E2E Testing
Description
Test and define E2E cases to ensure supported paths don't break.
Preparations
- Create new root group
- Create 3 Frameworks: F1, F2 and F3
- Create 2 Project: project-f1-f2 and project-f1-f3
- Assign F1 and F2 frameworks to project-f1-f2 and F1 and F3 to project-f1-f3
Test Cases
| Test Case | Expected Outcome | Result - Date - Tester (@ + your profile) - Reference | E2E Test |
|---|---|---|---|
|
Create new Scan Execution Policy scoped to compliance framework labels |
|
|
Link to E2E test case we've created |
|
Create two Pipeline Execution Policies (Policy Overlap 1, Policy Overlap 2). In Policy Overlap 1, create a basic SAST job. In Policy Overlap 2, create a basic Secret Detection job. Create one compliance framework (Critical).
|
|
||
|
Create one Pipeline Execution Policy (Single PEP) with a basic SAST Job. Create two compliance frameworks (Critical, High).
|
|
||
|
Create two Pipeline Execution Policies (PEP - Critical, PEP - High). In PEP - Critical, create a basic SAST job. In PEP - High, create a basic Secret Detection job. Create two compliance frameworks (Critical, High).
|
|
||
|
Create one Pipeline Execution Policy (Single PEP) with a basic SAST Job. Scope/enforce against a single project "Testing includes with PEP".
|
|
||
|
Assign multiple compliance framework labels (e.g., Critical and High) to a project and create two compliance frameworks with compliance pipelines.
|
|
||
|
Assign multiple compliance framework labels (e.g., Critical and High) to a project and create one compliance framework (Critical) with a compliance pipeline. Create a pipeline execution policy that is scoped to the High compliance framework.
|
|
||
|
Create two merge request approval policies (Override + 1 approval, No override + 0 approvals). Create one framework
|
|
||
|
Create all three policy types. Assign to a compliance framework. |
|
||
To be defined:
- Verify behavior of multiple labels with Scan Execution Policies -- need more test cases here.
- Verify behavior of multiple labels with Pipeline Execution Policies and with limits of PEP
- Advanced configurations of Pipeline Execution Policies (ie. changing strategies: inject vs override).
- Verify behavior when no
.gitlab-ci.ymlfile exists - Behavior when you have all policies applied to these scopes
- Behavior for custom stages when using Inject mode with pipeline execution policies - video