rspec-ee integration pg13 6/6
Passed Started
by
@ohoral
Olena Horal-Koretska
1Running with gitlab-runner 15.9.0~beta.212.g8ccc65e7 (8ccc65e7)2 on green-4.private.runners-manager.gitlab.com/gitlab.com/gitlab-org rpvz2FF9, system ID: s_d704414ba02a3 feature flags: FF_NETWORK_PER_BUILD:true, FF_USE_FASTZIP:true, FF_USE_IMPROVED_URL_MASKING:true6Using Docker executor with image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.19-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 ...7Starting service registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-13-pgvector-0.4.1 ...8Authenticating with credentials from job payload (GitLab Registry)9Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-13-pgvector-0.4.1 ...10Using docker image sha256:b643610fd4d2fbdd55447ceb5a6cba0c3d1a26945817741d73e1b51a1ec07d01 for registry.gitlab.com/gitlab-org/gitlab-build-images:postgres-13-pgvector-0.4.1 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:dfccb5b5ddadf4f1a3b9cb72cf21f5b99a28a55c217de34d9fa6b7a45a910031 ...11Starting service redis:6.2-alpine ...12Pulling docker image redis:6.2-alpine ...13Using docker image sha256:a9a47a706682d445577bb5da7328f0faaa0863a5742a315c829faa461dfc23ae for redis:6.2-alpine with digest redis@sha256:317575f05099ea47b1f2855b1bb6e068b52847bfa19b87014d88d57f82d4b8f0 ...14Starting service elasticsearch:7.17.6 ...15Pulling docker image elasticsearch:7.17.6 ...16Using docker image sha256:5fad10241ffd65d817ed0ddfaf6e87eee1f7dc2a7db33db1047835560ea71fda for elasticsearch:7.17.6 with digest elasticsearch@sha256:6c128de5d01c0c130a806022d6bd99b3e4c27a9af5bfc33b6b81861ae117d028 ...17WARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 is already created. Ignoring.18WARNING: Service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 is already created. Ignoring.19Starting service registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 ...20Authenticating with credentials from job payload (GitLab Registry)21Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 ...22Using docker image sha256:4777ec1fa89def7d692d4979d05cb05234df25da1c6a3f67a564a433ec5ba1c8 for registry.gitlab.com/gitlab-org/gitlab-build-images:zoekt-ci-image-1.0 with digest registry.gitlab.com/gitlab-org/gitlab-build-images@sha256:80c0cee4566aefe4f1f287e1091263e08b0ebc41ed3dc4e76930df3634ccb9aa ...23Waiting for services to be up and running (timeout 30 seconds)...24*** WARNING: Service runner-rpvz2ff9-project-278964-concurrent-0-8392d60ed0689af0-elasticsearch-2 probably didn't start properly.25Health check error:26service "runner-rpvz2ff9-project-278964-concurrent-0-8392d60ed0689af0-elasticsearch-2-wait-for-service" timeout27Health check container logs:28Service container logs:292023-04-26T10:22:50.367796291Z {"type": "server", "timestamp": "2023-04-26T10:22:50,361Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "version[7.17.6], pid[8], build[default/docker/f65e9d338dc1d07b642e14a27f338990148ee5b6/2022-08-23T11:08:48.893373482Z], OS[Linux/5.4.109+/amd64], JVM[Oracle Corporation/OpenJDK 64-Bit Server VM/18.0.2/18.0.2+9-61]" }302023-04-26T10:22:50.368450911Z {"type": "server", "timestamp": "2023-04-26T10:22:50,367Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "JVM home [/usr/share/elasticsearch/jdk], using bundled JDK [true]" }312023-04-26T10:22:50.369173881Z {"type": "server", "timestamp": "2023-04-26T10:22:50,368Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "JVM arguments [-Xshare:auto, -Des.networkaddress.cache.ttl=60, -Des.networkaddress.cache.negative.ttl=10, -XX:+AlwaysPreTouch, -Xss1m, -Djava.awt.headless=true, -Dfile.encoding=UTF-8, -Djna.nosys=true, -XX:-OmitStackTraceInFastThrow, -XX:+ShowCodeDetailsInExceptionMessages, -Dio.netty.noUnsafe=true, -Dio.netty.noKeySetOptimization=true, -Dio.netty.recycler.maxCapacityPerThread=0, -Dio.netty.allocator.numDirectArenas=0, -Dlog4j.shutdownHookEnabled=false, -Dlog4j2.disable.jmx=true, -Dlog4j2.formatMsgNoLookups=true, -Djava.locale.providers=SPI,COMPAT, --add-opens=java.base/java.io=ALL-UNNAMED, -Djava.security.manager=allow, -XX:+UseG1GC, -Djava.io.tmpdir=/tmp/elasticsearch-11693609828562350874, -XX:+HeapDumpOnOutOfMemoryError, -XX:+ExitOnOutOfMemoryError, -XX:HeapDumpPath=data, -XX:ErrorFile=logs/hs_err_pid%p.log, -Xlog:gc*,gc+age=trace,safepoint:file=logs/gc.log:utctime,pid,tags:filecount=32,filesize=64m, -Des.cgroups.hierarchy.override=/, -Xms256m, -Xmx256m, -XX:MaxDirectMemorySize=134217728, -XX:G1HeapRegionSize=4m, -XX:InitiatingHeapOccupancyPercent=30, -XX:G1ReservePercent=15, -Des.path.home=/usr/share/elasticsearch, -Des.path.conf=/usr/share/elasticsearch/config, -Des.distribution.flavor=default, -Des.distribution.type=docker, -Des.bundled_jdk=true]" }322023-04-26T10:23:00.903356865Z {"type": "server", "timestamp": "2023-04-26T10:23:00,902Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [aggs-matrix-stats]" }332023-04-26T10:23:00.903670535Z {"type": "server", "timestamp": "2023-04-26T10:23:00,903Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [analysis-common]" }342023-04-26T10:23:00.903930025Z {"type": "server", "timestamp": "2023-04-26T10:23:00,903Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [constant-keyword]" }352023-04-26T10:23:00.904169385Z {"type": "server", "timestamp": "2023-04-26T10:23:00,903Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [frozen-indices]" }362023-04-26T10:23:00.904467855Z {"type": "server", "timestamp": "2023-04-26T10:23:00,904Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [ingest-common]" }372023-04-26T10:23:00.904695175Z {"type": "server", "timestamp": "2023-04-26T10:23:00,904Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [ingest-geoip]" }382023-04-26T10:23:00.904944595Z {"type": "server", "timestamp": "2023-04-26T10:23:00,904Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [ingest-user-agent]" }392023-04-26T10:23:00.905167015Z {"type": "server", "timestamp": "2023-04-26T10:23:00,904Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [kibana]" }402023-04-26T10:23:00.905421045Z {"type": "server", "timestamp": "2023-04-26T10:23:00,905Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [lang-expression]" }412023-04-26T10:23:00.905643295Z {"type": "server", "timestamp": "2023-04-26T10:23:00,905Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [lang-mustache]" }422023-04-26T10:23:00.905873675Z {"type": "server", "timestamp": "2023-04-26T10:23:00,905Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [lang-painless]" }432023-04-26T10:23:00.906091745Z {"type": "server", "timestamp": "2023-04-26T10:23:00,905Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [legacy-geo]" }442023-04-26T10:23:00.906346165Z {"type": "server", "timestamp": "2023-04-26T10:23:00,906Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [mapper-extras]" }452023-04-26T10:23:00.906703555Z {"type": "server", "timestamp": "2023-04-26T10:23:00,906Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [mapper-version]" }462023-04-26T10:23:00.906979805Z {"type": "server", "timestamp": "2023-04-26T10:23:00,906Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [parent-join]" }472023-04-26T10:23:00.907329595Z {"type": "server", "timestamp": "2023-04-26T10:23:00,907Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [percolator]" }482023-04-26T10:23:00.907612945Z {"type": "server", "timestamp": "2023-04-26T10:23:00,907Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [rank-eval]" }492023-04-26T10:23:00.907915925Z {"type": "server", "timestamp": "2023-04-26T10:23:00,907Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [reindex]" }502023-04-26T10:23:00.908180475Z {"type": "server", "timestamp": "2023-04-26T10:23:00,907Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [repositories-metering-api]" }512023-04-26T10:23:00.908492665Z {"type": "server", "timestamp": "2023-04-26T10:23:00,908Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [repository-encrypted]" }522023-04-26T10:23:00.908775095Z {"type": "server", "timestamp": "2023-04-26T10:23:00,908Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [repository-url]" }532023-04-26T10:23:00.909119835Z {"type": "server", "timestamp": "2023-04-26T10:23:00,908Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [runtime-fields-common]" }542023-04-26T10:23:00.909399175Z {"type": "server", "timestamp": "2023-04-26T10:23:00,909Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [search-business-rules]" }552023-04-26T10:23:00.909713175Z {"type": "server", "timestamp": "2023-04-26T10:23:00,909Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [searchable-snapshots]" }562023-04-26T10:23:00.909972565Z {"type": "server", "timestamp": "2023-04-26T10:23:00,909Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [snapshot-repo-test-kit]" }572023-04-26T10:23:00.910316165Z {"type": "server", "timestamp": "2023-04-26T10:23:00,910Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [spatial]" }582023-04-26T10:23:00.910617585Z {"type": "server", "timestamp": "2023-04-26T10:23:00,910Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [transform]" }592023-04-26T10:23:00.910948175Z {"type": "server", "timestamp": "2023-04-26T10:23:00,910Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [transport-netty4]" }602023-04-26T10:23:00.911244365Z {"type": "server", "timestamp": "2023-04-26T10:23:00,910Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [unsigned-long]" }612023-04-26T10:23:00.911554715Z {"type": "server", "timestamp": "2023-04-26T10:23:00,911Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [vector-tile]" }622023-04-26T10:23:00.911824615Z {"type": "server", "timestamp": "2023-04-26T10:23:00,911Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [vectors]" }632023-04-26T10:23:00.912141855Z {"type": "server", "timestamp": "2023-04-26T10:23:00,911Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [wildcard]" }642023-04-26T10:23:00.912415905Z {"type": "server", "timestamp": "2023-04-26T10:23:00,912Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-aggregate-metric]" }652023-04-26T10:23:00.912731905Z {"type": "server", "timestamp": "2023-04-26T10:23:00,912Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-analytics]" }662023-04-26T10:23:00.912996215Z {"type": "server", "timestamp": "2023-04-26T10:23:00,912Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-async]" }672023-04-26T10:23:00.913305795Z {"type": "server", "timestamp": "2023-04-26T10:23:00,913Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-async-search]" }682023-04-26T10:23:00.913610435Z {"type": "server", "timestamp": "2023-04-26T10:23:00,913Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-autoscaling]" }692023-04-26T10:23:00.913913415Z {"type": "server", "timestamp": "2023-04-26T10:23:00,913Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-ccr]" }702023-04-26T10:23:00.914225185Z {"type": "server", "timestamp": "2023-04-26T10:23:00,913Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-core]" }712023-04-26T10:23:00.914539755Z {"type": "server", "timestamp": "2023-04-26T10:23:00,914Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-data-streams]" }722023-04-26T10:23:00.914835875Z {"type": "server", "timestamp": "2023-04-26T10:23:00,914Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-deprecation]" }732023-04-26T10:23:00.915133715Z {"type": "server", "timestamp": "2023-04-26T10:23:00,914Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-enrich]" }742023-04-26T10:23:00.915457255Z {"type": "server", "timestamp": "2023-04-26T10:23:00,915Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-eql]" }752023-04-26T10:23:00.915877325Z {"type": "server", "timestamp": "2023-04-26T10:23:00,915Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-fleet]" }762023-04-26T10:23:00.916368535Z {"type": "server", "timestamp": "2023-04-26T10:23:00,915Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-graph]" }772023-04-26T10:23:00.916716215Z {"type": "server", "timestamp": "2023-04-26T10:23:00,916Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-identity-provider]" }782023-04-26T10:23:00.917024185Z {"type": "server", "timestamp": "2023-04-26T10:23:00,916Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-ilm]" }792023-04-26T10:23:00.917351025Z {"type": "server", "timestamp": "2023-04-26T10:23:00,917Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-logstash]" }802023-04-26T10:23:00.917703535Z {"type": "server", "timestamp": "2023-04-26T10:23:00,917Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-ml]" }812023-04-26T10:23:00.918031115Z {"type": "server", "timestamp": "2023-04-26T10:23:00,917Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-monitoring]" }822023-04-26T10:23:00.918393235Z {"type": "server", "timestamp": "2023-04-26T10:23:00,918Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-ql]" }832023-04-26T10:23:00.918695325Z {"type": "server", "timestamp": "2023-04-26T10:23:00,918Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-rollup]" }842023-04-26T10:23:00.918993695Z {"type": "server", "timestamp": "2023-04-26T10:23:00,918Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-security]" }852023-04-26T10:23:00.919342225Z {"type": "server", "timestamp": "2023-04-26T10:23:00,919Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-shutdown]" }862023-04-26T10:23:00.919678925Z {"type": "server", "timestamp": "2023-04-26T10:23:00,919Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-sql]" }872023-04-26T10:23:00.919909285Z {"type": "server", "timestamp": "2023-04-26T10:23:00,919Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-stack]" }882023-04-26T10:23:00.920285925Z {"type": "server", "timestamp": "2023-04-26T10:23:00,919Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-text-structure]" }892023-04-26T10:23:00.920602895Z {"type": "server", "timestamp": "2023-04-26T10:23:00,920Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-voting-only-node]" }902023-04-26T10:23:00.920917435Z {"type": "server", "timestamp": "2023-04-26T10:23:00,920Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "loaded module [x-pack-watcher]" }912023-04-26T10:23:00.921520265Z {"type": "server", "timestamp": "2023-04-26T10:23:00,921Z", "level": "INFO", "component": "o.e.p.PluginsService", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "no plugins loaded" }922023-04-26T10:23:01.193606935Z {"type": "server", "timestamp": "2023-04-26T10:23:01,193Z", "level": "INFO", "component": "o.e.e.NodeEnvironment", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "using [1] data paths, mounts [[/ (overlay)]], net usable_space [79.3gb], net total_space [94.2gb], types [overlay]" }932023-04-26T10:23:01.193991604Z {"type": "server", "timestamp": "2023-04-26T10:23:01,193Z", "level": "INFO", "component": "o.e.e.NodeEnvironment", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "heap size [256mb], compressed ordinary object pointers [true]" }942023-04-26T10:23:01.439512883Z {"type": "server", "timestamp": "2023-04-26T10:23:01,438Z", "level": "INFO", "component": "o.e.n.Node", "cluster.name": "docker-cluster", "node.name": "048648e7ecf4", "message": "node name [048648e7ecf4], node ID [AcMJFaYCTqqCGrCCnYXByQ], cluster name [docker-cluster], roles [transform, data_frozen, master, remote_cluster_client, data, ml, data_content, data_hot, data_warm, data_cold, ingest]" }95*********96Authenticating with credentials from job payload (GitLab Registry)97Pulling docker image registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.19-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 ...98Using docker image sha256:552b81110cdd830e05d17c8e7365f72e1dd96842217d7225636cb55a75777ea7 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.19-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.19-rust-1.65-node-16.14-postgresql-13@sha256:a386dd1acb1341f710f3c3c320984f70512694bcfec8cb1c771365058ac7c475 ...100Running on runner-rpvz2ff9-project-278964-concurrent-0 via runner-rpvz2ff9-private-1682501211-163ca548...102$ eval "$CI_PRE_CLONE_SCRIPT"103Fetching changes with git depth set to 20...104Initialized empty Git repository in /builds/gitlab-org/gitlab/.git/105Created fresh repository.106remote: Enumerating objects: 165305, done. 107remote: Counting objects: 100% (165305/165305), done. 108remote: Compressing objects: 100% (99237/99237), done. 109remote: Total 165305 (delta 81746), reused 118333 (delta 59964), pack-reused 0 110Receiving objects: 100% (165305/165305), 131.94 MiB | 25.34 MiB/s, done.111Resolving deltas: 100% (81746/81746), done.113 * [new ref] refs/pipelines/849373675 -> refs/pipelines/849373675114 * [new branch] master -> origin/master115Checking out f463609d as detached HEAD (ref is master)...116Skipping Git submodules setup117$ git remote set-url origin "${CI_REPOSITORY_URL}"119Checking cache for ruby-gems-debian-bullseye-ruby-3.0-16...120Downloading cache.zip from https://storage.googleapis.com/gitlab-com-runners-cache/project/278964/ruby-gems-debian-bullseye-ruby-3.0-16 121Successfully extracted cache123Downloading artifacts for compile-test-assets (4181384009)...124Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4181384009 responseStatus=200 OK token=64_SCWzn125Downloading artifacts for retrieve-tests-metadata (4181384016)...126Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4181384016 responseStatus=200 OK token=64_SCWzn127Downloading artifacts for setup-test-env (4181384014)...128Downloading artifacts from coordinator... ok host=storage.googleapis.com id=4181384014 responseStatus=200 OK token=64_SCWzn130Using docker image sha256:552b81110cdd830e05d17c8e7365f72e1dd96842217d7225636cb55a75777ea7 for registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.19-rust-1.65-node-16.14-postgresql-13:rubygems-3.4-git-2.36-lfs-2.9-chrome-109-yarn-1.22-graphicsmagick-1.3.36 with digest registry.gitlab.com/gitlab-org/gitlab-build-images/debian-bullseye-ruby-3.0.patched-golang-1.19-rust-1.65-node-16.14-postgresql-13@sha256:a386dd1acb1341f710f3c3c320984f70512694bcfec8cb1c771365058ac7c475 ...131$ echo $FOSS_ONLY132$ [ "$FOSS_ONLY" = "1" ] && rm -rf ee/ qa/spec/ee/ qa/qa/specs/features/ee/ qa/qa/ee/ qa/qa/ee.rb133$ export GOPATH=$CI_PROJECT_DIR/.go134$ mkdir -p $GOPATH135$ source scripts/utils.sh136$ source scripts/prepare_build.sh792Using decomposed database config (config/database.yml.decomposed-postgresql)793Geo DB will be set up.794Embedding DB will be set up.818$ source ./scripts/rspec_helpers.sh819$ run_timed_command "gem install knapsack --no-document"820$ gem install knapsack --no-document821Successfully installed knapsack-4.0.08221 gem installed823==> 'gem install knapsack --no-document' succeeded in 1 seconds.824$ echo -e "\e[0Ksection_start:`date +%s`:gitaly-test-spawn[collapsed=true]\r\e[0KStarting Gitaly"826$ section_start "gitaly-test-spawn" "Spawning Gitaly"; scripts/gitaly-test-spawn; section_end "gitaly-test-spawn"831$ echo -e "\e[0Ksection_end:`date +%s`:gitaly-test-spawn\r\e[0K"832$ rspec_paralellized_job "--tag ~quarantine --tag ~level:background_migration"833SKIP_FLAKY_TESTS_AUTOMATICALLY: false834RETRY_FAILED_TESTS_IN_NEW_PROCESS: true835KNAPSACK_GENERATE_REPORT: true836FLAKY_RSPEC_GENERATE_REPORT: true837KNAPSACK_TEST_FILE_PATTERN: {ee/}spec/{commands,controllers,mailers,requests}{,/**/}*_spec.rb838KNAPSACK_LOG_LEVEL: debug839KNAPSACK_REPORT_PATH: knapsack/rspec-ee_integration_pg13_6_6_report.json840FLAKY_RSPEC_SUITE_REPORT_PATH: rspec/flaky/report-suite.json841FLAKY_RSPEC_REPORT_PATH: rspec/flaky/all_rspec-ee_integration_pg13_6_6_report.json842NEW_FLAKY_RSPEC_REPORT_PATH: rspec/flaky/new_rspec-ee_integration_pg13_6_6_report.json843SKIPPED_FLAKY_TESTS_REPORT_PATH: rspec/flaky/skipped_flaky_tests_rspec-ee_integration_pg13_6_6_report.txt844CRYSTALBALL: 845RSPEC_TESTS_MAPPING_ENABLED: 846RSPEC_TESTS_FILTER_FILE: 847Knapsack report generator started!848warning: parser/current is loading parser/ruby30, which recognizes 3.0.5-compliant syntax, but you are running 3.0.6.850Run options: exclude {:quarantine=>true, :level=>"background_migration"}851Test environment set up in 1.331737329 seconds852SearchController853 GET /search854 when elasticsearch is enabled855 for issues scope856 behaves like an efficient database result857 avoids N+1 database queries858 for merge_request scope859 behaves like an efficient database result860 avoids N+1 database queries861 for project scope862 behaves like an efficient database result863 avoids N+1 database queries864 for notes scope865 behaves like an efficient database result866 avoids N+1 database queries867 for milestones scope868 behaves like an efficient database result869 avoids N+1 database queries870 for users scope871 behaves like an efficient database result872 avoids N+1 database queries873 for epics scope874 behaves like an efficient database result875 avoids N+1 database queries876 for blobs scope877 avoids N+1 database queries878 does not raise an exeption when blob.path is nil879 for commits scope880 avoids N+1 database queries881 search index integrity882 when project is present and group is not present883 queues the project integrity worker884 when project is not present and group is not present885 does nothing886 when project is not present and group is present887 queues the namespace integrity worker which then schedules the project integrity worker888 when project is present and group is present889 queues the project integrity worker890 when search results are returned891 does nothing892 when search_index_integrity feature flag is not enabled893 does nothing894 when scope is not blobs895 does nothing896RoutableActions897 #find_routable!898 when SAML SSO is enabled for resource899 resource: root_group, resource_visibility_level: "private", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: false, shared_examples: "SSO Enforced"900 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled901 when resource is private902 for user903 redirects to group SSO page on GET requests904 resource: root_group, resource_visibility_level: "private", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: true, user_with_saml_session?: false, shared_examples: "SSO Not enforced"905 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled906 when resource is private907 for user908 allows to read response of GET requests909 resource: root_group, resource_visibility_level: "private", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: true, shared_examples: "SSO Not enforced"910 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled911 when resource is private912 for user913 allows to read response of GET requests914 resource: subgroup, resource_visibility_level: "private", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: false, shared_examples: "SSO Enforced"915 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled916 when resource is private917 for user918 redirects to group SSO page on GET requests919 resource: subgroup, resource_visibility_level: "private", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: true, user_with_saml_session?: false, shared_examples: "SSO Enforced"920 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled921 when resource is private922 for user923 redirects to group SSO page on GET requests924 resource: subgroup, resource_visibility_level: "private", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: true, shared_examples: "SSO Not enforced"925 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled926 when resource is private927 for user928 allows to read response of GET requests929 resource: project, resource_visibility_level: "private", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: false, shared_examples: "SSO Enforced"930 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled931 when resource is private932 for user933 redirects to group SSO page on GET requests934 resource: project, resource_visibility_level: "private", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: true, user_with_saml_session?: false, shared_examples: "SSO Enforced"935 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled936 when resource is private937 for user938 redirects to group SSO page on GET requests939 resource: project, resource_visibility_level: "private", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: true, shared_examples: "SSO Not enforced"940 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled941 when resource is private942 for user943 allows to read response of GET requests944 resource: root_group, resource_visibility_level: "private", enforced_sso?: false, user: member_without_identity, user_is_resource_owner?: false, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"945 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled946 when resource is private947 for user948 allows to read response of GET requests949 resource: subgroup, resource_visibility_level: "private", enforced_sso?: false, user: member_without_identity, user_is_resource_owner?: false, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"950 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled951 when resource is private952 for user953 allows to read response of GET requests954 resource: project, resource_visibility_level: "private", enforced_sso?: false, user: member_without_identity, user_is_resource_owner?: false, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"955 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled956 when resource is private957 for user958 allows to read response of GET requests959 resource: root_group, resource_visibility_level: "private", enforced_sso?: false, user: non_member, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced; For signed in user, no access to the resource due to its visibility level"960 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled961 when resource is private962 for user963 does not redirect to group SSO page on GET requests, returns not_found instead964 resource: subgroup, resource_visibility_level: "private", enforced_sso?: false, user: non_member, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced; For signed in user, no access to the resource due to its visibility level"965 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled966 when resource is private967 for user968 does not redirect to group SSO page on GET requests, returns not_found instead969 resource: project, resource_visibility_level: "private", enforced_sso?: false, user: non_member, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced; For signed in user, no access to the resource due to its visibility level"970 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled971 when resource is private972 for user973 does not redirect to group SSO page on GET requests, returns not_found instead974 resource: root_group, resource_visibility_level: "private", enforced_sso?: false, user: not_signed_in_user, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced; For not signed in user, no access to the resource due to its visibility level"975 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled976 when resource is private977 for user978 does not redirect to group SSO page on GET requests, redirects to /users/sign_in page instead979 resource: subgroup, resource_visibility_level: "private", enforced_sso?: false, user: not_signed_in_user, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced; For not signed in user, no access to the resource due to its visibility level"980 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled981 when resource is private982 for user983 does not redirect to group SSO page on GET requests, redirects to /users/sign_in page instead984 resource: project, resource_visibility_level: "private", enforced_sso?: false, user: not_signed_in_user, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced; For not signed in user, no access to the resource due to its visibility level"985 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled986 when resource is private987 for user988 does not redirect to group SSO page on GET requests, redirects to /users/sign_in page instead989 resource: root_group, resource_visibility_level: "private", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: false, shared_examples: "SSO Enforced"990 when 'Enforce SSO-only authentication for web activity for this group' option is enabled991 when resource is private992 for user993 redirects to group SSO page on GET requests994 resource: root_group, resource_visibility_level: "private", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: true, user_with_saml_session?: false, shared_examples: "SSO Not enforced"995 when 'Enforce SSO-only authentication for web activity for this group' option is enabled996 when resource is private997 for user998 allows to read response of GET requests999 resource: root_group, resource_visibility_level: "private", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: true, shared_examples: "SSO Not enforced"1000 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1001 when resource is private1002 for user1003 allows to read response of GET requests1004 resource: subgroup, resource_visibility_level: "private", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: false, shared_examples: "SSO Enforced"1005 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1006 when resource is private1007 for user1008 redirects to group SSO page on GET requests1009 resource: subgroup, resource_visibility_level: "private", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: true, user_with_saml_session?: false, shared_examples: "SSO Enforced"1010 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1011 when resource is private1012 for user1013 redirects to group SSO page on GET requests1014 resource: subgroup, resource_visibility_level: "private", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: true, shared_examples: "SSO Not enforced"1015 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1016 when resource is private1017 for user1018 allows to read response of GET requests1019 resource: project, resource_visibility_level: "private", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: false, shared_examples: "SSO Enforced"1020 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1021 when resource is private1022 for user1023 redirects to group SSO page on GET requests1024 resource: project, resource_visibility_level: "private", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: true, user_with_saml_session?: false, shared_examples: "SSO Enforced"1025 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1026 when resource is private1027 for user1028 redirects to group SSO page on GET requests1029 resource: project, resource_visibility_level: "private", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: true, shared_examples: "SSO Not enforced"1030 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1031 when resource is private1032 for user1033 allows to read response of GET requests1034 resource: root_group, resource_visibility_level: "private", enforced_sso?: true, user: member_without_identity, user_is_resource_owner?: false, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1035 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1036 when resource is private1037 for user1038 redirects to group SSO page on GET requests1039 resource: root_group, resource_visibility_level: "private", enforced_sso?: true, user: member_without_identity, user_is_resource_owner?: true, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"1040 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1041 when resource is private1042 for user1043 allows to read response of GET requests1044 resource: subgroup, resource_visibility_level: "private", enforced_sso?: true, user: member_without_identity, user_is_resource_owner?: false, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1045 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1046 when resource is private1047 for user1048 redirects to group SSO page on GET requests1049 resource: subgroup, resource_visibility_level: "private", enforced_sso?: true, user: member_without_identity, user_is_resource_owner?: true, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1050 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1051 when resource is private1052 for user1053 redirects to group SSO page on GET requests1054 resource: project, resource_visibility_level: "private", enforced_sso?: true, user: member_without_identity, user_is_resource_owner?: false, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1055 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1056 when resource is private1057 for user1058 redirects to group SSO page on GET requests1059 resource: project, resource_visibility_level: "private", enforced_sso?: true, user: member_without_identity, user_is_resource_owner?: true, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1060 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1061 when resource is private1062 for user1063 redirects to group SSO page on GET requests1064 resource: root_group, resource_visibility_level: "private", enforced_sso?: true, user: non_member, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1065 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1066 when resource is private1067 for user1068 redirects to group SSO page on GET requests1069 resource: subgroup, resource_visibility_level: "private", enforced_sso?: true, user: non_member, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1070 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1071 when resource is private1072 for user1073 redirects to group SSO page on GET requests1074 resource: project, resource_visibility_level: "private", enforced_sso?: true, user: non_member, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1075 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1076 when resource is private1077 for user1078 redirects to group SSO page on GET requests1079 resource: root_group, resource_visibility_level: "private", enforced_sso?: true, user: not_signed_in_user, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1080 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1081 when resource is private1082 for user1083 redirects to group SSO page on GET requests1084 resource: subgroup, resource_visibility_level: "private", enforced_sso?: true, user: not_signed_in_user, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1085 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1086 when resource is private1087 for user1088 redirects to group SSO page on GET requests1089 resource: project, resource_visibility_level: "private", enforced_sso?: true, user: not_signed_in_user, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1090 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1091 when resource is private1092 for user1093 redirects to group SSO page on GET requests1094 resource: root_group, resource_visibility_level: "public", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: false, shared_examples: "SSO Enforced"1095 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1096 when resource is public1097 for user1098 redirects to group SSO page on GET requests1099 resource: root_group, resource_visibility_level: "public", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: true, user_with_saml_session?: false, shared_examples: "SSO Not enforced"1100 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1101 when resource is public1102 for user1103 allows to read response of GET requests1104 resource: root_group, resource_visibility_level: "public", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: true, shared_examples: "SSO Not enforced"1105 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1106 when resource is public1107 for user1108 allows to read response of GET requests1109 resource: subgroup, resource_visibility_level: "public", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: false, shared_examples: "SSO Enforced"1110 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1111 when resource is public1112 for user1113 redirects to group SSO page on GET requests1114 resource: subgroup, resource_visibility_level: "public", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: true, user_with_saml_session?: false, shared_examples: "SSO Enforced"1115 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1116 when resource is public1117 for user1118 redirects to group SSO page on GET requests1119 resource: subgroup, resource_visibility_level: "public", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: true, shared_examples: "SSO Not enforced"1120 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1121 when resource is public1122 for user1123 allows to read response of GET requests1124 resource: project, resource_visibility_level: "public", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: false, shared_examples: "SSO Enforced"1125 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1126 when resource is public1127 for user1128 redirects to group SSO page on GET requests1129 resource: project, resource_visibility_level: "public", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: true, user_with_saml_session?: false, shared_examples: "SSO Enforced"1130 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1131 when resource is public1132 for user1133 redirects to group SSO page on GET requests1134 resource: project, resource_visibility_level: "public", enforced_sso?: false, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: true, shared_examples: "SSO Not enforced"1135 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1136 when resource is public1137 for user1138 allows to read response of GET requests1139 resource: root_group, resource_visibility_level: "public", enforced_sso?: false, user: member_without_identity, user_is_resource_owner?: false, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"1140 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1141 when resource is public1142 for user1143 allows to read response of GET requests1144 resource: subgroup, resource_visibility_level: "public", enforced_sso?: false, user: member_without_identity, user_is_resource_owner?: false, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"1145 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1146 when resource is public1147 for user1148 allows to read response of GET requests1149 resource: project, resource_visibility_level: "public", enforced_sso?: false, user: member_without_identity, user_is_resource_owner?: false, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"1150 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1151 when resource is public1152 for user1153 allows to read response of GET requests1154 resource: root_group, resource_visibility_level: "public", enforced_sso?: false, user: non_member, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"1155 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1156 when resource is public1157 for user1158 allows to read response of GET requests1159 resource: subgroup, resource_visibility_level: "public", enforced_sso?: false, user: non_member, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"1160 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1161 when resource is public1162 for user1163 allows to read response of GET requests1164 resource: project, resource_visibility_level: "public", enforced_sso?: false, user: non_member, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"1165 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1166 when resource is public1167 for user1168 allows to read response of GET requests1169 resource: root_group, resource_visibility_level: "public", enforced_sso?: false, user: not_signed_in_user, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"1170 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1171 when resource is public1172 for user1173 allows to read response of GET requests1174 resource: subgroup, resource_visibility_level: "public", enforced_sso?: false, user: not_signed_in_user, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"1175 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1176 when resource is public1177 for user1178 allows to read response of GET requests1179 resource: project, resource_visibility_level: "public", enforced_sso?: false, user: not_signed_in_user, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"1180 when 'Enforce SSO-only authentication for web activity for this group' option is not enabled1181 when resource is public1182 for user1183 allows to read response of GET requests1184 resource: root_group, resource_visibility_level: "public", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: false, shared_examples: "SSO Enforced"1185 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1186 when resource is public1187 for user1188 redirects to group SSO page on GET requests1189 resource: root_group, resource_visibility_level: "public", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: true, user_with_saml_session?: false, shared_examples: "SSO Not enforced"1190 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1191 when resource is public1192 for user1193 allows to read response of GET requests1194 resource: root_group, resource_visibility_level: "public", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: true, shared_examples: "SSO Not enforced"1195 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1196 when resource is public1197 for user1198 allows to read response of GET requests1199 resource: subgroup, resource_visibility_level: "public", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: false, shared_examples: "SSO Enforced"1200 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1201 when resource is public1202 for user1203 redirects to group SSO page on GET requests1204 resource: subgroup, resource_visibility_level: "public", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: true, user_with_saml_session?: false, shared_examples: "SSO Enforced"1205 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1206 when resource is public1207 for user1208 redirects to group SSO page on GET requests1209 resource: subgroup, resource_visibility_level: "public", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: true, shared_examples: "SSO Not enforced"1210 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1211 when resource is public1212 for user1213 allows to read response of GET requests1214 resource: project, resource_visibility_level: "public", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: false, shared_examples: "SSO Enforced"1215 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1216 when resource is public1217 for user1218 redirects to group SSO page on GET requests1219 resource: project, resource_visibility_level: "public", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: true, user_with_saml_session?: false, shared_examples: "SSO Enforced"1220 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1221 when resource is public1222 for user1223 redirects to group SSO page on GET requests1224 resource: project, resource_visibility_level: "public", enforced_sso?: true, user: member_with_identity, user_is_resource_owner?: false, user_with_saml_session?: true, shared_examples: "SSO Not enforced"1225 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1226 when resource is public1227 for user1228 allows to read response of GET requests1229 resource: root_group, resource_visibility_level: "public", enforced_sso?: true, user: member_without_identity, user_is_resource_owner?: false, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1230 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1231 when resource is public1232 for user1233 redirects to group SSO page on GET requests1234 resource: root_group, resource_visibility_level: "public", enforced_sso?: true, user: member_without_identity, user_is_resource_owner?: true, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"1235 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1236 when resource is public1237 for user1238 allows to read response of GET requests1239 resource: subgroup, resource_visibility_level: "public", enforced_sso?: true, user: member_without_identity, user_is_resource_owner?: false, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1240 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1241 when resource is public1242 for user1243 redirects to group SSO page on GET requests1244 resource: subgroup, resource_visibility_level: "public", enforced_sso?: true, user: member_without_identity, user_is_resource_owner?: true, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1245 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1246 when resource is public1247 for user1248 redirects to group SSO page on GET requests1249 resource: project, resource_visibility_level: "public", enforced_sso?: true, user: member_without_identity, user_is_resource_owner?: false, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1250 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1251 when resource is public1252 for user1253 redirects to group SSO page on GET requests1254 resource: project, resource_visibility_level: "public", enforced_sso?: true, user: member_without_identity, user_is_resource_owner?: true, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1255 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1256 when resource is public1257 for user1258 redirects to group SSO page on GET requests1259 resource: root_group, resource_visibility_level: "public", enforced_sso?: true, user: non_member, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1260 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1261 when resource is public1262 for user1263 redirects to group SSO page on GET requests1264 resource: subgroup, resource_visibility_level: "public", enforced_sso?: true, user: non_member, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1265 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1266 when resource is public1267 for user1268 redirects to group SSO page on GET requests1269 resource: project, resource_visibility_level: "public", enforced_sso?: true, user: non_member, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"1270 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1271 when resource is public1272 for user1273 allows to read response of GET requests1274 resource: root_group, resource_visibility_level: "public", enforced_sso?: true, user: not_signed_in_user, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1275 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1276 when resource is public1277 for user1278 redirects to group SSO page on GET requests1279 resource: subgroup, resource_visibility_level: "public", enforced_sso?: true, user: not_signed_in_user, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Enforced"1280 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1281 when resource is public1282 for user1283 redirects to group SSO page on GET requests1284 resource: project, resource_visibility_level: "public", enforced_sso?: true, user: not_signed_in_user, user_is_resource_owner?: nil, user_with_saml_session?: nil, shared_examples: "SSO Not enforced"1285 when 'Enforce SSO-only authentication for web activity for this group' option is enabled1286 when resource is public1287 for user1288 allows to read response of GET requests1289Gets registries1290 behaves like gets registries for1291 returns registries1292 behaves like a working graphql query1293 returns a successful response1294 when paginating1295 supports cursor-based pagination1296 returns the correct page of registries1297 behaves like gets registries for1298 returns registries1299 behaves like a working graphql query1300 returns a successful response1301 when paginating1302 supports cursor-based pagination1303 returns the correct page of registries1304 behaves like gets registries for1305 returns registries1306 behaves like a working graphql query1307 returns a successful response1308 when paginating1309 supports cursor-based pagination1310 returns the correct page of registries1311 behaves like gets registries for1312 returns registries1313 behaves like a working graphql query1314 returns a successful response1315 when paginating1316 supports cursor-based pagination1317 returns the correct page of registries1318 behaves like gets registries for1319 returns registries1320 behaves like a working graphql query1321 returns a successful response1322 when paginating1323 supports cursor-based pagination1324 returns the correct page of registries1325 behaves like gets registries for1326 returns registries1327 behaves like a working graphql query1328 returns a successful response1329 when paginating1330 supports cursor-based pagination1331 returns the correct page of registries1332 behaves like gets registries for1333 returns registries1334 behaves like a working graphql query1335 returns a successful response1336 when paginating1337 supports cursor-based pagination1338 returns the correct page of registries1339 behaves like gets registries for1340 returns registries1341 behaves like a working graphql query1342 returns a successful response1343 when paginating1344 supports cursor-based pagination1345 returns the correct page of registries1346 behaves like gets registries for1347 returns registries1348 behaves like a working graphql query1349 returns a successful response1350 when paginating1351 supports cursor-based pagination1352 returns the correct page of registries1353 behaves like gets registries for1354 returns registries1355 behaves like a working graphql query1356 returns a successful response1357 when paginating1358 supports cursor-based pagination1359 returns the correct page of registries1360 behaves like gets registries for1361 returns registries1362 behaves like a working graphql query1363 returns a successful response1364 when paginating1365 supports cursor-based pagination1366 returns the correct page of registries1367 behaves like gets registries for1368 returns registries1369 behaves like a working graphql query1370 returns a successful response1371 when paginating1372 supports cursor-based pagination1373 returns the correct page of registries1374 behaves like gets registries for1375 returns registries1376 behaves like a working graphql query1377 returns a successful response1378 when paginating1379 supports cursor-based pagination1380 returns the correct page of registries1381Admin::ApplicationSettingsController1382 PUT #update1383 updates the EE specific application settings1384 updates repository_size_limit1385 does not accept negative repository_size_limit1386 does not accept invalid repository_size_limit1387 does not accept empty repository_size_limit1388 mirror settings1389 behaves like settings for licensed features1390 does not update settings when licensed feature is not available1391 updates settings when the feature is available1392 default project deletion protection1393 behaves like settings for licensed features1394 does not update settings when licensed feature is not available1395 updates settings when the feature is available1396 when `always_perform_delayed_deletion` is disabled1397 default delayed group deletion1398 behaves like settings for licensed features1399 does not update settings when licensed feature is not available1400 updates settings when the feature is available1401 default delayed project deletion1402 behaves like settings for licensed features1403 does not update settings when licensed feature is not available1404 updates settings when the feature is available1405 updating name disabled for users setting1406 behaves like settings for licensed features1407 does not update settings when licensed feature is not available1408 updates settings when the feature is available1409 updating `group_owners_can_manage_default_branch_protection` setting1410 behaves like settings for licensed features1411 does not update settings when licensed feature is not available1412 updates settings when the feature is available1413 updating maven packages request forwarding setting1414 behaves like settings for licensed features1415 does not update settings when licensed feature is not available1416 updates settings when the feature is available1417 updating npm packages request forwarding setting1418 behaves like settings for licensed features1419 does not update settings when licensed feature is not available1420 updates settings when the feature is available1421 updating password complexity settings1422 behaves like settings for licensed features1423 does not update settings when licensed feature is not available1424 updates settings when the feature is available1425 updating pypi packages request forwarding setting1426 behaves like settings for licensed features1427 does not update settings when licensed feature is not available1428 updates settings when the feature is available1429 updating `git_two_factor_session_expiry` setting1430 behaves like settings for licensed features1431 does not update settings when licensed feature is not available1432 updates settings when the feature is available1433 updating maintenance mode setting1434 behaves like settings for licensed features1435 does not update settings when licensed feature is not available1436 updates settings when the feature is available1437 deletion adjourned period1438 behaves like settings for licensed features1439 does not update settings when licensed feature is not available1440 updates settings when the feature is available1441 additional email footer1442 behaves like settings for licensed features1443 does not update settings when licensed feature is not available1444 updates settings when the feature is available1445 custom project templates settings1446 behaves like settings for licensed features1447 does not update settings when licensed feature is not available1448 updates settings when the feature is available1449 merge request approvers rules1450 behaves like settings for licensed features1451 does not update settings when licensed feature is not available1452 updates settings when the feature is available1453 globally allowed IPs1454 behaves like settings for licensed features1455 does not update settings when licensed feature is not available1456 updates settings when the feature is available1457 required instance ci template1458 behaves like settings for licensed features1459 does not update settings when licensed feature is not available1460 updates settings when the feature is available1461 when ApplicationSetting already has a required_instance_ci_template value1462 with a valid value1463 behaves like settings for licensed features1464 does not update settings when licensed feature is not available1465 updates settings when the feature is available1466 with an empty value1467 sets required_instance_ci_template as nil1468 without key1469 does not set required_instance_ci_template to nil1470 verify panel actions1471 behaves like renders correct panels1472 renders correct action on error1473 redirects to same panel on success1474 behaves like renders correct panels1475 renders correct action on error1476 redirects to same panel on success1477 behaves like renders correct panels1478 renders correct action on error1479 redirects to same panel on success1480 maintenance mode settings1481 updates maintenance_mode setting1482 updates maintenance_mode_message setting1483 when update disables maintenance mode1484 removes maintenance_mode_message setting1485 when update does not disable maintenance mode1486 does not remove maintenance_mode_message1487 when updating maintenance_mode_message with empty string1488 removes maintenance_mode_message1489 #advanced_search1490 check search version is compatability1491 does not alert when version is compatible1492 alerts when version is incompatible1493 warning if not using index aliases1494 warns when NOT using index aliases1495 does NOT warn when using index aliases1496 does NOT blow up if elasticsearch is unreachable1497 warning outdated code search mappings1498 warns when outdated code mappings are used1499 warns when meta field is not present1500 does NOT warn when using new mappings1501 does NOT blow up if elasticsearch is unreachable1502 advanced search settings1503 updates the advanced search settings1504 zero-downtime elasticsearch reindexing1505 assigns last elasticsearch reindexing task1506 elasticsearch_aws_secret_access_key setting is blank1507 does not update the elasticsearch_aws_secret_access_key setting1508 GET #seat_link_payload1509 when a non-admin user attempts a request1510 returns a 404 response1511 when an admin user attempts a request1512 returns HTML data1513 returns JSON data1514Groups::EpicsController1515 when epics feature is disabled1516 GET #index1517 behaves like 404 status1518 returns 404 status1519 GET #new1520 behaves like 404 status1521 returns 404 status1522 GET #show1523 behaves like 404 status1524 returns 404 status1525 PUT #update1526 behaves like 404 status1527 returns 404 status1528 when epics feature is enabled1529 GET #index1530 returns index1531 GET #discussions1532 when issue note is returned1533 project default namespace1534 behaves like issue link presence1535 the link to the issue is included1536 project group namespace1537 behaves like issue link presence1538 the link to the issue is included1539 setting notes filter1540 behaves like issuable notes filter1541 sets discussion filter1542 expires notes e-tag cache for issuable if filter changed1543 does not expires notes e-tag cache for issuable if filter did not change1544 does not set notes filter when database is in read-only mode1545 does not set notes filter when persist_filter param is false1546 returns only user comments1547 returns only activity notes1548 when filter is set to "only_comments"1549 does not merge label event notes1550 GET #new1551 renders template1552 with unauthorized user1553 returns a not found 404 response1554 GET #show1555 when format is HTML1556 renders template1557 logs the view with Gitlab::Search::RecentEpics1558 with unauthorized user1559 returns a not found 404 response1560 behaves like disabled when using an external authorization service1561 works when the feature is not enabled1562 renders a 404 with a message when the feature is enabled1563 when format is JSON1564 returns epic1565 with unauthorized user1566 returns a not found 404 response1567 PUT #update1568 with correct basic params1569 returns status 2001570 updates the epic correctly1571 when state_event param is close1572 allows epic to be closed1573 when state_event param is reopen1574 allows epic to be reopened1575 GET #realtime_changes1576 returns epic1577 with unauthorized user1578 returns a not found 404 response1579 behaves like disabled when using an external authorization service1580 works when the feature is not enabled1581 renders a 404 with a message when the feature is enabled1582 #create1583 when user has permissions to create an epic1584 when all required parameters are passed1585 returns 200 response1586 creates a new epic1587 assigns labels to the new epic1588 returns the correct json1589 behaves like disabled when using an external authorization service1590 works when the feature is not enabled1591 renders a 404 with a message when the feature is enabled1592 when required parameter is missing1593 returns 422 response1594 does not create a new epic1595 when the endpoint receives requests above the limit1596 prevents from creating more epics1597 logs the event on auth.log1598 with unauthorized user1599 returns a not found 404 response1600 DELETE #destroy1601 rejects a developer to destroy an epic1602 deletes the epic1603 POST #bulk_update1604 with correct params1605 when group bulk edit feature is disabled1606 returns status 4041607 does not update merge requests milestone1608 when group bulk edit feature is enabled1609 returns status 2001610 updates epics labels1611 behaves like DescriptionDiffActions1613 when license is available1614 GET description_diff1615 returns the diff with the previous version1616 returns the diff with the previous version of the specified start_version_id1617 when description version is from another issuable1618 returns 4041619 when start_version_id is from another issuable1620 returns 4041621 when start_version_id is deleted1622 returns 4041623 when description version is deleted1624 returns 4041625 DELETE description_diff1626 returns 2001627 when start_version_id is present1628 returns 2001629 when version is already deleted1630 returns 4041631 when user cannot admin issuable1632 returns 4041633 when license is not available1634 GET description_diff1635 returns 4041636 DELETE description_diff1637 returns 4041638GroupsController1639 GET #show1640 behaves like namespace storage limit alert1641 does render1642 when user has dismissed already1643 does not render alert1644 behaves like seat count alert1645 when the namespace qualifies for the alert1646 sets the seat_count_data1647 when the namespace does not qualify for the alert1648 sets the seat_count_data to nil1649 with free user cap performance concerns1650 avoids extra user count queries1651 GET #activity1652 when authorized1653 when group events are available1654 includes events from group and subgroups1655 when group events are not available1656 does not include events from group and subgroups1657 when unauthorized1658 includes only events visible to user1659 POST #restore1660 when authenticated user can admin the group1661 delayed deletion feature is available1662 success1663 restores the group1664 renders success notice upon restoring1665 failure1666 does not restore the group1667 redirects to group edit page1668 delayed deletion feature is not available1669 returns 4041670 when authenticated user cannot admin the group1671 returns 4041672 DELETE #destroy1673 when authenticated user can admin the group1674 delayed deletion feature is available1675 success1676 marks the group for delayed deletion1677 does not immediately delete the group1678 redirects to group path with notice about delayed deletion1679 failure1680 does not mark the group for deletion1681 redirects to group edit page1682 when group is already marked for deletion1683 when permanently_remove param is set1684 deletes the group immediately1685 when permanently_remove param is not set1686 does nothing1687 delayed deletion feature is not available1688 immediately schedules a group destroy1689 redirects to root page with alert about immediate deletion1690 when authenticated user cannot admin the group1691 returns 4041692 POST #create1693 authorization1694 allows an auditor with "can_create_group" set to true to create a group1695 behaves like GroupInviteMembers1696 when inviting members1697 without valid emails in the params1698 no invites generated by default1699 does not track the event1700 with valid emails in the params1701 adds users with developer access and ignores blank and invalid emails1702 tracks the event1703 when creating a group with `default_branch_protection` attribute1704 authenticated as an admin1705 feature_enabled: false, setting_enabled: false, default_branch_protection: 01706 behaves like creates the group with the expected `default_branch_protection` value1707 creates the group with the expected `default_branch_protection` value1708 feature_enabled: false, setting_enabled: true, default_branch_protection: 01709 behaves like creates the group with the expected `default_branch_protection` value1710 creates the group with the expected `default_branch_protection` value1711 feature_enabled: true, setting_enabled: false, default_branch_protection: 01712 behaves like creates the group with the expected `default_branch_protection` value1713 creates the group with the expected `default_branch_protection` value1714 feature_enabled: false, setting_enabled: false, default_branch_protection: 01715 behaves like creates the group with the expected `default_branch_protection` value1716 creates the group with the expected `default_branch_protection` value1717 authenticated a normal user1718 feature_enabled: false, setting_enabled: false, default_branch_protection: 01719 behaves like creates the group with the expected `default_branch_protection` value1720 creates the group with the expected `default_branch_protection` value1721 feature_enabled: false, setting_enabled: true, default_branch_protection: 01722 behaves like creates the group with the expected `default_branch_protection` value1723 creates the group with the expected `default_branch_protection` value1724 feature_enabled: true, setting_enabled: false, default_branch_protection: 21725 behaves like creates the group with the expected `default_branch_protection` value1726 creates the group with the expected `default_branch_protection` value1727 feature_enabled: false, setting_enabled: false, default_branch_protection: 01728 behaves like creates the group with the expected `default_branch_protection` value1729 creates the group with the expected `default_branch_protection` value1730 PUT #update1731 when max_pages_size param is specified1732 when user is an admin with admin mode enabled1733 updates max_pages_size1734 when user is an admin with admin mode disabled1735 does not update max_pages_size1736 when user is not an admin1737 does not update max_pages_size1738 when `max_personal_access_token_lifetime` is specified1739 without `personal_access_token_expiration_policy` licensed1740 does not update the attribute1741 doesn't call the update lifetime service1742 with personal_access_token_expiration_policy licensed1743 when `max_personal_access_token_lifetime` is updated to a non-null value1744 updates the attribute1745 executes the update lifetime service1746 when `max_personal_access_token_lifetime` is updated to null value1747 updates the attribute1748 doesn't call the update lifetime service1749 when `code_suggestions` is specified1750 with `ai_assist_ui_enabled` enabled1751 when enabling1752 allows the parameter1753 when disabling1754 allows the parameter1755 when group is a subgroup1756 does not allow changes to a subgroup1757 with `ai_assist_ui_enabled` disabled1758 does not allow the parameter1759 when `default_branch_protection` is specified1760 authenticated as admin1761 feature_enabled: false, setting_enabled: false, default_branch_protection: 01762 behaves like updates the attribute1763 updates the attribute1764 feature_enabled: false, setting_enabled: true, default_branch_protection: 01765 behaves like updates the attribute1766 updates the attribute1767 feature_enabled: true, setting_enabled: false, default_branch_protection: 01768 behaves like updates the attribute1769 updates the attribute1770 feature_enabled: false, setting_enabled: false, default_branch_protection: 01771 behaves like updates the attribute1772 updates the attribute1773 authenticated as group owner1774 feature_enabled: false, setting_enabled: false, default_branch_protection: 01775 behaves like updates the attribute1776 updates the attribute1777 feature_enabled: false, setting_enabled: true, default_branch_protection: 01778 behaves like updates the attribute1779 updates the attribute1780 feature_enabled: true, setting_enabled: false, default_branch_protection: 21781 behaves like updates the attribute1782 updates the attribute1783 feature_enabled: false, setting_enabled: false, default_branch_protection: 01784 behaves like updates the attribute1785 updates the attribute1786 when `delayed_project_removal` and `lock_delayed_project_removal` params are specified1787 when feature is available1788 when the feature flag `always_perform_delayed_deletion` is disabled1789 behaves like allows storing of settings1790 allows storing of settings1791 behaves like does not allow storing of settings1792 does not allow storing of settings1793 when feature is not available1794 behaves like does not allow storing of settings1795 does not allow storing of settings1796 when `prevent_forking_outside_group` is specified1797 authenticated as group owner1798 feature_enabled: false, prevent_forking_outside_group: false, result: nil1799 behaves like updates the attribute if needed1800 updates the attribute1801 feature_enabled: false, prevent_forking_outside_group: true, result: nil1802 behaves like updates the attribute if needed1803 updates the attribute1804 feature_enabled: true, prevent_forking_outside_group: false, result: false1805 behaves like updates the attribute if needed1806 updates the attribute1807 feature_enabled: true, prevent_forking_outside_group: true, result: true1808 behaves like updates the attribute if needed1809 updates the attribute1810 when `new_user_signups_cap` is specified1811 authenticated as group owner1812 new_user_signups_cap: nil, result: nil, status: :found1813 behaves like updates the attribute1814 updates the attribute1815 new_user_signups_cap: 10, result: 10, status: :found1816 behaves like updates the attribute1817 updates the attribute1818 when group feature setting `wiki_access_level` is specified1819 updates the attribute1820 when group wiki licensed feature is not enabled for the group1821 does not update the attribute1822 when updating ip_restriction_ranges is specified1823 for users who have the usage_ping_features activated1824 updates the attribute1825 for users who don't have the usage_ping_features activated1826 does not update the attribute1827 #ai_assist_ui_enabled?1828 feature_ai_assist_ui: false, feature_ai_assist: false, ai_assist_flag: false, current_group: group, check_namespace_plan: false, result: false1829 is expected to eq false1830 feature_ai_assist_ui: false, feature_ai_assist: false, ai_assist_flag: false, current_group: nil, check_namespace_plan: false, result: false1831 is expected to eq false1832 feature_ai_assist_ui: false, feature_ai_assist: false, ai_assist_flag: false, current_group: subgroup, check_namespace_plan: false, result: false1833 is expected to eq false1834 feature_ai_assist_ui: false, feature_ai_assist: false, ai_assist_flag: false, current_group: group, check_namespace_plan: true, result: false1835 is expected to eq false1836 feature_ai_assist_ui: false, feature_ai_assist: false, ai_assist_flag: false, current_group: nil, check_namespace_plan: true, result: false1837 is expected to eq false1838 feature_ai_assist_ui: false, feature_ai_assist: false, ai_assist_flag: false, current_group: subgroup, check_namespace_plan: true, result: false1839 is expected to eq false1840 feature_ai_assist_ui: false, feature_ai_assist: true, ai_assist_flag: true, current_group: group, check_namespace_plan: false, result: false1841 is expected to eq false1842 feature_ai_assist_ui: false, feature_ai_assist: true, ai_assist_flag: true, current_group: nil, check_namespace_plan: false, result: false1843 is expected to eq false1844 feature_ai_assist_ui: false, feature_ai_assist: true, ai_assist_flag: true, current_group: subgroup, check_namespace_plan: false, result: false1845 is expected to eq false1846 feature_ai_assist_ui: false, feature_ai_assist: true, ai_assist_flag: true, current_group: group, check_namespace_plan: true, result: false1847 is expected to eq false1848 feature_ai_assist_ui: false, feature_ai_assist: true, ai_assist_flag: true, current_group: nil, check_namespace_plan: true, result: false1849 is expected to eq false1850 feature_ai_assist_ui: false, feature_ai_assist: true, ai_assist_flag: true, current_group: subgroup, check_namespace_plan: true, result: false1851 is expected to eq false1852 feature_ai_assist_ui: false, feature_ai_assist: false, ai_assist_flag: true, current_group: group, check_namespace_plan: false, result: false1853 is expected to eq false1854 feature_ai_assist_ui: false, feature_ai_assist: false, ai_assist_flag: true, current_group: nil, check_namespace_plan: false, result: false1855 is expected to eq false1856 feature_ai_assist_ui: false, feature_ai_assist: false, ai_assist_flag: true, current_group: subgroup, check_namespace_plan: false, result: false1857 is expected to eq false1858 feature_ai_assist_ui: false, feature_ai_assist: false, ai_assist_flag: true, current_group: group, check_namespace_plan: true, result: false1859 is expected to eq false1860 feature_ai_assist_ui: false, feature_ai_assist: false, ai_assist_flag: true, current_group: nil, check_namespace_plan: true, result: false1861 is expected to eq false1862 feature_ai_assist_ui: false, feature_ai_assist: false, ai_assist_flag: true, current_group: subgroup, check_namespace_plan: true, result: false1863 is expected to eq false1864 feature_ai_assist_ui: true, feature_ai_assist: false, ai_assist_flag: false, current_group: group, check_namespace_plan: false, result: false1865 is expected to eq false1866 feature_ai_assist_ui: true, feature_ai_assist: false, ai_assist_flag: false, current_group: nil, check_namespace_plan: false, result: false1867 is expected to eq false1868 feature_ai_assist_ui: true, feature_ai_assist: false, ai_assist_flag: false, current_group: subgroup, check_namespace_plan: false, result: false1869 is expected to eq false1870 feature_ai_assist_ui: true, feature_ai_assist: false, ai_assist_flag: false, current_group: group, check_namespace_plan: true, result: false1871 is expected to eq false1872 feature_ai_assist_ui: true, feature_ai_assist: false, ai_assist_flag: false, current_group: nil, check_namespace_plan: true, result: false1873 is expected to eq false1874 feature_ai_assist_ui: true, feature_ai_assist: false, ai_assist_flag: false, current_group: subgroup, check_namespace_plan: true, result: false1875 is expected to eq false1876 feature_ai_assist_ui: true, feature_ai_assist: true, ai_assist_flag: false, current_group: group, check_namespace_plan: false, result: false1877 is expected to eq false1878 feature_ai_assist_ui: true, feature_ai_assist: true, ai_assist_flag: false, current_group: nil, check_namespace_plan: false, result: false1879 is expected to eq false1880 feature_ai_assist_ui: true, feature_ai_assist: true, ai_assist_flag: false, current_group: subgroup, check_namespace_plan: false, result: false1881 is expected to eq false1882 feature_ai_assist_ui: true, feature_ai_assist: true, ai_assist_flag: false, current_group: group, check_namespace_plan: true, result: false1883 is expected to eq false1884 feature_ai_assist_ui: true, feature_ai_assist: true, ai_assist_flag: false, current_group: nil, check_namespace_plan: true, result: false1885 is expected to eq false1886 feature_ai_assist_ui: true, feature_ai_assist: true, ai_assist_flag: false, current_group: subgroup, check_namespace_plan: true, result: false1887 is expected to eq false1888 feature_ai_assist_ui: true, feature_ai_assist: true, ai_assist_flag: true, current_group: group, check_namespace_plan: false, result: false1889 is expected to eq false1890 feature_ai_assist_ui: true, feature_ai_assist: true, ai_assist_flag: true, current_group: nil, check_namespace_plan: false, result: false1891 is expected to eq false1892 feature_ai_assist_ui: true, feature_ai_assist: true, ai_assist_flag: true, current_group: subgroup, check_namespace_plan: false, result: false1893 is expected to eq false1894 feature_ai_assist_ui: true, feature_ai_assist: true, ai_assist_flag: true, current_group: group, check_namespace_plan: true, result: true1895 is expected to eq true1896 feature_ai_assist_ui: true, feature_ai_assist: true, ai_assist_flag: true, current_group: nil, check_namespace_plan: true, result: false1897 is expected to eq false1898 feature_ai_assist_ui: true, feature_ai_assist: true, ai_assist_flag: true, current_group: subgroup, check_namespace_plan: true, result: false1899 is expected to eq false1900 feature_ai_assist_ui: true, feature_ai_assist: false, ai_assist_flag: true, current_group: group, check_namespace_plan: false, result: false1901 is expected to eq false1902 feature_ai_assist_ui: true, feature_ai_assist: false, ai_assist_flag: true, current_group: nil, check_namespace_plan: false, result: false1903 is expected to eq false1904 feature_ai_assist_ui: true, feature_ai_assist: false, ai_assist_flag: true, current_group: subgroup, check_namespace_plan: false, result: false1905 is expected to eq false1906 feature_ai_assist_ui: true, feature_ai_assist: false, ai_assist_flag: true, current_group: group, check_namespace_plan: true, result: false1907 is expected to eq false1908 feature_ai_assist_ui: true, feature_ai_assist: false, ai_assist_flag: true, current_group: nil, check_namespace_plan: true, result: false1909 is expected to eq false1910 feature_ai_assist_ui: true, feature_ai_assist: false, ai_assist_flag: true, current_group: subgroup, check_namespace_plan: true, result: false1911 is expected to eq false1912 feature_ai_assist_ui: false, feature_ai_assist: true, ai_assist_flag: false, current_group: group, check_namespace_plan: false, result: false1913 is expected to eq false1914 feature_ai_assist_ui: false, feature_ai_assist: true, ai_assist_flag: false, current_group: nil, check_namespace_plan: false, result: false1915 is expected to eq false1916 feature_ai_assist_ui: false, feature_ai_assist: true, ai_assist_flag: false, current_group: subgroup, check_namespace_plan: false, result: false1917 is expected to eq false1918 feature_ai_assist_ui: false, feature_ai_assist: true, ai_assist_flag: false, current_group: group, check_namespace_plan: true, result: false1919 is expected to eq false1920 feature_ai_assist_ui: false, feature_ai_assist: true, ai_assist_flag: false, current_group: nil, check_namespace_plan: true, result: false1921 is expected to eq false1922 feature_ai_assist_ui: false, feature_ai_assist: true, ai_assist_flag: false, current_group: subgroup, check_namespace_plan: true, result: false1923 is expected to eq false1924API::Discussions1925 when noteable is an Epic1926 behaves like discussions API1927 GET /groups/:id/epics/:noteable_id/discussions1928 returns an array of discussions1929 returns a 404 error when noteable id not found1930 returns 404 when not authorized1931 GET /groups/:id/epics/:noteable_id/discussions/:discussion_id1932 returns a discussion by id1933 returns a 404 error if discussion not found1934 POST /groups/:id/epics/:noteable_id/discussions1935 creates a new note1936 returns a 400 bad request error if body not given1937 returns a 401 unauthorized error if user not authenticated1938 tracks a Notes::CreateService event1939 when an admin or owner makes the request1940 accepts the creation date to be set1941 when user does not have access to read the discussion1942 responds with 4041943 when a project is public with private repo access1944 when user is not a team member of private repo1945 creating a new note1946 raises 404 error1947 fetching a discussion1948 raises 404 error1949 POST /groups/:id/epics/:noteable_id/discussions/:discussion_id/notes1950 adds a new note to the discussion1951 returns a 400 bad request error if body not given1952 when the discussion is an individual note1953 creates a new discussion1954 PUT /groups/:id/epics/:noteable_id/discussions/:discussion_id/notes/:note_id1955 returns modified note1956 returns a 404 error when note id not found1957 returns a 400 bad request error if body not given1958 DELETE /groups/:id/epics/:noteable_id/discussions/:discussion_id/notes/:note_id1959 deletes a note1960 returns a 404 error when note id not found1961 behaves like 412 response1962 for a modified ressource1963 returns 412 with a JSON error1964 for an unmodified ressource1965 returns 204 with an empty body1966Projects::MergeRequestsController1967 GET #edit1968 when the project requires code owner approval1969 does not cause an extra queries when code owner rules are present1970 does not cause extra queries when multiple code owner rules are present1971 GET #index1972 avoids N+11973 security_reports1974 when the user can not read project security resources1975 responds with 4041976 when the user can read project security resources1977 when the pipeline is pending1978 returns 204 HTTP status along with the `Poll-Interval` header1979 when the pipeline is not pending1980 when the given type is invalid1981 responds with 4001982 when the given type is valid1983 when comparison is being processed1984 returns 204 HTTP status along with the `Poll-Interval` header1985 when comparison is done1986 when the comparison is errored1987 responds with 4001988 when the comparision is succeeded1989 responds with 200 along with the report payload1990Projects::MirrorsController1991 setting up a remote mirror1992 when the current project is a mirror1993 allows to create a remote mirror1994 allows to create a remote mirror with mirror_branch_regex1995 allows only mirror protected branches1996 allows mirror all branches1997 do not allow invalid regex1998 when `mirror_only_branches_match_regex` FF is disabled1999 ignores mirror_branch_regex parameter2000 when the current project has a remote mirror2001 mirror_user is unset2002 sets up a pull mirror with the mirror user set to the signed-in user2003 mirror_user is not the current user2004 sets up a pull mirror with the mirror user set to the signed-in user2005 setting up a mirror2006 when mirrors are disabled2007 when user is admin2008 creates a new mirror2009 when user is not an admin2010 does not create a new mirror2011 when mirrors are enabled2012 when project does not have a mirror2013 allows to create a mirror2014 when project has a mirror2015 is able to disable the mirror2016 forcing an update on a pull mirror2017 forces update2018 #update2019 JSON2020 processes a successful update2021 processes an unsuccessful update2022 preserves the import_data object when the ID isn't in the request2023 sets ssh_known_hosts_verified_at and verified_by when the update sets known hosts2024 unsets ssh_known_hosts_verified_at and verified_by when the update unsets known hosts2025 only allows the current user to be the mirror user2026 with a valid URL for a pull2027 processes a successful update2028 with a invalid URL for a pull2029 processes an unsuccessful update2030 with an invalid port for a pull2031 processes an unsuccessful update2032 setting up project mirror branches setting2033 mirror all branches2034 enable mirror_branch_regex would ignore only_mirror_protected_branches2035 enable mirror_branch_regex would disable only_protected_branches2036 do not allow invalid regex2037 when `mirror_only_branches_match_regex` FF is disabled2038 ignores mirror_branch_regex parameter2039API::Users2040 updating name2041 behaves like PUT request permissions for admin mode2042 behaves like when admin2043 behaves like makes request2044 returns2045 behaves like makes request2046 returns2047 behaves like when user2048 returns2049 behaves like makes request2050 returns2051 when authenticated and ldap is enabled2052 returns non-ldap user2053 when `disable_name_update_for_users` feature is available2054 when the ability to update their name is disabled for users2055 behaves like admin can update the name of a user2056 updates the user with new name2057 when the ability to update their name is not disabled for users2058 behaves like admin can update the name of a user2059 updates the user with new name2060 when `disable_name_update_for_users` feature is not available2061 behaves like admin can update the name of a user2062 updates the user with new name2063 extended audit events2064 PUT /users/:id2065 creates audit event when updating user with new password2066 behaves like PUT request permissions for admin mode2067 behaves like when admin2068 behaves like makes request2069 returns2070 behaves like makes request2071 returns2072 behaves like when user2073 returns2074 behaves like makes request2075 returns2076 POST /users/:id/block2077 creates audit event when blocking user2078 behaves like POST request permissions for admin mode2079 behaves like when admin2080 behaves like makes request2081 returns2082 behaves like makes request2083 returns2084 behaves like when user2085 returns2086 behaves like makes request2087 returns2088 POST /user/keys2089 creates audit event when user adds a new SSH key2090 POST /users/:id/keys2091 creates audit event when admin adds a new key for a user2092 behaves like POST request permissions for admin mode2093 behaves like when admin2094 behaves like makes request2095 returns2096 behaves like makes request2097 returns2098 behaves like when user2099 returns2100 behaves like makes request2101 returns2102 shared_runners_minutes_limit2103 PUT /users/:id2104 when user is an admin2105 updates shared_runners_minutes_limit2106 when user is not an admin2107 cannot update their own shared_runners_minutes_limit2108 when auditor field is specified2109 PUT /users/:id2110 when user is an admin2111 updates auditor status for the user2112 when licensed_feature is not available2113 cannot update auditor status for the user2114 when user is not an admin2115 cannot update auditor status for the user2116 POST /users/2117 behaves like POST request permissions for admin mode2118 behaves like when admin2119 behaves like makes request2120 returns2121 behaves like makes request2122 returns2123 behaves like when user2124 returns2125 behaves like makes request2126 returns2127 when user is an admin2128 creates user with auditor status2129 when licensed_feature is not available2130 cannot create user with auditor status2131 when user is not an admin2132 cannot create user with auditor status2133 with group SAML2134 creates user with new identity2135 creates user with new identity without sending reset password email2136 updates user with new identity2137 fails to update user with nonexistent identity2138 fails to update user with nonexistent provider2139 contains provisioned_by_group_id parameter2140 behaves like POST request permissions for admin mode2141 behaves like when admin2142 behaves like makes request2143 returns2144 behaves like makes request2145 returns2146 behaves like when user2147 returns2148 behaves like makes request2149 returns2150 GET /api/users?saml_provider_id2151 querying users by saml provider id2152 returns only users for the saml_provider_id2153 GET /user/:id2154 when authenticated2155 as an admin2156 and user has a plan2157 contains is_auditor parameter2158 and user is not a trial user2159 contains plan and trial2160 and user is a trial user2161 contains plan and trial2162 and user has no plan2163 returns `nil` for both plan and trial2164 as a user2165 does not contain plan and trial info2166 does not contain is_auditor parameter2167 does not contain provisioned_by_group_id parameter2168 when not authenticated2169 does not contain plan and trial info2170SearchController2171 GET #show2172 unique users tracking2173 Snowplow event tracking2174 emits all search events2175 i_search_advanced2176 behaves like tracking unique hll events2177 tracks unique event2178 i_search_paid2179 on Gitlab.com2180 behaves like tracking unique hll events2181 tracks unique event2182 self-managed instance2183 does not track if there is no license available2184 license is available2185 behaves like tracking unique hll events2186 tracks unique event2187 behaves like support for elasticsearch timeouts2188 renders a 408 when a timeout occurs2189 GET #aggregations2190 raises an error if search term is missing2191 returns an error if search term is invalid2192 sets correct cache control headers2193 behaves like when the user cannot read cross project2194 blocks access without a project_id2195 allows access with a project_id2196 behaves like with external authorization service enabled2197 renders a 403 when no project is given2198 renders a 200 when a project was set2199 behaves like support for elasticsearch timeouts2200 renders a 408 when a timeout occurs2201 behaves like rate limited endpoint2202 when rate limiter enabled2203 logs request and declines it when endpoint called more than the threshold2204 when rate limiter is disabled2205 does not log request and does not block the request2206 blobs scope2207 when elasticsearch is disabled2208 returns an empty array2209 when elasticsearch is enabled2210 returns aggregations2211 issue scope2212 when elasticsearch is disabled2213 returns an empty array2214 when elasticsearch is enabled2215 returns aggregations2216 when on gitlab.com2217 sets correct cache control headers2218 #append_info_to_payload2219 when using elasticsearch2220 appends the type of search used as advanced2221 when using basic search2222 appends the type of search used as basic2223Git HTTP requests2224 User with no identities2225 when Kerberos token is provided2226 when authentication fails because of invalid Kerberos token2227 responds with status 401 Unauthorized2228 when authentication fails because of unknown Kerberos identity2229 responds with status 401 Unauthorized2230 when authentication succeeds2231 when the user has access to the project2232 complies with RFC45592233 when the user is blocked2234 responds with status 403 Forbidden2235 when the user isn't blocked2236 responds with status 200 OK2237 updates the user last activity2238 when the user doesn't have access to the project2239 responds with status 404 Not Found2240 complies with RFC45592241 when license is not provided2242 behaves like pulls are allowed2243 is expected to eq "application/vnd.gitlab-workhorse+json"2244 behaves like pushes are allowed2245 is expected to eq "application/vnd.gitlab-workhorse+json"2246 when SSO is enforced2247 behaves like pulls are allowed2248 is expected to eq "application/vnd.gitlab-workhorse+json"2249 when user cannot use password-based login2250 with feature flag switched off2251 behaves like pulls are allowed2252 is expected to eq "application/vnd.gitlab-workhorse+json"2253 behaves like pushes are allowed2254 is expected to eq "application/vnd.gitlab-workhorse+json"2255 with feature flag switched on2256 responds with status 401 Unauthorized for pull action2257 responds with status 401 Unauthorized for push action2258 when username and personal access token are provided2259 behaves like pulls are allowed2260 is expected to eq "application/vnd.gitlab-workhorse+json"2261 behaves like pushes are allowed2262 is expected to eq "application/vnd.gitlab-workhorse+json"2263 when user has 2FA enabled2264 when username and personal access token are provided2265 rejects the push attempt for read_repository scope2266 accepts the push attempt for write_repository scope2267 accepts the pull attempt for read_repository scope2268 accepts the pull attempt for api scope2269 accepts the push attempt for api scope2270 behaves like pulls are allowed2271 is expected to eq "application/vnd.gitlab-workhorse+json"2272 behaves like pushes are allowed2273 is expected to eq "application/vnd.gitlab-workhorse+json"2274 when namespace storage limits are enforced2275 behaves like pushes are allowed2276 is expected to eq "application/vnd.gitlab-workhorse+json"2277 when the limit has been exceeded2278 behaves like pushes are allowed2279 is expected to eq "application/vnd.gitlab-workhorse+json"2280API::Internal::Base2281 POST /internal/post_receive2282 when the push was redirected from a Geo secondary to the primary2283 includes a message advising a redirection occurred2284 POST /internal/allowed2285 project alias2286 without premium license2287 project matches a project alias2288 does not allow access because project can't be found2289 with premium license2290 project matches a project alias2291 allows access2292 project doesn't match a project alias2293 does not allow access because project can't be found2294 smartcard session required2295 user with a smartcard session2296 allows access2297 user without a smartcard session2298 does not allow access2299 with the setting off2300 allows access2301 ip restriction2302 with or without check_ip parameter2303 check_ip_present: false, ip: nil, status: 2002304 modifies access2305 check_ip_present: true, ip: "150.168.0.1", status: 2002306 modifies access2307 check_ip_present: true, ip: "150.168.0.2", status: 4042308 modifies access2309 maintenance mode enabled2310 when action is git push2311 returns forbidden2312 when action is not git push2313 returns success2314 with Deploy Key authentication2315 passes the deploy key to the auditor context2316 git audit streaming event2317 behaves like sends git audit streaming event2318 for public groups and projects2319 when user not logged in2320 sends the audit streaming event2321 for private groups and projects2322 when user logged in2323 sends the audit streaming event2324 with a namespace storage size limit2325 with a project2326 requests without changes2327 returns ok when the size limit has been exceeded2328 returns ok when the size is under the limit2329 requests with changes2330 rejects git push when the size limit has been exceeded2331 rejects git push when the push size would exceed the limit2332 accepts git push when the size is under the limit2333 with a snippet2334 rejects git push when the size limit has been exceeded2335 with a wiki2336 rejects git push when the size limit has been exceeded2337 when namespace storage size limits are enabled only for free namespaces2338 with a project in a paid namespace2339 requests with changes2340 accepts git push when the project repository size limit has been exceeded but is within the additional purchased storage size2341 POST /internal/lfs_authenticate2342 for a secondary node2343 returns the repository_http_path at the primary node2344 POST /internal/personal_access_token2345 with a max token lifetime on the instance2346 returns an error message when the expiry date exceeds the max token lifetime2347 returns a valid token when the expiry date does not exceed the max token lifetime2348 POST /internal/two_factor_manual_otp_check2349 behaves like actor key validations2350 key does not exist2351 returns an error message2352 key without user2353 returns an error message2354 when the key is a deploy key2355 returns an error message2356 when the two factor is enabled2357 when the OTP is valid2358 registers a new OTP session and returns success2359 when the OTP is invalid2360 is not success2361 locks the user out after maximum attempts is reached2362 logs the failure2363 behaves like an auditable failed authentication2364 log an audit event2365 when the two factor is disabled2366 returns an error message2367 feature flag is disabled2368 when two-factor is enabled for the user2369 returns user two factor config2370 licensed feature is not available2371 when two-factor is enabled for the user2372 returns user two factor config2373 POST /internal/two_factor_push_otp_check2374 behaves like actor key validations2375 key does not exist2376 returns an error message2377 key without user2378 returns an error message2379 when the key is a deploy key2380 returns an error message2381 when the two factor is enabled2382 when the OTP is valid2383 registers a new OTP session and returns success2384 when the OTP is invalid2385 is not success2386 when the two factor is disabled2387 returns an error message2388 feature flag is disabled2389 when two-factor is enabled for the user2390 returns user two factor config2391 licensed feature is not available2392 when two-factor is enabled for the user2393 returns user two factor config2394Groups::ContributionAnalyticsController2395 #authorize_read_contribution_analytics!2396 when feature is available to the group2397 when user is an auditor2398 allows access2399 when user has access to the group2400 when user has access to the feature2401 renders 2002402 when user does not have access to the feature2403 renders 4042404 #check_contribution_analytics_available!2405 when feature is not available to the group2406 renders 4042407 with contributions2408 sets instance variables properly2409 returns member contributions JSON when format is JSON2410 includes projects in subgroups2411 excludes projects outside of the group2412 does not cause N+1 queries when the format is JSON2413 with views2414 avoids a N+1 query in #show2415 GET #show2416 behaves like disabled when using an external authorization service2417 works when the feature is not enabled2418 renders a 404 with a message when the feature is enabled2419 behaves like tracking unique visits2420 tracks unique visit if the format is HTML2421 tracks unique visit if DNT is not enabled2422 does not track unique visit if DNT is enabled2423 does not track unique visit if the format is JSON2424 behaves like Snowplow event tracking with RedisHLL context2425 behaves like Snowplow event tracking2426 is emitted2427getting epics information2428 query for epics which start with an iid2429 when a valid iidStartsWith query is provided2430 returns the expected epics2431 when invalid iidStartsWith query is provided2432 fails with negative number2433 fails with string2434 fails if query contains line breaks2435 query for epics by created_at and updated_at2436 filters by createdBefore2437 filters by createdAfter2438 filters by updatedBefore2439 filters by updatedAfter2440 filters by a combination of created parameters provided2441 filters by a combination of created/updated parameters provided2442 returns nothing for impossible parameters2443 query for epics by time frame2444 when start_date and end_date are present2445 returns epics within timeframe2446 when only start_date is present2447 raises error2448 when only end_date is present2449 raises error2450 query for epics with events2451 can lookahead to prevent N+1 queries2452 query for epics with ancestors2453 returns only ancestors up to the last accessible ancestor2454 when user is member of cross-hierarchy group2455 returns all ancestors2456 when requesting awardEmoji2457 includes award emojis2458 N+1 query checks2459 when requesting `award_emoji`2460 prevents N+1 queries2461 N+1 query test contains data2462 when requesting `health_status`2463 prevents N+1 queries2464 query for epics including their count2465 returns epics total count2466API::GroupHooks2467 behaves like web-hook API endpoints2468 GET /groups/:id/hooks2469 authorized user2470 returns all hooks2471 when user is forbidden2472 prevents access to hooks2473 when user is unauthorized2474 prevents access to hooks2475 the hook has URL variables2476 returns the names of the url variables2477 GET /groups/:id/hooks/:hook_id2478 authorized user2479 returns a project hook2480 returns a 404 error if hook id is not available2481 the hook is disabled2482 has the correct alert status2483 the hook is backed-off2484 has the correct alert status2485 when user is forbidden2486 does not access an existing hook2487 when user is unauthorized2488 does not access an existing hook2489 POST /groups/:id/hooks2490WARNING: ignoring the provided expectation message argument (:push_events) since it is not a string or a proc.2491WARNING: ignoring the provided expectation message argument (:issues_events) since it is not a string or a proc.2492WARNING: ignoring the provided expectation message argument (:confidential_issues_events) since it is not a string or a proc.2493WARNING: ignoring the provided expectation message argument (:merge_requests_events) since it is not a string or a proc.2494WARNING: ignoring the provided expectation message argument (:tag_push_events) since it is not a string or a proc.2495WARNING: ignoring the provided expectation message argument (:note_events) since it is not a string or a proc.2496WARNING: ignoring the provided expectation message argument (:confidential_note_events) since it is not a string or a proc.2497WARNING: ignoring the provided expectation message argument (:job_events) since it is not a string or a proc.2498WARNING: ignoring the provided expectation message argument (:pipeline_events) since it is not a string or a proc.2499WARNING: ignoring the provided expectation message argument (:wiki_page_events) since it is not a string or a proc.2500WARNING: ignoring the provided expectation message argument (:deployment_events) since it is not a string or a proc.2501WARNING: ignoring the provided expectation message argument (:releases_events) since it is not a string or a proc.2502WARNING: ignoring the provided expectation message argument (:subgroup_events) since it is not a string or a proc.2503 adds hook2504 adds the token without including it in the response2505 returns a 400 error if url not given2506 returns a 400 error if no parameters are provided2507WARNING: ignoring the provided expectation message argument (:push_events) since it is not a string or a proc.2508WARNING: ignoring the provided expectation message argument (:issues_events) since it is not a string or a proc.2509WARNING: ignoring the provided expectation message argument (:confidential_issues_events) since it is not a string or a proc.2510WARNING: ignoring the provided expectation message argument (:merge_requests_events) since it is not a string or a proc.2511WARNING: ignoring the provided expectation message argument (:tag_push_events) since it is not a string or a proc.2512WARNING: ignoring the provided expectation message argument (:note_events) since it is not a string or a proc.2513WARNING: ignoring the provided expectation message argument (:confidential_note_events) since it is not a string or a proc.2514WARNING: ignoring the provided expectation message argument (:job_events) since it is not a string or a proc.2515WARNING: ignoring the provided expectation message argument (:pipeline_events) since it is not a string or a proc.2516WARNING: ignoring the provided expectation message argument (:wiki_page_events) since it is not a string or a proc.2517WARNING: ignoring the provided expectation message argument (:deployment_events) since it is not a string or a proc.2518WARNING: ignoring the provided expectation message argument (:releases_events) since it is not a string or a proc.2519WARNING: ignoring the provided expectation message argument (:subgroup_events) since it is not a string or a proc.2520 sets default values for events2521 returns a 422 error if token not valid2522 returns a 422 error if url not valid2523 PUT /groups/:id/hooks/:hook_id2524 updates an existing hook2525 updates the URL variables2526 adds the token without including it in the response2527 returns 404 error if hook id not found2528 returns 400 error if no parameters are provided2529 returns a 422 error if url is not valid2530 returns a 422 error if token is not valid2531 DELETE /projects/:id/hooks/:hook_id2532 deletes hook from project2533 returns a 404 error when deleting non existent hook2534 returns a 404 error if hook id not given2535 returns forbidden if a user attempts to delete hooks they do not own2536 behaves like 412 response2537 for a modified ressource2538 returns 412 with a JSON error2539 for an unmodified ressource2540 returns 204 with an empty body2541 PUT /groups/:id/hooks/:hook_id/url_variables/:key2542 sets the variable2543 overwrites existing values2544 returns a 404 error when editing non existent hook2545 returns a 422 error when the key is illegal2546 returns a 422 error when the value is illegal2547 DELETE /groups/:id/hooks/:hook_id/url_variables/:key2548 unsets the variable2549 returns 404 for keys that do not exist2550 returns a 404 error when deleting a variable from a non existent hook2551 behaves like web-hook API endpoints with branch-filter2552 POST /projects/:id/hooks2553 returns a 422 error if branch filter is not valid2554Projects::AuditEventsController2555 GET #index2556 when authorized as auditor2557 tracks search event2558 behaves like when audit_events feature is available2559 renders index with 200 status code2560 invokes AuditEventFinder with correct arguments2561 behaves like AuditEventFinder params2562 has the correct params2563 author2564 when no author entity type is specified2565 behaves like AuditEventFinder params2566 has the correct params2567 when the author entity type is specified2568 behaves like AuditEventFinder params2569 has the correct params2570 ordering2571 when no sort order is specified2572 behaves like orders by id descending2573 orders by id descending2574 when sorting by latest events first2575 behaves like orders by id descending2576 orders by id descending2577 when sorting by oldest events first2578 orders by id ascending2579 when sorting by an unsupported sort order2580 behaves like orders by id descending2581 orders by id descending2582 when invalid date2583 created_before: "invalid-date", created_after: nil2584 returns an error2585 created_before: nil, created_after: true2586 returns an error2587 created_before: "2021-13-10", created_after: nil2588 returns an error2589 created_before: nil, created_after: "2021-02-31"2590 returns an error2591 created_before: "2021-03-31", created_after: "2021-02-31"2592 returns an error2593 when date range is greater than limit2594 behaves like a date range error is returned2595 created_after: "2021-01-01", created_before: "2021-02-02"2596 returns an error2597 created_after: "2022-01-31", created_before: nil2598 returns an error2599 behaves like pagination2600 sets instance variables2601 paginates audit events, without casting a count query2602 behaves like when audit_events feature is not available2603 renders 4042604 when authorized as maintainer2605 tracks search event2606 behaves like when audit_events feature is available2607 renders index with 200 status code2608 invokes AuditEventFinder with correct arguments2609 behaves like AuditEventFinder params2610 has the correct params2611 author2612 when no author entity type is specified2613 behaves like AuditEventFinder params2614 has the correct params2615 when the author entity type is specified2616 behaves like AuditEventFinder params2617 has the correct params2618 ordering2619 when no sort order is specified2620 behaves like orders by id descending2621 orders by id descending2622 when sorting by latest events first2623 behaves like orders by id descending2624 orders by id descending2625 when sorting by oldest events first2626 orders by id ascending2627 when sorting by an unsupported sort order2628 behaves like orders by id descending2629 orders by id descending2630 when invalid date2631 created_before: "invalid-date", created_after: nil2632 returns an error2633 created_before: nil, created_after: true2634 returns an error2635 created_before: "2021-13-10", created_after: nil2636 returns an error2637 created_before: nil, created_after: "2021-02-31"2638 returns an error2639 created_before: "2021-03-31", created_after: "2021-02-31"2640 returns an error2641 when date range is greater than limit2642 behaves like a date range error is returned2643 created_after: "2021-01-01", created_before: "2021-02-02"2644 returns an error2645 created_after: "2022-01-31", created_before: nil2646 returns an error2647 behaves like pagination2648 sets instance variables2649 paginates audit events, without casting a count query2650 behaves like when audit_events feature is not available2651 renders 4042652 unauthorized2653 renders 4042654Groups::Security::CredentialsController2655 GET #index2656 when `credentials_inventory` feature is enabled2657 for a group that enforces group managed accounts2658 for a user with access to view credentials inventory2659 responds with 2002660 filtering by type of credential2661 no credential type specified2662 behaves like filtering by `personal_access_tokens`2663 is expected to contain exactly #<PersonalAccessToken id: 217, user_id: 1020, name: "PAT 216", revoked: false, expires_at: "2023-05-0...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>, #<PersonalAccessToken id: 218, user_id: 1019, name: "PAT 217", revoked: false, expires_at: "2023-05-0...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>, and #<PersonalAccessToken id: 219, user_id: 1020, name: "PAT 218", revoked: false, expires_at: "2023-05-0...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>2664 non-existent credential type specified2665 behaves like filtering by `personal_access_tokens`2666 is expected to contain exactly #<PersonalAccessToken id: 217, user_id: 1020, name: "PAT 216", revoked: false, expires_at: "2023-05-0...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>, #<PersonalAccessToken id: 220, user_id: 1019, name: "PAT 219", revoked: false, expires_at: "2023-05-0...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>, and #<PersonalAccessToken id: 221, user_id: 1020, name: "PAT 220", revoked: false, expires_at: "2023-05-0...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>2667 credential type specified as `personal_access_tokens`2668 behaves like filtering by `personal_access_tokens`2669 is expected to contain exactly #<PersonalAccessToken id: 222, user_id: 1019, name: "PAT 221", revoked: false, expires_at: "2023-05-0...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>, #<PersonalAccessToken id: 223, user_id: 1020, name: "PAT 222", revoked: false, expires_at: "2023-05-0...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>, and #<PersonalAccessToken id: 217, user_id: 1020, name: "PAT 216", revoked: false, expires_at: "2023-05-0...expire_notification_delivered: false, last_used_at: nil, after_expiry_notification_delivered: false>2670 user scope2671 does not show the credentials of a user outside the group2672 credential type specified as `ssh_keys`2673 filters by ssh keys2674 for a user without access to view credentials inventory2675 responds with 4042676 for a group that does not enforce group managed accounts2677 responds with 4042678 when `credentials_inventory` feature is disabled2679 returns 4042680 DELETE #destroy2681 behaves like credentials inventory delete SSH key2682 admin user2683 when `credentials_inventory` feature is enabled2684 and the ssh_key exists2685 and it removes the key2686 renders a success message2687 notifies the key owner2688 and it fails to remove the key2689 renders a failure message2690 and the ssh_key does not exist2691 renders a not found message2692 when `credentials_inventory` feature is disabled2693 returns 4042694 non-admin user2695 returns 4042696 PUT #revoke2697 when `credentials_inventory` feature is enabled2698 for a group that enforces group managed accounts2699 for a user with access to view credentials inventory2700 non-existent personal access token specified2701 behaves like responds with 4042702 is expected to respond with numeric status code not_found2703 with an existing personal access token2704 personal access token is already revoked2705 behaves like displays the flash success message2706 is expected to start with "Revoked personal access token "2707 personal access token is already expired2708 behaves like displays the flash success message2709 is expected to start with "Revoked personal access token "2710 does not have permissions to revoke the credential2711 behaves like responds with 4042712 is expected to respond with numeric status code not_found2713 personal access token is already revoked2714 behaves like displays the flash success message2715 is expected to start with "Revoked personal access token "2716 personal access token is already expired2717 behaves like displays the flash success message2718 is expected to start with "Revoked personal access token "2719 personal access token is not revoked or expired2720 informs the token owner2721 behaves like displays the flash success message2722 is expected to start with "Revoked personal access token "2723 for a user without access to view credentials inventory2724 behaves like responds with 4042725 is expected to respond with numeric status code not_found2726 for a group that does not enforce group managed accounts2727 responds with 4042728 when `credentials_inventory` feature is disabled2729 behaves like responds with 4042730 is expected to respond with numeric status code not_found2731Projects::Security::ConfigurationController2732 GET #show2733 user_role: :guest, security_dashboard_enabled: false, status: :forbidden, selector: nil2734 responds with the correct status2735 when the "Security and Compliance" feature is disabled2736 is expected to respond with numeric status code not_found2737 user_role: :guest, security_dashboard_enabled: true, status: :forbidden, selector: nil2738 responds with the correct status2739 when the "Security and Compliance" feature is disabled2740 is expected to respond with numeric status code not_found2741 user_role: :developer, security_dashboard_enabled: false, status: :ok, selector: "#js-security-configuration"2742 responds with the correct status2743 when the "Security and Compliance" feature is disabled2744 is expected to respond with numeric status code not_found2745 user_role: :developer, security_dashboard_enabled: true, status: :ok, selector: "#js-security-configuration"2746 responds with the correct status2747 when the "Security and Compliance" feature is disabled2748 is expected to respond with numeric status code not_found2749 with developer and security dashboard feature enabled2750 responds in json format when requested2751 renders data on the project's security configuration2752 when the latest pipeline used Auto DevOps2753 reports that Auto DevOps is enabled2754 POST #auto_fix2755 with feature enabled2756 with sufficient permissions2757 with setup feature param2758 processes request and updates setting2759 without setup feature param2760 processes request and updates setting2761 without processable feature2762 does not pass validation2763 without sufficient permissions2764 is expected to respond with numeric status code not_found2765 with feature disabled2766 is expected to respond with numeric status code not_found2767Groups::InsightsController2768 when insights configuration project cannot be read by current user2769 when visiting the parent group2770 GET #show.html2771 behaves like 404 status2772 returns 404 status2773 GET #show.json2774 behaves like 404 status2775 returns 404 status2776 POST #query2777 behaves like 404 status2778 returns 404 status2779 when visiting a nested group2780 GET #show.html2781 behaves like 200 status2782 returns 200 status2783 GET #show.json2784 does return the default config2785 behaves like 200 status2786 returns 200 status2787 POST #query.json2788 behaves like 200 status2789 returns 200 status2790 when insights configuration project can be read by current user2791 when the configuration is attached to the current group2792 GET #show.html2793 behaves like 200 status2794 returns 200 status2795 GET #show.json2796 behaves like 200 status2797 returns 200 status2798 POST #query.json2799 behaves like 200 status2800 returns 200 status2801 GET #show2802 behaves like tracking unique visits2803 tracks unique visit if the format is HTML2804 tracks unique visit if DNT is not enabled2805 does not track unique visit if DNT is enabled2806 does not track unique visit if the format is JSON2807 behaves like Snowplow event tracking with RedisHLL context2808 behaves like Snowplow event tracking2809 is emitted2810 when the configuration is attached to a nested group2811 GET #show.html2812 behaves like 200 status2813 returns 200 status2814 GET #show.json2815 behaves like 200 status2816 returns 200 status2817 POST #query.json2818 behaves like 200 status2819 returns 200 status2820 when using the legacy format2821 behaves like 200 status2822 returns 200 status2823API::EpicIssues2824 GET /groups/:id/epics/:epic_iid/issues2825 when epics feature is disabled2826 returns 403 forbidden error2827 when epics feature is enabled2828 when an error occurs2829 returns 401 unauthorized error for non authenticated user2830 returns 404 not found error for a user without permissions to see the group2831 when the request is correct2832 responds 200 and matches the response schema2833 accepts pagination params2834 returns multiple issues without performing N + 12835 returns multiple issues without performing N + 12836 POST /groups/:id/epics/:epic_iid/issues2837 when epics feature is disabled2838 returns 403 forbidden error2839 when epics feature is enabled2840 when an error occurs2841 returns 401 unauthorized error for non authenticated user2842 returns 404 not found error for a user without permissions to see the group2843 behaves like user with insufficient permissions2844 when user does not have admin_issue_relation permissions for issue2845 returns 403 forbidden error2846 without permissions to read the epic2847 returns 403 forbidden error2848 when issue project is not under the epic group2849 returns an error2850 when the request is correct2851 returns 201 status2852 matches the response schema2853 assigns the issue to the epic2854 DELETE /groups/:id/epics/:epic_iid/issues/:epic_issue_id"2855 when epics feature is disabled2856 returns 403 forbidden error2857 when epics feature is enabled2858 when an error occurs2859 returns 401 unauthorized error for non authenticated user2860 returns 404 not found error for a user without permissions to see the group2861 behaves like user with insufficient permissions2862 when user does not have admin_issue_relation permissions for issue2863 returns 403 forbidden error2864 without permissions to read the epic2865 returns 403 forbidden error2866 when epic_issue association does not include the epic in the url2867 returns 404 not found error2868 when the request is correct2869 returns 200 status2870 matches the response schema2871 removes the association2872 PUT /groups/:id/epics/:epic_iid/issues/:epic_issue_id2873 when epics feature is disabled2874 returns 403 forbidden error2875 when epics feature is enabled2876 when an error occurs2877 returns 401 unauthorized error for non authenticated user2878 returns 404 not found error for a user without permissions to see the group2879 returns 404 not found error for the link of another epic2880 with insufficient permissions2881 returns 403 forbidden error for a user who can not move the issue2882 when the request is correct2883 returns 200 status2884 updates the positions values2885 matches the response schema2886Groups::Analytics::TasksByTypeController2887 GET #show2888 when valid parameters are given2889 succeeds2890 returns valid count2891 when `label_names` are missing2892 behaves like expects unprocessable_entity response2893 returns unprocessable_entity as response2894 behaves like parameter validation2895 when user access level is lower than reporter2896 returns forbidden as response2897 when license is missing2898 returns forbidden as response2899 when `created_after` parameter is invalid2900 behaves like expects unprocessable_entity response2901 returns unprocessable_entity as response2902 when `created_after` parameter is missing2903 behaves like expects unprocessable_entity response2904 returns unprocessable_entity as response2905 when `created_after` date is later than `created_before` date2906 behaves like expects unprocessable_entity response2907 returns unprocessable_entity as response2908 GET #top_labels2909 when valid parameters are given2910 succeeds2911 returns valid count2912 behaves like parameter validation2913 when user access level is lower than reporter2914 returns forbidden as response2915 when license is missing2916 returns forbidden as response2917 when `created_after` parameter is invalid2918 behaves like expects unprocessable_entity response2919 returns unprocessable_entity as response2920 when `created_after` parameter is missing2921 behaves like expects unprocessable_entity response2922 returns unprocessable_entity as response2923 when `created_after` date is later than `created_before` date2924 behaves like expects unprocessable_entity response2925 returns unprocessable_entity as response2926get list of epics for an epic board list2927 sorting and pagination2928 behaves like sorted paginated query2929 behaves like requires variables2930 shared example requires variables to be set2932 when sorting2933 sorts correctly2934 when paginating2935 paginates correctly2936 with filters2937 finds only epics matching the filter2938 when negated2939 finds only epics matching the negated filter2940 when using OR label filter2941 finds only epics matching at least one of the labels2942 when queried label names are empty2943 returns all items2944 when feature flag is disabled2945 does not add any filter2946 when using OR author filter2947 finds only epics matching at least one of the labels2948 when queried label names are empty2949 returns all items2950 when feature flag is disabled2951 does not add any filter2952Projects::OnDemandScansController2953 GET #index2954 behaves like on-demand scans page2955 when the "Security and Compliance" feature is disabled2956 is expected to respond with numeric status code not_found2957 feature available2958 user authorized2959 can access page2960 user not authorized2961 sees a 404 error2962 feature not available2963 sees a 404 error if the license doesn't support the feature2964 GET #new2965 user has auditor role2966 sees a 404 error2967 behaves like on-demand scans page2968 when the "Security and Compliance" feature is disabled2969 is expected to respond with numeric status code not_found2970 feature available2971 user authorized2972 can access page2973 user not authorized2974 sees a 404 error2975 feature not available2976 sees a 404 error if the license doesn't support the feature2977 GET #edit2978 behaves like on-demand scans page2979 when the "Security and Compliance" feature is disabled2980 is expected to respond with numeric status code not_found2981 feature available2982 user authorized2983 can access page2984 user not authorized2985 sees a 404 error2986 feature not available2987 sees a 404 error if the license doesn't support the feature2988 feature available and user can access page2989 dast_profile exists in the database2990 includes a serialized dast_profile in the response body2991 dast_profile does not exist in the database2992 sees a 404 error2993 user has auditor role2994 sees a 404 error2995Query.project(fullPath).vulnerabilitySeveritiesCount2996 returns counts for each severity of the project's detected or confirmed vulnerabilities2997 with hasIssues filter2998 when counting vulnerabilities without issues2999 counts vulnerabilities with issues3000 when counting vulnerabilities with issues3001 counts vulnerabilities with issues3002 with hasResolution filter3003 when counting vulnerabilities without resolution3004 counts vulnerabilities with resolution3005 when counting vulnerabilities with resolution3006 counts vulnerabilities with resolution3007 with scannerId filter3008 counts vulnerabilities with issues3009get list of boards3010 for a project3011 behaves like a board epics query3012 returns open epics referenced by issues in the board3013 when board is scoped to a wildcard milestone3014 returns milestone global ID in the correct format3015 for a group3016 behaves like group and project boards query3017 behaves like a working graphql query3018 returns a successful response3019 when the user does not have access to the board parent3020 returns nil3021 when no permission to read board3022 does not return any boards3023 when user can read the board parent3024 does not create a default board3025 sorting and pagination3026 when using default sorting3027 when ascending3028 behaves like sorted paginated query3029 behaves like requires variables3030 shared example requires variables to be set3032 when sorting3033 sorts correctly3034 when paginating3035 paginates correctly3036 when querying for a single board3037 finds the correct board3038 behaves like a working graphql query3039 returns a successful response3040 behaves like a board epics query3041 returns open epics referenced by issues in the board3042 when board is scoped to a wildcard milestone3043 returns milestone global ID in the correct format3044Projects::ProtectedEnvironmentsController3045 #POST create3046 with valid access and params3047 with valid params3048 creates a new ProtectedEnvironment3049 sets a flash3050 redirects to CI/CD settings3051 with invalid params3052 does not create a new ProtectedEnvironment3053 redirects to CI/CD settings3054 with invalid access3055 renders 4043056 #PUT update3057 when the user is authorized3058 finds the requested protected environment3059 updates the protected environment3060 is successful3061 when the user is not authorized3062 is not successful3063 #DELETE destroy3064 when the user is authorized3065 finds the requested protected environment3066 deletes the requested protected environment3067 redirects to CI/CD settings3068 when the user is not authorized3069 is not successful3070Projects::FeatureFlagIssuesController3071 GET #index3072 returns linked issues3073 does not return linked issues for a reporter3074 orders by feature_flag_issue id3075 returns the correct relation_path when the feature flag is linked to multiple issues3076 returns the correct relation_path when multiple feature flags are linked to an issue3077 returns the correct relation_path when there are multiple linked feature flags and issues3078 does not make N+1 queries3079 returns only issues readable by the user3080 when feature flag related issues feature is unlicensed3081 does not return linked issues3082 POST #create3083 creates a link between the feature flag and the issue3084 creates a link for the correct feature flag when there are multiple feature flags and projects3085 creates a cross project link for a project in the same namespace3086 creates a cross project link for a project in another namespace3087 does not create a link for a reporter3088 does not create a cross project link when the user is not a member of the issue's project3089 does not create a cross project link when the user is a guest of the issue's project3090 does not create a link when the user cannot read the issue3091 when feature flag related issues feature is unlicensed3092 does not create a link between the feature flag and the issue3093 DELETE #destroy3094 unlinks the issue from the feature flag3095 does not unlink the issue for a reporter3096 when feature flag related issues feature is unlicensed3097 does not unlink the issue3098Projects::Settings::AccessTokensController3099 POST /:namespace/:project/-/settings/access_tokens3100 behaves like feature unavailable3101 with a free plan3102 is expected to respond with numeric status code not_found3103 when user is not a maintainer with a paid group plan3104 is expected to respond with numeric status code not_found3105 behaves like POST resource access tokens available3106 renders JSON with a token3107 creates resource access token3108 creates project bot user3109 is expected to change `User.count` by 13110 is expected to change `PersonalAccessToken.count` by 13111 when unsuccessful3112 does not create the token3113 does not add the project bot as a member3114 does not create the project bot user3115 renders JSON with an error3116 PUT /:namespace/:project/-/settings/access_tokens/:id3117 behaves like feature unavailable3118 with a free plan3119 is expected to respond with numeric status code not_found3120 when user is not a maintainer with a paid group plan3121 is expected to respond with numeric status code not_found3122 behaves like PUT resource access tokens available3123 calls delete user worker3124 removes membership of bot user3125 creates GhostUserMigration records to handle migration in a worker3126 when unsuccessful3127 shows a failure alert3128Query.project(fullPath)3129 # order random3130 with productAnalyticsState3131 will query state correctly3132 will pass through Cube API errors3133 will query state when Cube DB does not exist3134 will pass through Cube API connection errors3135 with jitsuKey3136 licensed: true, enabled: true, user_role: :developer, jitsu_key: "key", output: "key"3137 is expected to eq "key"3138 licensed: true, enabled: false, user_role: :developer, jitsu_key: "key", output: nil3139 is expected to eq nil3140 licensed: false, enabled: true, user_role: :developer, jitsu_key: "key", output: nil3141 is expected to eq nil3142 licensed: false, enabled: false, user_role: :developer, jitsu_key: "key", output: nil3143 is expected to eq nil3144 licensed: true, enabled: true, user_role: :maintainer, jitsu_key: "key", output: "key"3145 is expected to eq "key"3146 licensed: true, enabled: false, user_role: :maintainer, jitsu_key: "key", output: nil3147 is expected to eq nil3148 licensed: false, enabled: true, user_role: :maintainer, jitsu_key: "key", output: nil3149 is expected to eq nil3150 licensed: false, enabled: false, user_role: :maintainer, jitsu_key: "key", output: nil3151 is expected to eq nil3152 licensed: true, enabled: true, user_role: :owner, jitsu_key: "key", output: "key"3153 is expected to eq "key"3154 licensed: true, enabled: false, user_role: :owner, jitsu_key: "key", output: nil3155 is expected to eq nil3156 licensed: false, enabled: true, user_role: :owner, jitsu_key: "key", output: nil3157 is expected to eq nil3158 licensed: false, enabled: false, user_role: :owner, jitsu_key: "key", output: nil3159 is expected to eq nil3160 licensed: true, enabled: true, user_role: :guest, jitsu_key: "key", output: nil3161 is expected to eq nil3162 licensed: true, enabled: false, user_role: :guest, jitsu_key: "key", output: nil3163 is expected to eq nil3164 licensed: false, enabled: true, user_role: :guest, jitsu_key: "key", output: nil3165 is expected to eq nil3166 licensed: false, enabled: false, user_role: :guest, jitsu_key: "key", output: nil3167 is expected to eq nil3168Groups::Epics::RelatedEpicLinksController3169 GET /*group_id/:group_id/epics/:epic_id/related_epic_links3170 returns JSON response3171 avoids N+1 queries3172 behaves like a not available action3173 when related_epics are not available3174 returns not_found error3175 DELETE /*group_id/:group_id/epics/:epic_id/related_epic_links/:link_id3176 deletes related epic link3177 behaves like a not available action3178 when related_epics are not available3179 returns not_found error3180 when related epic link id is not valid3181 returns 4043182 when related epic link does not belong to epic3183 does not delete related epic link3184 POST /groups/*group_id/-/epics/:epic_id/related_epic_links3185 with success3186 returns JSON response3187 delegates the creation of the related epic link to Epics::RelatedEpicLinks::CreateService3188 creates a new Epic::RelatedEpicLink record3189 returns correct relation path in response3190 with failure3191 when unauthorized3192 returns 4033193 when failing service result3194 returns failure JSON3195 behaves like a not available action3196 when related_epics are not available3197 returns not_found error3198API::AuditEvents3199 Unique usage tracking3200 after calling all audit_events APIs as a single licensed user3201 tracks 3 separate events3202 reports one unique event3203 GET /audit_events3204 when authenticated, as a user3205 behaves like 403 response3206 returns 4033207 when authenticated, as an admin3208 audit events feature is not available3209 behaves like 403 response3210 returns 4033211 audit events feature is available3212 returns 200 response3213 includes the correct pagination headers3214 behaves like GET request permissions for admin mode3215 behaves like when admin3216 behaves like makes request3217 returns3218 behaves like makes request3219 returns3220 behaves like when user3221 returns3222 behaves like makes request3223 returns3224 parameters3225 behaves like supports keyset pagination3226 paginates the records correctly3227 on making requests with unsupported ordering structure3228 returns error3229 entity_type parameter3230 returns audit events of the provided entity type3231 entity_id parameter3232 returns audit_events of the provided entity id3233 requires entity_type parameter to be present3234 behaves like 400 response3235 returns 4003236 created_before parameter3237 returns audit events created before the given parameter3238 created_after parameter3239 returns audit events created after the given parameter3240 attributes3241 exposes the right attributes3242 GET /audit_events/:id3243 when authenticated, as a user3244 behaves like 403 response3245 returns 4033246 when authenticated, as an admin3247 audit events feature is not available3248 behaves like 403 response3249 returns 4033250 audit events feature is available3251 behaves like GET request permissions for admin mode3252 behaves like when admin3253 behaves like makes request3254 returns3255 behaves like makes request3256 returns3257 behaves like when user3258 returns3259 behaves like makes request3260 returns3261 audit event exists3262 returns 200 response3263 attributes3264 exposes the right attributes3265 audit event does not exist3266 behaves like 404 response3267 returns 4043268API::Dependencies3269 GET /projects/:id/dependencies3270 behaves like a gitlab tracking event3271 creates a gitlab tracking event view_dependencies3272 with an authorized user with proper permissions3273 returns paginated dependencies3274 returns vulnerabilities info3275 when the license_scanning_sbom_scanner feature flag is false3276 include license information to response3277 when the license_scanning_sbom_scanner feature flag is true3278 include license information to response3279 with nil package_manager3280 returns no dependencies3281 with filter options3282 returns yarn dependencies3283 with wrong key3284 returns error message3285 with pagination params3286 returns paginated dependencies3287 without permissions to see vulnerabilities3288 returns empty vulnerabilities3289 without permissions to see licenses3290 returns empty licenses3291 with authorized user without read permissions3292 responds with 403 Forbidden3293 with no project access3294 responds with 404 Not Found3295Registrations::WelcomeController3296 # order random3297 #show3298 tracks render event3299 when in invitation flow3300 tracks render event3301 when in trial flow3302 tracks render event3303 when completed welcome step3304 does not track render event3305 #update3306 without a signed in user3307 is expected to redirect to "/users/sign_up"3308 with a signed in user3309 with email updates3310 when not on gitlab.com3311 when the user opted in3312 sets the email_opted_in field3313 does not set the rest of the email_opted_in fields3314 when the user opted out3315 sets the email_opted_in field3316 when on gitlab.com3317 when registration_objective field is provided3318 sets the registration_objective3319 when setup for company is false3320 when the user opted in3321 sets the email_opted_in fields3322 when user opted out3323 does not set the rest of the email_opted_in fields3324 when setup for company is true3325 sets email_opted_in fields3326 redirection3327 when signup_onboarding is not enabled3328 is expected to redirect to "/dashboard/projects"3329 tracks successful submission event3330 when signup_onboarding is enabled3331 when joining_project is "true"3332 is expected to redirect to "/dashboard/projects"3333 when joining_project is "false"3334 with group and project creation3335 is expected to redirect to "/users/sign_up/groups_projects/new"3336 when setup_for_company is "true"3337 is expected to redirect to "/users/sign_up/company/new?glm_content=some_content&glm_source=some_source&jobs_to_be_done_other=_jobs_to_be_done_other_®istration_objective=code_storage&role=software_developer"3338 when setup_for_company is "false"3339 is expected to redirect to "/users/sign_up/groups_projects/new"3340 when trial is true3341 is expected to redirect to "/users/sign_up/company/new?glm_content=some_content&glm_source=some_source&jobs_to_be_done_other=_jobs_to_be_done_other_®istration_objective=code_storage&role=software_developer&trial=true"3342 when in subscription flow3343 is expected not to redirect to "/users/sign_up/groups_projects/new"3344 when in invitation flow3345 is expected not to redirect to "/users/sign_up/groups_projects/new"3346 tracks successful submission event3347 when in trial flow3348 is expected not to redirect to "/users/sign_up/groups_projects/new"3349 tracks successful submission event3350 when stored company path3351 is expected to redirect to "/users/sign_up/company/new?glm_content=some_content&glm_source=some_source&jobs_to_be_done_other=_jobs_to_be_done_other_®istration_objective=code_storage&role=software_developer"3352 when failed request3353 does not track submission event3354Query.instanceSecurityDashboard.projects3355 with logged in user3356 requesting projects in the dashboard3357 behaves like a working graphql query3358 returns a successful response3359 finds only projects that were added to instance security dashboard3360 when loading vulnerabilityGrades alongside with Vulnerability.userNotesCount3361 behaves like a working graphql query3362 returns a successful response3363 finds vulnerability grades for only projects that were added to instance security dashboard3364 requesting clusterAgents in the dashboard3365 behaves like a working graphql query3366 returns a successful response3367 finds only projects that were added to instance security dashboard3368 with no user3369 behaves like a working graphql query3370 returns a successful response3371 is expected to be nil3372groups autocomplete3373 #issues3374 issue_types: nil, expected: :test_case3375 returns the correct response3376 issue_types: "", expected: :test_case3377 returns the correct response3378 issue_types: "invalid", expected: []3379 returns the correct response3380 issue_types: "test_case", expected: :test_case3381 returns the correct response3382 #epics3383 returns 200 status3384 returns the correct response3385 avoids N+1 queries3386 #iterations3387 when iterations feature is disabled3388 returns 404 status3389 when iterations feature is enabled3390 avoids N+1 queries3391 #iterations3392 returns the correct response3393 #vulnerabilities3394 returns 200 status3395 returns the correct response3396 #commands3397 returns 200 status3398 returns the correct response3399 handles new epics3400Groups::ProtectedBranchesController3401 # order random3402 before action hook3403 when group is not top-level3404 respond status :not_found3405 when feature flag disabled3406 respond status :not_found3407 when license disabled3408 respond status :not_found3409 when cannot admin group3410 respond status :not_found3411 PUT #update3412 updates the protected branch rule3413 when a policy restricts rule update3414 prevents update of the protected branch rule3415 when a invalid value update3416 prevents update of the protected branch rule3417 POST #create3418 creates the protected branch rule3419 when format :html3420 added record and response :found3421 when format :json3422 added record and response :ok3423 when a policy restricts rule creation3424 prevents creation of the protected branch rule3425 DELETE #destroy3426 deletes the protected branch rule3427 when a policy restricts rule deletion3428 prevents deletion of the protected branch rule3429Getting code coverage summary in a project3430 behaves like a working graphql query3431 returns a successful response3432 when project has coverage3433 for the default branch3434 contains code coverage summary data3435 not for the default branch3436 returns nil3437 when project does not have coverage3438 returns nil3439Project Environments query3440 # order random3441 with protected environments3442 returns protected environment attributes3443 returns deploy access levels3444 returns approval rules3445 returns unified approval setting3446 when a specifc user is allowed to deploy3447 returns deploy access levels3448 when a specifc user is allowed to approve3449 returns approval rules3450 when a specifc group is allowed to deploy3451 returns deploy access levels3452 when a specifc group is allowed to approve3453 returns approval rules3454 when fetching protected environments for multiple environments3455 avoids N+1 query issue3456 when user does not have access to the environment3457 does not return protected environments3458Creating a DAST Profile3459 behaves like an on-demand scan mutation when user cannot run an on-demand scan3460 when a user does not have access to the project3461 behaves like a mutation that returns a top-level access error3462 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3463 when a user does not have access to run a dast scan on the project3464 behaves like a mutation that returns a top-level access error3465 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3466 behaves like an on-demand scan mutation when user can run an on-demand scan3467 returns an empty errors array3468 returns dastProfile.id3469 returns dastProfile.editPath3470 returns a non-empty pipelineUrl3471 when on demand scan licensed feature is not available3472 behaves like a mutation that returns a top-level access error3473 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3474 when dastProfileSchedule is present3475 creates a Dast::ProfileSchedule3476Projects::Analytics::IssuesAnalyticsController3477 behaves like issue analytics controller3478 GET #show3479 when issue analytics is not available for license3480 renders 4043481 when user does not have permission to read the resource3482 renders 4043483 when issue analytics is available for license3484 as HTML3485 renders show template3486 as JSON3487 renders new chart data as JSON3488 when new issue analytics data format is disabled3489 renders chart data as JSON3490 when user cannot view issues3491 does not count issues which user cannot view3492 GET #show3493 behaves like tracking unique visits3494 tracks unique visit if the format is HTML3495 tracks unique visit if DNT is not enabled3496 does not track unique visit if DNT is enabled3497 does not track unique visit if the format is JSON3498 behaves like Snowplow event tracking with RedisHLL context3499 behaves like Snowplow event tracking3500 is emitted3501Projects::RequirementsManagement::RequirementsController3502 GET #index3503 private project3504 with authorized user3505 when feature is available3506 renders the index template3507 when feature is not available3508 behaves like response with 404 status3509 returns 4043510 with unauthorized user3511 when feature is available3512 behaves like response with 404 status3513 returns 4043514 with anonymous user3515 returns 3023516 public project3517 with requirements disabled3518 behaves like response with 404 status3519 returns 4043520 with requirements visible to project members3521 with authorized user3522 renders the index template3523 with unauthorized user3524 behaves like response with 404 status3525 returns 4043526 with requirements visible to everyone3527 with anonymous user3528 renders the index template3529 GET import_csv3530 with authorized user3531 when feature is available3532 when the upload is processed successfully3533 renders the correct message3534 when the upload returns an error3535 renders the error message3536 when feature is not available3537 behaves like response with 404 status3538 returns 4043539API::Dora::Metrics3540 GET /projects/:id/dora/metrics3541 metric: :deployment_frequency, value1: 1, value2: 23542 returns data3543 metric: :lead_time_for_changes, value1: 3, value2: 43544 returns data3545 metric: :time_to_restore_service, value1: 5, value2: 63546 returns data3547 metric: :change_failure_rate, value1: 7, value2: 43548 returns data3549 with multiple metrics3550 returns combined data3551 backwards compatibility for environment_tier3552 returns combined data3553 when user is guest3554 returns authorization error3555 GET /groups/:id/dora/metrics3556 metric: :deployment_frequency, value1: 1, value2: 23557 returns data3558 metric: :lead_time_for_changes, value1: 3, value2: 43559 returns data3560 metric: :time_to_restore_service, value1: 5, value2: 63561 returns data3562 metric: :change_failure_rate, value1: 7, value2: 43563 returns data3564 with multiple metrics3565 returns combined data3566 backwards compatibility for environment_tier3567 returns combined data3568 when user is guest3569 returns authorization error3570Creating a new HTTP Integration3571 stores the custom mapping params3572 behaves like creating a new HTTP integration3573 creates a new integration3574 without required argument project_path3575 behaves like an invalid argument to the mutation3576 behaves like a mutation that returns top-level errors3577 is expected to contain exactly (include "invalid value for projectPath")3578 without required argument active3579 behaves like an invalid argument to the mutation3580 behaves like a mutation that returns top-level errors3581 is expected to contain exactly (include "invalid value for active")3582 without required argument name3583 behaves like an invalid argument to the mutation3584 behaves like a mutation that returns top-level errors3585 is expected to contain exactly (include "invalid value for name")3586 with the custom mappings feature unavailable3587 behaves like ignoring the custom mapping3588 creates integration without the custom mapping params3589 behaves like validating the payload_example3590 validates the payload_example size3591 with invalid payloadExample attribute3592 responds with errors3593 behaves like validating the payload_attribute_mappings3594 with invalid payloadAttributeMapping attribute does not contain fieldName3595 responds with errors3596 with invalid payloadAttributeMapping attribute does not contain path3597 responds with errors3598 with invalid payloadAttributeMapping attribute does not contain type3599 responds with errors3600Projects::Settings::RepositoryController3601 GET show3602 push rule3603 is created3604 is connected to project_settings3605 unlicensed3606 is not created3607 group protected branches3608 feature_flag: false, licensed_feature: false, expected_include_group: false3609 include group correctly3610 feature_flag: false, licensed_feature: true, expected_include_group: false3611 include group correctly3612 feature_flag: true, licensed_feature: false, expected_include_group: false3613 include group correctly3614 feature_flag: true, licensed_feature: true, expected_include_group: true3615 include group correctly3616 avoid N+1 sql queries3617 when the feature group protected branches disabled3618 does not perform N+1 sql queries3619 when the feature group protected branches enabled3620 does not perform N+1 sql queries3621Projects::BranchesController3622 GET #index3623 for mirrored projects with diverged branch3624 renders the diverged from upstream partial3625API::GroupMilestones3626 matches V4 EE-specific response schema for a list of issues3627 behaves like group and project milestone burndowns3628 GET /groups/:id/milestones/:milestone_id/burndown_events3629 returns burndown events list3630 returns 404 when user is not authorized to read milestone3631API::Internal::UpcomingReconciliations3632 PUT /internal/upcoming_reconciliations3633 when unauthenticated3634 returns authentication error3635 when authenticated as user3636 returns authentication error3637 when authenticated as admin3638 returns success3639 behaves like PUT request permissions for admin mode3640 behaves like when admin3641 behaves like makes request3642 returns3643 behaves like makes request3644 returns3645 behaves like when user3646 returns3647 behaves like makes request3648 returns3649 when namespace_id is empty3650 returns error3651 when update service failed3652 returns error3653 when not gitlab.com3654 returns 403 error3655 DELETE /internal/upcoming_reconciliations3656 behaves like DELETE request permissions for admin mode3657 behaves like when admin3658 behaves like makes request3659 returns3660 behaves like makes request3661 returns3662 behaves like when user3663 returns3664 behaves like makes request3665 returns3666 when the request is not authenticated3667 returns authentication error3668 when authenticated as user3669 returns authentication error3670 when authenticated as an admin3671 when the request is not for .com3672 returns an error3673 when the namespace_id is missing3674 returns a 400 error3675 when there is an upcoming reconciliation for the namespace3676 destroys the reconciliation and returns success3677 when the namespace_id does not have an upcoming reconciliation3678 returns a not found error3679Query.project(fullPath).dastProfiles.dastProfileSchedule3680 when a user does not have access to the project3681 returns a null project3682 when a user does not have access to dast_profile3683 returns an empty dast_profile3684 when a user has access to dast_profile_schedule3685 returns a dast_profile_schedule3686 behaves like query dastProfiles.dastProfileSchedule shared examples3687 avoids N+1 queries3688Creating a DAST Site Token3689 behaves like an on-demand scan mutation when user cannot run an on-demand scan3690 when a user does not have access to the project3691 behaves like a mutation that returns a top-level access error3692 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3693 when a user does not have access to run a dast scan on the project3694 behaves like a mutation that returns a top-level access error3695 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3696 behaves like an on-demand scan mutation when user can run an on-demand scan3697 returns an empty errors array3698 returns the dast_site_validation id3699 creates a new dast_site_validation3700 when on demand scan licensed feature is not available3701 behaves like a mutation that returns a top-level access error3702 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3703Groups::UsageQuotasController3704 # order random3705 GET #index3706 when user has read_usage_quotas permission3707 renders index with 200 status code3708 behaves like seat count alert3709 when the namespace qualifies for the alert3710 sets the seat_count_data3711 when the namespace does not qualify for the alert3712 sets the seat_count_data to nil3713 when user does not have read_usage_quotas permission3714 renders not_found3715 GET #pending_members3716 renders the pending members index3717 when user cap feature is unavailable3718 returns 4043719 when user does not have permission for pending members index3720 renders not_found3721getting Alert Management HTTP Integrations3722 with integrations3723 without project permissions3724 is expected to be nil3725 behaves like a working graphql query3726 returns a successful response3727 with developer permissions3728 is expected to eq []3729 behaves like a working graphql query3730 returns a successful response3731 with maintainer permissions3732 when no extra params given3733 is expected to eq 23734 returns the correct properties of the integrations3735 behaves like a working graphql query3736 returns a successful response3737 when HTTP Integration ID is given3738 returns the correct properties of the integration3739 behaves like a working graphql query3740 returns a successful response3741 behaves like GraphQL query with several integrations requested3742 when several HTTP integrations requested3743 returns the correct properties of the integrations3744 batches queries3745Setting the epic of an issue3746 returns an error if the user is not allowed to update the issue3747 return an error if issue can not be updated3748 sets given epic to the issue3749 removes existing epic if epic_id is nil3750Mutations::Boards::Create3751 behaves like boards create mutation3752 when the user does not have permission3753 does not create the board3754 behaves like a mutation that returns a top-level access error3755 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3756 when the user has permission3757 when the parent (project_path or group_path) param is given3758 when everything is ok3759 creates the board3760 returns the created board3761 when hide_backlog_list parameter is true3762 returns the board with correct hide_backlog_list field3763 when hide_closed_list parameter is true3764 returns the board with correct hide_closed_list field3765 when the Boards::CreateService returns an error response3766 does not create a board3767 returns an error3768 when neither project_path nor group_path param is given3769 does not create the board3770 behaves like a mutation that returns top-level errors3771 is expected to contain exactly "Exactly one of group_path or project_path arguments is required"3772 when the user has permission to create a board3773 sets cadence_id on creation3774API::Experiments3775 GET /experiments3776 when on .com3777 returns a 401 for anonymous users3778 returns a 403 for users3779 returns a 403 for non human users3780 for gitlab team members3781 returns the feature flag details3782 understands the state of the feature flag and what that means for an experiment3783 the null_hypothesis as a canary3784 runs and tracks the expected events3785 returns a 400 if experimentation seems broken3786 publishes into a collection of experiments that have been run in the request3787 when not .com3788 returns a 403 for users3789Dismissing a Vulnerabilities::Finding object3790 when the user does not have permission3791 does not dismiss the Finding3792 behaves like a mutation that returns a top-level access error3793 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3794 when the user has permission3795 when security_dashboard is disabled3796 behaves like a mutation that returns top-level errors3797 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3798 when security_dashboard is enabled3799 dismisses the Finding3800 when comment is given3801 saves the comment3802 when dismissal reason is given3803 saves the dismissal reason3804Groups::RoadmapController3805 #show3806 when the user is signed in3807 when the user has access to the group3808 when epics feature is disabled3809 behaves like returns 404 status3810 is expected to respond with numeric status code not_found3811 when epics feature is enabled3812 returns 200 status3813 when roadmaps_sort is nil3814 stores roadmaps sorting param in user preference3815 defaults to sort_value_start_date_soon3816 when roadmaps_sort is present3817 update roadmaps_sort with current value3818 when the user does not have access to the group3819 behaves like returns 404 status3820 is expected to respond with numeric status code not_found3821 when user is not signed in3822 when epics feature is enabled3823 when anonymous users does not have access to the group3824 redirects to login page3825 when anonymous users have access to the group3826 stores epics sorting param in a cookie3827Groups::SeatUsageController3828 GET show3829 when authorized3830 when html format3831 redirects to /groups/%{group_id}/-/seat_usage3832 responds with 404 Not Found if the group is not top-level group3833 when csv format3834 responds with 404 Not Found if the group is not top-level group3835 when the group is a top-level group3836 when export is successful3837 streams the csv with 200 status code3838 when export fails3839 sets alert message and redirects3840 when unauthorized3841 when html format3842 renders 403 when user is not an owner3843 when csv format3844 renders 403 when user is not an owner3845Create an external audit event destination header3846 when feature is licensed3847 when current user is a group owner3848 creates the header with the correct attributes3849 when the header attributes are invalid3850 returns correct errors3851 behaves like a mutation that does not create a header3852 does not create a header3853 when current user is a group maintainer3854 behaves like a mutation that does not create a header3855 does not create a header3856 when current user is a group developer3857 behaves like a mutation that does not create a header3858 does not create a header3859 when current user is a group guest3860 behaves like a mutation that does not create a header3861 does not create a header3862 when feature is unlicensed3863 behaves like a mutation on an unauthorized resource3864 behaves like a mutation that returns top-level errors3865 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"3866 behaves like a mutation that does not create a header3867 does not create a header3868API::Templates3869 GET /templates/dockerfiles3870 includes the custom template in the response3871 excludes the custom template when the feature is disabled3872 GET /templates/dockerfiles/custom3873 returns the custom template3874 returns 404 when the feature is disabled3875 GET /templates/gitignores3876 includes the custom template in the response3877 excludes the custom template when the feature is disabled3878 GET /templates/gitignores/custom3879 returns the custom template3880 returns 404 when the feature is disabled3881 GET /templates/gitlab_ci_ymls3882 includes the custom template in the response3883 excludes the custom template when the feature is disabled3884 GET /templates/gitlab_ci_ymls/custom3885 returns the custom template3886 returns 404 when the feature is disabled3887 GET /templates/licenses3888 includes the custom template in the response3889 excludes the custom template when the feature is disabled3890 GET /templates/licenses/custom3891 returns the custom template3892 returns 404 when the feature is disabled3893Admin::Geo::NodesController3894 #index3895 with valid license3896 does not show license alert3897 without valid license3898 does show license alert3899 does not redirects to the 403 page3900 #create3901 without add-on license3902 behaves like unlicensed geo action3903 redirects to the 403 page3904 with add-on license3905 delegates the create of the Geo node to Geo::NodeCreateService3906 #update3907 without add-on license3908 behaves like unlicensed geo action3909 redirects to the 403 page3910 with add-on license3911 updates the node3912 delegates the update of the Geo node to Geo::NodeUpdateService3913Admin::AuditLogReportsController3914 GET index3915 when user has access3916 when licensed3917 invokes CSV export service with correct arguments3918 returns success status with correct headers3919 returns a csv file in response3920 when date range params are not provided3921 passes the default date range filter to the CSV export service3922 when invalid date params are provided3923 created_before: "invalid-date", created_after: nil3924 returns an error3925 created_before: nil, created_after: true3926 returns an error3927 created_before: "2021-13-10", created_after: nil3928 returns an error3929 created_before: nil, created_after: "2021-02-31"3930 returns an error3931 created_before: "2021-03-31", created_after: "2021-02-31"3932 returns an error3933 when unlicensed3934 is expected to respond with numeric status code not_found3935 when user does not have access3936 is expected to respond with numeric status code not_found3937Querying a Board list3938 when the user has access to the list3939 is expected to include {"issuesCount" => 2, "title" => "foo"}3940 behaves like a working graphql query3941 returns a successful response3942 issue filters3943 when filtering by iteration arguments3944 is expected to include {"issuesCount" => 1, "title" => "foo"}3945 when filtering by health_status argument3946 is expected to include {"issuesCount" => 1, "title" => "foo"}3947 when filtering by negated health_status argument3948 is expected to include {"issuesCount" => 1, "title" => "foo"}3949 when the user does not have access to the list3950 is expected to be nil3951group compliance frameworks3952 when compliance frameworks feature is unlicensed3953 GET /groups/:group/-/compliance_frameworks/new3954 returns 404 not found3955 GET /groups/:group/-/compliance_frameworks/:id/edit3956 returns 404 not found3957 when compliance frameworks feature is licensed3958 GET /groups/:group/-/compliance_frameworks/new3959 renders template3960 with unauthorized user3961 returns 404 not found3962 GET /groups/:group/-/compliance_frameworks/:id/edit3963 renders template3964 with unauthorized user3965 returns 404 not found3966Groups::Analytics::CoverageReportsController3967 without permissions3968 GET index3969 responds 4033970 with permissions3971 without a license3972 GET index3973 responds 403 because the feature is not licensed3974 GET index3975 responds 200 with CSV coverage data3976 executes the same number of queries regardless of the number of records returned3977 when ref_path is nil3978 responds HTTP 2003979 with an invalid format3980 responds 4043981Query.issue(id)3982 # order random3983 when user has access to the epic3984 returns epic and hasEpic is `true`3985 when user has no access to the epic3986 when there is an epic3987 returns null for epic and hasEpic is `true`3988 when there is no epic3989 returns null for epic and hasEpic is `false`3990Projects::Pipelines::EmailCampaignsController3991 GET #validate_account3992 when user has access to the pipeline3993 emits a snowplow event3994 sets session[:start_account_validation] to true3995 redirects to the pipeline show page3996 when not in .com or dev env3997 returns 4043998 when user does not have access to the pipeline3999 returns :not_found4000 does not set session[:start_account_validation]4001Query.project(fullPath).dastScannerProfiles4002 when a user does not have access to the project4003 project response4004 is expected to be nil4005 when the user can run a dast scan4006 dast scanner profiles4007 is expected to be empty4008 when a user has access to multiple projects4009 dast scanner profiles4010 returns only the dast_scanner_profile for the requested project4011 when a user has access dast_scanner_profiles4012 dast scanner profiles4013 is expected not to be empty4014 first dast scanner profile id4015 is expected to eq "gid://gitlab/DastScannerProfile/10"4016Updating an approval_rule4017 # order random4018 with approvals_required4019/builds/gitlab-org/gitlab/lib/gitlab/utils.rb:125: warning: deprecated Object#=~ is called on Array; it always returns nil4020/builds/gitlab-org/gitlab/lib/gitlab/utils.rb:126: warning: deprecated Object#=~ is called on Array; it always returns nil4021 sets two required approvals to merge request rule4022 with users already assigned4023/builds/gitlab-org/gitlab/lib/gitlab/utils.rb:125: warning: deprecated Object#=~ is called on Array; it always returns nil4024/builds/gitlab-org/gitlab/lib/gitlab/utils.rb:126: warning: deprecated Object#=~ is called on Array; it always returns nil4025 adds extra users4026Query.vulnerabilities.externalIssueLinks4027 when queried for the first time with reactive caching4028 schedules a background job to fetch data from Jira4029 returns null as value for externalIssue4030 when queried without reactive caching4031 returns a list of all VulnerabilityExternalIssueLink4032Delete a compliance framework4033 feature is unlicensed4034 does not destroy a compliance framework4035 behaves like a mutation that returns top-level errors4036 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4037 when licensed4038 current_user is namespace owner4039 has no errors4040 destroys a compliance framework4041 current_user is not namespace owner4042 does not destroy a compliance framework4043 behaves like a mutation that returns top-level errors4044 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4045Query.project(fullPath).pipeline(iid).codeQualityReports4046 when pipeline has a code quality report4047 when user is member of the project4048 returns all the code quality degradations4049 returns all the queried fields4050 returns all the queried fields ordered by severity4051 when user is not a member of the project4052 returns no code quality degradations4053 when pipeline does not have a code quality report4054 returns an empty result4055OmniauthCallbacksController4056 when sign in fails4057 audits provider failed login when licensed4058 does not audit provider failed login when unlicensed4059 #openid_connect4060 when auth hash is missing required groups4061 when licensed feature is available4062 prevents sign in4063 when licensed feature is not available4064 allows sign in4065 identity verification4066 on sign up4067 behaves like identity verification required4068 handles sticking, sets the session and redirects to identity verification4069 when auto blocking users after creation4070 behaves like identity verification not required4071 does not redirect to identity verification4072 on sign in4073 behaves like identity verification not required4074 does not redirect to identity verification4075 when identity is not yet verified4076 behaves like identity verification required4077 handles sticking, sets the session and redirects to identity verification4078Emails::IdentityVerification4079 # order random4080 confirmation_instructions_email4081 is sent to the user4082 has the correct subject4083 has the mailgun suppression bypass header4084 includes the token4085 includes the expiration time4086 behaves like an email sent from GitLab4087 has the characteristics of an email sent from GitLab4088Set an Epic Subscription4089 when epics feature is disabled4090 does not subscribe user to the epic4091 behaves like a mutation that returns a top-level access error4092 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4093 when epics feature is enabled4094 when a user wants to subscribe to an epic4095 subscribes the user to the epic4096 when a user wants to unsubscribe from an epic4097 unsubscribes the user from the epic4098ApplicationController4099 # order random4100 with redirection due to onboarding4101 redirects to the onboarding step4102 when onboarding is disabled4103 does not redirect to the onboarding step4104 when feature flag is disabled4105 does not redirect to the onboarding step4106 when request path equals redirect path4107 does not redirect to the onboarding step4108 when post request4109 does not redirect to the onboarding step4110getting a list of external audit event destinations for a group4111 when authenticated as the group owner4112 returns the groups external audit event destinations4113 when authenticated as a group maintainer4114 behaves like a request that returns no destinations4115 returns no destinations4116 when authenticated as a group developer4117 behaves like a request that returns no destinations4118 returns no destinations4119 when authenticated as a group guest4120 behaves like a request that returns no destinations4121 returns no destinations4122 when not authenticated4123 behaves like a request that returns no destinations4124 returns no destinations4125AiAction for Explain Code4126 # order random4127 successfully performs an explain code request4128 when openai_experimentation feature flag is disabled4129 returns nil4130 when empty messages are passed4131 returns nil4132API::ConanProjectPackages4133 # order random4134 GET /api/v4/projects/:id/packages/conan/v1/files/:package_name/package_version/:package_username/:package_channel/:recipe_revision/package/:conan_package_reference/:package_revision/:file_name4135 behaves like applying ip restriction for group4136 in group without restriction4137 behaves like returning response status4138 returns ok4139 in group with restriction4140 with address within the range4141 behaves like returning response status4142 returns ok4143 with address outside the range4144 behaves like returning response status4145 returns not_found4146view audit events4147 GET /groups/:group/-/audit_events4148 returns 200 response4149 avoids N+1 DB queries4150API::CaptchaCheck4151 POST users/captcha_check4152 when the feature flag arkose_labs_login_challenge is disabled4153 does return not found status4154 when the feature flag arkose_labs_login_challenge is enabled4155 when the username is invalid4156 does return 200 OK status to prevent enumeration4157 when the username has a dot4158 does return 200 status4159 when the username is nil4160 does return 200 OK status to prevent enumeration4161 when the username is an array4162 does return 200 OK status to prevent enumeration4163 when the email is valid4164 returns status ok4165 when the email is unknown4166 returns 200 OK status to prevent enumeration4167 when the email is invalid4168 returns 200 OK status to prevent enumeration4169 when the user meets the criteria for the captcha check4170 does return true4171 when the user does not meets the criteria for the captcha check4172 does return true4173 when the user reach the rate limit4174 does return true4175Projects::IssueLinksController4176 GET #index4177 returns success response4178 POST #create4179 returns success response4180 when blocked issues is disabled4181 returns failure response4182Query.project(id).dashboards.panels(id).visualization4183 # order random4184 when current user is a developer4185 returns visualization4186 when the visualization does not exist4187 returns an error4188Groups::Settings::MergeRequestsController4189 # order random4190 PATCH #update4191 when user is not an admin4192 respond status :not_found4193 when user is an admin4194 is expected to redirect to "/groups/group353/-/edit#js-merge-requests-settings"4195 when service execution went wrong4196 returns a flash alert4197 when service execution was successful4198 returns a flash notice4199Admin::UsersController4200 GET card_match4201 when not SaaS4202 responds with 4044203 when SaaS4204 when user has no credit card validation4205 redirects back to #show4206 when user has credit card validation4207 displays its own and matching card details4208 GET #index4209 eager loads authorized projects association4210Mutations::Boards::EpicBoards::Update4211 when the user does not have permission4212 behaves like a mutation that returns a top-level access error4213 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4214 when the user has permission4215 returns the updated board4216 when update fails4217 returns an error4218Admin::Geo::NodesController4219 GET /geo/sites4220 with a valid license4221 renders the Geo Sites View4222 without a valid license4223 does show license alert4224 does not redirects to the 403 page4225Exporting Requirements4226 when the user does not have permission4227 behaves like requirements export fails4228 does not schedule export job4229 behaves like a mutation that returns a top-level access error4230 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4231 when the user has permission4232 when requirements are disabled4233 behaves like requirements export fails4234 does not schedule export job4235 behaves like a mutation that returns a top-level access error4236 is expected to contain exactly "The resource that you are attempting to access does not exist or you don't have permission to perform this action"4237 when requirements are enabled4238 schedules job to export requirements4239Projects::RepositoriesController4240 # order random4241 GET /archive4242 when user is banned from the project's top-level group4243 prevents the archive download4244 when user is not banned from the project's top-level group4245 proceeds with the archive download4246SentNotificationsController4247 Unsubscribing from an epic4248 unsubscribes the user4249 sets the flash message4250 redirects to the merge request page4251Query.project(fullPath).corpuses4252 when the user can read corpus for the project4253 returns corpus and package4254 when the user cannot read corpus for the project4255 returns nil4256API::RubygemPackages4257 # order random4258 GET /api/v4/projects/:project_id/packages/rubygems/gems/:file_name4259 behaves like applying ip restriction for group4260 in group without restriction4261 behaves like returning response status4262 returns ok4263 in group with restriction4264 with address within the range4265 behaves like returning response status4266 returns ok4267 with address outside the range4268 behaves like returning response status4269 returns not_found4270Subscriptions::AiCompletionResponse4271 # order random4272 when user is authorized4273 receives data4274 when user is unauthorized4275 does not receive any data4276 when user is nil4277 does not receive any data4278Security::VulnerabilitiesController4279 GET #index4280 behaves like Security::ApplicationController4281 when the user is authenticated4282 responds with success4283 and the instance does not have an Ultimate license4284 404s4285 when the user is not authenticated4286 redirects the user to the sign in page4287 when security dashboard feature4288 is enabled4289 is expected to render template instance_security4290 is disabled4291 is expected to respond with numeric status code not_found4292 is expected to render template errors/not_found4293Security::DashboardController4294 GET #show4295 behaves like Security::ApplicationController4296 when the user is authenticated4297 responds with success4298 and the instance does not have an Ultimate license4299 404s4300 when the user is not authenticated4301 redirects the user to the sign in page4302 when security dashboard feature4303 is enabled4304 is expected to render template instance_security4305 is disabled4306 is expected to respond with numeric status code not_found4307 is expected to render template errors/not_found4308UploadsController4309 GET show4310 when viewing issuable metric images4311 responds with status 2004312Admin::RunnersController4313 #index4314 enables runner_performance_insights and runner_upgrade_management licensed feature4315 when fetching runner releases is disabled4316 enables only runner_performance_insights licensed feature4317 #show4318 enables runner_upgrade_management, runner_maintenance_note licensed features4319 when fetching runner releases is disabled4320 enables only runner_maintenance_note licensed feature4321 #edit4322 enables runner_maintenance_note licensed feature4323Emails::GroupMemberships4324 #memberships_export_email4325 is expected to have subject of "Exported group membership list"4326 is expected to be delivered to ["user1631@example.org"]4327 contains one attachment4328 properly renders email4329CreateApiFuzzingCiConfiguration4330 returns a YAML snippet that can be used to configure API fuzzing scans for the project4331API::ProjectSnapshots4332 GET /projects/:id/snapshot4333 requests project repository raw archive from Geo primary as Geo secondary4334ConfirmationsController4335 # order random4336 GET #show4337 when user is signed in4338 sets event_type4339 when user is provisioned by group4340 confirms the user and redirects to SSO login4341SitemapController4342 #show4343 when not Gitlab.com?4344 returns :not_found4345 when Gitlab.com?4346 with an authenticated user4347 when the sitemap generation raises an error4348 returns an xml error4349 when the sitemap was created suscessfully4350 returns sitemap4351Rack Attack global throttles4352 when the request is from Geo secondary4353 allows requests over the rate limit4354PasswordsController4355 #create4356 is expected to change `AuditEvent.count` by 14357Oauth::ApplicationsController4358 project members4359 POST #create4360 logs the audit event4361Knapsack report was generated. Preview:4362{4363 "ee/spec/requests/search_controller_spec.rb": 97.4223596349998,4364 "ee/spec/controllers/concerns/routable_actions_spec.rb": 80.59486389899985,4365 "ee/spec/requests/api/graphql/geo/registries_spec.rb": 64.0403676599999,4366 "ee/spec/controllers/admin/application_settings_controller_spec.rb": 56.16805495499966,4367 "ee/spec/controllers/groups/epics_controller_spec.rb": 40.23903633300006,4368 "ee/spec/controllers/ee/groups_controller_spec.rb": 26.90733546299998,4369 "ee/spec/requests/api/discussions_spec.rb": 31.63052227900016,4370 "ee/spec/requests/projects/merge_requests_controller_spec.rb": 26.176984919000006,4371 "ee/spec/controllers/projects/mirrors_controller_spec.rb": 28.322504277999997,4372 "ee/spec/requests/api/users_spec.rb": 15.283147056999951,4373 "ee/spec/controllers/ee/search_controller_spec.rb": 14.831919233999997,4374 "ee/spec/requests/git_http_spec.rb": 21.134047291000115,4375 "ee/spec/requests/api/internal/base_spec.rb": 17.39093444900027,4376 "ee/spec/controllers/groups/contribution_analytics_controller_spec.rb": 15.458768200000122,4377 "ee/spec/requests/api/graphql/epics/epic_resolver_spec.rb": 15.11894249299985,4378 "ee/spec/requests/api/group_hooks_spec.rb": 12.151680011999815,4379 "ee/spec/controllers/projects/audit_events_controller_spec.rb": 9.03495005700006,4380 "ee/spec/requests/groups/security/credentials_controller_spec.rb": 13.034300559999792,4381 "ee/spec/controllers/projects/security/configuration_controller_spec.rb": 11.985975478,4382 "ee/spec/controllers/groups/insights_controller_spec.rb": 9.2862530780003,4383 "ee/spec/requests/api/epic_issues_spec.rb": 11.8393915129991,4384 "ee/spec/controllers/groups/analytics/tasks_by_type_controller_spec.rb": 12.193214541000089,4385 "ee/spec/requests/api/graphql/boards/epic_board_list_epics_query_spec.rb": 9.898068325000168,4386 "ee/spec/requests/projects/on_demand_scans_controller_spec.rb": 10.310782980000113,4387 "ee/spec/requests/api/graphql/project/vulnerability_severities_count_spec.rb": 10.94215262599937,4388 "ee/spec/requests/api/graphql/boards/boards_query_spec.rb": 7.89783111900033,4389 "ee/spec/controllers/projects/protected_environments_controller_spec.rb": 9.795483249000426,4390 "ee/spec/controllers/projects/feature_flag_issues_controller_spec.rb": 8.255399105999459,4391 "ee/spec/requests/projects/settings/access_tokens_controller_spec.rb": 6.64023770499989,4392 "ee/spec/requests/api/graphql/project/product_analytics_spec.rb": 4.434154767000109,4393 "ee/spec/requests/groups/epics/related_epic_links_controller_spec.rb": 6.2582317789992885,4394 "ee/spec/requests/api/audit_events_spec.rb": 5.784942586999932,4395 "ee/spec/requests/api/dependencies_spec.rb": 5.779147756999919,4396 "ee/spec/controllers/ee/registrations/welcome_controller_spec.rb": 5.195445338000354,4397 "ee/spec/requests/api/graphql/instance_security_dashboard_spec.rb": 5.941897540999889,4398 "ee/spec/requests/ee/groups/autocomplete_sources_spec.rb": 4.851301042000159,4399 "ee/spec/requests/groups/protected_branches_controller_spec.rb": 4.128418829000111,4400 "ee/spec/requests/api/graphql/project/code_coverage_summary_spec.rb": 5.295736879999822,4401 "ee/spec/requests/api/graphql/project/environments_spec.rb": 4.448757036000643,4402 "ee/spec/requests/api/graphql/mutations/dast/profiles/create_spec.rb": 5.6499853790001,4403 "ee/spec/controllers/projects/analytics/issues_analytics_controller_spec.rb": 3.832594624000194,4404 "ee/spec/controllers/projects/requirements_management/requirements_controller_spec.rb": 5.120449965000262,4405 "ee/spec/requests/api/dora/metrics_spec.rb": 2.9118323619995863,4406 "ee/spec/requests/api/graphql/mutations/alert_management/http_integration/create_spec.rb": 3.4132474770003682,4407 "ee/spec/controllers/projects/settings/repository_controller_spec.rb": 3.5057260740004494,4408 "ee/spec/controllers/projects/branches_controller_spec.rb": 6.172270263000428,4409 "ee/spec/requests/api/group_milestones_spec.rb": 3.331916750000346,4410 "ee/spec/requests/api/internal/upcoming_reconciliations_spec.rb": 3.0986252359998616,4411 "ee/spec/requests/api/graphql/project/dast_profile_schedule_spec.rb": 3.9692660099999557,4412 "ee/spec/requests/api/graphql/mutations/dast_site_validations/create_spec.rb": 4.042484328000683,4413 "ee/spec/controllers/ee/groups/usage_quotas_controller_spec.rb": 2.3012926000001244,4414 "ee/spec/requests/api/graphql/project/alert_management/http_integrations_spec.rb": 4.05131001799964,4415 "ee/spec/requests/api/graphql/mutations/issues/set_epic_spec.rb": 3.1144655759999296,4416 "ee/spec/requests/api/graphql/mutations/boards/create_spec.rb": 3.961199009999291,4417 "ee/spec/requests/api/experiments_spec.rb": 2.3044950799994695,4418 "ee/spec/requests/api/graphql/mutations/vulnerabilities/finding_dismiss_spec.rb": 3.8374884240001848,4419 "ee/spec/controllers/groups/roadmap_controller_spec.rb": 3.2124850130003324,4420 "ee/spec/controllers/groups/seat_usage_controller_spec.rb": 2.563366721999955,4421 "ee/spec/requests/api/graphql/audit_events/streaming/headers/create_spec.rb": 2.585606542000278,4422 "ee/spec/requests/api/templates_spec.rb": 3.28068045100008,4423 "ee/spec/controllers/admin/geo/nodes_controller_spec.rb": 2.8400007139998706,4424 "ee/spec/controllers/admin/audit_log_reports_controller_spec.rb": 1.3081488099996932,4425 "ee/spec/requests/api/graphql/boards/board_list_query_spec.rb": 2.898194483000225,4426 "ee/spec/requests/groups/compliance_frameworks_spec.rb": 2.2393551220002337,4427 "ee/spec/controllers/groups/analytics/coverage_reports_controller_spec.rb": 2.805292134999945,4428 "ee/spec/requests/api/graphql/issue/issue_spec.rb": 2.24992370200016,4429 "ee/spec/requests/projects/pipelines/email_campaigns_controller_spec.rb": 2.6445902000004935,4430 "ee/spec/requests/api/graphql/project/dast_scanner_profiles_spec.rb": 2.639789109999583,4431 "ee/spec/requests/api/graphql/mutations/merge_requests/update_approval_rule_spec.rb": 2.7183062580006663,4432 "ee/spec/requests/api/graphql/vulnerabilities/external_issue_links_spec.rb": 2.2863775810001243,4433 "ee/spec/requests/api/graphql/mutations/compliance_management/frameworks/destroy_spec.rb": 2.215275923000263,4434 "ee/spec/requests/api/graphql/project/pipeline/code_quality_reports_spec.rb": 2.9125812120000774,4435 "ee/spec/controllers/ee/omniauth_callbacks_controller_spec.rb": 1.963228350999998,4436 "ee/spec/mailers/ee/emails/identity_verification_spec.rb": 1.646167541000068,4437 "ee/spec/requests/api/graphql/mutations/epics/set_subscription_spec.rb": 2.376772327999788,4438 "ee/spec/requests/ee/application_controller_spec.rb": 2.2621044609995806,4439 "ee/spec/requests/api/graphql/group/external_audit_event_destinations_spec.rb": 1.834773954999946,4440 "ee/spec/requests/api/graphql/mutations/projects/explain_code_spec.rb": 1.1139134759996523,4441 "ee/spec/requests/api/conan_project_packages_spec.rb": 1.9892049099998985,4442 "ee/spec/requests/groups/audit_events_spec.rb": 2.9856663499995193,4443 "ee/spec/requests/api/captcha_check_spec.rb": 1.3090537699999913,4444 "ee/spec/controllers/projects/issue_links_controller_spec.rb": 1.9087093529997219,4445 "ee/spec/requests/api/graphql/product_analytics/visualizations_spec.rb": 1.8644052230001762,4446 "ee/spec/requests/groups/settings/merge_requests_controller_spec.rb": 1.9432625810004538,4447 "ee/spec/requests/admin/users_controller_spec.rb": 1.5361216840001362,4448 "ee/spec/requests/api/graphql/mutations/boards/epic_boards/update_spec.rb": 1.494559854999352,4449 "ee/spec/requests/admin/geo/nodes_controller_spec.rb": 1.464885346000301,4450 "ee/spec/requests/api/graphql/mutations/requirements_management/export_requirements_spec.rb": 1.5129753150004035,4451 "ee/spec/requests/ee/projects/repositories_controller_spec.rb": 1.6169906810000612,4452 "ee/spec/controllers/ee/sent_notifications_controller_spec.rb": 1.3360211999997773,4453 "ee/spec/requests/api/graphql/app_sec/fuzzing/coverage/corpus_type_spec.rb": 1.4001405979997799,4454 "ee/spec/requests/api/rubygem_packages_spec.rb": 1.3238955599999827,4455 "ee/spec/requests/api/graphql/subscriptions/ai_completion_response_spec.rb": 1.2954534110003806,4456 "ee/spec/controllers/security/vulnerabilities_controller_spec.rb": 0.9292187320006633,4457 "ee/spec/controllers/security/dashboard_controller_spec.rb": 1.1185913560002518,4458 "ee/spec/controllers/ee/uploads_controller_spec.rb": 1.0352849090004383,4459 "ee/spec/controllers/admin/runners_controller_spec.rb": 0.8654067329998725,4460 "ee/spec/mailers/emails/group_memberships_spec.rb": 0.9652120509999804,4461 "ee/spec/requests/api/graphql/mutations/app_sec/fuzzing/api/ci_configuration/create_spec.rb": 1.0177118900001005,4462 "ee/spec/requests/api/project_snapshots_spec.rb": 1.0398616989996299,4463 "ee/spec/requests/ee/confirmations_controller_spec.rb": 0.999569479999991,4464 "ee/spec/controllers/sitemap_controller_spec.rb": 1.7047788680001759,4465 "ee/spec/requests/rack_attack_global_spec.rb": 0.7280574680007703,4466 "ee/spec/controllers/passwords_controller_spec.rb": 0.6044024519997038,4467 "ee/spec/controllers/oauth/applications_controller_spec.rb": 0.6402934299994744468}4469Knapsack global time execution for tests: 14m 59s4470Finished in 15 minutes 5 seconds (files took 1 minute 25.45 seconds to load)44711446 examples, 0 failures4472Randomized with seed 420284473[TEST PROF INFO] Time spent in factories: 06:57.693 (44.19% of total time)4474RSpec exited with 0.4475No examples to retry, congrats!4477Not uploading cache ruby-gems-debian-bullseye-ruby-3.0-16 due to policy4479Uploading artifacts...4480coverage/: found 5 matching artifact files and directories 4481WARNING: crystalball/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab) 4482WARNING: deprecations/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab) 4483knapsack/: found 4 matching artifact files and directories 4484query_recorder/: found 2 matching artifact files and directories 4485rspec/: found 8 matching artifact files and directories 4486WARNING: tmp/capybara/: no matching files. Ensure that the artifact path is relative to the working directory (/builds/gitlab-org/gitlab) 4487log/*.log: found 17 matching artifact files and directories 4488WARNING: Upload request redirected location=https://gitlab.com/api/v4/jobs/4181384282/artifacts?artifact_format=zip&artifact_type=archive&expire_in=31d new-url=https://gitlab.com4489WARNING: Retrying... context=artifacts-uploader error=request redirected4490Uploading artifacts as "archive" to coordinator... 201 Created id=4181384282 responseStatus=201 Created token=64_SCWzn4491Uploading artifacts...4492rspec/junit_rspec.xml: found 1 matching artifact files and directories 4493WARNING: Upload request redirected location=https://gitlab.com/api/v4/jobs/4181384282/artifacts?artifact_format=gzip&artifact_type=junit&expire_in=31d new-url=https://gitlab.com4494WARNING: Retrying... context=artifacts-uploader error=request redirected4495Uploading artifacts as "junit" to coordinator... 201 Created id=4181384282 responseStatus=201 Created token=64_SCWzn4497Job succeeded