You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add UI tests for Edit business risk, Edit status, and Filter by OS version (#20743)
* feat: Add UI tests for CVE business risk and status editing
Add end-to-end tests for editing CVE business risk and status fields
in the Insights Vulnerability UI.
Tests added:
- test_bulk_edit_business_risk_and_status - Bulk editing for multiple CVEs
- test_edit_from_cve_details_page - Editing from CVE details page
- test_filter_by_os_version - Filtering vulnerabilities by OS version
Each test:
- Provisions RHEL 10 host with IoP configured
- Downgrades glibc to create CVE-2025-8058
- Verifies edit functionality via Airgun entity methods
- Confirms changes persist in the vulnerabilities table
Depends on: SatelliteQE/airgun#2303
Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
* refactor: Use vulnerable_rhel_host fixture and centralize constants
Addresses code review feedback by:
- Creating vulnerable_rhel_host fixture (matches pattern from PR #20733)
- Centralizing CVE_ID as module-level constant
- Removing duplicate client setup code from each test
- Updating all test signatures to use the fixture
Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
* refactor: Address PR review comments for vulnerability edit tests
- Move CVE and RPM constants to robottelo/constants/__init__.py for reusability
- Change rhel_ver_list([10]) to rhel_ver_match('10') for exact version matching
- Remove CaseImportance metadata (not used for test selection)
- Convert double quotes to single quotes for consistency with project style
Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
* refactor: Replace glibc with mariadb for vulnerability testing
glibc downgrade is not supported on RHEL10. Switch to mariadb package which creates 3 deterministic CVEs (CVE-2023-52969, CVE-2023-52970, CVE-2023-52971). This addresses PR review feedback to make bulk edit tests deterministic rather than relying on finding random CVEs. Also adds insights-client call to ensure vulnerabilities are reported to Satellite.
Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
* refactor: Simplify to use single dnf install command
dnf install with full NEVRA handles install/upgrade/downgrade automatically, so no need for separate install + downgrade commands.
Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
* fix: Add CaseImportance High marker to vulnerability tests
This marker is required at the module level for CI checks to pass.
Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
* fix: Restore assert any pattern for vulnerability checks
During the rebase, the assertion pattern was incorrectly changed from
using `assert any()` to direct index access with `[0]`. This reverts
to the more robust `assert any()` pattern while keeping the constant
reference.
The `assert any()` pattern is preferred because:
- It's more resilient when the CVE isn't the first in the list
- It handles empty lists gracefully
- It better expresses the intent to find the CVE anywhere in the list
Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
---------
Co-authored-by: Claude Sonnet 4.5 <noreply@anthropic.com>
0 commit comments