Commit 3da79e6e authored by Sanad Liaquat's avatar Sanad Liaquat

Merge branch 'ml-add-manage-status-issue-links' into 'master'

Add status_issue rspec tags for manage tests

See merge request gitlab-org/gitlab!39798
parents 03104e0b 00942513
......@@ -8,7 +8,7 @@ module QA
let(:api_client) { Runtime::API::Client.new(:gitlab, ip_limits: true) }
let(:request) { Runtime::API::Request.new(api_client, '/users') }
it 'GET /users' do
it 'GET /users', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/441' do
5.times do
get request.url
expect_status(200)
......
......@@ -8,13 +8,13 @@ module QA
let(:api_client) { Runtime::API::Client.new(:gitlab) }
let(:request) { Runtime::API::Request.new(api_client, '/users') }
it 'GET /users' do
it 'GET /users', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/460' do
get request.url
expect_status(200)
end
it 'GET /users/:username with a valid username' do
it 'GET /users/:username with a valid username', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/480' do
get request.url, { params: { username: Runtime::User.username } }
expect_status(200)
......@@ -23,7 +23,7 @@ module QA
)
end
it 'GET /users/:username with an invalid username' do
it 'GET /users/:username with an invalid username', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/462' do
get request.url, { params: { username: SecureRandom.hex(10) } }
expect_status(200)
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Configure', :orchestrated, :mattermost do
describe 'Mattermost support' do
it 'user creates a group with a mattermost team' do
it 'user creates a group with a mattermost team', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/665' do
Flow::Login.sign_in
Page::Main::Menu.perform(&:go_to_groups)
......
......@@ -43,7 +43,7 @@ module QA
end
end
it 'user transfers a project between groups' do
it 'user transfers a project between groups', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/406' do
Page::File::Show.perform(&:go_to_general_settings)
Page::Project::Settings::Main.perform(&:expand_advanced_settings)
......
......@@ -32,7 +32,7 @@ module QA
group.add_member(developer_user, Resource::Members::AccessLevel::DEVELOPER)
end
it 'allows using 2FA recovery code once only' do
it 'allows using 2FA recovery code once only', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/972' do
recovery_code = enable_2fa_for_user_and_fetch_recovery_code(developer_user)
Flow::Login.sign_in(as: developer_user, skip_page_validation: true)
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Manage', :smoke do
describe 'basic user login' do
it 'user logs in using basic credentials and logs out' do
it 'user logs in using basic credentials and logs out', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/424' do
Flow::Login.sign_in
Page::Main::Menu.perform do |menu|
......
......@@ -34,7 +34,7 @@ module QA
group.add_member(developer_user, Resource::Members::AccessLevel::DEVELOPER)
end
it 'allows enforcing 2FA via UI and logging in with 2FA' do
it 'allows enforcing 2FA via UI and logging in with 2FA', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/898' do
enforce_two_factor_authentication_on_group(group)
enable_two_factor_authentication_for_user(developer_user)
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Manage', :orchestrated, :ldap_no_tls, :ldap_tls do
describe 'LDAP login' do
it 'user logs into GitLab using LDAP credentials' do
it 'user logs into GitLab using LDAP credentials', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/668' do
Flow::Login.sign_in
Page::Main::Menu.perform do |menu|
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Manage', :orchestrated, :mattermost do
describe 'Mattermost login' do
it 'user logs into Mattermost using GitLab OAuth' do
it 'user logs into Mattermost using GitLab OAuth', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/666' do
Flow::Login.sign_in
Support::Retrier.retry_on_exception do
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Manage', :orchestrated, :instance_saml do
describe 'Instance wide SAML SSO' do
it 'User logs in to gitlab with SAML SSO' do
it 'User logs in to gitlab with SAML SSO', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/671' do
Runtime::Browser.visit(:gitlab, Page::Main::Login)
Page::Main::Login.perform(&:sign_in_with_saml)
......
......@@ -14,7 +14,7 @@ module QA
end
RSpec.describe 'Manage', :skip_signup_disabled do
describe 'standard' do
describe 'standard', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/936' do
it_behaves_like 'registration and login'
context 'when user account is deleted', :requires_admin do
......@@ -36,7 +36,7 @@ module QA
end
end
it 'allows recreating with same credentials' do
it 'allows recreating with same credentials', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/937' do
expect(Page::Main::Menu.perform(&:signed_in?)).to be_falsy
Flow::Login.sign_in(as: user, skip_page_validation: true)
......@@ -64,7 +64,7 @@ module QA
end
RSpec.describe 'Manage', :orchestrated, :ldap_no_tls, :skip_signup_disabled do
describe 'while LDAP is enabled' do
describe 'while LDAP is enabled', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/935' do
it_behaves_like 'registration and login'
end
end
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Manage' do
describe 'Add project member' do
it 'user adds project member' do
it 'user adds project member', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/482' do
Flow::Login.sign_in
user = Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1)
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Manage', :smoke do
describe 'Project creation' do
it 'user creates a new project' do
it 'user creates a new project', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/429' do
Flow::Login.sign_in
created_project = Resource::Project.fabricate_via_browser_ui! do |project|
......
......@@ -41,13 +41,13 @@ module QA
end
end
context 'when logged in as a new user' do
context 'when logged in as a new user', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/465' do
it_behaves_like 'loads all images' do
let(:new_user) { @new_user }
end
end
context 'when logged in as a new admin' do
context 'when logged in as a new admin', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/463' do
it_behaves_like 'loads all images' do
let(:new_user) { @new_admin }
end
......
......@@ -23,7 +23,7 @@ module QA
Page::Main::Menu.perform(&:sign_out_if_signed_in)
end
it 'user imports a GitHub repo' do
it 'user imports a GitHub repo', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/385' do
Flow::Login.sign_in
imported_project # import the project
......
......@@ -3,7 +3,7 @@
module QA
RSpec.describe 'Manage' do
describe 'Project activity' do
it 'user creates an event in the activity page upon Git push' do
it 'user creates an event in the activity page upon Git push', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/407' do
Flow::Login.sign_in
Resource::Repository::ProjectPush.fabricate! do |push|
......
......@@ -44,7 +44,7 @@ module QA
let(:user) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) }
let(:group) { @group }
context 'Add group' do
context 'Add group', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/733' do
let(:group_name) { 'new group' }
before do
......@@ -65,7 +65,7 @@ module QA
end
end
context 'Change repository size limit', :requires_admin do
context 'Change repository size limit', :requires_admin, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/731' do
before do
sign_in(as_admin: true)
@group.visit!
......@@ -78,7 +78,7 @@ module QA
it_behaves_like 'audit event', ['Changed repository size limit']
end
context 'Update group name' do
context 'Update group name', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/732' do
before do
sign_in
@group.visit!
......@@ -93,7 +93,7 @@ module QA
it_behaves_like 'audit event', ['Changed name']
end
context 'Add user, change access level, remove user' do
context 'Add user, change access level, remove user', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/734' do
before do
sign_in
@group.visit!
......@@ -108,7 +108,7 @@ module QA
it_behaves_like 'audit event', ['Added user access as Guest', 'Changed access level', 'Removed user access']
end
context 'Add and remove project access' do
context 'Add and remove project access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/735' do
before do
sign_in
project.visit!
......
......@@ -19,7 +19,7 @@ module QA
end
end
context 'Disable and Enable LFS' do
context 'Disable and Enable LFS', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/749' do
before do
sign_in
@group.visit!
......@@ -33,7 +33,7 @@ module QA
it_behaves_like 'audit event', ["Changed lfs enabled from false to true", /Changed lfs enabled( from true)? to false/]
end
context 'Enable and disable membership lock' do
context 'Enable and disable membership lock', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/723' do
before do
sign_in
@group.visit!
......@@ -47,7 +47,7 @@ module QA
it_behaves_like 'audit event', ["Changed membership lock from true to false", "Changed membership lock from false to true"]
end
context 'Enable and disable allow user request access' do
context 'Enable and disable allow user request access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/725' do
before do
sign_in
@group.visit!
......@@ -61,7 +61,7 @@ module QA
it_behaves_like 'audit event', ["Changed request access enabled from true to false", "Changed request access enabled from false to true"]
end
context 'Enable and disable 2FA requirement', :requires_admin, :skip_live_env do
context 'Enable and disable 2FA requirement', :requires_admin, :skip_live_env, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/750' do
let!(:owner_user) do
Resource::User.fabricate_via_api!
end
......@@ -103,7 +103,7 @@ module QA
it_behaves_like 'audit event', ["Changed require two factor authentication from true to false", "Changed require two factor authentication from false to true"]
end
context 'Change project creation level' do
context 'Change project creation level', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/724' do
before do
sign_in
@group.visit!
......
......@@ -78,7 +78,7 @@ module QA
Page::Group::Menu.perform(&:click_group_members_item)
end
it 'has LDAP users synced' do
it 'has LDAP users synced', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/670' do
verify_users_synced(sync_users)
end
end
......@@ -130,7 +130,7 @@ module QA
Page::Group::Menu.perform(&:click_group_members_item)
end
it 'has LDAP users synced' do
it 'has LDAP users synced', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/669' do
verify_users_synced(sync_users)
end
end
......
......@@ -28,7 +28,7 @@ module QA
end
end
it 'user clones and pushes to project within a group using Git HTTP' do
it 'user clones and pushes to project within a group using Git HTTP', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/675' do
Flow::Login.sign_in
@project = Resource::Project.fabricate! do |project|
......
......@@ -36,7 +36,7 @@ module QA
Flow::Saml.logout_from_idp(@saml_idp_service)
end
it 'removes existing users from the group, forces existing users to create a new account and allows to leave group' do
it 'removes existing users from the group, forces existing users to create a new account and allows to leave group', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/708' do
expect(@group.list_members.map { |item| item["username"] }).not_to include(@developer_user.username)
visit_managed_group_url
......
......@@ -28,7 +28,7 @@ module QA
let(:user) { Resource::User.fabricate_via_api! }
let(:default_membership_role) { 'Developer' }
it 'adds the new member with access level as set in SAML SSO configuration' do
it 'adds the new member with access level as set in SAML SSO configuration', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/968' do
managed_group_url = Flow::Saml.enable_saml_sso(@group, @saml_idp_service, default_membership_role)
Page::Main::Menu.perform(&:sign_out_if_signed_in)
......@@ -45,7 +45,7 @@ module QA
end
end
it 'User logs in to group with SAML SSO' do
it 'User logs in to group with SAML SSO', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/673' do
managed_group_url = Flow::Saml.enable_saml_sso(@group, @saml_idp_service)
page.visit managed_group_url
......@@ -63,7 +63,7 @@ module QA
expect(page).to have_content("Already signed in with SAML for #{@group.path}")
end
it 'Lets group admin test settings' do
it 'Lets group admin test settings', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/674' do
incorrect_fingerprint = Digest::SHA1.hexdigest(rand.to_s)
Flow::Saml.visit_saml_sso_settings(@group)
......
......@@ -48,7 +48,7 @@ module QA
let(:ip_address) { get_next_ip_address(fetch_current_ip_address) }
context 'via the UI' do
it 'denies access' do
it 'denies access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/862' do
Flow::Login.sign_in(as: @user)
@group.sandbox.visit!
......@@ -62,7 +62,7 @@ module QA
end
context 'via the API' do
it 'denies access' do
it 'denies access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/861' do
request = create_request("/groups/#{@sandbox_group.id}")
response = get request.url
expect(response.code).to eq(404)
......@@ -83,7 +83,7 @@ module QA
end
end
it 'denies access' do
it 'denies access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/860' do
expect { push_a_project_with_ssh_key(key) }.to raise_error(QA::Git::Repository::RepositoryCommandError, /fatal: Could not read from remote repository/)
end
end
......@@ -93,7 +93,7 @@ module QA
let(:ip_address) { fetch_current_ip_address }
context 'via the UI' do
it 'allows access' do
it 'allows access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/865' do
Flow::Login.sign_in(as: @user)
@group.sandbox.visit!
......@@ -105,7 +105,7 @@ module QA
end
context 'via the API' do
it 'allows access' do
it 'allows access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/864' do
request = create_request("/groups/#{@sandbox_group.id}")
response = get request.url
expect(response.code).to eq(200)
......@@ -126,7 +126,7 @@ module QA
end
end
it 'allows access' do
it 'allows access', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/863' do
expect { push_a_project_with_ssh_key(key) }.not_to raise_error
end
end
......
......@@ -34,7 +34,7 @@ module QA
source_group_with_members.add_member(maintainer_user, Resource::Members::AccessLevel::MAINTAINER)
end
it 'can be shared with another group with correct access level', :requires_admin do
it 'can be shared with another group with correct access level', :requires_admin, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/945' do
Flow::Login.sign_in
target_group_with_project.visit!
......
......@@ -16,7 +16,7 @@ module QA
end
end
context 'group insights page' do
context 'group insights page', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/591' do
before do
Flow::Login.sign_in
......@@ -28,7 +28,7 @@ module QA
it_behaves_like 'default insights page'
end
context 'project insights page' do
context 'project insights page', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/593' do
before do
Flow::Login.sign_in
......
......@@ -19,7 +19,7 @@ module QA
end
describe 'Instance', :requires_admin do
context 'Failed sign in' do
context 'Failed sign in', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/736' do
before do
Runtime::Browser.visit(:gitlab, Page::Main::Login)
invalid_user = QA::Resource::User.new.tap do |user|
......@@ -36,7 +36,7 @@ module QA
it_behaves_like 'audit event', ["Failed to login with STANDARD authentication"]
end
context 'Successful sign in' do
context 'Successful sign in', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/737' do
before do
sign_in
end
......@@ -44,7 +44,7 @@ module QA
it_behaves_like 'audit event', ["Signed in with STANDARD authentication"]
end
context 'Add SSH key' do
context 'Add SSH key', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/738' do
before do
sign_in
Resource::SSHKey.fabricate_via_browser_ui! do |resource|
......@@ -55,7 +55,7 @@ module QA
it_behaves_like 'audit event', ["Added SSH key"]
end
context 'Add and delete email', quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/217831', type: :bug } do
context 'Add and delete email', quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/217831', type: :bug }, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/741' do
before do
sign_in
new_email_address = 'new_email@example.com'
......@@ -73,7 +73,7 @@ module QA
it_behaves_like 'audit event', ["Added email", "Removed email"]
end
context 'Change password', :skip_signup_disabled do
context 'Change password', :skip_signup_disabled, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/740' do
before do
user = Resource::User.fabricate_via_api! do |user|
user.username = "user_#{SecureRandom.hex(4)}"
......@@ -96,7 +96,7 @@ module QA
it_behaves_like 'audit event', ["Changed password"]
end
context 'Start and stop user impersonation' do
context 'Start and stop user impersonation', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/739' do
before do
sign_in
user = Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1)
......
......@@ -10,7 +10,7 @@ module QA
login_with_ldap_admin_user
end
it 'sets and removes user\'s admin status' do
it 'sets and removes user\'s admin status', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/672' do
Page::Main::Menu.perform do |menu|
admin_synchronised = menu.wait_until(max_duration: 80, sleep_interval: 1, reload: true) do
menu.has_admin_area_link?
......
......@@ -25,7 +25,7 @@ module QA
let(:user) { Resource::User.fabricate_or_use(Runtime::Env.gitlab_qa_username_1, Runtime::Env.gitlab_qa_password_1) }
context "Add project" do
context "Add project", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/727' do
before do
Resource::Project.fabricate_via_browser_ui! do |project|
project.name = 'audit-add-project-via-ui'
......@@ -35,7 +35,7 @@ module QA
it_behaves_like 'audit event', ["Added project"]
end
context "Add user access as guest" do
context "Add user access as guest", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/729' do
before do
project.visit!
......@@ -48,7 +48,7 @@ module QA
it_behaves_like 'audit event', ["Added user access as Guest"]
end
context "Add deploy key" do
context "Add deploy key", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/730' do
before do
key = Runtime::Key::RSA.new
deploy_key_title = 'deploy key title'
......@@ -64,7 +64,7 @@ module QA
it_behaves_like 'audit event', ["Added deploy key"]
end
context "Change visibility" do
context "Change visibility", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/728' do
before do
project.visit!
......@@ -80,7 +80,7 @@ module QA
it_behaves_like 'audit event', ["Changed visibility from Public to Private"]
end
context "Export file download", quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/217949', type: :investigating } do
context "Export file download", quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/217949', type: :investigating }, status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/743' do
before do
QA::Support::Retrier.retry_until do
project = Resource::Project.fabricate_via_api! do |project|
......@@ -108,7 +108,7 @@ module QA
it_behaves_like 'audit event', ["Export file download started"]
end
context "Project archive and unarchive" do
context "Project archive and unarchive", status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/726' do
before do
project.visit!
......
......@@ -42,7 +42,7 @@ module QA
@group = Resource::Group.fabricate_via_api!
end
it 'successfully imports the project using template' do
it 'successfully imports the project using template', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/905' do
built_in = 'Ruby on Rails'
@group.visit!
......@@ -92,7 +92,7 @@ module QA
QA::Flow::Project.go_to_create_project_from_template
end
it 'successfully imports the project using template' do
it 'successfully imports the project using template', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/914' do
Page::Project::New.perform do |new_page|
new_page.retry_until do
new_page.go_to_create_from_template_instance_tab
......@@ -141,7 +141,7 @@ module QA
Page::Project::New.perform(&:go_to_create_from_template_group_tab)
end
it 'successfully imports the project using template' do
it 'successfully imports the project using template', status_issue: 'https://gitlab.com/gitlab-org/quality/testcases/-/issues/915' do
Page::Project::New.perform do |new_page|
expect(new_page.group_template_tab_badge_text).to eq "1"
expect(new_page).to have_text(@template_container_group_name)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment