Commit 00942513 authored by Mark Lapierre's avatar Mark Lapierre Committed by Sanad Liaquat

Add status_issue rspec tags for manage tests

parent 8953dabe
...@@ -8,7 +8,7 @@ module QA ...@@ -8,7 +8,7 @@ module QA
let(:api_client) { Runtime::API::Client.new(:gitlab, ip_limits: true) } let(:api_client) { Runtime::API::Client.new(:gitlab, ip_limits: true) }
let(:request) { Runtime::API::Request.new(api_client, '/users') } let(:request) { Runtime::API::Request.new(api_client, '/users') }
it 'GET /users' do it 'GET /users', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/441' do
5.times do 5.times do
get request.url get request.url
expect_status(200) expect_status(200)
......
...@@ -8,13 +8,13 @@ module QA ...@@ -8,13 +8,13 @@ module QA
let(:api_client) { Runtime::API::Client.new(:gitlab) } let(:api_client) { Runtime::API::Client.new(:gitlab) }
let(:request) { Runtime::API::Request.new(api_client, '/users') } let(:request) { Runtime::API::Request.new(api_client, '/users') }
it 'GET /users' do it 'GET /users', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/460' do
get request.url get request.url
expect_status(200) expect_status(200)
end end
it 'GET /users/:username with a valid username' do it 'GET /users/:username with a valid username', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/480' do
get request.url, { params: { username: Runtime::User.username } } get request.url, { params: { username: Runtime::User.username } }
expect_status(200) expect_status(200)
...@@ -23,7 +23,7 @@ module QA ...@@ -23,7 +23,7 @@ module QA
) )
end end
it 'GET /users/:username with an invalid username' do it 'GET /users/:username with an invalid username', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/462' do
get request.url, { params: { username: SecureRandom.hex(10) } } get request.url, { params: { username: SecureRandom.hex(10) } }
expect_status(200) expect_status(200)
......
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
module QA module QA
RSpec.describe 'Configure', :orchestrated, :mattermost do RSpec.describe 'Configure', :orchestrated, :mattermost do
describe 'Mattermost support' do describe 'Mattermost support' do
it 'user creates a group with a mattermost team' do it 'user creates a group with a mattermost team', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/665' do
Flow::Login.sign_in Flow::Login.sign_in
Page::Main::Menu.perform(&:go_to_groups) Page::Main::Menu.perform(&:go_to_groups)
......
...@@ -43,7 +43,7 @@ module QA ...@@ -43,7 +43,7 @@ module QA
end end
end end
it 'user transfers a project between groups' do it 'user transfers a project between groups', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/406' do
Page::File::Show.perform(&:go_to_general_settings) Page::File::Show.perform(&:go_to_general_settings)
Page::Project::Settings::Main.perform(&:expand_advanced_settings) Page::Project::Settings::Main.perform(&:expand_advanced_settings)
......
...@@ -32,7 +32,7 @@ module QA ...@@ -32,7 +32,7 @@ module QA
group.add_member(developer_user, Resource::Members::AccessLevel::DEVELOPER) group.add_member(developer_user, Resource::Members::AccessLevel::DEVELOPER)
end end
it 'allows using 2FA recovery code once only' do it 'allows using 2FA recovery code once only', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/972' do
recovery_code = enable_2fa_for_user_and_fetch_recovery_code(developer_user) recovery_code = enable_2fa_for_user_and_fetch_recovery_code(developer_user)
Flow::Login.sign_in(as: developer_user, skip_page_validation: true) Flow::Login.sign_in(as: developer_user, skip_page_validation: true)
......
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
module QA module QA
RSpec.describe 'Manage', :smoke do RSpec.describe 'Manage', :smoke do
describe 'basic user login' do describe 'basic user login' do
it 'user logs in using basic credentials and logs out' do it 'user logs in using basic credentials and logs out', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/424' do
Flow::Login.sign_in Flow::Login.sign_in
Page::Main::Menu.perform do |menu| Page::Main::Menu.perform do |menu|
......
...@@ -34,7 +34,7 @@ module QA ...@@ -34,7 +34,7 @@ module QA
group.add_member(developer_user, Resource::Members::AccessLevel::DEVELOPER) group.add_member(developer_user, Resource::Members::AccessLevel::DEVELOPER)
end end
it 'allows enforcing 2FA via UI and logging in with 2FA' do it 'allows enforcing 2FA via UI and logging in with 2FA', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/898' do
enforce_two_factor_authentication_on_group(group) enforce_two_factor_authentication_on_group(group)
enable_two_factor_authentication_for_user(developer_user) enable_two_factor_authentication_for_user(developer_user)
......
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
module QA module QA
RSpec.describe 'Manage', :orchestrated, :ldap_no_tls, :ldap_tls do RSpec.describe 'Manage', :orchestrated, :ldap_no_tls, :ldap_tls do
describe 'LDAP login' do describe 'LDAP login' do
it 'user logs into GitLab using LDAP credentials' do it 'user logs into GitLab using LDAP credentials', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/668' do
Flow::Login.sign_in Flow::Login.sign_in
Page::Main::Menu.perform do |menu| Page::Main::Menu.perform do |menu|
......
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
module QA module QA
RSpec.describe 'Manage', :orchestrated, :mattermost do RSpec.describe 'Manage', :orchestrated, :mattermost do
describe 'Mattermost login' do describe 'Mattermost login' do
it 'user logs into Mattermost using GitLab OAuth' do it 'user logs into Mattermost using GitLab OAuth', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/666' do
Flow::Login.sign_in Flow::Login.sign_in
Support::Retrier.retry_on_exception do Support::Retrier.retry_on_exception do
......
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
module QA module QA
RSpec.describe 'Manage', :orchestrated, :instance_saml do RSpec.describe 'Manage', :orchestrated, :instance_saml do
describe 'Instance wide SAML SSO' do describe 'Instance wide SAML SSO' do
it 'User logs in to gitlab with SAML SSO' do it 'User logs in to gitlab with SAML SSO', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/671' do
Runtime::Browser.visit(:gitlab, Page::Main::Login) Runtime::Browser.visit(:gitlab, Page::Main::Login)
Page::Main::Login.perform(&:sign_in_with_saml) Page::Main::Login.perform(&:sign_in_with_saml)
......
...@@ -14,7 +14,7 @@ module QA ...@@ -14,7 +14,7 @@ module QA
end end
RSpec.describe 'Manage', :skip_signup_disabled do RSpec.describe 'Manage', :skip_signup_disabled do
describe 'standard' do describe 'standard', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/936' do
it_behaves_like 'registration and login' it_behaves_like 'registration and login'
context 'when user account is deleted', :requires_admin do context 'when user account is deleted', :requires_admin do
...@@ -36,7 +36,7 @@ module QA ...@@ -36,7 +36,7 @@ module QA
end end
end end
it 'allows recreating with same credentials' do it 'allows recreating with same credentials', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/937' do
expect(Page::Main::Menu.perform(&:signed_in?)).to be_falsy expect(Page::Main::Menu.perform(&:signed_in?)).to be_falsy
Flow::Login.sign_in(as: user, skip_page_validation: true) Flow::Login.sign_in(as: user, skip_page_validation: true)
...@@ -64,7 +64,7 @@ module QA ...@@ -64,7 +64,7 @@ module QA
end end
RSpec.describe 'Manage', :orchestrated, :ldap_no_tls, :skip_signup_disabled do RSpec.describe 'Manage', :orchestrated, :ldap_no_tls, :skip_signup_disabled do
describe 'while LDAP is enabled' do describe 'while LDAP is enabled', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/935' do
it_behaves_like 'registration and login' it_behaves_like 'registration and login'
end end
end end
......
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
module QA module QA
RSpec.describe 'Manage' do RSpec.describe 'Manage' do
describe 'Add project member' do describe 'Add project member' do
it 'user adds project member' do it 'user adds project member', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/482' do
Flow::Login.sign_in Flow::Login.sign_in
user = Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) user = Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1)
......
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
module QA module QA
RSpec.describe 'Manage', :smoke do RSpec.describe 'Manage', :smoke do
describe 'Project creation' do describe 'Project creation' do
it 'user creates a new project' do it 'user creates a new project', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/429' do
Flow::Login.sign_in Flow::Login.sign_in
created_project = Resource::Project.fabricate_via_browser_ui! do |project| created_project = Resource::Project.fabricate_via_browser_ui! do |project|
......
...@@ -41,13 +41,13 @@ module QA ...@@ -41,13 +41,13 @@ module QA
end end
end end
context 'when logged in as a new user' do context 'when logged in as a new user', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/465' do
it_behaves_like 'loads all images' do it_behaves_like 'loads all images' do
let(:new_user) { @new_user } let(:new_user) { @new_user }
end end
end end
context 'when logged in as a new admin' do context 'when logged in as a new admin', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/463' do
it_behaves_like 'loads all images' do it_behaves_like 'loads all images' do
let(:new_user) { @new_admin } let(:new_user) { @new_admin }
end end
......
...@@ -23,7 +23,7 @@ module QA ...@@ -23,7 +23,7 @@ module QA
Page::Main::Menu.perform(&:sign_out_if_signed_in) Page::Main::Menu.perform(&:sign_out_if_signed_in)
end end
it 'user imports a GitHub repo' do it 'user imports a GitHub repo', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/385' do
Flow::Login.sign_in Flow::Login.sign_in
imported_project # import the project imported_project # import the project
......
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
module QA module QA
RSpec.describe 'Manage' do RSpec.describe 'Manage' do
describe 'Project activity' do describe 'Project activity' do
it 'user creates an event in the activity page upon Git push' do it 'user creates an event in the activity page upon Git push', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/407' do
Flow::Login.sign_in Flow::Login.sign_in
Resource::Repository::ProjectPush.fabricate! do |push| Resource::Repository::ProjectPush.fabricate! do |push|
......
...@@ -44,7 +44,7 @@ module QA ...@@ -44,7 +44,7 @@ module QA
let(:user) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) } let(:user) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) }
let(:group) { @group } let(:group) { @group }
context 'Add group' do context 'Add group', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/733' do
let(:group_name) { 'new group' } let(:group_name) { 'new group' }
before do before do
...@@ -65,7 +65,7 @@ module QA ...@@ -65,7 +65,7 @@ module QA
end end
end end
context 'Change repository size limit', :requires_admin do context 'Change repository size limit', :requires_admin, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/731' do
before do before do
sign_in(as_admin: true) sign_in(as_admin: true)
@group.visit! @group.visit!
...@@ -78,7 +78,7 @@ module QA ...@@ -78,7 +78,7 @@ module QA
it_behaves_like 'audit event', ['Changed repository size limit'] it_behaves_like 'audit event', ['Changed repository size limit']
end end
context 'Update group name' do context 'Update group name', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/732' do
before do before do
sign_in sign_in
@group.visit! @group.visit!
...@@ -93,7 +93,7 @@ module QA ...@@ -93,7 +93,7 @@ module QA
it_behaves_like 'audit event', ['Changed name'] it_behaves_like 'audit event', ['Changed name']
end end
context 'Add user, change access level, remove user' do context 'Add user, change access level, remove user', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/734' do
before do before do
sign_in sign_in
@group.visit! @group.visit!
...@@ -108,7 +108,7 @@ module QA ...@@ -108,7 +108,7 @@ module QA
it_behaves_like 'audit event', ['Added user access as Guest', 'Changed access level', 'Removed user access'] it_behaves_like 'audit event', ['Added user access as Guest', 'Changed access level', 'Removed user access']
end end
context 'Add and remove project access' do context 'Add and remove project access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/735' do
before do before do
sign_in sign_in
project.visit! project.visit!
......
...@@ -19,7 +19,7 @@ module QA ...@@ -19,7 +19,7 @@ module QA
end end
end end
context 'Disable and Enable LFS' do context 'Disable and Enable LFS', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/749' do
before do before do
sign_in sign_in
@group.visit! @group.visit!
...@@ -33,7 +33,7 @@ module QA ...@@ -33,7 +33,7 @@ module QA
it_behaves_like 'audit event', ["Changed lfs enabled from false to true", /Changed lfs enabled( from true)? to false/] it_behaves_like 'audit event', ["Changed lfs enabled from false to true", /Changed lfs enabled( from true)? to false/]
end end
context 'Enable and disable membership lock' do context 'Enable and disable membership lock', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/723' do
before do before do
sign_in sign_in
@group.visit! @group.visit!
...@@ -47,7 +47,7 @@ module QA ...@@ -47,7 +47,7 @@ module QA
it_behaves_like 'audit event', ["Changed membership lock from true to false", "Changed membership lock from false to true"] it_behaves_like 'audit event', ["Changed membership lock from true to false", "Changed membership lock from false to true"]
end end
context 'Enable and disable allow user request access' do context 'Enable and disable allow user request access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/725' do
before do before do
sign_in sign_in
@group.visit! @group.visit!
...@@ -61,7 +61,7 @@ module QA ...@@ -61,7 +61,7 @@ module QA
it_behaves_like 'audit event', ["Changed request access enabled from true to false", "Changed request access enabled from false to true"] it_behaves_like 'audit event', ["Changed request access enabled from true to false", "Changed request access enabled from false to true"]
end end
context 'Enable and disable 2FA requirement', :requires_admin, :skip_live_env do context 'Enable and disable 2FA requirement', :requires_admin, :skip_live_env, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/750' do
let!(:owner_user) do let!(:owner_user) do
Resource::User.fabricate_via_api! Resource::User.fabricate_via_api!
end end
...@@ -103,7 +103,7 @@ module QA ...@@ -103,7 +103,7 @@ module QA
it_behaves_like 'audit event', ["Changed require two factor authentication from true to false", "Changed require two factor authentication from false to true"] it_behaves_like 'audit event', ["Changed require two factor authentication from true to false", "Changed require two factor authentication from false to true"]
end end
context 'Change project creation level' do context 'Change project creation level', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/724' do
before do before do
sign_in sign_in
@group.visit! @group.visit!
......
...@@ -78,7 +78,7 @@ module QA ...@@ -78,7 +78,7 @@ module QA
Page::Group::Menu.perform(&:click_group_members_item) Page::Group::Menu.perform(&:click_group_members_item)
end end
it 'has LDAP users synced' do it 'has LDAP users synced', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/670' do
verify_users_synced(sync_users) verify_users_synced(sync_users)
end end
end end
...@@ -130,7 +130,7 @@ module QA ...@@ -130,7 +130,7 @@ module QA
Page::Group::Menu.perform(&:click_group_members_item) Page::Group::Menu.perform(&:click_group_members_item)
end end
it 'has LDAP users synced' do it 'has LDAP users synced', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/669' do
verify_users_synced(sync_users) verify_users_synced(sync_users)
end end
end end
......
...@@ -28,7 +28,7 @@ module QA ...@@ -28,7 +28,7 @@ module QA
end end
end end
it 'user clones and pushes to project within a group using Git HTTP' do it 'user clones and pushes to project within a group using Git HTTP', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/675' do
Flow::Login.sign_in Flow::Login.sign_in
@project = Resource::Project.fabricate! do |project| @project = Resource::Project.fabricate! do |project|
......
...@@ -36,7 +36,7 @@ module QA ...@@ -36,7 +36,7 @@ module QA
Flow::Saml.logout_from_idp(@saml_idp_service) Flow::Saml.logout_from_idp(@saml_idp_service)
end end
it 'removes existing users from the group, forces existing users to create a new account and allows to leave group' do it 'removes existing users from the group, forces existing users to create a new account and allows to leave group', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/708' do
expect(@group.list_members.map { |item| item["username"] }).not_to include(@developer_user.username) expect(@group.list_members.map { |item| item["username"] }).not_to include(@developer_user.username)
visit_managed_group_url visit_managed_group_url
......
...@@ -28,7 +28,7 @@ module QA ...@@ -28,7 +28,7 @@ module QA
let(:user) { Resource::User.fabricate_via_api! } let(:user) { Resource::User.fabricate_via_api! }
let(:default_membership_role) { 'Developer' } let(:default_membership_role) { 'Developer' }
it 'adds the new member with access level as set in SAML SSO configuration' do it 'adds the new member with access level as set in SAML SSO configuration', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/968' do
managed_group_url = Flow::Saml.enable_saml_sso(@group, @saml_idp_service, default_membership_role) managed_group_url = Flow::Saml.enable_saml_sso(@group, @saml_idp_service, default_membership_role)
Page::Main::Menu.perform(&:sign_out_if_signed_in) Page::Main::Menu.perform(&:sign_out_if_signed_in)
...@@ -45,7 +45,7 @@ module QA ...@@ -45,7 +45,7 @@ module QA
end end
end end
it 'User logs in to group with SAML SSO' do it 'User logs in to group with SAML SSO', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/673' do
managed_group_url = Flow::Saml.enable_saml_sso(@group, @saml_idp_service) managed_group_url = Flow::Saml.enable_saml_sso(@group, @saml_idp_service)
page.visit managed_group_url page.visit managed_group_url
...@@ -63,7 +63,7 @@ module QA ...@@ -63,7 +63,7 @@ module QA
expect(page).to have_content("Already signed in with SAML for #{@group.path}") expect(page).to have_content("Already signed in with SAML for #{@group.path}")
end end
it 'Lets group admin test settings' do it 'Lets group admin test settings', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/674' do
incorrect_fingerprint = Digest::SHA1.hexdigest(rand.to_s) incorrect_fingerprint = Digest::SHA1.hexdigest(rand.to_s)
Flow::Saml.visit_saml_sso_settings(@group) Flow::Saml.visit_saml_sso_settings(@group)
......
...@@ -48,7 +48,7 @@ module QA ...@@ -48,7 +48,7 @@ module QA
let(:ip_address) { get_next_ip_address(fetch_current_ip_address) } let(:ip_address) { get_next_ip_address(fetch_current_ip_address) }
context 'via the UI' do context 'via the UI' do
it 'denies access' do it 'denies access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/862' do
Flow::Login.sign_in(as: @user) Flow::Login.sign_in(as: @user)
@group.sandbox.visit! @group.sandbox.visit!
...@@ -62,7 +62,7 @@ module QA ...@@ -62,7 +62,7 @@ module QA
end end
context 'via the API' do context 'via the API' do
it 'denies access' do it 'denies access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/861' do
request = create_request("/groups/#{@sandbox_group.id}") request = create_request("/groups/#{@sandbox_group.id}")
response = get request.url response = get request.url
expect(response.code).to eq(404) expect(response.code).to eq(404)
...@@ -83,7 +83,7 @@ module QA ...@@ -83,7 +83,7 @@ module QA
end end
end end
it 'denies access' do it 'denies access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/860' do
expect { push_a_project_with_ssh_key(key) }.to raise_error(QA::Git::Repository::RepositoryCommandError, /fatal: Could not read from remote repository/) expect { push_a_project_with_ssh_key(key) }.to raise_error(QA::Git::Repository::RepositoryCommandError, /fatal: Could not read from remote repository/)
end end
end end
...@@ -93,7 +93,7 @@ module QA ...@@ -93,7 +93,7 @@ module QA
let(:ip_address) { fetch_current_ip_address } let(:ip_address) { fetch_current_ip_address }
context 'via the UI' do context 'via the UI' do
it 'allows access' do it 'allows access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/865' do
Flow::Login.sign_in(as: @user) Flow::Login.sign_in(as: @user)
@group.sandbox.visit! @group.sandbox.visit!
...@@ -105,7 +105,7 @@ module QA ...@@ -105,7 +105,7 @@ module QA
end end
context 'via the API' do context 'via the API' do
it 'allows access' do it 'allows access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/864' do
request = create_request("/groups/#{@sandbox_group.id}") request = create_request("/groups/#{@sandbox_group.id}")
response = get request.url response = get request.url
expect(response.code).to eq(200) expect(response.code).to eq(200)
...@@ -126,7 +126,7 @@ module QA ...@@ -126,7 +126,7 @@ module QA
end end
end end
it 'allows access' do it 'allows access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/863' do
expect { push_a_project_with_ssh_key(key) }.not_to raise_error expect { push_a_project_with_ssh_key(key) }.not_to raise_error
end end
end end
......
...@@ -34,7 +34,7 @@ module QA ...@@ -34,7 +34,7 @@ module QA
source_group_with_members.add_member(maintainer_user, Resource::Members::AccessLevel::MAINTAINER) source_group_with_members.add_member(maintainer_user, Resource::Members::AccessLevel::MAINTAINER)
end end
it 'can be shared with another group with correct access level', :requires_admin do it 'can be shared with another group with correct access level', :requires_admin, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/945' do
Flow::Login.sign_in Flow::Login.sign_in
target_group_with_project.visit! target_group_with_project.visit!
......
...@@ -16,7 +16,7 @@ module QA ...@@ -16,7 +16,7 @@ module QA
end end
end end
context 'group insights page' do context 'group insights page', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/591' do
before do before do
Flow::Login.sign_in Flow::Login.sign_in
...@@ -28,7 +28,7 @@ module QA ...@@ -28,7 +28,7 @@ module QA
it_behaves_like 'default insights page' it_behaves_like 'default insights page'
end end
context 'project insights page' do context 'project insights page', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/593' do
before do before do
Flow::Login.sign_in Flow::Login.sign_in
......
...@@ -19,7 +19,7 @@ module QA ...@@ -19,7 +19,7 @@ module QA
end end
describe 'Instance', :requires_admin do describe 'Instance', :requires_admin do
context 'Failed sign in' do context 'Failed sign in', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/736' do
before do before do
Runtime::Browser.visit(:gitlab, Page::Main::Login) Runtime::Browser.visit(:gitlab, Page::Main::Login)
invalid_user = QA::Resource::User.new.tap do |user| invalid_user = QA::Resource::User.new.tap do |user|
...@@ -36,7 +36,7 @@ module QA ...@@ -36,7 +36,7 @@ module QA
it_behaves_like 'audit event', ["Failed to login with STANDARD authentication"] it_behaves_like 'audit event', ["Failed to login with STANDARD authentication"]
end end
context 'Successful sign in' do context 'Successful sign in', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/737' do
before do before do
sign_in sign_in
end end
...@@ -44,7 +44,7 @@ module QA ...@@ -44,7 +44,7 @@ module QA
it_behaves_like 'audit event', ["Signed in with STANDARD authentication"] it_behaves_like 'audit event', ["Signed in with STANDARD authentication"]
end end
context 'Add SSH key' do context 'Add SSH key', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/738' do
before do before do
sign_in sign_in
Resource::SSHKey.fabricate_via_browser_ui! do |resource| Resource::SSHKey.fabricate_via_browser_ui! do |resource|
...@@ -55,7 +55,7 @@ module QA ...@@ -55,7 +55,7 @@ module QA
it_behaves_like 'audit event', ["Added SSH key"] it_behaves_like 'audit event', ["Added SSH key"]
end end
context 'Add and delete email', quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/217831', type: :bug } do context 'Add and delete email', quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/217831', type: :bug }, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/741' do
before do before do
sign_in sign_in
new_email_address = 'new_email@example.com' new_email_address = 'new_email@example.com'
...@@ -73,7 +73,7 @@ module QA ...@@ -73,7 +73,7 @@ module QA
it_behaves_like 'audit event', ["Added email", "Removed email"] it_behaves_like 'audit event', ["Added email", "Removed email"]
end end
context 'Change password', :skip_signup_disabled do context 'Change password', :skip_signup_disabled, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/740' do
before do before do
user = Resource::User.fabricate_via_api! do |user| user = Resource::User.fabricate_via_api! do |user|
user.username = "user_#{SecureRandom.hex(4)}" user.username = "user_#{SecureRandom.hex(4)}"
...@@ -96,7 +96,7 @@ module QA ...@@ -96,7 +96,7 @@ module QA
it_behaves_like 'audit event', ["Changed password"] it_behaves_like 'audit event', ["Changed password"]
end end
context 'Start and stop user impersonation' do context 'Start and stop user impersonation', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/739' do
before do before do
sign_in sign_in
user = Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) user = Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1)
......
...@@ -10,7 +10,7 @@ module QA ...@@ -10,7 +10,7 @@ module QA
login_with_ldap_admin_user login_with_ldap_admin_user
end end
it 'sets and removes user\'s admin status' do it 'sets and removes user\'s admin status', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/672' do
Page::Main::Menu.perform do |menu| Page::Main::Menu.perform do |menu|
admin_synchronised = menu.wait_until(max_duration: 80, sleep_interval: 1, reload: true) do admin_synchronised = menu.wait_until(max_duration: 80, sleep_interval: 1, reload: true) do
menu.has_admin_area_link? menu.has_admin_area_link?
......
...@@ -25,7 +25,7 @@ module QA ...@@ -25,7 +25,7 @@ module QA
let(:user) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) } let(:user) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) }
context "Add project" do context "Add project", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/727' do
before do before do
Resource::Project.fabricate_via_browser_ui! do |project| Resource::Project.fabricate_via_browser_ui! do |project|
project.name = 'audit-add-project-via-ui' project.name = 'audit-add-project-via-ui'
...@@ -35,7 +35,7 @@ module QA ...@@ -35,7 +35,7 @@ module QA
it_behaves_like 'audit event', ["Added project"] it_behaves_like 'audit event', ["Added project"]
end end
context "Add user access as guest" do context "Add user access as guest", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/729' do
before do before do
project.visit! project.visit!
...@@ -48,7 +48,7 @@ module QA ...@@ -48,7 +48,7 @@ module QA
it_behaves_like 'audit event', ["Added user access as Guest"] it_behaves_like 'audit event', ["Added user access as Guest"]
end end
context "Add deploy key" do context "Add deploy key", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/730' do
before do before do
key = Runtime::Key::RSA.new key = Runtime::Key::RSA.new
deploy_key_title = 'deploy key title' deploy_key_title = 'deploy key title'
...@@ -64,7 +64,7 @@ module QA ...@@ -64,7 +64,7 @@ module QA
it_behaves_like 'audit event', ["Added deploy key"] it_behaves_like 'audit event', ["Added deploy key"]
end end
context "Change visibility" do context "Change visibility", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/728' do
before do before do
project.visit! project.visit!
...@@ -80,7 +80,7 @@ module QA ...@@ -80,7 +80,7 @@ module QA
it_behaves_like 'audit event', ["Changed visibility from Public to Private"] it_behaves_like 'audit event', ["Changed visibility from Public to Private"]
end end
context "Export file download", quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/217949', type: :investigating } do context "Export file download", quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/217949', type: :investigating }, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/743' do
before do before do
QA::Support::Retrier.retry_until do QA::Support::Retrier.retry_until do
project = Resource::Project.fabricate_via_api! do |project| project = Resource::Project.fabricate_via_api! do |project|
...@@ -108,7 +108,7 @@ module QA ...@@ -108,7 +108,7 @@ module QA
it_behaves_like 'audit event', ["Export file download started"] it_behaves_like 'audit event', ["Export file download started"]
end end
context "Project archive and unarchive" do context "Project archive and unarchive", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/726' do
before do before do
project.visit! project.visit!
......
...@@ -42,7 +42,7 @@ module QA ...@@ -42,7 +42,7 @@ module QA
@group = Resource::Group.fabricate_via_api! @group = Resource::Group.fabricate_via_api!
end end
it 'successfully imports the project using template' do it 'successfully imports the project using template', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/905' do
built_in = 'Ruby on Rails' built_in = 'Ruby on Rails'
@group.visit! @group.visit!
...@@ -92,7 +92,7 @@ module QA ...@@ -92,7 +92,7 @@ module QA
QA::Flow::Project.go_to_create_project_from_template QA::Flow::Project.go_to_create_project_from_template
end end
it 'successfully imports the project using template' do it 'successfully imports the project using template', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/914' do
Page::Project::New.perform do |new_page| Page::Project::New.perform do |new_page|
new_page.retry_until do new_page.retry_until do
new_page.go_to_create_from_template_instance_tab new_page.go_to_create_from_template_instance_tab
...@@ -141,7 +141,7 @@ module QA ...@@ -141,7 +141,7 @@ module QA
Page::Project::New.perform(&:go_to_create_from_template_group_tab) Page::Project::New.perform(&:go_to_create_from_template_group_tab)
end end
it 'successfully imports the project using template' do it 'successfully imports the project using template', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/915' do
Page::Project::New.perform do |new_page| Page::Project::New.perform do |new_page|
expect(new_page.group_template_tab_badge_text).to eq "1" expect(new_page.group_template_tab_badge_text).to eq "1"
expect(new_page).to have_text(@template_container_group_name) expect(new_page).to have_text(@template_container_group_name)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment