the check_versons code has been repackaged in an external
gitlab.com repo [1]
It provides
- better error management
- reporting
[1]: https://gitlab.com/Orange-OpenSource/lfn/onap/
integration/onap-version-status
Issue-ID: TEST-340
Signed-off-by: mrichomme <morgan.richomme@orange.com>
Change-Id: I6d892e8c5e6c1729a1073e9d6f538b636390515f
pip3 install --no-cache-dir \
git+https://git.onap.org/integration/xtesting.git@$ONAP_TESTS_TAG#subdirectory=security && \
cd /kube-hunter && pip3 install -r /kube-hunter/requirements.txt && \
- pip3 install -r /check_versions/requirements.txt && \
+ pip3 install --no-cache-dir \
+ git+https://gitlab.com/Orange-OpenSource/lfn/onap/integration/onap-version-status.git && \
apk del .build-deps
COPY docker/testcases.yaml /usr/lib/python3.8/site-packages/xtesting/ci/testcases.yaml
kube_hunter_cmd.append(j.address)
self.cmd = kube_hunter_cmd
self.error_string = "Vulnerabilties detected."
-
-
-class OnapSecurityVersions(SecurityTesting):
- """Check that Java and Python are available only in versions recommended by SECCOM."""
- def __init__(self, **kwargs):
- super(OnapSecurityVersions, self).__init__(**kwargs)
- self.cmd = ['/check_versions.sh', 'onap', '-r', '/check_versions/recommended_versions.yaml']
- self.error_string = "Not recommended versions found"
nonssl_endpoints = onap_security.security_tests:OnapSecurityNonSSLPorts
jdpw_ports = onap_security.security_tests:OnapSecurityJdwpPorts
kube_hunter = onap_security.security_tests:OnapSecurityKubeHunter
- versions = onap_security.security_tests:OnapSecurityVersions