mirror of
https://github.com/goharbor/harbor.git
synced 2024-12-27 02:58:05 +01:00
Update trivy test case
Signed-off-by: Yang Jiao <jiaoya@vmware.com>
This commit is contained in:
parent
7d9a1172ab
commit
d1cf06a5aa
@ -116,13 +116,14 @@ Body Of View Scan Results
|
||||
Body Of Scan Image On Push
|
||||
[Arguments] @{vulnerability_levels}
|
||||
Init Chrome Driver
|
||||
${d}= get current date result_format=%m%s
|
||||
Sign In Harbor ${HARBOR_URL} ${HARBOR_ADMIN} ${HARBOR_PASSWORD}
|
||||
Go Into Project library
|
||||
Create An New Project And Go Into Project project${d}
|
||||
Goto Project Config
|
||||
Enable Scan On Push
|
||||
Push Image ${ip} ${HARBOR_ADMIN} ${HARBOR_PASSWORD} library memcached
|
||||
Push Image ${ip} ${HARBOR_ADMIN} ${HARBOR_PASSWORD} project${d} memcached
|
||||
Navigate To Projects
|
||||
Go Into Project library
|
||||
Go Into Project project${d}
|
||||
Go Into Repo memcached
|
||||
Scan Result Should Display In List Row latest
|
||||
View Repo Scan Details @{vulnerability_levels}
|
||||
@ -260,9 +261,7 @@ Body Of Verfiy System Level CVE Allowlist
|
||||
Init Chrome Driver
|
||||
${d}= Get Current Date result_format=%m%s
|
||||
${image}= Set Variable ${image_argument}
|
||||
# ${image}= Set Variable goharbor/harbor-portal
|
||||
${sha256}= Set Variable ${sha256_argument}
|
||||
# ${sha256}= Set Variable 2cb6a1c24dd6b88f11fd44ccc6560cb7be969f8ac5f752802c99cae6bcd592bb
|
||||
${signin_user}= Set Variable user025
|
||||
${signin_pwd}= Set Variable Test1@34
|
||||
Sign In Harbor ${HARBOR_URL} ${signin_user} ${signin_pwd}
|
||||
@ -280,13 +279,13 @@ Body Of Verfiy System Level CVE Allowlist
|
||||
Check Listed In CVE Allowlist project${d} ${image} ${sha256} ${single_cve} is_in=No
|
||||
Switch To Configure
|
||||
Switch To Configuration System Setting
|
||||
# Add Items To System CVE Allowlist CVE-2019-19317\nCVE-2019-19646 \nCVE-2019-5188 \nCVE-2019-20387 \nCVE-2019-17498 \nCVE-2019-20372 \nCVE-2019-19244 \nCVE-2019-19603 \nCVE-2019-19880 \nCVE-2019-19923 \nCVE-2019-19925 \nCVE-2019-19926 \nCVE-2019-19959 \nCVE-2019-20218 \nCVE-2019-19232 \nCVE-2019-19234 \nCVE-2019-19645
|
||||
# Add Items To System CVE Allowlist CVE-2021-36222\nCVE-2021-43527 \nCVE-2021-4044 \nCVE-2021-36084 \nCVE-2021-36085 \nCVE-2021-36086 \nCVE-2021-37750 \nCVE-2021-40528
|
||||
Add Items To System CVE Allowlist ${most_cve_list}
|
||||
Cannot Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256} err_msg=cannot be pulled due to configured policy
|
||||
# Add Items To System CVE Allowlist CVE-2019-18276
|
||||
# Add Items To System CVE Allowlist CVE-2021-43519
|
||||
Add Items To System CVE Allowlist ${single_cve}
|
||||
Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256}
|
||||
Delete Top Item In System CVE Allowlist count=16
|
||||
Delete Top Item In System CVE Allowlist count=9
|
||||
Cannot Pull Image ${ip} ${signin_user} ${signin_pwd} project${d} ${image} tag=${sha256} err_msg=cannot be pulled due to configured policy
|
||||
|
||||
Check Listed In CVE Allowlist project${d} ${image} ${sha256} ${single_cve}
|
||||
|
@ -143,7 +143,7 @@ Test Case - Scan Schedule Job
|
||||
Go Into Project ${project_name}
|
||||
Go Into Repo ${project_name}/${image}
|
||||
Scan Result Should Display In List Row ${sha256}
|
||||
View Repo Scan Details High Medium
|
||||
View Repo Scan Details Critical High
|
||||
|
||||
Test Case - Replication Schedule Job
|
||||
[tags] Replication_schedule
|
||||
|
@ -61,10 +61,10 @@ Test Case - Scan As An Unprivileged User
|
||||
|
||||
# Chose a empty Vul repo
|
||||
Test Case - Scan Image With Empty Vul
|
||||
Body Of Scan Image With Empty Vul photon 2.0_scan
|
||||
Body Of Scan Image With Empty Vul photon 4.0_scan
|
||||
|
||||
Test Case - Manual Scan All
|
||||
Body Of Manual Scan All High Medium
|
||||
Body Of Manual Scan All Critical High
|
||||
|
||||
#Test Case - View Scan Error
|
||||
# Init Chrome Driver
|
||||
@ -81,11 +81,11 @@ Test Case - Manual Scan All
|
||||
|
||||
Test Case - Scan Image On Push
|
||||
[Tags] run-once
|
||||
Body Of Scan Image On Push High Medium
|
||||
Body Of Scan Image On Push Critical High
|
||||
|
||||
Test Case - View Scan Results
|
||||
[Tags] run-once
|
||||
Body Of View Scan Results High
|
||||
Body Of View Scan Results Critical
|
||||
|
||||
Test Case - Project Level Image Serverity Policy
|
||||
[Tags] run-once
|
||||
@ -111,13 +111,13 @@ Test Case - Project Level Image Serverity Policy
|
||||
#Important Note: All CVE IDs in CVE Allowlist cases must unique!
|
||||
Test Case - Verfiy System Level CVE Allowlist
|
||||
[Tags] sys_cve
|
||||
Body Of Verfiy System Level CVE Allowlist goharbor/harbor-portal 2cb6a1c24dd6b88f11fd44ccc6560cb7be969f8ac5f752802c99cae6bcd592bb CVE-2019-19317\nCVE-2019-19646 \nCVE-2019-5188 \nCVE-2019-20387 \nCVE-2019-17498 \nCVE-2019-20372 \nCVE-2019-19244 \nCVE-2019-19603 \nCVE-2019-19880 \nCVE-2019-19923 \nCVE-2019-19925 \nCVE-2019-19926 \nCVE-2019-19959 \nCVE-2019-20218 \nCVE-2019-19232 \nCVE-2019-19234 \nCVE-2019-19645 CVE-2019-18276
|
||||
Body Of Verfiy System Level CVE Allowlist goharbor/harbor-portal 55d776fc7f431cdd008c3d8fc3e090c81c1368ed9ed85335f4664df71f864f0d CVE-2021-36222\nCVE-2021-43527 \nCVE-2021-4044 \nCVE-2021-36084 \nCVE-2021-36085 \nCVE-2021-36086 \nCVE-2021-37750 \nCVE-2021-40528 CVE-2021-43519
|
||||
|
||||
Test Case - Verfiy Project Level CVE Allowlist
|
||||
Body Of Verfiy Project Level CVE Allowlist goharbor/harbor-portal 2cb6a1c24dd6b88f11fd44ccc6560cb7be969f8ac5f752802c99cae6bcd592bb CVE-2019-19317\nCVE-2019-19646 \nCVE-2019-5188 \nCVE-2019-20387 \nCVE-2019-17498 \nCVE-2019-20372 \nCVE-2019-19244 \nCVE-2019-19603 \nCVE-2019-19880 \nCVE-2019-19923 \nCVE-2019-19925 \nCVE-2019-19926 \nCVE-2019-19959 \nCVE-2019-20218 \nCVE-2019-19232 \nCVE-2019-19234 \nCVE-2019-19645 CVE-2019-18276
|
||||
Body Of Verfiy Project Level CVE Allowlist goharbor/harbor-portal 55d776fc7f431cdd008c3d8fc3e090c81c1368ed9ed85335f4664df71f864f0d CVE-2021-36222\nCVE-2021-43527 \nCVE-2021-4044 \nCVE-2021-36084 \nCVE-2021-36085 \nCVE-2021-36086 \nCVE-2021-37750 \nCVE-2021-40528 CVE-2021-43519
|
||||
|
||||
Test Case - Verfiy Project Level CVE Allowlist By Quick Way of Add System
|
||||
Body Of Verfiy Project Level CVE Allowlist By Quick Way of Add System goharbor/harbor-portal 2cb6a1c24dd6b88f11fd44ccc6560cb7be969f8ac5f752802c99cae6bcd592bb CVE-2019-19317\nCVE-2019-19646 \nCVE-2019-5188 \nCVE-2019-20387 \nCVE-2019-17498 \nCVE-2019-20372 \nCVE-2019-19244 \nCVE-2019-19603 \nCVE-2019-19880 \nCVE-2019-19923 \nCVE-2019-19925 \nCVE-2019-19926 \nCVE-2019-19959 \nCVE-2019-20218 \nCVE-2019-19232 \nCVE-2019-19234 \nCVE-2019-19645 \nCVE-2019-18276
|
||||
Body Of Verfiy Project Level CVE Allowlist By Quick Way of Add System goharbor/harbor-portal 55d776fc7f431cdd008c3d8fc3e090c81c1368ed9ed85335f4664df71f864f0d CVE-2021-36222\nCVE-2021-43527 \nCVE-2021-4044 \nCVE-2021-36084 \nCVE-2021-36085 \nCVE-2021-36086 \nCVE-2021-37750 \nCVE-2021-40528 \nCVE-2021-43519
|
||||
|
||||
Test Case - Stop Scan And Stop Scan All
|
||||
[Tags] stop_scan_job
|
||||
|
Loading…
Reference in New Issue
Block a user