This repository has been archived by the owner on Mar 20, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 18
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
initial version of polarion test for local-cluster
- Loading branch information
1 parent
22508d2
commit 6405808
Showing
12 changed files
with
555 additions
and
36 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 changes: 2 additions & 0 deletions
2
tests/cypress/config/multiple_policies_governance/clusters.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,2 @@ | ||
local-cluster: | ||
status: Ready |
110 changes: 110 additions & 0 deletions
110
tests/cypress/config/multiple_policies_governance/policy-config.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,110 @@ | ||
# these are policies required by following Polarion test cases: | ||
# RHACM4K-548 | ||
# RHACM4K-549 | ||
# RHACM4K-550 | ||
# RHACM4K-551 | ||
# RHACM4K-552 | ||
# RHACM4K-553 | ||
# RHACM4K-634 | ||
# RHACM4K-660 | ||
# RHACM4K-661 | ||
# RHACM4K-901 | ||
# RHACM4K-902 | ||
# RHACM4K-903 | ||
# RHACM4K-904 | ||
# RHACM4K-1569 | ||
|
||
test-iam-policy-[ID]: | ||
apiVersion: 'policy.open-cluster-management.io/v1' | ||
namespace: 'default' | ||
cluster_binding: | ||
- 'local-cluster: "true"' | ||
binding_selector: | ||
- 'matchExpressions =[ { "key": "local-cluster", "operator": "In", "values": [ "true" ] } ]' | ||
kind: 'IamPolicy' | ||
specifications: | ||
- 'IamPolicy' | ||
standards: | ||
- 'NIST-CSF' | ||
categories: | ||
- 'PR.AC Identity Management and Access Control' | ||
controls: | ||
- 'PR.AC-4 Access Control' | ||
enforce: False | ||
disable: False | ||
|
||
test-pod-security-policy-[ID]: | ||
apiVersion: 'policy.open-cluster-management.io/v1' | ||
namespace: 'default' | ||
cluster_binding: | ||
- 'local-cluster: "true"' | ||
binding_selector: | ||
- 'matchExpressions =[ { "key": "local-cluster", "operator": "In", "values": [ "true" ] } ]' | ||
kind: 'ConfigurationPolicy' | ||
specifications: | ||
- 'PodSecurityPolicy' | ||
standards: | ||
- 'NIST-CSF' | ||
categories: | ||
- 'PR.PT Protective Technology' | ||
controls: | ||
- 'PR.PT-3 Least Functionality' | ||
enforce: False | ||
disable: | ||
|
||
test-role-policy-[ID]: | ||
apiVersion: 'policy.open-cluster-management.io/v1' | ||
namespace: 'default' | ||
cluster_binding: | ||
- 'local-cluster: "true"' | ||
binding_selector: | ||
- 'matchExpressions =[ { "key": "local-cluster", "operator": "In", "values": [ "true" ] } ]' | ||
kind: 'ConfigurationPolicy' | ||
specifications: | ||
- 'Role - role must follow defined permissions' | ||
standards: | ||
- 'NIST-CSF' | ||
categories: | ||
- 'PR.AC Identity Management and Access Control' | ||
controls: | ||
- 'PR.AC-4 Access Control' | ||
enforce: False | ||
disable: False | ||
|
||
test-role-binding-policy-[ID]: | ||
apiVersion: 'policy.open-cluster-management.io/v1' | ||
namespace: 'default' | ||
cluster_binding: | ||
- 'local-cluster: "true"' | ||
binding_selector: | ||
- 'matchExpressions =[ { "key": "local-cluster", "operator": "In", "values": [ "true" ] } ]' | ||
kind: 'ConfigurationPolicy' | ||
specifications: | ||
- 'Role - role must follow defined permissions' | ||
standards: | ||
- 'NIST-CSF' | ||
categories: | ||
- 'PR.AC Identity Management and Access Control' | ||
controls: | ||
- 'PR.AC-4 Access Control' | ||
enforce: False | ||
disable: False | ||
|
||
test-security-context-constraints-policy-[ID]: | ||
apiVersion: 'policy.open-cluster-management.io/v1' | ||
namespace: 'default' | ||
cluster_binding: | ||
- 'local-cluster: "true"' | ||
binding_selector: | ||
- 'matchExpressions =[ { "key": "local-cluster", "operator": "In", "values": [ "true" ] } ]' | ||
kind: 'ConfigurationPolicy' | ||
specifications: | ||
- 'SecurityContextConstraints' | ||
standards: | ||
- 'NIST-CSF' | ||
categories: | ||
- 'PR.PT Protective Technology' | ||
controls: | ||
- 'PR.PT-3 Least Functionality' | ||
enforce: False | ||
disable: False |
100 changes: 100 additions & 0 deletions
100
tests/cypress/config/multiple_policies_governance/policy-config.yaml.orig
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,100 @@ | ||
# these are policies required by following Polarion test cases: | ||
# RHACM4K-548 | ||
# RHACM4K-549 | ||
# RHACM4K-550 | ||
# RHACM4K-551 | ||
# RHACM4K-552 | ||
# RHACM4K-553 | ||
# RHACM4K-634 | ||
# RHACM4K-660 | ||
# RHACM4K-661 | ||
# RHACM4K-901 | ||
# RHACM4K-902 | ||
# RHACM4K-903 | ||
# RHACM4K-904 | ||
# RHACM4K-1569 | ||
|
||
test-iam-policy-[ID]: | ||
apiVersion: 'policy.open-cluster-management.io/v1' | ||
namespace: 'default' | ||
cluster_binding: | ||
- 'local-cluster: "true"' | ||
kind: 'IamPolicy' | ||
specifications: | ||
- 'IamPolicy' | ||
standards: | ||
- 'NIST-CSF' | ||
categories: | ||
- 'PR.AC Identity Management and Access Control' | ||
controls: | ||
- 'PR.AC-4 Access Control' | ||
enforce: False | ||
disable: False | ||
|
||
test-pod-security-policy-[ID]: | ||
apiVersion: 'policy.open-cluster-management.io/v1' | ||
namespace: 'default' | ||
cluster_binding: | ||
- 'local-cluster: "true"' | ||
kind: 'ConfigurationPolicy' | ||
specifications: | ||
- 'PodSecurityPolicy' | ||
standards: | ||
- 'NIST-CSF' | ||
categories: | ||
- 'PR.PT Protective Technology' | ||
controls: | ||
- 'PR.PT-3 Least Functionality' | ||
enforce: False | ||
disable: | ||
|
||
test-role-policy-[ID]: | ||
apiVersion: 'policy.open-cluster-management.io/v1' | ||
namespace: 'default' | ||
cluster_binding: | ||
- 'local-cluster: "true"' | ||
kind: 'ConfigurationPolicy' | ||
specifications: | ||
- 'Role - role must follow defined permissions' | ||
standards: | ||
- 'NIST-CSF' | ||
categories: | ||
- 'PR.AC Identity Management and Access Control' | ||
controls: | ||
- 'PR.AC-4 Access Control' | ||
enforce: False | ||
disable: False | ||
|
||
test-role-binding-policy-[ID]: | ||
apiVersion: 'policy.open-cluster-management.io/v1' | ||
namespace: 'default' | ||
cluster_binding: | ||
- 'local-cluster: "true"' | ||
kind: 'ConfigurationPolicy' | ||
specifications: | ||
- 'Role - role must follow defined permissions' | ||
standards: | ||
- 'NIST-CSF' | ||
categories: | ||
- 'PR.AC Identity Management and Access Control' | ||
controls: | ||
- 'PR.AC-4 Access Control' | ||
enforce: False | ||
disable: False | ||
|
||
test-security-context-constraints-policy-[ID]: | ||
apiVersion: 'policy.open-cluster-management.io/v1' | ||
namespace: 'default' | ||
cluster_binding: | ||
- 'local-cluster: "true"' | ||
kind: 'ConfigurationPolicy' | ||
specifications: | ||
- 'SecurityContextConstraints' | ||
standards: | ||
- 'NIST-CSF' | ||
categories: | ||
- 'PR.PT Protective Technology' | ||
controls: | ||
- 'PR.PT-3 Least Functionality' | ||
enforce: False | ||
disable: False |
32 changes: 32 additions & 0 deletions
32
tests/cypress/config/multiple_policies_governance/policy-config.yaml.short
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
# these are policies required by following Polarion test cases: | ||
# RHACM4K-548 | ||
# RHACM4K-549 | ||
# RHACM4K-550 | ||
# RHACM4K-551 | ||
# RHACM4K-552 | ||
# RHACM4K-553 | ||
# RHACM4K-634 | ||
# RHACM4K-660 | ||
# RHACM4K-661 | ||
# RHACM4K-901 | ||
# RHACM4K-902 | ||
# RHACM4K-903 | ||
# RHACM4K-904 | ||
# RHACM4K-1569 | ||
|
||
test-iam-policy-[ID]: | ||
apiVersion: 'policy.open-cluster-management.io/v1' | ||
namespace: 'default' | ||
cluster_binding: | ||
- 'local-cluster: "true"' | ||
kind: 'IamPolicy' | ||
specifications: | ||
- 'IamPolicy' | ||
standards: | ||
- 'NIST-CSF' | ||
categories: | ||
- 'PR.AC Identity Management and Access Control' | ||
controls: | ||
- 'PR.AC-4 Access Control' | ||
enforce: False | ||
disable: False |
6 changes: 6 additions & 0 deletions
6
tests/cypress/config/multiple_policies_governance/violations.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
"local-cluster": | ||
- [UNAME]-example-0 | ||
- [UNAME]-sample-restricted-psp-1 | ||
- [UNAME]-sample-role-1 | ||
- [UNAME]-sample-rolebinding-1 | ||
- [UNAME]-sample-restricted-scc-1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,2 @@ | ||
"local-cluster": | ||
- [UNAME]-example-0 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.