harbor/tests/robot-cases/Group3-Upgrade/data.json
danfengliu a2fc1bcfaf Fix quotas test issue in upgrade pipeline
1. Change way for quotas verification in upgrade pipeline, prepare specific size of image, then it's an known value for verifcation;
2. Add notary key rotate test;
3. For issue brought by docker 20, clean containerd cache is the only effective way, so both dockerd and containerd should be cache cleard and restarted;
4. Upgrade E2E Dockerfile for importing readable file size package, and other issues;
5. Uncomment project level robot account test in nightly.
6. Get DNS from local setting, and set it into docker deamon config file;

Signed-off-by: danfengliu <danfengl@vmware.com>
2021-03-10 06:27:22 +00:00

533 lines
13 KiB
JSON

{
"users":[
{
"name":"user1"
},
{
"name":"user2"
},
{
"name":"user3"
},
{
"name":"user4"
},
{
"name":"user5"
}
],
"admin":[
{
"name":"user1",
"has_admin":true
},
{
"name":"user2",
"has_admin":true
}
],
"endpoint":[
{
"url":"https://harbor-repo.vmware.com",
"name":"endpoint_for_proxy_cache",
"user":"",
"pass":"",
"insecure":false,
"type":"harbor"
}
],
"replicationrule":[
{
"project":"library",
"endpoint":"endpoint_for_proxy_cache",
"trigger":"Manual",
"rulename":"rulelibrary",
"endpoint_type":"harbor",
"is_src_registry":true,
"dest_namespace":"rule2-namespace",
"trigger_type":"scheduled",
"cron":"0 0 */8 * * *",
"deletion":false,
"enabled":true,
"override":true,
"name_filters":"namefilter2",
"tag_filters":"tagfilter2"
}
],
"interrogation_services":{
"cron":"0 0 0 6 3 0"
},
"configuration":{
"authmode":"Database",
"projectcreation":"everyone",
"selfreg":false,
"emailsetting":{
"emailserver":"emailserver",
"emailport":"2220",
"emailuser":"emailuser",
"emailfrom":"emailfrom",
"emailssl":false,
"verifycert":false
},
"token":"40",
"robot_token":"31",
"readonly":false,
"scanall":{
"type":"none",
"param":{
"daily":0
}
},
"deployment_security":{
"cve":[
{
"id":"CVE-2019-12904"
},
{
"id":"CVE-2011-3389"
},
{
"id":"CVE-2018-12886"
},
{
"id":"CVE-2019-3844"
}
],
"never_expires":false,
"expires_at":"2572969600"
},
"webhooks_enabled":true,
"syslabel":[
{
"name":"label1"
},
{
"name":"label2"
},
{
"name":"label3"
},
{
"name":"label4"
},
{
"name":"label5"
},
{
"name":"label6"
}
]
},
"distributions":[
{
"name":"distribution124",
"endpoint":"http://6.3.3.6",
"enabled":true,
"vendor":"kraken",
"auth_mode":"NONE",
"insecure":null
},
{
"name":"distribution134",
"endpoint":"http://6.3.6.vio",
"enabled":true,
"vendor":"dragonfly",
"auth_mode":"NONE",
"insecure":true
}
],
"projects":[
{
"name":"project1194",
"registry_name":null,
"has_image":true,
"accesslevel":"public",
"repocounts":2,
"repo":[
{
"name":"busybox",
"tag":"latest",
"signed":"false"
},
{
"name":"alpine",
"tag":"latest",
"signed":"true"
}
],
"artifact_index":{
"name":"ci_test_index_232",
"tag":"test_tag_989"
},
"member":[
{
"name":"user1",
"role":1
},
{
"name":"user2",
"role":2
},
{
"name":"user3",
"role":3
}
],
"p2p_preheat_policy":null,
"count_limit":1234,
"storage_limit":53687091200,
"replications":{
"rulename":"ruleproject1",
"endpointname":"endpoint_for_proxy_cache",
"trigger":"Manual"
},
"labels":[
{
"name":"proj1label1"
},
{
"name":"proj1label2"
},
{
"name":"proj1label3"
}
],
"logs":[
{
"name":"admin",
"operation":"create"
}
],
"robot_account":[
{
"name":"robot0",
"access": [
{
"action": "pull"
},
{
"action": "push"
}
]
}
],
"tag_retention_rule":{
"repository_patten":"*photon*",
"tag_decoration":"*v1.*",
"latestPushedK":666,
"latestPushedK_verify":"666",
"cron":"0 0 0 1 8 0"
},
"tag_immutability_rule":{
"repo_decoration":"repoMatches",
"tag_decoration":"excludes",
"repo_pattern":"*alpine*",
"tag_pattern":"*v1.2*"
},
"webhook":{
"address":"https://1.1.1.1",
"skip_cert_verify":true,
"auth_header":"aaa",
"enabled":true,
"notify_type":"http",
"name":"webhook18"
},
"configuration":{
"public":"false",
"enable_content_trust":"false",
"auto_scan":"false",
"prevent_vul":"false",
"severity":"medium",
"reuse_sys_cve_allowlist":"true",
"deployment_security":{
"cve":[]
}
}
},
{
"name":"project2194",
"registry_name":null,
"has_image":false,
"accesslevel":"public",
"repocounts":2,
"repo":[
{
"name":"busybox",
"tag":"latest",
"signed":"false"
},
{
"name":"alpine",
"tag":"latest",
"signed":"true"
}
],
"member":[
{
"name":"user1",
"role":1
},
{
"name":"user2",
"role":2
},
{
"name":"user3",
"role":3
}
],
"p2p_preheat_policy":[
{
"provider_name":"distribution124",
"name":"p2p_preheat_policy_1",
"filters":"[{\"type\":\"repository\",\"value\":\"cent*\"},{\"type\":\"tag\",\"value\":\"v1*\"}]",
"trigger":"{\"type\":\"manual\",\"trigger_setting\":{\"cron\":\"\"}}",
"project_id":36,
"enabled":true
},
{
"provider_name":"distribution134",
"name":"p2p_preheat_policy_2",
"filters":"[{\"type\":\"repository\",\"value\":\"re*\"},{\"type\":\"tag\",\"value\":\"v2*\"}]",
"trigger":"{\"type\":\"manual\",\"trigger_setting\":{\"cron\":\"\"}}",
"project_id":36,
"enabled":true
}
],
"count_limit":-1,
"storage_limit":32985348833280,
"replications":{
"rulename":"rulename1",
"endpointname":"endpoint_for_proxy_cache",
"trigger":"Manual"
},
"labels":[
{
"name":"proj2label1"
},
{
"name":"proj2label2"
},
{
"name":"proj2label3"
}
],
"logs":[
{
"name":"admin",
"operation":"create"
}
],
"robot_account":[
{
"name":"robot1",
"access": [
{
"action": "pull"
},
{
"action": "push"
}
]
},
{
"name":"robot2",
"access": [
{
"action": "pull"
}
]
},
{
"name":"robot3",
"access": [
{
"action": "push"
}
]
}
],
"tag_retention_rule":{
"repository_patten":"*centos*",
"tag_decoration":"*latest",
"latestPushedK":999,
"latestPushedK_verify":"999",
"cron":"0 0 0 1 6 0"
},
"tag_immutability_rule":{
"repo_decoration":"repoExcludes",
"tag_decoration":"matches",
"repo_pattern":"*buxybox*",
"tag_pattern":"*v3*"
},
"webhook":{
"address":"https://2.2.2.2",
"skip_cert_verify":false,
"auth_header":"bbb",
"enabled":true,
"notify_type":"slack",
"name":"webhook28"
},
"configuration":{
"public":"true",
"enable_content_trust":"true",
"auto_scan":"true",
"prevent_vul":"true",
"severity":"high",
"reuse_sys_cve_allowlist":"false",
"deployment_security":{
"cve":[
{
"id":"CVE-2019-111"
},
{
"id":"CVE-2011-2222"
},
{
"id":"CVE-2018-33333"
},
{
"id":"CVE-2019-44444"
}
],
"never_expires":false,
"expires_at":"2572969600"
}
}
},
{
"name":"project_proxy_3194",
"registry_name":"endpoint_for_proxy_cache",
"p2p_preheat_policy":null,
"has_image":true,
"accesslevel":"public",
"repocounts":2,
"repo":[
{
"cache_image_namespace":"library",
"cache_image":"busybox",
"tag":"latest",
"signed":"false"
}
],
"member":[
{
"name":"user1",
"role":1
},
{
"name":"user2",
"role":2
},
{
"name":"user3",
"role":3
}
],
"count_limit":-1,
"storage_limit":57671680,
"labels":[
{
"name":"proj2label1"
},
{
"name":"proj2label2"
},
{
"name":"proj2label3"
}
],
"logs":[
{
"name":"admin",
"operation":"create"
}
],
"robot_account":[
{
"name":"robot1",
"access": [
{
"action": "pull"
},
{
"action": "push"
}
]
},
{
"name":"robot2",
"access": [
{
"action": "pull"
}
]
},
{
"name":"robot3",
"access": [
{
"action": "push"
}
]
}
],
"tag_retention_rule":null,
"tag_immutability_rule":{
"repo_decoration":"repoExcludes",
"tag_decoration":"matches",
"repo_pattern":"*logstash*",
"tag_pattern":"*v2*"
},
"webhook":{
"address":"https://3.3.3.3",
"skip_cert_verify":false,
"auth_header":"bbb",
"enabled":true,
"notify_type":"slack",
"name":"webhook3.3"
},
"configuration":{
"public":"true",
"enable_content_trust":"false",
"auto_scan":"true",
"prevent_vul":"false",
"severity":"high",
"reuse_sys_cve_allowlist":"false",
"deployment_security":{
"cve":[
{
"id":"CVE-2019-111"
},
{
"id":"CVE-2011-2222"
},
{
"id":"CVE-2018-33333"
},
{
"id":"CVE-2019-44444"
}
],
"never_expires":false,
"expires_at":"2572969600"
}
}
}
],
"quotas":[
{
"name":"pro_quota_1",
"size":25,
"count_limit":1234,
"storage_limit":57671680
},
{
"name":"pro_quota_2",
"size":1024,
"count_limit":1234,
"storage_limit":53687091200
}
]
}