diff --git a/lib/redis_snapshot.rb b/lib/redis_snapshot.rb deleted file mode 100644 index a58b149c0f3..00000000000 --- a/lib/redis_snapshot.rb +++ /dev/null @@ -1,34 +0,0 @@ -# frozen_string_literal: true - -class RedisSnapshot - def self.begin_faux_transaction(redis = Discourse.redis) - @stack ||= [] - @stack.push(RedisSnapshot.load(redis)) - end - - def self.end_faux_transaction(redis = Discourse.redis) - @stack.pop.restore(redis) - end - - def self.load(redis = Discourse.redis) - keys = redis.keys - - values = redis.pipelined { |batch| keys.each { |key| batch.dump(key) } } - - new(keys.zip(values)) - end - - def initialize(dump) - @dump = dump - end - - def restore(redis = Discourse.redis) - redis.pipelined do |batch| - batch.flushdb - - @dump.each { |key, value| batch.restore(key, 0, value) } - end - - nil - end -end diff --git a/plugins/chat/spec/jobs/regular/chat/process_message_spec.rb b/plugins/chat/spec/jobs/regular/chat/process_message_spec.rb index 6e33ce76ce3..95c700566cf 100644 --- a/plugins/chat/spec/jobs/regular/chat/process_message_spec.rb +++ b/plugins/chat/spec/jobs/regular/chat/process_message_spec.rb @@ -3,14 +3,16 @@ describe Jobs::Chat::ProcessMessage do fab!(:chat_message) { Fabricate(:chat_message, message: "https://discourse.org/team") } - it "updates cooked with oneboxes" do + before do stub_request(:get, "https://discourse.org/team").to_return( status: 200, body: "a", ) stub_request(:head, "https://discourse.org/team").to_return(status: 200) + end + it "updates cooked with oneboxes" do described_class.new.execute(chat_message_id: chat_message.id) expect(chat_message.reload.cooked).to eq( "

https://discourse.org/team

", diff --git a/plugins/chat/spec/requests/chat/incoming_webhooks_controller_spec.rb b/plugins/chat/spec/requests/chat/incoming_webhooks_controller_spec.rb index d4326a5f208..7e8a43b6956 100644 --- a/plugins/chat/spec/requests/chat/incoming_webhooks_controller_spec.rb +++ b/plugins/chat/spec/requests/chat/incoming_webhooks_controller_spec.rb @@ -72,8 +72,6 @@ RSpec.describe Chat::IncomingWebhooksController do end describe "rate limiting" do - use_redis_snapshotting - it "rate limits" do RateLimiter.enable 10.times { post "/chat/hooks/#{webhook.key}.json", params: valid_payload } diff --git a/spec/helpers/redis_snapshot_helper.rb b/spec/helpers/redis_snapshot_helper.rb index fb7e6a9b40f..8c6e3a1fd28 100644 --- a/spec/helpers/redis_snapshot_helper.rb +++ b/spec/helpers/redis_snapshot_helper.rb @@ -2,8 +2,6 @@ module RedisSnapshotHelper def use_redis_snapshotting - before(:each) { RedisSnapshot.begin_faux_transaction } - - after(:each) { RedisSnapshot.end_faux_transaction } + puts "DEPRECATION NOTICE: `use_redis_snapshotting` has been deprecated without replacement as we now flush the Redis database after each test." end end diff --git a/spec/integration/rate_limiting_spec.rb b/spec/integration/rate_limiting_spec.rb index ede48f7f404..20b2dc21604 100644 --- a/spec/integration/rate_limiting_spec.rb +++ b/spec/integration/rate_limiting_spec.rb @@ -4,8 +4,6 @@ RSpec.describe "rate limiter integration" do before { RateLimiter.enable } - use_redis_snapshotting - it "will rate limit message bus requests once queueing" do freeze_time diff --git a/spec/jobs/jobs_base_spec.rb b/spec/jobs/jobs_base_spec.rb index b38097c0b51..4a9cb85dfcd 100644 --- a/spec/jobs/jobs_base_spec.rb +++ b/spec/jobs/jobs_base_spec.rb @@ -1,8 +1,6 @@ # frozen_string_literal: true RSpec.describe ::Jobs::Base do - use_redis_snapshotting - class GoodJob < ::Jobs::Base attr_accessor :count def execute(args) diff --git a/spec/jobs/update_topic_hot_scores_spec.rb b/spec/jobs/update_topic_hot_scores_spec.rb index 2c83da4db47..50feb31d81b 100644 --- a/spec/jobs/update_topic_hot_scores_spec.rb +++ b/spec/jobs/update_topic_hot_scores_spec.rb @@ -3,7 +3,6 @@ require "file_store/s3_store" RSpec.describe Jobs::UpdateTopicHotScores do - use_redis_snapshotting let(:job) { subject } fab!(:topic) { Fabricate(:topic, created_at: 1.day.ago) } diff --git a/spec/lib/auth/default_current_user_provider_spec.rb b/spec/lib/auth/default_current_user_provider_spec.rb index 09516bf36da..7247694f038 100644 --- a/spec/lib/auth/default_current_user_provider_spec.rb +++ b/spec/lib/auth/default_current_user_provider_spec.rb @@ -199,8 +199,6 @@ RSpec.describe Auth::DefaultCurrentUserProvider do context "with rate limiting" do before { RateLimiter.enable } - use_redis_snapshotting - it "rate limits admin api requests" do global_setting :max_admin_api_reqs_per_minute, 3 diff --git a/spec/lib/middleware/anonymous_cache_spec.rb b/spec/lib/middleware/anonymous_cache_spec.rb index b03cc807132..e58bba8255c 100644 --- a/spec/lib/middleware/anonymous_cache_spec.rb +++ b/spec/lib/middleware/anonymous_cache_spec.rb @@ -230,8 +230,6 @@ RSpec.describe Middleware::AnonymousCache do describe "#force_anonymous!" do before { RateLimiter.enable } - use_redis_snapshotting - it "will revert to anonymous once we reach the limit" do is_anon = false diff --git a/spec/lib/middleware/request_tracker_spec.rb b/spec/lib/middleware/request_tracker_spec.rb index c01916fef77..eb57a11892b 100644 --- a/spec/lib/middleware/request_tracker_spec.rb +++ b/spec/lib/middleware/request_tracker_spec.rb @@ -258,8 +258,6 @@ RSpec.describe Middleware::RequestTracker do ) end - use_redis_snapshotting - def log_topic_view(authenticated: false, deferred: false) headers = { "action_dispatch.remote_ip" => "127.0.0.1" } @@ -519,8 +517,6 @@ RSpec.describe Middleware::RequestTracker do freeze_time_safe end - use_redis_snapshotting - after { Rails.logger = @orig_logger } let :middleware do diff --git a/spec/lib/mini_scheduler_long_running_job_logger_spec.rb b/spec/lib/mini_scheduler_long_running_job_logger_spec.rb index 73762bf9cb3..a83d0326717 100644 --- a/spec/lib/mini_scheduler_long_running_job_logger_spec.rb +++ b/spec/lib/mini_scheduler_long_running_job_logger_spec.rb @@ -3,8 +3,6 @@ require "mini_scheduler_long_running_job_logger" RSpec.describe MiniSchedulerLongRunningJobLogger do - use_redis_snapshotting - class Every10MinutesJob extend ::MiniScheduler::Schedule diff --git a/spec/lib/post_action_creator_spec.rb b/spec/lib/post_action_creator_spec.rb index 5dd003871a6..54460fc7e63 100644 --- a/spec/lib/post_action_creator_spec.rb +++ b/spec/lib/post_action_creator_spec.rb @@ -9,8 +9,6 @@ RSpec.describe PostActionCreator do describe "rate limits" do before { RateLimiter.enable } - use_redis_snapshotting - it "limits redo/undo" do PostActionCreator.like(user, post) PostActionDestroyer.destroy(user, post, :like) diff --git a/spec/lib/post_revisor_spec.rb b/spec/lib/post_revisor_spec.rb index 722e175f7ae..69f417ea37b 100644 --- a/spec/lib/post_revisor_spec.rb +++ b/spec/lib/post_revisor_spec.rb @@ -306,10 +306,6 @@ RSpec.describe PostRevisor do end describe "revise wiki" do - # There used to be a bug where wiki changes were considered posting "too similar" - # so this is enabled and checked - use_redis_snapshotting - before { SiteSetting.unique_posts_mins = 10 } it "allows the user to change it to a wiki" do @@ -803,8 +799,6 @@ RSpec.describe PostRevisor do SiteSetting.editing_grace_period = 0 end - use_redis_snapshotting - it "triggers a rate limiter" do EditRateLimiter.any_instance.expects(:performed!) post_revisor.revise!(changed_by, raw: "updated body") diff --git a/spec/lib/site_settings/deprecated_settings_spec.rb b/spec/lib/site_settings/deprecated_settings_spec.rb index ad51513842c..05c8274ead3 100644 --- a/spec/lib/site_settings/deprecated_settings_spec.rb +++ b/spec/lib/site_settings/deprecated_settings_spec.rb @@ -34,10 +34,6 @@ RSpec.xdescribe SiteSettings::DeprecatedSettings do describe "when not overriding deprecated settings" do let(:override) { false } - # Necessary because Discourse.deprecate uses redis to see if the warning - # was already logged. - use_redis_snapshotting - # NOTE: This fixture has some completely made up settings (e.g. min_trust_level_to_allow_invite_tl_and_staff) let(:deprecated_test) { "#{Rails.root}/spec/fixtures/site_settings/deprecated_test.yml" } diff --git a/spec/lib/topic_query_spec.rb b/spec/lib/topic_query_spec.rb index 869929589e8..2650fed5e33 100644 --- a/spec/lib/topic_query_spec.rb +++ b/spec/lib/topic_query_spec.rb @@ -1489,8 +1489,6 @@ RSpec.describe TopicQuery do end describe "#list_suggested_for" do - use_redis_snapshotting - def clear_cache! Discourse.redis.keys("random_topic_cache*").each { |k| Discourse.redis.del k } end diff --git a/spec/models/about_spec.rb b/spec/models/about_spec.rb index eee63effb21..dba52ed924a 100644 --- a/spec/models/about_spec.rb +++ b/spec/models/about_spec.rb @@ -15,8 +15,6 @@ RSpec.describe About do after { DiscoursePluginRegistry.reset! } describe "#stats" do - use_redis_snapshotting - it "adds plugin stats to the output" do stats = { :last_day => 1, "7_days" => 10, "30_days" => 100, :count => 1000 } register_stat("some_group", Proc.new { stats }) diff --git a/spec/models/global_setting_spec.rb b/spec/models/global_setting_spec.rb index a2598eaeb66..1c30297efff 100644 --- a/spec/models/global_setting_spec.rb +++ b/spec/models/global_setting_spec.rb @@ -55,7 +55,10 @@ RSpec.describe GlobalSetting do Discourse.stubs(:redis).returns(nil) end - after { GlobalSetting.skip_redis = false } + after do + GlobalSetting.skip_redis = false + Discourse.unstub(:redis) + end it "generates a new random key in memory without redis" do GlobalSetting.reset_secret_key_base! diff --git a/spec/models/invite_spec.rb b/spec/models/invite_spec.rb index 3c81e6261a4..d17de76dde1 100644 --- a/spec/models/invite_spec.rb +++ b/spec/models/invite_spec.rb @@ -221,8 +221,6 @@ RSpec.describe Invite do 3.times { Invite.generate(user, email: "test@example.com") } end - use_redis_snapshotting - it "raises an error" do expect { Invite.generate(user, email: "test@example.com") }.to raise_error( RateLimiter::LimitExceeded, diff --git a/spec/models/post_action_spec.rb b/spec/models/post_action_spec.rb index 708ab07bf6c..5fe17cf5310 100644 --- a/spec/models/post_action_spec.rb +++ b/spec/models/post_action_spec.rb @@ -439,7 +439,6 @@ RSpec.describe PostAction do PostActionType.types.each do |type_name, type_id| post = Fabricate(:post) - PostActionCreator.create(codinghorror, post, type_name) actual_count = value_for(codinghorror.id, Date.today) expected_count = type_name == :like ? 2 : 1 @@ -798,7 +797,7 @@ RSpec.describe PostAction do expect(result).to be_success expect(result.post_action.related_post_id).to be_nil expect(result.reviewable_score.meta_topic_id).to be_nil - + ensure flag_without_message.destroy! end diff --git a/spec/models/topic_spec.rb b/spec/models/topic_spec.rb index ede0876fc3c..2b17397b60c 100644 --- a/spec/models/topic_spec.rb +++ b/spec/models/topic_spec.rb @@ -816,8 +816,6 @@ RSpec.describe Topic do context "with rate limits" do before { RateLimiter.enable } - use_redis_snapshotting - context "when per day" do before { SiteSetting.max_topic_invitations_per_day = 1 } @@ -2698,8 +2696,6 @@ RSpec.describe Topic do RateLimiter.enable end - use_redis_snapshotting - it "limits new users to max_topics_in_first_day and max_posts_in_first_day" do start = Time.now.tomorrow.beginning_of_day @@ -2751,8 +2747,6 @@ RSpec.describe Topic do RateLimiter.enable end - use_redis_snapshotting - it "limits according to max_personal_messages_per_day" do create_post( user: user, diff --git a/spec/multisite/flags_spec.rb b/spec/multisite/flags_spec.rb index 4f800e2e385..dbfa0f38465 100644 --- a/spec/multisite/flags_spec.rb +++ b/spec/multisite/flags_spec.rb @@ -2,8 +2,6 @@ RSpec.describe "Custom flags in multisite", type: :multisite do describe "PostACtionType#all_flags" do - use_redis_snapshotting - it "does not share flag definitions between sites" do flag_1 = Flag.create!(name: "test flag 1", position: 99, applies_to: ["Post"]) diff --git a/spec/multisite/request_tracker_spec.rb b/spec/multisite/request_tracker_spec.rb index 29bf7c2513b..e64468d4dd9 100644 --- a/spec/multisite/request_tracker_spec.rb +++ b/spec/multisite/request_tracker_spec.rb @@ -8,8 +8,6 @@ RSpec.describe "RequestTracker in multisite", type: :multisite do RateLimiter.clear_all_global! end - use_redis_snapshotting - def call(env, &block) Middleware::RequestTracker.new(block).call(env) end diff --git a/spec/rails_helper.rb b/spec/rails_helper.rb index 214455db16b..9ecffa8e218 100644 --- a/spec/rails_helper.rb +++ b/spec/rails_helper.rb @@ -716,7 +716,6 @@ RSpec.configure do |config| Capybara.reset_session! MessageBus.backend_instance.reset! # Clears all existing backlog from memory backend - Discourse.redis.flushdb end config.after :each do |example| @@ -743,6 +742,7 @@ RSpec.configure do |config| unfreeze_time ActionMailer::Base.deliveries.clear + Discourse.redis.flushdb end config.before(:each, type: :multisite) do diff --git a/spec/requests/admin/backups_controller_spec.rb b/spec/requests/admin/backups_controller_spec.rb index 495ad4a74ab..49cf2d78530 100644 --- a/spec/requests/admin/backups_controller_spec.rb +++ b/spec/requests/admin/backups_controller_spec.rb @@ -156,8 +156,6 @@ RSpec.describe Admin::BackupsController do context "with rate limiting enabled" do before { RateLimiter.enable } - use_redis_snapshotting - after { RateLimiter.disable } it "is rate limited" do diff --git a/spec/requests/api/rate_limits_spec.rb b/spec/requests/api/rate_limits_spec.rb index d91d47472b5..d15b59c460a 100644 --- a/spec/requests/api/rate_limits_spec.rb +++ b/spec/requests/api/rate_limits_spec.rb @@ -39,8 +39,6 @@ RSpec.describe "rate limits" do let(:api_key) { @key } let!(:api_username) { "system" } - use_redis_snapshotting - around(:each) { |example| stub_const(Object, :RateLimiter, MockRateLimiter) { example.run } } it "doesn't rate limit authenticated admin api requests" do diff --git a/spec/requests/application_controller_spec.rb b/spec/requests/application_controller_spec.rb index f0ee085ae21..fec81163bf7 100644 --- a/spec/requests/application_controller_spec.rb +++ b/spec/requests/application_controller_spec.rb @@ -932,8 +932,6 @@ RSpec.describe ApplicationController do context "with rate limits" do before { RateLimiter.enable } - use_redis_snapshotting - it "serves a LimitExceeded error in the preferred locale" do SiteSetting.max_likes_per_day = 1 post1 = Fabricate(:post) @@ -1156,8 +1154,6 @@ RSpec.describe ApplicationController do before { RateLimiter.enable } - use_redis_snapshotting - it "is included when API key is rate limited" do global_setting :max_admin_api_reqs_per_minute, 1 api_key = ApiKey.create!(user_id: admin.id).key @@ -1208,8 +1204,6 @@ RSpec.describe ApplicationController do SiteSetting.slow_down_crawler_user_agents = "badcrawler|problematiccrawler" end - use_redis_snapshotting - it "are rate limited" do now = Time.zone.now freeze_time now diff --git a/spec/requests/bookmarks_controller_spec.rb b/spec/requests/bookmarks_controller_spec.rb index aa4c2544752..90e0b0dfaee 100644 --- a/spec/requests/bookmarks_controller_spec.rb +++ b/spec/requests/bookmarks_controller_spec.rb @@ -11,8 +11,6 @@ RSpec.describe BookmarksController do describe "#create" do before { sign_in(current_user) } - use_redis_snapshotting - it "rate limits creates" do SiteSetting.max_bookmarks_per_day = 1 RateLimiter.enable diff --git a/spec/requests/groups_controller_spec.rb b/spec/requests/groups_controller_spec.rb index 20b2ac926a8..48de892ca45 100644 --- a/spec/requests/groups_controller_spec.rb +++ b/spec/requests/groups_controller_spec.rb @@ -2870,8 +2870,6 @@ RSpec.describe GroupsController do end context "when rate limited" do - use_redis_snapshotting - it "rate limits anon searches per user" do RateLimiter.enable diff --git a/spec/requests/invites_controller_spec.rb b/spec/requests/invites_controller_spec.rb index 2fd40b192de..ed779e44fe9 100644 --- a/spec/requests/invites_controller_spec.rb +++ b/spec/requests/invites_controller_spec.rb @@ -771,8 +771,6 @@ RSpec.describe InvitesController do describe "rate limiting" do before { RateLimiter.enable } - use_redis_snapshotting - it "can send invite email" do sign_in(user) @@ -1598,8 +1596,6 @@ RSpec.describe InvitesController do RateLimiter.enable end - use_redis_snapshotting - it "resends all non-redeemed invites by a user" do freeze_time diff --git a/spec/requests/omniauth_callbacks_controller_spec.rb b/spec/requests/omniauth_callbacks_controller_spec.rb index 1e27b1b9fb3..c599bb2afd6 100644 --- a/spec/requests/omniauth_callbacks_controller_spec.rb +++ b/spec/requests/omniauth_callbacks_controller_spec.rb @@ -163,8 +163,6 @@ RSpec.describe Users::OmniauthCallbacksController do end context "when in readonly mode" do - use_redis_snapshotting - it "should return a 503" do Discourse.enable_readonly_mode @@ -174,8 +172,6 @@ RSpec.describe Users::OmniauthCallbacksController do end context "when in staff writes only mode" do - use_redis_snapshotting - before { Discourse.enable_readonly_mode(Discourse::STAFF_WRITES_ONLY_MODE_KEY) } it "returns a 503 for non-staff" do diff --git a/spec/requests/presence_controller_spec.rb b/spec/requests/presence_controller_spec.rb index c1ae8784ee8..886671738fa 100644 --- a/spec/requests/presence_controller_spec.rb +++ b/spec/requests/presence_controller_spec.rb @@ -45,8 +45,6 @@ RSpec.describe PresenceController do describe "#update" do context "in readonly mode" do - use_redis_snapshotting - before { Discourse.enable_readonly_mode } it "produces 503" do diff --git a/spec/requests/search_controller_spec.rb b/spec/requests/search_controller_spec.rb index 5685d7489f4..e4666f8d12a 100644 --- a/spec/requests/search_controller_spec.rb +++ b/spec/requests/search_controller_spec.rb @@ -230,8 +230,6 @@ RSpec.describe SearchController do context "when rate limited" do before { RateLimiter.enable } - use_redis_snapshotting - def unlimited_request(ip_address = "1.2.3.4") get "/search/query.json", params: { term: "wookie" }, env: { REMOTE_ADDR: ip_address } @@ -422,8 +420,6 @@ RSpec.describe SearchController do context "when rate limited" do before { RateLimiter.enable } - use_redis_snapshotting - def unlimited_request(ip_address = "1.2.3.4") get "/search.json", params: { q: "wookie" }, env: { REMOTE_ADDR: ip_address } diff --git a/spec/requests/session_controller_spec.rb b/spec/requests/session_controller_spec.rb index 341f2875e55..33e964f7832 100644 --- a/spec/requests/session_controller_spec.rb +++ b/spec/requests/session_controller_spec.rb @@ -136,8 +136,6 @@ RSpec.describe SessionController do before { SiteSetting.enable_local_logins_via_email = true } context "when in staff writes only mode" do - use_redis_snapshotting - before { Discourse.enable_readonly_mode(Discourse::STAFF_WRITES_ONLY_MODE_KEY) } it "allows admins to login" do @@ -580,8 +578,6 @@ RSpec.describe SessionController do end context "when in staff writes only mode" do - use_redis_snapshotting - before { Discourse.enable_readonly_mode(Discourse::STAFF_WRITES_ONLY_MODE_KEY) } it "allows staff to login" do @@ -1366,8 +1362,6 @@ RSpec.describe SessionController do end context "when in readonly mode" do - use_redis_snapshotting - before { Discourse.enable_readonly_mode } it "disallows requests" do @@ -1840,8 +1834,6 @@ RSpec.describe SessionController do describe "#create" do context "when read only mode" do - use_redis_snapshotting - before do Discourse.enable_readonly_mode EmailToken.confirm(email_token.token) @@ -1860,8 +1852,6 @@ RSpec.describe SessionController do end context "when in staff writes only mode" do - use_redis_snapshotting - before do Discourse.enable_readonly_mode(Discourse::STAFF_WRITES_ONLY_MODE_KEY) EmailToken.confirm(email_token.token) @@ -2045,8 +2035,6 @@ RSpec.describe SessionController do before { RateLimiter.enable } - use_redis_snapshotting - it "should return an error response code with the right error message" do post "/session.json", params: { login: user.username, password: "myawesomepassword" } @@ -2445,8 +2433,6 @@ RSpec.describe SessionController do context "when rate limited" do before { RateLimiter.enable } - use_redis_snapshotting - it "rate limits login" do SiteSetting.max_logins_per_ip_per_hour = 2 EmailToken.confirm(email_token.token) @@ -2737,8 +2723,6 @@ RSpec.describe SessionController do describe "rate limiting" do before { RateLimiter.enable } - use_redis_snapshotting - it "should correctly rate limits" do user = Fabricate(:user) diff --git a/spec/requests/slugs_controller_spec.rb b/spec/requests/slugs_controller_spec.rb index 14b9ae53399..d999cb32791 100644 --- a/spec/requests/slugs_controller_spec.rb +++ b/spec/requests/slugs_controller_spec.rb @@ -30,8 +30,6 @@ RSpec.describe SlugsController do describe "rate limiting" do before { RateLimiter.enable } - use_redis_snapshotting - it "rate limits" do stub_const(SlugsController, "MAX_SLUG_GENERATIONS_PER_MINUTE", 1) do post "/slugs.json?name=#{name}" diff --git a/spec/requests/topics_controller_spec.rb b/spec/requests/topics_controller_spec.rb index 06d6bb3f19c..6470eec2868 100644 --- a/spec/requests/topics_controller_spec.rb +++ b/spec/requests/topics_controller_spec.rb @@ -2249,8 +2249,6 @@ RSpec.describe TopicsController do end describe "#show" do - use_redis_snapshotting - fab!(:private_topic) { pm } fab!(:topic) { Fabricate(:post, user: post_author1).topic } diff --git a/spec/requests/uploads_controller_spec.rb b/spec/requests/uploads_controller_spec.rb index 13025ebab28..45abd55c5a8 100644 --- a/spec/requests/uploads_controller_spec.rb +++ b/spec/requests/uploads_controller_spec.rb @@ -23,8 +23,6 @@ RSpec.describe UploadsController do context "when rate limited" do before { RateLimiter.enable } - use_redis_snapshotting - it "should return 429 response code when maximum number of uploads per minute has been exceeded for a user" do SiteSetting.max_uploads_per_minute = 1 @@ -913,8 +911,6 @@ RSpec.describe UploadsController do describe "rate limiting" do before { RateLimiter.enable } - use_redis_snapshotting - it "rate limits" do SiteSetting.max_presigned_put_per_minute = 1 @@ -1085,8 +1081,6 @@ RSpec.describe UploadsController do describe "rate limiting" do before { RateLimiter.enable } - use_redis_snapshotting - it "rate limits" do SiteSetting.max_create_multipart_per_minute = 1 @@ -1280,8 +1274,6 @@ RSpec.describe UploadsController do describe "rate limiting" do before { RateLimiter.enable } - use_redis_snapshotting - it "rate limits" do SiteSetting.max_batch_presign_multipart_per_minute = 1 @@ -1507,8 +1499,6 @@ RSpec.describe UploadsController do describe "rate limiting" do before { RateLimiter.enable } - use_redis_snapshotting - it "rate limits" do SiteSetting.max_complete_multipart_per_minute = 1 diff --git a/spec/requests/users_controller_spec.rb b/spec/requests/users_controller_spec.rb index 5ed316b7cbb..84c2d690182 100644 --- a/spec/requests/users_controller_spec.rb +++ b/spec/requests/users_controller_spec.rb @@ -380,8 +380,6 @@ RSpec.describe UsersController do context "with rate limiting" do before { RateLimiter.enable } - use_redis_snapshotting - it "rate limits reset passwords" do freeze_time @@ -4410,8 +4408,6 @@ RSpec.describe UsersController do end context "with a session variable" do - use_redis_snapshotting - it "raises an error with an invalid session value" do post_user @@ -5625,8 +5621,6 @@ RSpec.describe UsersController do describe "#enable_second_factor_totp" do before { sign_in(user1) } - use_redis_snapshotting - def create_totp stub_secure_session_confirmed post "/users/create_second_factor_totp.json" diff --git a/spec/serializers/topic_view_serializer_spec.rb b/spec/serializers/topic_view_serializer_spec.rb index 62b16e0f5a6..9ead2f49cc5 100644 --- a/spec/serializers/topic_view_serializer_spec.rb +++ b/spec/serializers/topic_view_serializer_spec.rb @@ -10,9 +10,6 @@ RSpec.describe TopicViewSerializer do JSON.parse(MultiJson.dump(serializer)).deep_symbolize_keys! end - # Ensure no suggested ids are cached cause that can muck up suggested - use_redis_snapshotting - fab!(:topic) fab!(:user) { Fabricate(:user, refresh_auto_groups: true) } fab!(:user_2) { Fabricate(:user) }