diff --git a/qa/qa/specs/features/browser_ui/1_manage/login/log_in_with_2fa_spec.rb b/qa/qa/specs/features/browser_ui/1_manage/login/log_in_with_2fa_spec.rb index 84664cb8b944bcab76de8f04a254b036f3de90e9..78604f083900f4f2b01481a4d276aaf2231e02ff 100644 --- a/qa/qa/specs/features/browser_ui/1_manage/login/log_in_with_2fa_spec.rb +++ b/qa/qa/specs/features/browser_ui/1_manage/login/log_in_with_2fa_spec.rb @@ -1,7 +1,7 @@ # frozen_string_literal: true module QA - RSpec.describe 'Manage', :requires_admin, :skip_live_env, product_group: :authentication_and_authorization do + RSpec.describe 'Manage', :requires_admin, product_group: :authentication_and_authorization do describe '2FA' do let(:admin_api_client) { Runtime::API::Client.as_admin } let(:owner_api_client) { Runtime::API::Client.new(:gitlab, user: owner_user) } @@ -14,6 +14,7 @@ module QA end let(:sandbox_group) do + Flow::Login.sign_in(as: owner_user) Resource::Sandbox.fabricate! do |sandbox_group| sandbox_group.path = "gitlab-qa-2fa-sandbox-group-#{SecureRandom.hex(8)}" sandbox_group.api_client = owner_api_client @@ -43,12 +44,7 @@ module QA it( 'allows enforcing 2FA via UI and logging in with 2FA', - testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347931', - quarantine: { - type: :bug, - only: { condition: -> { !QA::Runtime::Env.super_sidebar_enabled? } }, - issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/409336' - } + testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347931' ) do enforce_two_factor_authentication_on_group(group)