Skip to content

Commit

Permalink
remove vuln_scan_trigger_scan_on_new_image system test
Browse files Browse the repository at this point in the history
Signed-off-by: refaelm <[email protected]>
  • Loading branch information
refaelm92 committed May 29, 2024
1 parent e4ffd90 commit 82a0054
Show file tree
Hide file tree
Showing 9 changed files with 0 additions and 30 deletions.
12 changes: 0 additions & 12 deletions configurations/system/tests_cases/vuln_scan_tests.py
Original file line number Diff line number Diff line change
Expand Up @@ -72,18 +72,6 @@ def vuln_scan():
create_test_tenant=True
)

@staticmethod
def vuln_scan_trigger_scan_on_new_image():
from tests_scripts.helm.vuln_scan import VulnerabilityScanningTriggerScanOnNewImage
from os.path import join
return TestConfiguration(
name=inspect.currentframe().f_code.co_name,
test_obj=VulnerabilityScanningTriggerScanOnNewImage,
deployment=join("nginx-vuln-scan-new-image.yaml"),
expected_results="nginx-new-image.json",
helm_kwargs={"triggerNewImageScan": True}
)

@staticmethod
def vuln_scan_cve_exceptions():
from tests_scripts.helm.vuln_scan import VulnerabilityScanningCVEExceptions
Expand Down
1 change: 0 additions & 1 deletion jenkins_files/Jenkinsfile-helm-ks-be-test.groovy
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@ def tests = [
//"ks_microservice_create_2_cronjob_mitre_and_nsa_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
//"vuln_scan_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
//"vuln_scan": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
//"vuln_scan_trigger_scan_on_new_image": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
//"ks_microservice_ns_creation": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
//"ks_microservice_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
//"ks_microservice_mitre_framework_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
Expand Down
1 change: 0 additions & 1 deletion jenkins_files/Jenkinsfile-helm-ks-be.groovy
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@ def tests = [
"ks_microservice_create_2_cronjob_mitre_and_nsa_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_on_new_image": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_ns_creation": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_mitre_framework_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
Expand Down
1 change: 0 additions & 1 deletion jenkins_files/Jenkinsfile_helm_chart.groovy
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@ def tests = [
"ks_microservice_create_2_cronjob_mitre_and_nsa_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_on_new_image": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_ns_creation": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_mitre_framework_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,6 @@ def tests = [
"ks_microservice_create_2_cronjob_mitre_and_nsa_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_on_new_image": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_public_registry": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_ns_creation": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
Expand Down
1 change: 0 additions & 1 deletion jenkins_files/Jenkinsfile_payment.groovy
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,6 @@ def backend = "${env.BACKEND}"

// Add ONLY kubescape-HELM tests (do NOT add any CLI related tests)
def tests = ["vuln_scan": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_on_new_image": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_public_registry": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_public_registry_excluded": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_private_quay_registry": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
Expand Down
1 change: 0 additions & 1 deletion jenkins_files/Jenkinsfile_relevancy.groovy
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,6 @@ def helm_repo = "${env.HELM_REPO}"
// Add ONLY kubescape-HELM tests (do NOT add any CLI related tests)

def tests = ["vuln_scan": ["CA-AWS-DEV-JENKINS-EC2-FLEET-2X-LARGE-RELEVANCY", "k8s"],
"vuln_scan_trigger_scan_on_new_image": ["CA-AWS-DEV-JENKINS-EC2-FLEET-2X-LARGE-RELEVANCY", "k8s"],
"vuln_scan_trigger_scan_public_registry": ["CA-AWS-DEV-JENKINS-EC2-FLEET-2X-LARGE-RELEVANCY", "k8s"],
"vuln_scan_trigger_scan_public_registry_excluded": ["CA-AWS-DEV-JENKINS-EC2-FLEET-2X-LARGE-RELEVANCY", "k8s"],
"vuln_scan_trigger_scan_private_quay_registry": ["CA-AWS-DEV-JENKINS-EC2-FLEET-2X-LARGE-RELEVANCY", "k8s"],
Expand Down
1 change: 0 additions & 1 deletion readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,6 @@ Please ensure all these details are accurately filled to maintain the effectiven
| `vuln_scan_proxy` | helm-chart | | kubevuln, backend |
| `vuln_v2_views` | helm-chart | | kubevuln, backend |
| `vuln_v2_views` | helm-chart | | kubevuln, backend |
| `vuln_scan_trigger_scan_on_new_image` | helm-chart | | kubevuln, backend |
| `ks_microservice_ns_creation` | helm-chart | | in-cluster kubescape, backend |
| `ks_microservice_on_demand` | helm-chart | | in-cluster kubescape, backend |
| `ks_microservice_mitre_framework_on_demand` | helm-chart | | in-cluster kubescape, backend |
Expand Down
11 changes: 0 additions & 11 deletions system_test_mapping.json
Original file line number Diff line number Diff line change
Expand Up @@ -413,17 +413,6 @@
"skip_on_environment": "custom",
"owner": "[email protected]"
},
"vuln_scan_trigger_scan_on_new_image": {
"target": [
"In cluster"
],
"target_repositories": [
"careportsreceiver"
],
"description": "",
"skip_on_environment": "",
"owner": ""
},
"ks_microservice_ns_creation": {
"target": [
"In cluster"
Expand Down

0 comments on commit 82a0054

Please sign in to comment.