services/namespaces/free_user_cap/notify_over_limit_service_spec.rb1041ee/spec/lib/gitlab/geo/oauth/session_spec.rb1042ee/spec/services/projects/deregister_suggested_reviewers_project_service_spec.rb1043ee/spec/models/dast/profiles_pipeline_spec.rb1044ee/spec/finders/incident_management/escalation_rules_finder_spec.rb1045ee/spec/workers/elastic_index_bulk_cron_worker_spec.rb1046ee/spec/lib/gitlab/usage/metrics/instrumentations/count_external_status_checks_metric_spec.rb1047ee/spec/workers/gitlab_subscriptions/refresh_seats_worker_spec.rb1048ee/spec/graphql/types/asset_type_spec.rb1049ee/spec/models/vulnerabilities/finding_link_spec.rb1050ee/spec/models/dast/pre_scan_verification_step_spec.rb1051ee/spec/serializers/ee/issue_entity_spec.rb1052ee/spec/services/vulnerabilities/statistics/update_service_spec.rb1053ee/spec/lib/gitlab/sidekiq_config_spec.rb1054ee/spec/services/users/captcha_challenge_service_spec.rb1055ee/spec/services/projects/import_service_spec.rb1056ee/spec/services/projects/setup_ci_cd_spec.rb1057ee/spec/services/users_ops_dashboard_projects/destroy_service_spec.rb1058ee/spec/finders/security/approval_groups_finder_spec.rb1059ee/spec/services/app_sec/fuzzing/coverage/corpuses/create_service_spec.rb1060ee/spec/workers/deployments/approval_worker_spec.rb1061ee/spec/services/security/scanned_resources_service_spec.rb1062ee/spec/services/namespaces/in_product_marketing_emails_service_spec.rb1063ee/spec/lib/elastic/latest/custom_language_analyzers_spec.rb1064ee/spec/views/clusters/clusters/show.html.haml_spec.rb1065ee/spec/graphql/types/sbom/dependency_type_spec.rb1066ee/spec/finders/dast_scanner_profiles_finder_spec.rb1067ee/spec/workers/search/project_index_integrity_worker_spec.rb1068ee/spec/lib/gitlab/ci/templates/dast_runner_validation_gitlab_ci_yaml_spec.rb1069ee/spec/workers/active_user_count_threshold_worker_spec.rb1070ee/spec/lib/ee/sidebars/your_work/menus/security_dashboard_menu_spec.rb1071ee/spec/serializers/ee/group_child_entity_spec.rb1072ee/spec/lib/ee/api/helpers/issues_helpers_spec.rb1073ee/spec/lib/bulk_imports/projects/pipelines/push_rule_pipeline_spec.rb1074ee/spec/workers/ldap_all_groups_sync_worker_spec.rb1075ee/spec/finders/boards/users_finder_spec.rb1076ee/spec/serializers/metrics_report_metric_entity_spec.rb1077ee/spec/services/users/update_highest_member_role_service_spec.rb1078ee/spec/components/namespaces/free_user_cap/notification_alert_component_spec.rb1079ee/spec/services/ee/groups/group_links/destroy_service_spec.rb1080ee/spec/services/geo/repository_base_sync_service_spec.rb1081ee/spec/helpers/admin/emails_helper_spec.rb1082ee/spec/graphql/mutations/incident_management/oncall_schedule/destroy_spec.rb1083ee/spec/workers/analytics/cycle_analytics/reaggregation_worker_spec.rb1084ee/spec/helpers/admin/ip_restriction_helper_spec.rb1085ee/spec/models/ee/appearance_spec.rb1086ee/spec/routing/operations_routing_spec.rb1087ee/spec/models/geo/hashed_storage_migrated_event_spec.rb1088ee/spec/lib/ee/gitlab/verify/uploads_spec.rb1089ee/spec/graphql/mutations/boards/epic_boards/update_spec.rb1090ee/spec/helpers/ee/ci/pipeline_editor_helper_spec.rb1091ee/spec/views/subscriptions/buy_storage.html.haml_spec.rb1092ee/spec/presenters/ci/build_presenter_spec.rb1093ee/spec/services/geo/container_repository_registry_removal_service_spec.rb1094ee/spec/services/security/configuration/save_auto_fix_service_spec.rb1095ee/spec/helpers/ee/projects/security/sast_configuration_helper_spec.rb1096ee/spec/services/users/abuse/namespace_bans/create_service_spec.rb1097ee/spec/finders/analytics/devops_adoption/snapshots_finder_spec.rb1098ee/spec/models/user_preference_spec.rb1099ee/spec/helpers/trial_status_widget_helper_spec.rb1100ee/spec/services/audit_events/release_artifacts_downloaded_audit_event_service_spec.rb1101ee/spec/lib/gitlab/audit/levels/instance_spec.rb1102ee/spec/services/elastic/metrics_update_service_spec.rb1103ee/spec/models/ee/system_note_metadata_spec.rb1104ee/spec/services/applications/create_service_spec.rb1105ee/spec/lib/ee/gitlab/auth/ldap/access_levels_spec.rb1106ee/spec/models/concerns/projects/custom_branch_rule_spec.rb1107ee/spec/views/shared/web_hooks/_group_web_hook_disabled_alert.html.haml_spec.rb1108ee/spec/lib/elastic/latest/user_config_spec.rb1109ee/spec/workers/geo/verification_batch_worker_spec.rb1110ee/spec/presenters/ee/instance_clusterable_presenter_spec.rb1111ee/spec/lib/gitlab/geo/log_cursor/events/repositories_changed_event_spec.rb1112ee/spec/services/emails/destroy_service_spec.rb1113ee/spec/lib/gitlab/import_export/group/group_and_descendants_repo_saver_spec.rb1114ee/spec/views/admin/application_settings/_git_abuse_rate_limit.html.haml_spec.rb1115ee/spec/lib/ee/gitlab/auth/ldap/config_spec.rb1116ee/spec/graphql/types/geo/terraform_state_version_registry_type_spec.rb1117ee/spec/models/elastic/reindexing_subtask_spec.rb1118ee/spec/services/keys/create_service_spec.rb1119ee/spec/graphql/types/path_lock_type_spec.rb1120ee/spec/services/epics/base_service_spec.rb1121ee/spec/lib/gitlab/bullet/exclusions_spec.rb1122ee/spec/graphql/types/health_status_enum_spec.rb1123ee/spec/routing/projects/security/configuration_controller_routing_spec.rb1124ee/spec/lib/gitlab/ci/reports/metrics/report_spec.rb1125ee/spec/lib/ee/gitlab/event_store_spec.rb1126ee/spec/graphql/types/scanned_resource_type_spec.rb1127ee/spec/lib/gitlab/ci/reports/coverage_fuzzing/report_spec.rb1128ee/spec/graphql/types/dast/scan_method_type_enum_spec.rb1129ee/spec/graphql/ee/types/branch_protections/push_access_level_type_spec.rb1130ee/spec/lib/gem_extensions/elasticsearch/model/indexing/instance_methods_spec.rb1131ee/spec/models/milestone_spec.rb1132ee/spec/lib/gitlab/email/feature_flag_wrapper_spec.rb1133ee/spec/serializers/security/vulnerability_report_data_serializer_spec.rb1134ee/spec/graphql/types/vulnerability_details/base_type_spec.rb1135Running all node tests without filter1136Running all node tests without filter1137Running command: bundle exec rspec -Ispec -rspec_helper --color --failure-exit-code 1 --error-exit-code 2 --format documentation --format RspecJunitFormatter --out rspec/junit_rspec.xml --tag ~quarantine --tag ~level:background_migration --default-path {ee -- ee/spec/services/ee/notification_service_spec.rb ee/spec/lib/gitlab/insights/finders/issuable_finder_spec.rb ee/spec/policies/group_policy_spec.rb ee/spec/models/geo/merge_request_diff_registry_spec.rb ee/spec/tasks/gitlab/seed/group_seed_rake_spec.rb ee/spec/services/projects/update_mirror_service_spec.rb ee/spec/services/projects/update_service_spec.rb ee/spec/lib/ee/gitlab/middleware/read_only_spec.rb ee/spec/policies/epic_policy_spec.rb ee/spec/services/epics/issue_promote_service_spec.rb ee/spec/lib/gitlab/background_migration/remove_all_trace_expiration_dates_spec.rb ee/spec/services/ee/notes/quick_actions_service_spec.rb ee/spec/models/vulnerabilities/stat_diff_spec.rb ee/spec/models/namespaces/storage/root_size_spec.rb ee/spec/services/todo_service_spec.rb ee/spec/services/approval_rules/params_filtering_service_spec.rb ee/spec/elastic/migrate/20220825102900_backfill_label_ids_for_issues_spec.rb ee/spec/services/vulnerability_external_issue_links/create_service_spec.rb ee/spec/services/security/sync_license_scanning_rules_service_spec.rb ee/spec/graphql/resolvers/requirements_management/requirements_resolver_spec.rb ee/spec/lib/gitlab/analytics/cycle_analytics/summary/stage_time_summary_spec.rb ee/spec/models/ee/audit_event_spec.rb ee/spec/services/vulnerabilities/finding_dismiss_service_spec.rb ee/spec/policies/global_policy_spec.rb ee/spec/models/dast/profile_spec.rb ee/spec/models/slack_integration_spec.rb ee/spec/lib/gitlab/geo/log_cursor/events/design_repository_updated_event_spec.rb ee/spec/graphql/resolvers/geo/pipeline_artifact_registries_resolver_spec.rb ee/spec/lib/gitlab/licenses/submit_license_usage_data_banner_spec.rb ee/spec/services/security/findings/dismiss_service_spec.rb ee/spec/models/project_ci_cd_setting_spec.rb ee/spec/graphql/resolvers/vulnerabilities_resolver_spec.rb ee/spec/services/groups/destroy_service_spec.rb ee/spec/services/ee/members/update_service_spec.rb ee/spec/lib/ee/gitlab/checks/push_rules/branch_check_spec.rb ee/spec/workers/elastic_delete_project_worker_spec.rb ee/spec/models/packages/package_file_spec.rb ee/spec/services/security/security_orchestration_policies/policy_commit_service_spec.rb ee/spec/services/app_sec/dast/profiles/create_service_spec.rb ee/spec/lib/gitlab/ci/minutes/runners_availability_spec.rb ee/spec/workers/sync_seat_link_request_worker_spec.rb ee/spec/services/security/store_scan_service_spec.rb ee/spec/helpers/ee/personal_access_tokens_helper_spec.rb ee/spec/helpers/groups/security_features_helper_spec.rb ee/spec/graphql/mutations/projects/set_locked_spec.rb ee/spec/services/security/ingestion/tasks/ingest_finding_signatures_spec.rb ee/spec/services/geo/metrics_update_service_spec.rb ee/spec/elastic_integration/repository_index_spec.rb ee/spec/lib/ee/gitlab/group_search_results_spec.rb ee/spec/policies/saml_provider_policy_spec.rb ee/spec/services/security/ingestion/tasks/ingest_finding_identifiers_spec.rb ee/spec/finders/template_finder_spec.rb ee/spec/workers/ee/repository_check/batch_worker_spec.rb ee/spec/models/projects/all_protected_branches_rule_spec.rb ee/spec/graphql/resolvers/geo/dependency_proxy_blob_registries_resolver_spec.rb ee/spec/workers/project_template_export_worker_spec.rb ee/spec/graphql/resolvers/user_notes_count_resolver_spec.rb ee/spec/lib/gitlab/ci/reports/security/locations/cluster_image_scanning_spec.rb ee/spec/services/merge_requests/capture_suggested_reviewers_accepted_service_spec.rb ee/spec/lib/gitlab/ci/pipeline/chain/limit/activity_spec.rb ee/spec/services/boards/epics/create_service_spec.rb ee/spec/services/groups/mark_for_deletion_service_spec.rb ee/spec/services/ee/members/invite_service_spec.rb ee/spec/services/ci/process_pipeline_service_spec.rb ee/spec/lib/gitlab/license_scanning_spec.rb ee/spec/lib/gitlab/mirror_spec.rb ee/spec/services/app_sec/dast/scanner_profiles/destroy_service_spec.rb ee/spec/services/ee/post_receive_service_spec.rb ee/spec/graphql/types/vulnerability_detail_type_spec.rb ee/spec/models/incident_management/pending_escalations/alert_spec.rb ee/spec/services/audit_events/build_service_spec.rb ee/spec/graphql/types/dast_scanner_profile_type_spec.rb ee/spec/finders/approval_rules/group_finder_spec.rb ee/spec/lib/ee/gitlab/usage_data_counters/issue_activity_unique_counter_spec.rb ee/spec/workers/namespaces/sync_namespace_name_worker_spec.rb ee/spec/lib/system_check/geo/current_node_check_spec.rb ee/spec/views/vulnerabilities/issue_description.md_spec.rb ee/spec/services/projects/after_rename_service_spec.rb ee/spec/lib/elastic/multi_version_instance_proxy_spec.rb ee/spec/lib/elastic/latest/user_instance_proxy_spec.rb ee/spec/services/namespaces/free_user_cap/notify_over_limit_service_spec.rb ee/spec/lib/gitlab/geo/oauth/session_spec.rb ee/spec/services/projects/deregister_suggested_reviewers_project_service_spec.rb ee/spec/models/dast/profiles_pipeline_spec.rb ee/spec/finders/incident_management/escalation_rules_finder_spec.rb ee/spec/workers/elastic_index_bulk_cron_worker_spec.rb ee/spec/lib/gitlab/usage/metrics/instrumentations/count_external_status_checks_metric_spec.rb ee/spec/workers/gitlab_subscriptions/refresh_seats_worker_spec.rb ee/spec/graphql/types/asset_type_spec.rb ee/spec/models/vulnerabilities/finding_link_spec.rb ee/spec/models/dast/pre_scan_verification_step_spec.rb ee/spec/serializers/ee/issue_entity_spec.rb ee/spec/services/vulnerabilities/statistics/update_service_spec.rb ee/spec/lib/gitlab/sidekiq_config_spec.rb ee/spec/services/users/captcha_challenge_service_spec.rb ee/spec/services/projects/import_service_spec.rb ee/spec/services/projects/setup_ci_cd_spec.rb ee/spec/services/users_ops_dashboard_projects/destroy_service_spec.rb ee/spec/finders/security/approval_groups_finder_spec.rb ee/spec/services/app_sec/fuzzing/coverage/corpuses/create_service_spec.rb ee/spec/workers/deployments/approval_worker_spec.rb ee/spec/services/security/scanned_resources_service_spec.rb ee/spec/services/namespaces/in_product_marketing_emails_service_spec.rb ee/spec/lib/elastic/latest/custom_language_analyzers_spec.rb ee/spec/views/clusters/clusters/show.html.haml_spec.rb ee/spec/graphql/types/sbom/dependency_type_spec.rb ee/spec/finders/dast_scanner_profiles_finder_spec.rb ee/spec/workers/search/project_index_integrity_worker_spec.rb ee/spec/lib/gitlab/ci/templates/dast_runner_validation_gitlab_ci_yaml_spec.rb ee/spec/workers/active_user_count_threshold_worker_spec.rb ee/spec/lib/ee/sidebars/your_work/menus/security_dashboard_menu_spec.rb ee/spec/serializers/ee/group_child_entity_spec.rb ee/spec/lib/ee/api/helpers/issues_helpers_spec.rb ee/spec/lib/bulk_imports/projects/pipelines/push_rule_pipeline_spec.rb ee/spec/workers/ldap_all_groups_sync_worker_spec.rb ee/spec/finders/boards/users_finder_spec.rb ee/spec/serializers/metrics_report_metric_entity_spec.rb ee/spec/services/users/update_highest_member_role_service_spec.rb ee/spec/components/namespaces/free_user_cap/notification_alert_component_spec.rb ee/spec/services/ee/groups/group_links/destroy_service_spec.rb ee/spec/services/geo/repository_base_sync_service_spec.rb ee/spec/helpers/admin/emails_helper_spec.rb ee/spec/graphql/mutations/incident_management/oncall_schedule/destroy_spec.rb ee/spec/workers/analytics/cycle_analytics/reaggregation_worker_spec.rb ee/spec/helpers/admin/ip_restriction_helper_spec.rb ee/spec/models/ee/appearance_spec.rb ee/spec/routing/operations_routing_spec.rb ee/spec/models/geo/hashed_storage_migrated_event_spec.rb ee/spec/lib/ee/gitlab/verify/uploads_spec.rb ee/spec/graphql/mutations/boards/epic_boards/update_spec.rb ee/spec/helpers/ee/ci/pipeline_editor_helper_spec.rb ee/spec/views/subscriptions/buy_storage.html.haml_spec.rb ee/spec/presenters/ci/build_presenter_spec.rb ee/spec/services/geo/container_repository_registry_removal_service_spec.rb ee/spec/services/security/configuration/save_auto_fix_service_spec.rb ee/spec/helpers/ee/projects/security/sast_configuration_helper_spec.rb ee/spec/services/users/abuse/namespace_bans/create_service_spec.rb ee/spec/finders/analytics/devops_adoption/snapshots_finder_spec.rb ee/spec/models/user_preference_spec.rb ee/spec/helpers/trial_status_widget_helper_spec.rb ee/spec/services/audit_events/release_artifacts_downloaded_audit_event_service_spec.rb ee/spec/lib/gitlab/audit/levels/instance_spec.rb ee/spec/services/elastic/metrics_update_service_spec.rb ee/spec/models/ee/system_note_metadata_spec.rb ee/spec/services/applications/create_service_spec.rb ee/spec/lib/ee/gitlab/auth/ldap/access_levels_spec.rb ee/spec/models/concerns/projects/custom_branch_rule_spec.rb ee/spec/views/shared/web_hooks/_group_web_hook_disabled_alert.html.haml_spec.rb ee/spec/lib/elastic/latest/user_config_spec.rb ee/spec/workers/geo/verification_batch_worker_spec.rb ee/spec/presenters/ee/instance_clusterable_presenter_spec.rb ee/spec/lib/gitlab/geo/log_cursor/events/repositories_changed_event_spec.rb ee/spec/services/emails/destroy_service_spec.rb ee/spec/lib/gitlab/import_export/group/group_and_descendants_repo_saver_spec.rb ee/spec/views/admin/application_settings/_git_abuse_rate_limit.html.haml_spec.rb ee/spec/lib/ee/gitlab/auth/ldap/config_spec.rb ee/spec/graphql/types/geo/terraform_state_version_registry_type_spec.rb ee/spec/models/elastic/reindexing_subtask_spec.rb ee/spec/services/keys/create_service_spec.rb ee/spec/graphql/types/path_lock_type_spec.rb ee/spec/services/epics/base_service_spec.rb ee/spec/lib/gitlab/bullet/exclusions_spec.rb ee/spec/graphql/types/health_status_enum_spec.rb ee/spec/routing/projects/security/configuration_controller_routing_spec.rb ee/spec/lib/gitlab/ci/reports/metrics/report_spec.rb ee/spec/lib/ee/gitlab/event_store_spec.rb ee/spec/graphql/types/scanned_resource_type_spec.rb ee/spec/lib/gitlab/ci/reports/coverage_fuzzing/report_spec.rb ee/spec/graphql/types/dast/scan_method_type_enum_spec.rb ee/spec/graphql/ee/types/branch_protections/push_access_level_type_spec.rb ee/spec/lib/gem_extensions/elasticsearch/model/indexing/instance_methods_spec.rb ee/spec/models/milestone_spec.rb ee/spec/lib/gitlab/email/feature_flag_wrapper_spec.rb ee/spec/serializers/security/vulnerability_report_data_serializer_spec.rb ee/spec/graphql/types/vulnerability_details/base_type_spec.rbKnapsack report generator started!1138warning: parser/current is loading parser/ruby30, which recognizes 3.0.5-compliant syntax, but you are running 3.0.6.1140Run options: exclude {:quarantine=>true, :level=>"background_migration"}1141[TEST PROF INFO] Time spent in factories: 00:00.314 (0.79% of total time)1142[TEST PROF INFO] Time spent in factories: 00:00.314 (0.79% of total time)1143Test environment set up in 0.661381954 seconds1144EE::NotificationService1145 .permitted_actions1146 includes public methods1147 excludes protected and private methods1148 new review1149 sends emails1150 behaves like project emails are disabled1151 sends no emails with project emails disabled1152 sends emails to someone1153 mirror hard failed1154 when the project has invited members1155 sends email1156 behaves like project emails are disabled1157 sends no emails with project emails disabled1158 sends emails to someone1159 when user is owner1160 sends email1161 behaves like project emails are disabled1162 sends no emails with project emails disabled1163 sends emails to someone1164 when owner is blocked1165 does not send email1166 when project belongs to group1167 does not send email to the blocked owner1168 when user is maintainer1169 sends email1170 when user is not owner nor maintainer1171 does not send email1172 when user is group owner1173 sends email1174 when user is group maintainer1175 sends email1176 mirror was disabled1177 when the project has invited members1178 sends email1179 behaves like project emails are disabled1180 sends no emails with project emails disabled1181 sends emails to someone1182 when user is owner1183 sends email1184 behaves like project emails are disabled1185 sends no emails with project emails disabled1186 sends emails to someone1187 when owner is blocked1188 does not send email1189 when project belongs to group1190 does not send email to the blocked owner1191 when user is maintainer1192 sends email1193 when user is not owner nor maintainer1194 does not send email1195 when user is group owner1196 sends email1197 when user is group maintainer1198 sends email1199 mirror user changed1200 sends email1201 behaves like project emails are disabled1202 sends no emails with project emails disabled1203 sends emails to someone1204 issues1205 #removed_iteration_issue1207 behaves like altered iteration notification on issue1208 sends the email to the correct people1209 behaves like project emails are disabled1210 sends no emails with project emails disabled1211 sends emails to someone1212 confidential issues1213 emails subscribers of the issue's iteration that can read the issue1214 #changed_iteration_issue1216 behaves like altered iteration notification on issue1217 sends the email to the correct people1218 behaves like project emails are disabled1219 sends no emails with project emails disabled1220 sends emails to someone1221 confidential issues1222 emails subscribers of the issue's iteration that can read the issue1223 epics1224 epic notes1225 #new_note1226 is expected to have header X-GitLab-NotificationReason:1227 behaves like group emails are disabled1228 sends no emails with group emails disabled1229 sends emails to someone1230 close epic1231 sends notification to watcher when no user participates1232 sends notification to watcher and a participator1233 behaves like group emails are disabled1234 sends no emails with group emails disabled1235 sends emails to someone1236 reopen epic1237 sends notification to watcher when no user participates1238 sends notification to watcher and a participator1239 behaves like group emails are disabled1240 sends no emails with group emails disabled1241 sends emails to someone1242 new epic1243 sends notification to watcher when no user participates1244 sends notification to watcher and a participator1245 behaves like group emails are disabled1246 sends no emails with group emails disabled1247 sends emails to someone1248 when author is not confirmed1249 does not send any notification1250 when author is blocked1251 does not send any notification1252 when author is a ghost1253 does not send any notification1254 Merge Requests1255 #new_merge_request1256 emails all assignees1257 behaves like project emails are disabled1258 sends no emails with project emails disabled1259 sends emails to someone1260 when the target project has approvers set1261 does not email the approvers1262 does not email the approvers when approval is not necessary1263 behaves like project emails are disabled1264 sends no emails with project emails disabled1265 sends emails to someone1266 when the merge request has approvers set1267 does not email the MR approvers1268 does not email approvers set on the project who are not approvers of this MR1269 behaves like project emails are disabled1270 sends no emails with project emails disabled1271 sends emails to someone1272 Members1273 #new_group_member_with_confirmation1274 sends a notification1275 IncidentManagement1276 #notify_oncall_users_of_alert1277 sends an email to the specified users1278 tracks a count of unique recipients1279 #oncall_user_removed1280 sends an email to the owner and participants1281 sends the email inline when async = false1282 #user_escalation_rule_deleted1283 immediately sends an email to the project owner1284 when project owner is the removed user1285 does not send an email1286 with a group1287 immediately sends an email to the eligable project owners1288 #pipeline_finished1289 with a failed pipeline1290 sends account activation email1291 when feature flag is disabled1292 does not send account activation email1293 when not in dev env or gitlab.com1294 does not send account activation email1295 when user is not opted in to marketing emails1296 does not send account activation email1297 when failure reason is not user_not_verified1298 does not send account activation email1299 when user account is validated1300 does not send account activation email1301 when user cannot receive notifications1302 does not send account activation email1303Gitlab::Insights::Finders::IssuableFinder1304 #issuable_type1305 issuable_type_in_query: "issue", expected_issuable_type: :issue1306 is expected to eq :issue1307 issuable_type_in_query: "issues", expected_issuable_type: :issue1308 is expected to eq :issue1309 issuable_type_in_query: "merge_request", expected_issuable_type: :merge_request1310 is expected to eq :merge_request1311 issuable_type_in_query: "merge_requests", expected_issuable_type: :merge_request1312 is expected to eq :merge_request1313 #issuable_state1314 issuable_state_in_query: nil, expected_issuable_state: :opened1315 is expected to eq :opened1316 issuable_state_in_query: "opened", expected_issuable_state: :opened1317 is expected to eq :opened1318 issuable_state_in_query: "closed", expected_issuable_state: :closed1319 is expected to eq :closed1320 issuable_state_in_query: "merged", expected_issuable_state: :merged1321 is expected to eq :merged1322 issuable_state_in_query: "locked", expected_issuable_state: :locked1323 is expected to eq :locked1324 #period_field1325 issuable_type_in_query: "issue", issuable_state_in_query: nil, expected_period_field: :created_at1326 is expected to eq :created_at1327 issuable_type_in_query: "merge_request", issuable_state_in_query: nil, expected_period_field: :created_at1328 is expected to eq :created_at1329 issuable_type_in_query: "issue", issuable_state_in_query: "opened", expected_period_field: :created_at1330 is expected to eq :created_at1331 issuable_type_in_query: "merge_request", issuable_state_in_query: "opened", expected_period_field: :created_at1332 is expected to eq :created_at1333 issuable_type_in_query: "issue", issuable_state_in_query: "closed", expected_period_field: :closed_at1334 is expected to eq :closed_at1335 issuable_type_in_query: "merge_request", issuable_state_in_query: "closed", expected_period_field: :created_at1336 is expected to eq :created_at1337 issuable_type_in_query: "issue", issuable_state_in_query: "merged", expected_period_field: :created_at1338 is expected to eq :created_at1339 issuable_type_in_query: "merge_request", issuable_state_in_query: "merged", expected_period_field: :merged_at1340 is expected to eq :merged_at1341 issuable_type_in_query: "issue", issuable_state_in_query: "locked", expected_period_field: :created_at1342 is expected to eq :created_at1343 issuable_type_in_query: "merge_request", issuable_state_in_query: "locked", expected_period_field: :created_at1344 is expected to eq :created_at1345 #find1346 raises an error for an invalid :issuable_type option1347 raises an error for an invalid entity object1348 raises an error for an invalid :group_by option1349 defaults to the "days" period if no :group_by is given1350 raises an error for an invalid :period_limit option1351 for a group1352 issues1353 avoids N + 1 queries1354 :period_limit query1355 with group_by: "day"1356 returns issuable created after 30 days ago1357 with group_by: "day", period_limit: 11358 returns issuable created after one day ago1359 with group_by: "week"1360 returns issuable created after 12 weeks ago1361 with group_by: "week", period_limit: 11362 returns issuable created after one week ago1363 with group_by: "month"1364 returns issuable created after 12 months ago1365 with group_by: "month", period_limit: 11366 returns issuable created after one month ago1367 :projects option1368 when `projects.only` are specified by one id1369 returns issuables for that project1370 when `projects.only` are specified by two ids1371 returns issuables for all valid projects1372 when `projects.only` are specified by bad id1373 returns nothing1374 when `projects.only` are specified by bad id and good id1375 returns issuables for good project1376 when `projects.only` are specified by one project full path1377 returns issuables for that project1378 when `projects.only` are specified by project full path and id1379 returns issuables for all valid projects1380 when `projects.only` are specified by duplicated projects1381 returns issuables for that project without duplicated issuables1382 when `projects.only` are specified by bad project path1383 returns nothing1384 when `projects.only` are specified by unrelated project1385 returns nothing1386 merge requests1387 avoids N + 1 queries1388 :period_limit query1389 with group_by: "day"1390 returns issuable created after 30 days ago1391 with group_by: "day", period_limit: 11392 returns issuable created after one day ago1393 with group_by: "week"1394 returns issuable created after 12 weeks ago1395 with group_by: "week", period_limit: 11396 returns issuable created after one week ago1397 with group_by: "month"1398 returns issuable created after 12 months ago1399 with group_by: "month", period_limit: 11400 returns issuable created after one month ago1401 :projects option1402 when `projects.only` are specified by one id1403 returns issuables for that project1404 when `projects.only` are specified by two ids1405 returns issuables for all valid projects1406 when `projects.only` are specified by bad id1407 returns nothing1408 when `projects.only` are specified by bad id and good id1409 returns issuables for good project1410 when `projects.only` are specified by one project full path1411 returns issuables for that project1412 when `projects.only` are specified by project full path and id1413 returns issuables for all valid projects1414 when `projects.only` are specified by duplicated projects1415 returns issuables for that project without duplicated issuables1416 when `projects.only` are specified by bad project path1417 returns nothing1418 when `projects.only` are specified by unrelated project1419 returns nothing1420 for a group with subgroups1421 issues1422 avoids N + 1 queries1423 :period_limit query1424 with group_by: "day"1425 returns issuable created after 30 days ago1426 with group_by: "day", period_limit: 11427 returns issuable created after one day ago1428 with group_by: "week"1429 returns issuable created after 12 weeks ago1430 with group_by: "week", period_limit: 11431 returns issuable created after one week ago1432 with group_by: "month"1433 returns issuable created after 12 months ago1434 with group_by: "month", period_limit: 11435 returns issuable created after one month ago1436 :projects option1437 when `projects.only` are specified by one id1438 returns issuables for that project1439 when `projects.only` are specified by two ids1440 returns issuables for all valid projects1441 when `projects.only` are specified by bad id1442 returns nothing1443 when `projects.only` are specified by bad id and good id1444 returns issuables for good project1445 when `projects.only` are specified by one project full path1446 returns issuables for that project1447 when `projects.only` are specified by project full path and id1448 returns issuables for all valid projects1449 when `projects.only` are specified by duplicated projects1450 returns issuables for that project without duplicated issuables1451 when `projects.only` are specified by bad project path1452 returns nothing1453 when `projects.only` are specified by unrelated project1454 returns nothing1455 merge requests1456 avoids N + 1 queries1457 :period_limit query1458 with group_by: "day"1459 returns issuable created after 30 days ago1460 with group_by: "day", period_limit: 11461 returns issuable created after one day ago1462 with group_by: "week"1463 returns issuable created after 12 weeks ago1464 with group_by: "week", period_limit: 11465 returns issuable created after one week ago1466 with group_by: "month"1467 returns issuable created after 12 months ago1468 with group_by: "month", period_limit: 11469 returns issuable created after one month ago1470 :projects option1471 when `projects.only` are specified by one id1472 returns issuables for that project1473 when `projects.only` are specified by two ids1474 returns issuables for all valid projects1475 when `projects.only` are specified by bad id1476 returns nothing1477 when `projects.only` are specified by bad id and good id1478 returns issuables for good project1479 when `projects.only` are specified by one project full path1480 returns issuables for that project1481 when `projects.only` are specified by project full path and id1482 returns issuables for all valid projects1483 when `projects.only` are specified by duplicated projects1484 returns issuables for that project without duplicated issuables1485 when `projects.only` are specified by bad project path1486 returns nothing1487 when `projects.only` are specified by unrelated project1488 returns nothing1489 for a project1490 issues1491 avoids N + 1 queries1492 :period_limit query1493 with group_by: "day"1494 returns issuable created after 30 days ago1495 with group_by: "day", period_limit: 11496 returns issuable created after one day ago1497 with group_by: "week"1498 returns issuable created after 12 weeks ago1499 with group_by: "week", period_limit: 11500 returns issuable created after one week ago1501 with group_by: "month"1502 returns issuable created after 12 months ago1503 with group_by: "month", period_limit: 11504 returns issuable created after one month ago1505 :projects option1506 when `projects.only` are specified by one id1507 returns issuables for that project1508 when `projects.only` are specified by two ids1509 returns issuables for all valid projects1510 when `projects.only` are specified by bad id1511 returns nothing1512 when `projects.only` are specified by bad id and good id1513 returns issuables for good project1514 when `projects.only` are specified by one project full path1515 returns issuables for that project1516 when `projects.only` are specified by project full path and id1517 returns issuables for all valid projects1518 when `projects.only` are specified by duplicated projects1519 returns issuables for that project without duplicated issuables1520 when `projects.only` are specified by bad project path1521 returns nothing1522 when `projects.only` are specified by unrelated project1523 returns nothing1524 merge requests1525 avoids N + 1 queries1526 :period_limit query1527 with group_by: "day"1528 returns issuable created after 30 days ago1529 with group_by: "day", period_limit: 11530 returns issuable created after one day ago1531 with group_by: "week"1532 returns issuable created after 12 weeks ago1533 with group_by: "week", period_limit: 11534 returns issuable created after one week ago1535 with group_by: "month"1536 returns issuable created after 12 months ago1537 with group_by: "month", period_limit: 11538 returns issuable created after one month ago1539 :projects option1540 when `projects.only` are specified by one id1541 returns issuables for that project1542 when `projects.only` are specified by two ids1543 returns issuables for all valid projects1544 when `projects.only` are specified by bad id1545 returns nothing1546 when `projects.only` are specified by bad id and good id1547 returns issuables for good project1548 when `projects.only` are specified by one project full path1549 returns issuables for that project1550 when `projects.only` are specified by project full path and id1551 returns issuables for all valid projects1552 when `projects.only` are specified by duplicated projects1553 returns issuables for that project without duplicated issuables1554 when `projects.only` are specified by bad project path1555 returns nothing1556 when `projects.only` are specified by unrelated project1557 returns nothing1558 merged merge requests1559 avoids N + 1 queries1560 :period_limit query1561 with group_by: "day"1562 returns issuable created after 30 days ago1563 with group_by: "day", period_limit: 11564 returns issuable created after one day ago1565 with group_by: "week"1566 returns issuable created after 12 weeks ago1567 with group_by: "week", period_limit: 11568 returns issuable created after one week ago1569 with group_by: "month"1570 returns issuable created after 12 months ago1571 with group_by: "month", period_limit: 11572 returns issuable created after one month ago1573 :projects option1574 when `projects.only` are specified by one id1575 returns issuables for that project1576 when `projects.only` are specified by two ids1577 returns issuables for all valid projects1578 when `projects.only` are specified by bad id1579 returns nothing1580 when `projects.only` are specified by bad id and good id1581 returns issuables for good project1582 when `projects.only` are specified by one project full path1583 returns issuables for that project1584 when `projects.only` are specified by project full path and id1585 returns issuables for all valid projects1586 when `projects.only` are specified by duplicated projects1587 returns issuables for that project without duplicated issuables1588 when `projects.only` are specified by bad project path1589 returns nothing1590 when `projects.only` are specified by unrelated project1591 returns nothing1592 #period_limit1593 default values1594 with group_by: "day"1595 returns 301596 with group_by: "week"1597 returns 121598 with group_by: "month"1599 returns 121600 custom values1601 with period_limit: 421602 returns 421603 with an invalid period_limit1604 raises an error1605GroupPolicy1606 when epics feature is disabled1607 is expected to be disallowed :read_epic, :create_epic, :admin_epic, :destroy_epic, :read_confidential_epic, :read_epic_board, :read_epic_board_list, :admin_epic_board, and :admin_epic_board_list1608 when epics feature is enabled1609 when user is owner1610 is expected to be allowed :read_epic, :create_epic, :admin_epic, :destroy_epic, :read_confidential_epic, :read_epic_board, :read_epic_board_list, :admin_epic_board, and :admin_epic_board_list1611 when user is admin1612 when admin mode is enabled1613 is expected to be allowed :read_epic, :create_epic, :admin_epic, :destroy_epic, :read_confidential_epic, :read_epic_board, :read_epic_board_list, :admin_epic_board, and :admin_epic_board_list1614 when admin mode is disabled1615 is expected to be disallowed :read_epic, :create_epic, :admin_epic, :destroy_epic, :read_confidential_epic, :read_epic_board, :read_epic_board_list, :admin_epic_board, and :admin_epic_board_list1616 when user is maintainer1617 is expected to be allowed :read_epic, :create_epic, :admin_epic, :read_confidential_epic, :read_epic_board, :read_epic_board_list, :admin_epic_board, and :admin_epic_board_list1618 is expected to be disallowed :destroy_epic1619 when user is developer1620 is expected to be allowed :read_epic, :create_epic, :admin_epic, :read_confidential_epic, :read_epic_board, :read_epic_board_list, :admin_epic_board, and :admin_epic_board_list1621 is expected to be disallowed :destroy_epic1622 when user is reporter1623 is expected to be allowed :read_epic, :create_epic, :admin_epic, :read_confidential_epic, :read_epic_board, :read_epic_board_list, :admin_epic_board, and :admin_epic_board_list1624 is expected to be disallowed :destroy_epic1625 when user is guest1626 is expected to be allowed :read_epic, :read_epic_board, and :list_subgroup_epics1627 is expected to be disallowed :create_epic, :admin_epic, :destroy_epic, :read_confidential_epic, :admin_epic_board, and :admin_epic_board_list1628 when user is support bot1629 when group has at least one project with service desk enabled1630 is expected to be allowed :read_epic and :read_epic_iid1631 is expected to be disallowed :create_epic, :admin_epic, :destroy_epic, :read_confidential_epic, :read_epic_board, :read_epic_board_list, :admin_epic_board, and :admin_epic_board_list1632 when group does not have projects with service desk enabled1633 is expected to be disallowed :read_epic, :create_epic, :admin_epic, :destroy_epic, :read_confidential_epic, :read_epic_board, :read_epic_board_list, :admin_epic_board, and :admin_epic_board_list1634 when user is not member1635 is expected to be disallowed :read_epic, :create_epic, :admin_epic, :destroy_epic, :read_confidential_epic, :read_epic_board, :read_epic_board_list, :admin_epic_board, and :admin_epic_board_list1636 when user is anonymous1637 is expected to be disallowed :read_epic, :create_epic, :admin_epic, :destroy_epic, :read_confidential_epic, :read_epic_board, :read_epic_board_list, :admin_epic_board, and :admin_epic_board_list1638 when iterations feature is disabled1639 is expected to be disallowed :read_iteration, :create_iteration, :admin_iteration, :create_iteration_cadence, and :admin_iteration_cadence1640 when iterations feature is enabled1641 when user is a developer1642 is expected to be allowed :read_iteration, :create_iteration, :admin_iteration, :read_iteration_cadence, :create_iteration_cadence, and :admin_iteration_cadence1643 when user is a guest1644 is expected to be allowed :read_iteration and :read_iteration_cadence1645 is expected to be disallowed :create_iteration, :admin_iteration, :create_iteration_cadence, and :admin_iteration_cadence1646 when user is logged out1647 is expected to be disallowed :read_iteration, :create_iteration, :admin_iteration, and :create_iteration_cadence1648 when project is private1649 when user is logged out1650 is expected to be allowed :read_iteration and :read_iteration_cadence1651 is expected to be disallowed :create_iteration, :admin_iteration, :create_iteration_cadence, and :admin_iteration_cadence1652 when cluster deployments is available1653 is expected to be allowed :read_cluster_environments1654 when cluster deployments is not available1655 is expected not to be allowed :read_cluster_environments1656 when contribution analytics is available1657 when signed in user is a member of the group1658 is expected to be allowed :read_group_contribution_analytics1659 when user is not a member of the group1660 when user is not invited to any of the group projects1661 is expected not to be allowed :read_group_contribution_analytics1662 when user is invited to a group project, but not to the group1663 is expected not to be allowed :read_group_contribution_analytics1664 when user has an auditor role1665 is expected to be allowed :read_group_contribution_analytics1666 when contribution analytics is not available1667 is expected not to be allowed :read_group_contribution_analytics1668 when dora4 analytics is available1669 when the user is a developer1670 is expected to be allowed :read_dora4_analytics1671 when the user is an auditor1672 is expected to be allowed :read_dora4_analytics1673 when the user is an admin1674 is expected to be allowed :read_dora4_analytics1675 when dora4 analytics is not available1676 is expected not to be allowed :read_dora4_analytics1677 export group memberships1678 when exporting user permissions is not available1679 is expected not to be allowed :export_group_memberships1680 when exporting user permissions is available1681 is expected to be allowed :export_group_memberships1682 when group activity analytics is available1683 is expected to be allowed :read_group_activity_analytics1684 when group activity analytics is not available1685 is expected not to be allowed :read_group_activity_analytics1686 group CI/CD analytics1687 when group CI/CD analytics is available1688 when the user has at least reporter permissions1689 is expected to be allowed :view_group_ci_cd_analytics1690 when the user has less than reporter permissions1691 is expected not to be allowed :view_group_ci_cd_analytics1692 when the user has auditor permissions1693 is expected to be allowed :view_group_ci_cd_analytics1694 when group CI/CD analytics is not available1695 is expected not to be allowed :view_group_ci_cd_analytics1696 when group repository analytics is available1697 for guests1698 is expected not to be allowed :read_group_repository_analytics1699 for reporter+1700 is expected to be allowed :read_group_repository_analytics1701 for auditor1702 is expected to be allowed :read_group_repository_analytics1703 when group repository analytics is not available1704 is expected not to be allowed :read_group_repository_analytics1705 when group cycle analytics is available1706 for guests1707 is expected not to be allowed :read_group_cycle_analytics1708 for reporter+1709 is expected to be allowed :read_group_cycle_analytics1710 for auditor1711 is expected to be allowed :read_group_cycle_analytics1712 when group cycle analytics is not available1713 is expected not to be allowed :read_group_cycle_analytics1714 when group coverage reports is available1715 for guests1716 is expected not to be allowed :read_group_coverage_reports1717 for reporter+1718 is expected to be allowed :read_group_coverage_reports1719 when group coverage reports is not available1720 is expected not to be allowed :read_group_coverage_reports1721 per group SAML1722 when group_saml is unavailable1723 when group saml config is disabled1724 is expected to be disallowed :admin_group_saml1725 when the group is a subgroup1726 is expected to be disallowed :admin_group_saml1727 when the feature is not licensed1728 is expected to be disallowed :admin_group_saml1729 when group_saml is available1730 when group_saml_group_sync is not licensed1731 with an enabled SAML provider1732 owner1733 is expected to be disallowed :admin_saml_group_links1734 admin1735 is disallowed even with admin mode1736 when group_saml_group_sync is licensed1737 without an enabled SAML provider1738 maintainer1739 is expected to be disallowed :admin_group_saml1740 is expected to be disallowed :admin_saml_group_links1741 owner1742 is expected to be allowed :admin_group_saml1743 is expected to be disallowed :admin_saml_group_links1744 admin1745 when admin mode is enabled1746 is expected to be allowed :admin_group_saml1747 is expected to be disallowed :admin_saml_group_links1748 when admin mode is disabled1749 is expected to be disallowed :admin_group_saml1750 is expected to be disallowed :admin_saml_group_links1751 with an enabled SAML provider1752 maintainer1753 is expected to be disallowed :admin_saml_group_links1754 owner1755 is expected to be allowed :admin_saml_group_links1756 admin1757 when admin mode is enabled1758 is expected to be allowed :admin_saml_group_links1759 when admin mode is disabled1760 is expected to be disallowed :admin_saml_group_links1761 when the group is a subgroup1762 is expected to be allowed :admin_saml_group_links1763 with sso enforcement enabled1764 when the session has been set globally1765 prevents access without a SAML session1766 allows access with a SAML session1767 as a group owner1768 allows access without a SAML session1769 prevents access without a SAML session for subgroup1770 as an admin1771 when admin mode is enabled1772 allows access without a SAML session1773 when admin mode is disabled1774 prevents access without a SAML session1775 as an auditor1776 allows access without a SAML session1777 when there is no global session or sso state1778 allows access because we haven't yet restricted all use cases1779 when the current user is a deploy token1780 allows access without a SAML session1781 without SSO enforcement enabled1782 when the session has been set globally1783 allows access when the user has no Group SAML identity1784 when the user has a Group SAML identity1785 prevents access without a SAML session1786 allows access with a SAML session1787 when there is no global session or sso state1788 when the current user is a deploy token1789 allows access without a SAML session1790 admin_saml_group_links for global SAML1791 is expected to be disallowed :admin_saml_group_links1792 when global SAML is enabled1793 is expected to be disallowed :admin_saml_group_links1794 when the groups attribute is configured1795 is expected to be disallowed :admin_saml_group_links1796 when saml_group_sync feature is licensed1797 is expected to be allowed :admin_saml_group_links1798 when the current user is not an admin or owner1799 is expected to be disallowed :admin_saml_group_links1800 with ip restriction1801 without restriction1802 is expected to be allowed :read_group1803 is expected to be allowed :read_milestone1804 is expected to be allowed :read_package1805 is expected to be allowed :create_package1806 is expected to be allowed :destroy_package1807 is expected to be allowed :admin_package1808 is expected to be allowed :read_dependency_proxy1809 is expected to be allowed :admin_dependency_proxy1810 with restriction1811 address is within the range1812 is expected to be allowed :read_group1813 is expected to be allowed :read_milestone1814 is expected to be allowed :read_package1815 is expected to be allowed :create_package1816 is expected to be allowed :destroy_package1817 is expected to be allowed :admin_package1818 is expected to be allowed :read_dependency_proxy1819 is expected to be allowed :admin_dependency_proxy1820 address is outside the range1821 as maintainer1822 is expected to be disallowed :read_group1823 is expected to be disallowed :read_milestone1824 is expected to be disallowed :read_package1825 is expected to be disallowed :create_package1826 is expected to be disallowed :destroy_package1827 is expected to be disallowed :admin_package1828 is expected to be disallowed :read_dependency_proxy1829 is expected to be disallowed :admin_dependency_proxy1830 as owner1831 is expected to be allowed :read_group1832 is expected to be allowed :read_milestone1833 is expected to be allowed :read_package1834 is expected to be allowed :create_package1835 is expected to be allowed :destroy_package1836 is expected to be allowed :admin_package1837 is expected to be allowed :read_dependency_proxy1838 is expected to be allowed :admin_dependency_proxy1839 as auditor1840 is expected to be allowed :read_group1841 is expected to be allowed :read_milestone1842 is expected to be allowed :read_group_audit_events1843 is expected to be allowed :read_dependency_proxy1844 is expected to be disallowed :admin_dependency_proxy1845 when LDAP sync is not enabled1846 owner1847 is expected to be disallowed :override_group_member1848 is expected to be allowed :admin_ldap_group_links1849 is expected to be allowed :admin_ldap_group_settings1850 does not allow group owners to manage ldap1851 is expected to be disallowed :admin_ldap_group_links1852 is expected to be disallowed :admin_ldap_group_settings1853 admin1854 when admin mode is enabled1855 is expected to be disallowed :override_group_member1856 is expected to be allowed :admin_ldap_group_links1857 is expected to be allowed :admin_ldap_group_settings1858 when admin mode is disabled1859 is expected to be disallowed :override_group_member1860 is expected to be disallowed :admin_ldap_group_links1861 is expected to be disallowed :admin_ldap_group_settings1862 when memberships locked to SAML1863 when group is a root group1864 when SAML group link sync is enabled1865 admin1866 when admin mode is enabled1867 is expected to be allowed :admin_group_member1868 when admin mode is disabled1869 is expected not to be allowed :admin_group_member1870 owner1871 is expected not to be allowed :admin_group_member1872 maintainer1873 is expected not to be allowed :admin_group_member1874 when no SAML sync is enabled1875 admin1876 is expected not to be allowed :admin_group_member1877 owner1878 is expected to be allowed :admin_group_member1879 when group is not a root group1880 when SAML group link sync is enabled1881 admin1882 when admin mode is enabled1883 is expected to be allowed :admin_group_member1884 when admin mode is disabled1885 is expected not to be allowed :admin_group_member1886 owner1887 is expected not to be allowed :admin_group_member1888 maintainer1889 is expected not to be allowed :admin_group_member1890 when child group has different owner than parent group1891 is expected not to be allowed :admin_group_member1892 when no SAML group link sync is enabled1893 admin1894 is expected to be disallowed :admin_group_member1895 owner1896 is expected to be allowed :admin_group_member1897 maintainer1898 is expected to be disallowed :admin_group_member1899 when LDAP sync is enabled1900 with no user1901 is expected to be disallowed :override_group_member1902 is expected to be disallowed :admin_ldap_group_links1903 is expected to be disallowed :admin_ldap_group_settings1904 guests1905 is expected to be disallowed :override_group_member1906 is expected to be disallowed :admin_ldap_group_links1907 is expected to be disallowed :admin_ldap_group_settings1908 reporter1909 is expected to be disallowed :override_group_member1910 is expected to be disallowed :admin_ldap_group_links1911 is expected to be disallowed :admin_ldap_group_settings1912 developer1913 is expected to be disallowed :override_group_member1914 is expected to be disallowed :admin_ldap_group_links1915 is expected to be disallowed :admin_ldap_group_settings1916 maintainer1917 is expected to be disallowed :override_group_member1918 is expected to be disallowed :admin_ldap_group_links1919 is expected to be disallowed :admin_ldap_group_settings1920 owner1921 allow group owners to manage ldap1922 is expected to be allowed :override_group_member1923 does not allow group owners to manage ldap1924 is expected to be disallowed :override_group_member1925 is expected to be disallowed :admin_ldap_group_links1926 is expected to be disallowed :admin_ldap_group_settings1927 admin1928 when admin mode is enabled1929 is expected to be allowed :override_group_member1930 is expected to be allowed :admin_ldap_group_links1931 is expected to be allowed :admin_ldap_group_settings1932 when admin mode is disabled1933 is expected to be disallowed :override_group_member1934 is expected to be disallowed :admin_ldap_group_links1935 is expected to be disallowed :admin_ldap_group_settings1936 when memberships locked to LDAP1937 admin1938 when admin mode enabled1939 is expected to be allowed :override_group_member1940 is expected to be allowed :update_group_member1941 when admin mode disabled1942 is expected to be disallowed :override_group_member1943 is expected to be disallowed :update_group_member1944 owner1945 is expected not to be allowed :admin_group_member1946 is expected not to be allowed :override_group_member1947 is expected not to be allowed :update_group_member1948 when LDAP sync is enabled1949 Group Owner disable membership lock1950 is expected to be allowed :admin_group_member1951 is expected to be allowed :override_group_member1952 is expected to be allowed :update_group_member1953 ldap_settings_unlock_groups_by_owners is disabled1954 is expected to be disallowed :admin_group_member1955 is expected to be disallowed :override_group_member1956 is expected to be disallowed :update_group_member1957 Group Owner keeps the membership lock1958 is expected not to be allowed :admin_group_member1959 is expected not to be allowed :override_group_member1960 is expected not to be allowed :update_group_member1961 when LDAP sync is disable1962 is expected not to be allowed :admin_group_member1963 is expected not to be allowed :override_group_member1964 is expected not to be allowed :update_group_member1965 read_group_credentials_inventory1966 with admin1967 when admin mode is enabled1968 is expected to be allowed :read_group_credentials_inventory1969 when admin mode is disabled1970 is expected to be disallowed :read_group_credentials_inventory1971 with owner1972 is expected to be allowed :read_group_credentials_inventory1973 with maintainer1974 is expected to be disallowed :read_group_credentials_inventory1975 with developer1976 is expected to be disallowed :read_group_credentials_inventory1977 when security dashboard features is not available1978 is expected to be disallowed :read_group_credentials_inventory1979 with reporter1980 is expected to be disallowed :read_group_credentials_inventory1981 with guest1982 is expected to be disallowed :read_group_credentials_inventory1983 with non member1984 is expected to be disallowed :read_group_credentials_inventory1985 with anonymous1986 is expected to be disallowed :read_group_credentials_inventory1987 change_prevent_group_forking1988 when feature is disabled1989 with owner1990 is expected to be disallowed :change_prevent_group_forking1991 with maintainer1992 is expected to be disallowed :change_prevent_group_forking1993 when feature is enabled1994 with owner1995 is expected to be allowed :change_prevent_group_forking1996 when group has parent1997 is expected to be disallowed :change_prevent_group_forking1998 with maintainer1999 is expected to be disallowed :change_prevent_group_forking2000 security orchestration policies2001 with developer or maintainer role2002 role: "maintainer"2003 is expected to be allowed :read_security_orchestration_policies2004 role: "developer"2005 is expected to be allowed :read_security_orchestration_policies2006 with owner role2007 role: "owner"2008 is expected to be allowed :read_security_orchestration_policies2009 with auditor role2010 role: "auditor"2011 is expected to be allowed :read_security_orchestration_policies2012 admin_vulnerability2013 with guest2014 is expected to be disallowed :admin_vulnerability2015 with reporter2016 is expected to be disallowed :admin_vulnerability2017 with developer2018 is expected to be allowed :admin_vulnerability2019 with maintainer2020 is expected to be allowed :admin_vulnerability2021 with owner2022 is expected to be allowed :admin_vulnerability2023 with auditor2024 when auditor is not a group member2025 is expected to be disallowed :admin_vulnerability2026 when developer doesn't have developer-level access to a group2027 is expected to be disallowed :admin_vulnerability2028 when auditor has developer-level access to a group2029 is expected to be allowed :admin_vulnerability2030 read_group_security_dashboard & create_vulnerability_export2031 with admin2032 when admin mode is enabled2033 is expected to be allowed :read_group_security_dashboard, :create_vulnerability_export, and :read_security_resource2034 when admin mode is disabled2035 is expected to be disallowed :read_group_security_dashboard, :create_vulnerability_export, and :read_security_resource2036 with owner2037 is expected to be allowed :read_group_security_dashboard, :create_vulnerability_export, and :read_security_resource2038 with maintainer2039 is expected to be allowed :read_group_security_dashboard, :create_vulnerability_export, and :read_security_resource2040 with developer2041 is expected to be allowed :read_group_security_dashboard, :create_vulnerability_export, and :read_security_resource2042 when security dashboard features is not available2043 is expected to be disallowed :read_group_security_dashboard, :create_vulnerability_export, and :read_security_resource2044 with reporter2045 is expected to be disallowed :read_group_security_dashboard, :create_vulnerability_export, and :read_security_resource2046 with guest2047 is expected to be disallowed :read_group_security_dashboard, :create_vulnerability_export, and :read_security_resource2048 with non member2049 is expected to be disallowed :read_group_security_dashboard, :create_vulnerability_export, and :read_security_resource2050 with anonymous2051 is expected to be disallowed :read_group_security_dashboard, :create_vulnerability_export, and :read_security_resource2052 private nested group use the highest access level from the group and inherited permissions2053 auditor2054 is expected not to be allowed :admin_member_access_request2055 commit_committer_check is not enabled by the current license2056 is expected not to be allowed :change_commit_committer_check2057 is expected not to be allowed :read_commit_committer_check2058 commit_committer_check is enabled by the current license2059 when the user is an admin2060 is expected to be allowed :change_commit_committer_check2061 is expected to be allowed :read_commit_committer_check2062 the user is a maintainer2063 is expected to be allowed :change_commit_committer_check2064 is expected to be allowed :read_commit_committer_check2065 the user is a developer2066 is expected not to be allowed :change_commit_committer_check2067 is expected to be allowed :read_commit_committer_check2068 reject_unsigned_commits is not enabled by the current license2069 is expected not to be allowed :change_reject_unsigned_commits2070 is expected not to be allowed :read_reject_unsigned_commits2071 reject_unsigned_commits is enabled by the current license2072 when the user is an admin2073 is expected to be allowed :change_reject_unsigned_commits2074 is expected to be allowed :read_reject_unsigned_commits2075 the user is a maintainer2076 is expected to be allowed :change_reject_unsigned_commits2077 is expected to be allowed :read_reject_unsigned_commits2078 the user is a developer2079 is expected not to be allowed :change_reject_unsigned_commits2080 is expected to be allowed :read_reject_unsigned_commits2081 view_productivity_analytics2082 owner2083 is allowed2084 maintainer2085 is allowed2086 developer2087 is allowed2088 reporter2089 is allowed2090 admin2091 is allowed when admin mode is enabled2092 is not allowed when admin mode is disabled2093 guest2094 is not allowed2095 view_type_of_work_charts2096 owner2097 is allowed2098 maintainer2099 is allowed2100 developer2101 is allowed2102 reporter2103 is allowed2104 admin2105 is allowed when admin mode is enabled2106 is not allowed when admin mode is disabled2107 guest2108 is not allowed2109 #read_group_saml_identity2110 for owner2111 is expected to be allowed :read_group_saml_identity2112 without Group SAML enabled2113 is expected to be disallowed :read_group_saml_identity2114 for maintainer2115 is expected to be disallowed :read_group_saml_identity2116 for developer2117 is expected to be disallowed :read_group_saml_identity2118 for reporter2119 is expected to be disallowed :read_group_saml_identity2120 for guest2121 is expected to be disallowed :read_group_saml_identity2122 update_default_branch_protection2123 for an admin2124 when the `default_branch_protection_restriction_in_groups` feature is available2125 when the setting `group_owners_can_manage_default_branch_protection` is enabled2126 when admin mode is enabled2127 is expected to be allowed :update_default_branch_protection2128 when admin mode is disabled2129 is expected to be disallowed :update_default_branch_protection2130 when the setting `group_owners_can_manage_default_branch_protection` is disabled2131 when admin mode is enabled2132 is expected to be allowed :update_default_branch_protection2133 when admin mode is disabled2134 is expected to be disallowed :update_default_branch_protection2135 when the `default_branch_protection_restriction_in_groups` feature is not available2136 when the setting `group_owners_can_manage_default_branch_protection` is enabled2137 when admin mode is enabled2138 is expected to be allowed :update_default_branch_protection2139 when admin mode is disabled2140 is expected to be disallowed :update_default_branch_protection2141 when the setting `group_owners_can_manage_default_branch_protection` is disabled2142 when admin mode is enabled2143 is expected to be allowed :update_default_branch_protection2144 when admin mode is disabled2145 is expected to be disallowed :update_default_branch_protection2146 for an owner2147 when the `default_branch_protection_restriction_in_groups` feature is available2148 when the setting `group_owners_can_manage_default_branch_protection` is enabled2149 is expected to be allowed :update_default_branch_protection2150 when the setting `group_owners_can_manage_default_branch_protection` is disabled2151 is expected to be disallowed :update_default_branch_protection2152 when the `default_branch_protection_restriction_in_groups` feature is not available2153 when the setting `group_owners_can_manage_default_branch_protection` is enabled2154 is expected to be allowed :update_default_branch_protection2155 when the setting `group_owners_can_manage_default_branch_protection` is disabled2156 is expected to be allowed :update_default_branch_protection2157 :admin_ci_minutes2158 role: :guest, admin_mode: nil, allowed: false2159 is expected to be disallowed :admin_ci_minutes2160 role: :reporter, admin_mode: nil, allowed: false2161 is expected to be disallowed :admin_ci_minutes2162 role: :developer, admin_mode: nil, allowed: false2163 is expected to be disallowed :admin_ci_minutes2164 role: :maintainer, admin_mode: nil, allowed: false2165 is expected to be disallowed :admin_ci_minutes2166 role: :owner, admin_mode: nil, allowed: true2167 is expected to be allowed :admin_ci_minutes2168 role: :admin, admin_mode: true, allowed: true2169 is expected to be allowed :admin_ci_minutes2170 role: :admin, admin_mode: false, allowed: false2171 is expected to be disallowed :admin_ci_minutes2172 :read_group_audit_events2173 role: :guest, admin_mode: nil, allowed: false2174 is expected to be disallowed :read_group_audit_events2175 role: :reporter, admin_mode: nil, allowed: false2176 is expected to be disallowed :read_group_audit_events2177 role: :developer, admin_mode: nil, allowed: true2178 is expected to be allowed :read_group_audit_events2179 role: :maintainer, admin_mode: nil, allowed: true2180 is expected to be allowed :read_group_audit_events2181 role: :owner, admin_mode: nil, allowed: true2182 is expected to be allowed :read_group_audit_events2183 role: :admin, admin_mode: true, allowed: true2184 is expected to be allowed :read_group_audit_events2185 role: :admin, admin_mode: false, allowed: false2186 is expected to be disallowed :read_group_audit_events2187 when group is read only2188 when the group is read only2189 is expected to be disallowed :create_epic, :update_epic, :admin_pipeline, :admin_group_runners, :register_group_runners, :add_cluster, :create_cluster, :update_cluster, :admin_cluster, :create_deploy_token, :create_subgroup, and :create_package2190 is expected to be allowed :read_billable_member2191 when the group is not read only2192 is expected to be allowed :create_epic, :update_epic, :admin_pipeline, :admin_group_runners, :register_group_runners, :add_cluster, :create_cluster, :update_cluster, :admin_cluster, :create_deploy_token, :create_subgroup, and :create_package2193 under .com2194 behaves like model with wiki policies2195 container_level: :public, access_level: :enabled, membership: :admin, access: :all2196 allows actions based on membership2197 container_level: :public, access_level: :enabled, membership: :maintainer, access: :maintainer2198 allows actions based on membership2199 container_level: :public, access_level: :enabled, membership: :developer, access: :developer2200 allows actions based on membership2201 container_level: :public, access_level: :enabled, membership: :reporter, access: :reporter2202 allows actions based on membership2203 container_level: :public, access_level: :enabled, membership: :guest, access: :guest2204 allows actions based on membership2205 container_level: :public, access_level: :enabled, membership: :non_member, access: :guest2206 allows actions based on membership2207 container_level: :public, access_level: :enabled, membership: :anonymous, access: :guest2208 allows actions based on membership2209 container_level: :public, access_level: :private, membership: :admin, access: :all2210 allows actions based on membership2211 container_level: :public, access_level: :private, membership: :maintainer, access: :maintainer2212 allows actions based on membership2213 container_level: :public, access_level: :private, membership: :developer, access: :developer2214 allows actions based on membership2215 container_level: :public, access_level: :private, membership: :reporter, access: :reporter2216 allows actions based on membership2217 container_level: :public, access_level: :private, membership: :guest, access: :guest2218 allows actions based on membership2219 container_level: :public, access_level: :private, membership: :non_member, access: nil2220 allows actions based on membership2221 container_level: :public, access_level: :private, membership: :anonymous, access: nil2222 allows actions based on membership2223 container_level: :public, access_level: :disabled, membership: :admin, access: nil2224 allows actions based on membership2225 container_level: :public, access_level: :disabled, membership: :maintainer, access: nil2226 allows actions based on membership2227 container_level: :public, access_level: :disabled, membership: :developer, access: nil2228 allows actions based on membership2229 container_level: :public, access_level: :disabled, membership: :reporter, access: nil2230 allows actions based on membership2231 container_level: :public, access_level: :disabled, membership: :guest, access: nil2232 allows actions based on membership2233 container_level: :public, access_level: :disabled, membership: :non_member, access: nil2234 allows actions based on membership2235 container_level: :public, access_level: :disabled, membership: :anonymous, access: nil2236 allows actions based on membership2237 container_level: :internal, access_level: :enabled, membership: :admin, access: :all2238 allows actions based on membership2239 container_level: :internal, access_level: :enabled, membership: :maintainer, access: :maintainer2240 allows actions based on membership2241 container_level: :internal, access_level: :enabled, membership: :developer, access: :developer2242 allows actions based on membership2243 container_level: :internal, access_level: :enabled, membership: :reporter, access: :reporter2244 allows actions based on membership2245 container_level: :internal, access_level: :enabled, membership: :guest, access: :guest2246 allows actions based on membership2247 container_level: :internal, access_level: :enabled, membership: :non_member, access: :guest2248 allows actions based on membership2249 container_level: :internal, access_level: :enabled, membership: :anonymous, access: nil2250 allows actions based on membership2251 container_level: :internal, access_level: :private, membership: :admin, access: :all2252 allows actions based on membership2253 container_level: :internal, access_level: :private, membership: :maintainer, access: :maintainer2254 allows actions based on membership2255 container_level: :internal, access_level: :private, membership: :developer, access: :developer2256 allows actions based on membership2257 container_level: :internal, access_level: :private, membership: :reporter, access: :reporter2258 allows actions based on membership2259 container_level: :internal, access_level: :private, membership: :guest, access: :guest2260 allows actions based on membership2261 container_level: :internal, access_level: :private, membership: :non_member, access: nil2262 allows actions based on membership2263 container_level: :internal, access_level: :private, membership: :anonymous, access: nil2264 allows actions based on membership2265 container_level: :internal, access_level: :disabled, membership: :admin, access: nil2266 allows actions based on membership2267 container_level: :internal, access_level: :disabled, membership: :maintainer, access: nil2268 allows actions based on membership2269 container_level: :internal, access_level: :disabled, membership: :developer, access: nil2270 allows actions based on membership2271 container_level: :internal, access_level: :disabled, membership: :reporter, access: nil2272 allows actions based on membership2273 container_level: :internal, access_level: :disabled, membership: :guest, access: nil2274 allows actions based on membership2275 container_level: :internal, access_level: :disabled, membership: :non_member, access: nil2276 allows actions based on membership2277 container_level: :internal, access_level: :disabled, membership: :anonymous, access: nil2278 allows actions based on membership2279 container_level: :private, access_level: :private, membership: :admin, access: :all2280 allows actions based on membership2281 container_level: :private, access_level: :private, membership: :maintainer, access: :maintainer2282 allows actions based on membership2283 container_level: :private, access_level: :private, membership: :developer, access: :developer2284 allows actions based on membership2285 container_level: :private, access_level: :private, membership: :reporter, access: :reporter2286 allows actions based on membership2287 container_level: :private, access_level: :private, membership: :guest, access: :guest2288 allows actions based on membership2289 container_level: :private, access_level: :private, membership: :non_member, access: nil2290 allows actions based on membership2291 container_level: :private, access_level: :private, membership: :anonymous, access: nil2292 allows actions based on membership2293 container_level: :private, access_level: :disabled, membership: :admin, access: nil2294 allows actions based on membership2295 container_level: :private, access_level: :disabled, membership: :maintainer, access: nil2296 allows actions based on membership2297 container_level: :private, access_level: :disabled, membership: :developer, access: nil2298 allows actions based on membership2299 container_level: :private, access_level: :disabled, membership: :reporter, access: nil2300 allows actions based on membership2301 container_level: :private, access_level: :disabled, membership: :guest, access: nil2302 allows actions based on membership2303 container_level: :private, access_level: :disabled, membership: :non_member, access: nil2304 allows actions based on membership2305 container_level: :private, access_level: :disabled, membership: :anonymous, access: nil2306 allows actions based on membership2307 when the feature is not licensed on this group2308 does not include the wiki permissions2309 behaves like update namespace limit policy2310 update_subscription_limit2311 role: :user, is_com: true, allowed: false2312 when admin mode enabled2313 is expected to be disallowed :update_subscription_limit2314 when admin mode disabled2315 is expected to be disallowed :update_subscription_limit2316 role: :owner, is_com: true, allowed: false2317 when admin mode enabled2318 is expected to be disallowed :update_subscription_limit2319 when admin mode disabled2320 is expected to be disallowed :update_subscription_limit2321 role: :admin, is_com: true, allowed: true2322 when admin mode enabled2323 is expected to be allowed :update_subscription_limit2324 when admin mode disabled2325 is expected to be disallowed :update_subscription_limit2326 role: :user, is_com: false, allowed: false2327 when admin mode enabled2328 is expected to be disallowed :update_subscription_limit2329 when admin mode disabled2330 is expected to be disallowed :update_subscription_limit2331 role: :owner, is_com: false, allowed: false2332 when admin mode enabled2333 is expected to be disallowed :update_subscription_limit2334 when admin mode disabled2335 is expected to be disallowed :update_subscription_limit2336 role: :admin, is_com: false, allowed: false2337 when admin mode enabled2338 is expected to be disallowed :update_subscription_limit2339 when admin mode disabled2340 is expected to be disallowed :update_subscription_limit2341 group access tokens2342 GitLab.com Core resource access tokens2343 with owner access2344 is expected not to be allowed :create_resource_access_tokens2345 is expected not to be allowed :admin_setting_to_allow_resource_access_token_creation2346 is expected to be allowed :read_resource_access_tokens2347 is expected to be allowed :destroy_resource_access_tokens2348 on GitLab.com paid2349 with owner2350 behaves like GitLab.com Paid plan resource access tokens2351 on SaaS2352 is expected to be allowed :create_resource_access_tokens2353 is expected to be allowed :read_resource_access_tokens2354 is expected to be allowed :destroy_resource_access_tokens2355 when personal access tokens are disabled2356 is expected not to be allowed :create_resource_access_tokens2357 is expected not to be allowed :read_resource_access_tokens2358 is expected not to be allowed :destroy_resource_access_tokens2359 create resource access tokens2360 is expected to be allowed :create_resource_access_tokens2361 when resource access token creation is not allowed2362 is expected not to be allowed :create_resource_access_tokens2363 when parent group has resource access token creation disabled2364 cannot create resource access tokens2365 is expected not to be allowed :create_resource_access_tokens2366 can render admin settings for resource access token2367 is expected to be allowed :admin_setting_to_allow_resource_access_token_creation2368 read resource access tokens2369 is expected to be allowed :read_resource_access_tokens2370 destroy resource access tokens2371 is expected to be allowed :destroy_resource_access_tokens2372 admin settings `allow resource access token` is allowed2373 is expected to be allowed :admin_setting_to_allow_resource_access_token_creation2374 with developer2375 create resource access tokens2376 is expected not to be allowed :create_resource_access_tokens2377 read resource access tokens2378 is expected not to be allowed :read_resource_access_tokens2379 destroy resource access tokens2380 is expected not to be allowed :destroy_resource_access_tokens2381 :read_group_release_stats2382 when group is private2383 behaves like read_group_release_stats permissions2384 when user is logged out2385 is expected to be disallowed :read_group_release_stats2386 when user is not a member of the group2387 is expected to be disallowed :read_group_release_stats2388 when user is guest2389 is expected to be allowed :read_group_release_stats2390 when group is public2391 behaves like read_group_release_stats permissions2392 when user is logged out2393 is expected to be disallowed :read_group_release_stats2394 when user is not a member of the group2395 is expected to be disallowed :read_group_release_stats2396 when user is guest2397 is expected to be allowed :read_group_release_stats2398 :admin_merge_request_approval_settings2399 role: :guest, licensed: true, admin_mode: nil, root_group: true, allowed: false2400 is expected to be disallowed :admin_merge_request_approval_settings2401 role: :guest, licensed: false, admin_mode: nil, root_group: true, allowed: false2402 is expected to be disallowed :admin_merge_request_approval_settings2403 role: :reporter, licensed: true, admin_mode: nil, root_group: true, allowed: false2404 is expected to be disallowed :admin_merge_request_approval_settings2405 role: :reporter, licensed: false, admin_mode: nil, root_group: true, allowed: false2406 is expected to be disallowed :admin_merge_request_approval_settings2407 role: :developer, licensed: true, admin_mode: nil, root_group: true, allowed: false2408 is expected to be disallowed :admin_merge_request_approval_settings2409 role: :developer, licensed: false, admin_mode: nil, root_group: true, allowed: false2410 is expected to be disallowed :admin_merge_request_approval_settings2411 role: :maintainer, licensed: true, admin_mode: nil, root_group: true, allowed: false2412 is expected to be disallowed :admin_merge_request_approval_settings2413 role: :maintainer, licensed: false, admin_mode: nil, root_group: true, allowed: false2414 is expected to be disallowed :admin_merge_request_approval_settings2415 role: :owner, licensed: true, admin_mode: nil, root_group: true, allowed: true2416 is expected to be allowed :admin_merge_request_approval_settings2417 role: :owner, licensed: true, admin_mode: nil, root_group: false, allowed: false2418 is expected to be disallowed :admin_merge_request_approval_settings2419 role: :owner, licensed: false, admin_mode: nil, root_group: true, allowed: false2420 is expected to be disallowed :admin_merge_request_approval_settings2421 role: :admin, licensed: true, admin_mode: true, root_group: true, allowed: true2422 is expected to be allowed :admin_merge_request_approval_settings2423 role: :admin, licensed: true, admin_mode: true, root_group: false, allowed: false2424 is expected to be disallowed :admin_merge_request_approval_settings2425 role: :admin, licensed: false, admin_mode: true, root_group: true, allowed: false2426 is expected to be disallowed :admin_merge_request_approval_settings2427 role: :admin, licensed: true, admin_mode: false, root_group: true, allowed: false2428 is expected to be disallowed :admin_merge_request_approval_settings2429 role: :admin, licensed: false, admin_mode: false, root_group: true, allowed: false2430 is expected to be disallowed :admin_merge_request_approval_settings2431 :start_trial2432 role: :guest, eligible_for_trial: true, admin_mode: nil, allowed: false2433 is expected to be disallowed :start_trial2434 role: :guest, eligible_for_trial: false, admin_mode: nil, allowed: false2435 is expected to be disallowed :start_trial2436 role: :reporter, eligible_for_trial: true, admin_mode: nil, allowed: false2437 is expected to be disallowed :start_trial2438 role: :reporter, eligible_for_trial: false, admin_mode: nil, allowed: false2439 is expected to be disallowed :start_trial2440 role: :developer, eligible_for_trial: true, admin_mode: nil, allowed: false2441 is expected to be disallowed :start_trial2442 role: :developer, eligible_for_trial: false, admin_mode: nil, allowed: false2443 is expected to be disallowed :start_trial2444 role: :maintainer, eligible_for_trial: true, admin_mode: nil, allowed: true2445 is expected to be allowed :start_trial2446 role: :maintainer, eligible_for_trial: false, admin_mode: nil, allowed: false2447 is expected to be disallowed :start_trial2448 role: :owner, eligible_for_trial: true, admin_mode: nil, allowed: true2449 is expected to be allowed :start_trial2450 role: :owner, eligible_for_trial: false, admin_mode: nil, allowed: false2451 is expected to be disallowed :start_trial2452 role: :admin, eligible_for_trial: true, admin_mode: true, allowed: true2453 is expected to be allowed :start_trial2454 role: :admin, eligible_for_trial: false, admin_mode: true, allowed: false2455 is expected to be disallowed :start_trial2456 role: :admin, eligible_for_trial: true, admin_mode: false, allowed: false2457 is expected to be disallowed :start_trial2458 role: :admin, eligible_for_trial: false, admin_mode: false, allowed: false2459 is expected to be disallowed :start_trial2460 compliance framework permissions2461 :admin_compliance_framework2462 role: :owner, licensed: true, admin_mode: nil, allowed: true2463 is expected to be allowed :admin_compliance_framework2464 role: :owner, licensed: false, admin_mode: nil, allowed: false2465 is expected to be disallowed :admin_compliance_framework2466 role: :admin, licensed: true, admin_mode: true, allowed: true2467 is expected to be allowed :admin_compliance_framework2468 role: :admin, licensed: true, admin_mode: false, allowed: false2469 is expected to be disallowed :admin_compliance_framework2470 role: :maintainer, licensed: true, admin_mode: nil, allowed: false2471 is expected to be disallowed :admin_compliance_framework2472 role: :developer, licensed: true, admin_mode: nil, allowed: false2473 is expected to be disallowed :admin_compliance_framework2474 role: :reporter, licensed: true, admin_mode: nil, allowed: false2475 is expected to be disallowed :admin_compliance_framework2476 role: :guest, licensed: true, admin_mode: nil, allowed: false2477 is expected to be disallowed :admin_compliance_framework2478 :admin_compliance_pipeline_configuration2479 role: :owner, licensed: true, admin_mode: nil, allowed: true2480 is expected to be allowed :admin_compliance_pipeline_configuration2481 role: :owner, licensed: false, admin_mode: nil, allowed: false2482 is expected to be disallowed :admin_compliance_pipeline_configuration2483 role: :admin, licensed: true, admin_mode: true, allowed: true2484 is expected to be allowed :admin_compliance_pipeline_configuration2485 role: :admin, licensed: true, admin_mode: false, allowed: false2486 is expected to be disallowed :admin_compliance_pipeline_configuration2487 role: :maintainer, licensed: true, admin_mode: nil, allowed: false2488 is expected to be disallowed :admin_compliance_pipeline_configuration2489 role: :developer, licensed: true, admin_mode: nil, allowed: false2490 is expected to be disallowed :admin_compliance_pipeline_configuration2491 role: :reporter, licensed: true, admin_mode: nil, allowed: false2492 is expected to be disallowed :admin_compliance_pipeline_configuration2493 role: :guest, licensed: true, admin_mode: nil, allowed: false2494 is expected to be disallowed :admin_compliance_pipeline_configuration2495 view_devops_adoption2496 when license does not include the feature2497 is expected to be disallowed :view_group_devops_adoption2498 when license includes the feature2499 role: :admin, allowed: true2500 is expected to be allowed :view_group_devops_adoption2501 role: :owner, allowed: true2502 is expected to be allowed :view_group_devops_adoption2503 role: :maintainer, allowed: true2504 is expected to be allowed :view_group_devops_adoption2505 role: :developer, allowed: true2506 is expected to be allowed :view_group_devops_adoption2507 role: :reporter, allowed: true2508 is expected to be allowed :view_group_devops_adoption2509 role: :guest, allowed: false2510 is expected to be disallowed :view_group_devops_adoption2511 role: :non_group_member, allowed: false2512 is expected to be disallowed :view_group_devops_adoption2513 role: :auditor, allowed: true2514 is expected to be allowed :view_group_devops_adoption2515 manage_devops_adoption_namespaces2516 when license does not include the feature2517 is expected to be disallowed :manage_devops_adoption_namespaces2518 when license includes the feature2519 role: :admin, allowed: true2520 is expected to be allowed :manage_devops_adoption_namespaces2521 role: :owner, allowed: true2522 is expected to be allowed :manage_devops_adoption_namespaces2523 role: :maintainer, allowed: true2524 is expected to be allowed :manage_devops_adoption_namespaces2525 role: :developer, allowed: true2526 is expected to be allowed :manage_devops_adoption_namespaces2527 role: :reporter, allowed: true2528 is expected to be allowed :manage_devops_adoption_namespaces2529 role: :guest, allowed: false2530 is expected to be disallowed :manage_devops_adoption_namespaces2531 role: :non_group_member, allowed: false2532 is expected to be disallowed :manage_devops_adoption_namespaces2533 when license plan does not include the feature2534 role: :admin, allowed: true2535 is expected to be allowed :manage_devops_adoption_namespaces2536 role: :owner, allowed: false2537 is expected to be disallowed :manage_devops_adoption_namespaces2538 role: :maintainer, allowed: false2539 is expected to be disallowed :manage_devops_adoption_namespaces2540 role: :developer, allowed: false2541 is expected to be disallowed :manage_devops_adoption_namespaces2542 role: :reporter, allowed: false2543 is expected to be disallowed :manage_devops_adoption_namespaces2544 role: :guest, allowed: false2545 is expected to be disallowed :manage_devops_adoption_namespaces2546 role: :non_group_member, allowed: false2547 is expected to be disallowed :manage_devops_adoption_namespaces2548 external audit events2549 when license is disabled2550 is expected to be disallowed :admin_external_audit_events2551 when license is enabled2552 is expected to be allowed :admin_external_audit_events2553 when user is not an owner2554 is expected to be disallowed :admin_external_audit_events2555 a pending membership2556 with a private group2557 role: :guest2558 has permission identical to a private group in which the user is not a member2559 role: :reporter2560 has permission identical to a private group in which the user is not a member2561 role: :developer2562 has permission identical to a private group in which the user is not a member2563 role: :maintainer2564 has permission identical to a private group in which the user is not a member2565 role: :owner2566 has permission identical to a private group in which the user is not a member2567 with a project in the group2568 role: :guest2569 has permission identical to a private group in which the user is not a member2570 role: :reporter2571 has permission identical to a private group in which the user is not a member2572 role: :developer2573 has permission identical to a private group in which the user is not a member2574 role: :maintainer2575 has permission identical to a private group in which the user is not a member2576 role: :owner2577 has permission identical to a private group in which the user is not a member2578 with a public group2579 role: :guest2580 has permission identical to a public group in which the user is not a member2581 role: :reporter2582 has permission identical to a public group in which the user is not a member2583 role: :developer2584 has permission identical to a public group in which the user is not a member2585 role: :maintainer2586 has permission identical to a public group in which the user is not a member2587 role: :owner2588 has permission identical to a public group in which the user is not a member2589 with a group invited to another group2590 role: :guest2591 has permission to the other group as if the user is not a member2592 role: :reporter2593 has permission to the other group as if the user is not a member2594 role: :developer2595 has permission to the other group as if the user is not a member2596 role: :maintainer2597 has permission to the other group as if the user is not a member2598 role: :owner2599 has permission to the other group as if the user is not a member2600 security complience policy2601 when licensed feature is available2602 with developer or maintainer role2603 role: "maintainer"2604 is expected to be disallowed :read_security_orchestration_policies2605 is expected to be disallowed :update_security_orchestration_policy_project2606 role: "developer"2607 is expected to be disallowed :read_security_orchestration_policies2608 is expected to be disallowed :update_security_orchestration_policy_project2609 with owner role2610 role: "owner"2611 is expected to be disallowed :read_security_orchestration_policies2612 is expected to be disallowed :update_security_orchestration_policy_project2613 is expected to be disallowed :modify_security_policy2614 when licensed feature is available2615 when security_orchestration_policy_configuration is not present2616 with developer or maintainer role2617 role: "maintainer"2618 is expected to be allowed :read_security_orchestration_policies2619 is expected to be disallowed :update_security_orchestration_policy_project2620 role: "developer"2621 is expected to be allowed :read_security_orchestration_policies2622 is expected to be disallowed :update_security_orchestration_policy_project2623 with owner role2624 role: "owner"2625 is expected to be allowed :read_security_orchestration_policies2626 is expected to be allowed :update_security_orchestration_policy_project2627 is expected to be allowed :modify_security_policy2628 when security_orchestration_policy_configuration is present2629 when current_user is developer of security_policy_management_project2630 is expected to be allowed :modify_security_policy2631 when current_user is not developer of security_policy_management_project2632 is expected to be disallowed :modify_security_policy2633 read_usage_quotas policy2634 reading usage quotas2635 role: :owner, admin_mode: nil, allowed: true2636 is expected to be allowed :read_usage_quotas2637 role: :admin, admin_mode: true, allowed: true2638 is expected to be allowed :read_usage_quotas2639 role: :admin, admin_mode: false, allowed: false2640 is expected to be disallowed :read_usage_quotas2641 role: :maintainer, admin_mode: nil, allowed: false2642 is expected to be disallowed :read_usage_quotas2643 role: :developer, admin_mode: nil, allowed: false2644 is expected to be disallowed :read_usage_quotas2645 role: :reporter, admin_mode: nil, allowed: false2646 is expected to be disallowed :read_usage_quotas2647 role: :guest, admin_mode: nil, allowed: false2648 is expected to be disallowed :read_usage_quotas2649 dependency proxy2650 feature enabled2651 auditor2652 is expected to be allowed :read_dependency_proxy2653 is expected to be disallowed :admin_dependency_proxy2654 read wiki2655 feature enabled2656 auditor2657 is expected to be allowed :read_wiki2658 is expected to be disallowed :admin_wiki2659 feature disabled2660 auditor2661 is expected to be disallowed :read_wiki2662 is expected to be disallowed :admin_wiki2663 group level compliance dashboard2664 feature enabled2665 auditor2666 is expected to be allowed :read_group_compliance_dashboard2667 feature disabled2668 auditor2669 is expected to be disallowed :read_group_compliance_dashboard2670 users banned from groups2671 when user is not banned2672 is expected to be allowed :read_group2673 when user is banned2674 is expected to be disallowed :read_group2675 when group is a subgroup2676 is expected to be disallowed :read_group2677 when user is an owner2678 is expected to be disallowed :read_group2679 when feature flag is disabled2680 is expected to be allowed :read_group2681 when group is public2682 is expected to be allowed :read_group2683 when user is a group owner2684 is expected to be disallowed :read_group2685 when user is an admin2686 is expected to be allowed :read_group2687 ban_group_member2688 unique_project_download_limit_enabled: false, is_owner: false, enabled: false2689 has the correct value2690 unique_project_download_limit_enabled: false, is_owner: true, enabled: false2691 has the correct value2692 unique_project_download_limit_enabled: true, is_owner: false, enabled: false2693 has the correct value2694 unique_project_download_limit_enabled: true, is_owner: true, enabled: true2695 has the correct value2696 group cicd runners2697 auditor2698 is expected to be allowed :read_group_runners2699 is expected to be allowed :read_group_all_available_runners2700 is expected to be disallowed :admin_group_runners2701 is expected to be disallowed :register_group_runners2702 group container registry2703 auditor2704 is expected to be allowed :read_container_image2705 is expected to be disallowed :admin_container_image2706 admin_service_accounts2707 when the feature is not enabled2708 is expected to be disallowed :admin_service_accounts2709 when feature is enabled2710 when the user is a maintainer2711 is expected to be disallowed :admin_service_accounts2712 when the user is an owner2713 is expected to be allowed :admin_service_accounts2714Geo::MergeRequestDiffRegistry2715 factory is valid2716 obligatory fields check2717 has expected fields or methods2718 scopes2719 sync_timed_out2720 return correct records2721 finders2722 .find_registries_never_attempted_sync2723 returns unsynced items2724 returns items that never have an attempt to sync except some specific item ID2725 .find_registries_needs_sync_again2726 returns failed items2727 returns failed items except some specific item ID2728 orders records according to retry_at2729 .fail_sync_timeouts2730 marks started records as failed if they are expired2731 #failed!2732 sets last_sync_failure with message2733 truncates a long last_sync_failure2734 increments retry_count2735 sets retry_at to a time in the future2736 when an error is given2737 includes error.message in last_sync_failure2738 when missing_on_primary is not given2739 caps retry_at to default 1 hour2740 when missing_on_primary is falsey2741 caps retry_at to default 1 hour2742 when missing_on_primary is truthy2743 caps retry_at to 4 hours2744 #synced!2745 mark as synced2746 when a sync was scheduled after the last sync finishes2747 does not reset state2748 resets the other sync state fields2749 #pending!2750 when a sync is currently running2751 successfully moves state to pending2752 when the registry has recorded a failure2753 clears failure retry fields2754 state machine2755 when transitioning to synced2756 marks verification as pending2757 when the model_record cannot be verified2758 when the registry is already verification_disabled2759 changes verification to disabled2760 when the registry is verification_pending2761 changes verification to disabled2762 verification_state machine2763 when transitioning to verification_failed2764 changes state from synced to failed2765 .verification_pending_batch2766 returns IDs of rows which are synced and pending verification2767 excludes rows which are not synced or are not pending verification2768 marks verification as started2769 .verification_failed_batch2770 with a failed record with retry due2771 returns IDs of rows which are synced and have failed verification2772 excludes rows which are not synced or have not failed verification2773 marks verification as started2774 when verification_retry_at is in the future2775 does not return the row which failed verification2776 .needs_verification_count2777 returns the number of rows which are synced and pending verification2778 includes rows which are synced and failed verification and are due for retry2779 excludes rows which are synced and failed verification and have a future retry time2780 excludes rows which are not synced or are not (pending or failed) verification2781 #verification_succeeded!2782 clears checksum mismatch fields2783 #track_checksum_attempt!2784 yields to the checksum calculation2785 when verification was not yet started2786 starts verification2787 when the model record cannot be verified2788 when the registry is already verification_disabled2789 leaves verification as disabled2790 when the registry is verification_pending2791 changes verification to disabled2792 when the primary site is expected to checksum the model record2793 comparison with primary checksum2794 when the calculated checksum matches the primary checksum2795 transitions to verification_succeeded and updates the checksum2796 when the calculated checksum does not match the primary checksum2797 transitions to verification_failed and updates mismatch fields2798 when verification was started2799 does not update verification_started_at2800 when an error occurs while yielding2801 sets verification_failed2802 .with_search2803 when query is empty2804 returns all registries2805 when query is not empty2806 calls model_class search method2807gitlab:seed:group_seed rake task2808 performs group seed successfully2809Projects::UpdateMirrorService2810 #execute2811 fetches the upstream repository2812 runs project housekeeping2813 rescues exceptions from Repository#ff_merge2814 returns success when updated succeeds2815 disables mirroring protected branches only by default2816 fails when the mirror user doesn't have access2817 fails when no user is present2818 returns success when there is no mirror2819 unlicensed2820 does nothing2821 when mirror user is blocked2822 fails and returns error status2823 when the URL is blocked2824 fails and returns error status2825 when given URLs contain escaped elements2826 behaves like URLs containing escaped elements return expected status2827 url: "https://user:0a%23@test.example.com/project.git", result_status: :success2828 returns expected status2829 url: "https://git.example.com:1%2F%2F@source.developers.google.com/project.git", result_status: :success2830 returns expected status2831 url: "git%3A%2F%2Flocalhost%3A1234%2Fsome-path%3Fsome-query%3Dsome-val%23%40example.com%2F", result_status: :error2832 returns expected status2833 url: "https%253A%252F%252Fuser%253A0a%252523%2540test.example.com%252Fproject.git", result_status: :error2834 returns expected status2835 updating tags2836 creates new tags, expiring cache if there are tag changes2837 does not expire cache if there are no tag changes2838 only invokes Git::TagPushService for tags pointing to commits2839 Protected tags mirroring2840 when user has permissions to create a protected tag2841 creates the protected tag2842 when user cannot create a protected tag2843 creates only tags that user can create2844 when repository is in read-only mode2845 does not run if repository is set to read-only2846 when tags on mirror are modified2847 when mirror_overwrites_diverged_branches is true2848 updates the tag2849 updates the modified branch2850 returns success2851 when mirror_overwrites_diverged_branches is false2852 updates the tag2853 does not update the modified branch2854 returns success2855 updating branches2856 when the mirror has a repository2857 creates new branches2858 does not execute N+1 redis cache commands2859 updates existing branches2860 when branch cannot be created2861 returns an error2862 when mirror only protected branches option is set2863 creates a new protected branch2864 does not create an unprotected branch2865 updates existing protected branches2866 does not update unprotected branches2867 when mirror_branch_regex is set2868 create a new matched branch2869 does not create mismatched branch2870 updates existing matched branches2871 does not update mismatched branches2872 with diverged branches2873 when mirror_overwrites_diverged_branches is true2874 update diverged branches2875 when mirror_overwrites_diverged_branches is false2876 doesn't update diverged branches2877 when mirror_overwrites_diverged_branches is nil2878 doesn't update diverged branches2879 when project is empty2880 does not add a default master branch2881 updating LFS objects2882 when repository does not change2883 does not attempt to update LFS objects2884 when repository changes2885 when Lfs is disabled in the project2886 does not update LFS objects2887 when Lfs is enabled in the project2888 updates LFS objects2889 when Lfs import fails2890 does not fail mirror operation2891 logs the error2892Projects::UpdateService#execute2893 returns an error result when record cannot be updated2894 calls remove_import_data if mirror was disabled in previous change2895 shared runners2896 when shared runners are on2897 disables shared runners2898 when user has valid credit card2899 disables shared runners2900 when shared runners are off2901 when user has valid credit card2902 enables shared runners2903 when user does not have valid credit card2904 does not enable shared runners2905 repository mirror2906 sets mirror attributes2907 does not touch mirror_user_id for non-mirror changes2908 forbids non-admins from setting mirror_user_id explicitly2909 allows admins to set mirror_user_id2910 forces an import job2911 when update mirror branch setting2912 allow mirror_branch_regex to be updated2913 enable only_mirror_protected_branches would clean mirror_branch_regex2914 fill mirror_branch_regex would disable only_mirror_protected_branches2915 when `mirror_only_branches_match_regex` FF is disabled2916 ignores mirror_branch_regex parameter2917 audit events2918 #name2919 when licensed2920 does not log audit event if operation fails2921 does not log audit event if operation results in no change2922 when operation succeeds2923 logs an audit event2924 logs the audit event info2925 calls the audit method with the event type2926 when not licensed2927 does not log audit event2928 #path2929 when licensed2930 does not log audit event if operation fails2931 does not log audit event if operation results in no change2932 when operation succeeds2933 logs an audit event2934 logs the audit event info2935 calls the audit method with the event type2936 when not licensed2937 does not log audit event2938 #default_branch2939 when licensed2940 does not log audit event if operation fails2941 does not log audit event if operation results in no change2942 when operation succeeds2943 logs an audit event2944 logs the audit event info2945 calls the audit method with the event type2946 when not licensed2947 does not log audit event2948 #visibility2949 when licensed2950 does not log audit event if operation fails2951 does not log audit event if operation results in no change2952 when operation succeeds2953 logs an audit event2954 logs the audit event info2955 calls the audit method with the event type2956 when not licensed2957 does not log audit event2958 triggering wiki Geo syncs2959 with geo_project_wiki_repository_replication feature flag disabled2960 when on a Geo primary site2961 when enabling a wiki2962 creates a RepositoryUpdatedEvent2963 when we update project but not enabling a wiki2964 when the wiki is disabled2965 does not create a RepositoryUpdatedEvent2966 when the wiki was already enabled2967 does not create a RepositoryUpdatedEvent2968 when not on a Geo primary site2969 does not create a RepositoryUpdatedEvent when enabling a wiki2970 with geo_project_wiki_repository_replication feature flag enabled2971 when on a Geo primary site2972 when enabling a wiki2973 does not call Geo::RepositoryUpdatedService2974 calls replicator to update Geo2975 when we update project but not enabling a wiki2976 when the wiki is disabled2977 does not call Geo::RepositoryUpdatedService2978 does not call replicator to update Geo2979 when the wiki was already enabled2980 does not call Geo::RepositoryUpdatedService2981 does not call replicator to update Geo2982 when not on a Geo primary site2983 when enabling a wiki2984 does not call Geo::RepositoryUpdatedService2985 does not call replicator to update Geo2986 repository_size_limit assignment as Bytes2987 when param present2988 converts from MB to Bytes2989 when param not present2990 assign nil value2991 when there are merge requests in merge train2992 when merge pipelines option is disabled2993 drops all merge request in the train2994 when merge pipelines option stays enabled2995 does not drop all merge request in the train2996 triggering suggested reviewer project registrations2997 when available2998 when enabled2999 behaves like not calling registration worker3000 does not call perform_async3001 when not enabled3002 when not allowed to create access token3003 behaves like not calling registration worker3004 does not call perform_async3005 when allowed to create access token3006 sets the setting3007 behaves like calling registration worker3008 calls perform_async3009 when form param is set to false3010 behaves like not calling registration worker3011 does not call perform_async3012 when not available3013 when enabled3014 behaves like not calling registration worker3015 does not call perform_async3016 when not enabled3017 does not set the setting3018 behaves like not calling registration worker3019 does not call perform_async3020 custom compliance frameworks3021 when current_user has :admin_compliance_framework ability3022 updates the framework3023 unassigns a framework from a project3024 when current_user does not have :admin_compliance_framework ability3025 does not set a framework3026 updating analytics_dashboards_pointer_attributes.target_project_id param3027 updates the Analytics Dashboards pointer project3028 when pointer project is empty3029 removes pointer project3030Gitlab::Middleware::ReadOnly3031 when maintenance mode is on3032 behaves like write access for a read-only GitLab (EE) instance in maintenance mode3033 normal requests to a read-only GitLab instance3034 expects a PUT request to /api/v4/application/settings to be allowed3035 expects a POST request to /admin/application_settings/general to be allowed3036 behaves like allowlisted /admin/geo requests3037 allowlisted requests3038 behaves like allowlisted request3039 expects a PATCH request to /admin/geo/sites/1 to be allowed3040 behaves like allowlisted request3041 expects a DELETE request to /admin/geo/replication/projects/1 to be allowed3042 behaves like allowlisted request3043 expects a POST request to /admin/geo/replication/projects/1/resync to be allowed3044 behaves like allowlisted request3045 expects a POST request to /admin/geo/replication/projects/1/reverify to be allowed3046 behaves like allowlisted request3047 expects a POST request to /admin/geo/replication/projects/reverify_all to be allowed3048 behaves like allowlisted request3049 expects a POST request to /admin/geo/replication/projects/resync_all to be allowed3050 behaves like allowlisted request3051 expects a POST request to /admin/geo/replication/projects/1/force_redownload to be allowed3052 without Geo enabled3053 behaves like LFS changes are disallowed3054 description: "LFS request to locks verify", path: "/root/rouge.git/info/lfs/locks/verify"3055 expects a POST description: "LFS request to locks verify", path: "/root/rouge.git/info/lfs/locks/verify" URL not to be allowed3056 expects a POST description: "LFS request to locks verify", path: "/root/rouge.git/info/lfs/locks/verify" URL with trailing backslash not to be allowed3057 description: "LFS request to locks create", path: "/root/rouge.git/info/lfs/locks"3058 expects a POST description: "LFS request to locks create", path: "/root/rouge.git/info/lfs/locks" URL not to be allowed3059 expects a POST description: "LFS request to locks create", path: "/root/rouge.git/info/lfs/locks" URL with trailing backslash not to be allowed3060 description: "LFS request to locks unlock", path: "/root/rouge.git/info/lfs/locks/1/unlock"3061 expects a POST description: "LFS request to locks unlock", path: "/root/rouge.git/info/lfs/locks/1/unlock" URL not to be allowed3062 expects a POST description: "LFS request to locks unlock", path: "/root/rouge.git/info/lfs/locks/1/unlock" URL with trailing backslash not to be allowed3063 behaves like sign in/out and OAuth are allowed3064 description: "sign in route", path: "/users/sign_in"3065 expects a POST to description: "sign in route", path: "/users/sign_in" URL to be allowed3066 expects a POST to description: "sign in route", path: "/users/sign_in" URL with trailing slash to be allowed3067 description: "sign out route", path: "/users/sign_out"3068 expects a POST to description: "sign out route", path: "/users/sign_out" URL to be allowed3069 expects a POST to description: "sign out route", path: "/users/sign_out" URL with trailing slash to be allowed3070 description: "oauth token route", path: "/oauth/token"3071 expects a POST to description: "oauth token route", path: "/oauth/token" URL to be allowed3072 expects a POST to description: "oauth token route", path: "/oauth/token" URL with trailing slash to be allowed3073 description: "SSO callback route", path: "/users/auth/gitlab/callback"3074 expects a POST to description: "SSO callback route", path: "/users/auth/gitlab/callback" URL to be allowed3075 expects a POST to description: "SSO callback route", path: "/users/auth/gitlab/callback" URL with trailing slash to be allowed3076 description: "LDAP callback route", path: "/users/auth/ldapmain/callback"3077 expects a POST to description: "LDAP callback route", path: "/users/auth/ldapmain/callback" URL to be allowed3078 expects a POST to description: "LDAP callback route", path: "/users/auth/ldapmain/callback" URL with trailing slash to be allowed3079 description: "SAML regular route", path: "/users/auth/saml"3080 expects a POST to description: "SAML regular route", path: "/users/auth/saml" URL to be allowed3081 expects a POST to description: "SAML regular route", path: "/users/auth/saml" URL with trailing slash to be allowed3082 on Geo primary3083 allows Geo node status updates from Geo secondaries3084 behaves like LFS changes are disallowed3085 description: "LFS request to locks verify", path: "/root/rouge.git/info/lfs/locks/verify"3086 expects a POST description: "LFS request to locks verify", path: "/root/rouge.git/info/lfs/locks/verify" URL not to be allowed3087 expects a POST description: "LFS request to locks verify", path: "/root/rouge.git/info/lfs/locks/verify" URL with trailing backslash not to be allowed3088 description: "LFS request to locks create", path: "/root/rouge.git/info/lfs/locks"3089 expects a POST description: "LFS request to locks create", path: "/root/rouge.git/info/lfs/locks" URL not to be allowed3090 expects a POST description: "LFS request to locks create", path: "/root/rouge.git/info/lfs/locks" URL with trailing backslash not to be allowed3091 description: "LFS request to locks unlock", path: "/root/rouge.git/info/lfs/locks/1/unlock"3092 expects a POST description: "LFS request to locks unlock", path: "/root/rouge.git/info/lfs/locks/1/unlock" URL not to be allowed3093 expects a POST description: "LFS request to locks unlock", path: "/root/rouge.git/info/lfs/locks/1/unlock" URL with trailing backslash not to be allowed3094 behaves like sign in/out and OAuth are allowed3095 description: "sign in route", path: "/users/sign_in"3096 expects a POST to description: "sign in route", path: "/users/sign_in" URL to be allowed3097 expects a POST to description: "sign in route", path: "/users/sign_in" URL with trailing slash to be allowed3098 description: "sign out route", path: "/users/sign_out"3099 expects a POST to description: "sign out route", path: "/users/sign_out" URL to be allowed3100 expects a POST to description: "sign out route", path: "/users/sign_out" URL with trailing slash to be allowed3101 description: "oauth token route", path: "/oauth/token"3102 expects a POST to description: "oauth token route", path: "/oauth/token" URL to be allowed3103 expects a POST to description: "oauth token route", path: "/oauth/token" URL with trailing slash to be allowed3104 description: "SSO callback route", path: "/users/auth/gitlab/callback"3105 expects a POST to description: "SSO callback route", path: "/users/auth/gitlab/callback" URL to be allowed3106 expects a POST to description: "SSO callback route", path: "/users/auth/gitlab/callback" URL with trailing slash to be allowed3107 description: "LDAP callback route", path: "/users/auth/ldapmain/callback"3108 expects a POST to description: "LDAP callback route", path: "/users/auth/ldapmain/callback" URL to be allowed3109 expects a POST to description: "LDAP callback route", path: "/users/auth/ldapmain/callback" URL with trailing slash to be allowed3110 description: "SAML regular route", path: "/users/auth/saml"3111 expects a POST to description: "SAML regular route", path: "/users/auth/saml" URL to be allowed3112 expects a POST to description: "SAML regular route", path: "/users/auth/saml" URL with trailing slash to be allowed3113 on Geo secondary3114 expects a PUT request to /api/v4/application/settings to not be allowed3115 allows Geo POST GraphQL requests3116 description: "LFS request to batch", path: "/root/rouge.git/info/lfs/objects/batch"3117 expects a POST description: "LFS request to batch", path: "/root/rouge.git/info/lfs/objects/batch" URL to be allowed3118 expects a POST description: "LFS request to batch", path: "/root/rouge.git/info/lfs/objects/batch" URL with trailing slash to be allowed3119 description: "to geo replication node api", path: "/api/v4/geo_replication/designs/resync"3120 expects a POST description: "to geo replication node api", path: "/api/v4/geo_replication/designs/resync" URL to be allowed3121 expects a POST description: "to geo replication node api", path: "/api/v4/geo_replication/designs/resync" URL with trailing slash to be allowed3122 description: "Geo sign in", path: "/users/auth/geo/sign_in"3123 expects a POST description: "Geo sign in", path: "/users/auth/geo/sign_in" URL to be allowed3124 expects a POST description: "Geo sign in", path: "/users/auth/geo/sign_in" URL with trailing slash to be allowed3125 description: "Geo sign out", path: "/users/auth/geo/sign_out"3126 expects a POST description: "Geo sign out", path: "/users/auth/geo/sign_out" URL to be allowed3127 expects a POST description: "Geo sign out", path: "/users/auth/geo/sign_out" URL with trailing slash to be allowed3128 description: "LFS request to locks verify", path: "/root/rouge.git/info/lfs/locks/verify"3129 expects a POST description: "LFS request to locks verify", path: "/root/rouge.git/info/lfs/locks/verify" URL to not be allowed3130 expects a POST description: "LFS request to locks verify", path: "/root/rouge.git/info/lfs/locks/verify" URL with traling slash to not be allowed3131 description: "LFS request to locks create", path: "/root/rouge.git/info/lfs/locks"3132 expects a POST description: "LFS request to locks create", path: "/root/rouge.git/info/lfs/locks" URL to not be allowed3133 expects a POST description: "LFS request to locks create", path: "/root/rouge.git/info/lfs/locks" URL with traling slash to not be allowed3134 description: "LFS request to locks unlock", path: "/root/rouge.git/info/lfs/locks/1/unlock"3135 expects a POST description: "LFS request to locks unlock", path: "/root/rouge.git/info/lfs/locks/1/unlock" URL to not be allowed3136 expects a POST description: "LFS request to locks unlock", path: "/root/rouge.git/info/lfs/locks/1/unlock" URL with traling slash to not be allowed3137 description: "git-receive-pack", path: "/root/rouge.git/git-receive-pack"3138 expects a POST description: "git-receive-pack", path: "/root/rouge.git/git-receive-pack" URL to not be allowed3139 expects a POST description: "git-receive-pack", path: "/root/rouge.git/git-receive-pack" URL with traling slash to not be allowed3140 description: "application settings", path: "/admin/application_settings/general"3141 expects a POST description: "application settings", path: "/admin/application_settings/general" URL to not be allowed3142 expects a POST description: "application settings", path: "/admin/application_settings/general" URL with traling slash to not be allowed3143 when maintenance mode is not on3144 behaves like write access for a read-only GitLab (EE) instance3145 normal requests to a read-only GitLab instance3146 behaves like allowlisted /admin/geo requests3147 allowlisted requests3148 behaves like allowlisted request3149 expects a PATCH request to /admin/geo/sites/1 to be allowed3150 behaves like allowlisted request3151 expects a DELETE request to /admin/geo/replication/projects/1 to be allowed3152 behaves like allowlisted request3153 expects a POST request to /admin/geo/replication/projects/1/resync to be allowed3154 behaves like allowlisted request3155 expects a POST request to /admin/geo/replication/projects/1/reverify to be allowed3156 behaves like allowlisted request3157 expects a POST request to /admin/geo/replication/projects/reverify_all to be allowed3158 behaves like allowlisted request3159 expects a POST request to /admin/geo/replication/projects/resync_all to be allowed3160 behaves like allowlisted request3161 expects a POST request to /admin/geo/replication/projects/1/force_redownload to be allowed3162 on Geo secondary3163 description: "LFS request to batch", path: "/root/rouge.git/info/lfs/objects/batch"3164 expects a POST description: "LFS request to batch", path: "/root/rouge.git/info/lfs/objects/batch" URL to be allowed3165 expects a POST description: "LFS request to batch", path: "/root/rouge.git/info/lfs/objects/batch" URL with a trailing slash to be allowed3166 description: "LFS request to locks verify", path: "/root/rouge.git/info/lfs/locks/verify"3167 expects a POST description: "LFS request to locks verify", path: "/root/rouge.git/info/lfs/locks/verify" URL to be allowed3168 expects a POST description: "LFS request to locks verify", path: "/root/rouge.git/info/lfs/locks/verify" URL with a trailing slash to be allowed3169 description: "LFS request to locks create", path: "/root/rouge.git/info/lfs/locks"3170 expects a POST description: "LFS request to locks create", path: "/root/rouge.git/info/lfs/locks" URL to be allowed3171 expects a POST description: "LFS request to locks create", path: "/root/rouge.git/info/lfs/locks" URL with a trailing slash to be allowed3172 description: "LFS request to locks unlock", path: "/root/rouge.git/info/lfs/locks/1/unlock"3173 expects a POST description: "LFS request to locks unlock", path: "/root/rouge.git/info/lfs/locks/1/unlock" URL to be allowed3174 expects a POST description: "LFS request to locks unlock", path: "/root/rouge.git/info/lfs/locks/1/unlock" URL with a trailing slash to be allowed3175 description: "to geo replication node api", path: "/api/v4/geo_replication/designs/resync"3176 expects a POST description: "to geo replication node api", path: "/api/v4/geo_replication/designs/resync" URL to be allowed3177 expects a POST description: "to geo replication node api", path: "/api/v4/geo_replication/designs/resync" URL with a trailing slash to be allowed3178 description: "git-receive-pack", path: "/root/rouge.git/git-receive-pack"3179 expects a POST description: "git-receive-pack", path: "/root/rouge.git/git-receive-pack" URL to be allowed3180 expects a POST description: "git-receive-pack", path: "/root/rouge.git/git-receive-pack" URL with a trailing slash to be allowed3181EpicPolicy3182 when epics feature is disabled3183 behaves like all epic permissions disabled3184 matches expected permissions3185 when epics features are enabled3186 when an epic is in a private group3187 anonymous user3188 behaves like all epic permissions disabled3189 matches expected permissions3190 user who is not a group member3191 behaves like all epic permissions disabled3192 matches expected permissions3193 behaves like group member permissions3194 guest group member3195 behaves like can only read epics3196 matches expected permissions3197 behaves like can comment on epics3198 is expected to be allowed :create_note and :award_emoji3199 behaves like cannot edit epic comments3200 is expected to be disallowed :admin_note3201 behaves like can admin epic relations3202 is expected to be allowed :admin_epic_relation, :admin_epic_tree_relation, and :admin_epic_link_relation3203 reporter group member3204 cannot destroy epics3205 behaves like can manage epics3206 matches expected permissions3207 behaves like can comment on epics3208 is expected to be allowed :create_note and :award_emoji3209 behaves like cannot edit epic comments3210 is expected to be disallowed :admin_note3211 group maintainer3212 cannot destroy epics3213 behaves like can manage epics3214 matches expected permissions3215 behaves like can comment on epics3216 is expected to be allowed :create_note and :award_emoji3217 behaves like can edit epic comments3218 is expected to be allowed :admin_note3219 group owner3220 can destroy epics3221 behaves like can manage epics3222 matches expected permissions3223 behaves like can comment on epics3224 is expected to be allowed :create_note and :award_emoji3225 behaves like can edit epic comments3226 is expected to be allowed :admin_note3227 when an epic is in an internal group3228 anonymous user3229 behaves like all epic permissions disabled3230 matches expected permissions3231 user who is not a group member3232 behaves like can only read epics3233 matches expected permissions3234 behaves like can comment on epics3235 is expected to be allowed :create_note and :award_emoji3236 behaves like cannot admin epic relations3237 is expected to be disallowed :admin_epic_relation, :admin_epic_tree_relation, and :admin_epic_link_relation3238 behaves like group member permissions3239 guest group member3240 behaves like can only read epics3241 matches expected permissions3242 behaves like can comment on epics3243 is expected to be allowed :create_note and :award_emoji3244 behaves like cannot edit epic comments3245 is expected to be disallowed :admin_note3246 behaves like can admin epic relations3247 is expected to be allowed :admin_epic_relation, :admin_epic_tree_relation, and :admin_epic_link_relation3248 reporter group member3249 cannot destroy epics3250 behaves like can manage epics3251 matches expected permissions3252 behaves like can comment on epics3253 is expected to be allowed :create_note and :award_emoji3254 behaves like cannot edit epic comments3255 is expected to be disallowed :admin_note3256 group maintainer3257 cannot destroy epics3258 behaves like can manage epics3259 matches expected permissions3260 behaves like can comment on epics3261 is expected to be allowed :create_note and :award_emoji3262 behaves like can edit epic comments3263 is expected to be allowed :admin_note3264 group owner3265 can destroy epics3266 behaves like can manage epics3267 matches expected permissions3268 behaves like can comment on epics3269 is expected to be allowed :create_note and :award_emoji3270 behaves like can edit epic comments3271 is expected to be allowed :admin_note3272 when an epic is in a public group3273 anonymous user3274 matches expected permissions3275 behaves like cannot comment on epics3276 is expected to be disallowed :create_note and :award_emoji3277 behaves like cannot admin epic relations3278 is expected to be disallowed :admin_epic_relation, :admin_epic_tree_relation, and :admin_epic_link_relation3279 user who is not a group member3280 behaves like can only read epics3281 matches expected permissions3282 behaves like can comment on epics3283 is expected to be allowed :create_note and :award_emoji3284 behaves like cannot admin epic relations3285 is expected to be disallowed :admin_epic_relation, :admin_epic_tree_relation, and :admin_epic_link_relation3286 behaves like group member permissions3287 guest group member3288 behaves like can only read epics3289 matches expected permissions3290 behaves like can comment on epics3291 is expected to be allowed :create_note and :award_emoji3292 behaves like cannot edit epic comments3293 is expected to be disallowed :admin_note3294 behaves like can admin epic relations3295 is expected to be allowed :admin_epic_relation, :admin_epic_tree_relation, and :admin_epic_link_relation3296 reporter group member3297 cannot destroy epics3298 behaves like can manage epics3299 matches expected permissions3300 behaves like can comment on epics3301 is expected to be allowed :create_note and :award_emoji3302 behaves like cannot edit epic comments3303 is expected to be disallowed :admin_note3304 group maintainer3305 cannot destroy epics3306 behaves like can manage epics3307 matches expected permissions3308 behaves like can comment on epics3309 is expected to be allowed :create_note and :award_emoji3310 behaves like can edit epic comments3311 is expected to be allowed :admin_note3312 group owner3313 can destroy epics3314 behaves like can manage epics3315 matches expected permissions3316 behaves like can comment on epics3317 is expected to be allowed :create_note and :award_emoji3318 behaves like can edit epic comments3319 is expected to be allowed :admin_note3320 when external authorization is enabled3321 does not call external authorization service3322 behaves like all epic permissions disabled3323 matches expected permissions3324 when epic is confidential3325 when user is not reporter3326 behaves like all epic permissions disabled3327 matches expected permissions3328 when user is reporter3329 behaves like all reporter epic permissions enabled3330 matches expected permissions3331 when user is developer3332 behaves like all reporter epic permissions enabled3333 matches expected permissions3334 when user is maintainer3335 behaves like all reporter epic permissions enabled3336 matches expected permissions3337 when user is owner3338 behaves like all reporter epic permissions enabled3339 matches expected permissions3340 user is support bot3341 when group has at least one project with service desk enabled3342 matches expected permissions3343 when group does not have projects with service desk enabled3344 behaves like all epic permissions disabled3345 matches expected permissions3346 when related_epics feature is not available3347 matches expected permissions3348 when subepics feature is not available3349 matches expected permissions3350Epics::IssuePromoteService3351 #execute3352 when epics are not enabled3353 raises a permission error3354 when epics and subepics are enabled3355 when a user can not promote the issue3356 raises a permission error3357 when a user can promote the issue3358 counts a usage ping event3359 when an issue does not belong to a group3360 raises an error3361 when the issue belongs to an epic3362 schedules update of cached metadata for the epic3363 when promoting issue3364 creates a new epic with correct attributes3365 copies group labels assigned to the issue3366 creates a system note on the issue3367 creates a system note on the epic3368 closes the original issue3369 marks the old issue as promoted3370 emits a snowplow event3371 when issue description has mentions and has notes with mentions3372 only saves user mentions with actual mentions3373 when issue description has an attachment3374 copies the description, rewriting the attachment3375 when issue has resource state event3376 does not raise error3377 creates a close state event for promoted issue3378 promotes issue successfully3379 when promoting issue to a different group3380 creates a new epic with correct attributes3381 when an issue belongs to an epic3382 behaves like successfully promotes issue to epic3383 creates a new epic with correct attributes3384 when subepics are disabled3385 creates a new epic without the parent3386 when promoting issue to a different group3387 behaves like successfully promotes issue to epic3388 creates a new epic with correct attributes3389 when subepics are disabled3390 creates a new epic without the parent3391 when promoting issue to a different group in the same hierarchy3392 when the group is a descendant group3393 behaves like successfully promotes issue to epic3394 creates a new epic with correct attributes3395 when subepics are disabled3396 creates a new epic without the parent3397 when the group is an ancestor group3398 behaves like successfully promotes issue to epic3399 creates a new epic with correct attributes3400 when subepics are disabled3401 creates a new epic without the parent3402 when issue and epic are confidential3403 promotes issue to epic3404 when issue was already promoted3405 raises error3406 when issue has notes3407 copies all notes3408 copies note attachments3409 on other issue types3410 on an incident3411 behaves like raising error3412 raises error3413 on a test case3414 behaves like raising error3415 raises error3416Notes::QuickActionsService3417 /epic3418 when epics are not enabled3419 does not assign the epic3420 when epics are enabled3421 when user have no access to the issue3422 does not assign the epic3423 when user have no access to the epic3424 does not assign the epic3425 on an issue3426 assigns the issue to the epic3427 leaves the note empty3428 creates a system note3429 on an incident3430 leaves the note empty3431 does not assigns the issue to the epic3432 on a merge request3433 leaves the note empty3434 /remove_epic3435 when epics are not enabled3436 does not remove the epic3437 when epics are enabled3438 when user have no access to the issue3439 does not remove the epic3440 when user have no access to the epic3441 does not remove the epic3442 on an issue3443 removes the epic3444 leaves the note empty3445 creates a system note3446 on an incident3447 leaves the note empty3448 on a test case3449 leaves the note empty3450 on a merge request3451 leaves the note empty3452 Epics3453 /close3454 when epics are not enabled3455 does not close the epic3456 when epics are enabled3457 closes the epic3458 leaves the note empty3459 /reopen3460 when epics are not enabled3461 does not reopen the epic3462 when epics are enabled3463 reopens the epic3464 leaves the note empty3465 /label3466 when epics are not enabled3467 does not add a label to the epic3468 when epics are enabled3469 adds a group label to the epic3470 leaves the note empty3471 /unlabel3472 when epics are not enabled3473 does not remove any label3474 when epics are enabled3475 removes a requested label from the epic3476 leaves the note empty3477 /assign_reviewer3478 with a merge request3479 behaves like assigns one or more reviewers to the merge request3480 adds multiple reviewers from the list (FAILED - 1)34821st Try error in ./ee/spec/support/shared_examples/quick_actions/merge_request/assign_reviewer_shared_examples.rb:8:3483expected: "Assigned @user716 and @user722 as reviewers."3484 got: "Assigned @user722 and @user716 as reviewers."3485(compared using ==)3487RSpec::Retry: 2nd try ./ee/spec/support/shared_examples/quick_actions/merge_request/assign_reviewer_shared_examples.rb:83488 behaves like assigns one or more reviewers to the merge request3489 adds multiple reviewers from the list3490 /assign3491 Issue assignees3492 adds multiple assignees from the list (FAILED - 2)34941st Try error in ./ee/spec/services/ee/notes/quick_actions_service_spec.rb:386:3495expected: "Assigned @user715 and @user725."3496 got: "Assigned @user725 and @user715."3497(compared using ==)3499RSpec::Retry: 2nd try ./ee/spec/services/ee/notes/quick_actions_service_spec.rb:3863500 behaves like assigning an already assigned user3501 adds multiple assignees from the list (FAILED - 3)35031st Try error in ./ee/spec/support/shared_examples/quick_actions/issuable/assign_shared_examples.rb:8:3504expected: "Assigned @user715 and @user727."3505 got: "Assigned @user727 and @user715."3506(compared using ==)3508RSpec::Retry: 2nd try ./ee/spec/support/shared_examples/quick_actions/issuable/assign_shared_examples.rb:83509 behaves like assigning an already assigned user3510 adds multiple assignees from the list3511 MergeRequest3512 behaves like assigning an already assigned user3513 adds multiple assignees from the list (FAILED - 4)35151st Try error in ./ee/spec/support/shared_examples/quick_actions/issuable/assign_shared_examples.rb:8:3516expected: "Assigned @user715 and @user730."3517 got: "Assigned @user730 and @user715."3518(compared using ==)3520RSpec::Retry: 2nd try ./ee/spec/support/shared_examples/quick_actions/issuable/assign_shared_examples.rb:83521 behaves like assigning an already assigned user3522 adds multiple assignees from the list3523 /unassign3524 Issue assignees3525 behaves like unassigning a not assigned user3526 adds multiple assignees from the list3527 behaves like unassigning a not assigned user3528 adds multiple assignees from the list3529 MergeRequest3530 behaves like unassigning a not assigned user3531 adds multiple assignees from the list3532 behaves like unassigning a not assigned user3533 adds multiple assignees from the list3534 /unassign_reviewer3535 with a merge request3536 behaves like unassigning one or more reviewers3537 removes multiple reviewers from the list3538 behaves like unassigning one or more reviewers3539 removes multiple reviewers from the list3540 /promote3541 when epics are enabled3542 when a user does not have permissions to promote an issue3543 does not promote an issue to an epic3544 when a user has permissions to promote an issue3545 promotes an issue to an epic3546 with a double promote3547 only creates one epic3548 when issue was already promoted3549 does not promote issue3550 when an issue belongs to a project without group3551 does not promote an issue to an epic3552 on an incident3553 does not promote to an epic3554 when epics are disabled3555 does not promote an issue to an epic3556 with issue types3557 when issue does not support quick actions3558 for requirement3559 behaves like note on issue type that does not support time tracking3560 /spend3561 does not change time spent3562 /estimate3563 does not execute time estimate3564 for test case3565 behaves like note on issue type that does not support time tracking3566 /spend3567 does not change time spent3568 /estimate3569 does not execute time estimate3570Vulnerabilities::StatDiff3571 #update_required?3572 when the vulnerability is destroyed3573 is expected to be truthy3574 when the vulnerability is not destroyed3575 when the severity is changed3576 is expected to be truthy3577 when the severity is not changed3578 when the state is changed3579 from: "confirmed", to: "detected", is_update_required: false3580 is expected to eq false3581 from: "confirmed", to: "resolved", is_update_required: true3582 is expected to eq true3583 from: "confirmed", to: "dismissed", is_update_required: true3584 is expected to eq true3585 from: "detected", to: "confirmed", is_update_required: false3586 is expected to eq false3587 from: "detected", to: "resolved", is_update_required: true3588 is expected to eq true3589 from: "detected", to: "dismissed", is_update_required: true3590 is expected to eq true3591 from: "resolved", to: "dismissed", is_update_required: false3592 is expected to eq false3593 from: "resolved", to: "confirmed", is_update_required: true3594 is expected to eq true3595 from: "resolved", to: "detected", is_update_required: true3596 is expected to eq true3597 from: "dismissed", to: "resolved", is_update_required: false3598 is expected to eq false3599 from: "dismissed", to: "confirmed", is_update_required: true3600 is expected to eq true3601 from: "dismissed", to: "detected", is_update_required: true3602 is expected to eq true3603 when the state is not changed3604 is expected to be falsey3605 #changes3606 when the vulnerability is destroyed3607 is expected to eq {"high"=>-1, "total"=>-1}3608 when the vulnerability is not destroyed3609 when the severity is changed3610 when the state is not changed3611 is expected to eq {"critical"=>1, "high"=>-1, "total"=>0}3612 when the state is changed3613 from: "confirmed", to: "detected", expected_changes: {"total"=>0, "high"=>-1, "critical"=>1}3614 is expected to eq {"critical"=>1, "high"=>-1, "total"=>0}3615 from: "confirmed", to: "resolved", expected_changes: {"total"=>-1, "high"=>-1}3616 is expected to eq {"high"=>-1, "total"=>-1}3617 from: "confirmed", to: "dismissed", expected_changes: {"total"=>-1, "high"=>-1}3618 is expected to eq {"high"=>-1, "total"=>-1}3619 from: "detected", to: "confirmed", expected_changes: {"total"=>0, "high"=>-1, "critical"=>1}3620 is expected to eq {"critical"=>1, "high"=>-1, "total"=>0}3621 from: "detected", to: "resolved", expected_changes: {"total"=>-1, "high"=>-1}3622 is expected to eq {"high"=>-1, "total"=>-1}3623 from: "detected", to: "dismissed", expected_changes: {"total"=>-1, "high"=>-1}3624 is expected to eq {"high"=>-1, "total"=>-1}3625 from: "resolved", to: "dismissed", expected_changes: {"total"=>0}3626 is expected to eq {"total"=>0}3627 from: "resolved", to: "confirmed", expected_changes: {"total"=>1, "critical"=>1}3628 is expected to eq {"critical"=>1, "total"=>1}3629 from: "resolved", to: "detected", expected_changes: {"total"=>1, "critical"=>1}3630 is expected to eq {"critical"=>1, "total"=>1}3631 from: "dismissed", to: "resolved", expected_changes: {"total"=>0}3632 is expected to eq {"total"=>0}3633 from: "dismissed", to: "confirmed", expected_changes: {"total"=>1, "critical"=>1}3634 is expected to eq {"critical"=>1, "total"=>1}3635 from: "dismissed", to: "detected", expected_changes: {"total"=>1, "critical"=>1}3636 is expected to eq {"critical"=>1, "total"=>1}3637 when the severity is not changed3638 when the state is changed3639 from: "confirmed", to: "detected", expected_changes: {"total"=>0}3640 is expected to eq {"total"=>0}3641 from: "confirmed", to: "resolved", expected_changes: {"total"=>-1, "high"=>-1}3642 is expected to eq {"high"=>-1, "total"=>-1}3643 from: "confirmed", to: "dismissed", expected_changes: {"total"=>-1, "high"=>-1}3644 is expected to eq {"high"=>-1, "total"=>-1}3645 from: "detected", to: "confirmed", expected_changes: {"total"=>0}3646 is expected to eq {"total"=>0}3647 from: "detected", to: "resolved", expected_changes: {"total"=>-1, "high"=>-1}3648 is expected to eq {"high"=>-1, "total"=>-1}3649 from: "detected", to: "dismissed", expected_changes: {"total"=>-1, "high"=>-1}3650 is expected to eq {"high"=>-1, "total"=>-1}3651 from: "resolved", to: "dismissed", expected_changes: {"total"=>0}3652 is expected to eq {"total"=>0}3653 from: "resolved", to: "confirmed", expected_changes: {"total"=>1, "high"=>1}3654 is expected to eq {"high"=>1, "total"=>1}3655 from: "resolved", to: "detected", expected_changes: {"total"=>1, "high"=>1}3656 is expected to eq {"high"=>1, "total"=>1}3657 from: "dismissed", to: "resolved", expected_changes: {"total"=>0}3658 is expected to eq {"total"=>0}3659 from: "dismissed", to: "confirmed", expected_changes: {"total"=>1, "high"=>1}3660 is expected to eq {"high"=>1, "total"=>1}3661 from: "dismissed", to: "detected", expected_changes: {"total"=>1, "high"=>1}3662 is expected to eq {"high"=>1, "total"=>1}3663 when the state is not changed3664 is expected to eq {"total"=>0}3665 #changed_attributes3666 when there are changes3667 is expected to eq ["total", "high"]3668 when there is no change3669 is expected to eq []3670 #changed_values3671 when there are changes3672 is expected to eq [-1, -1]3673 when there is no change3674 is expected to eq []3675Namespaces::Storage::RootSize3676 #above_size_limit?3677 when limit enforcement is off3678 is expected to eq false3679 when limit enforcement is on3680 when limit is 03681 is expected to eq false3682 when below limit3683 is expected to eq false3684 when above limit3685 when temporary storage increase is disabled3686 is expected to eq true3687 when temporary storage increase is enabled3688 is expected to eq false3689 #usage_ratio3690 is expected to eq 0.53691 when limit is 03692 is expected to eq 03693 when there are no root_storage_statistics3694 is expected to eq 03695 #current_size3696 is expected to eq 524288003697 with cached values3698 caches the value3699 when it is a subgroup of the namespace3700 is expected to eq 524288003701 when there are no root_storage_statistics3702 returns zero3703 #limit3704 when there is additional purchased storage and a plan3705 is expected to eq 262144000003706 when there is no additionl purchased storage3707 is expected to eq 157286400003708 when there is no additional purchased storage or plan limit set3709 is expected to eq 03710 with cached values3711 caches the value3712 #used_storage_percentage3713 limit: 0, used: 0, expected_percentage: 03714 returns the percentage of remaining storage rounding down to the nearest integer3715 limit: 0, used: 100, expected_percentage: 03716 returns the percentage of remaining storage rounding down to the nearest integer3717 limit: 100, used: 0, expected_percentage: 03718 returns the percentage of remaining storage rounding down to the nearest integer3719 limit: 100, used: 200, expected_percentage: 2003720 returns the percentage of remaining storage rounding down to the nearest integer3721 limit: 1, used: 0, expected_percentage: 03722 returns the percentage of remaining storage rounding down to the nearest integer3723 limit: 100, used: 10, expected_percentage: 103724 returns the percentage of remaining storage rounding down to the nearest integer3725 limit: 100, used: 77, expected_percentage: 773726 returns the percentage of remaining storage rounding down to the nearest integer3727 limit: 100, used: 95, expected_percentage: 953728 returns the percentage of remaining storage rounding down to the nearest integer3729 limit: 100, used: 99, expected_percentage: 993730 returns the percentage of remaining storage rounding down to the nearest integer3731 limit: 100, used: 100, expected_percentage: 1003732 returns the percentage of remaining storage rounding down to the nearest integer3733 limit: 1000, used: 971, expected_percentage: 973734 returns the percentage of remaining storage rounding down to the nearest integer3735 limit: 8192, used: 6144, expected_percentage: 753736 returns the percentage of remaining storage rounding down to the nearest integer3737 limit: 5120, used: 3840, expected_percentage: 753738 returns the percentage of remaining storage rounding down to the nearest integer3739 limit: 5120, used: 5118, expected_percentage: 993740 returns the percentage of remaining storage rounding down to the nearest integer3741 #remaining_storage_percentage3742 limit: 0, used: 0, expected_percentage: 1003743 returns the percentage of remaining storage rounding down to the nearest integer3744 limit: 0, used: 100, expected_percentage: 1003745 returns the percentage of remaining storage rounding down to the nearest integer3746 limit: 100, used: 0, expected_percentage: 1003747 returns the percentage of remaining storage rounding down to the nearest integer3748 limit: 100, used: 200, expected_percentage: 03749 returns the percentage of remaining storage rounding down to the nearest integer3750 limit: 1, used: 0, expected_percentage: 1003751 returns the percentage of remaining storage rounding down to the nearest integer3752 limit: 100, used: 10, expected_percentage: 903753 returns the percentage of remaining storage rounding down to the nearest integer3754 limit: 100, used: 77, expected_percentage: 233755 returns the percentage of remaining storage rounding down to the nearest integer3756 limit: 100, used: 95, expected_percentage: 53757 returns the percentage of remaining storage rounding down to the nearest integer3758 limit: 100, used: 99, expected_percentage: 13759 returns the percentage of remaining storage rounding down to the nearest integer3760 limit: 100, used: 100, expected_percentage: 03761 returns the percentage of remaining storage rounding down to the nearest integer3762 limit: 1000, used: 971, expected_percentage: 23763 returns the percentage of remaining storage rounding down to the nearest integer3764 limit: 8192, used: 6144, expected_percentage: 253765 returns the percentage of remaining storage rounding down to the nearest integer3766 limit: 5120, used: 3840, expected_percentage: 253767 returns the percentage of remaining storage rounding down to the nearest integer3768 limit: 5120, used: 5118, expected_percentage: 03769 returns the percentage of remaining storage rounding down to the nearest integer3770 #remaining_storage_size3771 limit: 0, used: 0, expected_size: 03772 returns the remaining storage size in bytes3773 limit: 0, used: 100, expected_size: 03774 returns the remaining storage size in bytes3775 limit: 100, used: 0, expected_size: 1048576003776 returns the remaining storage size in bytes3777 limit: 100, used: 200, expected_size: 03778 returns the remaining storage size in bytes3779 limit: 100, used: 70, expected_size: 314572803780 returns the remaining storage size in bytes3781 limit: 100, used: 85, expected_size: 157286403782 returns the remaining storage size in bytes3783 limit: 100, used: 99, expected_size: 10485763784 returns the remaining storage size in bytes3785 limit: 100, used: 100, expected_size: 03786 returns the remaining storage size in bytes3787 limit: 1000, used: 971, expected_size: 304087043788 returns the remaining storage size in bytes3789 limit: 8192, used: 6144, expected_size: 21474836483790 returns the remaining storage size in bytes3791 limit: 5120, used: 3840, expected_size: 13421772803792 returns the remaining storage size in bytes3793 limit: 5120, used: 5118, expected_size: 20971523794 returns the remaining storage size in bytes3795 #enforce_limit?3796 when current date is before enforcement date3797 is expected to eq false3798 behaves like :namespace_storage_limit_bypass_date_check enabled3799 is expected to eq true3800 when current date is on or after enforcement date3801 when no subscription is found for namespace3802 is expected to eq true3803 when subscription is for opensource plan3804 is expected to eq false3805 when subscription start date is before effective date3806 is expected to eq false3807 when subscription is for a free plan3808 when enforce_storage_limit_for_free is disabled3809 is expected to eq false3810 when subscription start date is on or after effective date3811 is expected to eq true3812 behaves like :namespace_storage_limit_bypass_date_check enabled3813 is expected to eq true3814 when subscription is for a paid plan3815 when enforce_storage_limit_for_paid is disabled3816 is expected to eq false3817 when subscription start date is on or after effective date3818 is expected to eq true3819 behaves like :namespace_storage_limit_bypass_date_check enabled3820 is expected to eq true3821 #exceeded_size3822 when given a parameter3823 change_size: 157286400, expected_excess_size: 1048576003824 returns the size in bytes that the change exceeds the limit3825 change_size: 62914560, expected_excess_size: 104857603826 returns the size in bytes that the change exceeds the limit3827 change_size: 53477376, expected_excess_size: 10485763828 returns the size in bytes that the change exceeds the limit3829 change_size: 52428800, expected_excess_size: 03830 returns the size in bytes that the change exceeds the limit3831 change_size: 10485760, expected_excess_size: 03832 returns the size in bytes that the change exceeds the limit3833 change_size: 0, expected_excess_size: 03834 returns the size in bytes that the change exceeds the limit3835 without a parameter3836 current_size: 0, expected_excess_size: 03837 returns the size in bytes that the current storage size exceeds the limit3838 current_size: 52428800, expected_excess_size: 03839 returns the size in bytes that the current storage size exceeds the limit3840 current_size: 104857600, expected_excess_size: 03841 returns the size in bytes that the current storage size exceeds the limit3842 current_size: 105906176, expected_excess_size: 10485763843 returns the size in bytes that the current storage size exceeds the limit3844 current_size: 178257920, expected_excess_size: 734003203845 returns the size in bytes that the current storage size exceeds the limit3846 #changes_will_exceed_size_limit?3847 when the changes will exceed the size limit3848 change_size: 534773763849 returns true3850 change_size: 629145603851 returns true3852 change_size: 1048576003853 returns true3854 when the changes will not exceed the size limit3855 change_size: 03856 returns false3857 change_size: 10485763858 returns false3859 change_size: 419430403860 returns false3861 change_size: 524288003862 returns false3863 when the current size exceeds the limit3864 change_size: 03865 returns true regardless of change_size3866 change_size: 10485763867 returns true regardless of change_size3868 change_size: 629145603869 returns true regardless of change_size3870 change_size: 1048576003871 returns true regardless of change_size3872 when storage size limit is 03873 returns false3874 #enforcement_type3875 returns :namespace_storage_limit3876TodoService3877 Epics3878 Epics3879 #new_epic3880 when an epic belongs to a public group3881 for mentioned users3882 creates todos for users mentioned3883 does not create todos for users not mentioned or without permissions3884 for directly addressed users3885 creates todos for users mentioned3886 does not create todos for users not mentioned or without permissions3887 combined3888 mentioned users3889 creates todos for users mentioned3890 does not create todos for users not mentioned or without permissions3891 directly addressed users3892 creates todos for users mentioned3893 does not create todos for users not mentioned or without permissions3894 when an epic belongs to a private group3895 for mentioned users3896 creates todos for users mentioned3897 does not create todos for users not mentioned or without permissions3898 for directly addressed users3899 creates todos for users mentioned3900 does not create todos for users not mentioned or without permissions3901 creates todos for group members when a group is mentioned3902 creates todos for users mentioned3903 does not create todos for users not mentioned or without permissions3904 #update_epic3905 for mentioned users3906 creates todos for users mentioned3907 does not create todos for users not mentioned or without permissions3908 for directly addressed users3909 creates todos for users mentioned3910 does not create todos for users not mentioned or without permissions3911 when toggling task list items3912 does not create todos3913 #new_note3914 when a note is created for an epic3915 marks pending epic todos for the note author as done3916 does not mark pending epic todos for the note author as done for system notes3917 mentions3918 for mentioned users3919 creates todos for users mentioned3920 does not create todos for users not mentioned or without permissions3921 for directly addressed users3922 creates todos for users mentioned3923 does not create todos for users not mentioned or without permissions3924 combined3925 mentioned users3926 creates todos for users mentioned3927 does not create todos for users not mentioned or without permissions3928 directly addressed users3929 creates todos for users mentioned3930 does not create todos for users not mentioned or without permissions3931 Merge Requests3932 #new_merge_request3933 when the merge request has approvers3934 creates a todo3935 when code owner is mentioned3936 creates a todo3937 Merge Requests3938 an approver has lost access to the project3939 #new_merge_request3940 does not create a todo for the approver3941 #merge_train_removed3942 creates a pending todo for each merge_participant3943ApprovalRules::ParamsFilteringService3944 #execute3945 create3946 behaves like assigning users and groups3947 user can update approvers3948 only assigns eligible users and groups3949 user cannot update approvers3950 deletes the approval_rules_attributes from params3951 empty project approval rule3952 adds empty rule3953 inapplicable user defined rules3954 when multiple_approval_rules feature is available3955 adds inapplicable user defined rules3956 when multiple_approval_rules feature is not available3957 does not add inapplicable user defined rules3958 any approver rule3959 sets rule type for the rules attributes3960 any approver rule from a project rule3961 and the project rule has hidden groups3962 sets rule type for the rules attributes3963 update3964 behaves like assigning users and groups3965 user can update approvers3966 only assigns eligible users and groups3967 user cannot update approvers3968 deletes the approval_rules_attributes from params3969 inapplicable user defined rules3970 does not add inapplicable user defined rules3971 when reset_approval_rules_to_defaults is true3972 when multiple_approval_rules feature is available3973 adds inapplicable user defined rules3974 when multiple_approval_rules feature is not available3975 does not add inapplicable user defined rules3976 with remove_hidden_groups being true3977 behaves like assigning users and groups3978 user can update approvers3979 only assigns eligible users and groups3980 user cannot update approvers3981 deletes the approval_rules_attributes from params3982BackfillLabelIdsForIssues3983 # order random3984 .migrate3985 when migration is already completed3986 does not modify data3987 migration process3988 updates all documents3989 only updates documents missing a field3990 processes in batches3991 .completed?3992 when documents are missing field3993 is expected not to be completed3994 when no documents are missing field3995 is expected to be completed3996 migration_options3997 has migration options set3998VulnerabilityExternalIssueLinks::CreateService3999 for jira4000 when jira service is not configured to create issues4001 is expected not to be success4002 returns response with error messages4003 when jira service is configured to create issues4004 and there is already created external issue link for given vulnerability4005 and the external issue exists4006 is expected not to be success4007 returns response with error messages4008 and the external issue does not exist4009 creates issue using jira service4010 and there is no external issue link created for given vulnerability4011 creates issue using jira service4012 and issue creation fails in Jira4013 is expected not to be success4014 returns response with error messages4015 and issue creation succeeds in Jira4016 and external issue link creation fails4017 is expected not to be success4018 returns response with error messages4019 and external issue link creation succeeds4020 is expected to be success4021 creates external issue link in database4022 responds with created external issue link in payload4023Security::SyncLicenseScanningRulesService4024 # order random4025 #execute4026 when license_report is empty4027 does not update approval rules4028 does not call report4029 with default license-check rule4030 when a license violates the license compliance policy4031 requires approval4032 calls report4033 when no licenses violate the license compliance policy4034 does not require approval4035 with license_finding security policy4036 when target branch pipeline is empty4037 does not require approval4038 target_branch: case1, pipeline_branch: case2, states: ["newly_detected"], policy_license: "GPL v3", policy_state: :denied, result: true4039 sync approvals_required4040 target_branch: case2, pipeline_branch: case3, states: ["newly_detected"], policy_license: "GPL v3", policy_state: :denied, result: false4041 sync approvals_required4042 target_branch: case3, pipeline_branch: case4, states: ["newly_detected"], policy_license: "GPL v3", policy_state: :denied, result: true4043 sync approvals_required4044 target_branch: case4, pipeline_branch: case5, states: ["newly_detected"], policy_license: "GPL v3", policy_state: :denied, result: false4045 sync approvals_required4046 target_branch: case1, pipeline_branch: case2, states: ["detected"], policy_license: "GPL v3", policy_state: :denied, result: false4047 sync approvals_required4048 target_branch: case2, pipeline_branch: case3, states: ["detected"], policy_license: "GPL v3", policy_state: :denied, result: true4049 sync approvals_required4050 target_branch: case3, pipeline_branch: case4, states: ["detected"], policy_license: "GPL v3", policy_state: :denied, result: true4051 sync approvals_required4052 target_branch: case4, pipeline_branch: case5, states: ["detected"], policy_license: "GPL v3", policy_state: :denied, result: true4053 sync approvals_required4054 target_branch: case1, pipeline_branch: case2, states: ["newly_detected"], policy_license: "MIT", policy_state: :allowed, result: true4055 sync approvals_required4056 target_branch: case2, pipeline_branch: case3, states: ["newly_detected"], policy_license: "MIT", policy_state: :allowed, result: false4057 sync approvals_required4058 target_branch: case3, pipeline_branch: case4, states: ["newly_detected"], policy_license: "MIT", policy_state: :allowed, result: true4059 sync approvals_required4060 target_branch: case4, pipeline_branch: case5, states: ["newly_detected"], policy_license: "MIT", policy_state: :allowed, result: true4061 sync approvals_required4062 target_branch: case1, pipeline_branch: case2, states: ["detected"], policy_license: "MIT", policy_state: :allowed, result: false4063 sync approvals_required4064 target_branch: case2, pipeline_branch: case3, states: ["detected"], policy_license: "MIT", policy_state: :allowed, result: true4065 sync approvals_required4066 target_branch: case3, pipeline_branch: case4, states: ["detected"], policy_license: "MIT", policy_state: :allowed, result: true4067 sync approvals_required4068 target_branch: case4, pipeline_branch: case5, states: ["detected"], policy_license: "MIT", policy_state: :allowed, result: true4069 sync approvals_required4070Resolvers::RequirementsManagement::RequirementsResolver4071 is expected to have nullable GraphQL type RequirementConnection4072 with a project4073 #resolve4074 finds all requirements4075 filters by state4076 preloads correct latest test report4077 finds only the requirements within the project we are looking at4078 filtering by requirement (legacy) iid or work_item_iid4079 filters by requirement iid4080 filters by requirement iids4081 filters by work_item_iid4082 filters by work_item_iids4083 iid filter combinations4084 returns an empty set for an impossible query4085 returns the intersection set of given iids4086 treats empty query values as "any"4087 when filtering by last test report state4088 filters by failed requirements4089 filters by passed requirements4090 filters requirements without test reports4091 sorting4092 when sorting by created_at4093 sorts requirements ascending4094 sorts requirements descending4095 with search4096 filters requirements by title4097 filtering by author_username4098 single author exists4099 filters requirements by author4100 single nonexistent author4101 behaves like returns no items4102 returns requirements without filtering by author4103 multiple nonexistent authors4104 behaves like returns no items4105 returns requirements without filtering by author4106 single author is not supplied4107 behaves like returns unfiltered4108 returns requirements without filtering by author4109 an empty array4110 behaves like returns unfiltered4111 returns requirements without filtering by author4112 multiple authors4113 filters requirements by author4114 multiple authors, one of whom does not exist4115 filters requirements by author4116Gitlab::Analytics::CycleAnalytics::Summary::StageTimeSummary4117 #identifier4118 returns identifiers for each metric4119 when the use_aggregated_data_collector option is given4120 when aggregated data is available yet4121 shows no value4122 when aggregated data is present4123 loads the lead and cycle time4124 #lead_time4125 issuable filter parameters4126 when `author_username` is given4127 returns the correct lead time4128 when unknown `author_username` is given4129 returns `-`4130 when `label_name` is given4131 returns the correct lead time4132 when unknown `label_name` is given4133 returns `-`4134 with `from` date4135 finds the lead time of issues created after it4136 with subgroups4137 finds the lead time of issues from them4138 with projects specified in options4139 finds the lead time of issues from those projects4140 when `from` and `to` parameters are provided4141 finds the lead time of issues from 3 days ago4142 with other projects4143 does not find the lead time of issues from them4144 #cycle_time4145 with `from` date4146 finds the cycle time of issues created after it4147 with subgroups4148 finds the cycle time of issues from them4149 with projects specified in options4150 finds the cycle time of issues from those projects4151 when `from` and `to` parameters are provided4152 finds the cycle time of issues created between `from` and `to`4153 with other projects4154 does not find the cycle time of issues from them4155 dora4 metrics4156 when no data available4157 returns no data4158 when feature is not available4159 does not return any dora4 metrics4160 with present data4161 returns 3 metrics4162 when project ids filter is given4163 filters metrics subset by project4164AuditEvent4165 relationships4166 is expected to belong to user required: false4167 validations4168 is expected to validate that :author_id cannot be empty/falsy4169 is expected to validate that :entity_id cannot be empty/falsy4170 is expected to validate that :entity_type cannot be empty/falsy4171 callbacks4172 truncate_fields4173 entity_path4174 behaves like a truncated field4175 when values are provided4176 database_column: :long, details_value: nil, expected_value: :truncated4177 sets both values to be the same4178 database_column: :short, details_value: nil, expected_value: :short4179 sets both values to be the same4180 database_column: nil, details_value: :long, expected_value: :truncated4181 sets both values to be the same4182 database_column: nil, details_value: :short, expected_value: :short4183 sets both values to be the same4184 database_column: :long, details_value: :short, expected_value: :truncated4185 sets both values to be the same4186 when values are not provided4187 does not set4188 target_details4189 behaves like a truncated field4190 when values are provided4191 database_column: :long, details_value: nil, expected_value: :truncated4192 sets both values to be the same4193 database_column: :short, details_value: nil, expected_value: :short4194 sets both values to be the same4195 database_column: nil, details_value: :long, expected_value: :truncated4196 sets both values to be the same4197 database_column: nil, details_value: :short, expected_value: :short4198 sets both values to be the same4199 database_column: :long, details_value: :short, expected_value: :truncated4200 sets both values to be the same4201 when values are not provided4202 does not set4203 #stream_to_external_destinations4204 feature is licensed4205 entity is a group4206 behaves like successful audit event stream4207 when the group has no destinations4208 enqueues no workers4209 when the group has destination4210 enqueues one worker4211 entity is a project4212 behaves like successful audit event stream4213 when the group has no destinations4214 enqueues no workers4215 when the group has destination4216 enqueues one worker4217 when entity is not a group or project4218 enqueues no workers4219 feature is unlicensed4220 enqueues no workers4221 .by_entity4222 returns the correct audit events4223 .order_by4224 when sort by created_at in ascending order4225 sorts results by id in ascending order4226 when it is default4227 sorts results by id in descending order4228 #author_name4229 when user exists4230 returns user name4231 when user does not exist anymore4232 when database contains author_name4233 returns author_name4234 when details contains author_name4235 returns author_name4236 when details does not contains author_name4237 returns nil4238 when authored by an unauthenticated user4239 returns `An unauthenticated user`4240 #entity4241 when entity exists4242 returns the entity object4243 when entity does not exist4244 returns a NullEntity4245 #root_group_entity4246 when root_group_entity_id is set4247 return root_group_entity through root_group_entity_id4248 when entity is nil4249 return nil4250 when entity is a group4251 return root_group and set root_group_entity_id4252 when entity is a project4253 return root_group and set root_group_entity_id4254 #ip_address4255 when ip_address exists in both details hash and ip_address column4256 returns the value from ip_address column4257 when ip_address exists in details hash but not in ip_address column4258 returns the value from details hash4259 #entity_path4260 when entity_path exists in both details hash and entity_path column4261 returns the value from entity_path column4262 when entity_path exists in details hash but not in entity_path column4263 returns the value from details hash4264 #target_type4265 when target_type exists in both details hash and target_type column4266 returns the value from target_type column4267 when target_type exists in details hash but not in target_type column4268 returns the value from details hash4269 #present4270 returns a presenter4271 #formatted_details4272 includes the author's email4273 converts value of `to` and `from` in `details` to string4274 author4275 when author exists4276 returns the author object4277 when author is unauthenticated4278 is an unauthenticated user4279 when author no longer exists4280 is a deleted user4281 entity_is_group_or_project?4282 when entity is a Group4283 is expected to equal true4284 when entity is a Project4285 is expected to equal true4286 when entity is an Epic4287 is expected to equal false4288Vulnerabilities::FindingDismissService4289 with an authorized user with proper permissions4290 when there is an existing vulnerability for the finding4291 does not create a new Vulnerability4292 when the vulnerability state is different from the requested one4293 updates the state4294 when comment and dismissal_reason is not given4295 creates a state transition entry4296 when comment and dismissal_reason is given4297 creates a state transition entry with comment and dismissal_reason4298 when there is no vulnerability for the finding4299 creates a new vulnerability4300 when vulnerability creation is successful4301 when comment is added4302 dismisses a finding with comment4303 when the dismissal_reason is added4304 dismisses a finding4305 when Vulnerabilities::Feedback creation fails4306 returns the error4307 when security dashboard feature is disabled4308 raises an "access denied" error4309GlobalPolicy4310 is expected to be disallowed :read_licenses4311 is expected to be disallowed :destroy_licenses4312 is expected to be disallowed :read_all_geo4313 is expected to be disallowed :manage_subscription4314 reading operations dashboard4315 when licensed4316 is expected to be allowed :read_operations_dashboard4317 and the user is not logged in4318 is expected to be disallowed :read_operations_dashboard4319 when unlicensed4320 is expected to be disallowed :read_operations_dashboard4321 reading workspaces4322 when feature flag is disabled4323 is expected to be disallowed :read_workspace4324 when licensed4325 is expected to be allowed :read_workspace4326 and the user is not logged in4327 is expected to be disallowed :read_workspace4328 when unlicensed4329 is expected to be disallowed :read_workspace4330 when admin mode enabled4331 is expected to be allowed :read_licenses4332 is expected to be allowed :destroy_licenses4333 is expected to be allowed :read_all_geo4334 is expected to be allowed :manage_subscription4335 when admin mode disabled4336 is expected to be disallowed :read_licenses4337 is expected to be disallowed :destroy_licenses4338 is expected to be disallowed :read_all_geo4339 is expected to be disallowed :manage_subscription4340 view_productivity_analytics4341 anonymous user4342 is not allowed4343 authenticated user4344 is allowed4345 update_max_pages_size4346 is expected to be disallowed :update_max_pages_size4347 when feature is enabled4348 is expected to be disallowed :update_max_pages_size4349 when admin mode enabled4350 is expected to be allowed :update_max_pages_size4351 when admin mode disabled4352 is expected to be disallowed :update_max_pages_size4353 create_group_with_default_branch_protection4354 for an admin4355 when the `default_branch_protection_restriction_in_groups` feature is available4356 when the setting `group_owners_can_manage_default_branch_protection` is enabled4357 is expected to be allowed :create_group_with_default_branch_protection4358 when the setting `group_owners_can_manage_default_branch_protection` is disabled4359 when admin mode is enabled4360 is expected to be allowed :create_group_with_default_branch_protection4361 when admin mode is disabled4362 is expected to be disallowed :create_group_with_default_branch_protection4363 when the `default_branch_protection_restriction_in_groups` feature is not available4364 when the setting `group_owners_can_manage_default_branch_protection` is enabled4365 is expected to be allowed :create_group_with_default_branch_protection4366 when the setting `group_owners_can_manage_default_branch_protection` is disabled4367 is expected to be allowed :create_group_with_default_branch_protection4368 for a normal user4369 when the `default_branch_protection_restriction_in_groups` feature is available4370 when the setting `group_owners_can_manage_default_branch_protection` is enabled4371 is expected to be allowed :create_group_with_default_branch_protection4372 when the setting `group_owners_can_manage_default_branch_protection` is disabled4373 is expected to be disallowed :create_group_with_default_branch_protection4374 when the `default_branch_protection_restriction_in_groups` feature is not available4375 when the setting `group_owners_can_manage_default_branch_protection` is enabled4376 is expected to be allowed :create_group_with_default_branch_protection4377 when the setting `group_owners_can_manage_default_branch_protection` is disabled4378 is expected to be allowed :create_group_with_default_branch_protection4379 list_removable_projects4380 when user is an admin4381 when licensed feature is enabled4382 is expected to be allowed :list_removable_projects4383 when licensed feature is not enabled4384 is expected to be disallowed :list_removable_projects4385 when user is a normal user4386 when licensed feature is enabled4387 is expected to be allowed :list_removable_projects4388 when licensed feature is not enabled4389 is expected to be disallowed :list_removable_projects4390 :export_user_permissions4391 role: :admin, licensed: true, allowed: true4392 is expected to be allowed :export_user_permissions4393 role: :admin, licensed: false, allowed: false4394 is expected to be disallowed :export_user_permissions4395 role: :guest, licensed: true, allowed: false4396 is expected to be disallowed :export_user_permissions4397 role: :guest, licensed: false, allowed: false4398 is expected to be disallowed :export_user_permissions4399 create_group_via_api4400 on .com4401 when feature is enabled4402 is expected to be allowed :create_group_via_api4403 when feature is disabled4404 is expected to be disallowed :create_group_via_api4405 on self-managed4406 when feature is enabled4407 is expected to be allowed :create_group_via_api4408 when feature is disabled4409 is expected to be allowed :create_group_via_api4410 :view_instance_devops_adoption & :manage_devops_adoption_namespaces4411 when license does not include the feature4412 is expected to be disallowed :view_instance_devops_adoption and :manage_devops_adoption_namespaces4413 when feature is enabled and license include the feature4414 is expected to be allowed :view_instance_devops_adoption and :manage_devops_adoption_namespaces4415 for non-admins4416 is expected to be disallowed :view_instance_devops_adoption and :manage_devops_adoption_namespaces4417 read_jobs_statistics4418 when feature is enabled4419 is expected to be disallowed :read_jobs_statistics4420 when admin mode enabled4421 is expected to be allowed :read_jobs_statistics4422 when admin mode disabled4423 is expected to be disallowed :read_jobs_statistics4424 when feature is disabled4425 when admin mode enabled4426 is expected to be disallowed :read_jobs_statistics4427 admin_service_accounts4428 is expected to be disallowed :admin_service_accounts4429 when feature is enabled4430 when admin mode enabled4431 is expected to be allowed :admin_service_accounts4432 when admin mode disabled4433 is expected to be disallowed :admin_service_accounts4434Dast::Profile4435 behaves like sanitizable4436 includes Sanitizable4437 #name4438 when input includes javascript tags4439 gets sanitized4440 #name validation4441 when input contains pre-escaped html entities4442 is not valid4443 when it contains a path component4444 is not valid4445 #description4446 when input includes javascript tags4447 gets sanitized4448 #description validation4449 when input contains pre-escaped html entities4450 is not valid4451 when it contains a path component4452 is not valid4453 associations4454 is expected to belong to project required: false4455 is expected to belong to dast_site_profile required: false4456 is expected to belong to dast_scanner_profile required: false4457 is expected to have many secret_variables class_name => Dast::SiteProfileSecretVariable through dast_site_profile4458 is expected to have one dast_profile_schedule class_name => Dast::ProfileSchedule inverse_of => dast_profile4459 is expected to have one dast_pre_scan_verification class_name => Dast::PreScanVerification inverse_of => dast_profile4460 is expected to have many profile_runner_tags4461 is expected to have many tags4462 validations4463 is expected to be valid4464 is expected to validate that the length of :name is at most 2554465 is expected to validate that the length of :description is at most 2554466 is expected to validate that the length of :branch_name is at most 2554467 is expected to validate that :name is case-sensitively unique within the scope of :project_id4468 is expected to validate that :project_id cannot be empty/falsy4469 is expected to validate that :dast_site_profile_id cannot be empty/falsy4470 is expected to validate that :dast_scanner_profile_id cannot be empty/falsy4471 is expected to validate that :name cannot be empty/falsy4472 when the project_id and dast_site_profile.project_id do not match4473 behaves like the project_id does not match4474 is not valid4475 when the project_id and dast_scanner_profile.project_id do not match4476 behaves like the project_id does not match4477 is not valid4478 when the description is nil4479 is not valid4480 when a branch_name is specified but the project does not have a respository4481 is not valid4482 when a branch_name is specified but the project does not have a respository4483 is not valid4484 scopes4485 by_project_id4486 includes the correct records4487 with_schedule4488 when has_dast_profile_schedule is true4489 includes the dast_profile with schedule4490 when has_dast_profile_schedule is false4491 includes the dast_profile without schedule4492 instance methods4493 #branch4494 when the associated project does not have a repository4495 returns nil4496 when the associated project has a repository4497 returns a Dast::Branch4498 #secret_ci_variables4499 is expected to delegate #secret_ci_variables to the #dast_site_profile object4500SlackIntegration4501 Associations4502 is expected to belong to integration required: false4503 authorized_scope_names4504 accepts assignment to nil4505 accepts assignment to a string4506 accepts assignment to an array of strings4507 accepts assignment to a comma-separated string4508 strips white-space4509 all_features_supported?/upgrade_needed?4510 with enough scopes4511 is expected to be all features supported4512 is expected not to be upgrade needed4513 without chat:write.public4514 is expected not to be all features supported4515 is expected to be upgrade needed4516 without chat:write4517 is expected not to be all features supported4518 is expected to be upgrade needed4519 feature_available?4520 without any scopes4521 is always true for :commands4522 is always false for others4523 with enough scopes for notifications4524 only has the correct features4525 with enough scopes for commands4526 only has the correct features4527 with all scopes4528 only has the correct features4529 Scopes4530 #with_bot4531 returns records with bot data4532 #by_team4533 returns records with shared team_id4534 Validations4535 is expected to validate that :team_id cannot be empty/falsy4536 is expected to validate that :team_name cannot be empty/falsy4537 is expected to validate that :alias cannot be empty/falsy4538 is expected to validate that :user_id cannot be empty/falsy4539 is expected to validate that :integration cannot be empty/falsy4540Gitlab::Geo::LogCursor::Events::DesignRepositoryUpdatedEvent4541 #process4542 when the associated shard is healthy4543 when the design repository is not excluded by selective sync4544 behaves like event should trigger a sync4545 when a registry does not yet exist4546 behaves like event creates a registry4547 creates a registry with pending state4548 behaves like event schedules a sync worker4549 schedules a sync worker4550 behaves like logs event source info4551 logs `job_id` and `event_id4552 when a registry exists4553 behaves like event transitions a registry to pending4554 transitions the registry to pending4555 behaves like event schedules a sync worker4556 schedules a sync worker4557 behaves like logs event source info4558 logs `job_id` and `event_id4559 when the project is included in selective sync but there is no design4560 when a registry does not yet exist4561 behaves like event does not create a registry4562 does not create a registry4563 behaves like event does not schedule a sync worker4564 does not schedule a sync worker4565 behaves like logs event source info4566 logs `job_id` and `event_id4567 when the design repository is excluded by selective sync4568 when a registry does not yet exist4569 behaves like event does not create a registry4570 does not create a registry4571 behaves like event does not schedule a sync worker4572 does not schedule a sync worker4573 behaves like logs event source info4574 logs `job_id` and `event_id4575 when a registry exists4576 behaves like event transitions a registry to pending4577 transitions the registry to pending4578 behaves like event schedules a sync worker4579 schedules a sync worker4580 behaves like logs event source info4581 logs `job_id` and `event_id4582 when associated shard is unhealthy4583 when a registry does not yet exist4584 behaves like event creates a registry4585 creates a registry with pending state4586 behaves like event does not schedule a sync worker4587 does not schedule a sync worker4588 behaves like logs event source info4589 logs `job_id` and `event_id4590 when a registry exists4591 behaves like event transitions a registry to pending4592 transitions the registry to pending4593 behaves like event does not schedule a sync worker4594 does not schedule a sync worker4595 behaves like logs event source info4596 logs `job_id` and `event_id4597Resolvers::Geo::PipelineArtifactRegistriesResolver4598 behaves like a Geo registries resolver4599 #resolve4600 when the parent object is the current node4601 when the user has permission to view Geo data4602 when admin mode is enabled4603 when the ids argument is null4604 returns registries, in order4605 when the ids argument is present4606 returns the requested registries, in order4607 when the replication_state argument is present4608 returns registries with requested replication state, in order4609 with verification enabled4610 when the verification_state argument is present4611 returns registries with requested verification state, in order4612 with verification disabled4613 when the verification_state argument is present4614 raises ArgumentError (PENDING: Skipping because verification is enabled for Ci::PipelineArtifact)4615 when admin mode is disabled4616 returns nothing4617 when the user does not have permission to view Geo data4618 returns nothing4619 when the parent object is not the current node4620 when the user has permission to view Geo data4621 returns nothing, because we can't query other nodes' tracking databases4622Gitlab::Licenses::SubmitLicenseUsageDataBanner4623 #reset4624 when check namespace plan setting is enabled4625 does not reset the submit license usage data4626 when there is only a future dated license4627 does not reset the submit license usage data4628 when current license is an online cloud license4629 does not reset the submit license usage data4630 when current license is a legacy license4631 does not reset the submit license usage data4632 when current license is for a trial4633 does not reset the submit license usage data4634 when license start day matches today's day4635 resets the submit license usage data4636 when license start day does not match today's day4637 and today is the end of the month4638 and the start date's day is smaller than today's day4639 does not reset the submit license usage data4640 and the start date's day is bigger than today's day4641 current_date: Mon, 28 Feb 20224642 resets the submit license usage data4643 current_date: Thu, 29 Feb 20244644 resets the submit license usage data4645 current_date: Sat, 30 Apr 20224646 resets the submit license usage data4647 #display?4648 is expected to eq true4649 when user is empty4650 is expected to eq false4651 when user cannot admin all resources4652 is expected to eq false4653 when check namespace plan setting is enabled4654 is expected to eq false4655 when current license is an online cloud license4656 is expected to eq false4657 when current license is a legacy license4658 is expected to eq false4659 when current license is for a trial4660 is expected to eq false4661 when there is only a future dated license4662 is expected to eq false4663 when it's within the first month of the license4664 is expected to eq false4665 when user dismissed the callout4666 is expected to eq false4667 #title4668 returns the title4669 when banner should not be displayed4670 does not return a title4671 #body4672 returns the body4673 when banner should not be displayed4674 does not return a body4675 #dismissable?4676 is expected to eq true4677 when license usage data has not been exported yet4678 is expected to eq false4679Security::Findings::DismissService4680 # order random4681 #execute4682 when the user is authorized4683 when comment is added4684 dismisses a finding with comment4685 when dismissal feedback already exists for finding4686 updates comment for dismissed finding feedback4687 when deleting a comment4688 removes the comment4689 when the dismissal_reason is added4690 dismisses a finding4691 when Vulnerabilities::Feedback creation fails4692 returns the error4693 when security dashboard feature is disabled4694 raises an "access denied" error4695 when Vulnerabilities::FindOrCreateFromSecurityFindingService returns vulnerability successfully4696 returns security finding with success reponse4697 when the user is not authorized4698 raises an "access denied" error4699ProjectCiCdSetting4700 #merge_pipelines_enabled?4701 when Merge pipelines (EEP) is available4702 is expected to be truthy4703 when project setting is disabled4704 is expected to be falsy4705 when Merge pipelines (EEP) is unavailable4706 is expected to be falsy4707 when project setting is disabled4708 is expected to be falsy4709 #merge_trains_enabled?4710 merge_pipelines_enabled: true, merge_trains_enabled: true, feature_available: true, expected_result: true4711 returns merge trains availability4712 merge_pipelines_enabled: true, merge_trains_enabled: false, feature_available: true, expected_result: false4713 returns merge trains availability4714 merge_pipelines_enabled: false, merge_trains_enabled: false, feature_available: true, expected_result: false4715 returns merge trains availability4716 merge_pipelines_enabled: false, merge_trains_enabled: true, feature_available: true, expected_result: false4717 returns merge trains availability4718 merge_pipelines_enabled: true, merge_trains_enabled: true, feature_available: false, expected_result: false4719 returns merge trains availability4720 merge_pipelines_enabled: true, merge_trains_enabled: false, feature_available: false, expected_result: false4721 returns merge trains availability4722 merge_pipelines_enabled: false, merge_trains_enabled: false, feature_available: false, expected_result: false4723 returns merge trains availability4724 #auto_rollback_enabled?4725 license_feature: true, actual_setting: true4726 is only enabled if set and both the license and the feature flag allows4727 license_feature: false, actual_setting: true4728 is only enabled if set and both the license and the feature flag allows4729 license_feature: true, actual_setting: true4730 is only enabled if set and both the license and the feature flag allows4731 license_feature: false, actual_setting: true4732 is only enabled if set and both the license and the feature flag allows4733 license_feature: true, actual_setting: false4734 is only enabled if set and both the license and the feature flag allows4735 license_feature: false, actual_setting: false4736 is only enabled if set and both the license and the feature flag allows4737 license_feature: true, actual_setting: false4738 is only enabled if set and both the license and the feature flag allows4739 license_feature: false, actual_setting: false4740 is only enabled if set and both the license and the feature flag allows4741 #merge_pipelines_were_disabled?4742 when merge pipelines option was enabled4743 when merge pipelines option is disabled4744 is expected to equal true4745 when merge pipelines option is intact4746 is expected to equal false4747 when merge pipelines option was disabled4748 when merge pipelines option is disabled4749 is expected to equal false4750 when merge pipelines option is intact4751 is expected to equal false4752Resolvers::VulnerabilitiesResolver4753 #resolve4754 when given sort4755 when sorting descending by severity4756 is expected to eq [#<Vulnerability id:67 [vulnerability:namespace772/project858/67]>, #<Vulnerability id:68 [vulnerabil...ity:namespace772/project858/68]>, #<Vulnerability id:66 [vulnerability:namespace772/project858/66]>]4757 when sorting ascending by severity4758 is expected to eq [#<Vulnerability id:66 [vulnerability:namespace772/project858/66]>, #<Vulnerability id:68 [vulnerabil...ity:namespace772/project858/68]>, #<Vulnerability id:67 [vulnerability:namespace772/project858/67]>]4759 when sorting param is not provided4760 is expected to eq [#<Vulnerability id:67 [vulnerability:namespace772/project858/67]>, #<Vulnerability id:68 [vulnerabil...ity:namespace772/project858/68]>, #<Vulnerability id:66 [vulnerability:namespace772/project858/66]>]4761 when sorting by invalid param4762 is expected to eq [#<Vulnerability id:67 [vulnerability:namespace772/project858/67]>, #<Vulnerability id:68 [vulnerabil...ity:namespace772/project858/68]>, #<Vulnerability id:66 [vulnerability:namespace772/project858/66]>]4763 when given severities4764 only returns vulnerabilities of the given severities4765 when given states4766 only returns vulnerabilities of the given states4767 when given scanner external IDs4768 only returns vulnerabilities of the given scanner external IDs4769 when given scanner ID4770 only returns vulnerabilities of the given scanner IDs4771 when given report types4772 only returns vulnerabilities of the given report types4773 when given value for hasIssues argument4774 when has_issues is set to true4775 only returns vulnerabilities that have issues4776 when has_issues is set to false4777 only returns vulnerabilities that does not have issues4778 when given value for has_resolution argument4779 when has_resolution is set to true4780 only returns resolution that have resolution4781 when has_resolution is set to false4782 only returns resolution that does not have resolution4783 when given project IDs4784 only returns vulnerabilities belonging to the given projects4785 with multiple project IDs4786 avoids N+1 queries4787 when resolving vulnerabilities for a project4788 returns the project's vulnerabilities4789 when resolving vulnerabilities for an instance security dashboard4790 when there is a current user4791 returns vulnerabilities for all projects on the current user's instance security dashboard4792 and there is no current user4793 returns no vulnerabilities4794 when image is given4795 only returns vulnerabilities with given image4796 when different report_type is given along with image4797 returns empty list4798 when cluster_id is given4799 ignores the filter and returns unmatching vulnerabilities4800 when cluster_agent_id is given4801 only returns vulnerabilities with given cluster4802 when different report_type is given along with cluster4803 returns empty list4804Groups::DestroyService4805 audit events4806 when licensed4807 does not log audit event if operation fails4808 does not log audit event if operation results in no change4809 when operation succeeds4810 logs an audit event4811 logs the audit event info4812 calls the audit method with the event type4813 when not licensed4814 does not log audit event4815 streaming audit event for sub group4816 sends the audit streaming event with json format4817 dependency_proxy_blobs4818 destroys the dependency proxy blobs4819 when on a Geo primary node4820 calls replicator to update Geo4821 when group_wiki_repository does not exist4822 does not call replicator to update Geo4823 when not on a Geo primary node4824 does not call replicator to update Geo4825 when group epics have parent epic outside of group4826 schedules cache update for associated epics in batches4827Members::UpdateService4828 when current user can update the given member4829 behaves like logs an audit event4830 is expected to change `AuditEvent.count` by 14831 behaves like logs an audit event4832 is expected to change `AuditEvent.count` by 14833 when the update is a noOp4834 behaves like does not log an audit event4835 is expected not to change `AuditEvent.count`4836 behaves like does not log an audit event4837 is expected not to change `AuditEvent.count`4838 when access_level remains the same and expires_at changes4839 behaves like logs an audit event4840 is expected to change `AuditEvent.count` by 14841 when expires_at remains the same and access_level changes4842 behaves like logs an audit event4843 is expected to change `AuditEvent.count` by 14844EE::Gitlab::Checks::PushRules::BranchCheck4845 #validate!4846 rejects the branch that is not allowed4847 returns an error if the regex is invalid4848 behaves like check ignored when push rule unlicensed4849 is expected to be truthy4850 behaves like use predefined push rules4851 calls Project#predefined_push_rule4852 when the ref is not a branch ref4853 allows the creation4854 when no commits are present4855 rejects the branch that is not allowed4856 when the default branch does not match the push rules4857 allows the default branch even if it does not match push rule4858ElasticDeleteProjectWorker4859 deletes a project with all nested objects and clears the index_status4860 does not include indexes which do not exist4861Packages::PackageFile4862 new file4863 calls checksum worker4864 .replicables_for_current_secondary4865 returns a package files scope4866 object storage4867 with sync object storage enabled4868 includes local stored and object stored records4869 with sync object storage disabled4870 includes local stored and excludes object stored records4871 selective sync4872 without selective sync4873 includes records owned by projects in all shards4874 includes records owned by projects in all namespaces4875 with selective sync by shard4876 includes records owned by projects on a selected shard4877 excludes records owned by projects not on a selected shard4878 with selective sync by namespace4879 with sync object storage enabled4880 includes records owned by projects on a selected namespace4881 excludes records owned by projects not on a selected namespace4882 with sync object storage disabled4883 includes locally stored records owned by projects on a selected namespace4884 excludes locally stored records owned by projects not on a selected namespace4885 excludes object stored records owned by projects on a selected namespace4886 .search4887 when search query is empty4888 returns all records4889 when search query is not empty4890 without matches4891 filters all package files4892 with matches4893 with matches by attributes4894 searchable_attributes: :file_name4895 returns filtered package_files limited to 500 records4896Security::SecurityOrchestrationPolicies::PolicyCommitService4897 #execute4898 when service is used for project4899 behaves like commits policy to associated project4900 when policy_yaml is invalid4901 returns error4902 when defined branch is missing4903 returns error4904 when security_orchestration_policies_configuration does not exist for container4905 does not create new project4906 when policy already exists in policy project4907 append4908 does not create branch4909 replace4910 creates branch with updated policy4911 remove4912 creates branch with removed policy4913 with branch_name as parameter4914 returns error4915 with user as a member of security project4916 returns success4917 when service is used for namespace4918 behaves like commits policy to associated project4919 when policy_yaml is invalid4920 returns error4921 when defined branch is missing4922 returns error4923 when security_orchestration_policies_configuration does not exist for container4924 does not create new project4925 when policy already exists in policy project4926 append4927 does not create branch4928 replace4929 creates branch with updated policy4930 remove4931 creates branch with removed policy49331st Try error in ./ee/spec/services/security/security_orchestration_policies/policy_commit_service_spec.rb:117:4934expected: :success4935 got: :error4936(compared using ==)4937Diff:4938@@ -1 +1 @@4939-:success4940+:error4942RSpec::Retry: 2nd try ./ee/spec/services/security/security_orchestration_policies/policy_commit_service_spec.rb:1174943 with branch_name as parameter4944 returns error4945 with user as a member of security project4946 returns success4947AppSec::Dast::Profiles::CreateService4948 execute4949 when on demand scan licensed feature is not available4950 communicates failure4951 when the feature is enabled4952 communicates success4953 creates a dast_profile4954 audits the creation4955 when param run_after_create: true4956 creates a ci_pipeline4957 behaves like it delegates scan creation to another service4958 calls AppSec::Dast::Scans::CreateService4959 when param dast_profile_schedule is present4960 creates the dast_profile_schedule4961 responds with dast_profile_schedule4962 audits the creation4963 when invalid schedule it present4964 rollback the transaction4965 returns the error service response4966 when a param is missing4967 communicates failure4968 when param tag_list is present4969 creates a dast_profile with tags4970 when there is a invalid tag4971 does not create a new dast_profile4972 returns an error status4973 populates message4974 when feature flag on_demand_scans_runner_tags is disabled4975 returns a success status4976 creates a dast_profile ignoring the tags4977Gitlab::Ci::Minutes::RunnersAvailability4978 #available?4979 shared_runners_enabled: true, minutes_usage: :with_not_used_build_minutes_limit, private_runner_available: false, result: true4980 is expected to eq true4981 shared_runners_enabled: true, minutes_usage: :with_not_used_build_minutes_limit, private_runner_available: true, result: true4982 is expected to eq true4983 shared_runners_enabled: true, minutes_usage: :with_used_build_minutes_limit, private_runner_available: false, result: false4984 is expected to eq false4985 shared_runners_enabled: true, minutes_usage: :with_used_build_minutes_limit, private_runner_available: true, result: true4986 is expected to eq true4987 shared_runners_enabled: false, minutes_usage: :with_used_build_minutes_limit, private_runner_available: false, result: true4988 is expected to eq true4989 shared_runners_enabled: false, minutes_usage: :with_used_build_minutes_limit, private_runner_available: true, result: true4990 is expected to eq true4991 shared_runners_enabled: false, minutes_usage: :with_not_used_build_minutes_limit, private_runner_available: true, result: true4992 is expected to eq true4993 shared_runners_enabled: false, minutes_usage: :with_not_used_build_minutes_limit, private_runner_available: false, result: true4994 is expected to eq true4995 database queries4996 caches records loaded from database4997 does not join across databases4998SyncSeatLinkRequestWorker4999 #perform5000 makes an HTTP POST request with passed params5001 when response contains a license5002 when there is no previous license5003 behaves like successful license creation5004 persists the new license5005 when there is a previous license5006 when it is a cloud license5007 when the current license key does not match the one returned from sync5008 creates a new license5009 when the current license key matches the one returned from sync5010 reuses the current license and updates the last_synced_at5011 when persisting fails5012 does not delete the current license and logs error5013 when it is not a cloud license5014 behaves like successful license creation5015 persists the new license5016 when response contains reconciliation dates5017 saves the reconciliation dates5018 when an upcoming_reconciliation already exists5019 updates the upcoming_reconciliation5020 when response contains future subscription information5021 when future subscription information is present in the response5022 and no future subscriptions are saved in the current settings5023 persists future subscription information5024 and future subscriptions are saved in the current settings5025 replaces future subscription information5026 when future subscription information is not present in the response5027 and no future subscriptions are saved in the current settings5028 does not change the settings5029 and future subscription are saved in the current settings5030 clears future subscription information5031 when saving fails5032 logs error5033 when the response does not contain reconciliation dates5034 destroys the existing upcoming reconciliation record for the instance5035 does not change anything when there is no existing record5036 behaves like unsuccessful request5037 when the request is not successful5038 raises an error with the expected message5039 sidekiq_retry_in_block5040 is at least 30 minutes in the first retry5041Security::StoreScanService5042 .execute5043 delegates the call to an instance of `Security::StoreScanService`5044 #execute5045 creates a succeeded security scan5046 setting the `created_at` attribute of security scan5047 sets the same `created_at` for security_scans as pipeline5048 setting the findings_partition_number5049 sets the correct value5050 when the `vulnerability_finding_signatures` licensed feature is available5051 calls `Security::OverrideUuidsService` with security report to re-calculate the finding UUIDs5052 when the `vulnerability_finding_signatures` licensed feature is not available5053 does not call `Security::OverrideUuidsService`5054 when the report has some errors5055 does not call the `Security::StoreFindingsService` and returns false5056 sets the status of the scan as `report_error`5057 when the report is produced by a failed job5058 does not call the `Security::StoreFindingsService` and sets the security scan as `job_failed`5059 when storing the findings raises an error5060 marks the security scan as `preparation_failed` and tracks the error5061 when the report is produced by a retried job5062 does not call the `Security::StoreFindingsService` and sets the security scan as non latest5063 when the report does not have any errors5064 calls the `Security::StoreFindingsService` to store findings5065 when the report has no warnings5066 does not store an empty array5067 when the report has some warnings5068 calls the `Security::StoreFindingsService` to store findings5069 stores the warnings5070 when the security scan already exists for the artifact5071 does not create a new security scan5072 when the `deduplicate` param is set as false5073 does not change the deduplicated flag of duplicated finding5074 does not change the deduplicated flag of unique finding5075 when the `deduplicate` param is set as true5076 when the `StoreFindingsService` returns success5077 does not run the re-deduplicate logic5078 when the `StoreFindingsService` returns error5079 does not change the deduplicated flag of duplicated finding from false5080 sets the deduplicated flag of unique finding as true5081 when the security scan does not exist for the artifact5082 creates a new security scan5083 when the `deduplicate` param is set as false5084 sets the deduplicated flag of duplicated finding as false5085 sets the deduplicated flag of unique finding as true5086 when the `deduplicate` param is set as true5087 sets the deduplicated flag of duplicated finding false5088 sets the deduplicated flag of unique finding as true5089EE::PersonalAccessTokensHelper5090 #personal_access_token_expiration_policy_enabled?5091 with `personal_access_token_expiration_policy` licensed5092 when the current user belongs to a managed group5093 when the managed group has a PAT expiry policy5094 is expected to be truthy5095 when the managed group does not have a PAT expiry setting5096 behaves like instance level PAT expiry setting5097 the instance has an expiry setting5098 is expected to be truthy5099 the instance does not have an expiry setting5100 is expected to be falsey5101 when the current user does not belong to a managed group5102 behaves like instance level PAT expiry setting5103 the instance has an expiry setting5104 is expected to be truthy5105 the instance does not have an expiry setting5106 is expected to be falsey5107 with `personal_access_token_expiration_policy` not licensed5108 when the current user belongs to a managed group5109 when the managed group has a PAT expiry policy5110 is expected to be falsey5111 when the managed group does not have a PAT expiry setting5112 behaves like instance level PAT expiry setting5113 the instance has an expiry setting5114 is expected to be falsey5115 the instance does not have an expiry setting5116 is expected to be falsey5117 when the current user does not belong to a managed group5118 behaves like instance level PAT expiry setting5119 the instance has an expiry setting5120 is expected to be falsey5121 the instance does not have an expiry setting5122 is expected to be falsey5123 #personal_access_token_max_expiry_date5124 when the current user belongs to a managed group5125 when the managed group has a PAT expiry policy5126 is expected to within one second of 2023-04-22 15:01:55 UTC5127 when the managed group does not have a PAT expiry setting5128 behaves like instance level PAT expiry setting5129 the instance has an expiry setting5130 is expected to within one second of 2023-05-02 15:01:55 UTC5131 the instance does not have an expiry setting5132 is expected to be nil5133 when the current user does not belong to a managed group5134 behaves like instance level PAT expiry setting5135 the instance has an expiry setting5136 is expected to within one second of 2023-05-02 15:01:55 UTC5137 the instance does not have an expiry setting5138 is expected to be nil5139 #personal_access_token_expiration_policy_licensed?5140 behaves like feature availability5141 when feature is licensed5142 is expected to be truthy5143 with `personal_access_token_expiration_policy` not licensed5144 is expected to be falsey5145 #token_expiry_banner_message5146 when user has an expiring token requiring rotation5147 is expected to eq "At least one of your Personal Access Tokens will expire soon. %{generate_new}"5148 when user has an expired token requiring rotation5149 is expected to eq "At least one of your Personal Access Tokens is expired. %{generate_new}"5150Groups::SecurityFeaturesHelper5151 #group_level_security_dashboard_available?5152 group_level_compliance_dashboard_enabled: false, read_group_compliance_dashboard_permission: false, result: false5153 returns the expected result5154 group_level_compliance_dashboard_enabled: true, read_group_compliance_dashboard_permission: false, result: false5155 returns the expected result5156 group_level_compliance_dashboard_enabled: false, read_group_compliance_dashboard_permission: true, result: false5157 returns the expected result5158 group_level_compliance_dashboard_enabled: true, read_group_compliance_dashboard_permission: true, result: true5159 returns the expected result5160 #group_level_credentials_inventory_available?5161 credentials_inventory_feature_enabled: true, enforced_group_managed_accounts: false, read_group_credentials_inventory_permission: false, result: false5162 returns the expected result5163 credentials_inventory_feature_enabled: true, enforced_group_managed_accounts: true, read_group_credentials_inventory_permission: false, result: false5164 returns the expected result5165 credentials_inventory_feature_enabled: true, enforced_group_managed_accounts: false, read_group_credentials_inventory_permission: true, result: false5166 returns the expected result5167 credentials_inventory_feature_enabled: true, enforced_group_managed_accounts: true, read_group_credentials_inventory_permission: true, result: true5168 returns the expected result5169 credentials_inventory_feature_enabled: false, enforced_group_managed_accounts: false, read_group_credentials_inventory_permission: false, result: false5170 returns the expected result5171 credentials_inventory_feature_enabled: false, enforced_group_managed_accounts: false, read_group_credentials_inventory_permission: false, result: false5172 returns the expected result5173 credentials_inventory_feature_enabled: false, enforced_group_managed_accounts: false, read_group_credentials_inventory_permission: true, result: false5174 returns the expected result5175 credentials_inventory_feature_enabled: false, enforced_group_managed_accounts: true, read_group_credentials_inventory_permission: true, result: false5176 returns the expected result5177 #group_level_security_dashboard_data5178 when it does not have projects5179 is expected to eq {:can_admin_vulnerability=>"true", :can_view_false_positive=>"false", :empty_state_svg_path=>"/assets...af0108.svg", :vulnerabilities_export_endpoint=>"/api/v4/security/groups/3604/vulnerability_exports"}5180 when it has projects5181 is expected to eq {:can_admin_vulnerability=>"true", :can_view_false_positive=>"false", :empty_state_svg_path=>"/assets...af0108.svg", :vulnerabilities_export_endpoint=>"/api/v4/security/groups/3604/vulnerability_exports"}5182 when it does not have projects but has subgroups that do5183 is expected to eq {:can_admin_vulnerability=>"true", :can_view_false_positive=>"false", :empty_state_svg_path=>"/assets...af0108.svg", :vulnerabilities_export_endpoint=>"/api/v4/security/groups/3604/vulnerability_exports"}5184 #group_security_showcase_data5185 builds correct hash5186 #group_security_discover_data5187 builds correct hash5188 candidate for pql_three_cta_test5189 renders a hash with pqltest content5190Mutations::Projects::SetLocked5191 #resolve5192 raises an error if the resource is not accessible to the user5193 when the user can lock the file5194 when file_locks feature is not available5195 raises an error5196 when file is not locked5197 sets path locks for the project5198 when file is already locked5199 does not change the lock5200 when LFS is enabled5201 locks the file in LFS5202 when file is not tracked in LFS5203 does not lock the file5204 when locking a directory5205 locks the directory5206 does not locks the directory through LFS5207 when the user can unlock the file5208 when file is already locked by the same user5209 unlocks the file5210 when file is already locked by somebody else5211 returns an error5212 when file is not locked5213 does nothing5214 when LFS is enabled5215 when file is locked5216 unlocks the file5217 unlocks the file in LFS5218 when file is not tracked in LFS5219 does not unlock the file5220 when unlocking a directory5221 unlocks the directory5222 does not call the LFS unlock service5223Security::Ingestion::Tasks::IngestFindingSignatures5224 #execute5225 ingests new finding signatures5226 behaves like bulk insertable task5227 when the validation fails5228 can generate error messages correctly5229Geo::MetricsUpdateService5230 #execute5231 when current node is nil5232 skips posting the status5233 when node is the primary5234 updates the cache5235 updates metrics for all sites5236 updates the GeoNodeStatus entry5237 when node is a secondary5238 updates the cache5239 adds gauges for various metrics5240 increments a counter when metrics fail to retrieve5241 does not create GeoNodeStatus entries5242Repository index5243 when fresh master branch is first pushed, followed by another update, then indexed5244 indexes initial push5245Gitlab::GroupSearchResults5246 #epics5247 searching5248 finds epics5249 ordering5250 sort: created_desc5251 sorts results by created_at5252 sort: created_asc5253 sorts results by created_at5254 sort: updated_desc5255 sorts results by updated_desc5256 sort: updated_asc5257 sorts results by updated_asc5258SamlProviderPolicy5259 with a user5260 allows access to public groups5261 allows access to private groups5262 with a token actor5263 valid token5264 allows access to public groups5265 allows access to private groups5266 invalid or missing token5267 allows anonymous access to public groups5268 prevents access to private groups5269 without a user or actor5270 allows access to public groups5271 prevents access to private groups5272Security::Ingestion::Tasks::IngestFindingIdentifiers5273 #execute5274 associates findings with the identifiers5275 behaves like bulk insertable task5276 when the validation fails5277 can generate error messages correctly5278TemplateFinder5279 #execute5280 type: :dockerfiles, expected_template_finder: Gitlab::Template::CustomDockerfileTemplate5281 custom templates enabled5282 returns custom templates5283 a custom template is specified by name5284 returns the custom template if its name is specified5285 custom templates disabled5286 does not return any custom templates5287 type: :gitignores, expected_template_finder: Gitlab::Template::CustomGitignoreTemplate5288 custom templates enabled5289 returns custom templates5290 a custom template is specified by name5291 returns the custom template if its name is specified5292 custom templates disabled5293 does not return any custom templates5294 type: :gitlab_ci_ymls, expected_template_finder: Gitlab::Template::CustomGitlabCiYmlTemplate5295 custom templates enabled5296 returns custom templates5297 a custom template is specified by name5298 returns the custom template if its name is specified5299 custom templates disabled5300 does not return any custom templates5301 type: :issues, expected_template_finder: Gitlab::Template::IssueTemplate5302 custom templates enabled5303 returns custom templates5304 a custom template is specified by name5305 returns the custom template if its name is specified5306 custom templates disabled5307 does not return any custom templates5308 type: :merge_requests, expected_template_finder: Gitlab::Template::MergeRequestTemplate5309 custom templates enabled5310 returns custom templates5311 a custom template is specified by name5312 returns the custom template if its name is specified5313 custom templates disabled5314 does not return any custom templates5315 #template_names5316 type: :dockerfiles, custom_name: "project_dockerfiles_template"5317 when project has a repository5318 returns all custom templates5319 template names hash keys5320 has all the expected keys5321 type: :gitignores, custom_name: "project_gitignores_template"5322 when project has a repository5323 returns all custom templates5324 template names hash keys5325 has all the expected keys5326 type: :gitlab_ci_ymls, custom_name: "project_gitlab_ci_ymls_template"5327 when project has a repository5328 returns all custom templates5329 template names hash keys5330 has all the expected keys5331 type: :metrics_dashboard_ymls, custom_name: "project_metrics_dashboard_ymls_template"5332 when project has a repository5333 returns all custom templates5334 template names hash keys5335 has all the expected keys5336EE::RepositoryCheck::BatchWorker5337 Geo primary5338 loads project ids from main database5339 Geo secondary5340 loads project ids from tracking database5341 loads project ids that were checked more than a month ago from tracking database5342Projects::AllProtectedBranchesRule5343 # order random5344 #matching_branches_count5345 returns the overall number of protected branches5346 #protected?5347 returns false5348 #approval_project_rules5349 returns only rules that do not belong to a protected branch5350 #updated_at?5351 returns timestamp when the most recent approval rule was updated5352 #name5353 set to All protected branches5354 #external_status_checks5355 is empty5356 #branch_protection5357 returns nil5358 #can_unprotect?5359 returns false5360 #group5361 returns nil5362 #any_rules?5363 when there are no approval rules and no status checks5364 returns false5365 when there are approval rules5366 returns true5367 #created_at5368 returns timestamp when the first approval rule was created5369 #default_branch?5370 returns false5371Resolvers::Geo::DependencyProxyBlobRegistriesResolver5372 # order random5373 behaves like a Geo registries resolver5374 #resolve5375 when the parent object is the current node5376 when the user has permission to view Geo data5377 when admin mode is enabled5378 when the ids argument is null5379 returns registries, in order5380 when the ids argument is present5381 returns the requested registries, in order5382 when the replication_state argument is present5383 returns registries with requested replication state, in order5384 with verification enabled5385 when the verification_state argument is present5386 returns registries with requested verification state, in order5387 with verification disabled5388 when the verification_state argument is present5389 raises ArgumentError (PENDING: Skipping because verification is enabled for DependencyProxy::Blob)5390 when admin mode is disabled5391 returns nothing5392 when the user does not have permission to view Geo data5393 returns nothing5394 when the parent object is not the current node5395 when the user has permission to view Geo data5396 returns nothing, because we can't query other nodes' tracking databases5397ProjectTemplateExportWorker5398 behaves like export worker5399 #perform5400 when it succeeds5401 calls the ExportService5402 export job5403 creates an export job record for the project5404 sets the export job status to started5405 sets the export job status to finished5406 when it fails5407 does not raise an exception when strategy is invalid5408 does not raise error when project cannot be found5409 does not raise error when user cannot be found5410 fails the export job status5411 sidekiq options5412 disables retry5413 disables dead5414 sets default status expiration5415Resolvers::UserNotesCountResolver5416 #resolve5417 is expected to have nullable GraphQL type Int5418 when counting notes from an epic5419 when epics feature is available5420 when counting notes from a public epic5421 returns the number of non-system notes for the epic5422 when a user has permission to view notes5423 returns the number of notes for the issue5424 when a user does not have permission to view notes5425 generates an error5426Gitlab::Ci::Reports::Security::Locations::ClusterImageScanning5427 when cluster_id is provided in finding5428 behaves like vulnerability location5429 #initialize5430 when all params are given5431 initializes an instance5432 param: :image5433 when param image is missing5434 raises an error5435 param: :operating_system5436 when param operating_system is missing5437 raises an error5438 #fingerprint5439 generates expected fingerprint5440 #fingerprint_path5441 generates expected fingerprint5442 #==5443 returns true when fingerprints are equal5444 returns false when fingerprints are different5445 when agent id is provided in finding5446 behaves like vulnerability location5447 #initialize5448 when all params are given5449 initializes an instance5450 param: :image5451 when param image is missing5452 raises an error5453 param: :operating_system5454 when param operating_system is missing5455 raises an error5456 #fingerprint5457 generates expected fingerprint5458 #fingerprint_path5459 generates expected fingerprint5460 #==5461 returns true when fingerprints are equal5462 returns false when fingerprints are different5463MergeRequests::CaptureSuggestedReviewersAcceptedService5464 # order random5465 #execute5466 when the reviewer IDs param is empty5467 returns an error response5468 when the merge request is not eligible5469 returns an error response5470 when there is no existing predictions5471 returns an error response5472 when there is a validation error5473 returns an error response5474 when successful5475 suggested: ["bob", "mary", "donald"], existing_accepted: [], new_accepted: ["donald"], accepted: ["donald"]5476 returns a success response and updates predictions5477 suggested: ["bob", "mary", "donald"], existing_accepted: ["bob"], new_accepted: ["donald"], accepted: ["bob", "donald"]5478 returns a success response and updates predictions5479 suggested: ["bob", "mary", "donald"], existing_accepted: ["bob"], new_accepted: ["mickey"], accepted: ["bob"]5480 returns a success response and updates predictions5481 suggested: ["bob", "mary", "donald"], existing_accepted: ["bob", "donald"], new_accepted: ["bob"], accepted: ["bob", "donald"]5482 returns a success response and updates predictions5483Gitlab::Ci::Pipeline::Chain::Limit::Activity5484 when active pipelines limit is exceeded5485 drops the pipeline5486 persists the pipeline5487 breaks the chain5488 sets a valid failure reason5489 logs the error5490 when pipeline activity limit is not exceeded5491 does not break the chain5492 does not invalidate the pipeline5493 does not log any error5494Boards::Epics::CreateService5495 #execute5496 when epics feature is available5497 behaves like success epic creation5498 creates an epic5499 is expected to change `Epic.count` by 15500 when board is in an ancestor group5501 behaves like success epic creation5502 creates an epic5503 is expected to change `Epic.count` by 15504 when arguments are not valid5505 when board id is bogus5506 behaves like epic creation error5507 does not create epic5508 when list id is for a different board5509 behaves like epic creation error5510 does not create epic5511 when board id is for a different group5512 behaves like epic creation error5513 does not create epic5514 when epics feature is not available5515 behaves like epic creation error5516 does not create epic5517Groups::MarkForDeletionService5518 marking the group for deletion5519 with user that can admin the group5520 for a group that has not been marked for deletion5521 marks the group for deletion5522 returns success5523 marking for deletion fails5524 returns error5525 for a group that has been marked for deletion5526 does not change the attributes associated with delayed deletion5527 returns error5528 audit events5529 logs audit event5530 with a user that cannot admin the group5531 does not mark the group for deletion5532 returns error5533 audit events5534 does not log audit event5535Members::InviteService5536 #execute5537 with group plan observing quota limits5538 already exceeded invite quota limit5539 behaves like quota limit exceeded5540 limits the number of daily invites allowed5541 will exceed invite quota limit5542 behaves like quota limit exceeded5543 limits the number of daily invites allowed5544 within invite quota limit5545 successfully creates members5546 infinite invite quota limit5547 successfully creates members5548 without a plan5549 successfully creates members5550 with Audit Event logging5551 when there are valid members created5552 creates Audit Events5553 when there are some invalid members5554 only creates Audit Events for valid members5555Ci::ProcessPipelineService#execute5556 cross-project pipelines5557 creates a downstream cross-project pipeline5558Gitlab::LicenseScanning5559 # order random5560 #scanner_for_pipeline5561 when the license_scanning_sbom_scanner feature flag is false5562 with default branch pipeline5563 returns an artifact scanner5564 returns a pipeline5565 with non-default branch pipeline5566 returns an artifact scanner5567 returns a pipeline5568 when the license_scanning_sbom_scanner feature flag is true for the given pipeline.project5569 when pipeline has only an sbom report5570 returns an sbom scanner5571 with default branch pipeline5572 returns a pipeline5573 with non-default branch pipeline5574 returns an sbom scanner5575 returns a pipeline5576 when pipeline has license scanning and sbom reports5577 returns an artifact scanner5578 returns a pipeline5579 #scanner_for_project5580 when the license_scanning_sbom_scanner feature flag is false5581 returns an artifact scanner5582 with default ref5583 contains a pipeline5584 with provided ref5585 contains a pipeline5586 when the license_scanning_sbom_scanner feature flag is true for the given project5587 when project only has pipelines with a sbom report5588 returns an sbom scanner5589 with default ref5590 contains a pipeline5591 with provided ref5592 contains a pipeline5593 when project has pipelines with license scanning and sbom reports5594 when the license scanning report is newer than the sbom report5595 returns an artifact scanner5596 when the sbom report is newer than the license scanning report5597 returns an sbom scanner5598Gitlab::Mirror5599 #configure_cron_job!5600 with jobs already running5601 creates a new cron job5602 without jobs already running5603 creates update_all_mirrors_worker5604 when Geo is enabled5605 disables mirror cron job5606 #max_mirror_capacity_reached?5607 returns true if available capacity is 05608 returns false if available capacity is not 05609 #reschedule_immediately?5610 when available capacity exceeds the defined threshold5611 returns true5612 when the availabile capacity is lower than the defined threshold5613 returns false5614 #available_capacity5615 when redis key does not exist5616 returns mirror_max_capacity5617 when redis key exists5618 returns available capacity5619 #increment_capacity5620 increments capacity5621 #decrement_capacity5622 with capacity above 05623 decrements capacity5624 with non-existent id5625 does not decrement capacity5626 #track_scheduling5627 increments current scheduling counter5628 excludes existing ids from existing counter5629 #untrack_scheduling5630 with scheduling counter above 05631 decrements scheduling counter5632 does not decrement scheduling counter for non-existant id5633 with scheduling counter equal to 05634 does not decrement scheduling counter5635 #reset_scheduling5636 with scheduling counter above 05637 decrements scheduling counter to 05638 with scheduling counter equal to 05639 decrements scheduling counter to 05640 #max_delay5641 returns max delay with some jitter5642 #min_delay5643 returns min delay with some jitter5644AppSec::Dast::ScannerProfiles::DestroyService5645 #execute5646 when a user does not have access to the project5647 returns an error status5648 populates message5649 when the user can run a DAST scan5650 returns a success status5651 deletes the dast_scanner_profile5652 returns a dast_scanner_profile payload5653 audits the deletion5654 when the dast_scanner_profile doesn't exist5655 returns an error status5656 populates message5657 when on demand scan licensed feature is not available5658 returns an error status5659 populates message5660 when project has security policies enabled5661 when there is no policy that is referencing the profile5662 returns a success status5663 when there is a policy that is referencing the profile5664 returns an error status5665 populates message5666PostReceiveService5667 Geo5668 when the push was redirected from a Geo secondary to the primary5669 includes a message advising a redirection occurred5670 when the secondary has a GeoNodeStatus5671 when the GeoNodeStatus db_replication_lag_seconds is greater than 05672 includes current Geo secondary lag in the output5673 when the GeoNodeStatus db_replication_lag_seconds is 05674 does not include current Geo secondary lag in the output5675 when the GeoNodeStatus db_replication_lag_seconds is nil5676 does not include current Geo secondary lag in the output5677 when the secondary does not have a GeoNodeStatus5678 does not include current Geo secondary lag in the output5679 when the push was not redirected from a Geo secondary to the primary5680 does not include current Geo secondary lag in the output5681 storage size limit alerts5682 when there is no alert5683 returns no messages5684 when there is an alert5685 when repository size limit enforcement5686 returns error message5687 when namespace size limit enforcement5688 with a personal namespace5689 returns warning message5690 with a group namespace5691 returns warning message5692Types::VulnerabilityDetailType5693 exposes all possible types5694 .resolve_type5695 type: "url", value: nil, graphql_type: Types::VulnerabilityDetails::UrlType5696 correctly maps type in object to GraphQL type5697 type: "code", value: nil, graphql_type: Types::VulnerabilityDetails::CodeType5698 correctly maps type in object to GraphQL type5699 type: "text", value: nil, graphql_type: Types::VulnerabilityDetails::TextType5700 correctly maps type in object to GraphQL type5701 type: "diff", value: nil, graphql_type: Types::VulnerabilityDetails::DiffType5702 correctly maps type in object to GraphQL type5703 type: "table", value: nil, graphql_type: Types::VulnerabilityDetails::TableType5704 correctly maps type in object to GraphQL type5705 type: "commit", value: nil, graphql_type: Types::VulnerabilityDetails::CommitType5706 correctly maps type in object to GraphQL type5707 type: "markdown", value: nil, graphql_type: Types::VulnerabilityDetails::MarkdownType5708 correctly maps type in object to GraphQL type5709 type: "file-location", value: nil, graphql_type: Types::VulnerabilityDetails::FileLocationType5710 correctly maps type in object to GraphQL type5711 type: "module-location", value: nil, graphql_type: Types::VulnerabilityDetails::ModuleLocationType5712 correctly maps type in object to GraphQL type5713 type: "list", value: nil, graphql_type: Types::VulnerabilityDetails::ListType5714 correctly maps type in object to GraphQL type5715 type: "named-list", value: nil, graphql_type: Types::VulnerabilityDetails::ListType5716 correctly maps type in object to GraphQL type5717 type: "other", value: nil, graphql_type: Types::VulnerabilityDetails::BaseType5718 correctly maps type in object to GraphQL type5719 type: "value", value: nil, graphql_type: Types::VulnerabilityDetails::BaseType5720 correctly maps type in object to GraphQL type5721 type: "value", value: "1", graphql_type: Types::VulnerabilityDetails::TextType5722 correctly maps type in object to GraphQL type5723 type: "value", value: 412, graphql_type: Types::VulnerabilityDetails::IntType5724 correctly maps type in object to GraphQL type5725 type: "value", value: true, graphql_type: Types::VulnerabilityDetails::BooleanType5726 correctly maps type in object to GraphQL type5727 type: "value", value: false, graphql_type: Types::VulnerabilityDetails::BooleanType5728 correctly maps type in object to GraphQL type5729IncidentManagement::PendingEscalations::Alert5730 # order random5731 #type5732 is expected to eq :alert5733 #escalatable5734 is expected to eq #<AlertManagement::Alert id: namespace935/project1016^alert#>5735 .class_for_check_worker5736 is expected to eq IncidentManagement::PendingEscalations::AlertCheckWorker5737 shared pending escalation features5738 is expected to be valid5739 validations5740 is expected to validate that :process_at cannot be empty/falsy5741 is expected to validate that :rule_id cannot be empty/falsy5742 is expected to delegate #project to the #alert object5743 is expected to validate that :rule_id is case-sensitively unique within the scope of :alert_id5744 associations5745 is expected to belong to alert required: false5746 is expected to belong to rule required: false5747 scopes5748 with escalations scheduled for various times5749 .processable5750 is expected to contain exactly #<IncidentManagement::PendingEscalations::Alert id: 3, rule_id: 9, alert_id: 4, process_at: "2023-03-...reated_at: "2023-04-12 15:03:32.493915066 +0000", updated_at: "2023-04-12 15:03:32.493915066 +0000"> and #<IncidentManagement::PendingEscalations::Alert id: 4, rule_id: 9, alert_id: 5, process_at: "2023-04-...reated_at: "2023-04-12 15:03:32.505478076 +0000", updated_at: "2023-04-12 15:03:32.505478076 +0000">5751 .upcoming5752 is expected to contain exactly #<IncidentManagement::PendingEscalations::Alert id: 3, rule_id: 9, alert_id: 4, process_at: "2023-03-...reated_at: "2023-04-12 15:03:32.493915066 +0000", updated_at: "2023-04-12 15:03:32.493915066 +0000">, #<IncidentManagement::PendingEscalations::Alert id: 4, rule_id: 9, alert_id: 5, process_at: "2023-04-...reated_at: "2023-04-12 15:03:32.505478076 +0000", updated_at: "2023-04-12 15:03:32.505478076 +0000">, and #<IncidentManagement::PendingEscalations::Alert id: 5, rule_id: 9, alert_id: 6, process_at: "2023-04-...reated_at: "2023-04-12 15:03:32.520629215 +0000", updated_at: "2023-04-12 15:03:32.520629215 +0000">5753 .for_target5754 is expected to contain exactly #<IncidentManagement::PendingEscalations::Alert id: 7, rule_id: 11, alert_id: 8, process_at: "2023-04...reated_at: "2023-04-12 15:03:32.884835350 +0000", updated_at: "2023-04-12 15:03:32.884835350 +0000">5755 .delete_by_target5756 removes the escalations for the provided target(s)5757AuditEvents::BuildService5758 #execute5759 when licensed5760 sets correct attributes5761 when IP address is not provided5762 uses author current_sign_in_ip5763 when author is impersonated5764 sets author to impersonated user5765 includes impersonator name in message5766 when IP address is not provided5767 uses impersonator current_sign_in_ip5768 when overriding target details5769 uses correct target details5770 when deploy token is passed as author5771 expect author to be user5772 when deploy key is passed as author5773 expect author to be deploy key5774 when author is passed as UnauthenticatedAuthor5775 sets author as unauthenticated user5776 when not licensed5777 sets correct attributes5778 when author is impersonated5779 does not includes impersonator name in message5780Types::DastScannerProfileType5781 is expected to eq "DastScannerProfile"5782 is expected to require graphql authorizations :read_on_demand_dast_scan5783 is expected to have graphql fields :id, :profileName, :spiderTimeout, :targetTimeout, :editPath, :scanType, :useAjaxSpider, :showDebugMessages, :referencedInSecurityPolicies, and :tagList5784 dast_scanner_profiles5785 profile_name field5786 is expected to eq "GPS Receiver e201828c - 39"5787 when security policies are enabled5788 only calls Gitaly twice when multiple profiles are present5789ApprovalRules::GroupFinder5790 when with inaccessible groups5791 returns groups5792 when user is an admin5793 returns groups5794 when user is not authorized5795 returns only public groups5796 avoid N+1 query5797 avoids N+1 database queries5798 when without inaccessible groups5799 returns groups5800Gitlab::UsageDataCounters::IssueActivityUniqueCounter5801 for Issue health status changed actions5802 behaves like daily tracked issuable snowplow and service ping events with project5803 behaves like a daily tracked issuable snowplow and service ping events for given event params5804 is expected to eq 25805 does not track edit actions if author is not present5806 emits snowplow event5807 for Issue iteration changed actions5808 behaves like daily tracked issuable snowplow and service ping events with project5809 behaves like a daily tracked issuable snowplow and service ping events for given event params5810 is expected to eq 25811 does not track edit actions if author is not present5812 emits snowplow event5813 for Issue weight changed actions5814 behaves like daily tracked issuable snowplow and service ping events with project5815 behaves like a daily tracked issuable snowplow and service ping events for given event params5816 is expected to eq 25817 does not track edit actions if author is not present5818 emits snowplow event5819 for Issue added to epic actions5820 behaves like daily tracked issuable snowplow and service ping events with project5821 behaves like a daily tracked issuable snowplow and service ping events for given event params5822 is expected to eq 25823 does not track edit actions if author is not present5824 emits snowplow event5825 for Issue removed from epic actions5826 behaves like daily tracked issuable snowplow and service ping events with project5827 behaves like a daily tracked issuable snowplow and service ping events for given event params5828 is expected to eq 25829 does not track edit actions if author is not present5830 emits snowplow event5831 for Issue changed epic actions5832 behaves like daily tracked issuable snowplow and service ping events with project5833 behaves like a daily tracked issuable snowplow and service ping events for given event params5834 is expected to eq 25835 does not track edit actions if author is not present5836 emits snowplow event5837Namespaces::SyncNamespaceNameWorker5838 #perform5839 triggers a sync for the namespace name to CustomersDot5840 when the namespace is not found5841 does not trigger a sync for the namespace name to CustomersDot5842 does not raise an error5843 when the sync fails5844 raises a RequestError5845SystemCheck::Geo::CurrentNodeCheck5846 #check?5847 when the current machine has a matching GeoNode5848 returns true5849 when the current machine does not have a matching GeoNode5850 returns false5851 .check_pass5852 outputs additional helpful info (FAILED - 5)58541st Try error in ./ee/spec/lib/system_check/geo/current_node_check_spec.rb:25:5855expected: "yes, found a primary node named \"Foo\""5856 got: "yes, found a secondary node named \"Foo\""5857(compared using ==)5859RSpec::Retry: 2nd try ./ee/spec/lib/system_check/geo/current_node_check_spec.rb:255860vulnerabilities/issue_description.md.erb5861 # order random5862 renders markdown suitable for creating an issue description5863 when scan is absent5864 renders the scanner name only5865 when identifiers are absent5866 does not render the Identifiers section5867 when severity is absent5868 does not render the Severity section5869 when confidence is absent5870 does not render the Confidence section5871 when a description is absent on the Vulnerability5872 renders the Finding description5873Projects::AfterRenameService5874 #execute5875 when running on a primary node5876 logs the Geo::RepositoryRenamedEvent for project backed by hashed storage5877 logs the Geo::RepositoryRenamedEvent for project backed by legacy storage5878Elastic::MultiVersionInstanceProxy5879 #version5880 returns instance proxy in specified version5881 repository5882 returns instance proxy in specified version5883 method forwarding5884 forwards methods which should touch all write targets5885 forwards read methods to only reading target5886 does not forward write methods which should touch specific version5887Elastic::Latest::UserInstanceProxy5888 # order random5889 #as_indexed_json5890 serializes project as hash5891 with a user status5892 sets status, status emoji and busy fields5893 when user is blocked5894 sets in_forbidden_state to true5895 with a project5896 sets the correct namespace_ancestry_ids5897 when project is in a subgroup5898 includes the project ancestry id5899 when the user belongs to the group5900 includes the group ancestry id5901 when the user belongs to the subgroup5902 includes the subgroup ancestry id5903 #es_parent5904 is nil so that elasticsearch routing is disabled5905Namespaces::FreeUserCap::NotifyOverLimitService5906 # order random5907 with over limit namespace5908 #execute5909 records the time of notification in free_user_cap_over_limit_notified_at5910 .execute5911 emails the owner(s) of the namespace5912 with error handling5913 rescues to a ServiceResponse5914 when under the limit5915 #execute5916 exits early5917Gitlab::Geo::Oauth::Session5918 #authorized_url5919 returns a valid url to the primary node5920 secondary is configured with relative URL5921 does not include secondary relative URL path5922 primary is configured with a different internal URL5923 uses the external URL for the authorize redirect5924 #authenticate5925 on success5926 returns hashed user data5927 on invalid token5928 raises exception5929 primary is configured with relative URL5930 includes primary relative URL path5931 #get_token5932 primary is configured with relative URL5933 makes the request to a primary's relative URL5934Projects::DeregisterSuggestedReviewersProjectService5935 # order random5936 #execute5937 when the suggested reviewers is not available5938 behaves like an unavailable response5939 returns an error response without calling client5940 when the suggested reviewers is available5941 when the suggested reviewers is enabled5942 behaves like an unavailable response5943 returns an error response without calling client5944 when the suggested reviewers is not enabled5945 when project is not found5946 returns an error response5947 when suggested reviewers client fails5948 returns an error response5949 when suggested reviewers client succeeds5950 returns a success response5951Dast::ProfilesPipeline5952 associations5953 is expected to belong to ci_pipeline class_name => Ci::Pipeline required: true5954 is expected to belong to dast_profile class_name => Dast::Profile required: true5955 loose foreign key on dast_profiles_pipelines.ci_pipeline_id5956 behaves like cleanup by a loose foreign key5957 cleans up (delete or nullify) the model5958IncidentManagement::EscalationRulesFinder5959 # order random5960 #execute5961 when project is given5962 returns the rules in the project for different types of project inputs5963 when removed rules should be included5964 is expected to contain exactly #<IncidentManagement::EscalationRule id: 16, policy_id: 11, oncall_schedule_id: 11, status: "acknowledged", elapsed_time_seconds: 300, is_removed: true, user_id: nil>, #<IncidentManagement::EscalationRule id: 17, policy_id: 11, oncall_schedule_id: nil, status: "acknowledged", elapsed_time_seconds: 300, is_removed: false, user_id: 2311>, #<IncidentManagement::EscalationRule id: 18, policy_id: 11, oncall_schedule_id: nil, status: "acknowledged", elapsed_time_seconds: 300, is_removed: false, user_id: 2312>, and #<IncidentManagement::EscalationRule id: 14, policy_id: 11, oncall_schedule_id: 9, status: "acknowledged", elapsed_time_seconds: 300, is_removed: false, user_id: nil>5965 when user is given5966 returns the user rules for different types of user inputs5967 when group member is given5968 is expected to contain exactly #<IncidentManagement::EscalationRule id: 17, policy_id: 11, oncall_schedule_id: nil, status: "acknowledged", elapsed_time_seconds: 300, is_removed: false, user_id: 2311> and #<IncidentManagement::EscalationRule id: 19, policy_id: 12, oncall_schedule_id: nil, status: "acknowledged", elapsed_time_seconds: 300, is_removed: false, user_id: 2311>5969 when member does not belong to a user5970 is expected to raise ArgumentError with "Member does not correspond to a user"5971 when project member is given5972 is expected to contain exactly #<IncidentManagement::EscalationRule id: 18, policy_id: 11, oncall_schedule_id: nil, status: "acknowledged", elapsed_time_seconds: 300, is_removed: false, user_id: 2312>5973 when user is also given5974 is expected to raise ArgumentError with "Member param cannot be used with project or user params"5975 when project is also given5976 is expected to raise ArgumentError with "Member param cannot be used with project or user params"5977ElasticIndexBulkCronWorker5978 .perform5979 indexing is not paused5980 queues all shards for execution5981 executes the service under an exclusive lease5982 legacy lease is detected5983 skips scheduling5984 skips shard execution5985 indexing is paused5986 does nothing if indexing is paused5987 when service returns non-zero counter5988 adds logging_extras to the done log5989 requeues the worker5990 when there are no records in the queue5991 does not requeue the worker5992 behaves like worker with data consistency5993 .get_data_consistency_feature_flag_enabled?5994 returns true5995 .get_data_consistency5996 returns correct data consistency5997Gitlab::Usage::Metrics::Instrumentations::CountExternalStatusChecksMetric5998 behaves like a correct instrumented metric value and query5999 behaves like a correct instrumented metric value6000 has correct value6001 behaves like a correct instrumented metric query6002 has correct generate query6003GitlabSubscriptions::RefreshSeatsWorker6004 # order random6005 #perform_work6006 with GitlabSubscriptions requiring refresh6007 when the DB is not read-only6008 with a paid plan6009 is labeled as idempotent6010 performs multiple times sequentially without raising an exception6011 updates seat count columns6012 updates last_seat_refresh_at without callbacks6013 with a free plan6014 does not update seat columns6015 with a trial plan6016 does not update seat columns6017 when the database is read_only6018 does not update seat columns6019 with no GitlabSubscriptions requiring refresh6020 does not update seat columns6021 #max_running_jobs6022 is expected to eq 66023 #remaining_work_count6024 when there is remaining work6025 is expected to eq 76026 when there is no remaining work6027 is expected to eq 06028Types::Vulnerabilities::AssetType6029 is expected to eq "AssetType"6030 is expected to have graphql fields :name, :type, and :url6031 checking field contents6032 checks the contents of the assets field6033Vulnerabilities::FindingLink6034 associations6035 is expected to belong to finding class_name => Vulnerabilities::Finding required: false inverse_of => finding_links6036 validations6037 is expected to validate that :url cannot be empty/falsy6038 is expected to validate that the length of :url is at most 20486039 is expected to validate that the length of :name is at most 2556040 is expected to validate that :finding cannot be empty/falsy6041Dast::PreScanVerificationStep6042 # order random6043 instance methods6044 #success?6045 when the verification_errors is an empty list6046 is expected to be success6047 when the are verification errors6048 is expected not to be success6049 enums6050 is expected to define :check_type as an enum backed by an integer with values ‹{connection: 0, authentication: 1, crawling: 2}›, prefix: true6051 associations6052 is expected to belong to dast_pre_scan_verification class_name => Dast::PreScanVerification required: true6053IssueEntity6054 when with_blocking_issues option is not present6055 exposes blocking issues6056 when with_blocking_issues option is present6057 exposes blocking issues6058 exposes only iid and web_url6059Vulnerabilities::Statistics::UpdateService6060 .update_for6061 instantiates an instance of service class and calls execute on it6062 #execute6063 when the diff is empty6064 does not change existing statistic entity6065 when the diff is not empty6066 when there is already a record in the database6067 changes the existing statistic entity6068 when there is no existing record in the database6069 creates a new record in the database6070Gitlab::SidekiqConfig6071 .workers6072 includes EE workers6073 .worker_queues6074 includes EE queues6075 .expand_queues6076 expands queue namespaces to concrete queue names6077 lets concrete queue names pass through6078 lets unknown queues pass through6079 .workers_for_all_queues_yml6080 returns a tuple with EE workers second6081 .all_queues_yml_outdated?6082 returns true if the YAML file does not match the application code6083 returns false if the YAML file matches the application code6084Users::CaptchaChallengeService6085 #execute6086 when feature flag arkose_labs_login_challenge is disabled6087 is expected to eq {:result=>false}6088 when feature flag arkose_labs_login_challenge is enabled6089 when the user does not exist6090 is expected to eq {:result=>true}6091 when the user has never logged in previously6092 is expected to eq {:result=>true}6093 when the user has not logged in successfully in more than 3 months6094 is expected to eq {:result=>true}6095 when the user has 3 failed login attempts6096 is expected to eq {:result=>true}6097 when the user has logged in previously in less than 3 months6098 is expected to eq {:result=>false}6099Projects::ImportService6100 when imported in to a group6101 when audit_events is licensed6102 does audit6103 when audit_events is unlicensed6104 does not audit6105 when not imported in to a group6106 when audit_events is licensed6107 does not audit6108 when audit_events is unlicensed6109 does not audit6110Projects::SetupCiCd6111 sets up pull mirroring on the project6112 disables some features6113 when import_url is blank6114 doesn't update the project6115UsersOpsDashboardProjects::DestroyService6116 #execute6117 with an added project6118 removes the project6119 returns the removed project6120 without projects added6121 does not remove the project6122 returns nil6123Security::ApprovalGroupsFinder6124 # order random6125 #execute6126 group ID lookup6127 finds by group IDs6128 group path lookup6129 when searching globally6130 finds across containers6131 when searching locally6132 finds within container hierarchy6133 group ID and path lookup6134 combines6135 authorization6136 excludes groups the user lacks access to6137AppSec::Fuzzing::Coverage::Corpuses::CreateService6138 execute6139 when the feature coverage_fuzzing is not available6140 communicates failure6141 when the feature coverage_fuzzing is enabled6142 communicates success6143 creates a corpus6144 audits the creation6145 when a param is missing6146 communicates failure6147 when a param is incorrect6148 communicates failure6149Deployments::ApprovalWorker6150 # order random6151 automatic deployment6152 approves deployment6153 behaves like an idempotent worker6154 is labeled as idempotent6155 performs multiple times sequentially without raising an exception6156Security::ScannedResourcesService#execute6157 The pipeline has security builds6158 Report types are requested6159 only returns the requested scans6160 returns the scanned resources6161 A limited number of scanned resources are requested6162 returns the scanned resources6163 The Pipeline has no security builds6164 is expected to match (a hash including {"sast" => [], "dast" => []})6165 Pipeline is nil6166 is expected to match (a hash including {"sast" => [], "dast" => []})6167Namespaces::InProductMarketingEmailsService#execute6168 when group has a plan6169 on the free plan6170 sends an email6171 on a trial6172 does not send an email6173 on a paid plan6174 does not send email6175Elastic::Latest::CustomLanguageAnalyzers6176 .custom_analyzers_mappings6177 returns correct structure6178 .custom_analyzers_fields6179 smartcn_enabled: false, kuromoji_enabled: false, expected_result: {}6180 returns correct config6181 smartcn_enabled: true, kuromoji_enabled: false, expected_result: {:smartcn=>{:analyzer=>"smartcn", :type=>:text}}6182 returns correct config6183 smartcn_enabled: false, kuromoji_enabled: true, expected_result: {:kuromoji=>{:analyzer=>"kuromoji", :type=>:text}}6184 returns correct config6185 smartcn_enabled: true, kuromoji_enabled: true, expected_result: {:smartcn=>{:analyzer=>"smartcn", :type=>:text}, :kuromoji=>{:analyzer=>"kuromoji", :type=>:text}}6186 returns correct config6187 .add_custom_analyzers_fields6188 smartcn_enabled: false, kuromoji_enabled: false, smartcn_search: false, kuromoji_search: false, expected_additional_fields: []6189 returns correct fields6190 smartcn_enabled: false, kuromoji_enabled: false, smartcn_search: true, kuromoji_search: true, expected_additional_fields: []6191 returns correct fields6192 smartcn_enabled: true, kuromoji_enabled: true, smartcn_search: false, kuromoji_search: false, expected_additional_fields: []6193 returns correct fields6194 smartcn_enabled: true, kuromoji_enabled: true, smartcn_search: true, kuromoji_search: false, expected_additional_fields: ["title.smartcn"]6195 returns correct fields6196 smartcn_enabled: true, kuromoji_enabled: true, smartcn_search: false, kuromoji_search: true, expected_additional_fields: ["title.kuromoji"]6197 returns correct fields6198 smartcn_enabled: true, kuromoji_enabled: true, smartcn_search: true, kuromoji_search: true, expected_additional_fields: ["title.smartcn", "title.kuromoji"]6199 returns correct fields6200clusters/clusters/show6201 when the cluster details page is opened6202 with project level cluster6203 behaves like cluster health section6204 displays the Cluster health section6205 with group level cluster6206 behaves like cluster health section6207 displays the Cluster health section6208Types::Sbom::DependencyType6209 # order random6210 is expected to eq "Dependency"6211 is expected to have graphql fields :id, :name, :version, :packager, and :location6212 is expected to require graphql authorizations :read_dependencies6213DastScannerProfilesFinder6214 #execute6215 returns all dast_scanner_profiles6216 filtering by ids6217 returns the dast_scanner_profile6218 filter by projects6219 returns the matching dast_scanner_profiles6220 filter by a project6221 returns the matching dast_scanner_profile6222 filter by name6223 returns the matching dast_scanner_profiles6224 filter by names6225 returns the matching dast_scanner_profiles6226 when DastScannerProfile id is for a different project6227 returns an empty relation6228 when the dast_scanner_profile1 does not exist6229 returns an empty relation6230Search::ProjectIndexIntegrityWorker6231 # order random6232 #perform6233 when search_index_integrity feature flag is disabled6234 does nothing6235 when and project_id is not provided6236 does nothing6237 when project_id is provided6238 behaves like an idempotent worker6239 is labeled as idempotent6240 performs multiple times sequentially without raising an exception6241 executes the index repair service for the project6242 when project is not found6243 does nothing6244Secure-Binaries.gitlab-ci.yml6245 is expected not to be nil6246 the created pipeline6247 validation6248 creates a validation job6249 sets DAST_RUNNER_VALIDATION_VERSION to the correct version6250ActiveUserCountThresholdWorker6251 #perform6252 trial?: false, threshold_reached?: false, should_send_reminder?: false6253 is expected not to receive approaching_active_user_count_limit(*(any args)) 0 times6254 trial?: false, threshold_reached?: true, should_send_reminder?: true6255 is expected to receive approaching_active_user_count_limit(*(any args)) 1 time6256 trial?: true, threshold_reached?: false, should_send_reminder?: false6257 is expected not to receive approaching_active_user_count_limit(*(any args)) 0 times6258 trial?: true, threshold_reached?: true, should_send_reminder?: false6259 is expected not to receive approaching_active_user_count_limit(*(any args)) 0 times6260 recipients6261 sends reminder to admins only6262 adds a licensee email to the recipients list6263 sends reminder to unique emails6264 sends reminder to active admins only6265 when there is no license6266 does not send a reminder6267Sidebars::YourWork::Menus::SecurityDashboardMenu6268 # order random6269 behaves like top-level menu item with context based feature guard6270 when user can access feature6271 renders6272 when user cannot access feature6273 does not render6274 behaves like top-level menu item6275 renders the correct link6276 renders the correct title6277 renders the correct icon6278 defines correct active route6279 behaves like top-level menu item6280 renders the correct link6281 renders the correct title6282 renders the correct icon6283 defines correct active route6284 behaves like top-level menu item with sub menu items6285 matches expected sub menu items6286 each sub menu item has a unique item_id6287GroupChildEntity6288 with compliance framework6289 disabled6290 for a project6291 behaves like does not have the compliance framework6292 is expected to be nil6293 for a group6294 behaves like does not have the compliance framework6295 is expected to be nil6296 enabled6297 for a project6298 has the compliance framework6299 for a project without a compliance framework6300 behaves like does not have the compliance framework6301 is expected to be nil6302 for a group6303 behaves like does not have the compliance framework6304 is expected to be nil6305API::Helpers::IssuesHelpers6306 find_issues6307 with epics6308 returns results6309 avoids N+1 queries6310BulkImports::Projects::Pipelines::PushRulePipeline6311 #run6312 imports push rules6313LdapAllGroupsSyncWorker6314 #perform6315 with the default license key6316 syncs all groups when group_id is nil6317 without a license key6318 does not sync all groups6319Boards::UsersFinder6320 #execute6321 when parent is a project6322 requests correct relations6323 finds ProjectMembers with MemberFinder6324 when parent is a group6325 requests correct relations6326 finds GroupMembers with GroupMemberFinder6327MetricsReportMetricEntity6328 #as_json6329 contains the correct metric6330 when the metric did not change6331 does not expose previous_value6332 when the metric changed6333 exposes the previous_value6334Users::UpdateHighestMemberRoleService6335 #execute6336 with an EE-only access level6337 updates the highest access level6338Namespaces::FreeUserCap::NotificationAlertComponent6339 # order random6340 when user is not authorized to see alert6341 does not render the alert6342 when user is authorized to see alert6343 when over limit6344 has content for the notification alert6345 renders all the expected tracking items6346 when not over the limit6347 does not render the alert6348 when user does not exist6349 does not render the alert6350Groups::GroupLinks::DestroyService#execute6351 # order random6352 with multiple links6353 sends multiple audit events6354 with a single link6355 sends an audit event6356Geo::RepositoryBaseSyncService6357 #lease_key6358 returns a key in the correct pattern6359 #lease_timeout6360 returns a lease timeout value6361 #repository6362 raises a NotImplementedError6363 with a repository defined6364 #fetch_geo_mirror6365 delegates to repository#fetch_as_mirror6366 #clone_geo_mirror6367 delegates to repository#clone_as_mirror6368Admin::EmailsHelper6369 #send_emails_from_admin_area_feature_available?6370 when `send_emails_from_admin_area` feature is enabled6371 is expected to be truthy6372 when `send_emails_from_admin_area` feature is disabled6373 is expected to be falsey6374 when usage ping is enabled6375 when feature is activated6376 returns true6377 when feature is deactivated6378 returns false6379 #admin_emails_are_currently_rate_limited?6380 when the lease key exists6381 returns true6382 when the lease key does not exist6383 returns false6384 #admin_emails_rate_limit_ttl6385 when the lease key exists6386 returns the time remaining till the key expires6387 when the lease key does not exist6388 returns nil6389 #admin_emails_rate_limited_alert6390 when the lease key exists6391 returns the alert6392 when the lease key does not exist6393 returns empty string6394Mutations::IncidentManagement::OncallSchedule::Destroy6395 # order random6396 is expected to require graphql authorizations :admin_incident_management_oncall_schedule6397 #resolve6398 user has access to project6399 when OncallSchedules::DestroyService responds with success6400 returns the on-call schedule with no errors6401 when OncallSchedules::DestroyService responds with an error6402 returns errors6403 when resource is not accessible to the user6404 raises an error6405Analytics::CycleAnalytics::ReaggregationWorker6406 behaves like aggregator worker examples6407 invokes the AggregatorService6408 breaks at the second iteration due to overtime6409 behaves like an idempotent worker6410 is labeled as idempotent6411 performs multiple times sequentially without raising an exception6412 when the loaded batch is empty6413 does nothing6414Admin::IpRestrictionHelper6415 #ip_restriction_feature_available6416 when group_ip_restriction feature is available6417 is expected to be truthy6418 when group_ip_restriction feature is disabled6419 is expected to be falsey6420 when usage ping is enabled6421 when usage_ping_features is enabled6422 is expected to be truthy6423 when usage_ping_features is disabled6424 is expected to be falsey6425 when usage ping is disabled6426 is expected to be falsey6427Appearance6428 validations6429 is expected to allow :message_background_color to be ‹nil›6430 is expected to allow :message_background_color to be ‹"#000"›6431 is expected to allow :message_background_color to be ‹"#AABBCC"›6432 is expected not to allow :message_background_color to be ‹"000"›6433 is expected to allow :message_font_color to be ‹nil›6434 is expected to allow :message_font_color to be ‹"#000"›6435 is expected to allow :message_font_color to be ‹"#AABBCC"›6436 is expected not to allow :message_font_color to be ‹"000"›6437Operations routing routing6438 /-/operations6439 routes to the operations index action6440 routes to the operations create action6441 routes to operations destroy action6442 /-/operations/environments6443 routes to the environments list action6444 routes to the environments create action6445 routes to environments destroy action6446Geo::HashedStorageMigratedEvent6447 relationships6448 is expected to belong to project required: false6449 validations6450 is expected to validate that :project cannot be empty/falsy6451 is expected to validate that :repository_storage_name cannot be empty/falsy6452 is expected to validate that :old_disk_path cannot be empty/falsy6453 is expected to validate that :new_disk_path cannot be empty/falsy6454 is expected to validate that :old_wiki_disk_path cannot be empty/falsy6455 is expected to validate that :new_wiki_disk_path cannot be empty/falsy6456 is expected to validate that :new_storage_version cannot be empty/falsy6457Gitlab::Verify::Uploads6458 includes uploads in object storage6459Mutations::Boards::EpicBoards::Update6460 field tests6461 is expected to have graphql arguments :id, :name, :hideBacklogList, :hideClosedList, :labels, and :labelIds6462 is expected to have graphql fields :epic_board6463 with epic feature enabled6464 when user does not have permission to update epic board6465 behaves like epic board update error6466 raises error6467 when user has permission to update epic board6468 updates the epic board6469 #ready?6470 raises an error when both labels and label_ids arguments are passed6471EE::Ci::PipelineEditorHelper6472 #js_pipeline_editor_data6473 with licensed feature6474 returns ee specific values6475 without licensed feature6476 does not return the API fuzzing path6477subscriptions/buy_storage6478 behaves like buy storage addon form data6479 is expected to have visible css "#js-buy-storage[data-active-subscription-name='S-000000000']"6480 is expected to have visible css "#js-buy-storage[data-group-data='[{\"id\":\"storage_plan_id\",\"code\":\"storage\",\"price_per_year\":10.0}]']"6481 is expected to have visible css "#js-buy-storage[data-plan-id='storage_plan_id']"6482 is expected to have visible css "#js-buy-storage[data-namespace-id='2']"6483 is expected to have visible css "#js-buy-storage[data-source='some_source']"6484 is expected to have visible css "#js-buy-storage[data-redirect-after-success='/groups/my-group/-/usage_quotas#storage-quota-tab']"6485Ci::BuildPresenter6486 #callout_failure_message6487 returns a verbose failure reason6488 #retryable?6489 when the build exists in a pipeline for merge train6490 is expected to equal false6491 when the build does not exist in a pipeline for merge train6492 is expected to equal true6493Geo::ContainerRepositoryRegistryRemovalService6494 # order random6495 #execute6496 when the registry record exists6497 removes the container repository and the registry6498 when something went wrong removing the container repository6499 logs an error message6500 does not remove the upload registry record6501 when the registry record does not exist6502 removes the container repository6503Security::Configuration::SaveAutoFixService6504 #execute6505 with supported scanner type6506 returns success status6507 changes setting6508 with all scanners6509 returns success status6510 changes setting6511 with not supported scanner type6512 does not change setting6513Projects::Security::SastConfigurationHelper6514 #sast_configuration_data6515 is expected to eq {:project_path=>"namespace1058/project1129", :sast_analyzers_documentation_path=>"/help/user/applicat...configuration", :security_configuration_path=>"/namespace1058/project1129/-/security/configuration"}6516Users::Abuse::NamespaceBans::CreateService6517 when passing a root namespace6518 is expected to be success6519 when passing a nested namespace6520 returns an error response6521 when passing an already banned user6522 returns an error response6523Analytics::DevopsAdoption::SnapshotsFinder6524 #execute6525 with timespan provided6526 returns snapshots in given timespan6527 without timespan provided6528 returns all snapshots ordered by end_time6529UserPreference6530 roadmap_epics_state6531 when set to open epics6532 behaves like updates roadmap_epics_state6533 saves roadmap_epics_state in user_preference6534 when set to closed epics6535 behaves like updates roadmap_epics_state6536 saves roadmap_epics_state in user_preference6537 when reset to all epics6538 behaves like updates roadmap_epics_state6539 saves roadmap_epics_state in user_preference6540TrialStatusWidgetHelper6541 data attributes for mounting Vue components6542 #trial_status_popover_data_attrs6543 returns the needed data attributes for mounting the popover Vue component6544 #trial_status_widget_data_attrs6545 returns the needed data attributes for mounting the widget Vue component6546AuditEvents::ReleaseArtifactsDownloadedAuditEventService6547 #security_event6548 logs the event to file6549Gitlab::Audit::Levels::Instance6550 #apply6551 finds all events6552Elastic::MetricsUpdateService6553 #execute6554 sets gauges6555EE::SystemNoteMetadata6556 when action type is valid6557 is expected to be valid6558 when action type is valid6559 is expected to be valid6560 when action type is valid6561 is expected to be valid6562 when action type is valid6563 is expected to be valid6564Applications::CreateService6565 #audit_event_service6566 instance application6567 creates AuditEvent with correct entity type6568 group application6569 creates AuditEvent with correct entity type6570 user application6571 creates AuditEvent with correct entity type6572EE::Gitlab::Auth::Ldap::AccessLevels6573 #set6574 when access_levels is empty6575 is expected to eq {"uid=janedoe,ou=users,dc=example,dc=com"=>30, "uid=johndoe,ou=users,dc=example,dc=com"=>30}6576 when access_hash has existing entries6577 keeps the higher of all access values6578Projects::CustomBranchRule6579 # order random6580 #matching_branches_count6581 raises NotImplementedError6582 #name6583 raises NotImplementedError6584 #external_status_checks6585 raises NotImplementedError6586 #approval_project_rules?6587 raises NotImplementedError6588shared/web_hooks/_group_web_hook_disabled_alert6589 # order random6590 when the helper returns true6591 adds alert to `:after_flash_content`6592 when helper returns false6593 does not add alert to `:after_flash_content`6594Elastic::Latest::UserConfig6595 # order random6596 .settings6597 behaves like config settings return correct values6598 returns config6599 sets correct shard/replica settings6600 .index_name6601 includes6602 .mappings6603 returns config6604Geo::VerificationBatchWorker6605 uses a Geo queue6606 #perform6607 calls verify_batch6608 #remaining_work_count6609 returns remaining_verification_batch_count6610 #max_running_jobs6611 returns verification_max_capacity_per_replicator_class6612InstanceClusterablePresenter6613 #metrics_cluster_path6614 is expected to eq "/admin/clusters/9/metrics"6615Gitlab::Geo::LogCursor::Events::RepositoriesChangedEvent6616 #process6617 schedules a GeoRepositoryDestroyWorker when event node is the current node6618 does not schedule a GeoRepositoryDestroyWorker when event node is not the current node6619 behaves like logs event source info6620 logs `job_id` and `event_id6621Emails::DestroyService6622 #execute6623 registers a security event6624Gitlab::ImportExport::Group::GroupAndDescendantsRepoSaver6625 exports the group and subgroups wiki repo6626 if any of the wiki exports fails6627 returns false and stops exporting other groups6628admin/application_settings/_git_abuse_rate_limit6629 git abuse rate limit settings6630 when page loads6631 renders the settings app root6632 when data is saved in the database6633 renders the settings app root with pre-saved data6634Gitlab::Auth::Ldap::Config6635 .available_providers6636 when multiple LDAP servers are licensed6637 returns multiple configured providers6638 ._available_servers6639 when no database connection occurs6640 returns an empty array6641Types::Geo::TerraformStateVersionRegistryType6642 has the expected fields (other than those included in RegistryType)6643 behaves like a Geo registry type6644 is expected to require graphql authorizations :read_geo_registry6645 has the expected fields6646Elastic::ReindexingSubtask6647 relations6648 is expected to belong to elastic_reindexing_task required: false6649 validations6650 is expected to validate that :index_name_from cannot be empty/falsy6651 is expected to validate that :index_name_to cannot be empty/falsy6652Keys::CreateService6653 creates6654Types::PathLockType6655 is expected to eq "PathLock"6656 has the expected fields6657Epics::BaseService6658 # order random6659 #constructor_container_arg6660 is expected to eq {:group=>"some-value"}6661Gitlab::Bullet::Exclusions6662 #validate_paths!6663 validates paths for existence6664Types::HealthStatusEnum6665 is expected to eq "HealthStatus"6666 exposes all the existing health status values6667Projects::Security::ConfigurationController routing6668 to #show6669 to #auto_fix6670Gitlab::Ci::Reports::Metrics::Report6671 #add_metric6672 stores given metric6673 correctly stores metric params6674Gitlab::EventStore6675 .instance6676 returns a store with CE and EE subscriptions6677Types::ScannedResourceType6678 is expected to eq "ScannedResource"6679 has specific fields6680Gitlab::Ci::Reports::CoverageFuzzing::Report6681 #add_crash6682 stores given crash params in the map6683Types::Dast::ScanMethodTypeEnum6684 exposes all alert field names6685Types::BranchProtections::PushAccessLevelType6686 # order random6687 is expected to have graphql fields :access_level, :access_level_description, :user, and :group6688GemExtensions::Elasticsearch::Model::Indexing::InstanceMethods6689 #index_document6690 overrides _id6691Milestone6692 Associations6693 is expected to have many boards6694Gitlab::Email::FeatureFlagWrapper6695 # order random6696 #flipper_id6697 returns a string containing the email6698Security::VulnerabilityReportDataSerializer6699 represents VulnerabilityReportDataEntity6700Types::VulnerabilityDetails::BaseType6701 is expected to have graphql fields :name, :description, and :fieldName6702Knapsack report was generated. Preview:6703{6704 "ee/spec/services/ee/notification_service_spec.rb": 276.4010590590001,6705 "ee/spec/lib/gitlab/insights/finders/issuable_finder_spec.rb": 184.67905223199978,6706 "ee/spec/policies/group_policy_spec.rb": 111.07711402899986,6707 "ee/spec/models/geo/merge_request_diff_registry_spec.rb": 76.48267959299983,6708 "ee/spec/tasks/gitlab/seed/group_seed_rake_spec.rb": 52.62227069900018,6709 "ee/spec/services/projects/update_mirror_service_spec.rb": 73.02104566200023,6710 "ee/spec/services/projects/update_service_spec.rb": 59.13108350600032,6711 "ee/spec/lib/ee/gitlab/middleware/read_only_spec.rb": 55.01300968099986,6712 "ee/spec/policies/epic_policy_spec.rb": 31.24845795200008,6713 "ee/spec/services/epics/issue_promote_service_spec.rb": 32.46374997900011,6714 "ee/spec/services/ee/notes/quick_actions_service_spec.rb": 36.787666071999865,6715 "ee/spec/models/vulnerabilities/stat_diff_spec.rb": 23.08580423000012,6716 "ee/spec/models/namespaces/storage/root_size_spec.rb": 15.706054679999852,6717 "ee/spec/services/todo_service_spec.rb": 21.81990680600029,6718 "ee/spec/services/approval_rules/params_filtering_service_spec.rb": 24.76921517200026,6719 "ee/spec/elastic/migrate/20220825102900_backfill_label_ids_for_issues_spec.rb": 26.454743014000087,6720 "ee/spec/services/vulnerability_external_issue_links/create_service_spec.rb": 18.70448505799959,6721 "ee/spec/services/security/sync_license_scanning_rules_service_spec.rb": 15.762230657000146,6722 "ee/spec/graphql/resolvers/requirements_management/requirements_resolver_spec.rb": 15.894766259000335,6723 "ee/spec/lib/gitlab/analytics/cycle_analytics/summary/stage_time_summary_spec.rb": 13.32308136499978,6724 "ee/spec/models/ee/audit_event_spec.rb": 10.429568119000123,6725 "ee/spec/services/vulnerabilities/finding_dismiss_service_spec.rb": 13.515797415999714,6726 "ee/spec/policies/global_policy_spec.rb": 3.7483205929997894,6727 "ee/spec/models/dast/profile_spec.rb": 9.130207049999626,6728 "ee/spec/models/slack_integration_spec.rb": 9.402888627000266,6729 "ee/spec/lib/gitlab/geo/log_cursor/events/design_repository_updated_event_spec.rb": 10.144847084000048,6730 "ee/spec/graphql/resolvers/geo/pipeline_artifact_registries_resolver_spec.rb": 14.529662610999821,6731 "ee/spec/lib/gitlab/licenses/submit_license_usage_data_banner_spec.rb": 10.904145324999718,6732 "ee/spec/services/security/findings/dismiss_service_spec.rb": 9.922009818999868,6733 "ee/spec/models/project_ci_cd_setting_spec.rb": 9.278967699999612,6734 "ee/spec/graphql/resolvers/vulnerabilities_resolver_spec.rb": 7.532181572999889,6735 "ee/spec/services/groups/destroy_service_spec.rb": 6.070160737000151,6736 "ee/spec/services/ee/members/update_service_spec.rb": 8.135835823999969,6737 "ee/spec/lib/ee/gitlab/checks/push_rules/branch_check_spec.rb": 9.590610260000176,6738 "ee/spec/workers/elastic_delete_project_worker_spec.rb": 12.358711550999942,6739 "ee/spec/models/packages/package_file_spec.rb": 7.198383084999932,6740 "ee/spec/services/security/security_orchestration_policies/policy_commit_service_spec.rb": 8.069740007999826,6741 "ee/spec/services/app_sec/dast/profiles/create_service_spec.rb": 4.073128257000008,6742 "ee/spec/lib/gitlab/ci/minutes/runners_availability_spec.rb": 5.577011015000153,6743 "ee/spec/workers/sync_seat_link_request_worker_spec.rb": 5.262638118999803,6744 "ee/spec/services/security/store_scan_service_spec.rb": 5.596981795999909,6745 "ee/spec/helpers/ee/personal_access_tokens_helper_spec.rb": 1.757716932999756,6746 "ee/spec/helpers/groups/security_features_helper_spec.rb": 4.988287477000085,6747 "ee/spec/graphql/mutations/projects/set_locked_spec.rb": 4.485777481000241,6748 "ee/spec/services/security/ingestion/tasks/ingest_finding_signatures_spec.rb": 5.309086155999921,6749 "ee/spec/services/geo/metrics_update_service_spec.rb": 5.22722990200009,6750 "ee/spec/elastic_integration/repository_index_spec.rb": 7.843641587000093,6751 "ee/spec/lib/ee/gitlab/group_search_results_spec.rb": 6.164826609000102,6752 "ee/spec/policies/saml_provider_policy_spec.rb": 2.147624706999977,6753 "ee/spec/services/security/ingestion/tasks/ingest_finding_identifiers_spec.rb": 5.973223341999983,6754 "ee/spec/finders/template_finder_spec.rb": 2.9577102829998694,6755 "ee/spec/workers/ee/repository_check/batch_worker_spec.rb": 4.287465914000222,6756 "ee/spec/models/projects/all_protected_branches_rule_spec.rb": 1.9893963869999425,6757 "ee/spec/graphql/resolvers/geo/dependency_proxy_blob_registries_resolver_spec.rb": 4.367782179000187,6758 "ee/spec/workers/project_template_export_worker_spec.rb": 3.992908013000033,6759 "ee/spec/graphql/resolvers/user_notes_count_resolver_spec.rb": 3.8578599829997984,6760 "ee/spec/lib/gitlab/ci/reports/security/locations/cluster_image_scanning_spec.rb": 0.9544366259997332,6761 "ee/spec/services/merge_requests/capture_suggested_reviewers_accepted_service_spec.rb": 1.7190091749998828,6762 "ee/spec/lib/gitlab/ci/pipeline/chain/limit/activity_spec.rb": 2.7025098889998844,6763 "ee/spec/services/boards/epics/create_service_spec.rb": 3.027348718000212,6764 "ee/spec/services/groups/mark_for_deletion_service_spec.rb": 3.6750958550001087,6765 "ee/spec/services/ee/members/invite_service_spec.rb": 3.5678637820001313,6766 "ee/spec/services/ci/process_pipeline_service_spec.rb": 4.6608633089999785,6767 "ee/spec/lib/gitlab/license_scanning_spec.rb": 3.1059896130000197,6768 "ee/spec/lib/gitlab/mirror_spec.rb": 1.1392884540000523,6769 "ee/spec/services/app_sec/dast/scanner_profiles/destroy_service_spec.rb": 2.7058259300001737,6770 "ee/spec/services/ee/post_receive_service_spec.rb": 2.592941186999724,6771 "ee/spec/graphql/types/vulnerability_detail_type_spec.rb": 1.2958086829999047,6772 "ee/spec/models/incident_management/pending_escalations/alert_spec.rb": 2.115667759000189,6773 "ee/spec/services/audit_events/build_service_spec.rb": 1.44157343400002,6774 "ee/spec/graphql/types/dast_scanner_profile_type_spec.rb": 2.1899308440001732,6775 "ee/spec/finders/approval_rules/group_finder_spec.rb": 2.2408902500001204,6776 "ee/spec/lib/ee/gitlab/usage_data_counters/issue_activity_unique_counter_spec.rb": 1.351958459999878,6777 "ee/spec/workers/namespaces/sync_namespace_name_worker_spec.rb": 0.6785874750003131,6778 "ee/spec/lib/system_check/geo/current_node_check_spec.rb": 0.8792484619998504,6779 "ee/spec/views/vulnerabilities/issue_description.md_spec.rb": 1.5170240180000292,6780 "ee/spec/services/projects/after_rename_service_spec.rb": 3.0592935459999353,6781 "ee/spec/lib/elastic/multi_version_instance_proxy_spec.rb": 2.7193694789998517,6782 "ee/spec/lib/elastic/latest/user_instance_proxy_spec.rb": 2.599714916999801,6783 "ee/spec/services/namespaces/free_user_cap/notify_over_limit_service_spec.rb": 2.0284413740000673,6784 "ee/spec/lib/gitlab/geo/oauth/session_spec.rb": 2.8624478790002286,6785 "ee/spec/services/projects/deregister_suggested_reviewers_project_service_spec.rb": 1.526436379000188,6786 "ee/spec/models/dast/profiles_pipeline_spec.rb": 3.126865021999947,6787 "ee/spec/finders/incident_management/escalation_rules_finder_spec.rb": 1.7700368720002189,6788 "ee/spec/workers/elastic_index_bulk_cron_worker_spec.rb": 0.9941687430000457,6789 "ee/spec/lib/gitlab/usage/metrics/instrumentations/count_external_status_checks_metric_spec.rb": 2.8174670920002427,6790 "ee/spec/workers/gitlab_subscriptions/refresh_seats_worker_spec.rb": 2.0968343899999127,6791 "ee/spec/graphql/types/asset_type_spec.rb": 1.8857358740001473,6792 "ee/spec/models/vulnerabilities/finding_link_spec.rb": 1.3948730269999032,6793 "ee/spec/models/dast/pre_scan_verification_step_spec.rb": 1.0160522020000826,6794 "ee/spec/serializers/ee/issue_entity_spec.rb": 1.37555238799996,6795 "ee/spec/services/vulnerabilities/statistics/update_service_spec.rb": 1.249159637000048,6796 "ee/spec/lib/gitlab/sidekiq_config_spec.rb": 1.0520463590000873,6797 "ee/spec/services/users/captcha_challenge_service_spec.rb": 0.8019950660000177,6798 "ee/spec/services/projects/import_service_spec.rb": 1.542846667000049,6799 "ee/spec/services/projects/setup_ci_cd_spec.rb": 1.920965262000209,6800 "ee/spec/services/users_ops_dashboard_projects/destroy_service_spec.rb": 2.260065579000184,6801 "ee/spec/finders/security/approval_groups_finder_spec.rb": 2.4340134379999654,6802 "ee/spec/services/app_sec/fuzzing/coverage/corpuses/create_service_spec.rb": 1.6283757420001166,6803 "ee/spec/workers/deployments/approval_worker_spec.rb": 2.0399980239999422,6804 "ee/spec/services/security/scanned_resources_service_spec.rb": 1.978390257999763,6805 "ee/spec/services/namespaces/in_product_marketing_emails_service_spec.rb": 1.6789810290001697,6806 "ee/spec/lib/elastic/latest/custom_language_analyzers_spec.rb": 0.9125321589999658,6807 "ee/spec/views/clusters/clusters/show.html.haml_spec.rb": 2.051662612999735,6808 "ee/spec/graphql/types/sbom/dependency_type_spec.rb": 0.6307945879998442,6809 "ee/spec/finders/dast_scanner_profiles_finder_spec.rb": 1.584322193999924,6810 "ee/spec/workers/search/project_index_integrity_worker_spec.rb": 1.3161378119998517,6811 "ee/spec/lib/gitlab/ci/templates/dast_runner_validation_gitlab_ci_yaml_spec.rb": 1.723049264999645,6812 "ee/spec/workers/active_user_count_threshold_worker_spec.rb": 1.2457423670002754,6813 "ee/spec/lib/ee/sidebars/your_work/menus/security_dashboard_menu_spec.rb": 0.9867134639998767,6814 "ee/spec/serializers/ee/group_child_entity_spec.rb": 1.72738626499995,6815 "ee/spec/lib/ee/api/helpers/issues_helpers_spec.rb": 1.872974885000076,6816 "ee/spec/lib/bulk_imports/projects/pipelines/push_rule_pipeline_spec.rb": 1.052885630000219,6817 "ee/spec/workers/ldap_all_groups_sync_worker_spec.rb": 0.3633488160003253,6818 "ee/spec/finders/boards/users_finder_spec.rb": 1.7560550930002137,6819 "ee/spec/serializers/metrics_report_metric_entity_spec.rb": 0.4821410280001146,6820 "ee/spec/services/users/update_highest_member_role_service_spec.rb": 0.437912451000102,6821 "ee/spec/components/namespaces/free_user_cap/notification_alert_component_spec.rb": 1.1733024610002758,6822 "ee/spec/services/ee/groups/group_links/destroy_service_spec.rb": 1.4359542239999428,6823 "ee/spec/services/geo/repository_base_sync_service_spec.rb": 0.8598014929998499,6824 "ee/spec/helpers/admin/emails_helper_spec.rb": 1.1883747309998398,6825 "ee/spec/graphql/mutations/incident_management/oncall_schedule/destroy_spec.rb": 1.316542242000196,6826 "ee/spec/workers/analytics/cycle_analytics/reaggregation_worker_spec.rb": 0.9999998430002961,6827 "ee/spec/helpers/admin/ip_restriction_helper_spec.rb": 1.1619531320002352,6828 "ee/spec/models/ee/appearance_spec.rb": 0.69910258300024,6829 "ee/spec/routing/operations_routing_spec.rb": 0.5834422709999671,6830 "ee/spec/models/geo/hashed_storage_migrated_event_spec.rb": 0.8008415560002504,6831 "ee/spec/lib/ee/gitlab/verify/uploads_spec.rb": 1.1608169430000999,6832 "ee/spec/graphql/mutations/boards/epic_boards/update_spec.rb": 0.9112285189999056,6833 "ee/spec/helpers/ee/ci/pipeline_editor_helper_spec.rb": 1.106616135999957,6834 "ee/spec/views/subscriptions/buy_storage.html.haml_spec.rb": 0.8970011100000193,6835 "ee/spec/presenters/ci/build_presenter_spec.rb": 0.9112544700001308,6836 "ee/spec/services/geo/container_repository_registry_removal_service_spec.rb": 1.0275873110003886,6837 "ee/spec/services/security/configuration/save_auto_fix_service_spec.rb": 0.7803954679998242,6838 "ee/spec/helpers/ee/projects/security/sast_configuration_helper_spec.rb": 0.5988494100001844,6839 "ee/spec/services/users/abuse/namespace_bans/create_service_spec.rb": 0.9262443380002878,6840 "ee/spec/finders/analytics/devops_adoption/snapshots_finder_spec.rb": 0.6455021570000099,6841 "ee/spec/models/user_preference_spec.rb": 0.7466131699998186,6842 "ee/spec/helpers/trial_status_widget_helper_spec.rb": 0.9496563170000627,6843 "ee/spec/services/audit_events/release_artifacts_downloaded_audit_event_service_spec.rb": 1.1178704949998064,6844 "ee/spec/lib/gitlab/audit/levels/instance_spec.rb": 0.8183428249999452,6845 "ee/spec/services/elastic/metrics_update_service_spec.rb": 0.881404572000065,6846 "ee/spec/models/ee/system_note_metadata_spec.rb": 0.513867184999981,6847 "ee/spec/services/applications/create_service_spec.rb": 0.6014918099999704,6848 "ee/spec/lib/ee/gitlab/auth/ldap/access_levels_spec.rb": 0.5111259860000246,6849 "ee/spec/models/concerns/projects/custom_branch_rule_spec.rb": 0.4876309270002821,6850 "ee/spec/views/shared/web_hooks/_group_web_hook_disabled_alert.html.haml_spec.rb": 0.4751440290001483,6851 "ee/spec/lib/elastic/latest/user_config_spec.rb": 0.4960773180000615,6852 "ee/spec/workers/geo/verification_batch_worker_spec.rb": 0.500186617000054,6853 "ee/spec/presenters/ee/instance_clusterable_presenter_spec.rb": 0.9223091590001786,6854 "ee/spec/lib/gitlab/geo/log_cursor/events/repositories_changed_event_spec.rb": 0.6295463379997273,6855 "ee/spec/services/emails/destroy_service_spec.rb": 0.5616979229998833,6856 "ee/spec/lib/gitlab/import_export/group/group_and_descendants_repo_saver_spec.rb": 0.5207543550000082,6857 "ee/spec/views/admin/application_settings/_git_abuse_rate_limit.html.haml_spec.rb": 0.5027276159999019,6858 "ee/spec/lib/ee/gitlab/auth/ldap/config_spec.rb": 0.526405794999846,6859 "ee/spec/graphql/types/geo/terraform_state_version_registry_type_spec.rb": 0.41815658199993777,6860 "ee/spec/models/elastic/reindexing_subtask_spec.rb": 0.4287387109998235,6861 "ee/spec/services/keys/create_service_spec.rb": 0.8507320230000914,6862 "ee/spec/graphql/types/path_lock_type_spec.rb": 0.35308152700008577,6863 "ee/spec/services/epics/base_service_spec.rb": 0.7298766009998872,6864 "ee/spec/lib/gitlab/bullet/exclusions_spec.rb": 0.43314170100029514,6865 "ee/spec/graphql/types/health_status_enum_spec.rb": 0.33770839699991484,6866 "ee/spec/routing/projects/security/configuration_controller_routing_spec.rb": 0.5623028429999977,6867 "ee/spec/lib/gitlab/ci/reports/metrics/report_spec.rb": 0.4224731019999126,6868 "ee/spec/lib/ee/gitlab/event_store_spec.rb": 0.5900775299996894,6869 "ee/spec/graphql/types/scanned_resource_type_spec.rb": 0.4657644290000462,6870 "ee/spec/lib/gitlab/ci/reports/coverage_fuzzing/report_spec.rb": 0.3588951960000486,6871 "ee/spec/graphql/types/dast/scan_method_type_enum_spec.rb": 0.400360653000007,6872 "ee/spec/graphql/ee/types/branch_protections/push_access_level_type_spec.rb": 0.32087179800009835,6873 "ee/spec/lib/gem_extensions/elasticsearch/model/indexing/instance_methods_spec.rb": 0.538763223999922,6874 "ee/spec/models/milestone_spec.rb": 0.3173282890002156,6875 "ee/spec/lib/gitlab/email/feature_flag_wrapper_spec.rb": 0.3593375959999321,6876 "ee/spec/serializers/security/vulnerability_report_data_serializer_spec.rb": 0.5524056630001724,6877 "ee/spec/graphql/types/vulnerability_details/base_type_spec.rb": 0.57500790199992486878}6879Knapsack global time execution for tests: 26m 01s6880Pending: (Failures listed here are expected and do not affect your suite's status)6881 1) Resolvers::Geo::PipelineArtifactRegistriesResolver behaves like a Geo registries resolver #resolve when the parent object is the current node when the user has permission to view Geo data when admin mode is enabled with verification disabled when the verification_state argument is present raises ArgumentError6882 # Skipping because verification is enabled for Ci::PipelineArtifact6883 # ./ee/spec/support/shared_examples/graphql/geo/geo_registries_resolver_shared_examples.rb:776884 2) Resolvers::Geo::DependencyProxyBlobRegistriesResolver behaves like a Geo registries resolver #resolve when the parent object is the current node when the user has permission to view Geo data when admin mode is enabled with verification disabled when the verification_state argument is present raises ArgumentError6885 # Skipping because verification is enabled for DependencyProxy::Blob6886 # ./ee/spec/support/shared_examples/graphql/geo/geo_registries_resolver_shared_examples.rb:776887Failures:6888 1) Notes::QuickActionsService /assign_reviewer with a merge request behaves like assigns one or more reviewers to the merge request adds multiple reviewers from the list6889 Failure/Error: example.run6890 expected: "Assigned @user716 and @user723 as reviewers."6891 got: "Assigned @user723 and @user716 as reviewers."6892 (compared using ==)6893 Shared Example Group: "assigns one or more reviewers to the merge request" called from ./ee/spec/services/ee/notes/quick_actions_service_spec.rb:3626894 # ./ee/spec/support/shared_examples/quick_actions/merge_request/assign_reviewer_shared_examples.rb:14:in `block (2 levels) in <top (required)>'6895 # ./spec/spec_helper.rb:432:in `block (3 levels) in <top (required)>'6896 # ./spec/support/sidekiq_middleware.rb:18:in `with_sidekiq_server_middleware'6897 # ./spec/spec_helper.rb:424:in `block (2 levels) in <top (required)>'6898 # ./spec/spec_helper.rb:420:in `block (3 levels) in <top (required)>'6899 # ./lib/gitlab/application_context.rb:61:in `with_raw_context'6900 # ./spec/spec_helper.rb:420:in `block (2 levels) in <top (required)>'6901 # ./spec/spec_helper.rb:241:in `block (2 levels) in <top (required)>'6902 # ./spec/support/system_exit_detected.rb:7:in `block (2 levels) in <top (required)>'6903 # ./spec/support/database/prevent_cross_joins.rb:108:in `block (3 levels) in <top (required)>'6904 # ./spec/support/database/prevent_cross_joins.rb:62:in `with_cross_joins_prevented'6905 # ./spec/support/database/prevent_cross_joins.rb:108:in `block (2 levels) in <top (required)>'6906 2) Notes::QuickActionsService /assign Issue assignees adds multiple assignees from the list6907 Failure/Error: expect(message).to eq("Assigned @#{assignee.username} and @#{user.username}.")6908 expected: "Assigned @user715 and @user726."6909 got: "Assigned @user726 and @user715."6910 (compared using ==)6911 # ./ee/spec/services/ee/notes/quick_actions_service_spec.rb:390:in `block (4 levels) in <top (required)>'6912 # ./spec/spec_helper.rb:432:in `block (3 levels) in <top (required)>'6913 # ./spec/support/sidekiq_middleware.rb:18:in `with_sidekiq_server_middleware'6914 # ./spec/spec_helper.rb:424:in `block (2 levels) in <top (required)>'6915 # ./spec/spec_helper.rb:420:in `block (3 levels) in <top (required)>'6916 # ./lib/gitlab/application_context.rb:61:in `with_raw_context'6917 # ./spec/spec_helper.rb:420:in `block (2 levels) in <top (required)>'6918 # ./spec/spec_helper.rb:241:in `block (2 levels) in <top (required)>'6919 # ./spec/support/system_exit_detected.rb:7:in `block (2 levels) in <top (required)>'6920 # ./spec/support/database/prevent_cross_joins.rb:108:in `block (3 levels) in <top (required)>'6921 # ./spec/support/database/prevent_cross_joins.rb:62:in `with_cross_joins_prevented'6922 # ./spec/support/database/prevent_cross_joins.rb:108:in `block (2 levels) in <top (required)>'6923 3) Notes::QuickActionsService /assign Issue assignees behaves like assigning an already assigned user adds multiple assignees from the list6924 Failure/Error: example.run6925 expected: "Assigned @user715 and @user728."6926 got: "Assigned @user728 and @user715."6927 (compared using ==)6928 Shared Example Group: "assigning an already assigned user" called from ./ee/spec/services/ee/notes/quick_actions_service_spec.rb:3946929 # ./ee/spec/support/shared_examples/quick_actions/issuable/assign_shared_examples.rb:12:in `block (2 levels) in <top (required)>'6930 # ./spec/spec_helper.rb:432:in `block (3 levels) in <top (required)>'6931 # ./spec/support/sidekiq_middleware.rb:18:in `with_sidekiq_server_middleware'6932 # ./spec/spec_helper.rb:424:in `block (2 levels) in <top (required)>'6933 # ./spec/spec_helper.rb:420:in `block (3 levels) in <top (required)>'6934 # ./lib/gitlab/application_context.rb:61:in `with_raw_context'6935 # ./spec/spec_helper.rb:420:in `block (2 levels) in <top (required)>'6936 # ./spec/spec_helper.rb:241:in `block (2 levels) in <top (required)>'6937 # ./spec/support/system_exit_detected.rb:7:in `block (2 levels) in <top (required)>'6938 # ./spec/support/database/prevent_cross_joins.rb:108:in `block (3 levels) in <top (required)>'6939 # ./spec/support/database/prevent_cross_joins.rb:62:in `with_cross_joins_prevented'6940 # ./spec/support/database/prevent_cross_joins.rb:108:in `block (2 levels) in <top (required)>'6941 4) Notes::QuickActionsService /assign MergeRequest behaves like assigning an already assigned user adds multiple assignees from the list6942 Failure/Error: example.run6943 expected: "Assigned @user715 and @user731."6944 got: "Assigned @user731 and @user715."6945 (compared using ==)6946 Shared Example Group: "assigning an already assigned user" called from ./ee/spec/services/ee/notes/quick_actions_service_spec.rb:4076947 # ./ee/spec/support/shared_examples/quick_actions/issuable/assign_shared_examples.rb:12:in `block (2 levels) in <top (required)>'6948 # ./spec/spec_helper.rb:432:in `block (3 levels) in <top (required)>'6949 # ./spec/support/sidekiq_middleware.rb:18:in `with_sidekiq_server_middleware'6950 # ./spec/spec_helper.rb:424:in `block (2 levels) in <top (required)>'6951 # ./spec/spec_helper.rb:420:in `block (3 levels) in <top (required)>'6952 # ./lib/gitlab/application_context.rb:61:in `with_raw_context'6953 # ./spec/spec_helper.rb:420:in `block (2 levels) in <top (required)>'6954 # ./spec/spec_helper.rb:241:in `block (2 levels) in <top (required)>'6955 # ./spec/support/system_exit_detected.rb:7:in `block (2 levels) in <top (required)>'6956 # ./spec/support/database/prevent_cross_joins.rb:108:in `block (3 levels) in <top (required)>'6957 # ./spec/support/database/prevent_cross_joins.rb:62:in `with_cross_joins_prevented'6958 # ./spec/support/database/prevent_cross_joins.rb:108:in `block (2 levels) in <top (required)>'6959 5) SystemCheck::Geo::CurrentNodeCheck.check_pass outputs additional helpful info6960 Failure/Error: expect(described_class.check_pass).to eq('yes, found a primary node named "Foo"')6961 expected: "yes, found a primary node named \"Foo\""6962 got: "yes, found a secondary node named \"Foo\""6963 (compared using ==)6964 # ./ee/spec/lib/system_check/geo/current_node_check_spec.rb:29:in `block (3 levels) in <top (required)>'6965 # ./spec/spec_helper.rb:432:in `block (3 levels) in <top (required)>'6966 # ./spec/support/sidekiq_middleware.rb:18:in `with_sidekiq_server_middleware'6967 # ./spec/spec_helper.rb:424:in `block (2 levels) in <top (required)>'6968 # ./spec/spec_helper.rb:420:in `block (3 levels) in <top (required)>'6969 # ./lib/gitlab/application_context.rb:61:in `with_raw_context'6970 # ./spec/spec_helper.rb:420:in `block (2 levels) in <top (required)>'6971 # ./spec/spec_helper.rb:241:in `block (2 levels) in <top (required)>'6972 # ./spec/support/system_exit_detected.rb:7:in `block (2 levels) in <top (required)>'6973 # ./spec/support/database/prevent_cross_joins.rb:108:in `block (3 levels) in <top (required)>'6974 # ./spec/support/database/prevent_cross_joins.rb:62:in `with_cross_joins_prevented'6975 # ./spec/support/database/prevent_cross_joins.rb:108:in `block (2 levels) in <top (required)>'6976Finished in 26 minutes 6 seconds (files took 1 minute 21.62 seconds to load)69772563 examples, 5 failures, 2 pending6978Failed examples:6979rspec ./ee/spec/services/ee/notes/quick_actions_service_spec.rb:362 # Notes::QuickActionsService /assign_reviewer with a merge request behaves like assigns one or more reviewers to the merge request adds multiple reviewers from the list6980rspec ./ee/spec/services/ee/notes/quick_actions_service_spec.rb:386 # Notes::QuickActionsService /assign Issue assignees adds multiple assignees from the list6981rspec ./ee/spec/services/ee/notes/quick_actions_service_spec.rb:394 # Notes::QuickActionsService /assign Issue assignees behaves like assigning an already assigned user adds multiple assignees from the list6982rspec ./ee/spec/services/ee/notes/quick_actions_service_spec.rb:407 # Notes::QuickActionsService /assign MergeRequest behaves like assigning an already assigned user adds multiple assignees from the list6983rspec ./ee/spec/lib/system_check/geo/current_node_check_spec.rb:25 # SystemCheck::Geo::CurrentNodeCheck.check_pass outputs additional helpful info6984Randomized with seed 625316985[TEST PROF INFO] Time spent in factories: 14:06.635 (52.83% of total time)6986Stopped processing SimpleCov as a previous error not related to SimpleCov has been detected6987RSpec exited with 1.6988RETRIED_TESTS_REPORT_PATH: rspec/flaky/retried_tests_rspec-ee_unit_pg13_16_18_report.txt6989Retrying the failing examples in a new RSpec process...6990$ gem install junit_merge --no-document --version 0.1.26991Successfully installed nokogiri-1.14.3-x86_64-linux6992Successfully installed junit_merge-0.1.269932 gems installed6994==> 'gem install junit_merge --no-document --version 0.1.2' succeeded in 0 seconds.6995Running RSpec command: bin/rspec -Ispec -rspec_helper --color --failure-exit-code 1 --error-exit-code 2 --format documentation --format RspecJunitFormatter --out rspec/junit_rspec-retry.xml --only-failures --pattern "{ee/}spec/{bin,channels,components,config,contracts,db,dependencies,elastic,elastic_integration,experiments,factories,finders,frontend,graphql,haml_lint,helpers,initializers,lib,metrics_server,models,policies,presenters,rack_servers,replicators,routing,rubocop,scripts,serializers,services,sidekiq,sidekiq_cluster,spam,support_specs,tasks,uploaders,validators,views,workers,tooling}{,/**/}*_spec.rb"6996warning: parser/current is loading parser/ruby30, which recognizes 3.0.5-compliant syntax, but you are running 3.0.6.6998Run options: include {:last_run_status=>"failed"}6999Test environment set up in 0.531659144 seconds7000SystemCheck::Geo::CurrentNodeCheck7001 .check_pass7002 outputs additional helpful info7003Notes::QuickActionsService7004 /assign_reviewer7005 with a merge request7006 behaves like assigns one or more reviewers to the merge request7007 adds multiple reviewers from the list7008 /assign7009 Issue assignees7010 adds multiple assignees from the list7011 behaves like assigning an already assigned user7012 adds multiple assignees from the list7013 MergeRequest7014 behaves like assigning an already assigned user7015 adds multiple assignees from the list7016Finished in 10.93 seconds (files took 44.64 seconds to load)70175 examples, 0 failures7018[TEST PROF INFO] Time spent in factories: 00:03.663 (27.45% of total time)7019A test was flaky and succeeded after being retried. Checking to see if flaky test is part of this MR...7020Flaky test was not part of this MR.7022Not uploading cache ruby-gems-debian-bullseye-ruby-3.0-16 due to policy7023Not uploading cache gitaly-ruby-gems-debian-bullseye-ruby-3.0-16 due to policy7025Uploading artifacts...7026coverage/: found 4 matching artifact files and directories 7027crystalball/: found 2 matching artifact files and directories 7028WARNING: deprecations/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab) 7029knapsack/: found 3 matching artifact files and directories 7030WARNING: query_recorder/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab) 7031rspec/: found 16 matching artifact files and directories 7032WARNING: tmp/capybara/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab) 7033log/*.log: found 20 matching artifact files and directories 7034WARNING: Upload request redirected location=https://gitlab.com/api/v4/jobs/4101395019/artifacts?artifact_format=zip&artifact_type=archive&expire_in=31d new-url=https://gitlab.com7035WARNING: Retrying... context=artifacts-uploader error=request redirected7036Uploading artifacts as "archive" to coordinator... 201 Created id=4101395019 responseStatus=201 Created token=64_f488r7037Uploading artifacts...7038rspec/junit_rspec.xml: found 1 matching artifact files and directories 7039WARNING: Upload request redirected location=https://gitlab.com/api/v4/jobs/4101395019/artifacts?artifact_format=gzip&artifact_type=junit&expire_in=31d new-url=https://gitlab.com7040WARNING: Retrying... context=artifacts-uploader error=request redirected7041Uploading artifacts as "junit" to coordinator... 201 Created id=4101395019 responseStatus=201 Created token=64_f488r7043Job succeeded