Commit 452297ad authored by Mark Lapierre's avatar Mark Lapierre

Merge branch 'dj-disable-monkey-patching-for-qa' into 'master'

Disable monkey patching globally for QA tests

See merge request gitlab-org/gitlab!43743
parents 293a4416 33d4e176
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Manage', :requires_admin, :skip_live_env do RSpec.describe 'Manage', :requires_admin, :skip_live_env do
describe '2FA' do describe '2FA' do
let(:owner_user) do let(:owner_user) do
Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_2fa_owner_username_1, Runtime::Env.gitlab_qa_2fa_owner_password_1) Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_2fa_owner_username_1, Runtime::Env.gitlab_qa_2fa_owner_password_1)
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Manage', :requires_admin, :skip_live_env do RSpec.describe 'Manage', :requires_admin, :skip_live_env do
describe '2FA' do describe '2FA' do
let(:owner_user) do let(:owner_user) do
Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_2fa_owner_username_1, Runtime::Env.gitlab_qa_2fa_owner_password_1) Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_2fa_owner_username_1, Runtime::Env.gitlab_qa_2fa_owner_password_1)
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Create' do RSpec.describe 'Create' do
describe 'Contribution Analytics' do describe 'Contribution Analytics' do
let(:group) do let(:group) do
Resource::Group.fabricate_via_api! do |group| Resource::Group.fabricate_via_api! do |group|
......
...@@ -2,7 +2,7 @@ ...@@ -2,7 +2,7 @@
require 'securerandom' require 'securerandom'
module QA module QA
context 'Create', :requires_admin, :skip_live_env, quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/195179', type: :flaky } do RSpec.describe 'Create', :requires_admin, :skip_live_env, quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/195179', type: :flaky } do
describe 'Jenkins integration' do describe 'Jenkins integration' do
let(:project_name) { "project_with_jenkins_#{SecureRandom.hex(4)}" } let(:project_name) { "project_with_jenkins_#{SecureRandom.hex(4)}" }
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Create' do RSpec.describe 'Create' do
describe 'batch comments in merge request' do describe 'batch comments in merge request' do
let(:project) do let(:project) do
Resource::Project.fabricate_via_api! do |project| Resource::Project.fabricate_via_api! do |project|
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Create' do RSpec.describe 'Create' do
describe 'Approval rules', quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/225595', type: :investigating } do describe 'Approval rules', quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/225595', type: :investigating } do
let(:approver1) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) } let(:approver1) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) }
let(:approver2) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_2, Runtime::Env.gitlab_qa_password_2) } let(:approver2) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_2, Runtime::Env.gitlab_qa_password_2) }
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Create' do RSpec.describe 'Create' do
describe 'Codeowners' do describe 'Codeowners' do
# Create one user to be the assigned approver and another user who will not be an approver # Create one user to be the assigned approver and another user who will not be an approver
let(:approver) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) } let(:approver) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) }
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Create' do RSpec.describe 'Create' do
describe 'Codeowners' do describe 'Codeowners' do
let(:files) do let(:files) do
[ [
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Create' do RSpec.describe 'Create' do
describe 'File Locking' do describe 'File Locking' do
before do before do
Flow::Login.sign_in Flow::Login.sign_in
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Create' do RSpec.describe 'Create' do
describe 'Codeowners' do describe 'Codeowners' do
context 'when the project is in the root group', :requires_admin do context 'when the project is in the root group', :requires_admin do
let(:approver) do let(:approver) do
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Create' do RSpec.describe 'Create' do
describe 'Codeowners' do describe 'Codeowners' do
context 'when the project is in a subgroup', :requires_admin do context 'when the project is in a subgroup', :requires_admin do
let(:approver) do let(:approver) do
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Create' do RSpec.describe 'Create' do
describe 'Pull mirror a repository over HTTP' do describe 'Pull mirror a repository over HTTP' do
it 'configures and syncs a (pull) mirrored repository with password auth', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/520' do it 'configures and syncs a (pull) mirrored repository with password auth', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/520' do
Flow::Login.sign_in Flow::Login.sign_in
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Create' do RSpec.describe 'Create' do
describe 'Pull mirror a repository over SSH with a private key' do describe 'Pull mirror a repository over SSH with a private key' do
let(:source) do let(:source) do
Resource::Repository::ProjectPush.fabricate! do |project_push| Resource::Repository::ProjectPush.fabricate! do |project_push|
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Create' do RSpec.describe 'Create' do
context 'Push Rules' do context 'Push Rules' do
describe 'using non signed commits' do describe 'using non signed commits' do
before(:context) do before(:context) do
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
context 'Create' do RSpec.describe 'Create' do
describe 'Restricted protected branch push and merge' do describe 'Restricted protected branch push and merge' do
let(:user_developer) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) } let(:user_developer) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) }
let(:user_maintainer) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_2, Runtime::Env.gitlab_qa_password_2) } let(:user_maintainer) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_2, Runtime::Env.gitlab_qa_password_2) }
......
...@@ -3,7 +3,7 @@ ...@@ -3,7 +3,7 @@
module QA module QA
# This test was quarantined because relative URL isn't supported # This test was quarantined because relative URL isn't supported
# See https://gitlab.com/gitlab-org/gitlab/issues/13833 # See https://gitlab.com/gitlab-org/gitlab/issues/13833
context 'Create', :runner, :quarantine do RSpec.describe 'Create', :runner, :quarantine do
describe 'Web IDE web terminal' do describe 'Web IDE web terminal' do
before do before do
project = Resource::Project.fabricate_via_api! do |project| project = Resource::Project.fabricate_via_api! do |project|
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
describe Service::DockerRun::GitlabRunner do RSpec.describe Service::DockerRun::GitlabRunner do
let(:runner_name) { 'test-runner' } let(:runner_name) { 'test-runner' }
let(:address) { 'gitlab.test' } let(:address) { 'gitlab.test' }
let(:token) { 'abc123' } let(:token) { 'abc123' }
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
describe Service::DockerRun::K3s do RSpec.describe Service::DockerRun::K3s do
describe '#host_name' do describe '#host_name' do
context 'in CI' do context 'in CI' do
let(:name) { 'k3s-12345' } let(:name) { 'k3s-12345' }
......
# frozen_string_literal: true # frozen_string_literal: true
module QA module QA
shared_examples 'code owner merge request' do RSpec.shared_examples 'code owner merge request' do
let(:branch_name) { 'new-branch' } let(:branch_name) { 'new-branch' }
it 'is approved and merged' do it 'is approved and merged' do
......
# frozen_string_literal: true # frozen_string_literal: true
shared_examples 'a QA scenario class' do module QA
RSpec.shared_examples 'a QA scenario class' do
let(:attributes) { spy('Runtime::Scenario') } let(:attributes) { spy('Runtime::Scenario') }
let(:runner) { spy('Specs::Runner') } let(:runner) { spy('Specs::Runner') }
let(:release) { spy('Runtime::Release') } let(:release) { spy('Runtime::Release') }
...@@ -70,4 +71,5 @@ shared_examples 'a QA scenario class' do ...@@ -70,4 +71,5 @@ shared_examples 'a QA scenario class' do
described_class.launch!(named_options.push(*%w[-- --tag quarantine])) described_class.launch!(named_options.push(*%w[-- --tag quarantine]))
end end
end end
end
end end
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment