2019-10-06 23:07:19 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2016-07-21 04:44:18 -04:00
|
|
|
require './spec/simplecov_env'
|
|
|
|
SimpleCovEnv.start!
|
2015-07-13 22:41:47 -04:00
|
|
|
|
2017-09-14 11:22:49 -04:00
|
|
|
ENV["RAILS_ENV"] = 'test'
|
2017-01-21 19:11:19 -05:00
|
|
|
ENV["IN_MEMORY_APPLICATION_SETTINGS"] = 'true'
|
2019-07-02 12:38:23 -04:00
|
|
|
ENV["RSPEC_ALLOW_INVALID_URLS"] = 'true'
|
2015-07-13 22:41:47 -04:00
|
|
|
|
2018-07-02 06:43:06 -04:00
|
|
|
require File.expand_path('../config/environment', __dir__)
|
2014-03-13 18:34:12 -04:00
|
|
|
require 'rspec/rails'
|
2015-06-10 01:38:36 -04:00
|
|
|
require 'shoulda/matchers'
|
2015-11-12 04:52:20 -05:00
|
|
|
require 'rspec/retry'
|
2017-08-10 13:23:56 -04:00
|
|
|
require 'rspec-parameterized'
|
2019-10-06 05:06:13 -04:00
|
|
|
require 'test_prof/recipes/rspec/let_it_be'
|
2016-05-21 21:17:15 -04:00
|
|
|
|
2017-04-13 08:24:35 -04:00
|
|
|
rspec_profiling_is_configured =
|
2017-05-19 06:15:49 -04:00
|
|
|
ENV['RSPEC_PROFILING_POSTGRES_URL'].present? ||
|
2017-04-13 08:24:35 -04:00
|
|
|
ENV['RSPEC_PROFILING']
|
|
|
|
branch_can_be_profiled =
|
2017-04-28 14:05:39 -04:00
|
|
|
(ENV['CI_COMMIT_REF_NAME'] == 'master' ||
|
|
|
|
ENV['CI_COMMIT_REF_NAME'] =~ /rspec-profile/)
|
2017-04-13 08:24:35 -04:00
|
|
|
|
|
|
|
if rspec_profiling_is_configured && (!ENV.key?('CI') || branch_can_be_profiled)
|
2017-01-26 16:31:43 -05:00
|
|
|
require 'rspec_profiling/rspec'
|
|
|
|
end
|
|
|
|
|
2019-01-14 13:22:54 -05:00
|
|
|
if ENV['CI'] && ENV['KNAPSACK_GENERATE_REPORT'] && !ENV['NO_KNAPSACK']
|
2016-06-08 05:43:13 -04:00
|
|
|
require 'knapsack'
|
|
|
|
Knapsack::Adapters::RSpecAdapter.bind
|
|
|
|
end
|
2014-03-13 18:34:12 -04:00
|
|
|
|
2017-02-13 06:19:28 -05:00
|
|
|
# require rainbow gem String monkeypatch, so we can test SystemChecks
|
|
|
|
require 'rainbow/ext/string'
|
2018-08-14 19:39:59 -04:00
|
|
|
Rainbow.enabled = false
|
2017-02-13 06:19:28 -05:00
|
|
|
|
2019-09-13 09:26:31 -04:00
|
|
|
require_relative('../ee/spec/spec_helper') if Gitlab.ee?
|
|
|
|
|
2014-03-13 18:34:12 -04:00
|
|
|
# Requires supporting ruby files with custom matchers and macros, etc,
|
|
|
|
# in spec/support/ and its subdirectories.
|
2018-03-29 05:47:54 -04:00
|
|
|
# Requires helpers, and shared contexts/examples first since they're used in other support files
|
2018-10-04 20:40:07 -04:00
|
|
|
|
|
|
|
# Load these first since they may be required by other helpers
|
|
|
|
require Rails.root.join("spec/support/helpers/git_helpers.rb")
|
|
|
|
|
|
|
|
# Then the rest
|
2018-03-29 05:47:54 -04:00
|
|
|
Dir[Rails.root.join("spec/support/helpers/*.rb")].each { |f| require f }
|
|
|
|
Dir[Rails.root.join("spec/support/shared_contexts/*.rb")].each { |f| require f }
|
|
|
|
Dir[Rails.root.join("spec/support/shared_examples/*.rb")].each { |f| require f }
|
2015-04-25 14:33:04 -04:00
|
|
|
Dir[Rails.root.join("spec/support/**/*.rb")].each { |f| require f }
|
2014-03-13 18:34:12 -04:00
|
|
|
|
2019-05-22 08:16:49 -04:00
|
|
|
quality_level = Quality::TestLevel.new
|
|
|
|
|
2014-03-13 18:34:12 -04:00
|
|
|
RSpec.configure do |config|
|
2019-08-01 03:55:42 -04:00
|
|
|
config.filter_run focus: true
|
|
|
|
config.run_all_when_everything_filtered = true
|
|
|
|
|
2019-04-26 11:49:19 -04:00
|
|
|
config.use_transactional_fixtures = true
|
2014-06-06 13:55:49 -04:00
|
|
|
config.use_instantiated_fixtures = false
|
2018-08-16 05:08:38 -04:00
|
|
|
config.fixture_path = Rails.root
|
2014-03-13 18:34:12 -04:00
|
|
|
|
2015-11-12 04:52:20 -05:00
|
|
|
config.verbose_retry = true
|
|
|
|
config.display_try_failure_messages = true
|
|
|
|
|
2015-02-12 10:48:53 -05:00
|
|
|
config.infer_spec_type_from_file_location!
|
2019-05-03 02:49:45 -04:00
|
|
|
config.full_backtrace = !!ENV['CI']
|
2017-03-08 18:41:02 -05:00
|
|
|
|
2019-11-18 07:06:03 -05:00
|
|
|
unless ENV['CI']
|
|
|
|
# Re-run failures locally with `--only-failures`
|
|
|
|
config.example_status_persistence_file_path = './spec/examples.txt'
|
|
|
|
end
|
|
|
|
|
2019-05-22 08:16:49 -04:00
|
|
|
config.define_derived_metadata(file_path: %r{(ee)?/spec/.+_spec\.rb\z}) do |metadata|
|
2017-09-19 10:50:26 -04:00
|
|
|
location = metadata[:location]
|
|
|
|
|
2019-05-22 08:16:49 -04:00
|
|
|
metadata[:level] = quality_level.level_for(location)
|
2017-09-19 10:50:26 -04:00
|
|
|
metadata[:api] = true if location =~ %r{/spec/requests/api/}
|
|
|
|
|
2020-03-11 17:09:19 -04:00
|
|
|
# Do not overwrite migration if it's already set
|
|
|
|
unless metadata.key?(:migration)
|
|
|
|
metadata[:migration] = true if metadata[:level] == :migration
|
|
|
|
end
|
|
|
|
|
2020-03-17 17:09:16 -04:00
|
|
|
# Do not overwrite schema if it's already set
|
|
|
|
unless metadata.key?(:schema)
|
|
|
|
metadata[:schema] = :latest if quality_level.background_migration?(location)
|
|
|
|
end
|
|
|
|
|
2020-03-11 17:09:19 -04:00
|
|
|
# Do not overwrite type if it's already set
|
|
|
|
unless metadata.key?(:type)
|
|
|
|
match = location.match(%r{/spec/([^/]+)/})
|
|
|
|
metadata[:type] = match[1].singularize.to_sym if match
|
|
|
|
end
|
2020-04-14 14:09:54 -04:00
|
|
|
|
|
|
|
# Admin controller specs get auto admin mode enabled since they are
|
|
|
|
# protected by the 'EnforcesAdminAuthentication' concern
|
|
|
|
metadata[:enable_admin_mode] = true if location =~ %r{(ee)?/spec/controllers/admin/}
|
2017-03-08 18:41:02 -05:00
|
|
|
end
|
|
|
|
|
2019-03-28 09:18:50 -04:00
|
|
|
config.include LicenseHelpers
|
2018-03-29 05:47:54 -04:00
|
|
|
config.include ActiveJob::TestHelper
|
|
|
|
config.include ActiveSupport::Testing::TimeHelpers
|
|
|
|
config.include CycleAnalyticsHelpers
|
|
|
|
config.include ExpectOffense
|
|
|
|
config.include FactoryBot::Syntax::Methods
|
|
|
|
config.include FixtureHelpers
|
2020-04-01 11:07:45 -04:00
|
|
|
config.include NonExistingRecordsHelpers
|
2018-03-29 05:47:54 -04:00
|
|
|
config.include GitlabRoutingHelper
|
|
|
|
config.include StubFeatureFlags
|
2019-10-18 17:06:37 -04:00
|
|
|
config.include StubExperiments
|
2018-03-29 05:47:54 -04:00
|
|
|
config.include StubGitlabCalls
|
|
|
|
config.include StubGitlabData
|
2019-10-11 17:05:59 -04:00
|
|
|
config.include NextInstanceOf
|
2018-03-29 05:47:54 -04:00
|
|
|
config.include TestEnv
|
|
|
|
config.include Devise::Test::ControllerHelpers, type: :controller
|
|
|
|
config.include Devise::Test::IntegrationHelpers, type: :feature
|
|
|
|
config.include LoginHelpers, type: :feature
|
|
|
|
config.include SearchHelpers, type: :feature
|
2019-04-18 06:23:12 -04:00
|
|
|
config.include WaitHelpers, type: :feature
|
2018-03-29 05:47:54 -04:00
|
|
|
config.include EmailHelpers, :mailer, type: :mailer
|
|
|
|
config.include Warden::Test::Helpers, type: :request
|
|
|
|
config.include Gitlab::Routing, type: :routing
|
|
|
|
config.include Devise::Test::ControllerHelpers, type: :view
|
|
|
|
config.include ApiHelpers, :api
|
|
|
|
config.include CookieHelper, :js
|
|
|
|
config.include InputHelper, :js
|
|
|
|
config.include SelectionHelper, :js
|
|
|
|
config.include InspectRequests, :js
|
|
|
|
config.include WaitForRequests, :js
|
|
|
|
config.include LiveDebugger, :js
|
|
|
|
config.include MigrationsHelpers, :migration
|
2018-05-04 04:02:08 -04:00
|
|
|
config.include RedisHelpers
|
2018-06-14 09:33:35 -04:00
|
|
|
config.include Rails.application.routes.url_helpers, type: :routing
|
2019-03-27 08:45:00 -04:00
|
|
|
config.include PolicyHelpers, type: :policy
|
2019-07-12 06:44:17 -04:00
|
|
|
config.include MemoryUsageHelper
|
2019-06-13 06:44:41 -04:00
|
|
|
config.include ExpectRequestWithStatus, type: :request
|
2020-02-19 13:09:10 -05:00
|
|
|
config.include IdempotentWorkerHelper, type: :worker
|
2019-09-03 21:57:25 -04:00
|
|
|
config.include RailsHelpers
|
2020-04-21 11:21:10 -04:00
|
|
|
config.include SidekiqMiddleware
|
2014-03-13 18:34:12 -04:00
|
|
|
|
2020-02-05 16:09:02 -05:00
|
|
|
if ENV['CI'] || ENV['RETRIES']
|
2019-04-10 05:19:42 -04:00
|
|
|
# This includes the first try, i.e. tests will be run 4 times before failing.
|
2020-02-05 16:09:02 -05:00
|
|
|
config.default_retry_count = ENV.fetch('RETRIES', 3).to_i + 1
|
2020-02-07 04:08:49 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
if ENV['FLAKY_RSPEC_GENERATE_REPORT']
|
2017-10-04 07:24:51 -04:00
|
|
|
config.reporter.register_listener(
|
|
|
|
RspecFlaky::Listener.new,
|
|
|
|
:example_passed,
|
|
|
|
:dump_summary)
|
2017-07-19 13:51:59 -04:00
|
|
|
end
|
|
|
|
|
2014-03-13 18:34:12 -04:00
|
|
|
config.before(:suite) do
|
2017-08-11 06:36:03 -04:00
|
|
|
Timecop.safe_mode = true
|
2014-07-31 12:24:53 -04:00
|
|
|
TestEnv.init
|
2014-03-13 18:34:12 -04:00
|
|
|
end
|
2016-08-09 17:08:33 -04:00
|
|
|
|
2018-03-27 22:04:57 -04:00
|
|
|
config.after(:all) do
|
|
|
|
TestEnv.clean_test_path
|
|
|
|
end
|
|
|
|
|
2020-02-05 16:09:02 -05:00
|
|
|
# We can't use an `around` hook here because the wrapping transaction
|
|
|
|
# is not yet opened at the time that is triggered
|
|
|
|
config.prepend_before do
|
|
|
|
Gitlab::Database.set_open_transactions_baseline
|
|
|
|
end
|
|
|
|
|
|
|
|
config.append_after do
|
|
|
|
Gitlab::Database.reset_open_transactions_baseline
|
|
|
|
end
|
|
|
|
|
2019-02-21 16:07:26 -05:00
|
|
|
config.before do |example|
|
2017-07-13 03:58:05 -04:00
|
|
|
# Enable all features by default for testing
|
|
|
|
allow(Feature).to receive(:enabled?) { true }
|
2018-08-16 09:24:25 -04:00
|
|
|
|
2020-05-13 05:08:37 -04:00
|
|
|
enable_rugged = example.metadata[:enable_rugged].present?
|
2019-02-21 16:07:26 -05:00
|
|
|
|
|
|
|
# Disable Rugged features by default
|
|
|
|
Gitlab::Git::RuggedImpl::Repository::FEATURE_FLAGS.each do |flag|
|
2020-05-13 05:08:37 -04:00
|
|
|
stub_feature_flags(flag => enable_rugged)
|
2019-02-21 16:07:26 -05:00
|
|
|
end
|
|
|
|
|
2020-05-13 05:08:37 -04:00
|
|
|
allow(Gitlab::GitalyClient).to receive(:can_use_disk?).and_return(enable_rugged)
|
2019-07-10 17:36:49 -04:00
|
|
|
|
2018-08-16 09:24:25 -04:00
|
|
|
# The following can be removed when we remove the staged rollout strategy
|
|
|
|
# and we can just enable it using instance wide settings
|
|
|
|
# (ie. ApplicationSetting#auto_devops_enabled)
|
2020-05-13 05:08:37 -04:00
|
|
|
stub_feature_flags(force_autodevops_on_by_default: false)
|
2019-07-01 15:17:37 -04:00
|
|
|
|
2019-12-13 16:07:41 -05:00
|
|
|
# Enable Marginalia feature for all specs in the test suite.
|
|
|
|
allow(Gitlab::Marginalia).to receive(:cached_feature_enabled?).and_return(true)
|
|
|
|
|
2019-10-16 05:07:51 -04:00
|
|
|
# The following can be removed once Vue Issuable Sidebar
|
|
|
|
# is feature-complete and can be made default in place
|
|
|
|
# of older sidebar.
|
|
|
|
# See https://gitlab.com/groups/gitlab-org/-/epics/1863
|
2020-05-13 05:08:37 -04:00
|
|
|
stub_feature_flags(vue_issuable_sidebar: false)
|
|
|
|
stub_feature_flags(vue_issuable_epic_sidebar: false)
|
2019-10-16 05:07:51 -04:00
|
|
|
|
2019-09-18 10:02:45 -04:00
|
|
|
# Stub these calls due to being expensive operations
|
2019-09-03 02:19:21 -04:00
|
|
|
# It can be reenabled for specific tests via:
|
|
|
|
#
|
2020-02-05 16:09:02 -05:00
|
|
|
# expect(Gitlab::Git::KeepAround).to receive(:execute).and_call_original
|
2019-09-18 10:02:45 -04:00
|
|
|
allow(Gitlab::Git::KeepAround).to receive(:execute)
|
2019-09-03 02:19:21 -04:00
|
|
|
|
2020-05-06 17:10:00 -04:00
|
|
|
Gitlab::ProcessMemoryCache.cache_backend.clear
|
2020-03-11 14:09:23 -04:00
|
|
|
|
2020-02-05 16:09:02 -05:00
|
|
|
Sidekiq::Worker.clear_all
|
2019-09-26 08:06:00 -04:00
|
|
|
|
|
|
|
# Temporary patch to force admin mode to be active by default in tests when
|
|
|
|
# using the feature flag :user_mode_in_session, since this will require
|
|
|
|
# modifying a significant number of specs to test both states for admin
|
|
|
|
# mode enabled / disabled.
|
|
|
|
#
|
2020-04-01 08:08:00 -04:00
|
|
|
# This will only be applied to specs below dirs in `admin_mode_mock_dirs`
|
2019-09-26 08:06:00 -04:00
|
|
|
#
|
2020-04-01 08:08:00 -04:00
|
|
|
# See ongoing migration: https://gitlab.com/gitlab-org/gitlab/-/issues/31511
|
|
|
|
#
|
|
|
|
# Until the migration is finished, if it is required to have the real
|
|
|
|
# behaviour in any of the mocked dirs specs that an admin is signed in
|
2019-09-26 08:06:00 -04:00
|
|
|
# with normal user mode and needs to switch to admin mode, it is possible to
|
|
|
|
# mark such tests with the `do_not_mock_admin_mode` metadata tag, e.g:
|
|
|
|
#
|
2020-04-01 08:08:00 -04:00
|
|
|
# context 'some test in mocked dir', :do_not_mock_admin_mode do ... end
|
|
|
|
admin_mode_mock_dirs = %w(
|
|
|
|
./ee/spec/elastic_integration
|
|
|
|
./ee/spec/features
|
|
|
|
./ee/spec/finders
|
|
|
|
./ee/spec/lib
|
|
|
|
./ee/spec/models
|
|
|
|
./ee/spec/policies
|
|
|
|
./ee/spec/requests/admin
|
|
|
|
./ee/spec/serializers
|
|
|
|
./ee/spec/services
|
|
|
|
./ee/spec/support/protected_tags
|
|
|
|
./ee/spec/support/shared_examples
|
|
|
|
./spec/features
|
|
|
|
./spec/finders
|
|
|
|
./spec/frontend
|
|
|
|
./spec/helpers
|
|
|
|
./spec/lib
|
|
|
|
./spec/models
|
|
|
|
./spec/policies
|
|
|
|
./spec/requests
|
|
|
|
./spec/serializers
|
|
|
|
./spec/services
|
|
|
|
./spec/support/cycle_analytics_helpers
|
|
|
|
./spec/support/protected_tags
|
|
|
|
./spec/support/shared_examples
|
|
|
|
./spec/views
|
|
|
|
./spec/workers
|
|
|
|
)
|
|
|
|
|
|
|
|
if !example.metadata[:do_not_mock_admin_mode] && example.metadata[:file_path].start_with?(*admin_mode_mock_dirs)
|
|
|
|
allow_any_instance_of(Gitlab::Auth::CurrentUserMode).to receive(:admin_mode?) do |current_user_mode|
|
|
|
|
current_user_mode.send(:user)&.admin?
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Administrators have to re-authenticate in order to access administrative
|
|
|
|
# functionality when feature flag :user_mode_in_session is active. Any spec
|
|
|
|
# that requires administrative access can use the tag :enable_admin_mode
|
|
|
|
# to avoid the second auth step (provided the user is already an admin):
|
|
|
|
#
|
|
|
|
# context 'some test that requires admin mode', :enable_admin_mode do ... end
|
|
|
|
#
|
|
|
|
# See also spec/support/helpers/admin_mode_helpers.rb
|
2020-04-14 14:09:54 -04:00
|
|
|
if example.metadata[:enable_admin_mode] && !example.metadata[:do_not_mock_admin_mode]
|
2019-09-26 08:06:00 -04:00
|
|
|
allow_any_instance_of(Gitlab::Auth::CurrentUserMode).to receive(:admin_mode?) do |current_user_mode|
|
|
|
|
current_user_mode.send(:user)&.admin?
|
|
|
|
end
|
|
|
|
end
|
2017-07-12 08:45:42 -04:00
|
|
|
end
|
|
|
|
|
2019-08-02 05:54:40 -04:00
|
|
|
config.around(:example, :quarantine) do |example|
|
2019-01-14 13:06:32 -05:00
|
|
|
# Skip tests in quarantine unless we explicitly focus on them.
|
2019-08-02 05:54:40 -04:00
|
|
|
example.run if config.inclusion_filter[:quarantine]
|
2019-01-14 13:06:32 -05:00
|
|
|
end
|
|
|
|
|
2020-02-03 07:09:07 -05:00
|
|
|
config.around(:example, :request_store) do |example|
|
2020-04-24 08:10:16 -04:00
|
|
|
Gitlab::WithRequestStore.with_request_store { example.run }
|
2017-06-09 13:12:51 -04:00
|
|
|
end
|
|
|
|
|
2020-02-05 16:09:02 -05:00
|
|
|
config.around do |example|
|
|
|
|
# Wrap each example in it's own context to make sure the contexts don't
|
|
|
|
# leak
|
|
|
|
Labkit::Context.with_context { example.run }
|
2018-06-05 10:17:04 -04:00
|
|
|
end
|
|
|
|
|
2020-04-21 11:21:10 -04:00
|
|
|
config.around do |example|
|
|
|
|
with_sidekiq_server_middleware do |chain|
|
|
|
|
Gitlab::SidekiqMiddleware.server_configurator(
|
|
|
|
metrics: false, # The metrics don't go anywhere in tests
|
|
|
|
arguments_logger: false, # We're not logging the regular messages for inline jobs
|
2020-04-24 08:10:16 -04:00
|
|
|
memory_killer: false # This is not a thing we want to do inline in tests
|
2020-04-21 11:21:10 -04:00
|
|
|
).call(chain)
|
|
|
|
chain.add DisableQueryLimit
|
2020-04-24 08:10:16 -04:00
|
|
|
chain.insert_after ::Gitlab::SidekiqMiddleware::RequestStoreMiddleware, IsolatedRequestStore
|
2020-04-21 11:21:10 -04:00
|
|
|
|
|
|
|
example.run
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-12-11 01:29:58 -05:00
|
|
|
config.after do
|
2020-02-05 16:09:02 -05:00
|
|
|
Fog.unmock! if Fog.mock?
|
2018-09-10 05:48:09 -04:00
|
|
|
Gitlab::CurrentSettings.clear_in_memory_application_settings!
|
|
|
|
end
|
|
|
|
|
2017-08-02 11:13:27 -04:00
|
|
|
config.before(:example, :mailer) do
|
|
|
|
reset_delivered_emails!
|
|
|
|
end
|
|
|
|
|
2018-05-09 01:29:30 -04:00
|
|
|
config.before(:example, :prometheus) do
|
|
|
|
matching_files = File.join(::Prometheus::Client.configuration.multiprocess_files_dir, "*.db")
|
|
|
|
Dir[matching_files].map { |filename| File.delete(filename) if File.file?(filename) }
|
|
|
|
|
|
|
|
Gitlab::Metrics.reset_registry!
|
|
|
|
end
|
|
|
|
|
2017-12-11 09:21:06 -05:00
|
|
|
# This makes sure the `ApplicationController#can?` method is stubbed with the
|
|
|
|
# original implementation for all view specs.
|
|
|
|
config.before(:each, type: :view) do
|
|
|
|
allow(view).to receive(:can?) do |*args|
|
|
|
|
Ability.allowed?(*args)
|
|
|
|
end
|
|
|
|
end
|
2013-03-26 05:13:30 -04:00
|
|
|
end
|
2015-03-27 15:31:16 -04:00
|
|
|
|
|
|
|
ActiveRecord::Migration.maintain_test_schema!
|
2017-07-24 07:19:09 -04:00
|
|
|
|
|
|
|
Shoulda::Matchers.configure do |config|
|
|
|
|
config.integrate do |with|
|
|
|
|
with.test_framework :rspec
|
|
|
|
with.library :rails
|
|
|
|
end
|
|
|
|
end
|
2017-11-30 07:58:51 -05:00
|
|
|
|
|
|
|
# Prevent Rugged from picking up local developer gitconfig.
|
|
|
|
Rugged::Settings['search_path_global'] = Rails.root.join('tmp/tests').to_s
|
2019-10-18 17:06:37 -04:00
|
|
|
|
|
|
|
# Disable timestamp checks for invisible_captcha
|
|
|
|
InvisibleCaptcha.timestamp_enabled = false
|