-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Determine VDT System tests tiers, preconditions, implications and expectations #4531
Comments
Assign tiers for test casesAll tests cases are considered Tier 0 - Basic Cases
Tier 1 - Common usage
Tier 2 - Non common cases
|
Determine test preconditions and expected resultsTier 0 - Basic CasesFirst syscollector scan (Rsync)Scenario: First syscollector scan (Rsync)
Given the Manager has updated the feeds and a new Agent is connected
When the Agent's syscollector scan is run
Then Vulnerability alerts are generated as "added" And the Agent's System states are stored Subsequent scan (Dbsync) without any installationScenario: Subsequent scan (Dbsync) without any installation
Given the Manager has an agent connected
And a first Syscollector scan has been executed
And no changes have been done in the agent
When a second Syscollector Scan is started on the agent
Then Vulnerability the agent System states and vulnerability alerts remain unchanged Tier 1 - Common usage casesInstallation of a vulnerable packageScenario: Installation of a vulnerable package
Given the Manager has an agent connected
And a first Syscollector Scan has been executed
When a vulnerable package is installed in the agent
And the Agent's syscollector scan is run
Then new entry for the package appears in the Agent's System states
And a vulnerability "added" alert is generated Updating a vulnerable package that remains vulnerable to the same CVEScenario: Updating a vulnerable package that remains vulnerable to the same CVE
Given the Agent has a vulnerable package installed
And a vulnerability alert has been already generated for it
When the vulnerable package is updated to a version that is still vulnerable to the same CVE
Then an alert is generated for the new version of the package being vulnerable
And no "solved" alert is generated for the old version of the package Updating a vulnerable package that becomes vulnerable to another CVEScenario: Updating a vulnerable package that becomes vulnerable to another CVE
Given the Agent has a vulnerable package installed
And a vulnerability alert has been already generated for the CVE
When the vulnerable package is updated to a version that is vulnerable to a new CVE
And the package is not vulnerable to the old CVE
Then an "added" alert is generated for the new CVE for the new version of the package
And a "solved" alert is generated for the old version of the package for the old CVE Updating a vulnerable package that becomes vulnerable to another CVE and retains the previous oneScenario: Updating a vulnerable package that becomes vulnerable to another CVE and retains the previous one
Given the Agent has a vulnerable package installed
And a vulnerability alert has been already generated for the CVE
When the vulnerable package is updated to a version that is also vulnerable to a new CVE
And the package is still vulnerable to the old CVE
Then an alert is generated for the new CVE and for the old CVE for the new version of the package
And no "solved" alert is generated for the old version of the package for the old CVE Updating a vulnerable package that ceases to be vulnerableScenario: Updating a vulnerable package that ceases to be vulnerable
Given the Agent has a vulnerable package installed
And a vulnerability alert has been already generated for the CVE
When the vulnerable package is updated to a version that no longer vulnerable to CVEs
Then a "solved" alert is generated for the CVE
And no other alerts are generated for the new package version. Deleting a vulnerable packageScenario: Deleting a vulnerable package
Given the Agent has a vulnerable package installed
And a vulnerability alert has been already generated for the CVE
When the vulnerable package removed from the system
Then a "solved" alert is generated for the CVE
And the package is removed from the System states information. Installation of a non-vulnerable packageScenario: Installation of a non-vulnerable package
Given the Manager has an agent connected
And a first Vulnerability Scan has been executed
When a package that is not vulnerable to any CVEs is installed in the agent
And the Agent's syscollector scan is run
Then new entry for the package appears in the Agent's System states
And a no vulnerability "added" alerts are generated for the package Updating a non-vulnerable package that becomes vulnerableScenario: Updating a non-vulnerable package that becomes vulnerable
Given the Manager has an agent connected that has a non-vulnerable package installed
And the package has already been scanned
And no alerts have been generated for the package
When the package is updated to a version that is vulnerable to a CVE
And the Agent's syscollector scan is run
Then a vulnerability "added" alert is generated for the package Updating of a non-vulnerable package that remains non-vulnerableScenario: Updating of a non-vulnerable package that remains non-vulnerable
Given the Manager has an agent connected that has a non-vulnerable package installed
And the package has already been scanned
And no alerts have been generated for the package
When the package is updated to a version that is not vulnerable to any CVE
And the Agent's syscollector scan is run
Then no vulnerability "added" alerts are generated for the package Deletion of a non-vulnerable packageScenario: Deletion of a non-vulnerable package
Given the Manager has an agent connected that has a non-vulnerable package installed
And the package has already been scanned
And no alerts have been generated for the package
When the package is removed
And the Agent's syscollector scan is run
Then no vulnerability "added" alerts are generated for the package
And the package is removed from the System states information Updating the vulnerability feed with a new applicable vulnerabilityScenario: Updating the vulnerability feed with a new applicable vulnerability
Given the Manager has an agent connected that has a non-vulnerable package installed
And the package has already been scanned
And no alerts have been generated for the package
When the vulnerability feed is updated containing a new applicable vulnerability
Then a vulnerability "added" alert is generated for the package Updating the vulnerability feed with a new non-applicable vulnerabilityScenario: Updating the vulnerability feed with a new non-applicable vulnerability
Given the Manager has an agent connected that has a non-vulnerable package installed
And the package has already been scanned
And no alerts have been generated for the package
When the vulnerability feed is updated containing a new non-applicable vulnerability
Then no vulnerability "added" alert is generated for the package Updating the vulnerability feed removes a CVE and causes package to cease to be vulnerableScenario: Updating the vulnerability feed removes a CVE and causes package to cease to be vulnerable
Given the Manager has an agent connected with a vulnerable package
And an alert has been generated for the corresponding CVE
When the feed is updated and the CVE for the vulnerable package is removed
Then a `vulnerability solved` alert is generated.
Tier 2 - Non common casesDeleting the states indexScenario: Deleting the states index
Given the Manager has an agent connected that has it's system data indexed
When the user deletes the `state index`
And a Syscollector scan is executed in the agent
Then the state index is regenerated and new alerts for the corresponding vulnerabilities are generated. |
Performance considerations
Security implications
|
Tests DependenciesIn the context of Performance considerations, it is crucial to identify potential dependencies between tests to minimize redundant and time-consuming operations. Specifically, the primary goal here is to mitigate the need for unnecessary package installations and removals, as these are the most time-intensive aspects of the tasks. Because of constraints related to installing multiple packages simultaneously, we've opted not to pursue a parallel approach for test cases. Instead, we will leverage parallelism solely for launching distinct use cases across the agents
Tests Codes
Dependency diagramflowchart TD
O[E2E-VD-1] --> P[E2E-VD-2]
P[E2E-VD-2] --> L[E2E-VD-3]
P[E2E-VD-2] --> S[E2E-VD-9]
P[E2E-VD-2] --> K[E2E-VD-15]
L[E2E-VD-3] --> V[E2E-VD-16]
L[E2E-VD-3] --> R[E2E-VD-4]
R[E2E-VD-4] --> R2[E2E-VD-5]
R2[E2E-VD-5] --> R3[E2E-VD-6]
R3[E2E-VD-6] --> R4[E2E-VD-7]
R4[E2E-VD-7] --> R5[E2E-VD-11]
R5[E2E-VD-11] --> R7[E2E-VD-12]
S[E2E-VD-9] --> R9[E2E-VD-10]
R9[E2E-VD-10] --> R10[E2E-VD-8]
S[E2E-VD-9] --> S1[E2E-VD-13]
S[E2E-VD-9] --> S2[E2E-VD-14]
|
LGTM! |
Description
This Issue aims to add detail to the test cases proposed in #4369. The goal is to determine tiers, preconditions, considerations, and expectations of each test case.
Tasks
The text was updated successfully, but these errors were encountered: