Commit 155f56e4 authored by Mark Lapierre's avatar Mark Lapierre

Rename `status_issue` tag to `testcase` 2 of 3

Because it's a more specific and more flexible name.
parent afa79d13
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Create' do
describe 'Push over HTTP using Git protocol version 2', :requires_git_protocol_v2 do
it 'user pushes to the repository', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/469' do
it 'user pushes to the repository', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/469' do
Flow::Login.sign_in
# Create a project to push to
......
......@@ -27,7 +27,7 @@ module QA
Page::Main::Menu.perform(&:sign_out_if_signed_in)
end
it 'user pushes to the repository', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/386' do
it 'user pushes to the repository', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/386' do
project = Resource::Project.fabricate_via_api! do |project|
project.name = 'git-protocol-project'
end
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Create' do
describe 'Git push over HTTP', :ldap_no_tls, :smoke do
it 'user using a personal access token pushes code to the repository', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/430' do
it 'user using a personal access token pushes code to the repository', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/430' do
Flow::Login.sign_in
access_token = Resource::PersonalAccessToken.fabricate!.access_token
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Create' do
describe 'Push mirror a repository over HTTP' do
it 'configures and syncs a (push) mirrored repository', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/414' do
it 'configures and syncs a (push) mirrored repository', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/414' do
Runtime::Browser.visit(:gitlab, Page::Main::Login)
Page::Main::Login.perform(&:sign_in_using_credentials)
......
......@@ -26,7 +26,7 @@ module QA
set_file_size_limit(nil)
end
it 'push successful when the file size is under the limit', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/456' do
it 'push successful when the file size is under the limit', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/456' do
set_file_size_limit(5)
retry_on_fail do
......@@ -36,7 +36,7 @@ module QA
end
end
it 'push fails when the file size is above the limit', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/458' do
it 'push fails when the file size is above the limit', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/458' do
set_file_size_limit(2)
retry_on_fail do
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Create' do
describe 'Git push over HTTP', :ldap_no_tls do
it 'user pushes code to the repository', :smoke, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/426' do
it 'user pushes code to the repository', :smoke, testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/426' do
Flow::Login.sign_in
Resource::Repository::ProjectPush.fabricate! do |push|
......@@ -18,7 +18,7 @@ module QA
end
end
it 'pushes to a project using a specific Praefect repository storage', :smoke, :requires_admin, :requires_praefect, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/742' do
it 'pushes to a project using a specific Praefect repository storage', :smoke, :requires_admin, :requires_praefect, testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/742' do
Flow::Login.sign_in_as_admin
project = Resource::Project.fabricate_via_api! do |storage_project|
......
......@@ -26,7 +26,7 @@ module QA
Flow::Login.sign_in
end
it 'pushes code to the repository via SSH', :smoke, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/969' do
it 'pushes code to the repository via SSH', :smoke, testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/969' do
Resource::Repository::ProjectPush.fabricate! do |push|
push.project = project
push.ssh_key = @key
......@@ -41,7 +41,7 @@ module QA
end
end
it 'pushes multiple branches and tags together', :smoke, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/970' do
it 'pushes multiple branches and tags together', :smoke, testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/970' do
branches = []
tags = []
Git::Repository.perform do |repository|
......
......@@ -18,7 +18,7 @@ module QA
end
context 'when developers and maintainers are allowed to push to a protected branch' do
it 'user with push rights successfully pushes to the protected branch', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/447' do
it 'user with push rights successfully pushes to the protected branch', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/447' do
create_protected_branch(allowed_to_push: {
roles: Resource::ProtectedBranch::Roles::DEVS_AND_MAINTAINERS
})
......@@ -30,7 +30,7 @@ module QA
end
context 'when developers and maintainers are not allowed to push to a protected branch' do
it 'user without push rights fails to push to the protected branch', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/449' do
it 'user without push rights fails to push to the protected branch', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/449' do
create_protected_branch(allowed_to_push: {
roles: Resource::ProtectedBranch::Roles::NO_ONE
})
......
......@@ -9,7 +9,7 @@ module QA
Flow::Login.sign_in
end
it 'user can add an SSH key', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/929' do
it 'user can add an SSH key', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/929' do
key = Resource::SSHKey.fabricate_via_browser_ui! do |resource|
resource.title = key_title
end
......@@ -20,7 +20,7 @@ module QA
# Note this context ensures that the example it contains is executed after the example above. Be aware of the order of execution if you add new examples in either context.
context 'after adding an ssh key' do
it 'can delete an ssh key', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/930' do
it 'can delete an ssh key', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/930' do
Page::Main::Menu.perform(&:click_settings_link)
Page::Profile::Menu.perform(&:click_ssh_keys)
Page::Profile::SSHKeys.perform do |ssh_keys|
......
......@@ -43,7 +43,7 @@ module QA
find('pre').text
end
it 'user views raw email patch', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/442' do
it 'user views raw email patch', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/442' do
view_commit
Page::Project::Commit::Show.perform(&:select_email_patches)
......@@ -53,7 +53,7 @@ module QA
expect(page).to have_content('diff --git a/second b/second')
end
it 'user views raw commit diff', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/439' do
it 'user views raw commit diff', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/439' do
view_commit
Page::Project::Commit::Show.perform(&:select_plain_diff)
......
......@@ -36,7 +36,7 @@ module QA
Flow::Login.sign_in
end
it 'clones, pushes, and pulls a snippet over HTTP, edits via UI', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/826' do
it 'clones, pushes, and pulls a snippet over HTTP, edits via UI', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/826' do
Resource::Repository::Push.fabricate! do |push|
push.repository_http_uri = repository_uri_http
push.file_name = new_file
......@@ -65,7 +65,7 @@ module QA
end
end
it 'clones, pushes, and pulls a snippet over SSH, deletes via UI', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/825' do
it 'clones, pushes, and pulls a snippet over SSH, deletes via UI', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/825' do
Resource::Repository::Push.fabricate! do |push|
push.repository_ssh_uri = repository_uri_ssh
push.ssh_key = ssh_key
......
......@@ -36,7 +36,7 @@ module QA
Flow::Login.sign_in
end
it 'clones, pushes, and pulls a project snippet over HTTP, edits via UI', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/833' do
it 'clones, pushes, and pulls a project snippet over HTTP, edits via UI', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/833' do
Resource::Repository::Push.fabricate! do |push|
push.repository_http_uri = repository_uri_http
push.file_name = new_file
......@@ -65,7 +65,7 @@ module QA
end
end
it 'clones, pushes, and pulls a project snippet over SSH, deletes via UI', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/832' do
it 'clones, pushes, and pulls a project snippet over SSH, deletes via UI', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/832' do
Resource::Repository::Push.fabricate! do |push|
push.repository_ssh_uri = repository_uri_ssh
push.ssh_key = ssh_key
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Create', :smoke do
describe 'Personal snippet creation' do
it 'User creates a personal snippet', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/840' do
it 'User creates a personal snippet', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/840' do
Flow::Login.sign_in
Page::Main::Menu.perform do |menu|
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Create' do # to be converted to a smoke test once proved to be stable
describe 'Project snippet creation' do
it 'User creates a project snippet', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/839' do
it 'User creates a project snippet', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/839' do
Flow::Login.sign_in
Resource::ProjectSnippet.fabricate_via_browser_ui! do |snippet|
......
......@@ -17,7 +17,7 @@ module QA
Flow::Login.sign_in
end
it "creates the first file in an empty project via Web IDE", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/847' do
it "creates the first file in an empty project via Web IDE", testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/847' do
# In the first iteration, the test opens Web IDE by modifying the URL to address past regressions.
# Once the Web IDE button is introduced for empty projects, the test will be modified to go through UI.
# See https://gitlab.com/gitlab-org/gitlab/-/issues/27915 and https://gitlab.com/gitlab-org/gitlab/-/issues/27535.
......
......@@ -14,7 +14,7 @@ module QA
let(:user) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) }
context 'when no fork is present' do
it 'suggests to create a fork when a user clicks Web IDE in the main project', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/959' do
it 'suggests to create a fork when a user clicks Web IDE in the main project', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/959' do
Flow::Login.sign_in(as: user)
parent_project.visit!
......@@ -34,7 +34,7 @@ module QA
end
end
it 'opens the fork when a user clicks Web IDE in the main project', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/960' do
it 'opens the fork when a user clicks Web IDE in the main project', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/960' do
Flow::Login.sign_in(as: user)
fork_project.upstream.visit!
Page::Project::Show.perform do |project_page|
......
......@@ -20,7 +20,7 @@ module QA
merge_request.visit!
end
it 'opens and edits a merge request in Web IDE', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/705' do
it 'opens and edits a merge request in Web IDE', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/705' do
Page::MergeRequest::Show.perform do |show|
show.click_open_in_web_ide
end
......
......@@ -15,7 +15,7 @@ module QA
Flow::Login.sign_in
end
it 'by adding a home page to the wiki', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/856' do
it 'by adding a home page to the wiki', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/856' do
project.visit!
Page::Project::Menu.perform(&:click_wiki)
......@@ -35,7 +35,7 @@ module QA
end
end
it 'by adding a second page to the wiki', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/855' do
it 'by adding a second page to the wiki', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/855' do
wiki.visit!
Page::Project::Wiki::Show.perform(&:click_new_page)
......@@ -54,7 +54,7 @@ module QA
end
end
it 'by adding a home page to the wiki using git push', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/853' do
it 'by adding a home page to the wiki using git push', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/853' do
empty_wiki = Resource::Wiki::ProjectPage.new do |empty_wiki|
empty_wiki.project = project
end
......@@ -73,7 +73,7 @@ module QA
end
end
it 'by adding a second page to the wiki using git push', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/854' do
it 'by adding a second page to the wiki using git push', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/854' do
Resource::Repository::WikiPush.fabricate! do |push|
push.file_name = "#{new_wiki_title}.md"
push.file_content = new_wiki_content
......
......@@ -14,7 +14,7 @@ module QA
Flow::Login.sign_in
end
it 'by manipulating content on the page', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/857' do
it 'by manipulating content on the page', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/857' do
wiki.visit!
Page::Project::Wiki::Show.perform(&:click_edit)
......@@ -33,7 +33,7 @@ module QA
end
end
it 'by manipulating content on the page using git push', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/858' do
it 'by manipulating content on the page using git push', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/858' do
Resource::Repository::WikiPush.fabricate! do |push|
push.file_content = new_wiki_content
push.commit_message = commit_message
......
......@@ -10,7 +10,7 @@ module QA
Flow::Login.sign_in
end
it 'has changed the directory', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/948' do
it 'has changed the directory', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/948' do
initial_wiki.visit!
Page::Project::Wiki::Show.perform(&:click_edit)
......
......@@ -15,7 +15,7 @@ module QA
end
context 'Sidebar' do
it 'has all expected links that work', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/903' do
it 'has all expected links that work', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/903' do
small_wiki.visit!
small_number_of_pages.times do |index|
......@@ -35,7 +35,7 @@ module QA
end
context 'Page List' do
it 'has all expected links that work', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/902' do
it 'has all expected links that work', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/902' do
large_wiki.visit!
Page::Project::Wiki::Show.perform(&:click_view_all_pages)
......
......@@ -10,7 +10,7 @@ module QA
end
context 'Page deletion' do
it 'has removed the deleted page correctly', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/921' do
it 'has removed the deleted page correctly', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/921' do
initial_wiki.visit!
Page::Project::Wiki::Show.perform(&:click_edit)
......
......@@ -16,7 +16,7 @@ module QA
open_ci_cd_settings
end
it 'user adds a CI variable', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/395' do
it 'user adds a CI variable', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/395' do
Page::Project::Settings::CICD.perform do |settings|
settings.expand_ci_variables do |page|
expect(page).to have_text('VARIABLE_KEY')
......@@ -29,7 +29,7 @@ module QA
end
end
it 'user removes a CI variable', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/394' do
it 'user removes a CI variable', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/394' do
Page::Project::Settings::CICD.perform do |settings|
settings.expand_ci_variables do |page|
page.click_edit_ci_variable
......
......@@ -24,7 +24,7 @@ module QA
runner.remove_via_api!
end
it 'users creates a pipeline which gets processed', :smoke, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/391' do
it 'users creates a pipeline which gets processed', :smoke, testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/391' do
Flow::Login.sign_in
Resource::Repository::Commit.fabricate_via_api! do |commit|
......
......@@ -15,7 +15,7 @@ module QA
runner.remove_via_api!
end
it 'user registers a new specific runner', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/392' do
it 'user registers a new specific runner', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/392' do
Flow::Login.sign_in
runner.project.visit!
......
......@@ -33,7 +33,7 @@ module QA
runner.remove_via_api!
end
it 'creates an MR with code coverage statistics', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/807' do
it 'creates an MR with code coverage statistics', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/807' do
runner.project.visit!
configure_code_coverage(simplecov)
merge_request.visit!
......
......@@ -22,7 +22,7 @@ module QA
end
end
it 'publishes a maven package and deletes it', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/943' do
it 'publishes a maven package and deletes it', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/943' do
uri = URI.parse(Runtime::Scenario.gitlab_address)
gitlab_address_with_port = "#{uri.scheme}://#{uri.host}:#{uri.port}"
pom_xml = {
......
......@@ -21,7 +21,7 @@ module QA
end
end
it 'publishes an npm package and then deletes it', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/944' do
it 'publishes an npm package and then deletes it', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/944' do
uri = URI.parse(Runtime::Scenario.gitlab_address)
gitlab_host_with_port = "#{uri.host}:#{uri.port}"
gitlab_address_with_port = "#{uri.scheme}://#{uri.host}:#{uri.port}"
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Release' do
describe 'Deploy key creation' do
it 'user adds a deploy key', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/390' do
it 'user adds a deploy key', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/390' do
Flow::Login.sign_in
key = Runtime::Key::RSA.new
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Release', quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/213222', type: :flaky } do
describe 'Deploy token creation' do
it 'user adds a deploy token', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/419' do
it 'user adds a deploy token', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/419' do
Flow::Login.sign_in
deploy_token_name = 'deploy token name'
......
......@@ -25,7 +25,7 @@ module QA
runner.remove_via_api!
end
it 'parent pipelines passes if child passes', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/751' do
it 'parent pipelines passes if child passes', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/751' do
add_ci_files(success_child_ci_file)
view_pipelines
......@@ -35,7 +35,7 @@ module QA
end
end
it 'parent pipeline fails if child fails', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/752' do
it 'parent pipeline fails if child fails', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/752' do
add_ci_files(fail_child_ci_file)
view_pipelines
......
......@@ -25,7 +25,7 @@ module QA
runner.remove_via_api!
end
it 'parent pipelines passes if child passes', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/754' do
it 'parent pipelines passes if child passes', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/754' do
add_ci_files(success_child_ci_file)
view_pipelines
......@@ -35,7 +35,7 @@ module QA
end
end
it 'parent pipeline passes even if child fails', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/753' do
it 'parent pipeline passes even if child fails', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/753' do
add_ci_files(fail_child_ci_file)
view_pipelines
......
......@@ -23,7 +23,7 @@ module QA
cluster&.remove!
end
it 'runs auto devops', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/702' do
it 'runs auto devops', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/702' do
Flow::Login.sign_in
# Set an application secret CI variable (prefixed with K8S_SECRET_)
......@@ -116,7 +116,7 @@ module QA
end
end
it 'runs an AutoDevOps pipeline', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/444' do
it 'runs an AutoDevOps pipeline', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/444' do
Page::Project::Menu.perform(&:click_ci_cd_pipelines)
Page::Project::Pipeline::Index.perform(&:click_on_latest_pipeline)
......
......@@ -20,7 +20,7 @@ module QA
cluster.remove!
end
it 'can create and associate a project cluster', :smoke, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/707' do
it 'can create and associate a project cluster', :smoke, testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/707' do
Resource::KubernetesCluster::ProjectCluster.fabricate_via_browser_ui! do |k8s_cluster|
k8s_cluster.project = project
k8s_cluster.cluster = cluster
......
......@@ -10,13 +10,13 @@ module QA
@project.visit!
end
it 'configures custom metrics', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/872' do
it 'configures custom metrics', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/872' do
verify_add_custom_metric
verify_edit_custom_metric
verify_delete_custom_metric
end
it 'duplicates to create dashboard to custom', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/871' do
it 'duplicates to create dashboard to custom', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/871' do
Page::Project::Menu.perform(&:go_to_operations_metrics)
Page::Project::Operations::Metrics::Show.perform do |on_dashboard|
......@@ -27,7 +27,7 @@ module QA
end
end
it 'verifies data on filtered deployed environment', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/874' do
it 'verifies data on filtered deployed environment', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/874' do
Page::Project::Menu.perform(&:go_to_operations_metrics)
Page::Project::Operations::Metrics::Show.perform do |on_dashboard|
......@@ -37,7 +37,7 @@ module QA
end
end
it 'filters using the quick range', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/873' do
it 'filters using the quick range', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/873' do
Page::Project::Menu.perform(&:go_to_operations_metrics)
Page::Project::Operations::Metrics::Show.perform do |on_dashboard|
......@@ -52,7 +52,7 @@ module QA
end
end
it 'observes cluster health graph', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/920' do
it 'observes cluster health graph', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/920' do
Page::Project::Menu.perform(&:go_to_operations_kubernetes)
Page::Project::Operations::Kubernetes::Index.perform do |cluster_list|
......
......@@ -20,7 +20,7 @@ module QA
end
end
it 'shows results for the original request and AJAX requests', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/478' do
it 'shows results for the original request and AJAX requests', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/478' do
# Issue pages always make AJAX requests
Resource::Issue.fabricate_via_browser_ui! do |issue|
issue.title = 'Performance bar test'
......
......@@ -15,7 +15,7 @@ module QA
@fixed_due_date = (Date.today.to_date + 90).strftime("%Y-%m-%d")
end
it 'changes epic dates when updating milestones', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/616' do
it 'changes epic dates when updating milestones', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/616' do
epic_iid, milestone_id = create_epic_issue_milestone
milestone_start_date = Date.today.to_date.strftime("%Y-%m-%d")
milestone_due_date = (Date.today.to_date + 30).strftime("%Y-%m-%d")
......@@ -36,7 +36,7 @@ module QA
expect_json('due_date', milestone_due_date)
end
it 'updates epic dates when adding another issue', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/611' do
it 'updates epic dates when adding another issue', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/611' do
epic_iid = create_epic_issue_milestone[0]
milestone_start_date = Date.today.to_date.strftime("%Y-%m-%d")
milestone_due_date = (Date.today.to_date + 150).strftime("%Y-%m-%d")
......@@ -59,7 +59,7 @@ module QA
expect_json('due_date', milestone_due_date)
end
it 'updates epic dates when removing issue', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/615' do
it 'updates epic dates when removing issue', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/615' do
epic_iid = create_epic_issue_milestone[0]
# Get epic_issue_id
......@@ -84,7 +84,7 @@ module QA
expect_json('due_date', nil)
end
it 'updates epic dates when deleting milestones', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/613' do
it 'updates epic dates when deleting milestones', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/613' do
epic_iid, milestone_id = create_epic_issue_milestone
# Delete Milestone
......
......@@ -44,11 +44,11 @@ module QA
end
context 'when searching for projects using advanced syntax' do
it 'searches in the project name', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/747' do
it 'searches in the project name', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/747' do
expect_search_to_find_project("es-adv-*#{project_name_suffix}")
end
it 'searches in the project description', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/748' do
it 'searches in the project description', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/748' do
expect_search_to_find_project("unique +#{project_name_suffix}")
end
end
......
......@@ -44,7 +44,7 @@ module QA
end
end
it 'searches public project and finds a blob as an non-member user', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/744' do
it 'searches public project and finds a blob as an non-member user', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/744' do
successful_search(non_member_api_client)
end
......@@ -53,11 +53,11 @@ module QA
project.set_visibility(:private)
end
it 'finds a blob as an authorized user', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/745' do
it 'finds a blob as an authorized user', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/745' do
successful_search(api_client)
end
it 'does not find a blob as an non-member user', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/746' do
it 'does not find a blob as an non-member user', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/746' do
QA::Support::Retrier.retry_on_exception(max_attempts: 10, sleep_interval: 12) do
get Runtime::Search.create_search_request(non_member_api_client, 'blobs', project_file_content).url
expect_status(QA::Support::Api::HTTP_STATUS_OK)
......
......@@ -39,7 +39,7 @@ module QA
end
describe 'editing a Geo node' do
it 'PUT /geo_nodes/:id for secondary node', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/683' do
it 'PUT /geo_nodes/:id for secondary node', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/683' do
endpoint = api_endpoint("/geo_nodes/#{@secondary_node[:id]}")
new_attributes = { enabled: false, files_max_capacity: 1000, repos_max_capacity: 2000 }
......
......@@ -43,7 +43,7 @@ module QA
let(:user) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) }
context 'Add group', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/733' do
context 'Add group', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/733' do
let(:group_name) { 'new group' }
before do
......@@ -57,7 +57,7 @@ module QA
it_behaves_like 'audit event', ['Added group']
end
context 'Change repository size limit', :requires_admin, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/731' do
context 'Change repository size limit', :requires_admin, testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/731' do
before do
sign_in(as_admin: true)
group.visit!
......@@ -70,7 +70,7 @@ module QA
it_behaves_like 'audit event', ['Changed repository size limit']
end
context 'Update group name', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/732' do
context 'Update group name', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/732' do
before do
sign_in
group.visit!
......@@ -85,7 +85,7 @@ module QA
it_behaves_like 'audit event', ['Changed name']
end
context 'Add user, change access level, remove user', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/734' do
context 'Add user, change access level, remove user', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/734' do
before do
sign_in
group.visit!
......@@ -100,7 +100,7 @@ module QA
it_behaves_like 'audit event', ['Added user access as Guest', 'Changed access level', 'Removed user access']
end
context 'Add and remove project access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/735' do
context 'Add and remove project access', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/735' do
before do
sign_in
project.visit!
......
......@@ -19,7 +19,7 @@ module QA
end
end
context 'Disable and Enable LFS', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/749' do
context 'Disable and Enable LFS', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/749' do
before do
sign_in
group.visit!
......@@ -33,7 +33,7 @@ module QA
it_behaves_like 'audit event', ["Changed lfs enabled from false to true", /Changed lfs enabled( from true)? to false/]
end
context 'Enable and disable membership lock', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/723' do
context 'Enable and disable membership lock', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/723' do
before do
sign_in
group.visit!
......@@ -47,7 +47,7 @@ module QA
it_behaves_like 'audit event', ["Changed membership lock from true to false", "Changed membership lock from false to true"]
end
context 'Enable and disable allow user request access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/725' do
context 'Enable and disable allow user request access', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/725' do
before do
sign_in
group.visit!
......@@ -61,7 +61,7 @@ module QA
it_behaves_like 'audit event', ["Changed request access enabled from true to false", "Changed request access enabled from false to true"]
end
context 'Enable and disable 2FA requirement', :requires_admin, :skip_live_env, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/750' do
context 'Enable and disable 2FA requirement', :requires_admin, :skip_live_env, testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/750' do
let!(:owner_user) do
Resource::User.fabricate_via_api!
end
......@@ -103,7 +103,7 @@ module QA
it_behaves_like 'audit event', ["Changed require two factor authentication from true to false", "Changed require two factor authentication from false to true"]
end
context 'Change project creation level', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/724' do
context 'Change project creation level', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/724' do
before do
sign_in
group.visit!
......
......@@ -78,7 +78,7 @@ module QA
Page::Group::Menu.perform(&:click_group_members_item)
end
it 'has LDAP users synced', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/670' do
it 'has LDAP users synced', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/670' do
verify_users_synced(sync_users)
end
end
......@@ -130,7 +130,7 @@ module QA
Page::Group::Menu.perform(&:click_group_members_item)
end
it 'has LDAP users synced', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/669' do
it 'has LDAP users synced', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/669' do
verify_users_synced(sync_users)
end
end
......
......@@ -28,7 +28,7 @@ module QA
end
end
it 'user clones and pushes to project within a group using Git HTTP', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/675' do
it 'user clones and pushes to project within a group using Git HTTP', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/675' do
Flow::Login.sign_in
@project = Resource::Project.fabricate! do |project|
......
......@@ -36,7 +36,7 @@ module QA
Flow::Saml.logout_from_idp(@saml_idp_service)
end
it 'removes existing users from the group, forces existing users to create a new account and allows to leave group', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/708' do
it 'removes existing users from the group, forces existing users to create a new account and allows to leave group', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/708' do
expect(@group.list_members.map { |item| item["username"] }).not_to include(@developer_user.username)
visit_managed_group_url
......
......@@ -28,7 +28,7 @@ module QA
let(:user) { Resource::User.fabricate_via_api! }
let(:default_membership_role) { 'Developer' }
it 'adds the new member with access level as set in SAML SSO configuration', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/968' do
it 'adds the new member with access level as set in SAML SSO configuration', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/968' do
managed_group_url = Flow::Saml.enable_saml_sso(@group, @saml_idp_service, default_membership_role)
Page::Main::Menu.perform(&:sign_out_if_signed_in)
......@@ -45,7 +45,7 @@ module QA
end
end
it 'User logs in to group with SAML SSO', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/673' do
it 'User logs in to group with SAML SSO', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/673' do
managed_group_url = Flow::Saml.enable_saml_sso(@group, @saml_idp_service)
page.visit managed_group_url
......@@ -63,7 +63,7 @@ module QA
expect(page).to have_content("Already signed in with SAML for #{@group.path}")
end
it 'Lets group admin test settings', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/674' do
it 'Lets group admin test settings', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/674' do
incorrect_fingerprint = Digest::SHA1.hexdigest(rand.to_s)
Flow::Saml.visit_saml_sso_settings(@group)
......
......@@ -48,7 +48,7 @@ module QA
let(:ip_address) { get_next_ip_address(fetch_current_ip_address) }
context 'via the UI' do
it 'denies access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/862' do
it 'denies access', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/862' do
Flow::Login.sign_in(as: @user)
@group.sandbox.visit!
......@@ -62,7 +62,7 @@ module QA
end
context 'via the API' do
it 'denies access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/861' do
it 'denies access', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/861' do
request = create_request("/groups/#{@sandbox_group.id}")
response = get request.url
expect(response.code).to eq(404)
......@@ -83,7 +83,7 @@ module QA
end
end
it 'denies access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/860' do
it 'denies access', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/860' do
expect { push_a_project_with_ssh_key(key) }.to raise_error(QA::Git::Repository::RepositoryCommandError, /fatal: Could not read from remote repository/)
end
end
......@@ -93,7 +93,7 @@ module QA
let(:ip_address) { fetch_current_ip_address }
context 'via the UI' do
it 'allows access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/865' do
it 'allows access', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/865' do
Flow::Login.sign_in(as: @user)
@group.sandbox.visit!
......@@ -105,7 +105,7 @@ module QA
end
context 'via the API' do
it 'allows access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/864' do
it 'allows access', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/864' do
request = create_request("/groups/#{@sandbox_group.id}")
response = get request.url
expect(response.code).to eq(200)
......@@ -126,7 +126,7 @@ module QA
end
end
it 'allows access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/863' do
it 'allows access', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/863' do
expect { push_a_project_with_ssh_key(key) }.not_to raise_error
end
end
......
......@@ -34,7 +34,7 @@ module QA
source_group_with_members.add_member(maintainer_user, Resource::Members::AccessLevel::MAINTAINER)
end
it 'can be shared with another group with correct access level', :requires_admin, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/945' do
it 'can be shared with another group with correct access level', :requires_admin, testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/945' do
Flow::Login.sign_in
target_group_with_project.visit!
......
......@@ -16,7 +16,7 @@ module QA
end
end
context 'group insights page', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/591' do
context 'group insights page', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/591' do
before do
Flow::Login.sign_in
......@@ -28,7 +28,7 @@ module QA
it_behaves_like 'default insights page'
end
context 'project insights page', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/593' do
context 'project insights page', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/593' do
before do
Flow::Login.sign_in
......
......@@ -19,7 +19,7 @@ module QA
end
describe 'Instance', :requires_admin do
context 'Failed sign in', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/736' do
context 'Failed sign in', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/736' do
before do
Runtime::Browser.visit(:gitlab, Page::Main::Login)
invalid_user = QA::Resource::User.new.tap do |user|
......@@ -36,7 +36,7 @@ module QA
it_behaves_like 'audit event', ["Failed to login with STANDARD authentication"]
end
context 'Successful sign in', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/737' do
context 'Successful sign in', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/737' do
before do
sign_in
end
......@@ -44,7 +44,7 @@ module QA
it_behaves_like 'audit event', ["Signed in with STANDARD authentication"]
end
context 'Add SSH key', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/738' do
context 'Add SSH key', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/738' do
before do
sign_in
Resource::SSHKey.fabricate_via_browser_ui! do |resource|
......@@ -55,7 +55,7 @@ module QA
it_behaves_like 'audit event', ["Added SSH key"]
end
context 'Add and delete email', quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/217831', type: :bug }, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/741' do
context 'Add and delete email', quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/217831', type: :bug }, testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/741' do
before do
sign_in
new_email_address = 'new_email@example.com'
......@@ -73,7 +73,7 @@ module QA
it_behaves_like 'audit event', ["Added email", "Removed email"]
end
context 'Change password', :skip_signup_disabled, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/740' do
context 'Change password', :skip_signup_disabled, testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/740' do
before do
user = Resource::User.fabricate_via_api! do |user|
user.username = "user_#{SecureRandom.hex(4)}"
......@@ -96,7 +96,7 @@ module QA
it_behaves_like 'audit event', ["Changed password"]
end
context 'Start and stop user impersonation', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/739' do
context 'Start and stop user impersonation', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/739' do
before do
sign_in
user = Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1)
......
......@@ -10,7 +10,7 @@ module QA
login_with_ldap_admin_user
end
it 'sets and removes user\'s admin status', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/672' do
it 'sets and removes user\'s admin status', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/672' do
Page::Main::Menu.perform do |menu|
admin_synchronised = menu.wait_until(max_duration: 80, sleep_interval: 1, reload: true) do
menu.has_admin_area_link?
......
......@@ -25,7 +25,7 @@ module QA
let(:user) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) }
context "Add project", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/727' do
context "Add project", testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/727' do
before do
Resource::Project.fabricate_via_browser_ui! do |project|
project.name = 'audit-add-project-via-ui'
......@@ -35,7 +35,7 @@ module QA
it_behaves_like 'audit event', ["Added project"]
end
context "Add user access as guest", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/729' do
context "Add user access as guest", testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/729' do
before do
project.visit!
......@@ -48,7 +48,7 @@ module QA
it_behaves_like 'audit event', ["Added user access as Guest"]
end
context "Add deploy key", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/730' do
context "Add deploy key", testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/730' do
before do
key = Runtime::Key::RSA.new
deploy_key_title = 'deploy key title'
......@@ -64,7 +64,7 @@ module QA
it_behaves_like 'audit event', ["Added deploy key"]
end
context "Change visibility", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/728' do
context "Change visibility", testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/728' do
before do
project.visit!
......@@ -80,7 +80,7 @@ module QA
it_behaves_like 'audit event', ["Changed visibility from Public to Private"]
end
context "Export file download", quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/217949', type: :investigating }, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/743' do
context "Export file download", quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/217949', type: :investigating }, testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/743' do
before do
QA::Support::Retrier.retry_until do
project = Resource::Project.fabricate_via_api! do |project|
......@@ -108,7 +108,7 @@ module QA
it_behaves_like 'audit event', ["Export file download started"]
end
context "Project archive and unarchive", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/726' do
context "Project archive and unarchive", testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/726' do
before do
project.visit!
......
......@@ -42,7 +42,7 @@ module QA
@group = Resource::Group.fabricate_via_api!
end
it 'successfully imports the project using template', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/905' do
it 'successfully imports the project using template', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/905' do
built_in = 'Ruby on Rails'
@group.visit!
......@@ -92,7 +92,7 @@ module QA
QA::Flow::Project.go_to_create_project_from_template
end
it 'successfully imports the project using template', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/914' do
it 'successfully imports the project using template', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/914' do
Page::Project::New.perform do |new_page|
new_page.retry_until do
new_page.go_to_create_from_template_instance_tab
......@@ -141,7 +141,7 @@ module QA
Page::Project::New.perform(&:go_to_create_from_template_group_tab)
end
it 'successfully imports the project using template', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/915' do
it 'successfully imports the project using template', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/915' do
Page::Project::New.perform do |new_page|
expect(new_page.group_template_tab_badge_text).to eq "1"
expect(new_page).to have_text(@template_container_group_name)
......
......@@ -21,7 +21,7 @@ module QA
create_issue(milestone.project, milestone, weight_of_two)
end
it 'shows burndown chart on milestone page', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/573' do
it 'shows burndown chart on milestone page', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/573' do
milestone.visit!
Page::Milestone::Show.perform do |show|
......
......@@ -11,7 +11,7 @@ module QA
Page::Admin::Menu.perform(&:go_to_preferences_settings)
end
it 'customizes email with additional text', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/554' do
it 'customizes email with additional text', testcase: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/554' do
random_custom_text = "Testing custom email - #{SecureRandom.hex(8)}"
EE::Page::Admin::Settings::Preferences.perform do |preferences|
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment