Commit b139c86b authored by ddavison's avatar ddavison

Update secure/enblmnt tests to use outer describe

Update non-devops tests to use outer describe
Remove monkey-patch for RSpec
parent 3383208e
# frozen_string_literal: true
module QA
context 'Non-devops' do
RSpec.describe 'Non-devops' do
describe 'Performance bar display', :requires_admin do
context 'when logged in as an admin user' do
# performance metrics: pg, gitaly, redis, rugged (feature flagged), total (not always provided)
......
......@@ -4,7 +4,7 @@ require 'airborne'
require 'securerandom'
module QA
context 'Enablement:Search', quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/221251', type: :investigating } do
RSpec.describe 'Enablement:Search', quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/221251', type: :investigating } do
describe 'Elasticsearch advanced global search with advanced syntax', :orchestrated, :elasticsearch, :requires_admin do
let(:project_name_suffix) { SecureRandom.hex(8) }
let(:api_client) { Runtime::API::Client.new(:gitlab) }
......
......@@ -4,7 +4,7 @@ require 'airborne'
require 'securerandom'
module QA
context 'Enablement:Search', quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/222476', type: :investigating } do
RSpec.describe 'Enablement:Search', quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/222476', type: :investigating } do
describe 'When using elasticsearch API to search for a known blob', :orchestrated, :elasticsearch, :requires_admin do
let(:project_file_content) { "elasticsearch: #{SecureRandom.hex(8)}" }
let(:non_member_user) { Resource::User.fabricate_or_use('non_member_user', 'non_member_user_password') }
......
# frozen_string_literal: true
module QA
context 'Create' do
RSpec.describe 'Create' do
describe 'Search using Elasticsearch', :orchestrated, :elasticsearch, :requires_admin do
include Runtime::Fixtures
let(:project_name) { 'testing_elasticsearch_indexing' }
......
......@@ -3,7 +3,7 @@
require 'pathname'
module QA
context 'Secure', :docker, :runner, quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/219519', type: :investigating } do
RSpec.describe 'Secure', :docker, :runner, quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/219519', type: :investigating } do
describe 'Security Reports in a Merge Request' do
let(:sast_vuln_count) { 5 }
let(:dependency_scan_vuln_count) { 4 }
......
# frozen_string_literal: true
module QA
context 'Secure', :docker, :runner, quarantine: { type: :investigating } do
RSpec.describe 'Secure', :docker, :runner, quarantine: { type: :investigating } do
describe 'Security Dashboard in a Project' do
let(:vulnerability_name) { "CVE-2017-18269 in glibc" }
let(:vulnerability_description) { "Short description to match in specs" }
......
......@@ -3,7 +3,7 @@
require 'pathname'
module QA
context 'Secure', :docker, :runner, quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/219519', type: :investigating } do
RSpec.describe 'Secure', :docker, :runner, quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/219519', type: :investigating } do
describe 'License merge request widget' do
let(:approved_license_name) { "MIT" }
let(:blacklisted_license_name) { "Zlib" }
......
......@@ -3,7 +3,7 @@
require 'pathname'
module QA
context 'Secure', :docker, :runner, quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/213676', type: :investigating } do
RSpec.describe 'Secure', :docker, :runner, quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/213676', type: :investigating } do
let(:number_of_dependencies_in_fixture) { 7 }
let(:dependency_scan_example_vuln) { 'Prototype pollution attack in mixin-deep' }
let(:container_scan_example_vuln) { 'CVE-2017-18269 in glibc' }
......
......@@ -3,7 +3,7 @@
require 'pathname'
module QA
context 'Secure', :docker, :runner, quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/219519', type: :investigating } do
RSpec.describe 'Secure', :docker, :runner, quarantine: { issue: 'https://gitlab.com/gitlab-org/gitlab/-/issues/219519', type: :investigating } do
describe 'Security Reports in a Merge Request' do
let(:sast_vuln_count) { 5 }
let(:dependency_scan_vuln_count) { 4 }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment