diff --git a/qa/qa/specs/features/ee/browser_ui/3_create/repository/push_rules_spec.rb b/qa/qa/specs/features/ee/browser_ui/3_create/repository/push_rules_spec.rb index 3ab38448edfdba4e325e502fa41b196fd2031cc3..bded64661572bb3f45294eee4b9423ee0b02aa96 100644 --- a/qa/qa/specs/features/ee/browser_ui/3_create/repository/push_rules_spec.rb +++ b/qa/qa/specs/features/ee/browser_ui/3_create/repository/push_rules_spec.rb @@ -29,11 +29,11 @@ module QA end end - it 'allows an unrestricted push', testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347790' do + it 'allows an unrestricted push', :blocking, testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347790' do expect_no_error_on_push(file: standard_file) end - it 'restricts files by name and size', testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347784' do + it 'restricts files by name and size', :blocking, testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347784' do # Note: The file size limits in this test should be lower than the limits in # browser_ui/3_create/repository/push_over_http_file_size_spec to prevent # the limit set in that test from triggering in this test (which can happen @@ -67,14 +67,14 @@ module QA error: Regexp.escape("Committer's email '#{gitlab_user.email}' does not follow the pattern '#{@authors_email_limitation}'")) end - it 'restricts branches by branch name', testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347781' do + it 'restricts branches by branch name', :blocking, testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347781' do expect_error_on_push( file: standard_file, branch: 'forbidden_branch', error: Regexp.escape("Branch name 'forbidden_branch' does not follow the pattern '#{@branch_name_limitation}'")) end - it 'restricts commit by message format', testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347780' do + it 'restricts commit by message format', :blocking, testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347780' do expect_no_error_on_push(file: standard_file, commit_message: @needed_phrase_limitation) expect_error_on_push( file: standard_file, @@ -86,7 +86,7 @@ module QA error: Regexp.escape("Commit message contains the forbidden pattern '#{@deny_message_phrase_limitation}'")) end - it 'restricts committing files with secrets', testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347779' do + it 'restricts committing files with secrets', :blocking, testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347779' do secret_file = [{ name: 'id_rsa', content: SecureRandom.hex(100) @@ -116,7 +116,7 @@ module QA end end - it 'rejects non-member users', testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347812' do + it 'rejects non-member users', :blocking, testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347812' do non_member_user = build(:user, username: '', password: '',