Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

remove vuln_scan_trigger_scan_on_new_image system test #386

Merged
merged 1 commit into from
May 29, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 0 additions & 12 deletions configurations/system/tests_cases/vuln_scan_tests.py
Original file line number Diff line number Diff line change
Expand Up @@ -72,18 +72,6 @@ def vuln_scan():
create_test_tenant=True
)

@staticmethod
def vuln_scan_trigger_scan_on_new_image():
from tests_scripts.helm.vuln_scan import VulnerabilityScanningTriggerScanOnNewImage
from os.path import join
return TestConfiguration(
name=inspect.currentframe().f_code.co_name,
test_obj=VulnerabilityScanningTriggerScanOnNewImage,
deployment=join("nginx-vuln-scan-new-image.yaml"),
expected_results="nginx-new-image.json",
helm_kwargs={"triggerNewImageScan": True}
)

@staticmethod
def vuln_scan_cve_exceptions():
from tests_scripts.helm.vuln_scan import VulnerabilityScanningCVEExceptions
Expand Down
1 change: 0 additions & 1 deletion jenkins_files/Jenkinsfile-helm-ks-be-test.groovy
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@ def tests = [
//"ks_microservice_create_2_cronjob_mitre_and_nsa_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
//"vuln_scan_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
//"vuln_scan": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
//"vuln_scan_trigger_scan_on_new_image": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
//"ks_microservice_ns_creation": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
//"ks_microservice_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
//"ks_microservice_mitre_framework_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
Expand Down
1 change: 0 additions & 1 deletion jenkins_files/Jenkinsfile-helm-ks-be.groovy
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@ def tests = [
"ks_microservice_create_2_cronjob_mitre_and_nsa_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_on_new_image": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_ns_creation": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_mitre_framework_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
Expand Down
1 change: 0 additions & 1 deletion jenkins_files/Jenkinsfile_helm_chart.groovy
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@ def tests = [
"ks_microservice_create_2_cronjob_mitre_and_nsa_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_on_new_image": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_ns_creation": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_mitre_framework_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,6 @@ def tests = [
"ks_microservice_create_2_cronjob_mitre_and_nsa_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_proxy": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_on_new_image": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_public_registry": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_ns_creation": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"ks_microservice_on_demand": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
Expand Down
1 change: 0 additions & 1 deletion jenkins_files/Jenkinsfile_payment.groovy
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,6 @@ def backend = "${env.BACKEND}"

// Add ONLY kubescape-HELM tests (do NOT add any CLI related tests)
def tests = ["vuln_scan": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_on_new_image": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_public_registry": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_public_registry_excluded": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
"vuln_scan_trigger_scan_private_quay_registry": ["CA-AWS-DEV-JENKINS-EC2-FLEET-X-LARGE", "k8s"],
Expand Down
1 change: 0 additions & 1 deletion jenkins_files/Jenkinsfile_relevancy.groovy
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,6 @@ def helm_repo = "${env.HELM_REPO}"
// Add ONLY kubescape-HELM tests (do NOT add any CLI related tests)

def tests = ["vuln_scan": ["CA-AWS-DEV-JENKINS-EC2-FLEET-2X-LARGE-RELEVANCY", "k8s"],
"vuln_scan_trigger_scan_on_new_image": ["CA-AWS-DEV-JENKINS-EC2-FLEET-2X-LARGE-RELEVANCY", "k8s"],
"vuln_scan_trigger_scan_public_registry": ["CA-AWS-DEV-JENKINS-EC2-FLEET-2X-LARGE-RELEVANCY", "k8s"],
"vuln_scan_trigger_scan_public_registry_excluded": ["CA-AWS-DEV-JENKINS-EC2-FLEET-2X-LARGE-RELEVANCY", "k8s"],
"vuln_scan_trigger_scan_private_quay_registry": ["CA-AWS-DEV-JENKINS-EC2-FLEET-2X-LARGE-RELEVANCY", "k8s"],
Expand Down
1 change: 0 additions & 1 deletion readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,6 @@ Please ensure all these details are accurately filled to maintain the effectiven
| `vuln_scan_proxy` | helm-chart | | kubevuln, backend |
| `vuln_v2_views` | helm-chart | | kubevuln, backend |
| `vuln_v2_views` | helm-chart | | kubevuln, backend |
| `vuln_scan_trigger_scan_on_new_image` | helm-chart | | kubevuln, backend |
| `ks_microservice_ns_creation` | helm-chart | | in-cluster kubescape, backend |
| `ks_microservice_on_demand` | helm-chart | | in-cluster kubescape, backend |
| `ks_microservice_mitre_framework_on_demand` | helm-chart | | in-cluster kubescape, backend |
Expand Down
11 changes: 0 additions & 11 deletions system_test_mapping.json
Original file line number Diff line number Diff line change
Expand Up @@ -413,17 +413,6 @@
"skip_on_environment": "custom",
"owner": "[email protected]"
},
"vuln_scan_trigger_scan_on_new_image": {
"target": [
"In cluster"
],
"target_repositories": [
"careportsreceiver"
],
"description": "",
"skip_on_environment": "",
"owner": ""
},
"ks_microservice_ns_creation": {
"target": [
"In cluster"
Expand Down
Loading