mirror of
https://github.com/goharbor/harbor.git
synced 2024-11-22 10:15:35 +01:00
Add replication schedule test
1. Add replication schedule test; 2. Add some sleep after project creation before push image to avoid push image v2 error. It fixed issue# 12094: Scan image vmware/photon:1.0 return unsupported occasionally. 3. Add some sleep in test_user_view_logs.py, can't get operation logs sometimes. Signed-off-by: danfengliu <danfengl@vmware.com>
This commit is contained in:
parent
f862805244
commit
ceaa0a57b3
2
Makefile
2
Makefile
@ -513,7 +513,7 @@ down:
|
|||||||
|
|
||||||
swagger_client:
|
swagger_client:
|
||||||
@echo "Generate swagger client"
|
@echo "Generate swagger client"
|
||||||
wget -q https://repo1.maven.org/maven2/io/swagger/swagger-codegen-cli/2.3.1/swagger-codegen-cli-2.3.1.jar -O swagger-codegen-cli.jar
|
wget https://repo1.maven.org/maven2/io/swagger/swagger-codegen-cli/2.3.1/swagger-codegen-cli-2.3.1.jar -O swagger-codegen-cli.jar
|
||||||
rm -rf harborclient
|
rm -rf harborclient
|
||||||
mkdir -p harborclient/harbor_client
|
mkdir -p harborclient/harbor_client
|
||||||
mkdir -p harborclient/harbor_swagger_client
|
mkdir -p harborclient/harbor_swagger_client
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
from __future__ import absolute_import
|
from __future__ import absolute_import
|
||||||
|
|
||||||
import unittest
|
import unittest
|
||||||
|
import time
|
||||||
|
|
||||||
from testutils import ADMIN_CLIENT
|
from testutils import ADMIN_CLIENT
|
||||||
from testutils import TEARDOWN
|
from testutils import TEARDOWN
|
||||||
@ -68,23 +69,25 @@ class TestProjects(unittest.TestCase):
|
|||||||
|
|
||||||
#2.1 Create a new project(PA) by user(UA);
|
#2.1 Create a new project(PA) by user(UA);
|
||||||
TestProjects.project_user_view_logs_id, project_user_view_logs_name = self.project.create_project(metadata = {"public": "false"}, **TestProjects.USER_USER_VIEW_LOGS_CLIENT)
|
TestProjects.project_user_view_logs_id, project_user_view_logs_name = self.project.create_project(metadata = {"public": "false"}, **TestProjects.USER_USER_VIEW_LOGS_CLIENT)
|
||||||
|
time.sleep(2)
|
||||||
|
|
||||||
#2.2 In project(PA), there should be 1 'create' log record;
|
#2.2 In project(PA), there should be 1 'create' log record;
|
||||||
operation = "create"
|
operation = "create"
|
||||||
log_count = self.projectv2.filter_project_logs(project_user_view_logs_name, user_user_view_logs_name, project_user_view_logs_name, "project", operation, **TestProjects.USER_USER_VIEW_LOGS_CLIENT)
|
log_count = self.projectv2.filter_project_logs(project_user_view_logs_name, user_user_view_logs_name, project_user_view_logs_name, "project", operation, **TestProjects.USER_USER_VIEW_LOGS_CLIENT)
|
||||||
if log_count != 1:
|
if log_count != 1:
|
||||||
self.test_result.add_test_result("1 - Failed to get log with user:{}, resource:{}, resource_type:{} and operation:{}".
|
self.test_result.add_test_result("1 - Failed to get log with user:{}, resource:{}, resource_type:{} and operation:{}, expect count 1, but actual is {}.".
|
||||||
format(user_user_view_logs_name, project_user_view_logs_name, "project", operation))
|
format(user_user_view_logs_name, project_user_view_logs_name, "project", operation, log_count))
|
||||||
|
|
||||||
#3.1 Push a new image(IA) in project(PA) by admin;
|
#3.1 Push a new image(IA) in project(PA) by admin;
|
||||||
repo_name, tag = push_image_to_project(project_user_view_logs_name, harbor_server, admin_name, admin_password, "tomcat", "latest")
|
repo_name, tag = push_image_to_project(project_user_view_logs_name, harbor_server, admin_name, admin_password, "tomcat", "latest")
|
||||||
|
time.sleep(2)
|
||||||
|
|
||||||
#3.2 In project(PA), there should be 1 'push' log record;
|
#3.2 In project(PA), there should be 1 'push' log record;
|
||||||
operation = "create"
|
operation = "create"
|
||||||
log_count = self.projectv2.filter_project_logs(project_user_view_logs_name, admin_name, r'{}:{}'.format(repo_name, tag), "artifact", operation, **TestProjects.USER_USER_VIEW_LOGS_CLIENT)
|
log_count = self.projectv2.filter_project_logs(project_user_view_logs_name, admin_name, r'{}:{}'.format(repo_name, tag), "artifact", operation, **TestProjects.USER_USER_VIEW_LOGS_CLIENT)
|
||||||
if log_count != 1:
|
if log_count != 1:
|
||||||
self.test_result.add_test_result("2 - Failed to get log with user:{}, resource:{}, resource_type:{} and operation:{}".
|
self.test_result.add_test_result("2 - Failed to get log with user:{}, resource:{}, resource_type:{} and operation:{}, expect count 1, but actual is {}.".
|
||||||
format(user_user_view_logs_name, project_user_view_logs_name, "artifact", operation))
|
format(user_user_view_logs_name, project_user_view_logs_name, "artifact", operation, log_count))
|
||||||
#4.1 Delete repository(RA) by user(UA);
|
#4.1 Delete repository(RA) by user(UA);
|
||||||
self.repo.delete_repoitory(project_user_view_logs_name, repo_name.split('/')[1], **TestProjects.USER_USER_VIEW_LOGS_CLIENT)
|
self.repo.delete_repoitory(project_user_view_logs_name, repo_name.split('/')[1], **TestProjects.USER_USER_VIEW_LOGS_CLIENT)
|
||||||
|
|
||||||
@ -92,8 +95,8 @@ class TestProjects(unittest.TestCase):
|
|||||||
operation = "delete"
|
operation = "delete"
|
||||||
log_count = self.projectv2.filter_project_logs(project_user_view_logs_name, user_user_view_logs_name, repo_name, "repository", operation, **TestProjects.USER_USER_VIEW_LOGS_CLIENT)
|
log_count = self.projectv2.filter_project_logs(project_user_view_logs_name, user_user_view_logs_name, repo_name, "repository", operation, **TestProjects.USER_USER_VIEW_LOGS_CLIENT)
|
||||||
if log_count != 1:
|
if log_count != 1:
|
||||||
self.test_result.add_test_result("5 - Failed to get log with user:{}, resource:{}, resource_type:{} and operation:{}".
|
self.test_result.add_test_result("5 - Failed to get log with user:{}, resource:{}, resource_type:{} and operation:{}, expect count 1, but actual is {}.".
|
||||||
format(user_user_view_logs_name, project_user_view_logs_name, "repository", operation))
|
format(user_user_view_logs_name, project_user_view_logs_name, "repository", operation, log_count))
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
unittest.main()
|
unittest.main()
|
@ -39,6 +39,7 @@ Push image
|
|||||||
[Arguments] ${ip} ${user} ${pwd} ${project} ${image} ${sha256}=${null} ${is_robot}=${false}
|
[Arguments] ${ip} ${user} ${pwd} ${project} ${image} ${sha256}=${null} ${is_robot}=${false}
|
||||||
${image_with_sha256}= Set Variable If '${sha256}'=='${null}' ${image} ${image}@sha256:${sha256}
|
${image_with_sha256}= Set Variable If '${sha256}'=='${null}' ${image} ${image}@sha256:${sha256}
|
||||||
${image_with_tag}= Set Variable If '${sha256}'=='${null}' ${image} ${image}:${sha256}
|
${image_with_tag}= Set Variable If '${sha256}'=='${null}' ${image} ${image}:${sha256}
|
||||||
|
Sleep 3
|
||||||
Log To Console \nRunning docker push ${image}...
|
Log To Console \nRunning docker push ${image}...
|
||||||
Docker Pull ${LOCAL_REGISTRY}/${LOCAL_REGISTRY_NAMESPACE}/${image_with_sha256}
|
Docker Pull ${LOCAL_REGISTRY}/${LOCAL_REGISTRY_NAMESPACE}/${image_with_sha256}
|
||||||
Run Keyword If ${is_robot}==${false} Wait Unitl Command Success docker login -u ${user} -p ${pwd} ${ip}
|
Run Keyword If ${is_robot}==${false} Wait Unitl Command Success docker login -u ${user} -p ${pwd} ${ip}
|
||||||
@ -62,11 +63,17 @@ Cannot Docker Login Harbor
|
|||||||
[Arguments] ${ip} ${user} ${pwd}
|
[Arguments] ${ip} ${user} ${pwd}
|
||||||
Command Should be Failed docker login -u ${user} -p ${pwd} ${ip}
|
Command Should be Failed docker login -u ${user} -p ${pwd} ${ip}
|
||||||
|
|
||||||
Cannot Pull image
|
Cannot Pull Image
|
||||||
[Arguments] ${ip} ${user} ${pwd} ${project} ${image} ${tag}=${null}
|
[Arguments] ${ip} ${user} ${pwd} ${project} ${image} ${tag}=${null} ${err_msg}=${null}
|
||||||
${image_with_tag}= Set Variable If '${tag}'=='${null}' ${image} ${image}:${tag}
|
${image_with_tag}= Set Variable If '${tag}'=='${null}' ${image} ${image}:${tag}
|
||||||
Wait Unitl Command Success docker login -u ${user} -p ${pwd} ${ip}
|
Wait Unitl Command Success docker login -u ${user} -p ${pwd} ${ip}
|
||||||
Command Should be Failed docker pull ${ip}/${project}/${image_with_tag}
|
:FOR ${idx} IN RANGE 0 4
|
||||||
|
\ ${out} Run Keyword And Ignore Error Command Should be Failed docker pull ${ip}/${project}/${image_with_tag}
|
||||||
|
\ Exit For Loop If '${out[0]}'=='PASS'
|
||||||
|
\ Sleep 3
|
||||||
|
Log To Console Cannot Pull Image - Pull Log: ${out[1]}
|
||||||
|
Should Be Equal As Strings '${out[0]}' 'PASS'
|
||||||
|
Run Keyword If '${err_msg}' != '${null}' Should Contain ${out[1]} ${err_msg}
|
||||||
|
|
||||||
Cannot Pull Unsigned Image
|
Cannot Pull Unsigned Image
|
||||||
[Arguments] ${ip} ${user} ${pass} ${proj} ${imagewithtag}
|
[Arguments] ${ip} ${user} ${pass} ${proj} ${imagewithtag}
|
||||||
|
@ -126,8 +126,8 @@ User Should Not Be A Member Of Project
|
|||||||
${password}= Set Variable If ${is_oidc_mode} == ${true} ${pwd_oidc} ${pwd}
|
${password}= Set Variable If ${is_oidc_mode} == ${true} ${pwd_oidc} ${pwd}
|
||||||
Project Should Not Display ${project}
|
Project Should Not Display ${project}
|
||||||
Logout Harbor
|
Logout Harbor
|
||||||
Cannot Pull image ${ip} ${user} ${password} ${project} ${ip}/${project}/hello-world
|
Cannot Pull Image ${ip} ${user} ${password} ${project} ${ip}/${project}/hello-world
|
||||||
Cannot Push image ${ip} ${user} ${password} ${project} hello-world
|
Cannot Pull Image ${ip} ${user} ${password} ${project} hello-world
|
||||||
|
|
||||||
Manage Project Member
|
Manage Project Member
|
||||||
[Arguments] ${admin} ${pwd} ${project} ${user} ${op} ${has_image}=${true} ${is_oidc_mode}=${false}
|
[Arguments] ${admin} ${pwd} ${project} ${user} ${op} ${has_image}=${true} ${is_oidc_mode}=${false}
|
||||||
|
@ -79,13 +79,21 @@ Set Daily Schedule
|
|||||||
Retry Element Click xpath=${project_tag_retention_schedule_ok_xpath}
|
Retry Element Click xpath=${project_tag_retention_schedule_ok_xpath}
|
||||||
Retry Wait Until Page Contains Element xpath=${project_tag_retention_span_daily_xpath}
|
Retry Wait Until Page Contains Element xpath=${project_tag_retention_span_daily_xpath}
|
||||||
|
|
||||||
|
Execute Result Should Be
|
||||||
|
[Arguments] ${result}
|
||||||
|
:FOR ${idx} IN RANGE 0 20
|
||||||
|
\ ${out} Run Keyword And Ignore Error Retry Wait Until Page Contains Element xpath=//clr-dg-cell[contains(., '${result}')]
|
||||||
|
\ Exit For Loop If '${out[0]}'=='PASS'
|
||||||
|
\ Sleep 6
|
||||||
|
Should Be Equal As Strings '${out[0]}' 'PASS'
|
||||||
|
|
||||||
Execute Dry Run
|
Execute Dry Run
|
||||||
Retry Element Click xpath=${project_tag_retention_dry_run_xpath}
|
Retry Element Click xpath=${project_tag_retention_dry_run_xpath}
|
||||||
Retry Wait Until Page Contains Element xpath=${project_tag_retention_record_yes_xpath}
|
Retry Wait Until Page Contains Element xpath=${project_tag_retention_record_yes_xpath}
|
||||||
Sleep 5
|
Sleep 5
|
||||||
Retry Element Click xpath=${project_tag_retention_record_yes_xpath}
|
Retry Element Click xpath=${project_tag_retention_record_yes_xpath}
|
||||||
# memcached:123 should be deleted and hello-world:latest should be retained
|
# memcached:123 should be deleted and hello-world:latest should be retained
|
||||||
Retry Wait Until Page Contains Element xpath=//clr-dg-cell[contains(., '0/1')]
|
Execute Result Should Be 0/1
|
||||||
|
|
||||||
|
|
||||||
Execute Run
|
Execute Run
|
||||||
@ -94,5 +102,6 @@ Execute Run
|
|||||||
Retry Wait Until Page Contains Element xpath=${project_tag_retention_record_no_xpath}
|
Retry Wait Until Page Contains Element xpath=${project_tag_retention_record_no_xpath}
|
||||||
Sleep 5
|
Sleep 5
|
||||||
Retry Element Click xpath=${project_tag_retention_record_no_xpath}
|
Retry Element Click xpath=${project_tag_retention_record_no_xpath}
|
||||||
# memcached:123 should be deleted and hello-world:latest should be retained
|
# memcached:123 should be deleted and hello-world:latest should be retained
|
||||||
Retry Wait Until Page Contains Element xpath=//clr-dg-cell[contains(., '0/1')]
|
Execute Result Should Be 0/1
|
||||||
|
|
||||||
|
@ -33,6 +33,7 @@ Create An New Project And Go Into Project
|
|||||||
Capture Page Screenshot
|
Capture Page Screenshot
|
||||||
Retry Double Keywords When Error Retry Element Click ${create_project_OK_button_xpath} Retry Wait Until Page Not Contains Element ${create_project_OK_button_xpath}
|
Retry Double Keywords When Error Retry Element Click ${create_project_OK_button_xpath} Retry Wait Until Page Not Contains Element ${create_project_OK_button_xpath}
|
||||||
Capture Page Screenshot
|
Capture Page Screenshot
|
||||||
|
Sleep 2
|
||||||
Go Into Project ${projectname} has_image=${false}
|
Go Into Project ${projectname} has_image=${false}
|
||||||
|
|
||||||
Create An New Project With New User
|
Create An New Project With New User
|
||||||
@ -43,6 +44,9 @@ Create An New Project With New User
|
|||||||
Create An New Project And Go Into Project ${projectname} ${public}
|
Create An New Project And Go Into Project ${projectname} ${public}
|
||||||
Sleep 1
|
Sleep 1
|
||||||
|
|
||||||
|
Artifact Exist
|
||||||
|
[Arguments] ${tag_name}
|
||||||
|
Retry Wait Until Page Contains Element //artifact-list-tab//clr-datagrid//clr-dg-row[contains(.,'sha256') and contains(.,'${tag_name}')]
|
||||||
#It's the log of project.
|
#It's the log of project.
|
||||||
Go To Project Log
|
Go To Project Log
|
||||||
#Switch To Project Tab Overflow
|
#Switch To Project Tab Overflow
|
||||||
|
@ -73,7 +73,7 @@ Create A New Endpoint
|
|||||||
|
|
||||||
Create A Rule With Existing Endpoint
|
Create A Rule With Existing Endpoint
|
||||||
[Arguments] ${name} ${replication_mode} ${project_name} ${resource_type} ${endpoint} ${dest_namespace}
|
[Arguments] ${name} ${replication_mode} ${project_name} ${resource_type} ${endpoint} ${dest_namespace}
|
||||||
... ${mode}=Manual
|
... ${mode}=Manual ${cron}="* */59 * * * *"
|
||||||
#click new
|
#click new
|
||||||
Retry Element Click ${new_name_xpath}
|
Retry Element Click ${new_name_xpath}
|
||||||
#input name
|
#input name
|
||||||
@ -88,7 +88,7 @@ Create A Rule With Existing Endpoint
|
|||||||
Retry Text Input ${dest_namespace_xpath} ${dest_namespace}
|
Retry Text Input ${dest_namespace_xpath} ${dest_namespace}
|
||||||
#set trigger
|
#set trigger
|
||||||
Select Trigger ${mode}
|
Select Trigger ${mode}
|
||||||
Run Keyword If '${mode}' == 'Scheduled' Log To Console Scheduled
|
Run Keyword If '${mode}' == 'Scheduled' Retry Text Input ${targetCron_id} ${cron}
|
||||||
#click save
|
#click save
|
||||||
Retry Double Keywords When Error Retry Element Click ${rule_save_button} Retry Wait Until Page Not Contains Element ${rule_save_button}
|
Retry Double Keywords When Error Retry Element Click ${rule_save_button} Retry Wait Until Page Not Contains Element ${rule_save_button}
|
||||||
Sleep 2
|
Sleep 2
|
||||||
|
@ -41,7 +41,7 @@ Body Of Manage project publicity
|
|||||||
Logout Harbor
|
Logout Harbor
|
||||||
Sign In Harbor ${HARBOR_URL} user008 Test1@34
|
Sign In Harbor ${HARBOR_URL} user008 Test1@34
|
||||||
Project Should Not Display project${d}
|
Project Should Not Display project${d}
|
||||||
Cannot Pull image ${ip} user008 Test1@34 project${d} hello-world:latest
|
Cannot Pull Image ${ip} user008 Test1@34 project${d} hello-world:latest err_msg=unauthorized to access repository
|
||||||
|
|
||||||
Logout Harbor
|
Logout Harbor
|
||||||
Sign In Harbor ${HARBOR_URL} user007 Test1@34
|
Sign In Harbor ${HARBOR_URL} user007 Test1@34
|
||||||
@ -240,7 +240,7 @@ Body Of Verfiy System Level CVE Whitelist
|
|||||||
Push Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} sha256=${sha256}
|
Push Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} sha256=${sha256}
|
||||||
Go Into Project project${d}
|
Go Into Project project${d}
|
||||||
Set Vulnerabilty Serverity 2
|
Set Vulnerabilty Serverity 2
|
||||||
Cannot Pull image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
Cannot Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256} err_msg=current image without vulnerability scanning cannot be pulled due to configured policy
|
||||||
Go Into Project project${d}
|
Go Into Project project${d}
|
||||||
Go Into Repo project${d}/${image}
|
Go Into Repo project${d}/${image}
|
||||||
Scan Repo ${sha256} Succeed
|
Scan Repo ${sha256} Succeed
|
||||||
@ -250,12 +250,12 @@ Body Of Verfiy System Level CVE Whitelist
|
|||||||
Switch To Configuration System Setting
|
Switch To Configuration System Setting
|
||||||
# Add Items To System CVE Whitelist CVE-2019-19317\nCVE-2019-19646 \nCVE-2019-5188 \nCVE-2019-20387 \nCVE-2019-17498 \nCVE-2019-20372 \nCVE-2019-19244 \nCVE-2019-19603 \nCVE-2019-19880 \nCVE-2019-19923 \nCVE-2019-19925 \nCVE-2019-19926 \nCVE-2019-19959 \nCVE-2019-20218 \nCVE-2019-19232 \nCVE-2019-19234 \nCVE-2019-19645
|
# Add Items To System CVE Whitelist CVE-2019-19317\nCVE-2019-19646 \nCVE-2019-5188 \nCVE-2019-20387 \nCVE-2019-17498 \nCVE-2019-20372 \nCVE-2019-19244 \nCVE-2019-19603 \nCVE-2019-19880 \nCVE-2019-19923 \nCVE-2019-19925 \nCVE-2019-19926 \nCVE-2019-19959 \nCVE-2019-20218 \nCVE-2019-19232 \nCVE-2019-19234 \nCVE-2019-19645
|
||||||
Add Items To System CVE Whitelist ${most_cve_list}
|
Add Items To System CVE Whitelist ${most_cve_list}
|
||||||
Cannot Pull image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
Cannot Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256} err_msg=cannot be pulled due to configured policy
|
||||||
# Add Items To System CVE Whitelist CVE-2019-18276
|
# Add Items To System CVE Whitelist CVE-2019-18276
|
||||||
Add Items To System CVE Whitelist ${single_cve}
|
Add Items To System CVE Whitelist ${single_cve}
|
||||||
Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
||||||
Delete Top Item In System CVE Whitelist count=6
|
Delete Top Item In System CVE Whitelist count=6
|
||||||
Cannot Pull image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
Cannot Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256} err_msg=cannot be pulled due to configured policy
|
||||||
Close Browser
|
Close Browser
|
||||||
|
|
||||||
Body Of Verfiy Project Level CVE Whitelist
|
Body Of Verfiy Project Level CVE Whitelist
|
||||||
@ -273,17 +273,17 @@ Body Of Verfiy Project Level CVE Whitelist
|
|||||||
Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
||||||
Go Into Project project${d}
|
Go Into Project project${d}
|
||||||
Set Vulnerabilty Serverity 2
|
Set Vulnerabilty Serverity 2
|
||||||
Cannot Pull image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
Cannot Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
||||||
Go Into Project project${d}
|
Go Into Project project${d}
|
||||||
Go Into Repo project${d}/${image}
|
Go Into Repo project${d}/${image}
|
||||||
Scan Repo ${sha256} Succeed
|
Scan Repo ${sha256} Succeed
|
||||||
Go Into Project project${d}
|
Go Into Project project${d}
|
||||||
Add Items to Project CVE Whitelist ${most_cve_list}
|
Add Items to Project CVE Whitelist ${most_cve_list}
|
||||||
Cannot Pull image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
Cannot Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
||||||
Add Items to Project CVE Whitelist ${single_cve}
|
Add Items to Project CVE Whitelist ${single_cve}
|
||||||
Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
||||||
Delete Top Item In Project CVE Whitelist
|
Delete Top Item In Project CVE Whitelist
|
||||||
Cannot Pull image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
Cannot Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
||||||
Close Browser
|
Close Browser
|
||||||
|
|
||||||
Body Of Verfiy Project Level CVE Whitelist By Quick Way of Add System
|
Body Of Verfiy Project Level CVE Whitelist By Quick Way of Add System
|
||||||
@ -311,7 +311,7 @@ Body Of Verfiy Project Level CVE Whitelist By Quick Way of Add System
|
|||||||
Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
||||||
Go Into Project project${d}
|
Go Into Project project${d}
|
||||||
Set Project To Project Level CVE Whitelist
|
Set Project To Project Level CVE Whitelist
|
||||||
Cannot Pull image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
Cannot Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
||||||
Add System CVE Whitelist to Project CVE Whitelist By Add System Button Click
|
Add System CVE Whitelist to Project CVE Whitelist By Add System Button Click
|
||||||
Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
||||||
Close Browser
|
Close Browser
|
@ -102,7 +102,7 @@ Test Case - Project Level Image Serverity Policy
|
|||||||
Navigate To Projects
|
Navigate To Projects
|
||||||
Go Into Project project${d}
|
Go Into Project project${d}
|
||||||
Set Vulnerabilty Serverity 3
|
Set Vulnerabilty Serverity 3
|
||||||
Cannot pull image ${ip} ${HARBOR_ADMIN} ${HARBOR_PASSWORD} project${d} ${image} tag=${sha256}
|
Cannot Pull Image ${ip} ${HARBOR_ADMIN} ${HARBOR_PASSWORD} project${d} ${image} tag=${sha256} err_msg=To continue with pull, please contact your project administrator to exempt matched vulnerabilities through configuring the CVE whitelist
|
||||||
Close Browser
|
Close Browser
|
||||||
|
|
||||||
#Important Note: All CVE IDs in CVE Whitelist cases must unique!
|
#Important Note: All CVE IDs in CVE Whitelist cases must unique!
|
||||||
|
@ -195,7 +195,7 @@ Test Case - Manage project publicity
|
|||||||
Logout Harbor
|
Logout Harbor
|
||||||
Sign In Harbor ${HARBOR_URL} userb${d} Test1@34
|
Sign In Harbor ${HARBOR_URL} userb${d} Test1@34
|
||||||
Project Should Not Display project${d}
|
Project Should Not Display project${d}
|
||||||
Cannot Pull image ${ip} userb${d} Test1@34 project${d} hello-world:latest
|
Cannot Pull Image ${ip} userb${d} Test1@34 project${d} hello-world:latest
|
||||||
|
|
||||||
Logout Harbor
|
Logout Harbor
|
||||||
Sign In Harbor ${HARBOR_URL} usera${d} Test1@34
|
Sign In Harbor ${HARBOR_URL} usera${d} Test1@34
|
||||||
|
@ -28,31 +28,84 @@ Test Case - Scan Schedule Job
|
|||||||
Init Chrome Driver
|
Init Chrome Driver
|
||||||
${d}= Get Current Date result_format=%M
|
${d}= Get Current Date result_format=%M
|
||||||
Log To Console ${d}
|
Log To Console ${d}
|
||||||
${project_name}= Set Variable scan_schedule_proj
|
${project_name}= Set Variable scan_schedule_proj${d}
|
||||||
${image}= Set Variable redis
|
${image}= Set Variable redis
|
||||||
${tag}= Set Variable latest
|
${tag}= Set Variable latest
|
||||||
Sign In Harbor ${HARBOR_URL} ${HARBOR_ADMIN} ${HARBOR_PASSWORD}
|
Sign In Harbor ${HARBOR_URL} ${HARBOR_ADMIN} ${HARBOR_PASSWORD}
|
||||||
Create An New Project And Go Into Project ${project_name}
|
Create An New Project And Go Into Project ${project_name}
|
||||||
Push image ${ip} ${HARBOR_ADMIN} ${HARBOR_PASSWORD} ${project_name} ${image}:${tag}
|
Push image ${ip} ${HARBOR_ADMIN} ${HARBOR_PASSWORD} ${project_name} ${image}:${tag}
|
||||||
|
Sleep 50
|
||||||
Go Into Repo ${project_name}/${image}
|
Go Into Repo ${project_name}/${image}
|
||||||
Retry Wait Until Page Contains Element ${not_scanned_icon}
|
Retry Wait Until Page Contains Element ${not_scanned_icon}
|
||||||
Switch To Vulnerability Page
|
Switch To Vulnerability Page
|
||||||
${flag}= Set Variable ${false}
|
${flag}= Set Variable ${false}
|
||||||
:FOR ${i} IN RANGE 999999
|
:FOR ${i} IN RANGE 999999
|
||||||
\ ${minite}= Get Current Date result_format=%M
|
\ ${minite}= Get Current Date result_format=%M
|
||||||
\ ${left} = Evaluate ${minite}%10
|
\ ${minite_int} = Convert To Integer ${minite}
|
||||||
\ ${d} = Convert To Integer ${left}
|
\ ${left} = Evaluate ${minite_int}%10
|
||||||
\ Log To Console ${i}/${d}
|
\ Log To Console ${i}/${left}
|
||||||
\ Run Keyword If ${d} <= 3 Run Keywords Set Scan Schedule custom value=* */10 * * * * AND Set Suite Variable ${flag} ${true}
|
|
||||||
\ Sleep 55
|
\ Sleep 55
|
||||||
|
\ Run Keyword If ${left} <= 3 and ${left} != 0 Run Keywords Set Scan Schedule custom value=* */10 * * * * AND Set Suite Variable ${flag} ${true}
|
||||||
\ Exit For Loop If '${flag}' == '${true}'
|
\ Exit For Loop If '${flag}' == '${true}'
|
||||||
# After scan custom schedule is set, image should stay in unscanned status.
|
# After scan custom schedule is set, image should stay in unscanned status.
|
||||||
Sleep 360
|
Log To Console Sleep for 300 seconds......
|
||||||
|
Sleep 300
|
||||||
Go Into Project ${project_name}
|
Go Into Project ${project_name}
|
||||||
Go Into Repo ${project_name}/${image}
|
Go Into Repo ${project_name}/${image}
|
||||||
Retry Wait Until Page Contains Element ${not_scanned_icon}
|
Retry Wait Until Page Contains Element ${not_scanned_icon}
|
||||||
Sleep 360
|
|
||||||
|
Log To Console Sleep for 500 seconds......
|
||||||
|
Sleep 500
|
||||||
|
Go Into Project ${project_name}
|
||||||
|
Go Into Repo ${project_name}/${image}
|
||||||
Scan Result Should Display In List Row ${tag}
|
Scan Result Should Display In List Row ${tag}
|
||||||
View Repo Scan Details Critical High Medium
|
View Repo Scan Details Critical High Medium
|
||||||
|
|
||||||
|
Test Case - Replication Schedule Job
|
||||||
|
Init Chrome Driver
|
||||||
|
${d}= Get Current Date result_format=%M
|
||||||
|
Log To Console ${d}
|
||||||
|
${project_name}= Set Variable replication_schedule_proj${d}
|
||||||
|
${image_a}= Set Variable mariadb
|
||||||
|
${tag_a}= Set Variable 111
|
||||||
|
${image_b}= Set Variable centos
|
||||||
|
${tag_b}= Set Variable 222
|
||||||
|
Sign In Harbor ${HARBOR_URL} ${HARBOR_ADMIN} ${HARBOR_PASSWORD}
|
||||||
|
Create An New Project And Go Into Project ${project_name}
|
||||||
|
Switch To Registries
|
||||||
|
Create A New Endpoint docker-hub e${d} https://hub.docker.com/ danfengliu Aa123456 Y
|
||||||
|
Switch To Replication Manage
|
||||||
|
${flag}= Set Variable ${false}
|
||||||
|
:FOR ${i} IN RANGE 999999
|
||||||
|
\ ${minite}= Get Current Date result_format=%M
|
||||||
|
\ ${minite_int} = Convert To Integer ${minite}
|
||||||
|
\ ${left} = Evaluate ${minite_int}%10
|
||||||
|
\ Log To Console ${i}/${left}
|
||||||
|
\ Run Keyword If ${left} <= 3 and ${left} != 0 Run Keywords Create A Rule With Existing Endpoint rule${d} pull danfengliu/* image e${d} ${project_name} mode=Scheduled cron=* */10 * * * * AND Set Suite Variable ${flag} ${true}
|
||||||
|
\ Sleep 40
|
||||||
|
\ Exit For Loop If '${flag}' == '${true}'
|
||||||
|
|
||||||
|
# After replication schedule is set, project should contain 2 images.
|
||||||
|
Log To Console Sleep for 720 seconds......
|
||||||
|
Sleep 720
|
||||||
|
Go Into Project ${project_name}
|
||||||
|
Go Into Repo ${project_name}/${image_a}
|
||||||
|
Artifact Exist ${tag_a}
|
||||||
|
Go Into Project ${project_name}
|
||||||
|
Go Into Repo ${project_name}/${image_b}
|
||||||
|
Artifact Exist ${tag_b}
|
||||||
|
|
||||||
|
# Delete repository
|
||||||
|
Go Into Project ${project_name}
|
||||||
|
Delete Repo ${project_name}/${image_a}
|
||||||
|
Delete Repo ${project_name}/${image_b}
|
||||||
|
|
||||||
|
# After replication schedule is set, project should contain 2 images.
|
||||||
|
Log To Console Sleep for 600 seconds......
|
||||||
|
Sleep 600
|
||||||
|
Go Into Project ${project_name}
|
||||||
|
Go Into Repo ${project_name}/${image_a}
|
||||||
|
Artifact Exist ${tag_a}
|
||||||
|
Go Into Project ${project_name}
|
||||||
|
Go Into Repo ${project_name}/${image_b}
|
||||||
|
Artifact Exist ${tag_b}
|
||||||
|
@ -106,7 +106,7 @@ Test Case - Project Level Image Serverity Policy
|
|||||||
Navigate To Projects
|
Navigate To Projects
|
||||||
Go Into Project project${d}
|
Go Into Project project${d}
|
||||||
Set Vulnerabilty Serverity 3
|
Set Vulnerabilty Serverity 3
|
||||||
Cannot pull image ${ip} ${HARBOR_ADMIN} ${HARBOR_PASSWORD} project${d} ${image} tag=${sha256}
|
Cannot Pull Image ${ip} ${HARBOR_ADMIN} ${HARBOR_PASSWORD} project${d} ${image} tag=${sha256} err_msg=To continue with pull, please contact your project administrator to exempt matched vulnerabilities through configuring the CVE whitelist
|
||||||
Close Browser
|
Close Browser
|
||||||
|
|
||||||
#Important Note: All CVE IDs in CVE Whitelist cases must unique!
|
#Important Note: All CVE IDs in CVE Whitelist cases must unique!
|
||||||
|
Loading…
Reference in New Issue
Block a user