From daf5913c94d07522942ca54e2ce6f0bcf4b4d9a6 Mon Sep 17 00:00:00 2001 From: Jay McCure <jmccure@gitlab.com> Date: Tue, 6 Feb 2024 15:52:48 +1000 Subject: [PATCH] E2E test: [PROMOTE TO BLOCKING] Create Push Rules --- .../3_create/repository/push_rules_spec.rb | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/qa/qa/specs/features/ee/browser_ui/3_create/repository/push_rules_spec.rb b/qa/qa/specs/features/ee/browser_ui/3_create/repository/push_rules_spec.rb index 3ab38448edfdb..bded64661572b 100644 --- a/qa/qa/specs/features/ee/browser_ui/3_create/repository/push_rules_spec.rb +++ b/qa/qa/specs/features/ee/browser_ui/3_create/repository/push_rules_spec.rb @@ -29,11 +29,11 @@ module QA end end - it 'allows an unrestricted push', testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347790' do + it 'allows an unrestricted push', :blocking, testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347790' do expect_no_error_on_push(file: standard_file) end - it 'restricts files by name and size', testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347784' do + it 'restricts files by name and size', :blocking, testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347784' do # Note: The file size limits in this test should be lower than the limits in # browser_ui/3_create/repository/push_over_http_file_size_spec to prevent # the limit set in that test from triggering in this test (which can happen @@ -67,14 +67,14 @@ module QA error: Regexp.escape("Committer's email '#{gitlab_user.email}' does not follow the pattern '#{@authors_email_limitation}'")) end - it 'restricts branches by branch name', testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347781' do + it 'restricts branches by branch name', :blocking, testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347781' do expect_error_on_push( file: standard_file, branch: 'forbidden_branch', error: Regexp.escape("Branch name 'forbidden_branch' does not follow the pattern '#{@branch_name_limitation}'")) end - it 'restricts commit by message format', testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347780' do + it 'restricts commit by message format', :blocking, testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347780' do expect_no_error_on_push(file: standard_file, commit_message: @needed_phrase_limitation) expect_error_on_push( file: standard_file, @@ -86,7 +86,7 @@ module QA error: Regexp.escape("Commit message contains the forbidden pattern '#{@deny_message_phrase_limitation}'")) end - it 'restricts committing files with secrets', testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347779' do + it 'restricts committing files with secrets', :blocking, testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347779' do secret_file = [{ name: 'id_rsa', content: SecureRandom.hex(100) @@ -116,7 +116,7 @@ module QA end end - it 'rejects non-member users', testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347812' do + it 'rejects non-member users', :blocking, testcase: 'https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347812' do non_member_user = build(:user, username: '', password: '', -- GitLab