Skip to content

Add test for bulk vulnerability analysis#20733

Open
ColeHiggins2 wants to merge 6 commits intoSatelliteQE:masterfrom
ColeHiggins2:bulk-vulnerability-analysis
Open

Add test for bulk vulnerability analysis#20733
ColeHiggins2 wants to merge 6 commits intoSatelliteQE:masterfrom
ColeHiggins2:bulk-vulnerability-analysis

Conversation

@ColeHiggins2
Copy link
Member

@ColeHiggins2 ColeHiggins2 commented Feb 4, 2026

Test for SAT-40203
Bulk Vulnerability Analysis toggle
SatelliteQE/airgun#2299

@ColeHiggins2 ColeHiggins2 self-assigned this Feb 4, 2026
@ColeHiggins2 ColeHiggins2 added No-CherryPick PR doesnt need CherryPick to previous branches Stream Introduced in or relating directly to Satellite Stream/Master labels Feb 4, 2026
@sourcery-ai
Copy link
Contributor

sourcery-ai bot commented Feb 4, 2026

Reviewer's Guide

Adds a shared fixture to prepare a vulnerable RHEL host and introduces a new end-to-end UI test that validates bulk disabling of vulnerability analysis via the All Hosts page, while refactoring the existing vulnerability E2E test to reuse the new fixture.

File-Level Changes

Change Details Files
Introduce reusable fixture for preparing a vulnerable RHEL host and refactor existing E2E vulnerability test to use it.
  • Create vulnerable_rhel_host fixture that cleans up static repos, updates packages, and downgrades glibc to a vulnerable version on the RHEL insights VM
  • Update test_rhcloud_insights_vulnerabilities_e2e to depend on the vulnerable_rhel_host fixture instead of rhel_insights_vm
  • Remove duplicated repo cleanup, update, and glibc downgrade logic from the E2E test body and rely on the fixture instead
tests/foreman/ui/test_rhcloud_insights_vulnerability.py
Add new E2E UI test for bulk disabling vulnerability analysis using the All Hosts page.
  • Define test_positive_bulk_disable_vulnerability_analysis marked as e2e/no_containers with RHEL versions 9 and 10 and local insights satellite target
  • Within a UI session, select the organization and ensure the 'Total CVEs' column is visible via manage_table_columns
  • Search for the prepared host, assert it has more than one CVE, and validate the hostname in the search results
  • Invoke manage_vulnerability_analysis('Disable') as a bulk action from the All Hosts page to disable vulnerability analysis
  • Re-query the host and assert that its 'Total CVEs' column value changed to 'Analysis disabled' to confirm the bulk action worked
tests/foreman/ui/test_rhcloud_insights_vulnerability.py

Tips and commands

Interacting with Sourcery

  • Trigger a new review: Comment @sourcery-ai review on the pull request.
  • Continue discussions: Reply directly to Sourcery's review comments.
  • Generate a GitHub issue from a review comment: Ask Sourcery to create an
    issue from a review comment by replying to it. You can also reply to a
    review comment with @sourcery-ai issue to create an issue from it.
  • Generate a pull request title: Write @sourcery-ai anywhere in the pull
    request title to generate a title at any time. You can also comment
    @sourcery-ai title on the pull request to (re-)generate the title at any time.
  • Generate a pull request summary: Write @sourcery-ai summary anywhere in
    the pull request body to generate a PR summary at any time exactly where you
    want it. You can also comment @sourcery-ai summary on the pull request to
    (re-)generate the summary at any time.
  • Generate reviewer's guide: Comment @sourcery-ai guide on the pull
    request to (re-)generate the reviewer's guide at any time.
  • Resolve all Sourcery comments: Comment @sourcery-ai resolve on the
    pull request to resolve all Sourcery comments. Useful if you've already
    addressed all the comments and don't want to see them anymore.
  • Dismiss all Sourcery reviews: Comment @sourcery-ai dismiss on the pull
    request to dismiss all existing Sourcery reviews. Especially useful if you
    want to start fresh with a new review - don't forget to comment
    @sourcery-ai review to trigger a new review!

Customizing Your Experience

Access your dashboard to:

  • Enable or disable review features such as the Sourcery-generated pull request
    summary, the reviewer's guide, and others.
  • Change the review language.
  • Add, remove or edit custom review instructions.
  • Adjust other review settings.

Getting Help

Copy link
Contributor

@sourcery-ai sourcery-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey - I've left some high level feedback:

  • In the new vulnerable_rhel_host fixture, consider moving GLIBC_RPM to a module-level constant so it can be reused and not redefined inside the fixture body.
  • In test_positive_bulk_disable_vulnerability_analysis, the initial call to session.all_hosts.get_displayed_table_headers() before manage_table_columns is unused and can be removed to keep the test focused and avoid redundant UI calls.
Prompt for AI Agents
Please address the comments from this code review:

## Overall Comments
- In the new `vulnerable_rhel_host` fixture, consider moving `GLIBC_RPM` to a module-level constant so it can be reused and not redefined inside the fixture body.
- In `test_positive_bulk_disable_vulnerability_analysis`, the initial call to `session.all_hosts.get_displayed_table_headers()` before `manage_table_columns` is unused and can be removed to keep the test focused and avoid redundant UI calls.

Sourcery is free for open source - if you like our reviews please consider sharing them ✨
Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.

@LadislavVasina1
Copy link
Contributor

trigger: test-robottelo
pytest: tests/foreman/ui/test_rhcloud_insights_vulnerability.py -k "test_rhcloud_insights_vulnerabilities_e2e or test_positive_bulk_disable_vulnerability_analysis"
airgun: 2299


@pytest.mark.e2e
@pytest.mark.no_containers
@pytest.mark.rhel_ver_list([9, 10])
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
@pytest.mark.rhel_ver_list([9, 10])
@pytest.mark.rhel_ver_match('N-1')

@ColeHiggins2 Could we use this instead?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1 to what lad said

Copy link
Member

@chris1984 chris1984 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Overall looks good, left one comment and Lads has a few


@pytest.mark.e2e
@pytest.mark.no_containers
@pytest.mark.rhel_ver_list([9, 10])
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1 to what lad said

@chris1984
Copy link
Member

trigger: test-robottelo
pytest: tests/foreman/ui/test_rhcloud_insights_vulnerability.py -k "test_rhcloud_insights_vulnerabilities_e2e or test_positive_bulk_disable_vulnerability_analysis"
airgun: 2299

1 similar comment
@ColeHiggins2
Copy link
Member Author

trigger: test-robottelo
pytest: tests/foreman/ui/test_rhcloud_insights_vulnerability.py -k "test_rhcloud_insights_vulnerabilities_e2e or test_positive_bulk_disable_vulnerability_analysis"
airgun: 2299

jeremylenz added a commit to jeremylenz/robottelo that referenced this pull request Feb 6, 2026
Addresses code review feedback by:
- Creating vulnerable_rhel_host fixture (matches pattern from PR SatelliteQE#20733)
- Centralizing CVE_ID as module-level constant
- Removing duplicate client setup code from each test
- Updating all test signatures to use the fixture

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
jeremylenz added a commit to jeremylenz/robottelo that referenced this pull request Feb 6, 2026
Addresses code review feedback by:
- Creating vulnerable_rhel_host fixture (matches pattern from PR SatelliteQE#20733)
- Centralizing CVE_ID as module-level constant
- Removing duplicate client setup code from each test
- Updating all test signatures to use the fixture

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
@ColeHiggins2
Copy link
Member Author

trigger: test-robottelo
pytest: tests/foreman/ui/test_rhcloud_insights_vulnerability.py -k "test_rhcloud_insights_vulnerabilities_e2e or test_positive_bulk_disable_vulnerability_analysis"
airgun: 2299

@jeremylenz
Copy link
Contributor

trigger: test-robottelo
pytest: tests/foreman/ui/test_rhcloud_insights_vulnerability.py
airgun: 2303

@jeremylenz
Copy link
Contributor

oops sorry, wrong PR 😳

@LadislavVasina1
Copy link
Contributor

@jeremylenz fun fact, if you are fast and remove the comment quickly, it will not spinup the PRT. :D

table_data = session.all_hosts.search(hostname)
assert len(table_data) > 0, f"Host {hostname} not found after search"
assert int(table_data[0]['Total CVEs']) > 1
host_row = table_data[0]
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Seems host_row is not fully used. Not a big deal.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good catch, could you please remove it @ColeHiggins2 as it is not used.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

oh it's used in the error message, I guess that's fine!

jeremylenz added a commit to jeremylenz/robottelo that referenced this pull request Feb 9, 2026
Addresses code review feedback by:
- Creating vulnerable_rhel_host fixture (matches pattern from PR SatelliteQE#20733)
- Centralizing CVE_ID as module-level constant
- Removing duplicate client setup code from each test
- Updating all test signatures to use the fixture

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
Copy link
Contributor

@jnagare-redhat jnagare-redhat left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good. Waiting for PRT

jeremylenz added a commit to jeremylenz/robottelo that referenced this pull request Feb 10, 2026
Addresses code review feedback by:
- Creating vulnerable_rhel_host fixture (matches pattern from PR SatelliteQE#20733)
- Centralizing CVE_ID as module-level constant
- Removing duplicate client setup code from each test
- Updating all test signatures to use the fixture

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
jeremylenz added a commit to jeremylenz/robottelo that referenced this pull request Feb 11, 2026
Addresses code review feedback by:
- Creating vulnerable_rhel_host fixture (matches pattern from PR SatelliteQE#20733)
- Centralizing CVE_ID as module-level constant
- Removing duplicate client setup code from each test
- Updating all test signatures to use the fixture

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
jeremylenz added a commit to jeremylenz/robottelo that referenced this pull request Feb 11, 2026
Addresses code review feedback by:
- Creating vulnerable_rhel_host fixture (matches pattern from PR SatelliteQE#20733)
- Centralizing CVE_ID as module-level constant
- Removing duplicate client setup code from each test
- Updating all test signatures to use the fixture

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
@ColeHiggins2 ColeHiggins2 force-pushed the bulk-vulnerability-analysis branch from 8611f9a to 801e4c1 Compare February 11, 2026 20:07
ColeHiggins2 pushed a commit that referenced this pull request Feb 11, 2026
…rsion (#20743)

* feat: Add UI tests for CVE business risk and status editing

Add end-to-end tests for editing CVE business risk and status fields
in the Insights Vulnerability UI.

Tests added:
- test_bulk_edit_business_risk_and_status - Bulk editing for multiple CVEs
- test_edit_from_cve_details_page - Editing from CVE details page
- test_filter_by_os_version - Filtering vulnerabilities by OS version

Each test:
- Provisions RHEL 10 host with IoP configured
- Downgrades glibc to create CVE-2025-8058
- Verifies edit functionality via Airgun entity methods
- Confirms changes persist in the vulnerabilities table

Depends on: SatelliteQE/airgun#2303

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>

* refactor: Use vulnerable_rhel_host fixture and centralize constants

Addresses code review feedback by:
- Creating vulnerable_rhel_host fixture (matches pattern from PR #20733)
- Centralizing CVE_ID as module-level constant
- Removing duplicate client setup code from each test
- Updating all test signatures to use the fixture

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>

* refactor: Address PR review comments for vulnerability edit tests

- Move CVE and RPM constants to robottelo/constants/__init__.py for reusability
- Change rhel_ver_list([10]) to rhel_ver_match('10') for exact version matching
- Remove CaseImportance metadata (not used for test selection)
- Convert double quotes to single quotes for consistency with project style

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>

* refactor: Replace glibc with mariadb for vulnerability testing

glibc downgrade is not supported on RHEL10. Switch to mariadb package which creates 3 deterministic CVEs (CVE-2023-52969, CVE-2023-52970, CVE-2023-52971). This addresses PR review feedback to make bulk edit tests deterministic rather than relying on finding random CVEs. Also adds insights-client call to ensure vulnerabilities are reported to Satellite.

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>

* refactor: Simplify to use single dnf install command

dnf install with full NEVRA handles install/upgrade/downgrade automatically, so no need for separate install + downgrade commands.

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>

* fix: Add CaseImportance High marker to vulnerability tests

This marker is required at the module level for CI checks to pass.

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>

* fix: Restore assert any pattern for vulnerability checks

During the rebase, the assertion pattern was incorrectly changed from
using `assert any()` to direct index access with `[0]`. This reverts
to the more robust `assert any()` pattern while keeping the constant
reference.

The `assert any()` pattern is preferred because:
- It's more resilient when the CVE isn't the first in the list
- It handles empty lists gracefully
- It better expresses the intent to find the CVE anywhere in the list

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>

---------

Co-authored-by: Claude Sonnet 4.5 <noreply@anthropic.com>
@ColeHiggins2 ColeHiggins2 force-pushed the bulk-vulnerability-analysis branch from 801e4c1 to a03df74 Compare February 11, 2026 22:11
Copy link
Contributor

@jeremylenz jeremylenz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ACK pending PRT 👍

@ColeHiggins2
Copy link
Member Author

trigger: test-robottelo
pytest: tests/foreman/ui/test_rhcloud_insights_vulnerability.py -k "test_rhcloud_insights_vulnerabilities_e2e or test_positive_bulk_disable_vulnerability_analysis"
airgun: 2299
env:
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_engine: 'quay.io/iop/insights-engine:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_gateway: 'quay.io/iop/gateway:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_host_inventory: 'quay.io/iop/host-inventory:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_host_inventory_frontend: 'quay.io/iop/host-inventory-frontend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_ingress: 'quay.io/iop/ingress:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_kafka: 'quay.io/strimzi/kafka:latest-kafka-3.7.1'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_puptoo: 'quay.io/iop/puptoo:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_yuptoo: 'quay.io/iop/yuptoo:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_advisor: 'quay.io/iop/advisor-backend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_advisor_frontend: 'quay.io/iop/advisor-frontend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_remediations: 'quay.io/iop/remediations:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vmaas: 'quay.io/iop/vmaas:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vulnerability: 'quay.io/iop/vulnerability-engine:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vulnerability_frontend: 'quay.io/iop/vulnerability-frontend:foreman-3.18'

@ColeHiggins2
Copy link
Member Author

trigger: test-robottelo
pytest: tests/foreman/ui/test_rhcloud_insights_vulnerability.py -k "test_rhcloud_insights_vulnerabilities_e2e or test_positive_bulk_disable_vulnerability_analysis"
airgun: 2299
env:
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_engine: 'quay.io/iop/insights-engine:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_gateway: 'quay.io/iop/gateway:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_host_inventory: 'quay.io/iop/host-inventory:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_host_inventory_frontend: 'quay.io/iop/host-inventory-frontend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_ingress: 'quay.io/iop/ingress:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_kafka: 'quay.io/strimzi/kafka:latest-kafka-3.7.1'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_puptoo: 'quay.io/iop/puptoo:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_yuptoo: 'quay.io/iop/yuptoo:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_advisor: 'quay.io/iop/advisor-backend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_advisor_frontend: 'quay.io/iop/advisor-frontend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_remediations: 'quay.io/iop/remediations:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vmaas: 'quay.io/iop/vmaas:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vulnerability: 'quay.io/iop/vulnerability-engine:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vulnerability_frontend: 'quay.io/iop/vulnerability-frontend:foreman-3.18'

@ColeHiggins2
Copy link
Member Author

trigger: test-robottelo
pytest: tests/foreman/ui/test_rhcloud_insights_vulnerability.py -k "test_rhcloud_insights_vulnerabilities_e2e or test_positive_bulk_disable_vulnerability_analysis"
airgun: 2299
env:
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_engine: 'quay.io/iop/insights-engine:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_gateway: 'quay.io/iop/gateway:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_host_inventory: 'quay.io/iop/host-inventory:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_host_inventory_frontend: 'quay.io/iop/host-inventory-frontend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_ingress: 'quay.io/iop/ingress:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_kafka: 'quay.io/strimzi/kafka:latest-kafka-3.7.1'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_puptoo: 'quay.io/iop/puptoo:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_yuptoo: 'quay.io/iop/yuptoo:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_advisor: 'quay.io/iop/advisor-backend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_advisor_frontend: 'quay.io/iop/advisor-frontend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_remediations: 'quay.io/iop/remediations:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vmaas: 'quay.io/iop/vmaas:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vulnerability: 'quay.io/iop/vulnerability-engine:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vulnerability_frontend: 'quay.io/iop/vulnerability-frontend:foreman-3.18'

@ColeHiggins2
Copy link
Member Author

trigger: test-robottelo
pytest: tests/foreman/ui/test_rhcloud_insights_vulnerability.py -k "test_rhcloud_insights_vulnerabilities_e2e or test_positive_bulk_disable_vulnerability_analysis"
airgun: 2299
env:
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_engine: 'quay.io/iop/insights-engine:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_gateway: 'quay.io/iop/gateway:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_host_inventory: 'quay.io/iop/host-inventory:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_host_inventory_frontend: 'quay.io/iop/host-inventory-frontend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_ingress: 'quay.io/iop/ingress:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_kafka: 'quay.io/strimzi/kafka:latest-kafka-3.7.1'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_puptoo: 'quay.io/iop/puptoo:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_yuptoo: 'quay.io/iop/yuptoo:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_advisor: 'quay.io/iop/advisor-backend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_advisor_frontend: 'quay.io/iop/advisor-frontend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_remediations: 'quay.io/iop/remediations:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vmaas: 'quay.io/iop/vmaas:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vulnerability: 'quay.io/iop/vulnerability-engine:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vulnerability_frontend: 'quay.io/iop/vulnerability-frontend:foreman-3.18'

1 similar comment
@ColeHiggins2
Copy link
Member Author

trigger: test-robottelo
pytest: tests/foreman/ui/test_rhcloud_insights_vulnerability.py -k "test_rhcloud_insights_vulnerabilities_e2e or test_positive_bulk_disable_vulnerability_analysis"
airgun: 2299
env:
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_engine: 'quay.io/iop/insights-engine:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_gateway: 'quay.io/iop/gateway:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_host_inventory: 'quay.io/iop/host-inventory:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_host_inventory_frontend: 'quay.io/iop/host-inventory-frontend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_ingress: 'quay.io/iop/ingress:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_kafka: 'quay.io/strimzi/kafka:latest-kafka-3.7.1'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_puptoo: 'quay.io/iop/puptoo:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__core_yuptoo: 'quay.io/iop/yuptoo:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_advisor: 'quay.io/iop/advisor-backend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_advisor_frontend: 'quay.io/iop/advisor-frontend:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_remediations: 'quay.io/iop/remediations:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vmaas: 'quay.io/iop/vmaas:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vulnerability: 'quay.io/iop/vulnerability-engine:foreman-3.18'
ROBOTTELO_rh_cloud__iop_advisor_engine__image_paths__service_vulnerability_frontend: 'quay.io/iop/vulnerability-frontend:foreman-3.18'

@ColeHiggins2 ColeHiggins2 added CherryPick PR needs CherryPick to previous branches AutoMerge_Cherry_Picked The cherrypicked PRs of master PR would be automerged if all checks passing 6.19.z and removed No-CherryPick PR doesnt need CherryPick to previous branches labels Feb 16, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

6.19.z AutoMerge_Cherry_Picked The cherrypicked PRs of master PR would be automerged if all checks passing CherryPick PR needs CherryPick to previous branches Stream Introduced in or relating directly to Satellite Stream/Master

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants